WorldWideScience

Sample records for b codes

  1. Overview of RAMONA-3B code

    International Nuclear Information System (INIS)

    RAMONA-3B has been developed at Brookhaven National Laboratory under the sponsorship of the US Nuclear Regulatory Commission for analyzing BWR systems transients. RAMONA-3B is the only currently available best-estimate BWR system transient code designed to predict three-dimensional power in the core coupled with the fuel and cladding temperature and vessel thermal hydraulics phenomena. The code employs the 1-1/2 group method with either three-dimensional or one-dimensional diffusion neutron kinetics, coupled with a one-dimensional, non-equilibrium, non-homogeneous two-phase model for thermal hydraulics

  2. On the structure of Lattice code WIMSD-5B

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Won Young; Min, Byung Joo

    2004-03-15

    The WIMS-D code is a freely available thermal reactor physics lattice code used widely for thermal research and power reactor calculation. Now the code WIMS-AECL, developed on the basis of WIMS-D, has been used as one of lattice codes for the cell calculation in Canada and also, in 1998, the latest version WIMSD-5B is released for OECD/NEA Data Bank. While WIMS-KAERI was developed and has been used, originated from WIMS-D, in Korea, it was adjusted for the cell calculation of research reactor HANARO and so it has no confirmaty to CANDU reactor. Therefore, the code development applicable to cell calculation of CANDU reactor is necessary not only for technological independence and but also for the establishment of CANDU safety analysis system. A lattice code WIMSD-5B was analyzed in order to set the system of reactor physics computer codes, to be used in the assessment of void reactivity effect. In order to improve and validate WIMSD-5B code, the analysis of the structure of WIMSD-5B lattice code was made and so its structure, algorithm and the subroutines of WIMSD-5B were presented for the cluster type and the pij method modelling the CANDU-6 fuel

  3. On the structure of Lattice code WIMSD-5B

    International Nuclear Information System (INIS)

    The WIMS-D code is a freely available thermal reactor physics lattice code used widely for thermal research and power reactor calculation. Now the code WIMS-AECL, developed on the basis of WIMS-D, has been used as one of lattice codes for the cell calculation in Canada and also, in 1998, the latest version WIMSD-5B is released for OECD/NEA Data Bank. While WIMS-KAERI was developed and has been used, originated from WIMS-D, in Korea, it was adjusted for the cell calculation of research reactor HANARO and so it has no confirmaty to CANDU reactor. Therefore, the code development applicable to cell calculation of CANDU reactor is necessary not only for technological independence and but also for the establishment of CANDU safety analysis system. A lattice code WIMSD-5B was analyzed in order to set the system of reactor physics computer codes, to be used in the assessment of void reactivity effect. In order to improve and validate WIMSD-5B code, the analysis of the structure of WIMSD-5B lattice code was made and so its structure, algorithm and the subroutines of WIMSD-5B were presented for the cluster type and the pij method modelling the CANDU-6 fuel

  4. A He I Case-B Recombination Code

    CERN Document Server

    Porter, R L

    2007-01-01

    Recent calculations of collisionless, Case-B, He I emissivities were performed by Bauman et al. (2005). The source code used in the calculation has been freely available online since that paper was published. A number of changes have been made to simplify the use of the code by third parties. Here I provide details on how to obtain, compile, and execute the program and interpret the results.

  5. 45 CFR Appendix B to Part 73 - Code of Ethics for Government Service

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Code of Ethics for Government Service B Appendix B... CONDUCT Pt. 73, App. B Appendix B to Part 73—Code of Ethics for Government Service Any person in... private word which can be binding on public duty. VII. Engage in no business with the Government,...

  6. DgSMC-B code: A robust and autonomous direct simulation Monte Carlo code for arbitrary geometries

    Science.gov (United States)

    Kargaran, H.; Minuchehr, A.; Zolfaghari, A.

    2016-07-01

    In this paper, we describe the structure of a new Direct Simulation Monte Carlo (DSMC) code that takes advantage of combinatorial geometry (CG) to simulate any rarefied gas flows Medias. The developed code, called DgSMC-B, has been written in FORTRAN90 language with capability of parallel processing using OpenMP framework. The DgSMC-B is capable of handling 3-dimensional (3D) geometries, which is created with first-and second-order surfaces. It performs independent particle tracking for the complex geometry without the intervention of mesh. In addition, it resolves the computational domain boundary and volume computing in border grids using hexahedral mesh. The developed code is robust and self-governing code, which does not use any separate code such as mesh generators. The results of six test cases have been presented to indicate its ability to deal with wide range of benchmark problems with sophisticated geometries such as airfoil NACA 0012. The DgSMC-B code demonstrates its performance and accuracy in a variety of problems. The results are found to be in good agreement with references and experimental data.

  7. BSR: B-spline atomic R-matrix codes

    Science.gov (United States)

    Zatsarinny, Oleg

    2006-02-01

    BSR is a general program to calculate atomic continuum processes using the B-spline R-matrix method, including electron-atom and electron-ion scattering, and radiative processes such as bound-bound transitions, photoionization and polarizabilities. The calculations can be performed in LS-coupling or in an intermediate-coupling scheme by including terms of the Breit-Pauli Hamiltonian. New version program summaryTitle of program: BSR Catalogue identifier: ADWY Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADWY Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Computers on which the program has been tested: Microway Beowulf cluster; Compaq Beowulf cluster; DEC Alpha workstation; DELL PC Operating systems under which the new version has been tested: UNIX, Windows XP Programming language used: FORTRAN 95 Memory required to execute with typical data: Typically 256-512 Mwords. Since all the principal dimensions are allocatable, the available memory defines the maximum complexity of the problem No. of bits in a word: 8 No. of processors used: 1 Has the code been vectorized or parallelized?: no No. of lines in distributed program, including test data, etc.: 69 943 No. of bytes in distributed program, including test data, etc.: 746 450 Peripherals used: scratch disk store; permanent disk store Distribution format: tar.gz Nature of physical problem: This program uses the R-matrix method to calculate electron-atom and electron-ion collision processes, with options to calculate radiative data, photoionization, etc. The calculations can be performed in LS-coupling or in an intermediate-coupling scheme, with options to include Breit-Pauli terms in the Hamiltonian. Method of solution: The R-matrix method is used [P.G. Burke, K.A. Berrington, Atomic and Molecular Processes: An R-Matrix Approach, IOP Publishing, Bristol, 1993; P.G. Burke, W.D. Robb, Adv. At. Mol. Phys. 11 (1975) 143; K.A. Berrington, W.B. Eissner, P.H. Norrington, Comput

  8. A bHLH code for cardiac morphogenesis.

    Science.gov (United States)

    Conway, Simon J; Firulli, Beth; Firulli, Anthony B

    2010-04-01

    Cell specification and differentiation of cardiomyocytes from mesodermal precursors is orchestrated by epigenetic and transcriptional inputs throughout heart formation. Of the many transcription factor super families that play a role in this process, the basic Helix-loop Helix (bHLH) family of proteins is well represented. The bHLH protein by design allows for dimerization-both as homodimers and heterodimers with other proteins within the family. Although DNA binding is mediated via a short variable cis-element termed an E-box, it is clear that DNA-affinity for these elements as well as the transcriptional input conveyed is dictated largely by the transcriptional partners within the dimer complex. Dimer partner choice has a number of inputs requiring co-expression within a given cell nucleus and dimerization modulation by the level of protein present, and post-translational modifications that can both enhance or reduce protein-protein interactions. Due to these complex interrelationships, it has been difficult to identity bona-fide downstream transcriptional targets and define the molecular pathways regulated of bHLH factors within cardiogenesis, despite the clear roles suggested via loss-of-function animals models. This review focuses on the Hand bHLH proteins-key members of the Twist-family of bHLH factors. Despite over a decade of investigation, questions regarding functional redundancy, downstream targets, and biological role during heart specification and differentiation have still not been fully addressed. Our goal is to review what is currently known and address strategies for gaining further understanding of Hand/Twist gene dosage and functional redundancy relationships within the developing heart that may underlie congenital heart defect pathogenesis. PMID:20033146

  9. SUMMARY OF GENERAL WORKING GROUP A+B+D: CODES BENCHMARKING.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.; SHAPOSHNIKOVA, E.; ZIMMERMANN, F.; HOFMANN, I.

    2006-05-29

    Computer simulation is an indispensable tool in assisting the design, construction, and operation of accelerators. In particular, computer simulation complements analytical theories and experimental observations in understanding beam dynamics in accelerators. The ultimate function of computer simulation is to study mechanisms that limit the performance of frontier accelerators. There are four goals for the benchmarking of computer simulation codes, namely debugging, validation, comparison and verification: (1) Debugging--codes should calculate what they are supposed to calculate; (2) Validation--results generated by the codes should agree with established analytical results for specific cases; (3) Comparison--results from two sets of codes should agree with each other if the models used are the same; and (4) Verification--results from the codes should agree with experimental measurements. This is the summary of the joint session among working groups A, B, and D of the HI32006 Workshop on computer codes benchmarking.

  10. Tourist Affiliate Program while Using Online Booking System with Possibility of Entering B2B Code

    Directory of Open Access Journals (Sweden)

    Slivar Iva

    2008-01-01

    Full Text Available Affiliate marketing programs are one of the most powerful tools for online marketing since the merchant presenting a product or a service decides on the commissioning model and the commission is granted only if the desired results have been reached. Affiliate marketing is based offline as much as tourism itself and it relies on the commission that tourist companies pay to their partners (affiliates who bring new guests. This paper will present the basics of how online affiliate programs work, benefits they bring and steps for their further implementation. It will explain in detail how to establish an affiliate program for dynamic web pages which use online booking system platforms that offer a possibility of entering a B2B code. Special attention will be paid to SEO (Search Engine Optimisation. It will also present results of a research on Croatian hotels web pages and the implementation of the online booking system and affiliate programs. Having in mind the insufficient deployment of online potentials, the aim of the paper is to stress the need for setting up an effective method of monitoring changes and updates in the online world as well as implementing new promotional possibilities, all aimed at increasing sales. The goal of the paper is to explore advantages and disadvantages of the affiliate program as a new sales channel and promote the possibility to implement it in one of the biggest Croatian hotel companies, Maistra d.d. Rovinj. Along with methods of data acquiring and different techniques of creative thinking, the following scientific research methods were also used: statistic, historic, descriptive, comparison, interview, analysis and synthesis, induction and deduction.

  11. International Code Assessment and Applications Program: Summary of code assessment studies concerning RELAP5/MOD2, RELAP5/MOD3, and TRAC-B. International Agreement Report

    Energy Technology Data Exchange (ETDEWEB)

    Schultz, R.R. [EG and G Idaho, Inc., Idaho Falls, ID (United States)

    1993-12-01

    Members of the International Code Assessment Program (ICAP) have assessed the US Nuclear Regulatory Commission (USNRC) advanced thermal-hydraulic codes over the past few years in a concerted effort to identify deficiencies, to define user guidelines, and to determine the state of each code. The results of sixty-two code assessment reviews, conducted at INEL, are summarized. Code deficiencies are discussed and user recommended nodalizations investigated during the course of conducting the assessment studies and reviews are listed. All the work that is summarized was done using the RELAP5/MOD2, RELAP5/MOD3, and TRAC-B codes.

  12. 50 CFR Table 2b to Part 679 - Species Codes: FMP Prohibited Species and CR Crab

    Science.gov (United States)

    2010-10-01

    ... CR Crab 2b Table 2b to Part 679 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... CR Crab Species Description Code CR Crab Groundfish PSC CRAB Box Lopholithodes mandtii 900... ✓ Korean horsehair crab Erimacrus isenbeckii 940 ✓ Multispinus crab Paralomis multispinus 951 ✓...

  13. HIGH QUALITY IMPLEMENTATION FOR AUTOMATIC GENERATION C# CODE BY EVENT-B PATTERN

    Directory of Open Access Journals (Sweden)

    Eman K Elsayed

    2014-01-01

    Full Text Available In this paper we proposed the logical correct path to implement automatically any algorithm or model in verified C# code. Our proposal depends on using the event-B as a formal method. It is suitable solution for un-experience in programming language and profession in mathematical modeling. Our proposal also integrates requirements, codes and verification in system development life cycle. We suggest also using event-B pattern. Our suggestion is classify into two cases, the algorithm case and the model case. The benefits of our proposal are reducing the prove effort, reusability, increasing the automation degree and generate high quality code. In this paper we applied and discussed the three phases of automatic code generation philosophy on two case studies the first is “minimum algorithm” and the second one is a model for ATM.

  14. Radiation transport phenomena and modeling. Part A: Codes; Part B: Applications with examples

    International Nuclear Information System (INIS)

    This report contains the notes from the second session of the 1997 IEEE Nuclear and Space Radiation Effects Conference Short Course on Applying Computer Simulation Tools to Radiation Effects Problems. Part A discusses the physical phenomena modeled in radiation transport codes and various types of algorithmic implementations. Part B gives examples of how these codes can be used to design experiments whose results can be easily analyzed and describes how to calculate quantities of interest for electronic devices

  15. A methodology for the analysis of protection against overpressure using the Ramona-3 B code

    International Nuclear Information System (INIS)

    A methodology to carry out the most severe overpressure transient that could happen at Laguna Verde Nuclear power Plant is presented, this study is a requirement as a part of the licensing analysis in a fuel reload. The analysis is put into effect with the Ramona 3-B code. The results are compared against the safety analysis report of the Laguna Verde Nuclear Power Plant. The aim of the analysis is to determine the maximum pressure reached on the reactor vessel during operational events, in order to demonstrate agreement with the ASME code for Containers and Pressure Vessels. (Author)

  16. 77 FR 5265 - Eastern Band of Cherokee Indians-Cherokee Code Chapter 18B, Regulation of Alcoholic Beverages

    Science.gov (United States)

    2012-02-02

    ... Bureau of Indian Affairs Eastern Band of Cherokee Indians--Cherokee Code Chapter 18B, Regulation of... publishes the Amendment to the Eastern Band of Cherokee Indians--Cherokee Code Chapter 18B, Regulation of... within the Eastern Band of Cherokee Indians' Reservation. This Ordinance will increase the ability of...

  17. Expression in bacteria of gB-glycoprotein-coding sequences of Herpes simplex virus type 2.

    Science.gov (United States)

    Person, S; Warner, S C; Bzik, D J; Debroy, C; Fox, B A

    1985-01-01

    A plasmid with an insert that encodes the glycoprotein B(gB) gene of Herpes simplex virus type 2 (HSV-2) has been isolated. DNA sequences coding for a portion of the HSV-2 gB peptide were cloned into a bacterial lacZ alpha expression vector and used to transform Escherichia coli. Upon induction of lacZpo-promoted transcription, some of the bacteria became filamentous and produced inclusion bodies containing a large amount of a 65-kDal peptide that was shown to be precipitated by broad-spectrum antibodies to HSV-2 and HSV-1. The HSV-2 insert of one of these clones specifies amino acid residues corresponding to 135 through 629 of the gB of HSV-1 [Bzik et al., Virology 133 (1984) 301-314]. PMID:2412940

  18. OPT13B and OPTIM4 - computer codes for optical model calculations

    International Nuclear Information System (INIS)

    OPT13B is a computer code in FORTRAN for optical model calculations with automatic search. A summary of different formulae used for computation is given. Numerical methods are discussed. The 'search' technique followed to obtain the set of optical model parameters which produce best fit to experimental data in a least-square sense is also discussed. Different subroutines of the program are briefly described. Input-output specifications are given in detail. A modified version of OPT13B specifications are given in detail. A modified version of OPT13B is OPTIM4. It can be used for optical model calculations where the form factors of different parts of the optical potential are known point by point. A brief description of the modifications is given. (author)

  19. Analysis Of Criticality Experiments Of Bandung Triga 2000 Reactor By Using MCNP-4B Code

    International Nuclear Information System (INIS)

    During the first core loading of Bandung TRIGA 2000 reactor, two kinds of criticality experiment have been conducted, i.e, sub critical core loading and critical core loading experiments. The purpose of the experiments is to maximize the utilization of the reactor as well as to provide benchmark data for neutronic computer codes. In the sub critical core loading experiment, the core is loaded up to 42 fuel elements ring D, 13 fuel elements in ring, D, 6 fuel elements and 3 graphite dummies in ring E, 2 fuel elements in ring B, 2 fuel elements in ring B, 1 fuel element in ring B. In the other case, during the critical loading experiment, the core is loaded following the loading pattern planned by General Atomics, i.e: 20 fuel elements in ring B, C and D plus 5 control rods in ring D, 11 fuel elements in ring D, 6 fuel elements and 3 graphite dummies in ring E, and then the core is loaded with additional fuel elements, step by step, until the core reached its first criticality, i.e., 55 fuel elements. Prior to conduct of criticality experiments MCNP-4B code is used to plan the fuel loading pattern of the sub critical loading experiment, i.e. to assure that the core is still in sub critical state with 42 fuel elements in the core. In the calculation is assumed that the mass of U-235 in each fuel element depends on the documented burnup data, the mass of U-238 is assumed to be the same as the one in fresh fuels. Furthermore, all fission patricides as well as poisonous materials in each fuel element are ignored. The experiment results showed that the calculations of MCNP-4B also predicted that TRIGA 2000 reactor with the above assumptions, is appropriate for predicting for predicting the neutronic characteristics of Bandung TRIGA 2000 reactor

  20. Over 10 dB Net Coding Gain Based on 20% Overhead Hard Decision Forward Error Correction in 100G Optical Communication Systems

    DEFF Research Database (Denmark)

    Li, Bomin; Larsen, Knud J.; Zibar, Darko;

    2011-01-01

    We propose a product code with shortened BCH component codes for 100G optical communication systems. Simulation result shows that 10 dB net coding gain is promising at post- FEC BER of 1E-15.......We propose a product code with shortened BCH component codes for 100G optical communication systems. Simulation result shows that 10 dB net coding gain is promising at post- FEC BER of 1E-15....

  1. User's manual for three dimensional FDTD version B code for scattering from frequency-dependent dielectric materials

    Science.gov (United States)

    Beggs, John H.; Luebbers, Raymond J.; Kunz, Karl S.

    1992-01-01

    The Penn State Finite Difference Time Domain Electromagnetic Code Version B is a three dimensional numerical electromagnetic scattering code based upon the Finite Difference Time Domain Technique (FDTD). The supplied version of the code is one version of our current three dimensional FDTD code set. This manual provides a description of the code and corresponding results for several scattering problems. The manual is organized into 14 sections: introduction, description of the FDTD method, operation, resource requirements, Version B code capabilities, a brief description of the default scattering geometry, a brief description of each subroutine, a description of the include file, a discussion of radar cross section computations, a discussion of some scattering results, a sample problem setup section, a new problem checklist, references and figure titles.

  2. Modeling cross-field drifts and current with the B2 code for the CIT divertor

    Energy Technology Data Exchange (ETDEWEB)

    Rognlien, T.D.; Milovich, J.L.; Rensink, M.E.

    1990-10-12

    We have modified the B2 edge-plasma code to include the effects of classical fluid drifts across the magnetic field lines and plasma currents. This report presents preliminary results of these effects for the CIT parameter regime. The basic plasma model described by Braams involves solving the continuity equation, the parallel momentum balance equation, and separate energy balance equations for the ions and the electrons. If multiple ion species are present, they are all assumed to have a common temperature, but their densities and parallel velocities are solved for using additional continuity and parallel momentum balance equations for each species. Momentum and heat transport parallel to the magnetic field, B, are given by the classical collisional theory. On the other hand, transport perpendicular to B is represented by anomalous diffusion coefficients which are adjusted to agree with experimental measurements. These transport coefficients are generally taken to be constant in radius and poloidal angle, although this is not necessary. The goal of our work has been to include both the classical cross-field drift terms and the effects of parallel currents in the equations used in the B2 code. The motivation for including the cross-field terms comes from simple model calculations which indicate that the classical flows can contribute an important asymmetry which may help explain the transition from L-mode to H-mode confinement. Radial electric fields which arise near the separatrix cause E {times} B poloidal rotation which may also be related to the L-to-H mode transition through its effect on edge turbulence. Including the parallel currents is done to provide a tool for understanding the biased divertor experiments on DIII-D at General Atomics. Such biasing may provide an effective means of controlling the asymmetry of the power flow to different divertor plates.

  3. Improved numerical grid generation techniques for the B2 edge plasma code

    International Nuclear Information System (INIS)

    Techniques used to generate grids for edge fluid codes such as B2 from numerically computed equilibria are discussed. Fully orthogonal, numerically derived grids closely resembling analytically prescribed meshes can be obtained. But, the details of the poloidal field can vary, yielding significantly different plasma parameters in the simulations. The magnitude of these differences is consistent with the predictions of an analytic model of the scrape-off layer. Both numerical and analytic grids are insensitive to changes in their defining parameters. Methods for implementing nonorthogonal boundaries in these meshes are also presented; they differ slightly from those required for fully orthogonal grids

  4. WASP-12b According to the Bayesian Atmospheric Radiative Transfer (BART) Code

    Science.gov (United States)

    Harrington, Joseph; Cubillos, Patricio E.; Blecic, Jasmina; Challener, Ryan C.; Rojo, Patricio M.; Lust, Nate B.; Bowman, M. Oliver; Blumenthal, Sarah D.; Foster, Andrew SD; Foster, A. J.

    2015-11-01

    We present the Bayesian Atmospheric Radiative Transfer (BART) code for atmospheric property retrievals from transit and eclipse spectra, and apply it to WASP-12b, a hot (~3000 K) exoplanet with a high eclipse signal-to-noise ratio. WASP-12b has been controversial. We (Madhusudhan et al. 2011, Nature) claimed it was the first planet with a high C/O abundance ratio. Line et al. (2014, ApJ) suggested a high CO2 abundance to explain the data. Stevenson et al. (2014, ApJ, atmospheric model by Madhusudhan) add additional data and reaffirm the original result, stating that C2H2 and HCN, not included in the Line et al. models, explain the data. We explore several modeling configurations and include Hubble, Spitzer, and ground-based eclipse data.BART consists of a differential-evolution Markov-Chain Monte Carlo sampler that drives a line-by-line radiative transfer code through the phase space of thermal- and abundance-profile parameters. BART is written in Python and C. Python modules generate atmospheric profiles from sets of MCMC parameters and integrate the resulting spectra over observational bandpasses, allowing high flexibility in modeling the planet without interacting with the fast, C portions that calculate the spectra. BART's shared memory and optimized opacity calculation allow it to run on a laptop, enabling classroom use. Runs can scale constant abundance profiles, profiles of thermochemical equilibrium abundances (TEA) calculated by the included TEA code, or arbitrary curves. Several thermal profile parameterizations are available. BART is an open-source, reproducible-research code. Users must release any code or data modifications if they publish results from it, and we encourage the community to use it and to participate in its development via http://github.com/ExOSPORTS/BART.This work was supported by NASA Planetary Atmospheres grant NNX12AI69G and NASA Astrophysics Data Analysis Program grant NNX13AF38G. J. Blecic holds a NASA Earth and Space Science

  5. A Random Walk on WASP-12b with the Bayesian Atmospheric Radiative Transfer (BART) Code

    Science.gov (United States)

    Harrington, Joseph; Cubillos, Patricio; Blecic, Jasmina; Challener, Ryan; Rojo, Patricio; Lust, Nathaniel B.; Bowman, Oliver; Blumenthal, Sarah D.; Foster, Andrew S. D.; Foster, Austin James; Stemm, Madison; Bruce, Dylan

    2016-01-01

    We present the Bayesian Atmospheric Radiative Transfer (BART) code for atmospheric property retrievals from transit and eclipse spectra, and apply it to WASP-12b, a hot (~3000 K) exoplanet with a high eclipse signal-to-noise ratio. WASP-12b has been controversial. We (Madhusudhan et al. 2011, Nature) claimed it was the first planet with a high C/O abundance ratio. Line et al. (2014, ApJ) suggested a high CO2 abundance to explain the data. Stevenson et al. (2014, ApJ, atmospheric model by Madhusudhan) add additional data and reaffirm the original result, stating that C2H2 and HCN, not included in the Line et al. models, explain the data. We explore several modeling configurations and include Hubble, Spitzer, and ground-based eclipse data.BART consists of a differential-evolution Markov-Chain Monte Carlo sampler that drives a line-by-line radiative transfer code through the phase space of thermal- and abundance-profile parameters. BART is written in Python and C. Python modules generate atmospheric profiles from sets of MCMC parameters and integrate the resulting spectra over observational bandpasses, allowing high flexibility in modeling the planet without interacting with the fast, C portions that calculate the spectra. BART's shared memory and optimized opacity calculation allow it to run on a laptop, enabling classroom use. Runs can scale constant abundance profiles, profiles of thermochemical equilibrium abundances (TEA) calculated by the included TEA code, or arbitrary curves. Several thermal profile parameterizations are available. BART is an open-source, reproducible-research code. Users must release any code or data modifications if they publish results from it, and we encourage the community to use it and to participate in its development via http://github.com/ExOSPORTS/BART.This work was supported by NASA Planetary Atmospheres grant NNX12AI69G and NASA Astrophysics Data Analysis Program grant NNX13AF38G. J. Blecic holds a NASA Earth and Space Science

  6. RAMONA-4B a computer code with three-dimensional neutron kinetics for BWR and SBWR system transient - user's manual

    International Nuclear Information System (INIS)

    This document is the User's Manual for the Boiling Water Reactor (BWR), and Simplified Boiling Water Reactor (SBWR) systems transient code RAMONA-4B. The code uses a three-dimensional neutron-kinetics model coupled with a multichannel, nonequilibrium, drift-flux, phase-flow model of the thermal hydraulics of the reactor vessel. The code is designed to analyze a wide spectrum of BWR core and system transients. Chapter 1 gives an overview of the code's capabilities and limitations; Chapter 2 describes the code's structure, lists major subroutines, and discusses the computer requirements. Chapter 3 is on code, auxillary codes, and instructions for running RAMONA-4B on Sun SPARC and IBM Workstations. Chapter 4 contains component descriptions and detailed card-by-card input instructions. Chapter 5 provides samples of the tabulated output for the steady-state and transient calculations and discusses the plotting procedures for the steady-state and transient calculations. Three appendices contain important user and programmer information: lists of plot variables (Appendix A) listings of input deck for sample problem (Appendix B), and a description of the plotting program PAD (Appendix C). 24 refs., 18 figs., 11 tabs

  7. A code to process photonic production data under ENDF/B format

    International Nuclear Information System (INIS)

    The code EVGRP has been written to process the ENDF/B IV photonic production data. It may be used to: 1) generate, for a given set of materials and gamma producing reactions, the photo-production cross section for each reaction. 2) Calculate, for a material or a mixture of materials: the neutron-gamma group photo-production cross sections for a given reactions set; for each neutron group, the mean number of photons produced, in each gamma group, by a neutron interaction inducing the given photo-production reactions and the other possible reactions; for each neutron group, the photon mean number produced, in each gamma group, by any neutron interaction with the target; for each neutron group, the relative abundance, in the corresponding gamma group, of each produced gamma ray. This code, working on 7600 CDC, processes all the specified options of the 12 (multiplicities), 13 (photo production cross sections) and 15 (gamma continuous spectra) ENDF files and gives the results under an ENDF type format

  8. Globus-M plasma edge modeling with B2SOLPS5.2 code

    Science.gov (United States)

    Vekshina, E.; Senichenkov, I.; Rozhansky, V.; Kaveeva, E.; Khromov, N.; Kurskiev, G.; Patrov, M.; Globus-M team

    2016-08-01

    The edge plasma of five Globus-M discharges was modeled by the B2SOLPS5.2 code. Plasma current varied in 114–198 kA range, and all discharges were in the H-mode. The modeled scrape-off layer (SOL) width appeared to be inversely proportional to the plasma current. Such a relation is observed in many other tokamaks. Heat flux to the outer divertor target and radiation power was examined for these discharges. Radiation was found to be responsible for 40% of the energy loss. Energy flux to the low outer divertor target was about 1/3 of the energy loss in the single-null low X-point discharges.

  9. Development of a graphic interface for the Ramona-3B code

    International Nuclear Information System (INIS)

    In this work a graphic interface that interprets the data of the Ramona-3B code is presented. The Ramona-3B code it is a computer program, that it uses text files as input and its generate output also of this type. The quantity of generated information is so big that always it is necessary to process this information with graphic tools to be able to analyze the results of the simulations of nuclear centrals with boiling water reactors. When having a modern tool that it translates text in graphics in an automatic way and that it is of great versatility, one can obtain a graphic interface that facilitates the interpretation of how a BWR nuclear plant behaves. To achieve this tool the key it has been a program that it reads chains of previously indicated characters that keeps the data in a file for later to manipulate them in the creation of the graphic interface. It is used a software of easy access that resists the processing of a great one quantity of data and that later its have been able to graph. Another important function of this interface it is allowing the modification of the input file for Ramona using graphic unfolding and helps in it lines without necessarily to go to the file with input data. For the design of graphic interface it was decided first to show the more representative variables of a BWR type nuclear plant. It is used Mat lab as platform on several options, as PHP, Lab view or C'. The obtained graphs allow monitoring the plant and to have the control of selected variables. For the graphic interface only is necessary to indicate it the variable to simulate for to be able to interpret graphically the behavior of the BWR type nuclear plant. This tool is of great utility for the teaching of students that they are interested in this type of nuclear topics. (Author)

  10. Description and assessment of RAMONA-3B Mod. 0 Cycle 4: a computer code with three-dimensional neutron kinetics for BWR system transients

    Energy Technology Data Exchange (ETDEWEB)

    Wulff, W; Cheng, H S; Diamond, D J; Khatib-Rahbar, M

    1984-01-01

    This report documents the physical models and the numerical methods employed in the BWR systems code RAMONA-3B. The RAMONA-3B code simulates three-dimensional neutron kinetics and multichannel core hydraulics of nonhomogeneous, nonequilibrium two-phase flows. RAMONA-3B is programmed to calculate the steady and transient conditions in the main steam supply system for normal and abnormal operational transients, including the performances of plant control and protection systems. Presented are code capabilities and limitations, models and solution techniques, the results of development code assessment and suggestions for improving the code in the future.

  11. Description and assessment of RAMONA-3B Mod.0 Cycle 4: a computer code with three-dimensional neutron kinetics for BWR system transients

    International Nuclear Information System (INIS)

    This report documents the physical models and the numerical methods employed in the BWR systems code RAMONA-3B. The RAMONA-3B code simulates three-dimensional neutron kinetics and multichannel core hydraulics of nonhomogeneous, nonequilibrium two-phase flows. RAMONA-3B is programmed to calculate the steady and transient conditions in the main steam supply system for normal and abnormal operational transients, including the performances of plant control and protection systems. Presented are code capabilities and limitations, models and solution techniques, the results of development code assessment and suggestions for improving the code in the future

  12. Numerical study of the ITER divertor plasma with the B2-EIRENE code package

    Energy Technology Data Exchange (ETDEWEB)

    Kotov, V.; Reiter, D. [Forschungszentrum Juelich (DE). Inst. fuer Energieforschung (IEF), Plasmaphysik (IEF-4); Kukushkin, A.S. [ITER International Team, Cadarache (France)

    2007-11-15

    The problem of plasma-wall interaction and impurity control is one of the remaining critical issues for development of an industrial energy source based on nuclear fusion of light isotopes. In this field sophisticated integrated numerical tools are widely used both for the analysis of current experiments and for predictions guiding future device design. The present work is dedicated to the numerical modelling of the edge plasma region in divertor configurations of large-scale tokamak fusion devices. A well established software tool for this kind of modelling is the B2-EIRENE code. It was originally developed for a relatively hot (>> 10 eV) ''high recycling divertor''. It did not take into account a number of physical effects which can be potentially important for ''detached conditions'' (cold, - several eV, - high density, - {approx} 10{sup 21} m{sup -3}, - plasma) typical for large tokamak devices. This is especially critical for the modelling of the divertor plasma of ITER: an international project of an experimental tokamak fusion reactor to be built in Cadarache, France by 2016. This present work is devoted to a major upgrade of the B2-EIRENE package, which is routinely used for ITER modelling, essentially with a significantly revised version of EIRENE: the Monte-Carlo neutral transport code. The main part of the thesis address three major groups of the new physical effects which have been added to the model in frame of this work: the neutral-neutral collisions, the up-to date hydrogen molecular reaction kinetics and the line radiation transport. The impact of the each stage of the upgrade on the self-consistent (between plasma, the neutral gas and the radiation field) solution for the reference ITER case is analysed. The strongest effect is found to be due to the revised molecular collision kinetics, in particular due to hitherto neglected elastic collisions of hydrogen molecules with ions. The newly added non

  13. Radiation field characterization of a BNCT research facility using Monte Carlo method - code MCNP-4B

    International Nuclear Information System (INIS)

    Boron Neutron Capture Therapy - BNCT - is a selective cancer treatment and arises as an alternative therapy to treat cancer when usual techniques - surgery, chemotherapy or radiotherapy - show no satisfactory results. The main proposal of this work is to project a facility to BNCT studies. This facility relies on the use of an Am Be neutron source and on a set of moderators, filters and shielding which will provide the best neutron/gamma beam characteristic for these Becton studies, i.e., high intensity thermal and/or epithermal neutron fluxes and with the minimum feasible gamma rays and fast neutrons contaminants. A computational model of the experiment was used to obtain the radiation field in the sample irradiation position. The calculations have been performed with the MCNP 4B Monte Carlo Code and the results obtained can be regarded as satisfactory, i.e., a thermal neutron fluencyNT = 1,35x108 n/cm , a fast neutron dose of 5,86x10-10 Gy/NT and a gamma ray dose of 8,30x10-14 Gy/NT. (author)

  14. ETOP 14, a FORTRAN code to process ENDF/B data into the 68-group PHROG library format

    Energy Technology Data Exchange (ETDEWEB)

    Grimesey, R.A.; Singer, G.L.; Millsap, D.A.

    1976-07-01

    ETOP 14 processes neutron cross section data from the ENDF/B format to the 68-group PHROG fast spectrum code. Major changes have accompanied modifications in the ENDF/B format and modifications to the PHROG code necessitated by changes in the ENDF/B format. A large number of program changes have been made to increase the program's efficiency and accuracy in treating specific cross sections. The present version of the program will process all Version 4 ENDF/B formats except the Adler-Adler multilevel resonance formula. ETOP 14 calculates infinitely dilute capture and fission cross sections and an infinitely dilute elastic scattering matrix for these materials over the resonance range. This limitation will be corrected in the near future. Some reaction cross sections which are only prominent above 10 MeV are ignored by ETOP 14. The code in its present form can be easily extended above 10 MeV. The maximum number of multigroups permitted is 99 even though the PHROG library is presently limited to 68 quarter lethargy groups. The present report assumes a complete familiarity with the ENDF/B format.

  15. RAMONA-4B a computer code with three-dimensional neutron kinetics for BWR and SBWR system transient - models and correlations

    Energy Technology Data Exchange (ETDEWEB)

    Rohatgi, U.S.; Cheng, H.S.; Khan, H.J.; Mallen, A.N.; Neymotin, L.Y.

    1998-03-01

    This document describes the major modifications and improvements made to the modeling of the RAMONA-3B/MOD0 code since 1981, when the code description and assessment report was completed. The new version of the code is RAMONA-4B. RAMONA-4B is a systems transient code for application to different versions of Boiling Water Reactors (BWR) such as the current BWR, the Advanced Boiling Water Reactor (ABWR), and the Simplified Boiling Water Reactor (SBWR). This code uses a three-dimensional neutron kinetics model coupled with a multichannel, non-equilibrium, drift-flux, two-phase flow formulation of the thermal hydraulics of the reactor vessel. The code is designed to analyze a wide spectrum of BWR core and system transients and instability issues. Chapter 1 is an overview of the code`s capabilities and limitations; Chapter 2 discusses the neutron kinetics modeling and the implementation of reactivity edits. Chapter 3 is an overview of the heat conduction calculations. Chapter 4 presents modifications to the thermal-hydraulics model of the vessel, recirculation loop, steam separators, boron transport, and SBWR specific components. Chapter 5 describes modeling of the plant control and safety systems. Chapter 6 presents and modeling of Balance of Plant (BOP). Chapter 7 describes the mechanistic containment model in the code. The content of this report is complementary to the RAMONA-3B code description and assessment document. 53 refs., 81 figs., 13 tabs.

  16. RAMONA-4B a computer code with three-dimensional neutron kinetics for BWR and SBWR system transient - models and correlations

    International Nuclear Information System (INIS)

    This document describes the major modifications and improvements made to the modeling of the RAMONA-3B/MOD0 code since 1981, when the code description and assessment report was completed. The new version of the code is RAMONA-4B. RAMONA-4B is a systems transient code for application to different versions of Boiling Water Reactors (BWR) such as the current BWR, the Advanced Boiling Water Reactor (ABWR), and the Simplified Boiling Water Reactor (SBWR). This code uses a three-dimensional neutron kinetics model coupled with a multichannel, non-equilibrium, drift-flux, two-phase flow formulation of the thermal hydraulics of the reactor vessel. The code is designed to analyze a wide spectrum of BWR core and system transients and instability issues. Chapter 1 is an overview of the code's capabilities and limitations; Chapter 2 discusses the neutron kinetics modeling and the implementation of reactivity edits. Chapter 3 is an overview of the heat conduction calculations. Chapter 4 presents modifications to the thermal-hydraulics model of the vessel, recirculation loop, steam separators, boron transport, and SBWR specific components. Chapter 5 describes modeling of the plant control and safety systems. Chapter 6 presents and modeling of Balance of Plant (BOP). Chapter 7 describes the mechanistic containment model in the code. The content of this report is complementary to the RAMONA-3B code description and assessment document. 53 refs., 81 figs., 13 tabs

  17. RAMONA-4B a computer code with three-dimensional neutron kinetics for BWR and SBWR system transient - user`s manual

    Energy Technology Data Exchange (ETDEWEB)

    Rohatgi, U.S.; Cheng, H.S.; Khan, H.J.; Mallen, A.N.; Neymotin, L.Y.

    1998-03-01

    This document is the User`s Manual for the Boiling Water Reactor (BWR), and Simplified Boiling Water Reactor (SBWR) systems transient code RAMONA-4B. The code uses a three-dimensional neutron-kinetics model coupled with a multichannel, nonequilibrium, drift-flux, phase-flow model of the thermal hydraulics of the reactor vessel. The code is designed to analyze a wide spectrum of BWR core and system transients. Chapter 1 gives an overview of the code`s capabilities and limitations; Chapter 2 describes the code`s structure, lists major subroutines, and discusses the computer requirements. Chapter 3 is on code, auxillary codes, and instructions for running RAMONA-4B on Sun SPARC and IBM Workstations. Chapter 4 contains component descriptions and detailed card-by-card input instructions. Chapter 5 provides samples of the tabulated output for the steady-state and transient calculations and discusses the plotting procedures for the steady-state and transient calculations. Three appendices contain important user and programmer information: lists of plot variables (Appendix A) listings of input deck for sample problem (Appendix B), and a description of the plotting program PAD (Appendix C). 24 refs., 18 figs., 11 tabs.

  18. Method to generate the first design of the reload pattern to be used with the Presto-B code in the simulation of the CNLV U-1 reactor

    International Nuclear Information System (INIS)

    This guide is applied for the reload pattern's formation for mirror symmetry of a core room and in accordance with the Control Cell core technique (of the english Control Cell Core - CCC) for the PRESTO-B code. (Author)

  19. BRAF activated non-coding RNA (BANCR) promoting gastric cancer cells proliferation via regulation of NF-κB1

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Zhi-Xin; Liu, Zhi-Qiang; Jiang, Biao; Lu, Xin-Yang; Ning, Xiao-Fei [Department of Gastrointestinal Surgery, Affiliated Hospital of Jining Medical University, Jining 272029 (China); Yuan, Chuan-Tao [Department of Pathology, Affiliated Hospital of Jining Medical University, Jining 272029 (China); Wang, Ai-Liang, E-mail: wang_ailiang@126.com [Department of Gastrointestinal Surgery, Affiliated Hospital of Jining Medical University, Jining 272029 (China)

    2015-09-18

    Background and objective: Long non-coding RNA, BANCR, has been demonstrated to contribute to the proliferation and migration of tumors. However, its molecular mechanism underlying gastric cancer is still unknown. In present study, we investigated whether BANCR was involved in the development of gastric cancer cells via regulation of NF-κB1. Methods: Human gastric cancer tissues were isolated as well as human gastric cell lines MGC803 and BGC823 were cultured to investigate the role of BANCR in gastric cancer. Results: BANCR expression was significantly up-regulated in gastric tumor tissues and gastric cell lines. Down-regulation of BANCR inhibited gastric cancer cell growth and promoted cell apoptosis, and it also contributed to a significant decrease of NF-κB1 (P50/105) expression and 3′UTR of NF-κB1 activity. Overexpression of NF-κB1 reversed the effect of BANCR on cancer cell growth and apoptosis. MiroRNA-9 (miR-9) targeted NF-κB1, and miR-9 inhibitor also reversed the effects of BANCR on gastric cancer cell growth and apoptosis. Conclusion: BANCR was highly expressed both in gastric tumor tissues and in cancer cells. NF-κB1 and miR-9 were involved in the role of BANCR in gastric cancer cell growth and apoptosis. - Highlights: • BANCR up-regulated in gastric cancer (GC) tissues and cell lines MGC803 and BGC823. • Down-regulation of BANCR inhibited GC cell growth and promoted cell apoptosis. • Down-regulation of BANCR contributed to decreased 3′UTR of NF-κB1 and its expression. • Overexpressed NF-κB1 reversed the effect of BANCR on GC cell growth. • miR-9 inhibitor reversed the effect of BANCR on cancer GC cell growth.

  20. ANGRA-1 neutron kinetics model at BOL using WIMSD-5B and PARCS V2.7 codes

    Energy Technology Data Exchange (ETDEWEB)

    Hamers, Adolfo R.; Reis, Patricia A.L.; Rodrigues, Thiago D.A.; Pereira, Claubia; Costa, Antonella L., E-mail: adolforomerohamers@hotmail.com, E-mail: patricialire@yahoo.com.br, E-mail: claubia@nuclear.ufmg.br, E-mail: antonella@nuclear.ufmg.br [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte (Brazil). Departamento de Engenheria Nuclear; Miro, R.; Verdu, G., E-mail: rmiro@iqn.upv.es, E-mail: gverdu@iqn.upv.es [Universitat Politecnica de Valencia (Spain)

    2015-07-01

    A steady-state neutron kinetics model of the Angra-1 NPP at BOL (Beginning Of Life) has been developed with the PARCS V2.7 neutron diffusion code. The information of the burnable poison rods, fuel enrichments and control rod banks distributions within the core have been taken from the Angra-1 FSAR (Final Safety Analysis Report) and implemented in the model. The macroscopic cross sections for the fast and thermal neutron groups have been calculated with the WIMSD-5B lattice cell code. The cross sections were obtained for the rodded and unrodded cases for each composition in the core. In order to establish the initial steady-state, an eigenvalue was made with the PARCS V2.7 code for three steady-state scenario cases reported at the FSAR; a K{sub eff} of 1.0733 was obtained for the unrodded case, K{sub eff} of 1.0718 for a 24% of bank D inserted case and K{sub eff} of 0.8512 for the full rodded case. The normalized core power density distributions were obtained and compared with the corresponding FSAR case. (author)

  1. Expression of I-A and I-E,C region-coded Ia antigens on functional B cell subpopulations.

    Science.gov (United States)

    Frelinger, J A; Hibbler, F J; Hill, S W

    1978-12-01

    Ia antigens from specific subregions have been examined on functional B cell populations. Expression of both I-A and I-E,C region antigens was demonstrated on cells required for both lipopolysaccharide mitogenesis and polyclonal activation. Similar I-A and I-E,C subregion expression was found on cells required for response to the T-independent antigen, polyvinylpyrrolidone. TNP-specific IgM and hen egg lysozyme-specific IgG plaque-forming cells also express I-A and I-E,C region antigens. No evidence was found for an Ia- population responsive in the systems tested. Further, no evidence of preferential expression of I-A or I-E,C region antigens was observed in any system examined. Therefore, it appears that B cells express both I-A and I-E,C region-coded Ia antigens.

  2. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  3. Bayesian Atmospheric Radiative Transfer (BART) Code and Application to WASP-43b

    Science.gov (United States)

    Blecic, Jasmina; Harrington, Joseph; Cubillos, Patricio; Bowman, Oliver; Rojo, Patricio; Stemm, Madison; Lust, Nathaniel B.; Challener, Ryan; Foster, Austin James; Foster, Andrew S.; Blumenthal, Sarah D.; Bruce, Dylan

    2016-01-01

    We present a new open-source Bayesian radiative-transfer framework, Bayesian Atmospheric Radiative Transfer (BART, https://github.com/exosports/BART), and its application to WASP-43b. BART initializes a model for the atmospheric retrieval calculation, generates thousands of theoretical model spectra using parametrized pressure and temperature profiles and line-by-line radiative-transfer calculation, and employs a statistical package to compare the models with the observations. It consists of three self-sufficient modules available to the community under the reproducible-research license, the Thermochemical Equilibrium Abundances module (TEA, https://github.com/dzesmin/TEA, Blecic et al. 2015}, the radiative-transfer module (Transit, https://github.com/exosports/transit), and the Multi-core Markov-chain Monte Carlo statistical module (MCcubed, https://github.com/pcubillos/MCcubed, Cubillos et al. 2015). We applied BART on all available WASP-43b secondary eclipse data from the space- and ground-based observations constraining the temperature-pressure profile and molecular abundances of the dayside atmosphere of WASP-43b. This work was supported by NASA Planetary Atmospheres grant NNX12AI69G and NASA Astrophysics Data Analysis Program grant NNX13AF38G. JB holds a NASA Earth and Space Science Fellowship.

  4. Human SHBG mRNA translation is modulated by alternative 5'-non-coding exons 1A and 1B.

    Directory of Open Access Journals (Sweden)

    Tomàs Pinós

    Full Text Available BACKGROUND: The human sex hormone-binding globulin (SHBG gene comprises at least 6 different transcription units (TU-1, -1A, -1B, -1C, -1D and -1E, and is regulated by no less than 6 different promoters. The best characterized are TU-1 and TU-1A: TU-1 is responsible for producing plasma SHBG, while TU-1A is transcribed and translated in the testis. Transcription of the recently described TU-1B, -1C, and -1D has been demonstrated in human prostate tissue and prostate cancer cell lines, as well as in other human cell lines such as HeLa, HepG2, HeK 293, CW 9019 and imr 32. However, there are no reported data demonstrating their translation. In the present study, we aimed to determine whether TU-1A and TU-1B are indeed translated in the human prostate and whether 5' UTR exons 1A and 1B differently regulate SHBG translation. RESULTS: Cis-regulatory elements that could potentially regulate translation were identified within the 5'UTRs of SHBG TU-1A and TU-1B. Although full-length SHBG TU-1A and TU-1B mRNAs were present in prostate cancer cell lines, the endogenous SHBG protein was not detected by western blot in any of them. LNCaP prostate cancer cells transfected with several SHBG constructs containing exons 2 to 8 but lacking the 5'UTR sequence did show SHBG translation, whereas inclusion of the 5'UTR sequences of either exon 1A or 1B caused a dramatic decrease in SHBG protein levels. The molecular weight of SHBG did not vary between cells transfected with constructs with or without the 5'UTR sequence, thus confirming that the first in-frame ATG of exon 2 is the translation start site of TU-1A and TU-1B. CONCLUSIONS: The use of alternative SHBG first exons 1A and 1B differentially inhibits translation from the ATG situated in exon 2, which codes for methionine 30 of transcripts that begin with the exon 1 sequence.

  5. Transport simulations of linear plasma generators with the B2.5-Eirene and EMC3-Eirene codes

    Energy Technology Data Exchange (ETDEWEB)

    Rapp, J., E-mail: rappj@ornl.gov [Oak Ridge National Laboratory, Oak Ridge, TN 37830 (United States); Owen, L.W. [Oak Ridge National Laboratory, Oak Ridge, TN 37830 (United States); Bonnin, X. [LSPM-CNRS, Université Paris 13, Sorbonne Paris Cité, F-93430 Villetaneuse (France); Caneses, J.F. [PRL, Research School of Physics and Engineering, ANU, Canberra (Australia); Canik, J.M. [Oak Ridge National Laboratory, Oak Ridge, TN 37830 (United States); Corr, C. [PRL, Research School of Physics and Engineering, ANU, Canberra (Australia); Lore, J.D. [Oak Ridge National Laboratory, Oak Ridge, TN 37830 (United States)

    2015-08-15

    Linear plasma generators are cost effective facilities to simulate divertor plasma conditions of present and future fusion reactors. The codes B2.5-Eirene and EMC3-Eirene were extensively used for design studies of the planned Material Plasma Exposure eXperiment (MPEX). Effects on the target plasma of the gas fueling and pumping locations, heating power, device length, magnetic configuration and transport model were studied with B2.5-Eirene. Effects of tilted or vertical targets were calculated with EMC3-Eirene and showed that spreading the incident flux over a larger area leads to lower density, higher temperature and off-axis profile peaking in front of the target. The simulations indicate that with sufficient heating power MPEX can reach target plasma conditions that are similar to those expected in the ITER divertor. B2.5-Eirene simulations of the MAGPIE experiment have been carried out in order to establish an additional benchmark with experimental data from a linear device with helicon wave heating.

  6. Development of a graphic interface for the Ramona-3B code; Desarrollo de una interfaz grafica para el codigo Ramona-3B

    Energy Technology Data Exchange (ETDEWEB)

    Maldonado D, D.; Santos O, M.A. [Laboratorio de Analisis de Ingenieria de Reactores Nucleares, Paseo Cuauhnahuac 8532, Jiutepec, Morelos (Mexico)]. e-mail: chalismx@hotmail.com

    2003-07-01

    In this work a graphic interface that interprets the data of the Ramona-3B code is presented. The Ramona-3B code it is a computer program, that it uses text files as input and its generate output also of this type. The quantity of generated information is so big that always it is necessary to process this information with graphic tools to be able to analyze the results of the simulations of nuclear centrals with boiling water reactors. When having a modern tool that it translates text in graphics in an automatic way and that it is of great versatility, one can obtain a graphic interface that facilitates the interpretation of how a BWR nuclear plant behaves. To achieve this tool the key it has been a program that it reads chains of previously indicated characters that keeps the data in a file for later to manipulate them in the creation of the graphic interface. It is used a software of easy access that resists the processing of a great one quantity of data and that later its have been able to graph. Another important function of this interface it is allowing the modification of the input file for Ramona using graphic unfolding and helps in it lines without necessarily to go to the file with input data. For the design of graphic interface it was decided first to show the more representative variables of a BWR type nuclear plant. It is used Mat lab as platform on several options, as PHP, Lab view or C{sup '}. The obtained graphs allow monitoring the plant and to have the control of selected variables. For the graphic interface only is necessary to indicate it the variable to simulate for to be able to interpret graphically the behavior of the BWR type nuclear plant. This tool is of great utility for the teaching of students that they are interested in this type of nuclear topics. (Author)

  7. Effect on code predictions by changing the code version of Relap5 on SBLOCA for Test 9.1B in BETHSY test facility

    Energy Technology Data Exchange (ETDEWEB)

    Dubey, S.K.; Gupta, S.K. [SADD, Atomic Energy Regulatory Board, Anushaktinagar, Mumbai (India); Petruzzi, A.; Giannotti, W.; D' Auria, F. [Pisa Univ., DIMNP (Italy)

    2007-07-01

    This paper deals with the use of the new version of Relap-5 code on Sbloca (small break loss of coolant accident) for test 9.1 in the Bethsy integral test facility. In this analysis an updated version of the best estimate code Relap5/mod.3.3 has been used. In this code options are available for critical flow at the junction, modified Henry Fauske model (with only one discharge coefficient and thermal non equilibrium constant), and original model (with sub-cooled, two-phase and superheated discharge coefficient). Post test analyses have been carried out. This analysis has been carried out with all the procedure lead by Uncertainty Methodology based on Accuracy Extrapolation (UMAE). In order to achieve a qualified test facility nodalization both 'steady state level' and 'on transient level' qualifications are demonstrated. It is concluded that overall qualitative and quantitative accuracy of code prediction (mod.3.3) are acceptable as per UMAE. However noticeable effect of change of version of code has been observed from mod.2 to mod.3.3. Discharge coefficient for the modified Henry Fauske model is very sensitive for the break modeling point of view. The thermal non equilibrium constant for break discharge modeling is not having much effect on the analysis results. Especially when the core is refilled, code under-predicts the break flow and integral break flow consequently code over-predicts primary mass inventory. It is found that with the same input deck all the significant events and phenomena for the mod.3.3 occurring about 600 s earlier with compare to mod.2 calculation. Up to refilling of core, time sequence of the entire significant events is after the experiments in mod.2 calculation whereas in mod.3.3 it is before the experimental value. With this new version of code a better prediction for clad temperature during dry out has been observed. In both version of code prediction of results are poor for the last 2500 s of transients this may

  8. Effect on code predictions by changing the code version of Relap5 on SBLOCA for Test 9.1B in BETHSY test facility

    International Nuclear Information System (INIS)

    This paper deals with the use of the new version of Relap-5 code on Sbloca (small break loss of coolant accident) for test 9.1 in the Bethsy integral test facility. In this analysis an updated version of the best estimate code Relap5/mod.3.3 has been used. In this code options are available for critical flow at the junction, modified Henry Fauske model (with only one discharge coefficient and thermal non equilibrium constant), and original model (with sub-cooled, two-phase and superheated discharge coefficient). Post test analyses have been carried out. This analysis has been carried out with all the procedure lead by Uncertainty Methodology based on Accuracy Extrapolation (UMAE). In order to achieve a qualified test facility nodalization both 'steady state level' and 'on transient level' qualifications are demonstrated. It is concluded that overall qualitative and quantitative accuracy of code prediction (mod.3.3) are acceptable as per UMAE. However noticeable effect of change of version of code has been observed from mod.2 to mod.3.3. Discharge coefficient for the modified Henry Fauske model is very sensitive for the break modeling point of view. The thermal non equilibrium constant for break discharge modeling is not having much effect on the analysis results. Especially when the core is refilled, code under-predicts the break flow and integral break flow consequently code over-predicts primary mass inventory. It is found that with the same input deck all the significant events and phenomena for the mod.3.3 occurring about 600 s earlier with compare to mod.2 calculation. Up to refilling of core, time sequence of the entire significant events is after the experiments in mod.2 calculation whereas in mod.3.3 it is before the experimental value. With this new version of code a better prediction for clad temperature during dry out has been observed. In both version of code prediction of results are poor for the last 2500 s of transients this may be due to large

  9. Validation study of the reactor physics lattice transport code WIMSD-5B by TRX and BAPL critical experiments of light water reactors

    International Nuclear Information System (INIS)

    Highlights: • To validate the reactor physics lattice code WIMSD-5B by this analysis. • To model TRX and BAPL critical experiments using WIMSD-5B. • To compare the calculated results with experiment and MCNP results. • To rely on WIMSD-5B code for TRIGA calculations. - Abstract: The aim of this analysis is to validate the reactor physics lattice transport code WIMSD-5B by TRX (thermal reactor-one region lattice) and BAPL (Bettis Atomic Power Laboratory-one region lattice) critical experiments of light water reactors for neutronics analysis of 3 MW TRIGA Mark-II research reactor at AERE, Dhaka, Bangladesh. This analysis is achieved through the analysis of integral parameters of five light water reactor critical experiments TRX-1, TRX-2, BAPL-UO2-1, BAPL-UO2-2 and BAPL-UO2-3 based on evaluated nuclear data libraries JEFF-3.1 and ENDF/B-VII.1. In integral measurements, these experiments are considered as standard benchmark lattices for validating the reactor physics lattice transport code WIMSD-5B as well as evaluated nuclear data libraries. The integral parameters of the said critical experiments are calculated using the reactor physics lattice transport code WIMSD-5B. The calculated integral parameters are compared to the measured values as well as the earlier published MCNP results based on the Chinese evaluated nuclear data library CENDL-3.0 for assessment of deterministic calculation. It was found that the calculated integral parameters give mostly reasonable and globally consistent results with the experiment and the MCNP results. Besides, the group constants in WIMS format for the isotopes U-235 and U-238 between two data files have been compared using WIMS library utility code WILLIE and it was found that the group constants are well consistent with each other. Therefore, this analysis reveals the validation study of the reactor physics lattice transport code WIMSD-5B based on JEFF-3.1 and ENDF/B-VII.1 libraries and can also be essential to execute

  10. Long non-coding RNA profiling of human lymphoid progenitor cells reveals transcriptional divergence of B cell and T cell lineages.

    Science.gov (United States)

    Casero, David; Sandoval, Salemiz; Seet, Christopher S; Scholes, Jessica; Zhu, Yuhua; Ha, Vi Luan; Luong, Annie; Parekh, Chintan; Crooks, Gay M

    2015-12-01

    To elucidate the transcriptional 'landscape' that regulates human lymphoid commitment during postnatal life, we used RNA sequencing to assemble the long non-coding transcriptome across human bone marrow and thymic progenitor cells spanning the earliest stages of B lymphoid and T lymphoid specification. Over 3,000 genes encoding previously unknown long non-coding RNAs (lncRNAs) were revealed through the analysis of these rare populations. Lymphoid commitment was characterized by lncRNA expression patterns that were highly stage specific and were more lineage specific than those of protein-coding genes. Protein-coding genes co-expressed with neighboring lncRNA genes showed enrichment for ontologies related to lymphoid differentiation. The exquisite cell-type specificity of global lncRNA expression patterns independently revealed new developmental relationships among the earliest progenitor cells in the human bone marrow and thymus.

  11. Mutation in the B chain coding region is associated with impaired proinsulin conversion in a family with hyperproinsulinemia

    International Nuclear Information System (INIS)

    A family has recently been described in which hyperproinsulinemia is inherited in an autosomal dominant pattern, suggesting a structural abnormality in the proinsulin molecule as the basis for this disorder. However, unlike two previous kindreds with a similar syndrome, the serum proinsulin-like material in this family did not appear to be an intermediate conversion product but instead behaved like normal human proinsulin by several criteria. To further characterize this disorder the authors isolated and sequenced the insulin gene of the propositus. Leukocyte DNA was cloned in λgt-WES and recombinants containing the two insulin alleles, λMD41 and λMD51, were isolated by plaque hybridization. DNA sequencing of λMD51 showed that it contained the normal coding sequence for human preproinsulin. Sequence analysis of λMD41, however, revealed a single nucleotide substitution in the codon for residue 10 of proinsulin (CAC → GAC) that predicts the exchange of aspartic acid for histidine in the insulin B chain region. This mutation was also found in an insulin allele cloned from a second affected family member (propositus's father). These results strongly implicate this mutation as the cause of the hyperproinsulinemia in this family. Inhibition of the conversion of proinsulin to insulin may be related to altered folding and/or self-association properties of the [Asp10]proinsulin

  12. Mutation in the B chain coding region is associated with impaired proinsulin conversion in a family with hyperproinsulinemia

    Energy Technology Data Exchange (ETDEWEB)

    Chan, S.J.; Seino, S.; Gruppuso, P.A.; Schwartz, R.; Steiner, D.F.

    1987-04-01

    A family has recently been described in which hyperproinsulinemia is inherited in an autosomal dominant pattern, suggesting a structural abnormality in the proinsulin molecule as the basis for this disorder. However, unlike two previous kindreds with a similar syndrome, the serum proinsulin-like material in this family did not appear to be an intermediate conversion product but instead behaved like normal human proinsulin by several criteria. To further characterize this disorder the authors isolated and sequenced the insulin gene of the propositus. Leukocyte DNA was cloned in lambdagt-WES and recombinants containing the two insulin alleles, lambdaMD41 and lambdaMD51, were isolated by plaque hybridization. DNA sequencing of lambdaMD51 showed that it contained the normal coding sequence for human preproinsulin. Sequence analysis of lambdaMD41, however, revealed a single nucleotide substitution in the codon for residue 10 of proinsulin (CAC ..-->.. GAC) that predicts the exchange of aspartic acid for histidine in the insulin B chain region. This mutation was also found in an insulin allele cloned from a second affected family member (propositus's father). These results strongly implicate this mutation as the cause of the hyperproinsulinemia in this family. Inhibition of the conversion of proinsulin to insulin may be related to altered folding and/or self-association properties of the (Asp/sup 10/)proinsulin.

  13. Post-test calculation of thermal-hydraulic behaviour in Demona experiment B3 with various computer codes used in EC Member States

    International Nuclear Information System (INIS)

    In 1986 the CEC sponsored a benchmark exercise on aerosol calculation based on the Demona B3 experiment. The results of this exercise were very sensitive to the calculation of energy and mass transfer between the phases. In view of the results of the study mentioned above, it had been decided to carry out a benchmark exercise for severe accident containment thermal-hydraulics codes. This exercise is based on experiment B3 in the Demona programme. The experiment B3 was a simulation of a late overpressure failure scenario in a PWR. The main objective of the benchmark exercise has been to assess the ability of the participating codes to predict atmosphere saturation levels and bulk condensation rates under conditions similar to those predicted to follow a severe accident in a PWR. Several research organizations of the Community member countries have participated at this benchmark exercise. The paper presents the comparison of the experimental results with the following calculated quantities: total system pressure, steam pressure, containment temperature, saturation ratio, steam condensation rate on walls and in the bulk volume, water mass in sump, sump temperature, heat transfer coefficient, steam mass flow rate and structural temperature for a real time period of up to 90 hours. The paper also presents the major conclusions from the exercise in order to identify the status of present codes versus the requirements needed as input and for coupling with aerosol analysis codes

  14. On collapsing the Pu94242 average number of neutrons released per fission from the IAEA.LIB library with the WIMSD-5b code

    Energy Technology Data Exchange (ETDEWEB)

    Caldeira, Alexandre D. [Centro Tecnico Aeroespacial (CTA), Instituto de Estudos Avancados (IEAv), 12231-970 Sao Jose dos Campos, SP (Brazil)]. E-mail: alexdc@ieav.cta.br; Claro, Luiz H. [Centro Tecnico Aeroespacial (CTA), Instituto de Estudos Avancados (IEAv), 12231-970 Sao Jose dos Campos, SP (Brazil)

    2007-01-15

    It was verified after a fuel burnup calculation with the WIMSD-5b code using the IAEA.LIB library that the computed average number of neutrons released per fission of Pu94242 shows up as a Not-a-Number (NaN) for some energy groups. As this problem does not permit the use of the generated multigroup microscopic cross sections by a reactor calculation code, the value of 1.0E-38 barns was attributed to all energy groups of the IAEA.LIB library that have null values of multigroup microscopic fission cross sections for this material.

  15. THYDE-B1/MOD1: a computer code for analysis of small-break loss-of-coolant accident of boiling water reactors

    International Nuclear Information System (INIS)

    THYDE-B1/MOD1 is a computer code to analyze thermo-hydraulic transients of the reactor cooling system of a BWR, mainly during a small-break loss-of-coolant accidnet (SB-LOCA) with a special emphasis on the behavior of pressure and mixture level in the pressure vessel. The coolant behavior is simulated with a volume-and-junction method based on assumptions of thermal equilibrium and homogeneous conditions for two-phase flow. A characteristic feature of this code is a three-region representation of the state of the coolant in a control volume, in which three regions, i.e., subcooled liquid, saturated mixture and saturated steam regions are allowed to exist. The regions are separated by moving boundaries, tracked by mass and energy balances for each region. The interior of the pressure vessel is represented by two volumes with three regions: one for inside of the shroud and the other for outside, while other portions of the system are treated with homogeneous model. This method, although it seems to be very simple, has been verified to be adequate for cases of BWR SB-LOCAs in which the hydraulic transient is relatively slow and the cooling of the core strongly depends on the mixture level behavior in the vessel. In order to simulate the system behavior, THYDE-B1 is provided with analytical models for reactor kinetics, heat generation and conduction in fuel rods and structures, heat transfer between coolant and solid surfaces, coolant injection systems, breaks and discharge systems, jet pumps, recirculation pumps, and so on. The verification of the code has been conducted. A good predictability of the code has been indicated through the comparison of calculated results with experimental data provided by ROSA-III small-break tests. This report presents the analytical models, solution method, and input data requirements of the THYDE-B1/MOD1 code. (author)

  16. Post-test analysis of the Bethsy experiment 9.1b with ASTEC V1.2 code for CESAR thermal-hydraulic module validation

    International Nuclear Information System (INIS)

    The CESAR thermal-hydraulic module of ASTEC V1.2 code has been validated by means of the analysis of one experiment carried out in the Bethsy facility which simulates a French 900 MWe PWR reactor. The test under investigation is the loss-of-coolant accident 9.1b test (OECD ISP No. 27) which consists in a 2 inch cold leg break, while the high pressure injection system is assumed to be unavailable. Starting from a Bethsy nodalisation similar to the one employed in PWR reactor applications with the ASTEC code, the Bethsy 9.1b test has been analyzed in detail with CESAR. In order to reduce the discrepancies found between code results and test measurements, some nodalisation improvements have been identified and implemented in the original model by means of sensitivity studies. In the present paper, the results of the code are presented in comparison with the experimental data. The occurrence of major events and the time evolution of main thermal-hydraulic parameters of both primary and secondary circuits are well predicted by CESAR. (author)

  17. AMPX-77: A modular code system for generating coupled multigroup neutron-gamma cross-section libraries from ENDF/B-IV and/or ENDF/B-V

    International Nuclear Information System (INIS)

    AMPX-77 is a modular system of computer programs that pertain to nuclear analyses, with a primary emphasis on tasks associated with the production and use of multigroup cross sections. AH basic cross-section data are to be input in the formats used by the Evaluated Nuclear Data Files (ENDF/B), and output can be obtained in a variety of formats, including its own internal and very general formats, along with a variety of other useful formats used by major transport, diffusion theory, and Monte Carlo codes. Processing is provided for both neutron and gamma-my data. The present release contains codes all written in the FORTRAN-77 dialect of FORTRAN and wig process ENDF/B-V and earlier evaluations, though major modules are being upgraded in order to process ENDF/B-VI and will be released when a complete collection of usable routines is available

  18. AMPX-77: A modular code system for generating coupled multigroup neutron-gamma cross-section libraries from ENDF/B-IV and/or ENDF/B-V

    Energy Technology Data Exchange (ETDEWEB)

    Greene, N.M.; Ford, W.E. III; Petrie, L.M.; Arwood, J.W.

    1992-10-01

    AMPX-77 is a modular system of computer programs that pertain to nuclear analyses, with a primary emphasis on tasks associated with the production and use of multigroup cross sections. AH basic cross-section data are to be input in the formats used by the Evaluated Nuclear Data Files (ENDF/B), and output can be obtained in a variety of formats, including its own internal and very general formats, along with a variety of other useful formats used by major transport, diffusion theory, and Monte Carlo codes. Processing is provided for both neutron and gamma-my data. The present release contains codes all written in the FORTRAN-77 dialect of FORTRAN and wig process ENDF/B-V and earlier evaluations, though major modules are being upgraded in order to process ENDF/B-VI and will be released when a complete collection of usable routines is available.

  19. Characterization and analysis of a cDNA coding for the group 29b (Der f 29b) allergen of Dermatophagoides farinae

    Science.gov (United States)

    Lin, Jianli; Wang, Hui; Li, Meng; Liang, Zhilin; Jiang, Congli; Wu, Yulan; Liu, Zhigang; Yang, Pingchang; Liu, Xiaoyu

    2016-01-01

    This study aims to acquire a recombinant allergen of Der f 29b by cloning and expression, and to identify its immunogenicity. In this study, the total RNA of D. farinae was extracted, cloned and expressed based on the Der f 29b gene. The molecular characteristics of Der f 29b was analyzed by the procedures of Bioinformatics. The allergenicity of recombinant Der f 29b protein was examined by western-blotting, ELISA, Immune inhibitory assays and skin prick test. The gene of Der f 29b consisted of 495 bases, derived from its nucleic acid sequence and encoded 164 amino acids. Positive responses to r-Der f 29b were shown in 24.3% by means of skin prick testing with 37 DM-allergic patients. The immunoblotting assays demonstrated that serum IgE from allergic patients reacted to r-Der f 29b protein. The IgE reactivity of r-Der f 29b in the serum from r-Der f 29b allergic patients was increased by more than 2 folds compared with healthy subjects. Immune inhibition assays showed that the IgE cross-reactivity was between r-Der f 29b and DME. Bioinformatics analysis predicted four peptides (13-17, 67-71, 104-109 and 147-155) as the B cell epitopes and five peptides (5-14, 16-31, 35-43, 52-63 and 87-97) as the T cell epitopes. Secondary structure prediction of Der f 29b with software PSIPRED identified two α-helices and seven β-sheets in Der f 29b. In conclusion, Derf 29b protein was identified as a novel subtype of dust mite allergen. PMID:27158348

  20. Anderson's disease/chylomicron retention disease in a Japanese patient with uniparental disomy 7 and a normal SAR1B gene protein coding sequence

    Directory of Open Access Journals (Sweden)

    Okada Tomoo

    2011-11-01

    Full Text Available Abstract Background Anderson's Disease (AD/Chylomicron Retention Disease (CMRD is a rare hereditary hypocholesterolemic disorder characterized by a malabsorption syndrome with steatorrhea, failure to thrive and the absence of chylomicrons and apolipoprotein B48 post-prandially. All patients studied to date exhibit a mutation in the SAR1B gene, which codes for an essential component of the vesicular coat protein complex II (COPII necessary for endoplasmic reticulum to Golgi transport. We describe here a patient with AD/CMRD, a normal SAR1B gene protein coding sequence and maternal uniparental disomy of chromosome 7 (matUPD7. Methods and Results The patient, one of two siblings of a Japanese family, had diarrhea and steatorrhea beginning at five months of age. There was a white duodenal mucosa upon endoscopy. Light and electron microscopy showed that the intestinal villi were normal but that they had lipid laden enterocytes containing accumulations of lipid droplets in the cytoplasm and lipoprotein-size particles in membrane bound structures. Although there were decreased amounts in plasma of total- and low-density lipoprotein cholesterol, apolipoproteins AI and B and vitamin E levels, the triglycerides were normal, typical of AD/CMRD. The presence of low density lipoproteins and apolipoprotein B in the plasma, although in decreased amounts, ruled out abetalipoproteinemia. The parents were asymptomatic with normal plasma cholesterol levels suggesting a recessive disorder and ruling out familial hypobetalipoproteinemia. Sequencing of genomic DNA showed that the 8 exons of the SAR1B gene were normal. Whole genome SNP analysis and karyotyping revealed matUPD7 with a normal karyotype. In contrast to other cases of AD/CMRD which have shown catch-up growth following vitamin supplementation and a fat restricted diet, our patient exhibits continued growth delay and other aspects of the matUPD7 and Silver-Russell Syndrome phenotypes. Conclusions This

  1. ABCXYZ: vector potential (A) and magnetic field (B) code (C) for Cartesian (XYZ) geometry using general current elements

    International Nuclear Information System (INIS)

    ABCXYZ is a computer code for obtaining the Cartesian components of the vector potential and the magnetic field on an observed grid from an arrangement of current-carrying wires. Arbitrary combinations of straight line segments, arcs, and loops are allowed in the specification of the currents. Arbitrary positions and orientations of the current-carrying elements are also allowed. Specification of the wire diameter permits the computation of well-defined fields, even in the interiors of the conductors. An optical feature generates magnetic field lines. Extensive graphical and printed output is available to the user including contour, grid-line, and field-line plots. 12 figures, 1 table

  2. Screening for Coding Variants in FTO and SH2B1 Genes in Chinese Patients with Obesity

    Science.gov (United States)

    Huang, Xiaodong; Yang, Peirong; Li, Juan; Ding, Yu; Yao, Ru-en; Geng, Juan; Shen, Yongnian; Shen, Yiping; Fu, Qihua; Yu, Yongguo

    2013-01-01

    Objective To investigate potential functional variants in FTO and SH2B1 genes among Chinese children with obesity. Methods Sanger sequencing of PCR products of all FTO and SH2B1 exons and their flanking regions were performed in 338 Chinese Han children with obesity and 221 age- and sex-matched lean controls. Results A total of seven and five rare non-synonymous variants were identified in FTO and SH2B1, respectively. The overall frequencies of FTO and SH2B1 rare non-synonymous variants were similar in obese and lean children (2.37% and 0.90% vs. 1.81% and 1.36%, P>0.05). However, four out of the seven variants in FTO were novel and all were unique to obese children (p>0.05). None of the novel variants was consistently being predicted to be deleterious. Four out of five variants in SH2B1 were novel and one was unique to obese children (p>0.05). One variant (L293R) that was consistently being predicted as deleterious in SH2B1 gene was unique to lean control. While rare missense mutations were more frequently detected in girls from obesity as well as lean control than boys, the difference was not statistically significant. In addition, it's shown that the prevalence of rare missense mutations of FTO as well as SH2B1 was similar across different ethnic groups. Conclusion The rare missense mutations of FTO and SH2B1 did not confer risks of obesity in Chinese Han children in our cohort. PMID:23825611

  3. Screening for coding variants in FTO and SH2B1 genes in Chinese patients with obesity.

    Directory of Open Access Journals (Sweden)

    Zhaojing Zheng

    Full Text Available OBJECTIVE: To investigate potential functional variants in FTO and SH2B1 genes among Chinese children with obesity. METHODS: Sanger sequencing of PCR products of all FTO and SH2B1 exons and their flanking regions were performed in 338 Chinese Han children with obesity and 221 age- and sex-matched lean controls. RESULTS: A total of seven and five rare non-synonymous variants were identified in FTO and SH2B1, respectively. The overall frequencies of FTO and SH2B1 rare non-synonymous variants were similar in obese and lean children (2.37% and 0.90% vs. 1.81% and 1.36%, P>0.05. However, four out of the seven variants in FTO were novel and all were unique to obese children (p>0.05. None of the novel variants was consistently being predicted to be deleterious. Four out of five variants in SH2B1 were novel and one was unique to obese children (p>0.05. One variant (L293R that was consistently being predicted as deleterious in SH2B1 gene was unique to lean control. While rare missense mutations were more frequently detected in girls from obesity as well as lean control than boys, the difference was not statistically significant. In addition, it's shown that the prevalence of rare missense mutations of FTO as well as SH2B1 was similar across different ethnic groups. CONCLUSION: The rare missense mutations of FTO and SH2B1 did not confer risks of obesity in Chinese Han children in our cohort.

  4. Analysis of the three-dimensional VENUS-2 MOX core benchmark using the Monte Carlo code TRIPOLI-4 and the ENDF/B-VI.4, ENDF/B-VII.0 and JEFF-3.1 nuclear data sets

    Energy Technology Data Exchange (ETDEWEB)

    Savva, P., E-mail: savvapan@ipta.demokritos.gr; Varvayanni, M., E-mail: melina@ipta.demokritos.gr; Catsaros, N., E-mail: nicos@ipta.demokritos.gr

    2014-07-01

    Highlights: • Results of benchmarking TRIPOLI based on the VENUS-2 MOX benchmark are reported. • 3-D TRIPOLI calculations were performed using ENDF/B-VI.4, ENDF/B-VII.0 and JEFF-3. • Results are compared with measured data and results of other benchmark participants. • TRIPOLI results agree well with experimental data and results from other participants. - Abstract: The reliability and verification of numerical solutions derived from neutronic codes and the use of nuclear data libraries is a very important issue in nuclear technology. To this purpose, computational benchmarks based on well-defined problems with a complete set of input and a unique solution, are often used. The OECD/NEA VENUS-2 is a widely used MOX benchmark problem for the validation of numerical methods and nuclear data sets. In this paper, the results of benchmarking the TRIPOLI Monte Carlo code based on the VENUS-2 MOX benchmark problem, are reported. 3-D TRIPOLI calculations were performed using the ENDF/B-VI.4, ENDF/B-VII.0 and JEFF-3.1 nuclear data sets. The computational results are compared with measured data, as well as with the results of other benchmark participants. In general the TRIPOLI results agree well with both the experimental data as well as those of other participants.

  5. Features of a leader peptide coding region that regulate translation initiation for the anti-TRAP protein of B. subtilis.

    Science.gov (United States)

    Chen, Guangnan; Yanofsky, Charles

    2004-03-12

    The rtpA gene of Bacillus subtilis encodes the Anti-TRAP protein, AT. AT can bind and inhibit the TRAP regulatory protein, preventing TRAP from promoting transcription termination in the trpEDCFBA operon leader region. AT synthesis is upregulated transcriptionally and translationally in response to the accumulation of uncharged tRNA(Trp). Here we analyze AT's translational regulation by rtpLP, a 10 residue leader peptide coding region located immediately preceding the rtpA Shine-Dalgarno sequence. Our findings suggest that, whenever the charged tRNA(Trp) level is sufficient to allow the ribosome translating rtpLP to reach its stop codon, it blocks the adjacent rtpA Shine-Dalgarno sequence, inhibiting AT synthesis. However, when there is a charged tRNA(Trp) deficiency, the translating ribosome presumably stalls at one of three adjacent rtpLP Trp codons. This stalling exposes the rtpA Shine-Dalgarno sequence, permitting AT synthesis. RNA-RNA pairing may also influence AT synthesis. Production of AT would inactivate TRAP, thereby increasing trp operon expression. PMID:15023340

  6. A DNA Vaccine Coding for the Brucella Outer Membrane Protein 31 Confers Protection against B. melitensis and B. ovis Infection by Eliciting a Specific Cytotoxic Response

    Science.gov (United States)

    Cassataro, Juliana; Velikovsky, Carlos A.; de la Barrera, Silvia; Estein, Silvia M.; Bruno, Laura; Bowden, Raúl; Pasquevich, Karina A.; Fossati, Carlos A.; Giambartolomei, Guillermo H.

    2005-01-01

    The development of an effective subunit vaccine against brucellosis is a research area of intense interest. The outer membrane proteins (Omps) of Brucella spp. have been extensively characterized as potential immunogenic and protective antigens. This study was conducted to evaluate the immunogenicity and protective efficacy of the B. melitensis Omp31 gene cloned in the pCI plasmid (pCIOmp31). Immunization of BALB/c mice with pCIOmp31 conferred protection against B. ovis and B. melitensis infection. Mice vaccinated with pCIOmp31 developed a very weak humoral response, and in vitro stimulation of their splenocytes with recombinant Omp31 did not induced the secretion of gamma interferon. Splenocytes from Omp31-vaccinated animals induced a specific cytotoxic-T-lymphocyte activity, which leads to the in vitro lysis of Brucella-infected macrophages. pCIOmp31 immunization elicited mainly CD8+ T cells, which mediate cytotoxicity via perforins, but also CD4+ T cells, which mediate lysis via the Fas-FasL pathway. In vivo depletion of T-cell subsets showed that the pCIOmp31-induced protection against Brucella infection is mediated predominantly by CD8+ T cells, although CD4+T cells also contribute. Our results demonstrate that the Omp31 DNA vaccine induces cytotoxic responses that have the potential to contribute to protection against Brucella infection. The protective response could be related to the induction of CD8+ T cells that eliminate Brucella-infected cells via the perforin pathway. PMID:16177328

  7. Hybrid analysis of the simplified boiling water reactor using RAMONA-4B and CASMO-3 computer codes

    Energy Technology Data Exchange (ETDEWEB)

    Vivas, G.F.C.; Hassan, Y.A. [Texas A and M Univ., College Station, TX (United States). Dept. of Nuclear Engineering

    1999-09-01

    An analysis of the simplified boiling water reactor (SBWR) is carried out using the reactor analysis computer program ROMONA-4B in an operational transient scenario, a turbine trip with failure of all the bypass valves. The SBWR model represents the vessel`s internal components, such as flow areas, diameters, and volumes. The one-quarter-core neutron parameters are calculated with the CASMO-3 transport theory lattice physics computer program. The three-dimensional representation of the reactor core uses some standard fuel design parameters, such as a wide central water rod, 8 x 8 lattice, gadolinium rods, etc. The thermal-hydraulic equations are solved with the RAMONA-4B computer program in a closed loop inside the reactor vessel and in 184 parallel channels (including bypass) in the core. Finally, the two-phase coolant and neutronic parameters are calculated in steady state and during the turbine trip transient. The results obtained compare favorably with the standard safety analysis report data.

  8. Intégration à TRNSYS du noyau de CODYRUN, code de simulation thermo-aéraulique de bâtiments : le Type 59

    OpenAIRE

    Bastide, Alain; Boyer, Harry; Lauret, Philippe; Lucas, Franck; Garde, Francois; Garde, François

    2001-01-01

    National audience Ce papier traite de l'intégration à l'environnement TRNSYS du noyau de calcul d'un modèle développé depuis une dizaine d'années à l'Université de la Réunion, développement entrepris initialement en partenariat avec le CETHIL de l'INSA de Lyon. Il part du constat d'une segmentation des utilisateurs-développeurs en thermique des bâtiments, partagés entre un groupe sous environnement TRNSYS (type19 et 56 principalement) et l'autre mettant en œuvre des codes spécifiques (ESP,...

  9. Comparison of results of simulation of the CONTEMPT-LT/028 and lAP-3B codes for the analysis of the internal vacuum breaker valves of the CNLV

    International Nuclear Information System (INIS)

    In the primary container of a BWR type reactor, the humid and dry wells its are communicate by means of valves designed to equal the pressure in case of a significant pressure difference exists, produced by an operative event just as the performance of an emergency system. These valves are known as internal vacuum breakers and its analysis it is made by means of the use of a code with the capacity to analyze the primary contention of the reactor. Among the codes able to carry out this analysis type there is CONTEMPT-LT/028 and MAAP-3B; however, these codes possess characteristic different respect the modeling one of the different damage mitigation systems to the contention (dews, windy, emergency systems), of the transfer of heat among the different compartments of the primary container and in the details of the civil construction. In previous works carried out with the CONTEMPT-LT/028 code, they have been carried out different cases of simulation related with the operation of the internal breaker vacuum valves. These cases include small ruptures in the main steam lines and ruptures in the recirculation knots. It was selected the case more restrictive and it was generated an equivalent scenario file for the MAAP-3B code. In this work the performance of the internal breaker vacuum valves is analyzed by means of the CONTEMPT-LT/028 and MAAP-3B codes, when using the case more restrictive consistent in a small rupture in a main steam line. The analysis of the simulations indicates that both codes produce very similar results and the found differences are explained with base in the models used by each code to obtain the answer of the main thermohydraulic variables. In general terms, MAAP-3B possesses models that adapt in a form more convenient to the prospective phenomenology for this analysis, maintaining a conservative focus. (Author)

  10. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  11. code {poems}

    Directory of Open Access Journals (Sweden)

    Ishac Bertran

    2012-08-01

    Full Text Available "Exploring the potential of code to communicate at the level of poetry," the code­ {poems} project solicited submissions from code­writers in response to the notion of a poem, written in a software language which is semantically valid. These selections reveal the inner workings, constitutive elements, and styles of both a particular software and its authors.

  12. Calculations of neutron flux for BNCT facility of typical working core Multipurpose Reactor (RSG-GAS) using MCNP4B Code

    International Nuclear Information System (INIS)

    Calculation of neutron flux distributions of RSG-GAS typical working core using MCNP 4b Code has been done. Prior to the calculations, modelling of fuel element of meat as well as surfaces of cladding cell and geometry should be made. The model was then included water as a containment also developed. To achieve neutron flux behavior, it was simulated 200,000 to 2,000,000 neutrons. The calculation results indicated that the neutron flux in TWC core is in the order of 1014. Meanwhile, the best flux order for the BNCT facility should be in the order of 1010. With the use of any method, such as constructing of shielding and collimator, the order of neutron flux will decrease. In the previous research in 2001, the results showed the neutron flux in the order of 1010 by installing the collimator with 45 cm thick, made of Pb and 380 cm from the core centre. The results of this research completed with the research done in 2001, 2000 and 1999 certainly support the possibility to construct the BNCT facility in RSG-GAS reactor core

  13. Holographic codes

    CERN Document Server

    Latorre, Jose I

    2015-01-01

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  14. Go8 Guiding Principles for Implementing Part B of the "Australian Code for the Responsible Conduct of Research". Go8 Consultation Paper

    Science.gov (United States)

    Group of Eight (NJ1), 2008

    2008-01-01

    The release of the "Australian Code for the Responsible Conduct of Research 2007" by the Australian Government in 2007 was welcomed by Go8 (Group of Eight) institutions, particularly in relation to the improvements and broader scope of the matters covered by Part A of that Code. However, as foreshadowed by the Go8 during the consultation phase of…

  15. Comparison of results of simulation of the CONTEMPT-LT/028 and lAP-3B codes for the analysis of the internal vacuum breaker valves of the CNLV; Comparacion de resultados de simulacion de los codigos CONTEMPT-LT/028 y MAAP-3B para el analisis de las valvulas rompedoras de vacio internas de la CNLV

    Energy Technology Data Exchange (ETDEWEB)

    Ovando C, R.; Cecenas F, M. [Instituto de Investigaciones Electricas, Gerencia de Energia Nuclear, Av. Reforma 113 Col. Palmira. 62490, Cuernavaca, Morelos (Mexico); Moya C, M.M. [Comision Federal de Electricidad. Gerencia de Centrales Nucleoelectricas Disciplina de Analisis de Ingenieria. Subgerencia de Ingenieria. Carretera Veracruz-Medellin Km 7.5, Dos Bocas, Veracruz (Mexico)]. e-mail: rovando@iie.org.mx

    2006-07-01

    In the primary container of a BWR type reactor, the humid and dry wells its are communicate by means of valves designed to equal the pressure in case of a significant pressure difference exists, produced by an operative event just as the performance of an emergency system. These valves are known as internal vacuum breakers and its analysis it is made by means of the use of a code with the capacity to analyze the primary contention of the reactor. Among the codes able to carry out this analysis type there is CONTEMPT-LT/028 and MAAP-3B; however, these codes possess characteristic different respect the modeling one of the different damage mitigation systems to the contention (dews, windy, emergency systems), of the transfer of heat among the different compartments of the primary container and in the details of the civil construction. In previous works carried out with the CONTEMPT-LT/028 code, they have been carried out different cases of simulation related with the operation of the internal breaker vacuum valves. These cases include small ruptures in the main steam lines and ruptures in the recirculation knots. It was selected the case more restrictive and it was generated an equivalent scenario file for the MAAP-3B code. In this work the performance of the internal breaker vacuum valves is analyzed by means of the CONTEMPT-LT/028 and MAAP-3B codes, when using the case more restrictive consistent in a small rupture in a main steam line. The analysis of the simulations indicates that both codes produce very similar results and the found differences are explained with base in the models used by each code to obtain the answer of the main thermohydraulic variables. In general terms, MAAP-3B possesses models that adapt in a form more convenient to the prospective phenomenology for this analysis, maintaining a conservative focus. (Author)

  16. Regional vertical total electron content (VTEC) modeling together with satellite and receiver differential code biases (DCBs) using semi-parametric multivariate adaptive regression B-splines (SP-BMARS)

    Science.gov (United States)

    Durmaz, Murat; Karslioglu, Mahmut Onur

    2015-04-01

    There are various global and regional methods that have been proposed for the modeling of ionospheric vertical total electron content (VTEC). Global distribution of VTEC is usually modeled by spherical harmonic expansions, while tensor products of compactly supported univariate B-splines can be used for regional modeling. In these empirical parametric models, the coefficients of the basis functions as well as differential code biases (DCBs) of satellites and receivers can be treated as unknown parameters which can be estimated from geometry-free linear combinations of global positioning system observables. In this work we propose a new semi-parametric multivariate adaptive regression B-splines (SP-BMARS) method for the regional modeling of VTEC together with satellite and receiver DCBs, where the parametric part of the model is related to the DCBs as fixed parameters and the non-parametric part adaptively models the spatio-temporal distribution of VTEC. The latter is based on multivariate adaptive regression B-splines which is a non-parametric modeling technique making use of compactly supported B-spline basis functions that are generated from the observations automatically. This algorithm takes advantage of an adaptive scale-by-scale model building strategy that searches for best-fitting B-splines to the data at each scale. The VTEC maps generated from the proposed method are compared numerically and visually with the global ionosphere maps (GIMs) which are provided by the Center for Orbit Determination in Europe (CODE). The VTEC values from SP-BMARS and CODE GIMs are also compared with VTEC values obtained through calibration using local ionospheric model. The estimated satellite and receiver DCBs from the SP-BMARS model are compared with the CODE distributed DCBs. The results show that the SP-BMARS algorithm can be used to estimate satellite and receiver DCBs while adaptively and flexibly modeling the daily regional VTEC.

  17. PNA-mediated modulation and redirection of Her-2 pre-mRNA splicing: specific skipping of erbB-2 exon 19 coding for the ATP catalytic domain

    DEFF Research Database (Denmark)

    Pankratova, Stanislava; Nielsen, Birgit N; Shiraishi, Takehiko;

    2010-01-01

    The Her-2 receptor coded for by the proto-oncogenic erbB-2 gene is a clinically validated target for treatment of a significant genetic subclass of breast cancers, and Her-2 is also overexpressed or mutated in a range of other cancers. In an approach to exploit antisense mediated splicing...... oligomers that specifically induce skipping of exon 19 as this exon is coding for the ATP catalytic domain of Her-2, and if expressed such truncated version of the Her-2 protein should be functionally inactive in a dominant negative fashion. Therefore, antisense compounds having efficient erbB-2 exon 19...... skipping activity could be very interesting in terms of drug discovery. In the present study we identified PNA oligomers having such activity in SK-BR-3 and HeLa cancer cells in culture....

  18. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  19. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech......; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...... expression in the public realm. The book’s line of argument defends language against its invasion by economics, arguing that speech continues to underscore the human condition, however paradoxical this may seem in an era of pervasive computing....

  20. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  1. Post-test calculations of aerosol behavior in DEMONA experiment B3 with various computer codes used in CEC member states

    International Nuclear Information System (INIS)

    Extensive research has been carried out around the world to understand the behavior of radioactive materials in the containment building of an LWR under accident conditions. Most of this material is in the form of aerosols or is attached to non-radioactive aerosol particles in the containment atmosphere. Several computer codes have been written to describe fission product aerosol behavior under accident conditions, aimed at evaluating the time dependent airborne concentration inside the reactor building and the fraction that leaks out to the environment. The objective of this Study was to perform a comparison of computer codes used in the CEC member states with a DEMONA experiment. This is a follow up study to an earlier exercise comparing codes to each other in which rigid benchmark cases of more or less artificially detailed nature had been used. In the present Study the comparison to the DEMONA experiment was to be oriented only at the experimental results without additional help provided. It should thus provide a basis for judging the practical applicability of the codes to a situation which is real but, maybe, less well defined than a theoretical benchmark case

  2. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe...... the codes succinctly using Gröbner bases....

  3. Method to generate the first design of the reload pattern to be used with the Presto-B code in the simulation of the CNLV U-1 reactor; Metodo para generar el primer diseno del patron de recarga a ser utilizado con el codigo Presto-B, en la simulacion del reactor de la CNLV U-1

    Energy Technology Data Exchange (ETDEWEB)

    Montes T, J.L.; Cortes C, C.C. [ININ, 52045 Ocoyoacac, Estado de Mexico (Mexico)

    1992-08-15

    This guide is applied for the reload pattern's formation for mirror symmetry of a core room and in accordance with the Control Cell core technique (of the english Control Cell Core - CCC) for the PRESTO-B code. (Author)

  4. MCNP code

    International Nuclear Information System (INIS)

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  5. ANIMAL code

    International Nuclear Information System (INIS)

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  6. Identification and preliminary characterization of a SigB regulated small non-coding RNA in Listeria monocytogenes

    DEFF Research Database (Denmark)

    Nielsen, Jesper Sejrup; Olsen, Anders Steno; Bonde, Mette;

    by an alternative sigma factor. Using this approach we have successfully identified a novel sRNA of ~75 nucleotides in L. monocytogenes that is specifically regulated by SigB. This sRNA, which we have termed SigB1 is expressed from the 3'-UTR of a large operon. SigB1 is expressed in a SigB dependant manner only...... in response to known SigB associated stresses such as salt- and ethanol-stress or entrance into stationary phase. Using transcriptional promoter-lacZ reporter assays, we have confirmed that SigB1 is not the result of an RNA-processing event. Interestingly, SigB1 does not contain any obvious Hfq binding sites...

  7. Characterization of the expression of the thcB gene, coding for a pesticide-degrading cytochrome P-450 in Rhodococcus strains.

    OpenAIRE

    Shao, Z Q; Behki, R

    1996-01-01

    A cytochrome P-450 system in Rhodococcus strains, encoded by thcB, thcC, and thcD, participates in the degradation of thiocarbamates and several other pesticides. The regulation of the system was investigated by fusing a truncated lacZ in frame to thcB, the structural gene for the cytochrome P-450 monooxygenase. Analysis of the thcB-lacZ fusion showed that the expression of thcB was 10-fold higher in the presence of the herbicide EPTC (s-ethyl dipropylthiocarbamate). Similar enhancement of th...

  8. Calculation of the fuel composition and the thermo-neutronic parameters of the Bushehr’s VVER-1000 reactor during the initial startup and the first cycle using the WIMSD5-B, CITATION-LDI2 and WERL codes

    International Nuclear Information System (INIS)

    Highlights: ► In this paper, the changes of the thermo-neutronic parameters of a VVER 1000 reactor were studied during the first cycle. ► The coupling of neutronic and thermo-hydraulic codes was utilized. ► A computational program (WERL code) was designed to calculate the temperature distribution of the reactor core. ► To estimate the concentration of the released gaseous fission products, the Weisman model was used. ► The results of this study enjoyed the desirable accuracy. - Abstract: In this paper, the concentrations of fission products and fuel isotopes as well as the changes of the thermo-neutronic parameters of the Bushehr’s VVER-1000 reactor were studied during the initial startup and the first cycle. In order to perform the time-dependent cell calculations and obtain the concentration of fuel elements, the WIMSD5-B code was used. Besides, by utilizing the CITATION-LDI2 code, the effective multiplication factor and the thermal power distribution of the reactor were calculated. A computer program (WERL code) was designed in order to perform accurate calculation of the temperature distribution of the reactor core. For this purpose, the Ross–Stoute, Weisman, and Lee–Kesler models were used for calculating of the gap conductance coefficient, fission gas release and gap pressure, respectively. The results demonstrated that in designing the startup process, in addition to the role considered for overcoming the power defects and in preparing the required conditions for performing the safety-assurance tests, the flattening of the reactor’s power must be taken into account. Comparison between the results of this modeling and the final safety analysis report of this reactor showed that the results presented in this paper are satisfactorily accurate

  9. Microfocusing of the FERMI@Elettra FEL beam with a K–B active optics system: Spot size predictions by application of the WISE code

    International Nuclear Information System (INIS)

    FERMI@Elettra, the first seeded EUV-SXR free electron laser (FEL) facility located at Elettra Sincrotrone Trieste has been conceived to provide very short (10–100 fs) pulses with ultrahigh peak brightness and wavelengths from 100 nm to 4 nm. A section fully dedicated to the photon transport and analysis diagnostics, named PADReS, has already been installed and commissioned. Three of the beamlines, EIS-TIMEX, DiProI and LDM, installed after the PADReS section, are in advanced commissioning state and will accept the first users in December 2012. These beam lines employ active X-ray optics in order to focus the FEL beam as well as to perform a controlled beam-shaping at focus. Starting from mirror surface metrology characterization, it is difficult to predict the focal spot shape applying only methods based on geometrical optics such as the ray tracing. Within the geometrical optics approach one cannot take into account the diffraction effect from the optics edges, i.e. the aperture diffraction, and the impact of different surface spatial wavelengths to the spot size degradation. Both these effects are strongly dependent on the photon beam energy and mirror incident angles. We employed a method based on physical optics, which applies the Huygens–Fresnel principle to reflection (on which the WISE code is based). In this work we report the results of the first measurements of the focal spot in the DiProI beamline end-station and compare them to the predictions computed with Shadow code and WISE code, starting from the mirror surface profile characterization

  10. ABCXYZ: vector potential (A) and magnetic field (B) code (C) for Cartesian (XYZ) geometry using general current elements. [In LRL TRAN for CDC > 600 computer

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, D.V.; Breazeal, J.; Finan, C.H.; Johnston, B.M.

    1976-09-14

    ABCXYZ is a computer code for obtaining the Cartesian components of the vector potential and the magnetic field on an observed grid from an arrangement of current-carrying wires. Arbitrary combinations of straight line segments, arcs, and loops are allowed in the specification of the currents. Arbitrary positions and orientations of the current-carrying elements are also allowed. Specification of the wire diameter permits the computation of well-defined fields, even in the interiors of the conductors. An optical feature generates magnetic field lines. Extensive graphical and printed output is available to the user including contour, grid-line, and field-line plots. 12 figures, 1 table.

  11. Genetic Immunization of BALB/c mice with a Plasmid Bearing the Gene Coding for a Hybrid Merozoite Surface Protein 1-Hepatitis B Virus Surface Protein Fusion Protects Mice against Lethal Plasmodium chabaudi chabaudi PC1 Infection

    OpenAIRE

    Wunderlich, Gerhard; Moura, Ivan C.; del Portillo, Hernando A

    2000-01-01

    The genetic immunization of rodents with a plasmid coding for a Plasmodium chabaudi merozoite surface protein 1 (C terminus)-hepatitis B virus surface fusion protein (pPcMSP119-HBs) provided protection of mice against subsequent lethal challenge with P. chabaudi chabaudi PC1-infected red blood cells. The percentage of survivor mice was higher in DNA-immunized mice than in animals immunized with a recombinant rPcMSP119– glutathione S-transferase fusion protein administered in Freund adjuvant. ...

  12. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...... in trees....

  13. Concatenated codes with convolutional inner codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Zyablov, Viktor

    1988-01-01

    The minimum distance of concatenated codes with Reed-Solomon outer codes and convolutional inner codes is studied. For suitable combinations of parameters the minimum distance can be lower-bounded by the product of the minimum distances of the inner and outer codes. For a randomized ensemble of...... concatenated codes a lower bound of the Gilbert-Varshamov type is proved...

  14. 17 CFR 229.406 - (Item 406) Code of ethics.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 406) Code of ethics. 229... 406) Code of ethics. (a) Disclose whether the registrant has adopted a code of ethics that applies to... code of ethics, explain why it has not done so. (b) For purposes of this Item 406, the term code...

  15. Evidence for linkage between the loci coding for the binding protein for the fourth component of human complement (C4BP) and for the C3b/C4b receptor.

    OpenAIRE

    Rodriguez de Cordoba, S; Dykman, T R; Ginsberg-Fellner, F; Ercilla, G; Aqua, M; Atkinson, J P; Rubinstein, P

    1984-01-01

    Three pedigrees informative for the segregation of genetic variants of the binding protein for the fourth component of complement (C4BP) and C3b/C4b receptor (C3bR) have been identified. There were 10 informative meioses with no recombinants, indicating a close linkage between the loci encoding C4BP and C3bR, C4BP and C3bR [maximum lod (logarithm of odds of linkage) score: 2.4 at recombinant fraction = 0.0]. In addition, in the four unrelated individuals who were doubly heterozygous (C4BP*1, ...

  16. Quantum Cyclic Code

    CERN Document Server

    Dutta, Sagarmoy

    2010-01-01

    In this paper, we define and study \\emph{quantum cyclic codes}, a generalisation of cyclic codes to the quantum setting. Previously studied examples of quantum cyclic codes were all quantum codes obtained from classical cyclic codes via the CSS construction. However, the codes that we study are much more general. In particular, we construct cyclic stabiliser codes with parameters $[[5,1,3

  17. Genomic Rearrangements and Functional Diversification of lecA and lecB Lectin-Coding Regions Impacting the Efficacy of Glycomimetics Directed against Pseudomonas aeruginosa

    Science.gov (United States)

    Boukerb, Amine M.; Decor, Aude; Ribun, Sébastien; Tabaroni, Rachel; Rousset, Audric; Commin, Loris; Buff, Samuel; Doléans-Jordheim, Anne; Vidal, Sébastien; Varrot, Annabelle; Imberty, Anne; Cournoyer, Benoit

    2016-01-01

    LecA and LecB tetrameric lectins take part in oligosaccharide-mediated adhesion-processes of Pseudomonas aeruginosa. Glycomimetics have been designed to block these interactions. The great versatility of P. aeruginosa suggests that the range of application of these glycomimetics could be restricted to genotypes with particular lectin types. The likelihood of having genomic and genetic changes impacting LecA and LecB interactions with glycomimetics such as galactosylated and fucosylated calix[4]arene was investigated over a collection of strains from the main clades of P. aeruginosa. Lectin types were defined, and their ligand specificities were inferred. These analyses showed a loss of lecA among the PA7 clade. Genomic changes impacting lec loci were thus assessed using strains of this clade, and by making comparisons with the PAO1 genome. The lecA regions were found challenged by phage attacks and PAGI-2 (genomic island) integrations. A prophage was linked to the loss of lecA. The lecB regions were found less impacted by such rearrangements but greater lecB than lecA genetic divergences were recorded. Sixteen combinations of LecA and LecB types were observed. Amino acid variations were mapped on PAO1 crystal structures. Most significant changes were observed on LecBPA7, and found close to the fucose binding site. Glycan array analyses were performed with purified LecBPA7. LecBPA7 was found less specific for fucosylated oligosaccharides than LecBPAO1, with a preference for H type 2 rather than type 1, and Lewisa rather than Lewisx. Comparison of the crystal structures of LecBPA7 and LecBPAO1 in complex with Lewisa showed these changes in specificity to have resulted from a modification of the water network between the lectin, galactose and GlcNAc residues. Incidence of these modifications on the interactions with calix[4]arene glycomimetics at the cell level was investigated. An aggregation test was used to establish the efficacy of these ligands. Great variations

  18. Genomic Rearrangements and Functional Diversification of lecA and lecB Lectin-Coding Regions Impacting the Efficacy of Glycomimetics Directed against Pseudomonas aeruginosa.

    Science.gov (United States)

    Boukerb, Amine M; Decor, Aude; Ribun, Sébastien; Tabaroni, Rachel; Rousset, Audric; Commin, Loris; Buff, Samuel; Doléans-Jordheim, Anne; Vidal, Sébastien; Varrot, Annabelle; Imberty, Anne; Cournoyer, Benoit

    2016-01-01

    LecA and LecB tetrameric lectins take part in oligosaccharide-mediated adhesion-processes of Pseudomonas aeruginosa. Glycomimetics have been designed to block these interactions. The great versatility of P. aeruginosa suggests that the range of application of these glycomimetics could be restricted to genotypes with particular lectin types. The likelihood of having genomic and genetic changes impacting LecA and LecB interactions with glycomimetics such as galactosylated and fucosylated calix[4]arene was investigated over a collection of strains from the main clades of P. aeruginosa. Lectin types were defined, and their ligand specificities were inferred. These analyses showed a loss of lecA among the PA7 clade. Genomic changes impacting lec loci were thus assessed using strains of this clade, and by making comparisons with the PAO1 genome. The lecA regions were found challenged by phage attacks and PAGI-2 (genomic island) integrations. A prophage was linked to the loss of lecA. The lecB regions were found less impacted by such rearrangements but greater lecB than lecA genetic divergences were recorded. Sixteen combinations of LecA and LecB types were observed. Amino acid variations were mapped on PAO1 crystal structures. Most significant changes were observed on LecBPA7, and found close to the fucose binding site. Glycan array analyses were performed with purified LecBPA7. LecBPA7 was found less specific for fucosylated oligosaccharides than LecBPAO1, with a preference for H type 2 rather than type 1, and Lewis(a) rather than Lewis(x). Comparison of the crystal structures of LecBPA7 and LecBPAO1 in complex with Lewis(a) showed these changes in specificity to have resulted from a modification of the water network between the lectin, galactose and GlcNAc residues. Incidence of these modifications on the interactions with calix[4]arene glycomimetics at the cell level was investigated. An aggregation test was used to establish the efficacy of these ligands. Great

  19. Genomic rearrangements and functional diversification of lecA and lecB lectin-coding regions impacting the efficacy of glycomimetics directed against Pseudomonas aeruginosa

    Directory of Open Access Journals (Sweden)

    Amine M Boukerb

    2016-05-01

    Full Text Available LecA and LecB tetrameric lectins take part in oligosaccharide-mediated adhesion-processes of Pseudomonas aeruginosa. Glycomimetics have been designed to block these interactions. The great versatility of P. aeruginosa suggests that the range of application of these glycomimetics could be restricted to genotypes with particular lectin types. The likelihood of having genomic and genetic changes impacting LecA and LecB interactions with glycomimetics such as galactosylated and fucosylated calix[4]arene was investigated over a collection of strains from the main clades of P. aeruginosa. Lectin types were defined, and their ligand specificities were inferred. These analyses showed a loss of lecA among the PA7 clade. Genomic changes impacting lec loci were thus assessed using strains of this clade, and by making comparisons with the PAO1 genome. The lecA regions were found challenged by phage attacks and PAGI-2 (genomic island integrations. A prophage was linked to the loss of lecA. The lecB regions were found less impacted by such rearrangements but greater lecB than lecA genetic divergences were recorded. Sixteen combinations of LecA and LecB types were observed. Amino acid variations were mapped on PAO1 crystal structures. Most significant changes were observed on LecBPA7, and found close to the fucose binding site. Glycan array analyses were performed with purified LecBPA7. LecBPA7 was found less specific for fucosylated oligosaccharides than LecBPAO1, with a preference for H type 2 rather than type 1, and Lewisa rather than Lewisx. Comparison of the crystal structures of LecBPA7 and LecBPAO1 in complex with Lewisa showed these changes in specificity to have resulted from a modification of the water network between the lectin, galactose and GlcNAc residues. Incidence of these modifications on the interactions with calix[4]arene glycomimetics at the cell level was investigated. An aggregation test was used to establish the efficacy of these ligands

  20. Diversity of Sarcocystis spp shed by opossums in Brazil inferred with phylogenetic analysis of DNA coding ITS1, cytochrome B, and surface antigens.

    Science.gov (United States)

    Valadas, Samantha Y O B; da Silva, Juliana I G; Lopes, Estela Gallucci; Keid, Lara B; Zwarg, Ticiana; de Oliveira, Alice S; Sanches, Thaís C; Joppert, Adriana M; Pena, Hilda F J; Oliveira, Tricia M F S; Ferreira, Helena L; Soares, Rodrigo M

    2016-05-01

    Although few species of Sarcocystis are known to use marsupials of the genus Didelphis as definitive host, an extensive diversity of alleles of surface antigen genes (sag2, sag3, and sag4) has been described in samples of didelphid opossums in Brazil. In this work, we studied 25 samples of Sarcocystis derived from gastrointestinal tract of opossums of the genus Didelphis by accessing the variability of sag2, sag3, sag4, gene encoding cytochrome b (cytB) and first internal transcribed spacer (ITS1). Reference samples of Sarcocystis neurona (SN138) and Sarcocystis falcatula (SF1) maintained in cell culture were also analyzed. We found four allele variants of cytB, seven allele variants of ITS1, 10 allele variants of sag2, 13 allele variants of sag3, and 6 allele variants of sag4. None of the sporocyst-derived sequences obtained from Brazilian opossums revealed 100% identity to SN138 at cytB gene, nor to SN138 or SF1 at ITS1 locus. In addition, none of the sag alleles were found identical to either SF1 or SN138 homologous sequences, and a high number of new sag allele types were found other than those previously described in Brazil. Out of ten sag2 alleles, four are novel, while eight out of 13 sag3 alleles are novel and one out of six sag4 alleles is novel. Further studies are needed to clarify if such a vast repertoire of allele variants of Sarcocystis is the consequence of re-assortments driven by sexual exchange, in order to form individuals with highly diverse characteristics, such as pathogenicity, host spectrum, among others or if it only represents allele variants of different species with different biological traits.

  1. Diversity of Sarcocystis spp shed by opossums in Brazil inferred with phylogenetic analysis of DNA coding ITS1, cytochrome B, and surface antigens.

    Science.gov (United States)

    Valadas, Samantha Y O B; da Silva, Juliana I G; Lopes, Estela Gallucci; Keid, Lara B; Zwarg, Ticiana; de Oliveira, Alice S; Sanches, Thaís C; Joppert, Adriana M; Pena, Hilda F J; Oliveira, Tricia M F S; Ferreira, Helena L; Soares, Rodrigo M

    2016-05-01

    Although few species of Sarcocystis are known to use marsupials of the genus Didelphis as definitive host, an extensive diversity of alleles of surface antigen genes (sag2, sag3, and sag4) has been described in samples of didelphid opossums in Brazil. In this work, we studied 25 samples of Sarcocystis derived from gastrointestinal tract of opossums of the genus Didelphis by accessing the variability of sag2, sag3, sag4, gene encoding cytochrome b (cytB) and first internal transcribed spacer (ITS1). Reference samples of Sarcocystis neurona (SN138) and Sarcocystis falcatula (SF1) maintained in cell culture were also analyzed. We found four allele variants of cytB, seven allele variants of ITS1, 10 allele variants of sag2, 13 allele variants of sag3, and 6 allele variants of sag4. None of the sporocyst-derived sequences obtained from Brazilian opossums revealed 100% identity to SN138 at cytB gene, nor to SN138 or SF1 at ITS1 locus. In addition, none of the sag alleles were found identical to either SF1 or SN138 homologous sequences, and a high number of new sag allele types were found other than those previously described in Brazil. Out of ten sag2 alleles, four are novel, while eight out of 13 sag3 alleles are novel and one out of six sag4 alleles is novel. Further studies are needed to clarify if such a vast repertoire of allele variants of Sarcocystis is the consequence of re-assortments driven by sexual exchange, in order to form individuals with highly diverse characteristics, such as pathogenicity, host spectrum, among others or if it only represents allele variants of different species with different biological traits. PMID:26905780

  2. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  3. Strong Trinucleotide Circular Codes

    Directory of Open Access Journals (Sweden)

    Christian J. Michel

    2011-01-01

    Full Text Available Recently, we identified a hierarchy relation between trinucleotide comma-free codes and trinucleotide circular codes (see our previous works. Here, we extend our hierarchy with two new classes of codes, called DLD and LDL codes, which are stronger than the comma-free codes. We also prove that no circular code with 20 trinucleotides is a DLD code and that a circular code with 20 trinucleotides is comma-free if and only if it is a LDL code. Finally, we point out the possible role of the symmetric group ∑4 in the mathematical study of trinucleotide circular codes.

  4. Psacoin level 1B intercomparison: An International code intercomparison exercise on a hypothetical safety assessment case study for radioactive waste disposal systems

    International Nuclear Information System (INIS)

    This report focuses on the biosphere modelling aspects of the assessment of the radiological impact of the disposal of radioactive waste in greater detail. Seven exposure pathways are modelled: drinking water, freshwater fish, meat, milk and grain consumption as well as external gamma irradiation and contaminated dust inhalation. The accumulation of radionuclides, released in groundwaters, in the upper soil is also modelled. The objectives of this Level 1b exercise can be summarized as follows: 1 to gain experience in the application of probabilistic systems assessment methodology to transport and radiological exposure sub-models for the biosphere and hence to methods of estimating the total risk to individuals or groups of individuals; 2 to contribute to the verification of biosphere transport and exposure sub-models; 3 to investigate the effects of parameter uncertainty in the biosphere transport and exposure sub-models on the estimate of mean dose to individuals exposed via several exposure pathways

  5. Research Summary on Hepatitis B Virus C Gene and Coding Proteins%乙肝病毒C基因及其编码蛋白研究概述

    Institute of Scientific and Technical Information of China (English)

    郭雷; 于湘晖; 貌盼勇

    2009-01-01

    乙型肝炎是由乙型肝炎病毒(hepatitis B virus,HBV)感染引起的一种严重危害人类健康的传染病.HBV核心蛋白在病毒的装配、肝炎的发生、发展中起重要作用.本文就HBV核心蛋白的编码C基因、蛋白的结构功能及所引起的细胞免疫应答特点,特别是HBV核心相关抗原(HBV,HBcrAg)作为一种重要的血清学指标在临床上的应用以及BCP(basal core promoter)双突变在对乙肝病情的影响等作了概述.

  6. Joint source channel coding using arithmetic codes

    CERN Document Server

    Bi, Dongsheng

    2009-01-01

    Based on the encoding process, arithmetic codes can be viewed as tree codes and current proposals for decoding arithmetic codes with forbidden symbols belong to sequential decoding algorithms and their variants. In this monograph, we propose a new way of looking at arithmetic codes with forbidden symbols. If a limit is imposed on the maximum value of a key parameter in the encoder, this modified arithmetic encoder can also be modeled as a finite state machine and the code generated can be treated as a variable-length trellis code. The number of states used can be reduced and techniques used fo

  7. Irradiation test of bar code label

    International Nuclear Information System (INIS)

    The irradiation test of bar code label tagged on radioactive waste container was done to determine the effect of radiation. Low and medium radioactive waste is that below total activity of 4,000Bq/g according to the Korean nuclear law. The irradiation amount to radiate bar code label tagged on radioactive waste container was calculated by MCNP-4b computer code. The nuclide such as Co-60 and Cs-137 was assumed to contribute 50 % of total activity. Real irradiation amount for bar code label was finally calculated by the dimensions of the container and the bar code label. The identification of post and the physical deflection of irradiated bar code label was tested by the bar code reader. The coated bar code label was suitable to use on low and medium radioactive waste container

  8. Genomic characterization of echovirus 6 causing aseptic meningitis in Hokkaido, Japan: a novel cluster in the nonstructural protein coding region of human enterovirus B.

    Science.gov (United States)

    Miyoshi, Masahiro; Komagome, Rika; Ishida, Setsuko; Nagano, Hideki; Takahashi, Kenichi; Okano, Motohiko

    2013-04-01

    We determined four complete nucleotide sequences of echovirus 6 (E6) isolated from an epidemic of aseptic meningitis (AM) in Hokkaido, Japan, in 2011. Phylogenetic analysis of the genes encoding viral capsid protein 1 revealed that the strains were closely related to E6 strains isolated in China in recent years, but they were distantly related to E6 strains isolated from patients with AM in Osaka Prefecture, Japan, in 2011. The genes encoding the viral protease and RNA-dependent RNA polymerase (3CD) were closely related to those of several non-E6 strains of the species Human enterovirus B isolated in China, South Korea, and Australia from 1999 to 2010, resulting in a novel cluster in the phylogenetic tree. These results suggest that the incidence of AM in Japan in 2011 was caused by at least two lineages of E6 strains, and a lineage of the 3CD gene was interspersed among different serotypic strains isolated in Western Pacific countries.

  9. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  10. Department of Transportation -- Exemption for using the Transuranic Package Transporter-I (TRUPACT-I) at the Idaho National Engineering Laboratory (Code of Federal Regulations, Title 49, Part 107, Subpart B -- Exemptions, 107-103 Application for Exemption)

    International Nuclear Information System (INIS)

    Exemption from specific regulations is being sought for the Transuranic Package Transporter Model I (TRUPACT-I) container. The design has successfully undergone extensive testing of a quarter-scale model and a full-scale prototype of the container. Results from the analysis and testing are in the TRUPACT-1 Safely Analysis Report for Packaging (SARP), GA-Al8695/SAND 87-7104 (TTC0735), April 1987 (see Attachment 1). The container was never certified or used because of questions raised during the certification process. Two features of the container design failed to satisfy the regulations for Type B packaging. First, the design utilizes a venting system to control internal and external pressures; this venting system is not allowed by the Code of Federal Regulations, Title 10, Parts 71(h) and 71.51(b) [10 CFR 71.(h) and 71.51(b)]. Second, the maximum quantity fissile material proposed to be hauled in TRUPACT-I exceeded the limits in 10 CFR 71.63(b) for a single-containment container. To correct these design deficiencies, the vents would be plugged during transport, and the maximum quantity of fissile material would be limited to the allowables for a single-containment container. An engineering analysis showed that the container could safely transport radioactive material within the boundaries of the Idaho National Engineering Laboratory (INEL) with the vent system plugged (see Attachment 2). However, some of the requirements for determining pressure on a container need to be changed (i.e., exempted) to reflect conditions unique to the INEL. The following are the requirements needing to be changed for INEL conditions, variances being sought, and justifications for the variances

  11. Ultrasound imaging using coded signals

    DEFF Research Database (Denmark)

    Misaridis, Athanasios

    Modulated (or coded) excitation signals can potentially improve the quality and increase the frame rate in medical ultrasound scanners. The aim of this dissertation is to investigate systematically the applicability of modulated signals in medical ultrasound imaging and to suggest appropriate...... of the excitation signal. Although a gain in signal-to-noise ratio of about 20 dB is theoretically possible for the time-bandwidth product available in ultrasound, it is shown that the effects of transducer weighting and tissue attenuation reduce the maximum gain at 10 dB for robust compression with low sidelobes...... is described. Application of coded excitation in array imaging is evaluated through simulations in Field II. The low degree of the orthogonality among coded signals for ultrasound systems is first discussed, and the effect of mismatched filtering in the cross-correlation properties of the signals is evaluated...

  12. Nonbinary quantum codes

    OpenAIRE

    Eric M. Rains

    1997-01-01

    We present several results on quantum codes over general alphabets (that is, in which the fundamental units may have more than 2 states). In particular, we consider codes derived from finite symplectic geometry assumed to have additional global symmetries. From this standpoint, the analogues of Calderbank-Shor-Steane codes and of GF(4)-linear codes turn out to be special cases of the same construction. This allows us to construct families of quantum codes from certain codes over number fields...

  13. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  14. Affine Grassmann codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant

    2010-01-01

    We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes.We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show that...... affine Grassmann codes have a large automorphism group and determine the number of minimum weight codewords....

  15. The 1996 ENDF pre-processing codes

    International Nuclear Information System (INIS)

    The codes are named 'the Pre-processing' codes, because they are designed to pre-process ENDF/B data, for later, further processing for use in applications. This is a modular set of computer codes, each of which reads and writes evaluated nuclear data in the ENDF/B format. Each code performs one or more independent operations on the data, as described below. These codes are designed to be computer independent, and are presently operational on every type of computer from large mainframe computer to small personal computers, such as IBM-PC and Power MAC. The codes are available from the IAEA Nuclear Data Section, free of charge upon request. (author)

  16. 论合同法对B to C点击合同的规制%On Restriction of Regulation to the B to C Click-Wrap Contract in the Chinese Contract Code

    Institute of Scientific and Technical Information of China (English)

    李明星

    2004-01-01

    B to C点击合同是企业与消费者之间的电子商务合同.应当从点击合同订立和修改、合同解释、"合理线"、格式条款效力等六个方面对其全面系统地规制,既维护企业与消费者的利益平衡,保障消费者的合法权益,又体现合同法律的公平正义.

  17. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  18. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  19. Polyphase alternating codes

    Directory of Open Access Journals (Sweden)

    M. Markkanen

    2008-08-01

    Full Text Available We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We handle a few specific examples in detail. The new codes offer an enlarged collection of code lengths for radar experiments.

  20. Coupling CFD code with system code and neutron kinetic code

    International Nuclear Information System (INIS)

    Highlights: • Coupling interface between CFD code Fluent and system code Athlet was created. • Athlet code is internally coupled with neutron kinetic code Dyn3D. • Explicit coupling of overlapped computational domains was used. • A coupled system of Athlet/Dyn3D+Fluent codes was successfully tested on a real case. - Abstract: The aim of this work was to develop the coupling interface between CFD code Fluent and system code Athlet internally coupled with neutron kinetic code Dyn3D. The coupling interface is intended for simulation of complex transients such as Main Steam Line Break scenarios, which cannot be modeled separately first by system and neutron kinetic code and then by CFD code, because of the feedback between the codes. In the first part of this article, the coupling method is described. Explicit coupling of overlapped computational domains is used in this work. The second part of the article presents a demonstration simulation performed by the coupled system of Athlet/Dyn3D and Fluent. The “Opening a Steam Dump to the Atmosphere” test carried out at the Temelin NPP (VVER-1000) was simulated by the coupled system. In this simulation, the primary and secondary circuits were modeled by Athlet, mixing in downcomer and lower plenum was simulated by Fluent and heat generation in the core was calculated by Dyn3D. The results of the simulation with Athlet/Dyn3D+Fluent were compared with the experimental data and the results from a calculation performed with Athlet/Dyn3D without Fluent

  1. On the dimension of twisted centralizer codes

    OpenAIRE

    Glasby, S. P.; Praeger, Cheryl E.; Alahmadi, Adel

    2016-01-01

    Given a field $F$, a scalar $\\lambda\\in F$ and a matrix $A\\in F^{n\\times n}$, the twisted centralizer code $C_F(A,\\lambda):=\\{B\\in F^{n\\times n}\\mid AB-\\lambda BA=0\\}$ is a linear code of length $n^2$. When $A$ is cyclic and $\\lambda\

  2. 'Turbo' coding for deep space applications

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1995-01-01

    The performance of the `turbo' coding scheme is measured and an error floor is discovered. These residual errors are corrected with an outer BCH code. The complexity of the system is discussed, and for low data rates a realizable system operating at Eb/N0 below 0.2 dB is presented...

  3. DAMD code for producing nuclear data library of fission products

    International Nuclear Information System (INIS)

    Computer codes DAMD, TACA and TREE have been developed. The code DAMD produces a nuclear data library from ENDF/B format library for the computer code DCHAIN which analyzes buildup and decay of fission products. The code TACA punches out and prints out the contents of the nuclear data library for DCHAIN. The code TREE prints out the decay schemes of the nuclides contained in the library. (auth.)

  4. Locally Orderless Registration Code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  5. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  6. Polyphase alternating codes

    CERN Document Server

    Markkanen, Markku

    2007-01-01

    This work introduces a method for constructing polyphase alternating codes in which the length of a code transmission cycle can be $p^m$ or $p-1$, where $p$ is a prime number and $m$ is a positive integer. The relevant properties leading to the construction alternating codes and the algorithm for generating alternating codes is described. Examples of all practical and some not that practical polyphase code lengths are given.

  7. Constructing quantum codes

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Quantum error correcting codes are indispensable for quantum information processing and quantum computation.In 1995 and 1996,Shor and Steane gave first several examples of quantum codes from classical error correcting codes.The construction of efficient quantum codes is now an active multi-discipline research field.In this paper we review the known several constructions of quantum codes and present some examples.

  8. Remote-Handled Transuranic Content Codes

    International Nuclear Information System (INIS)

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document represents the development of a uniform content code system for RH-TRU waste to be transported in the 72-Bcask. It will be used to convert existing waste form numbers, content codes, and site-specific identification codes into a system that is uniform across the U.S. Department of Energy (DOE) sites.The existing waste codes at the sites can be grouped under uniform content codes without any lossof waste characterization information. The RH-TRUCON document provides an all-encompassing description for each content code and compiles this information for all DOE sites. Compliance with waste generation, processing, and certification procedures at the sites (outlined in this document foreach content code) ensures that prohibited waste forms are not present in the waste. The content code gives an overall description of the RH-TRU waste material in terms of processes and packaging, as well as the generation location. This helps to provide cradle-to-grave traceability of the waste material so that the various actions required to assess its qualification as payload for the 72-B cask can be performed. The content codes also impose restrictions and requirements on the manner in which a payload can be assembled. The RH-TRU Waste Authorized Methods for Payload Control (RH-TRAMPAC), Appendix 1.3.7 of the 72-B Cask Safety Analysis Report (SAR), describes the current governing procedures applicable for the qualification of waste as payload for the 72-B cask. The logic for this classification is presented in the 72-B Cask SAR. Together, these documents (RH-TRUCON, RH-TRAMPAC, and relevant sections of the 72-B Cask SAR) present the foundation and justification for classifying RH-TRU waste into content codes. Only content codes described in thisdocument can be considered for transport in the 72-B cask. Revisions to this document will be madeas additional waste qualifies for transport. Each content code uniquely

  9. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  10. Nonbinary quantum codes

    CERN Document Server

    Rains, E M

    1997-01-01

    We present several results on quantum codes over general alphabets (that is, in which the fundamental units may have more than 2 states). In particular, we consider codes derived from finite symplectic geometry assumed to have additional global symmetries. From this standpoint, the analogues of Calderbank-Shor-Steane codes and of GF(4)-linear codes turn out to be special cases of the same construction. This allows us to construct families of quantum codes from certain codes over number fields; in particular, we get analogues of quadratic residue codes, including a single-error correcting code encoding one letter in five, for any alphabet size. We also consider the problem of fault-tolerant computation through such codes, generalizing ideas of Gottesman.

  11. Comparison of sodium aerosol codes

    International Nuclear Information System (INIS)

    Although hypothetical fast reactor accidents leading to severe core damage are very low probability events, their consequences are to be assessed. During such accidents, one can envisage the ejection of sodium, mixed with fuel and fission products, from the primary circuit into the secondary containment. Aerosols can be formed either by mechanical dispersion of the molten material or as a result of combustion of the sodium in the mixture. Therefore considerable effort has been devoted to study the different sodium aerosol phenomena. To ensure that the problems of describing the physical behaviour of sodium aerosols were adequately understood, a comparison of the codes being developed to describe their behaviour was undertaken. The comparison consists of two parts. The first is a comparative study of the computer codes used to predict aerosol behaviour during a hypothetical accident. It is a critical review of documentation available. The second part is an exercise in which code users have run their own codes with a pre-arranged input. For the critical comparative review of the computer models, documentation has been made available on the following codes: AEROSIM (UK), MAEROS (USA), HAARM-3 (USA), AEROSOLS/A2 (France), AEROSOLS/B1 (France), and PARDISEKO-IIIb (FRG)

  12. Polyphase alternating codes

    OpenAIRE

    M. Markkanen; Vierinen, J.; Markkanen, J.

    2007-01-01

    We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We ...

  13. Zebra: An advanced PWR lattice code

    Energy Technology Data Exchange (ETDEWEB)

    Cao, L.; Wu, H.; Zheng, Y. [School of Nuclear Science and Technology, Xi' an Jiaotong Univ., No. 28, Xianning West Road, Xi' an, ShannXi, 710049 (China)

    2012-07-01

    This paper presents an overview of an advanced PWR lattice code ZEBRA developed at NECP laboratory in Xi'an Jiaotong Univ.. The multi-group cross-section library is generated from the ENDF/B-VII library by NJOY and the 361-group SHEM structure is employed. The resonance calculation module is developed based on sub-group method. The transport solver is Auto-MOC code, which is a self-developed code based on the Method of Characteristic and the customization of AutoCAD software. The whole code is well organized in a modular software structure. Some numerical results during the validation of the code demonstrate that this code has a good precision and a high efficiency. (authors)

  14. Zebra: An advanced PWR lattice code

    International Nuclear Information System (INIS)

    This paper presents an overview of an advanced PWR lattice code ZEBRA developed at NECP laboratory in Xi'an Jiaotong Univ.. The multi-group cross-section library is generated from the ENDF/B-VII library by NJOY and the 361-group SHEM structure is employed. The resonance calculation module is developed based on sub-group method. The transport solver is Auto-MOC code, which is a self-developed code based on the Method of Characteristic and the customization of AutoCAD software. The whole code is well organized in a modular software structure. Some numerical results during the validation of the code demonstrate that this code has a good precision and a high efficiency. (authors)

  15. Remote-Handled Transuranic Content Codes

    Energy Technology Data Exchange (ETDEWEB)

    Washington TRU Solutions

    2001-08-01

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document representsthe development of a uniform content code system for RH-TRU waste to be transported in the 72-Bcask. It will be used to convert existing waste form numbers, content codes, and site-specificidentification codes into a system that is uniform across the U.S. Department of Energy (DOE) sites.The existing waste codes at the sites can be grouped under uniform content codes without any lossof waste characterization information. The RH-TRUCON document provides an all-encompassing|description for each content code and compiles this information for all DOE sites. Compliance withwaste generation, processing, and certification procedures at the sites (outlined in this document foreach content code) ensures that prohibited waste forms are not present in the waste. The contentcode gives an overall description of the RH-TRU waste material in terms of processes and|packaging, as well as the generation location. This helps to provide cradle-to-grave traceability ofthe waste material so that the various actions required to assess its qualification as payload for the72-B cask can be performed. The content codes also impose restrictions and requirements on themanner in which a payload can be assembled.The RH-TRU Waste Authorized Methods for Payload Control (RH-TRAMPAC), Appendix 1.3.7of the 72-B Cask Safety Analysis Report (SAR), describes the current governing procedures|applicable for the qualification of waste as payload for the 72-B cask. The logic for this|classification is presented in the 72-B Cask SAR. Together, these documents (RH-TRUCON,|RH-TRAMPAC, and relevant sections of the 72-B Cask SAR) present the foundation and|justification for classifying RH-TRU waste into content codes. Only content codes described in thisdocument can be considered for transport in the 72-B cask. Revisions to this document will be madeas additional waste qualifies for transport. |Each content code uniquely

  16. Network coding for computing: Linear codes

    CERN Document Server

    Appuswamy, Rathinakumar; Karamchandani, Nikhil; Zeger, Kenneth

    2011-01-01

    In network coding it is known that linear codes are sufficient to achieve the coding capacity in multicast networks and that they are not sufficient in general to achieve the coding capacity in non-multicast networks. In network computing, Rai, Dey, and Shenvi have recently shown that linear codes are not sufficient in general for solvability of multi-receiver networks with scalar linear target functions. We study single receiver networks where the receiver node demands a target function of the source messages. We show that linear codes may provide a computing capacity advantage over routing only when the receiver demands a `linearly-reducible' target function. % Many known target functions including the arithmetic sum, minimum, and maximum are not linearly-reducible. Thus, the use of non-linear codes is essential in order to obtain a computing capacity advantage over routing if the receiver demands a target function that is not linearly-reducible. We also show that if a target function is linearly-reducible,...

  17. Challenge: Code of environmental law; Herausforderung Umweltgesetzbuch

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-15

    Within the meeting ''Challenge: Code of environmental law'' at 16th February, 2007, in Berlin (Federal Republic of Germany) and organized by the Federal Ministry for the Environment, Nature Conservation and Nuclear Safety (Berlin, Federal Republic of Germany), the following lectures were held: (a) the new code of environmental law as a contribution to more modernness and efficiency in the environmental politics (Sigmar Gabriel); (b) The code of environmental law from the view of the economy (Martin Wansleben); (c) Significance of the code of environmental law from the view of jurisprudence (Michael Kloepfer); (d) Targets, content and utility of the code of environmental law: Summary of the panel discussion (Tanja Goenner, Klaus Mittelbach, Juergen Resch, Hans-Joachim Koch, Alfred Wirtz, Andreas Troge (moderator)); (e) Considerations to the coding of water law in the code of environmental law (Helge Wendenburg); (f) Considerations to the coding of water law: Summary of te discussion; (g) Considerations to the coding of nature conservation law (Jochen Flasbarth); (h) Considerations to the coding of nature conservation law: Summary of the discussion.

  18. Simulation of the fault transitory of the feedwater controller in a Boiling water reactor with the Ramona-3B code; Simulacion del transitorio de falla del controlador de agua de alimentacion en un reactor de agua en ebullicion con el codigo RAMONA-3B

    Energy Technology Data Exchange (ETDEWEB)

    Hernandez M, J.L.; Ortiz V, J. [ININ, 52045 Ocoyoacac, Estado de Mexico (Mexico)

    2005-07-01

    The obtained results when carrying out the simulation of the fault transitory of the feedwater controller (FCAA) with the Ramona-3B code, happened in the Unit 2 of the Laguna Verde power plant (CNLV), in September of the year 2000 are presented. The transitory originates as consequence of the controller's fault of speed of a turbo pump of feedwater. The work includes a short description of the event, the suppositions considered for the simulation and the obtained results. Also, a discussion of the impact of the transitory event is presented on aspects of reactor safety. Although the carried out simulation is limited by the capacities of the code and for the lack of available information, it was found that even in a conservative situation, the power was incremented only in 12% above the nominal value, while that the thermal limit determined by the minimum reason of the critical power, MCPR, always stayed above the limit values of operation and safety. (Author)

  19. Construction of Codes for Network Coding

    CERN Document Server

    Elsenhans, Andreas-Stephan; Wassermann, Alfred

    2010-01-01

    Based on ideas of K\\"otter and Kschischang we use constant dimension subspaces as codewords in a network. We show a connection to the theory of q-analogues of a combinatorial designs, which has been studied in Braun, Kerber and Laue as a purely combinatorial object. For the construction of network codes we successfully modified methods (construction with prescribed automorphisms) originally developed for the q-analogues of a combinatorial designs. We then give a special case of that method which allows the construction of network codes with a very large ambient space and we also show how to decode such codes with a very small number of operations.

  20. TIPONLINE Code Table

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Coded items are entered in the tiponline data entry program. The codes and their explanations are necessary in order to use the data

  1. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  2. Improved FEC Code Based on Concatenated Code for Optical Transmission Systems

    Institute of Scientific and Technical Information of China (English)

    YUAN Jian-guo; JIANG Ze; MAO You-ju

    2006-01-01

    The improved three novel schemes of the super forward error correction(super-FEC) concatenated codes are proposed after the development trend of long-haul optical transmission systems and the defects of the existing FEC codes have been analyzed. The performance simulation of the Reed-Solomon(RS)+Bose-Chaudhuri-Hocguenghem(BCH) inner-outer serial concatenated code is implemented and the conceptions of encoding/decoding the parallel-concatenated code are presented. Furthermore,the simulation results for the RS(255,239)+RS(255,239) code and the RS(255,239)+RS(255,223) code show that the two consecutive concatenated codes are a superior coding scheme with such advantages as the better error correction,moderate redundancy and easy realization compared to the classic RS(255,239) code and other codes,and their signal to noise ratio gains are respectively 2~3 dB more than that of the RS(255,239)code at the bit error rate of 1×10-13. Finally,the frame structure of the novel consecutive concatenated code is arranged to lay a firm foundation in designing its hardware.

  3. Unfolding the color code

    OpenAIRE

    Kubica, Aleksander; Yoshida, Beni; Pastawski, Fernando

    2015-01-01

    The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the ...

  4. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  5. Informal control code logic

    OpenAIRE

    Bergstra, J. A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  6. Refactoring test code

    NARCIS (Netherlands)

    Deursen, A. van; Moonen, L.M.F.; Bergh, A. van den; Kok, G.

    2001-01-01

    Two key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from refactoring product

  7. Informal Control code logic

    CERN Document Server

    Bergstra, Jan A

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  8. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow the...

  9. Extended calculations of OECD/NEA phase II-C burnup credit criticality benchmark problem for PWR spent fuel transport cask by using MCNP-4B2 code and JENDL-3.2 library

    Energy Technology Data Exchange (ETDEWEB)

    Kuroishi, Takeshi; Hoang, Anh Tuan; Nomura, Yasushi; Okuno, Hiroshi [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    2003-03-01

    The reactivity effect of the asymmetry of axial burnup profile in burnup credit criticality safety is studied for a realistic PWR spent fuel transport cask proposed in the current OECD/NEA Phase II-C benchmark problem. The axial burnup profiles are simulated in 21 material zones based on in-core flux measurements varying from strong asymmetry to more or less no asymmetry. Criticality calculations in a 3-D model have been performed using the continuous energy Monte Carlo code MCNP-4B2 and the nuclear data library JENDL-3.2. Calculation conditions are determined with consideration of the axial fission source convergence. Calculations are carried out not only for cases proposed in the benchmark but also for additional cases assuming symmetric burnup profile. The actinide-only approach supposed for first domestic introduction of burnup credit into criticality evaluation is also considered in addition to the actinide plus fission product approach adopted in the benchmark. The calculated results show that k{sub eff} and the end effect increase almost linearly with increasing burnup axial offset that is defined as one of typical parameters showing the intensity of axial burnup asymmetry. The end effect is more sensitive to the asymmetry of burnup profile for the higher burnup. For an axially distributed burnup, the axial fission source distribution becomes strongly asymmetric as its peak shifts toward the top end of the fuel's active zone where the local burnup is less than that of the bottom end. The peak of fission source distribution becomes higher with the increase of either the asymmetry of burnup profile or the assembly-averaged burnup. The conservatism of the assumption of uniform axial burnup based on the actinide-only approach is estimated quantitatively in comparison with the k{sub eff} result calculated with experiment-based strongest asymmetric axial burnup profile with the actinide plus fission product approach. (author)

  10. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a...

  11. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of...

  12. The Procions` code; Le code Procions

    Energy Technology Data Exchange (ETDEWEB)

    Deck, D.; Samba, G.

    1994-12-19

    This paper presents a new code to simulate plasmas generated by inertial confinement. This multi-kinds kinetic code is done with no angular approximation concerning ions and will work in plan and spherical geometry. First, the physical model is presented, using Fokker-Plank. Then, the numerical model is introduced in order to solve the Fokker-Plank operator under the Rosenbluth form. At the end, several numerical tests are proposed. (TEC). 17 refs., 27 figs.

  13. Universal Rateless Codes From Coupled LT Codes

    CERN Document Server

    Aref, Vahid

    2011-01-01

    It was recently shown that spatial coupling of individual low-density parity-check codes improves the belief-propagation threshold of the coupled ensemble essentially to the maximum a posteriori threshold of the underlying ensemble. We study the performance of spatially coupled low-density generator-matrix ensembles when used for transmission over binary-input memoryless output-symmetric channels. We show by means of density evolution that the threshold saturation phenomenon also takes place in this setting. Our motivation for studying low-density generator-matrix codes is that they can easily be converted into rateless codes. Although there are already several classes of excellent rateless codes known to date, rateless codes constructed via spatial coupling might offer some additional advantages. In particular, by the very nature of the threshold phenomenon one expects that codes constructed on this principle can be made to be universal, i.e., a single construction can uniformly approach capacity over the cl...

  14. (Sigma-Delta) Codes

    OpenAIRE

    Boulagouaz, M.; Leroy, A

    2013-01-01

    In this paper we introduce the notion of cyclic ($f(t),\\sigma,\\delta$)-codes for $f(t)\\in \\Ore$. These codes generalize the $\\theta$-codes as introduced by D. Boucher, F. Ulmer, W. Geiselmann \\cite{BGU}. We construct generic and control matrices for these codes. As a particular case the ($\\si,\\de$)-$W$-code associated to a Wedderburn polynomial are defined and we show that their control matrices are given by generalized Vandermonde matrices. All the Wedderburn polynomials of $\\mathbb F_q[t;\\t...

  15. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Property testing was initially studied from various motivations in 1990’s. A code C  GF (r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector’s coordinates. The problem of testing codes was firstly studied by Blum, Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs). How to characterize locally testable codes is a complex and challenge problem. The local tests have been studied for Reed-Solomon (RS), Reed-Muller (RM), cyclic, dual of BCH and the trace subcode of algebraicgeometric codes. In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions). We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  16. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  17. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2009-01-01

    Property testing was initially studied from various motivations in 1990's.A code C (∩)GF(r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector's coordinates.The problem of testing codes was firstly studied by Blum,Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs).How to characterize locally testable codes is a complex and challenge problem.The local tests have been studied for Reed-Solomon (RS),Reed-Muller (RM),cyclic,dual of BCH and the trace subcode of algebraicgeometric codes.In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions).We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  18. Chinese remainder codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Aili; LIU Xiufeng

    2006-01-01

    Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory.The new type of linear codes take the congruence class in the congruence class ring R/I1 ∩ I2 ∩…∩ In for the information bit,embed R/Ji into R/I1 ∩ I2 ∩…∩ In,and assign the cosets of R/Ji as the subring of R/I1 ∩ I2 ∩…∩ In and the cosets of R/Ji in R/I1 ∩ I2 ∩…∩ In as check lines.Many code classes exist in the Chinese remainder codes that have high code rates.Chinese remainder codes are the essential generalization of Sun Zi codes.

  19. Chinese Remainder Codes

    Institute of Scientific and Technical Information of China (English)

    张爱丽; 刘秀峰; 靳蕃

    2004-01-01

    Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I1∩I2∩…∩In for the information bit, embed R/Ji into R/I1∩I2∩…∩In, and asssign the cosets of R/Ji as the subring of R/I1∩I2∩…∩In and the cosets of R/Ji in R/I1∩I2∩…∩In as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes.

  20. 75 FR 24323 - American Society of Mechanical Engineers (ASME) Codes and New and Revised ASME Code Cases

    Science.gov (United States)

    2010-05-04

    .... Mark Padovan, Office of Nuclear Reactor Regulation, U.S. Nuclear Regulatory Commission, Washington, DC... Code, Section XI f. ASME OM Code g. Reactor Coolant Pressure Boundary, Quality Group B Components, and... nuclear power plant components; and the ASME OM Code, which contains requirements for inservice...

  1. Light-water-reactor coupled neutronic and thermal-hydraulic codes

    International Nuclear Information System (INIS)

    An overview is presented of computer codes that model light water reactor cores with coupled neutronics and thermal-hydraulics. This includes codes for transient analysis and codes for steady state analysis which include fuel depletion and fission product buildup. Applications in nuclear design, reactor operations and safety analysis are given and the major codes in use in the USA are identified. The neutronic and thermal-hydraulic methodologies and other code features are outlined for three steady state codes (PDQ7, NODE-P/B and SIMULATE) and four dynamic codes (BNL-TWIGL, MEKIN, RAMONA-3B, RETRAN-02). Speculation as to future trends with such codes is also presented

  2. A Theoretical Method for Estimating Performance of Reed-Solomon Codes Concatenated with Orthogonal Space-Time Block Codes

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Based on the studies of Reed-Solomon codes and orthogonal space-time block codes over Rayleigh fading channel, a theoretical method for estimating performance of Reed-Solomon codes concatenated with orthogonal space-time block codes is presented in this paper. And an upper bound of the bit error rate is also obtained. It is shown through computer simulations that the signal-to-noise ratio reduces about 15 dB or more after orthogonal space-time block codes are concatenate with Reed-Solomon (15,6) codes over Rayleigh fading channel, when the bit error rate is 10-4.

  3. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions.......We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when...

  4. On Polynomial Remainder Codes

    CERN Document Server

    Yu, Jiun-Hung

    2012-01-01

    Polynomial remainder codes are a large class of codes derived from the Chinese remainder theorem that includes Reed-Solomon codes as a special case. In this paper, we revisit these codes and study them more carefully than in previous work. We explicitly allow the code symbols to be polynomials of different degrees, which leads to two different notions of weight and distance. Algebraic decoding is studied in detail. If the moduli are not irreducible, the notion of an error locator polynomial is replaced by an error factor polynomial. We then obtain a collection of gcd-based decoding algorithms, some of which are not quite standard even when specialized to Reed-Solomon codes.

  5. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation......Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...

  6. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  7. Intracoin - International Nuclide Transport Code Intercomparison Study

    International Nuclear Information System (INIS)

    The purpose of the project is to obtain improved knowledge of the influence of various strategies for radionuclide transport modelling for the safety assessment of final repositories for nuclear waste. This is a report of the first phase of the project which was devoted to a comparison of the numerical accuracy of the computer codes used in the study. The codes can be divided into five groups, namely advection-dispersion models, models including matrix diffusion and chemical effects and finally combined models. The results are presented as comparisons of calculations since the objective of level 1 was code verification. (G.B.)

  8. Security of QR Codes

    OpenAIRE

    Kapsalis, Ioannis

    2013-01-01

    The 2-dimensional barcodes known as QR (Quick Response) Codesare increasing their popularity as they appear in more places in theurban environment. QR Codes can be considered as physical hyper-linksthat give the ability to users to access, through their mobile devicesthat are able to scan QR Codes, additional information located in aweb-page. Apart from marketing, QR Codes have been also adopted indifferent areas such as the on-line payments. This development alongwith the trend that some of ...

  9. Practices in Code Discoverability

    OpenAIRE

    Teuben, Peter; Allen, Alice; Nemiroff, Robert J.; Shamir, Lior

    2012-01-01

    Much of scientific progress now hinges on the reliability, falsifiability and reproducibility of computer source codes. Astrophysics in particular is a discipline that today leads other sciences in making useful scientific components freely available online, including data, abstracts, preprints, and fully published papers, yet even today many astrophysics source codes remain hidden from public view. We review the importance and history of source codes in astrophysics and previous efforts to d...

  10. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  11. Progressive fractal coding

    OpenAIRE

    Kopilovic, Ivan; Saupe, Dietmar; Hamzaoui, Raouf

    2001-01-01

    Progressive coding is an important feature of compression schemes. Wavelet coders are well suited for this purpose because the wavelet coefficients can be naturally ordered according to decreasing importance. Progressive fractal coding is feasible, but it was proposed only for hybrid fractal-wavelet schemes. We introduce a progressive fractal image coder in the spatial domain. A Lagrange optimization based on rate-distortion performance estimates determines an optimal ordering of the code bit...

  12. Noise Feedback Coding Revisited: Refurbished Legacy Codecs and New Coding Models

    Institute of Scientific and Technical Information of China (English)

    Stephane Ragot; Balazs Kovesi; Alain Le Guyader

    2012-01-01

    Noise feedback coding (NFC) has attracted renewed interest with the recent standardization of backward-compatible enhancements for ITU-T G.711 and G.722. It has also been revisited with the emergence of proprietary speech codecs, such as BV16, BV32, and SILK, that have structures different from CELP coding. In this article, we review NFC and describe a novel coding technique that optimally shapes coding noise in embedded pulse-code modulation (PCM) and embedded adaptive differential PCM (ADPCM). We describe how this new technique was incorporated into the recent ITU-T G.711.1, G.711 App. III, and G.722 Annex B (G.722B) speech-coding standards.

  13. Tokamak Systems Code

    International Nuclear Information System (INIS)

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  14. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  15. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  16. CONSTRUCTION OF REGULAR LDPC LIKE CODES BASED ON FULL RANK CODES AND THEIR ITERATIVE DECODING USING A PARITY CHECK TREE

    Directory of Open Access Journals (Sweden)

    H. Prashantha Kumar

    2011-09-01

    Full Text Available Low density parity check (LDPC codes are capacity-approaching codes, which means that practical constructions exist that allow the noise threshold to be set very close to the theoretical Shannon limit for a memory less channel. LDPC codes are finding increasing use in applications like LTE-Networks, digital television, high density data storage systems, deep space communication systems etc. Several algebraic and combinatorial methods are available for constructing LDPC codes. In this paper we discuss a novel low complexity algebraic method for constructing regular LDPC like codes derived from full rank codes. We demonstrate that by employing these codes over AWGN channels, coding gains in excess of 2dB over un-coded systems can be realized when soft iterative decoding using a parity check tree is employed.

  17. Research on universal combinatorial coding.

    Science.gov (United States)

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value.

  18. CBP PHASE I CODE INTEGRATION

    Energy Technology Data Exchange (ETDEWEB)

    Smith, F.; Brown, K.; Flach, G.; Sarkar, S.

    2011-09-30

    The goal of the Cementitious Barriers Partnership (CBP) is to develop a reasonable and credible set of software tools to predict the structural, hydraulic, and chemical performance of cement barriers used in nuclear applications over extended time frames (greater than 100 years for operating facilities and greater than 1000 years for waste management). The simulation tools will be used to evaluate and predict the behavior of cementitious barriers used in near surface engineered waste disposal systems including waste forms, containment structures, entombments, and environmental remediation. These cementitious materials are exposed to dynamic environmental conditions that cause changes in material properties via (i) aging, (ii) chloride attack, (iii) sulfate attack, (iv) carbonation, (v) oxidation, and (vi) primary constituent leaching. A set of state-of-the-art software tools has been selected as a starting point to capture these important aging and degradation phenomena. Integration of existing software developed by the CBP partner organizations was determined to be the quickest method of meeting the CBP goal of providing a computational tool that improves the prediction of the long-term behavior of cementitious materials. These partner codes were selected based on their maturity and ability to address the problems outlined above. The GoldSim Monte Carlo simulation program (GTG 2010a, GTG 2010b) was chosen as the code integration platform (Brown & Flach 2009b). GoldSim (current Version 10.5) is a Windows based graphical object-oriented computer program that provides a flexible environment for model development (Brown & Flach 2009b). The linking of GoldSim to external codes has previously been successfully demonstrated (Eary 2007, Mattie et al. 2007). GoldSim is capable of performing deterministic and probabilistic simulations and of modeling radioactive decay and constituent transport. As part of the CBP project, a general Dynamic Link Library (DLL) interface was

  19. Code Generation = A* + BURS

    NARCIS (Netherlands)

    Nymeyer, A.; Katoen, J.P.; Westra, Y.; Alblas, H.; Gyimóthy, T.

    1996-01-01

    A system called BURS that is based on term rewrite systems and a search algorithm A* are combined to produce a code generator that generates optimal code. The theory underlying BURS is re-developed, formalised and explained in this work. The search algorithm uses a cost heuristic that is derived fro

  20. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alex

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  1. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  2. Codes of Conduct

    Science.gov (United States)

    Million, June

    2004-01-01

    Most schools have a code of conduct, pledge, or behavioral standards, set by the district or school board with the school community. In this article, the author features some schools that created a new vision of instilling code of conducts to students based on work quality, respect, safety and courtesy. She suggests that communicating the code…

  3. Code A1 Revised

    CERN Multimedia

    SC Secretariat

    2004-01-01

    Please note that the revised safety code A1 entitled 'MEDICAL CODE' is available on the web at the following url: https://edms.cern.ch/document/335476/last_released Paper copies can also be obtained from the SC Secretariat, e-mail : sc.secretariat@cern.ch SC Secretariat

  4. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  5. Computerized mega code recording.

    Science.gov (United States)

    Burt, T W; Bock, H C

    1988-04-01

    A system has been developed to facilitate recording of advanced cardiac life support mega code testing scenarios. By scanning a paper "keyboard" using a bar code wand attached to a portable microcomputer, the person assigned to record the scenario can easily generate an accurate, complete, timed, and typewritten record of the given situations and the obtained responses. PMID:3354937

  6. READING A NEURAL CODE

    NARCIS (Netherlands)

    BIALEK, W; RIEKE, F; VANSTEVENINCK, RRD; WARLAND, D

    1991-01-01

    Traditional approaches to neural coding characterize the encoding of known stimuli in average neural responses. Organisms face nearly the opposite task - extracting information about an unknown time-dependent stimulus from short segments of a spike train. Here the neural code was characterized from

  7. AZIMUT code abstract

    International Nuclear Information System (INIS)

    The brief description of the AZIMUT code for calculation the neutron flux in a cluster cell is presented. Code takes into account 1 and 2 azimuthal harmonics in the one-group P3-approximation and uses the heterogeneous approach. 2 refs

  8. FPGA Design and Implementation of Convolution Code and Viterbi Decoder in Std 802.11b%802.11b中卷积码和Viterbi译码的FPGA设计实现

    Institute of Scientific and Technical Information of China (English)

    元锋刚; 许海涛

    2012-01-01

    Convolutional coding is one of the important channel error-correction coding methods, and usually its error-correction performance is superior to the block code. At present, (2,1,6) convolutional code is widely applied in wireless communication systems. Viterbi algorithm could achieve the best decoding performance of convolutional codes. The encoding and decoding methods of convolution codes in Std 802. llh are explained. Then, the design of encoder and decoder are presented and implemented in FPGA by the use of Verilog HDL. With a logical analyzer, the debugging of the design is conducted on the EP2CST144C8 chip.%卷积码是一种重要的信道纠错编码方式,其纠错性能通常优于分组码,目前(2,1,6)卷积码已广泛应用于无线通信系统中,Viterbi译码算法能最大限度地发挥卷积码的纠错性能。阐述了802.11b中卷积码的编码及其Viterbi译码方法,给出了编译码器的设计方法,并利用Verilog HDL硬件描述语言完成编译码器的FPGA实现。使用逻辑分析仪,在EP2C5T144C8芯片上完成了编译码器的硬件调试。

  9. Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Berriman, Bruce; Hanisch, Robert J; Mink, Jessica; Teuben, Peter J

    2012-01-01

    The Astrophysics Source Code Library (ASCL), founded in 1999, is a free on-line registry for source codes of interest to astronomers and astrophysicists. The library is housed on the discussion forum for Astronomy Picture of the Day (APOD) and can be accessed at http://ascl.net. The ASCL has a comprehensive listing that covers a significant number of the astrophysics source codes used to generate results published in or submitted to refereed journals and continues to grow. The ASCL currently has entries for over 500 codes; its records are citable and are indexed by ADS. The editors of the ASCL and members of its Advisory Committee were on hand at a demonstration table in the ADASS poster room to present the ASCL, accept code submissions, show how the ASCL is starting to be used by the astrophysics community, and take questions on and suggestions for improving the resource.

  10. Fracture flow code

    International Nuclear Information System (INIS)

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  11. Combustion chamber analysis code

    Science.gov (United States)

    Przekwas, A. J.; Lai, Y. G.; Krishnan, A.; Avva, R. K.; Giridharan, M. G.

    1993-05-01

    A three-dimensional, time dependent, Favre averaged, finite volume Navier-Stokes code has been developed to model compressible and incompressible flows (with and without chemical reactions) in liquid rocket engines. The code has a non-staggered formulation with generalized body-fitted-coordinates (BFC) capability. Higher order differencing methodologies such as MUSCL and Osher-Chakravarthy schemes are available. Turbulent flows can be modeled using any of the five turbulent models present in the code. A two-phase, two-liquid, Lagrangian spray model has been incorporated into the code. Chemical equilibrium and finite rate reaction models are available to model chemically reacting flows. The discrete ordinate method is used to model effects of thermal radiation. The code has been validated extensively against benchmark experimental data and has been applied to model flows in several propulsion system components of the SSME and the STME.

  12. Transformation invariant sparse coding

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard

    2011-01-01

    Sparse coding is a well established principle for unsupervised learning. Traditionally, features are extracted in sparse coding in specific locations, however, often we would prefer invariant representation. This paper introduces a general transformation invariant sparse coding (TISC) model....... The model decomposes images into features invariant to location and general transformation by a set of specified operators as well as a sparse coding matrix indicating where and to what degree in the original image these features are present. The TISC model is in general overcomplete and we therefore invoke...... sparse coding to estimate its parameters. We demonstrate how the model can correctly identify components of non-trivial artificial as well as real image data. Thus, the model is capable of reducing feature redundancies in terms of pre-specified transformations improving the component identification....

  13. Application of RS Codes in Decoding QR Code

    Institute of Scientific and Technical Information of China (English)

    Zhu Suxia(朱素霞); Ji Zhenzhou; Cao Zhiyan

    2003-01-01

    The QR Code is a 2-dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code's virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm.

  14. Report number codes

    International Nuclear Information System (INIS)

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  15. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity in the net...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof.......Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...

  16. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  17. TVD: Total Variation Diminishing code

    Science.gov (United States)

    Pen, Ue-Li; Arras, Phil; Wong, ShingKwong

    2013-04-01

    TVD solves the magnetohydrodynamic (MHD) equations by updating the fluid variables along each direction using the flux-conservative, second-order, total variation diminishing (TVD), upwind scheme of Jin & Xin. The magnetic field is updated separately in two-dimensional advection-constraint steps. The electromotive force (EMF) is computed in the advection step using the TVD scheme, and this same EMF is used immediately in the constraint step in order to preserve \\Downtriangle B=0 without the need to store intermediate fluxes. The code is extended to three dimensions using operator splitting, and Runge-Kutta is used to get second-order accuracy in time. TVD offers high-resolution per grid cell, second-order accuracy in space and time, and enforcement of the \\Downtriangle B=0 constraint to machine precision. Written in Fortran, It has no memory overhead and is fast. It is also available in a fully scalable message-passing parallel MPI implementation.

  18. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  19. FORIST unfolding code

    International Nuclear Information System (INIS)

    The FERDOR method is widely used to unfold neutron energy spectra from pulse-height distributions measured with NE-213 spectrometers. Two unfolding codes COOLC (developed at ORNL) and FORIST (modified version of COOLC developed at UIUC) implement the FERDOR method and are distributed by RSIC. Each code package contains an NE-213 response matrix, sample input data, and sample output. The smoothing (window) widths which are distributed with COOLC are not the most appropriate for all neutron spectrum measurements. The FORIST code determines an optimum set of window widths according to the desired statistical error in the smoothed spectrum

  20. Classical Holographic Codes

    CERN Document Server

    Brehm, Enrico M

    2016-01-01

    In this work, we introduce classical holographic codes. These can be understood as concatenated probabilistic codes and can be represented as networks uniformly covering hyperbolic space. In particular, classical holographic codes can be interpreted as maps from bulk degrees of freedom to boundary degrees of freedom. Interestingly, they are shown to exhibit features similar to those expected from the AdS/CFT correspondence. Among these are a version of the Ryu-Takayanagi formula and intriguing properties regarding bulk reconstruction and boundary representations of bulk operations. We discuss the relation of our findings with expectations from AdS/CFT and, in particular, with recent results from quantum error correction.

  1. Distributed multiple description coding

    CERN Document Server

    Bai, Huihui; Zhao, Yao

    2011-01-01

    This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC,

  2. Laser propagation code study

    OpenAIRE

    Rockower, Edward B.

    1985-01-01

    A number of laser propagation codes have been assessed as to their suitability for modeling Army High Energy Laser (HEL) weapons used in an anti- sensor mode. We identify a number of areas in which systems analysis HEL codes are deficient. Most notably, available HEL scaling law codes model the laser aperture as circular, possibly with a fixed (e.g. 10%) obscuration. However, most HELs have rectangular apertures with up to 30% obscuration. We present a beam-quality/aperture shape scaling rela...

  3. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  4. Der Code der Transparenz

    OpenAIRE

    Alloa, Emmanuel

    2015-01-01

    In allen Bereichen der Gesellschaft werden gegenwärtig Forderungen nach mehr Transparenz laut. Was steht hinter diesem Wort? Für Emmanuel Alloa wohnt der Transparenzforderung die Paradoxie inne, ein "codefreier Code" sein zu wollen.

  5. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  6. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  7. Code-Pointer Integrity

    OpenAIRE

    Volodymyr Kuznetsov; Laszlo Szekeres; Mathias Payer; George Candea; Sekar, R.; Dawn Song

    2014-01-01

    Systems code is often written in low-level languages like C/C++, which offer many benefits but also delegate memory management to programmers. This invites memory safety bugs that attackers can exploit to divert control flow and compromise the system. Deployed defense mechanisms (e.g., ASLR, DEP) are incomplete, and stronger defense mechanisms (e.g., CFI) often have high overhead and limited guarantees [19, 15, 9]. We introduce code-pointer integrity (CPI), a new design point that guarantees...

  8. Secure Fractal Image Coding

    OpenAIRE

    Lian, Shiguo

    2007-01-01

    In recent work, various fractal image coding methods are reported, which adopt the self-similarity of images to compress the size of images. However, till now, no solutions for the security of fractal encoded images have been provided. In this paper, a secure fractal image coding scheme is proposed and evaluated, which encrypts some of the fractal parameters during fractal encoding, and thus, produces the encrypted and encoded image. The encrypted image can only be recovered by the correct ke...

  9. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  10. Coding of auditory space

    OpenAIRE

    Konishi­, Masakazu

    2003-01-01

    Behavioral, anatomical, and physiological approaches can be integrated in the study of sound localization in barn owls. Space representation in owls provides a useful example for discussion of place and ensemble coding. Selectivity for space is broad and ambiguous in low-order neurons. Parallel pathways for binaural cues and for different frequency bands converge on high-order space-specific neurons, which encode space more precisely. An ensemble of broadly tuned place-coding neurons may conv...

  11. Differential modulation based on space-time block codes

    Institute of Scientific and Technical Information of China (English)

    李正权; 胡光锐

    2004-01-01

    A differential modulation scheme using space-time block codes is put forward. Compared with other schemes,our scheme has lower computational complexity and has a simpler decoder. In the case of three or four transmitter antennas, our scheme has a higher rate a higher coding gain and a lower bit error rate for a given rate. Then we made simulations for space-time block codes as well as group codes in the case of two, three, four and five transmit antennas. The simulations prove that using two transmit antennas, one receive antenna and code rate of 4 bits/s/Hz, the differential STBC method outperform the differential group codes method by 4 dB. Useing three, four and five transmit antennas,one receive antenna, and code rate of 3 bits/s/Hz are adopted, the differential STBC method outperform the differential group codes method by 5 dB, 6.5 dB and 7 dB, respectively. In other words, the differential modulation scheme based on space-time block code is better than the corresponding differential modulation scheme

  12. KENO-V code

    International Nuclear Information System (INIS)

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  13. Irregular and regular LDPC codes with high spectrum efficiency modulation in image transmission over fading channel

    Institute of Scientific and Technical Information of China (English)

    Ma Piming; Yuan Dongfeng

    2005-01-01

    If the degree distribution is chosen carefully, the irregular low-density parity-check (LDPC) codes can outperform the regular ones. An image transmission system is proposed by combining regular and irregular LDPC codes with 16QAM/64QAM modulation to improve both efficiency and reliability. Simulaton results show that LDPC codes are good coding schemes over fading channel in image communication with lower system complexity. More over, irregular codes can obtain a code gain of about 0.7 dB compared with regular ones when BER is 10-4. So the irregular LDPC codes are more suitable for image transmission than the regular codes.

  14. Computer codes in particle transport physics

    International Nuclear Information System (INIS)

    Simulation of transport and interaction of various particles in complex media and wide energy range (from 1 MeV up to 1 TeV) is very complicated problem that requires valid model of a real process in nature and appropriate solving tool - computer code and data library. A brief overview of computer codes based on Monte Carlo techniques for simulation of transport and interaction of hadrons and ions in wide energy range in three dimensional (3D) geometry is shown. Firstly, a short attention is paid to underline the approach to the solution of the problem - process in nature - by selection of the appropriate 3D model and corresponding tools - computer codes and cross sections data libraries. Process of data collection and evaluation from experimental measurements and theoretical approach to establishing reliable libraries of evaluated cross sections data is Ion g, difficult and not straightforward activity. For this reason, world reference data centers and specialized ones are acknowledged, together with the currently available, state of art evaluated nuclear data libraries, as the ENDF/B-VI, JEF, JENDL, CENDL, BROND, etc. Codes for experimental and theoretical data evaluations (e.g., SAMMY and GNASH) together with the codes for data processing (e.g., NJOY, PREPRO and GRUCON) are briefly described. Examples of data evaluation and data processing to generate computer usable data libraries are shown. Among numerous and various computer codes developed in transport physics of particles, the most general ones are described only: MCNPX, FLUKA and SHIELD. A short overview of basic application of these codes, physical models implemented with their limitations, energy ranges of particles and types of interactions, is given. General information about the codes covers also programming language, operation system, calculation speed and the code availability. An example of increasing computation speed of running MCNPX code using a MPI cluster compared to the code sequential option

  15. Accumulative Landings System Code Tables

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Code Tables Used In Landings System. These tables assign meanings to the codes that appear in the data tables. Code tables exist for species, gear, state, county,...

  16. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes.......Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  17. Algebraic geometric codes with applications

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2007-01-01

    The theory of linear error-correcting codes from algebraic geomet-ric curves (algebraic geometric (AG) codes or geometric Goppa codes) has been well-developed since the work of Goppa and Tsfasman, Vladut, and Zink in 1981-1982. In this paper we introduce to readers some recent progress in algebraic geometric codes and their applications in quantum error-correcting codes, secure multi-party computation and the construction of good binary codes.

  18. Staircase Codes: FEC for 100 Gb/s OTN

    CERN Document Server

    Smith, Benjamin P; Hunt, Andrew; Kschischang, Frank R; Lodge, John

    2012-01-01

    Staircase codes, a new class of forward-error-correction (FEC) codes suitable for high-speed optical communications, are introduced. An ITU-T G.709-compatible staircase code with rate R=239/255 is proposed, and FPGA-based simulation results are presented, exhibiting a net coding gain (NCG) of 9.41 dB at an output error rate of 1E-15, an improvement of 0.42 dB relative to the best code from the ITU-T G.975.1 recommendation. An error floor analysis technique is presented, and the proposed code is shown to have an error floor at 4.0E-21.

  19. SRAC2006: A comprehensive neutronics calculation code system

    International Nuclear Information System (INIS)

    The SRAC is a code system applicable to neutronics analysis of a variety of reactor types. Since the publication of the second version of the users manual (JAERI-1302) in 1986 for the SRAC system, a number of additions and modifications to the functions and the library data have been made to establish a comprehensive neutronics code system. The current system includes major neutron data libraries (JENDL-3.3, JENDL-3.2, ENDF/B-VII, ENDF/B-VI.8, JEFF-3.1, JEF-2.2, etc.), and integrates five elementary codes for neutron transport and diffusion calculation; PIJ based on the collision probability method applicable to 16 kind of lattice models, SN transport codes ANISN(1D) and TWOTRN(2D), diffusion codes TUD(1D) and CITATION(multi-D). The system also includes an auxiliary code COREBN for multi-dimensional core burn-up calculation. (author)

  20. The EGS5 Code System

    Energy Technology Data Exchange (ETDEWEB)

    Hirayama, Hideo; Namito, Yoshihito; /KEK, Tsukuba; Bielajew, Alex F.; Wilderman, Scott J.; U., Michigan; Nelson, Walter R.; /SLAC

    2005-12-20

    , a deliberate attempt was made to present example problems in order to help the user ''get started'', and we follow that spirit in this report. A series of elementary tutorial user codes are presented in Chapter 3, with more sophisticated sample user codes described in Chapter 4. Novice EGS users will find it helpful to read through the initial sections of the EGS5 User Manual (provided in Appendix B of this report), proceeding then to work through the tutorials in Chapter 3. The User Manuals and other materials found in the appendices contain detailed flow charts, variable lists, and subprogram descriptions of EGS5 and PEGS. Included are step-by-step instructions for developing basic EGS5 user codes and for accessing all of the physics options available in EGS5 and PEGS. Once acquainted with the basic structure of EGS5, users should find the appendices the most frequently consulted sections of this report.

  1. Long Non-Coding RNA (LncRNA) Urothelial Carcinoma Associated 1 (UCA1) Increases Multi-Drug Resistance of Gastric Cancer via Downregulating miR-27b

    Science.gov (United States)

    Fang, Qun; Chen, XiaoYan; Zhi, XuTing

    2016-01-01

    Background In this study, we aimed to investigate the association between UCA1 and miR-27b in gastric cancer and further study their involvement in multi-drug resistance (MDR) of gastric cancer. Material/Methods The microarray data of dysregulated lncRNAs in gastric cancer tissues was retrieved in the GEO dataset. QRT-PCR analysis was performed to assess UCA1 expression based on 28 paired cancerous and peritumoral normal tissues. The human gastric cancer cell line SGC-7901, and SGC-7901 derived Adriamycin (doxorubicin) resistant SGC-7901/ADR, cisplatin resistant SGC-7901/DDP, and 5-FU resistant SGC-7901/FU cells were used as in vitro cell models to assess the effect of UCA1 and miR-27b on MDR. Results UCA1 was significantly upregulated in the cancerous tissues and its expression was negatively correlated with miR-27b expression level. Inhibition of UCA1 significantly restored miR-27b expression in MDR gastric cancer cells. UCA1 knockdown and miR-27b overexpression reduced IC50 of ADR, DDP, and 5-FU in SGC-7901/ADR cells and increased ADR induced cell apoptosis. UCA1 overexpression and miR-27b inhibition increased the IC50 of ADR, DDP, and 5-FU in SGC-7901 cells and reduced ADR induced cell apoptosis. Western blot analysis showed that UCA1 knockdown and miR-27b overexpression also decreased anti-apoptotic protein BCL-2 and increased apoptotic protein cleaved caspase-3. Conclusions UCA1 is negatively correlated with miR-27b expression in gastric cancer tissue. Knockdown of UCA1 restored miR-27b expression in gastric cancer cells. The UCA1-miR-27b axis was involved in regulation of chemosensitivity of gastric cancer cells. PMID:27694794

  2. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  3. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    that are subcodes of the binary Reed-Muller codes and can be very simply instrumented, 3) a new class of constacyclic codes that are subcodes of thep-ary "Reed-Muller codes," 4) two new classes of binary convolutional codes with large "free distance" derived from known binary cyclic codes, 5) two new classes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm....

  4. Error coding simulations

    Science.gov (United States)

    Noble, Viveca K.

    1993-01-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  5. Physical Layer Network Coding

    CERN Document Server

    Shengli, Zhang; Lam, Patrick P K

    2007-01-01

    A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to straightforward network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM) waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increase...

  6. The TESS [Tandem Experiment Simulation Studies] computer code user's manual

    International Nuclear Information System (INIS)

    TESS (Tandem Experiment Simulation Studies) is a one-dimensional, bounded particle-in-cell (PIC) simulation code designed to investigate the confinement and transport of plasma in a magnetic mirror device, including tandem mirror configurations. Mirror plasmas may be modeled in a system which includes an applied magnetic field and/or a self-consistent or applied electrostatic potential. The PIC code TESS is similar to the PIC code DIPSI (Direct Implicit Plasma Surface Interactions) which is designed to study plasma transport to and interaction with a solid surface. The codes TESS and DIPSI are direct descendants of the PIC code ES1 that was created by A. B. Langdon. This document provides the user with a brief description of the methods used in the code and a tutorial on the use of the code. 10 refs., 2 tabs

  7. cDNA cloning and transient expression of the Epstein-Barr virus-determined nuclear antigen EBNA3B in human cells and identification of novel transcripts from its coding region.

    OpenAIRE

    Kerdiles, B; Walls, D; Triki, H.; Perricaudet, M; Joab, I

    1990-01-01

    Recombinant plasmids containing sequences from the BamHI-E rightward reading frames 2a and 2b (BERF2a and 2b) of the Epstein-Barr virus (EBV) genome were isolated from a library of cDNA clones which had been previously made from the EBV B95-8 lymphoblastoid cell line (M. Bodescot, O. Brison, and M. Perricaudet, Nucleic Acids Res. 14:7103-7114, 1986). The characterization of these clones in combination with RNase mapping experiments led to the identification of one leftward and several rightwa...

  8. Nested Quantum Error Correction Codes

    CERN Document Server

    Wang, Zhuo; Fan, Hen; Vedral, Vlatko

    2009-01-01

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  9. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes and...

  10. Phase-coded pulse aperiodic transmitter coding

    Directory of Open Access Journals (Sweden)

    I. I. Virtanen

    2009-07-01

    Full Text Available Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC, whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF. When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers – about seven milliseconds – whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  11. 19 CFR 142.45 - Use of bar code by entry filer.

    Science.gov (United States)

    2010-04-01

    ... filer and a product description below the bar code. (b) Multiple commodity processing. Multiple... variable allowed. The commodities should be listed on one invoice with C-4 Code labels for each...

  12. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  13. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  14. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  15. WAVELET-BASED FINE GRANULARITY SCALABLE VIDEO CODING

    Institute of Scientific and Technical Information of China (English)

    Zhang Jiangshan; Zhu Guangxi

    2003-01-01

    This letter proposes an efficient wavelet-based Fine Granularity Scalable (FGS)coding scheme, where the base layer is encoded with a newly designed wavelet-based coder, and the enhancement layer is encoded with Progressive Fine Granularity Scalable (PFGS) coding.This algorithm involves multi-frame motion compensation, rate-distortion optimizing strategy with Lagrangian cost function and context-based adaptive arithmetic coding. In order to improve efficiency of the enhancement layer coding, an improved motion estimation scheme that uses both information from the base layer and the enhancement layer is also proposed in this letter. The wavelet-based coder significantly improves the coding efficiency of the base layer compared with MPEG-4 ASP (Advanced Simple Profile) and H.26L TML9. The PFGS coding is a significant improvement over MPEG-4 FGS coding at the enhancement layer. Experiments show that single layer coding efficiency gain of the proposed scheme is about 2.0-3.0dB and 0.3-1.0dB higher than that of MPEG-4 ASP and H.26L TML9, respectively. The overall coding efficiency gain of the proposed scheme is about 4.0-5.0dB higher than that of MPEG-4 FGS.

  16. Criticality benchmarks validation of the Monte Carlo code TRIPOLI-2

    Energy Technology Data Exchange (ETDEWEB)

    Maubert, L. (Commissariat a l' Energie Atomique, Inst. de Protection et de Surete Nucleaire, Service d' Etudes de Criticite, 92 - Fontenay-aux-Roses (France)); Nouri, A. (Commissariat a l' Energie Atomique, Inst. de Protection et de Surete Nucleaire, Service d' Etudes de Criticite, 92 - Fontenay-aux-Roses (France)); Vergnaud, T. (Commissariat a l' Energie Atomique, Direction des Reacteurs Nucleaires, Service d' Etudes des Reacteurs et de Mathematique Appliquees, 91 - Gif-sur-Yvette (France))

    1993-04-01

    The three-dimensional energy pointwise Monte-Carlo code TRIPOLI-2 includes metallic spheres of uranium and plutonium, nitrate plutonium solutions, square and triangular pitch assemblies of uranium oxide. Results show good agreements between experiments and calculations, and avoid a part of the code and its ENDF-B4 library validation. (orig./DG)

  17. Code-Mixing as a Bilingual Instructional Strategy

    Science.gov (United States)

    Jiang, Yih-Lin Belinda; García, Georgia Earnest; Willis, Arlette Ingram

    2014-01-01

    This study investigated code-mixing practices, specifically the use of L2 (English) in an L1 (Chinese) class in a U.S. bilingual program. Our findings indicate that the code-mixing practices made and prompted by the teacher served five pedagogical functions: (a) to enhance students' bilingualism and bilingual learning, (b) to review and…

  18. Aeroacoustic Prediction Codes

    Science.gov (United States)

    Gliebe, P; Mani, R.; Shin, H.; Mitchell, B.; Ashford, G.; Salamah, S.; Connell, S.; Huff, Dennis (Technical Monitor)

    2000-01-01

    This report describes work performed on Contract NAS3-27720AoI 13 as part of the NASA Advanced Subsonic Transport (AST) Noise Reduction Technology effort. Computer codes were developed to provide quantitative prediction, design, and analysis capability for several aircraft engine noise sources. The objective was to provide improved, physics-based tools for exploration of noise-reduction concepts and understanding of experimental results. Methods and codes focused on fan broadband and 'buzz saw' noise and on low-emissions combustor noise and compliment work done by other contractors under the NASA AST program to develop methods and codes for fan harmonic tone noise and jet noise. The methods and codes developed and reported herein employ a wide range of approaches, from the strictly empirical to the completely computational, with some being semiempirical analytical, and/or analytical/computational. Emphasis was on capturing the essential physics while still considering method or code utility as a practical design and analysis tool for everyday engineering use. Codes and prediction models were developed for: (1) an improved empirical correlation model for fan rotor exit flow mean and turbulence properties, for use in predicting broadband noise generated by rotor exit flow turbulence interaction with downstream stator vanes: (2) fan broadband noise models for rotor and stator/turbulence interaction sources including 3D effects, noncompact-source effects. directivity modeling, and extensions to the rotor supersonic tip-speed regime; (3) fan multiple-pure-tone in-duct sound pressure prediction methodology based on computational fluid dynamics (CFD) analysis; and (4) low-emissions combustor prediction methodology and computer code based on CFD and actuator disk theory. In addition. the relative importance of dipole and quadrupole source mechanisms was studied using direct CFD source computation for a simple cascadeigust interaction problem, and an empirical combustor

  19. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  20. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  1. Digital color acquisition, perception, coding and rendering

    CERN Document Server

    Fernandez-Maloigne, Christine; Macaire, Ludovic

    2013-01-01

    In this book the authors identify the basic concepts and recent advances in the acquisition, perception, coding and rendering of color. The fundamental aspects related to the science of colorimetry in relation to physiology (the human visual system) are addressed, as are constancy and color appearance. It also addresses the more technical aspects related to sensors and the color management screen. Particular attention is paid to the notion of color rendering in computer graphics. Beyond color, the authors also look at coding, compression, protection and quality of color images and videos.<b

  2. Pragmatic Approach to Adaptive Turbo Coded Modulation

    Institute of Scientific and Technical Information of China (English)

    左健存; 宋文涛; 罗汉文; 徐友云

    2003-01-01

    This paper presents a pragmatic adaptive scheme for TuCM over slowly fading channels. The adaptive scheme employs a single turbo coded modulator composed of a variable-rate turbo encoder and a variable-rate variable-power MQAM for all fading regions, so it has an acceptable complexity to implement. The optimal adaptive TuCM scheme is determined subject to various system constraints. Simulations have been performed to measure the performance of the scheme for different parameters. It is shown that adopting both the turbo coded modulator and the transmit power achieves a performance within 2.5 dB of the fading channel capacity.

  3. New code match strategy for wideband code division multiple access code tree management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%.

  4. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi;

    2015-01-01

    as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  5. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  6. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause...

  7. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  8. On Asymmetric Quantum MDS Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Ling, San

    2010-01-01

    Assuming the validity of the MDS Conjecture, the weight distribution of all MDS codes is known. Using a recently-established characterization of asymmetric quantum error-correcting codes, linear MDS codes can be used to construct asymmetric quantum MDS codes with $d_{z} \\geq d_{x}\\geq 2$ for all possible values of length $n$ for which linear MDS codes over $\\F_{q}$ are known to exist.

  9. Analysis of the optimality of the standard genetic code.

    Science.gov (United States)

    Kumar, Balaji; Saini, Supreet

    2016-07-19

    Many theories have been proposed attempting to explain the origin of the genetic code. While strong reasons remain to believe that the genetic code evolved as a frozen accident, at least for the first few amino acids, other theories remain viable. In this work, we test the optimality of the standard genetic code against approximately 17 million genetic codes, and locate 29 which outperform the standard genetic code at the following three criteria: (a) robustness to point mutation; (b) robustness to frameshift mutation; and (c) ability to encode additional information in the coding region. We use a genetic algorithm to generate and score codes from different parts of the associated landscape, which are, as a result, presumably more representative of the entire landscape. Our results show that while the genetic code is sub-optimal for robustness to frameshift mutation and the ability to encode additional information in the coding region, it is very strongly selected for robustness to point mutation. This coupled with the observation that the different performance indicator scores for a particular genetic code are negatively correlated makes the standard genetic code nearly optimal for the three criteria tested in this work. PMID:27327359

  10. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study inclu...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 4.2 Affine variety codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 4.3 Some Gr¨obner basis theoretical tools . . . . . . . . . . . . . . . . . . . . . . . 155 4.4 A bound on the minimum distance of C(I,L) . . . . . . . . . . . . . . . . . . 157 4.5 The Feng-Rao bound...... for C(I,L)? . . . . . . . . . . . . . . . . . . . . . . . . 160 4.6 Using weighted degree orderings . . . . . . . . . . . . . . . . . . . . . . . . . 163 4.7 The order domain conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 4.8 Weight functions and order domains...

  11. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...

  12. Recent developments in the CONTAIN-LMR code

    International Nuclear Information System (INIS)

    Through an international collaborative effort, a special version of the CONTAIN code is being developed for integrated mechanistic analysis of the conditions in liquid metal reactor (LMR) containments during severe accidents. The capabilities of the most recent code version, CONTAIN LMR/1B-Mod.1, are discussed. These include new models for the treatment of two condensables, sodium condensation on aerosols, chemical reactions, hygroscopic aerosols, and concrete outgassing. This code version also incorporates all of the previously released LMR model enhancements. The results of an integral demonstration calculation of a sever core-melt accident scenario are given to illustrate the features of this code version. 11 refs., 7 figs., 1 tab

  13. Present state of the SOURCES computer code

    Energy Technology Data Exchange (ETDEWEB)

    Shores, E. F. (Erik F.)

    2002-01-01

    In various stages of development for over two decades, the SOURCES computer code continues to calculate neutron production rates and spectra from four types of problems: homogeneous media, two-region interfaces, three-region interfaces and that of a monoenergetic alpha particle beam incident on a slab of target material. Graduate work at the University of Missouri - Rolla, in addition to user feedback from a tutorial course, provided the impetus for a variety of code improvements. Recently upgraded to version 4B, initial modifications to SOURCES focused on updates to the 'tape5' decay data library. Shortly thereafter, efforts focused on development of a graphical user interface for the code. This paper documents the Los Alamos SOURCES Tape1 Creator and Library Link (LASTCALL) and describes additional library modifications in more detail. Minor improvements and planned enhancements are discussed.

  14. Implementation Of Decoders for LDPC Block Codes and LDPC Convolutional Codes Based on GPUs

    CERN Document Server

    Zhao, Yue

    2012-01-01

    With the use of belief propagation (BP) decoding algorithm, low-density parity-check (LDPC) codes can achieve near-Shannon limit performance. LDPC codes can accomplish bit error rates (BERs) as low as $10^{-15}$ even at a small bit-energy-to-noise-power-spectral-density ratio ($E_{b}/N_{0}$). In order to evaluate the error performance of LDPC codes, simulators running on central processing units (CPUs) are commonly used. However, the time taken to evaluate LDPC codes with very good error performance is excessive. For example, assuming 30 iterations are used in the decoder, our simulation results have shown that it takes a modern CPU more than 7 days to arrive at a BER of 10^{-6} for a code with length 18360. In this paper, efficient LDPC block-code decoders/simulators which run on graphics processing units (GPUs) are proposed. Both standard BP decoding algorithm and layered decoding algorithm are used. We also implement the decoder for the LDPC convolutional codes (LDPCCC). The LDPCCC is derived from a pre-de...

  15. Code-switching in letter writing

    Directory of Open Access Journals (Sweden)

    P.S. Sobahle

    2013-02-01

    Full Text Available The study sets out to investigate code switching in letter writing among a small group ofXhosa speaking people. Code switching is found in informal speech and informal writing. It was established from the data that the closer people are, the more code switching there is. Code switching seems to follow a pattern in that it was observed to occur: (a only with certain people (b when talking about certain topics (c when wanting to exclude another person (d when emphasising a point. Code switching also appears to have a 'grammar' of its own. It is not in any way a pidgin. It is clear from the data that code switching does not reflect denial of one's identity. English, being the medium of education for Blacks in South Africa, is therefore bound to be reflected not only in their speech but also in their writing. Die studie het ten doe/ om registeroorskakeling in die skryf van briewe deur 'n klein groepie Xhosasprekendes te ondersoek. Registeroorskakeling word gevind in informele spraak en informele skryfwerk. Daar is uit die data vasgestel dat hoe intiemer mense is hoe meer vind registeroorskakeling plaas. Volgens waarneming blyk dit dat registeroorskakeling 'n patroon volg, want dit het voorgekom: (a net by sekere mense (b wanneer oor sekere onderwerpe gepraat is (c wanneer 'n ander per soon uitgeskakel is (d wanneer 'n mening beklemtoon is. Registeroorskakeling blyk 'n eie grammatika te he. Dit is geensins "pidgin" nie. Dit blyk uit data dat die skrywer se identiteit nie verlore raak tydens registeroorskakeling nie. Omdat Engels die medium van onderrig vir Swartes in Suid-Afrika is, sal dit noodwendig nie net in hulle spraak nie, maar ook in hul skryfwerk gereflekteer word.

  16. Software verification and validation plan for the GWSCREEN code

    International Nuclear Information System (INIS)

    The purpose of this Software Verification and Validation Plan (SVVP) is to prescribe steps necessary to verify and validate the GWSCREEN code, version 2.0 to Quality Level B standards. GWSCREEN output is to be verified and validated by comparison with hand calculations, and by output from other Quality Level B computer codes. Verification and validation will also entail performing static and dynamic tests on the code using several analysis tools. This approach is consistent with guidance in the ANSI/ANS-10.4-1987, open-quotes Guidelines for Verification and Validation of Scientific and Engineering Computer Programs for the Nuclear Industry.close quotes

  17. Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes

    CERN Document Server

    Senger, Christian; Bossert, Martin; Zyablov, Victor

    2008-01-01

    Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one...

  18. On network coding for acyclic networks with delays

    CERN Document Server

    Prasad, K

    2011-01-01

    Problems related to network coding for acyclic, instantaneous networks (where the edges of the acyclic graph representing the network are assumed to have zero-delay) have been extensively dealt with in the recent past. The most prominent of these problems include (a) the existence of network codes that achieve maximum rate of transmission, (b) efficient network code constructions, and (c) field size issues. In practice, however, networks have transmission delays. In network coding theory, such networks with transmission delays are generally abstracted by assuming that their edges have integer delays. Note that using enough memory at the nodes of an acyclic network with integer delays can effectively simulate instantaneous behavior, which is probably why only acyclic instantaneous networks have been primarily focused on thus far. In this work, we elaborate on issues ((a), (b) and (c) above) related to network coding for acyclic networks with integer delays, which have till now been overlooked. We show that the...

  19. CTI Correction Code

    Science.gov (United States)

    Massey, Richard; Stoughton, Chris; Leauthaud, Alexie; Rhodes, Jason; Koekemoer, Anton; Ellis, Richard; Shaghoulian, Edgar

    2013-07-01

    Charge Transfer Inefficiency (CTI) due to radiation damage above the Earth's atmosphere creates spurious trailing in images from Charge-Coupled Device (CCD) imaging detectors. Radiation damage also creates unrelated warm pixels, which can be used to measure CTI. This code provides pixel-based correction for CTI and has proven effective in Hubble Space Telescope Advanced Camera for Surveys raw images, successfully reducing the CTI trails by a factor of ~30 everywhere in the CCD and at all flux levels. The core is written in java for speed, and a front-end user interface is provided in IDL. The code operates on raw data by returning individual electrons to pixels from which they were unintentionally dragged during readout. Correction takes about 25 minutes per ACS exposure, but is trivially parallelisable to multiple processors.

  20. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  1. Sinusoidal transform coding

    Science.gov (United States)

    Mcaulay, Robert J.; Quatieri, Thomas F.

    1988-01-01

    It has been shown that an analysis/synthesis system based on a sinusoidal representation of speech leads to synthetic speech that is essentially perceptually indistinguishable from the original. Strategies for coding the amplitudes, frequencies and phases of the sine waves have been developed that have led to a multirate coder operating at rates from 2400 to 9600 bps. The encoded speech is highly intelligible at all rates with a uniformly improving quality as the data rate is increased. A real-time fixed-point implementation has been developed using two ADSP2100 DSP chips. The methods used for coding and quantizing the sine-wave parameters for operation at the various frame rates are described.

  2. Epetra developers coding guidelines.

    Energy Technology Data Exchange (ETDEWEB)

    Heroux, Michael Allen; Sexton, Paul Michael

    2003-12-01

    Epetra is a package of classes for the construction and use of serial and distributed parallel linear algebra objects. It is one of the base packages in Trilinos. This document describes guidelines for Epetra coding style. The issues discussed here go beyond correct C++ syntax to address issues that make code more readable and self-consistent. The guidelines presented here are intended to aid current and future development of Epetra specifically. They reflect design decisions that were made in the early development stages of Epetra. Some of the guidelines are contrary to more commonly used conventions, but we choose to continue these practices for the purposes of self-consistency. These guidelines are intended to be complimentary to policies established in the Trilinos Developers Guide.

  3. Confocal coded aperture imaging

    Energy Technology Data Exchange (ETDEWEB)

    Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

    2001-01-01

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  4. Code of Practice

    International Nuclear Information System (INIS)

    This Code of Practice introduces accepted safety procedures associated with the use of alpha, beta, gamma and X-radiation in secondary schools (pupils aged 12 to 18) in Ireland, and summarises good practice and procedures as they apply to radiation protection. Typical dose rates at various distances from sealed sources are quoted, and simplified equations are used to demonstrate dose and shielding calculations. The regulatory aspects of radiation protection are outlined, and references to statutory documents are given

  5. Co-ordinated research programme on benchmark study for the seismic analysis and testing of WWER-type nuclear power plants. V. 2B. General material: codes, standards, criteria. Working material

    International Nuclear Information System (INIS)

    In August 1991, following the SMiRT-11 Conference in Tokyo, a Technical Committee Meeting was held on the 'Seismic safety issues relating to existing NPPs'. The Proceedings of this TCM was subsequently compiled in an IAEA Working Material. One of the main recommendations of this TCM, called for the harmonization of criteria and methods used in Member States in seismic reassessment and upgrading of existing NPPs. Twenty four institutions from thirteen countries participated in the CRP named 'Benchmark study for the seismic analysis and testing of WWER type NPPs'. Two types of WWER reactors (WWER-1000 and WWER-440/213) selected for benchmarking. Kozloduy NPP Units 5/6 and Paks NPP represented these respectively as prototypes. Consistent with the recommendations of the TCM and the working paper prepared by the subsequent Consultants' Meeting, the focal activity of the CRP was the benchmarking exercises. A similar methodology was followed both for Paks NPP and Kozloduy NPP Unit 5. Firstly, the NPP (mainly the reactor building) was tested using a blast loading generated by a series of explosions from buried TNT charges. Records from this test were obtained at several free field locations (both downhole and surface), foundation mat, various elevations of structures as well as some tanks and the stack. Then the benchmark participants were provided with structural drawings, soil data and the free field record of the blast experiment. Their task was to make a blind prediction of the response at preselected locations. The analytical results from these participants were then compared with the results from the test. Although the benchmarking exercises constituted the focus of the CRP, there were many other interesting problems related to the seismic safety of WWER type NPPs which were addressed by the participants. These involved generic studies, i.e. codes and standards used in original WWER designs and their comparison with current international practice; seismic analysis

  6. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  7. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  8. Modeling report of DYMOND code (DUPIC version)

    Energy Technology Data Exchange (ETDEWEB)

    Park, Joo Hwan [KAERI, Taejon (Korea, Republic of); Yacout, Abdellatif M. [Argonne National Laboratory, Ilinois (United States)

    2003-04-01

    The DYMOND code employs the ITHINK dynamic modeling platform to assess the 100-year dynamic evolution scenarios for postulated global nuclear energy parks. Firstly, DYMOND code has been developed by ANL(Argonne National Laboratory) to perform the fuel cycle analysis of LWR once-through and LWR-FBR mixed plant. Since the extensive application of DYMOND code has been requested, the first version of DYMOND has been modified to adapt the DUPIC, MSR and RTF fuel cycle. DYMOND code is composed of three parts; the source language platform, input supply and output. But those platforms are not clearly distinguished. This report described all the equations which were modeled in the modified DYMOND code (which is called as DYMOND-DUPIC version). It divided into five parts;Part A deals model in reactor history which is included amount of the requested fuels and spent fuels. Part B aims to describe model of fuel cycle about fuel flow from the beginning to the end of fuel cycle. Part C is for model in re-processing which is included recovery of burned uranium, plutonium, minor actinide and fission product as well as the amount of spent fuels in storage and disposal. Part D is for model in other fuel cycle which is considered the thorium fuel cycle for MSR and RTF reactor. Part E is for model in economics. This part gives all the information of cost such as uranium mining cost, reactor operating cost, fuel cost etc.

  9. Structural coding versus free-energy predictive coding.

    Science.gov (United States)

    van der Helm, Peter A

    2016-06-01

    Focusing on visual perceptual organization, this article contrasts the free-energy (FE) version of predictive coding (a recent Bayesian approach) to structural coding (a long-standing representational approach). Both use free-energy minimization as metaphor for processing in the brain, but their formal elaborations of this metaphor are fundamentally different. FE predictive coding formalizes it by minimization of prediction errors, whereas structural coding formalizes it by minimization of the descriptive complexity of predictions. Here, both sides are evaluated. A conclusion regarding competence is that FE predictive coding uses a powerful modeling technique, but that structural coding has more explanatory power. A conclusion regarding performance is that FE predictive coding-though more detailed in its account of neurophysiological data-provides a less compelling cognitive architecture than that of structural coding, which, for instance, supplies formal support for the computationally powerful role it attributes to neuronal synchronization. PMID:26407895

  10. You know the Science. Do you know your Code?

    CERN Document Server

    CERN. Geneva

    2014-01-01

    This talk is about automated code analysis and transformation tools to support scientific computing. Code bases are difficult to manage because of size, age, or safety requirements. Tools can help scientists and IT engineers understand their code, locate problems, improve quality. Tools can also help transform the code, by implementing complex refactorings, replatforming, or migration to a modern language. Such tools are themselves difficult to build. This talk describes DMS, a meta-tool for building software analysis tools. DMS is a kind of generalized compiler, and can be configured to process arbitrary programming languages, to carry out arbitrary analyses, and to convert specifications into running code. It has been used for a variety of purposes, including converting embedded mission software in the US B-2 Stealth Bomber, providing the US Social Security Administration with a deep view how their 200 millions lines of COBOL are connected, and reverse-engineering legacy factory process control code i...

  11. Transfer reaction code with nonlocal interactions

    CERN Document Server

    Titus, L J; Nunes, F M

    2016-01-01

    We present a suite of codes (NLAT for nonlocal adiabatic transfer) to calculate the transfer cross section for single-nucleon transfer reactions, $(d,N)$ or $(N,d)$, including nonlocal nucleon-target interactions, within the adiabatic distorted wave approximation. For this purpose, we implement an iterative method for solving the second order nonlocal differential equation, for both scattering and bound states. The final observables that can be obtained with NLAT are differential angular distributions for the cross sections of $A(d,N)B$ or $B(N,d)A$. Details on the implementation of the T-matrix to obtain the final cross sections within the adiabatic distorted wave approximation method are also provided. This code is suitable to be applied for deuteron induced reactions in the range of $E_d=10-70$ MeV, and provides cross sections with $4\\%$ accuracy.

  12. Transfer reaction code with nonlocal interactions

    Science.gov (United States)

    Titus, L. J.; Ross, A.; Nunes, F. M.

    2016-10-01

    We present a suite of codes (NLAT for nonlocal adiabatic transfer) to calculate the transfer cross section for single-nucleon transfer reactions, (d , N) or (N , d) , including nonlocal nucleon-target interactions, within the adiabatic distorted wave approximation. For this purpose, we implement an iterative method for solving the second order nonlocal differential equation, for both scattering and bound states. The final observables that can be obtained with NLAT are differential angular distributions for the cross sections of A(d , N) B or B(N , d) A. Details on the implementation of the T-matrix to obtain the final cross sections within the adiabatic distorted wave approximation method are also provided. This code is suitable to be applied for deuteron induced reactions in the range of Ed =10-70 MeV, and provides cross sections with 4% accuracy.

  13. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  14. Coding Opportunity Densification Strategies for Instantly Decodable Network Coding

    OpenAIRE

    Sorour, Sameh; Valaee, Shahrokh

    2012-01-01

    In this paper, we aim to identify the strategies that can maximize and monotonically increase the density of the coding opportunities in instantly decodable network coding (IDNC).Using the well-known graph representation of IDNC, first derive an expression for the exact evolution of the edge set size after the transmission of any arbitrary coded packet. From the derived expressions, we show that sending commonly wanted packets for all the receivers can maximize the number of coding opportunit...

  15. TASS code topical report. V.1 TASS code technical manual

    International Nuclear Information System (INIS)

    TASS 1.0 code has been developed at KAERI for the initial and reload non-LOCA safety analysis for the operating PWRs as well as the PWRs under construction in Korea. TASS code will replace various vendor's non-LOCA safety analysis codes currently used for the Westinghouse and ABB-CE type PWRs in Korea. This can be achieved through TASS code input modifications specific to each reactor type. The TASS code can be run interactively through the keyboard operation. A simimodular configuration used in developing the TASS code enables the user easily implement new models. TASS code has been programmed using FORTRAN77 which makes it easy to install and port for different computer environments. The TASS code can be utilized for the steady state simulation as well as the non-LOCA transient simulations such as power excursions, reactor coolant pump trips, load rejections, loss of feedwater, steam line breaks, steam generator tube ruptures, rod withdrawal and drop, and anticipated transients without scram (ATWS). The malfunctions of the control systems, components, operator actions and the transients caused by the malfunctions can be easily simulated using the TASS code. This technical report describes the TASS 1.0 code models including reactor thermal hydraulic, reactor core and control models. This TASS code models including reactor thermal hydraulic, reactor core and control models. This TASS code technical manual has been prepared as a part of the TASS code manual which includes TASS code user's manual and TASS code validation report, and will be submitted to the regulatory body as a TASS code topical report for a licensing non-LOCA safety analysis for the Westinghouse and ABB-CE type PWRs operating and under construction in Korea. (author). 42 refs., 29 tabs., 32 figs

  16. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  17. B2B marketing

    OpenAIRE

    Pospíšilová, Lucie

    2010-01-01

    The main goal of this bachelor thesis is to apply theoretical knowledge in B2B marketing to the example of marketing processes in a particular company, to evaluate the current situation of its activities with regard to B2B principles and to suggest relevant recommendations. The theoretical part focuses on specific characteristics of B2B marketing, describes its differences from marketing on consumer markets, deals with buying behaviour of organizations and specifies particular features of mar...

  18. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli. PMID:23724797

  19. Poisson/Superfish codes for personal computers

    International Nuclear Information System (INIS)

    The Poisson/Superfish codes calculate static E or B fields in two-dimensions and electromagnetic fields in resonant structures. New versions for 386/486 PCs and Macintosh computers have capabilities that exceed the mainframe versions. Notable improvements are interactive graphical post-processors, improved field calculation routines, and a new program for charged particle orbit tracking. (author). 4 refs., 1 tab., figs

  20. High Energy Transport Code HETC

    International Nuclear Information System (INIS)

    The physics contained in the High Energy Transport Code (HETC), in particular the collision models, are discussed. An application using HETC as part of the CALOR code system is also given. 19 refs., 5 figs., 3 tabs

  1. The Tap code - a code similar to Morse code for communication by tapping

    OpenAIRE

    Rafler, Stephan

    2013-01-01

    A code is presented for fast, easy and efficient communication over channels that allow only two signal types: a single sound (e.g. a knock), or no sound (i.e. silence). This is a true binary code while Morse code is a ternary code and does not work in such situations. Thus the presented code is more universal than Morse and can be used in much more situations. Additionally it is very tolerant to variations in signal strength or duration. The paper contains various ways in which the code can ...

  2. Mutational analysis of the coding regions of the genes encoding protein kinase B-alpha and -beta, phosphoinositide-dependent protein kinase-1, phosphatase targeting to glycogen, protein phosphatase inhibitor-1, and glycogenin

    DEFF Research Database (Denmark)

    Hansen, L; Fjordvang, H; Rasmussen, S K;

    1999-01-01

    conformation polymorphism-heteroduplex analysis was performed on genomic DNA or skeletal muscle-derived cDNAs encoding glycogenin, protein phosphatase inhibitor-1, phophatase targeting to glycogen, protein kinase B-alpha and -beta, and the phosphoinositide-dependent protein kinase-1. Although a number...... be caused by genetic variability in the genes encoding proteins shown by biochemical evidence to be involved in insulin-stimulated glycogen synthesis in skeletal muscle. In 70 insulin-resistant Danish NIDDM patients, mutational analysis by reverse transcription-polymerase chain reaction-single strand...

  3. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  4. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  5. Ethical Codes in the Professions.

    Science.gov (United States)

    Schmeiser, Cynthia B.

    1992-01-01

    Whether the measurement profession should consider developing and adopting a code of professional conduct is explored after a brief review of existing references to standards of conduct and a review of other professional codes. Issues include the need for a code of ethics, its usefulness, and its enforcement. (SLD)

  6. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy mac...

  7. Coding Issues in Grounded Theory

    Science.gov (United States)

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  8. Direct construction of code loops

    OpenAIRE

    Nagy, Gabor P.

    2004-01-01

    Code loops were introduced by R. L. Griess. R.L. Griess and T. Hsu gave methods to construct the corresponding code loop from any given doubly even binary code; both these methods used some kind of induction. In this paper, we present a global construction of the loop, where we apply the correspondance between the concepts of Moufang loops and groups with triality.

  9. From Skew-Cyclic Codes to Asymmetric Quantum Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Sole, Patrick; Yemen, Olfa

    2010-01-01

    We introduce an additive but not $\\F_{4}$-linear map $S$ from $\\F_{4}^{n}$ to $\\F_{4}^{2n}$ and exhibit some of its interesting structural properties. If $C$ is a linear $[n,k,d]_4$-code, then $S(C)$ is an additive $(2n,2^{2k},2d)_4$-code. If $C$ is an additive cyclic code then $S(C)$ is an additive quasi-cyclic code of index $2$. Moreover, if $C$ is a module $\\theta$-cyclic code, a recently introduced type of code which will be explained below, then $S(C)$ is equivalent to an additive cyclic code if $n$ is odd and to an additive quasi-cyclic code of index $2$ if $n$ is even. Given any $(n,M,d)_4$-code $C$, the code $S(C)$ is self-orthogonal under the trace Hermitian inner product. Since the mapping $S$ preserves nestedness, it can be used as a tool in constructing additive asymmetric quantum codes.

  10. TWEED Code Book

    OpenAIRE

    Engene, Jan Oskar

    2006-01-01

    The TWEED data set contains information on more than 11.000 events related to internal (or domestic) terrorism in 18 West European countries for the 1950 through 2004 period. The code book describes the structure of the data set, the countries covered, and the variables included and functions as a user’s guide to the data set. The data set is available at: http://www.uib.no/people/sspje/tweed.htm The data set Terrorism in Western Europe: Events Data, TWEED, contains information on events r...

  11. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  12. Correct Code Containing Containers

    OpenAIRE

    Dross, Claire; Filliâtre, Jean-Christophe; Moy, Yannick

    2011-01-01

    For critical software development, containers such as lists, vectors, sets or maps are an attractive alternative to ad-hoc data structures based on pointers. As standards like DO-178C put formal verification and testing on an equal footing, it is important to give users the ability to apply both to the verification of code using containers. In this paper, we present a definition of containers whose aim is to facilitate their use in certified software, using modern proof technology and novel s...

  13. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...... the impact of interference from other transmissions. Unlike these conventional studies, in this paper, we apply PLNC to a large-scale cellular network in the presence of intercell interference (ICI). In cellular networks, a terminal and a Base Station (BS) have different transmission power, which causes...

  14. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  15. New quantum codes constructed from quaternary BCH codes

    Science.gov (United States)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  16. ON CLASSICAL BCH CODES AND QUANTUM BCH CODES

    Institute of Scientific and Technical Information of China (English)

    Xu Yajie; Ma Zhi; Zhang Chunyuan

    2009-01-01

    It is a regular way of constructing quantum error-correcting codes via codes with self-orthogonal property, and whether a classical Bose-Chaudhuri-Hocquenghem (BCH) code is self-orthogonal can be determined by its designed distance. In this paper, we give the sufficient and necessary condition for arbitrary classical BCH codes with self-orthogonal property through algorithms. We also give a better upper bound of the designed distance of a classical narrow-sense BCH code which contains its Euclidean dual. Besides these, we also give one algorithm to compute the dimension of these codes. The complexity of all algorithms is analyzed. Then the results can be applied to construct a series of quantum BCH codes via the famous CSS constructions.

  17. Complexity control for high-efficiency video coding by coding layers complexity allocations

    Science.gov (United States)

    Fang, Jiunn-Tsair; Liang, Kai-Wen; Chen, Zong-Yi; Hsieh, Wei; Chang, Pao-Chi

    2016-03-01

    The latest video compression standard, high-efficiency video coding (HEVC), provides quad-tree structures of coding units (CUs) and four coding tree depths to facilitate coding efficiency. The HEVC encoder considerably increases the computational complexity to levels inappropriate for video applications of power-constrained devices. This work, therefore, proposes a complexity control method for the low-delay P-frame configuration of the HEVC encoder. The complexity control mechanism is among the group of pictures layer, frame layer, and CU layer, and each coding layer provides a distinct method for complexity allocation. Furthermore, the steps in the prediction unit encoding procedure are reordered. By allocating the complexity to each coding layer of HEVC, the proposed method can simultaneously satisfy the entire complexity constraint (ECC) for entire sequence encoding and the instant complexity constraint (ICC) for each frame during real-time encoding. Experimental results showed that as the target complexity under both the ECC and ICC was reduced to 80% and 60%, respectively, the decrease in the average Bjøntegaard delta peak signal-to-noise ratio was ˜0.1 dB with an increase of 1.9% in the Bjøntegaard delta rate, and the complexity control error was ˜4.3% under the ECC and 4.3% under the ICC.

  18. Study on New Concatenated Code in WDM Optical Transmission Systems

    Institute of Scientific and Technical Information of China (English)

    YUAN Jian-guo; JIANG Ze; MAO You-ju; YE Wen-wei

    2007-01-01

    A new concatenated code of RS(255,239)+BCH(2 040,1 930) code to be suitable for WDM optical transmission systems is proposed.The simulation results show that this new concatenated code,compared with the RS(255,239)+CSOC(k0/n0=6/7,J=8) code in ITU-T G.75.1,has a lower redundancy and better error-correction performance,furthermore,its net coding gain(NCG) is respectively 0.46 dB,0.43 dB more than that of RS(255,239)+CSOC(k0/n0 =6/7,J=8) code and BCH(3 860,3 824)+BCH(2 040,1 930) code in ITU-T G.75.1 at the third iteration for the bit error rate(BER) of 10-12.Therefore,the new super forward error correction(Super-FEC) concatenated code can be better used in ultra long-haul,ultra large-capacity and ultra high-speed WDM optical communication systems.

  19. Block diagonalization for algebra's associated with block codes

    NARCIS (Netherlands)

    Gijswijt, D.

    2009-01-01

    For a matrix *-algebra B, consider the matrix *-algebra A consisting of the symmetric tensors in the n-fold tensor product of B. Examples of such algebras in coding theory include the Bose-Mesner algebra and Terwilliger algebra of the (non)binary Hamming cube, and algebras arising in SDP-hierarchies

  20. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  1. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  2. L\\'evy statistics in coding and non-coding nucleotide sequences

    OpenAIRE

    Scafetta, Nicola; Latora, Vito; Grigolini, Paolo

    2001-01-01

    We propose a new method of statistical analysis of nucleotide sequences yielding the true scaling without requiring any form of de-trending. With the help of artificial sequences that are proved to be statistically equivalent to the real DNA sequences we find that power-law correlations are present in both coding and non-coding sequences, in accordance with the recent work of other authors. We also afford a compelling evidence that these long-range correlations generate L\\'evy statistics in b...

  3. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani;

    2014-01-01

    oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains......Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...

  4. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  5. Three Paradigms for Mixing Coding and Games: Coding in a Game, Coding as a Game, and Coding for a Game

    OpenAIRE

    Foster, Stephen

    2015-01-01

    Games for teaching coding have been an educational holy grail since at least the early 1980s. Yet for decades, with games more popular than ever and with the need to teach kids coding having been well-recognized, no blockbuster coding games have arisen (see Chapter 2). Over the years, the research community has made various games for teaching computer science: a survey made by shows that most do not teach coding, and of the ones that do teach coding, most are research prototypes (not produc...

  6. On constructing disjoint linear codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Weiguo; CAI Mian; XIAO Guozhen

    2007-01-01

    To produce a highly nonlinear resilient function,the disjoint linear codes were originally proposed by Johansson and Pasalic in IEEE Trans.Inform.Theory,2003,49(2):494-501.In this paper,an effective method for finding a set of such disjoint linear codes is presented.When n≥2k,we can find a set of[n,k] disjoint linear codes with joint linear codes exists with cardinality at least 2.We also describe a result on constructing a set of [n,k] disjoint linear codes with minimum distance at least some fixed positive integer.

  7. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    related to the iterative encoding of graph codes with MDS component code. The last chapter deals with affine Grassmann codes and Grassmann codes. We begin with some previously known codes and prove that they are also Tanner codes of the incidence graph of the point–line partial geometry......This thesis consists of six chapters. The first chapter, contains a short introduction to coding theory in which we explain the coding theory concepts we use. In the second chapter, we present the required theory for evaluation codes and also give an example of some fundamental codes in coding...... theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four...

  8. MCOR - Monte Carlo depletion code for reference LWR calculations

    Energy Technology Data Exchange (ETDEWEB)

    Puente Espel, Federico, E-mail: fup104@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Tippayakul, Chanatip, E-mail: cut110@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Ivanov, Kostadin, E-mail: kni1@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Misu, Stefan, E-mail: Stefan.Misu@areva.com [AREVA, AREVA NP GmbH, Erlangen (Germany)

    2011-04-15

    Research highlights: > Introduction of a reference Monte Carlo based depletion code with extended capabilities. > Verification and validation results for MCOR. > Utilization of MCOR for benchmarking deterministic lattice physics (spectral) codes. - Abstract: The MCOR (MCnp-kORigen) code system is a Monte Carlo based depletion system for reference fuel assembly and core calculations. The MCOR code is designed as an interfacing code that provides depletion capability to the LANL Monte Carlo code by coupling two codes: MCNP5 with the AREVA NP depletion code, KORIGEN. The physical quality of both codes is unchanged. The MCOR code system has been maintained and continuously enhanced since it was initially developed and validated. The verification of the coupling was made by evaluating the MCOR code against similar sophisticated code systems like MONTEBURNS, OCTOPUS and TRIPOLI-PEPIN. After its validation, the MCOR code has been further improved with important features. The MCOR code presents several valuable capabilities such as: (a) a predictor-corrector depletion algorithm, (b) utilization of KORIGEN as the depletion module, (c) individual depletion calculation of each burnup zone (no burnup zone grouping is required, which is particularly important for the modeling of gadolinium rings), and (d) on-line burnup cross-section generation by the Monte Carlo calculation for 88 isotopes and usage of the KORIGEN libraries for PWR and BWR typical spectra for the remaining isotopes. Besides the just mentioned capabilities, the MCOR code newest enhancements focus on the possibility of executing the MCNP5 calculation in sequential or parallel mode, a user-friendly automatic re-start capability, a modification of the burnup step size evaluation, and a post-processor and test-matrix, just to name the most important. The article describes the capabilities of the MCOR code system; from its design and development to its latest improvements and further ameliorations. Additionally

  9. The JAERI code system for evaluation of BWR ECCS performance

    International Nuclear Information System (INIS)

    Development of respective computer code system of BWR and PWR for evaluation of ECCS has been conducted since 1973 considering the differences of the reactor cooling system, core structure and ECCS. The first version of the BWR code system, of which developmental work started earlier than that of the PWR, has been completed. The BWR code system is designed to provide computational tools to analyze all phases of LOCAs and to evaluate the performance of the ECCS including an ''Evaluation Model (EM)'' feature in compliance with the requirements of the current Japanese Evaluation Guideline of ECCS. The BWR code system could be used for licensing purpose, i.e. for ECCS performance evaluation or audit calculations to cross-examine the methods and results of applicants or vendors. The BWR code system presented in this report comprises several computer codes, each of which analyzes a particular phase of a LOCA or a system blowdown depending on a range of LOCAs, i.e. large and small breaks in a variety of locations in the reactor system. The system includes ALARM-B1, HYDY-B1 and THYDE-B1 for analysis of the system blowdown for various break sizes, THYDE-B-REFLOOD for analysis of the reflood phase and SCORCH-B2 for the calculation of the fuel assembl hot plane temperature. When the multiple codes are used to analyze a broad range of LOCA as stated above, it is very important to evaluate the adequacy and consistency between the codes used to cover an entire break spectrum. The system consistency together with the system performance are discussed for a large commercial BWR. (author)

  10. Allele coding in genomic evaluation

    DEFF Research Database (Denmark)

    Standen, Ismo; Christensen, Ole Fredslund

    2011-01-01

    coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being the best. \\paragraph*{Conclusions:} Different allele coding methods lead to the same inference in the marker-based and equivalent models when a fixed...... effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous...... genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call...

  11. Practices in Code Discoverability: Astrophysics Source Code Library

    Science.gov (United States)

    Allen, A.; Teuben, P.; Nemiroff, R. J.; Shamir, L.

    2012-09-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysics source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL has on average added 19 codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available either via a download site or from an identified source. This paper provides the history and description of the ASCL. It lists the requirements for including codes, examines the advantages of the ASCL, and outlines some of its future plans.

  12. Making your code citable with the Astrophysics Source Code Library

    Science.gov (United States)

    Allen, Alice; DuPrie, Kimberly; Schmidt, Judy; Berriman, G. Bruce; Hanisch, Robert J.; Mink, Jessica D.; Nemiroff, Robert J.; Shamir, Lior; Shortridge, Keith; Taylor, Mark B.; Teuben, Peter J.; Wallin, John F.

    2016-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) is a free online registry of codes used in astronomy research. With nearly 1,200 codes, it is the largest indexed resource for astronomy codes in existence. Established in 1999, it offers software authors a path to citation of their research codes even without publication of a paper describing the software, and offers scientists a way to find codes used in refereed publications, thus improving the transparency of the research. It also provides a method to quantify the impact of source codes in a fashion similar to the science metrics of journal articles. Citations using ASCL IDs are accepted by major astronomy journals and if formatted properly are tracked by ADS and other indexing services. The number of citations to ASCL entries increased sharply from 110 citations in January 2014 to 456 citations in September 2015. The percentage of code entries in ASCL that were cited at least once rose from 7.5% in January 2014 to 17.4% in September 2015. The ASCL's mid-2014 infrastructure upgrade added an easy entry submission form, more flexible browsing, search capabilities, and an RSS feeder for updates. A Changes/Additions form added this past fall lets authors submit links for papers that use their codes for addition to the ASCL entry even if those papers don't formally cite the codes, thus increasing the transparency of that research and capturing the value of their software to the community.

  13. Finite-Length Analysis of BATS Codes

    OpenAIRE

    Yang, Shenghao; Ng, Tsz-Ching; Yeung, Raymond W.

    2013-01-01

    BATS codes were proposed for communication through networks with packet loss. A BATS code consists of an outer code and an inner code. The outer code is a matrix generation of a fountain code, which works with the inner code that comprises random linear coding at the intermediate network nodes. In this paper, the performance of finite-length BATS codes is analyzed with respect to both belief propagation (BP) decoding and inactivation decoding. Our results enable us to evaluate efficiently the...

  14. CH-TRU Waste Content Codes

    Energy Technology Data Exchange (ETDEWEB)

    Washington TRU Solutions LLC

    2008-01-16

    The CH-TRU Waste Content Codes (CH-TRUCON) document describes the inventory of the U.S. Department of Energy (DOE) CH-TRU waste within the transportation parameters specified by the Contact-Handled Transuranic Waste Authorized Methods for Payload Control (CH-TRAMPAC). The CH-TRAMPAC defines the allowable payload for the Transuranic Package Transporter-II (TRUPACT-II) and HalfPACT packagings. This document is a catalog of TRUPACT-II and HalfPACT authorized contents and a description of the methods utilized to demonstrate compliance with the CH-TRAMPAC. A summary of currently approved content codes by site is presented in Table 1. The CH-TRAMPAC describes "shipping categories" that are assigned to each payload container. Multiple shipping categories may be assigned to a single content code. A summary of approved content codes and corresponding shipping categories is provided in Table 2, which consists of Tables 2A, 2B, and 2C. Table 2A provides a summary of approved content codes and corresponding shipping categories for the "General Case," which reflects the assumption of a 60-day shipping period as described in the CH-TRAMPAC and Appendix 3.4 of the CH-TRU Payload Appendices. For shipments to be completed within an approximately 1,000-mile radius, a shorter shipping period of 20 days is applicable as described in the CH-TRAMPAC and Appendix 3.5 of the CH-TRU Payload Appendices. For shipments to WIPP from Los Alamos National Laboratory (LANL), Nevada Test Site, and Rocky Flats Environmental Technology Site, a 20-day shipping period is applicable. Table 2B provides a summary of approved content codes and corresponding shipping categories for "Close-Proximity Shipments" (20-day shipping period). For shipments implementing the controls specified in the CH-TRAMPAC and Appendix 3.6 of the CH-TRU Payload Appendices, a 10-day shipping period is applicable. Table 2C provides a summary of approved content codes and corresponding shipping categories for "Controlled Shipments

  15. Advanced Error-Control Coding Methods Enhance Reliability of Transmission and Storage Data Systems

    Directory of Open Access Journals (Sweden)

    K. Vlcek

    2003-04-01

    Full Text Available Iterative coding systems are currently being proposed and acceptedfor many future systems as next generation wireless transmission andstorage systems. The text gives an overview of the state of the art initerative decoded FEC (Forward Error-Correction error-control systems.Such systems can typically achieve capacity to within a fraction of adB at unprecedented low complexities. Using a single code requires verylong code words, and consequently very complex coding system. One wayaround the problem of achieving very low error probabilities is turbocoding (TC application. A general model of concatenated coding systemis shown - an algorithm of turbo codes is given in this paper.

  16. To be or not B2B?

    CERN Document Server

    Symons, L J

    2001-01-01

    La question du commerce électronique interentreprises par le web (Business to Business, B2B) est posée actuellement par les grands groupes industriels impliqués dans le commerce mondial. Les prévisions sont imposantes, le B2B atteindra le C.A. de 3000 milliards de dollars en 2003. Les conditions d'accès, la façon de procéder des deux organisateurs (ARIBA et COMMERCE ONE) des plus grandes places de marchés actuelles, sont décrites. La base de l'énorme pyramide est le catalogue électronique multilingue UNSPSC (United Nations Standard Products and Services Classification) et l'organisation ECCMA (Electronic Commerce Code Management Association) qui gère le développement des UNSPSC codes en 8 langues. Dans ce contexte, l'auteur (re)-déclare qu'un des efforts principaux à fournir par le CERN est la création de son propre catalogue électronique. Dans la Division ST, une aide partielle à ce vaste programme pourrait être apportée par la normalisation des codes et désignations des pièces de maint...

  17. THE MCNPX MONTE CARLO RADIATION TRANSPORT CODE

    Energy Technology Data Exchange (ETDEWEB)

    WATERS, LAURIE S. [Los Alamos National Laboratory; MCKINNEY, GREGG W. [Los Alamos National Laboratory; DURKEE, JOE W. [Los Alamos National Laboratory; FENSIN, MICHAEL L. [Los Alamos National Laboratory; JAMES, MICHAEL R. [Los Alamos National Laboratory; JOHNS, RUSSELL C. [Los Alamos National Laboratory; PELOWITZ, DENISE B. [Los Alamos National Laboratory

    2007-01-10

    MCNPX (Monte Carlo N-Particle eXtended) is a general-purpose Monte Carlo radiation transport code with three-dimensional geometry and continuous-energy transport of 34 particles and light ions. It contains flexible source and tally options, interactive graphics, and support for both sequential and multi-processing computer platforms. MCNPX is based on MCNP4B, and has been upgraded to most MCNP5 capabilities. MCNP is a highly stable code tracking neutrons, photons and electrons, and using evaluated nuclear data libraries for low-energy interaction probabilities. MCNPX has extended this base to a comprehensive set of particles and light ions, with heavy ion transport in development. Models have been included to calculate interaction probabilities when libraries are not available. Recent additions focus on the time evolution of residual nuclei decay, allowing calculation of transmutation and delayed particle emission. MCNPX is now a code of great dynamic range, and the excellent neutronics capabilities allow new opportunities to simulate devices of interest to experimental particle physics; particularly calorimetry. This paper describes the capabilities of the current MCNPX version 2.6.C, and also discusses ongoing code development.

  18. Les codes correcteurs

    OpenAIRE

    Rigo, Michel

    2009-01-01

    Qu'on le veuille ou non, nous vivons dans un monde où les informations et les moyens de communication sont omniprésents. Les exemples où se mêlent informatique et télécommunications sont nombreux. Que ce soit l'Internet, la musique achetée en ligne ou gravée sur CD, les baladeurs de type iPod et autres appareils portables, les supports mémoire de tout type, la photographie numérique, la présence d'ordinateurs de bord sophistiqués dans nos voitures, etc. Sans code correcteur, le CD (implémenta...

  19. Homomorphic encryption from codes

    CERN Document Server

    Bogdanov, Andrej

    2011-01-01

    We propose a new homomorphic encryption scheme based on the hardness of decoding under independent random noise from certain affine families of codes. Unlike in previous lattice-based homomorphic encryption schemes, where the message is hidden in the noisy part of the ciphertext, our scheme carries the message in the affine part of the transformation and applies noise only to achieve security. Our scheme can tolerate noise of arbitrary magnitude, as long as the noise vector has sufficiently small hamming weight (and its entries are independent). Our design achieves "proto-homomorphic" properties in an elementary manner: message addition and multiplication are emulated by pointwise addition and multiplication of the ciphertext vectors. Moreover, the extremely simple nature of our decryption makes the scheme easily amenable to bootstrapping. However, some complications are caused by the inherent presence of noticeable encryption error. Our main technical contribution is the development of two new techniques for...

  20. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely...... as conceptions of good governance from other international organizations. While values converge, they are balanced and communicated differently, and seem to some extent to be translated into the national cultures. The set of global public values derived from this analysis include public interest, regime dignity......, transparency, neutrality, impartiality, effectiveness, accountability, and legality. The normative context of public administration, as expressed in codes, seems to ignore the New Public Management and Reinventing Government reform movements....

  1. Crystalizing the genetic code

    CERN Document Server

    Frappat, L; Sorba, Paul

    2000-01-01

    New developments are presented in the framework of the model introduced by the authors in refs. [1,2] and in which nucleotides as well as codons are classified in crystal bases of the quantum group U_q(sl(2)+sl(2)) in the limit q -> 0. An operator which gives the correspondence between the amino-acids and the codons is now obtained for any known genetic code. The free energy released by base pairing of dinucleotides as well as the relative hydrophilicity and hydrophobicity of the dinucleosides are also computed. For the vertebrate series, a universal behaviour in the ratios of codon usage frequencies is put in evidence and is shown to fit nicely in our model. Then a first attempt to represent the mutations relative to the deletion of a pyrimidine by action of a suitable crystal spinor operator is proposed. Finally recent theoretical descriptions are reviewed and compared with our model.

  2. Selection of Code and Interleaver for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1998-01-01

    The selection of component codes for turbo coding has often been based on the performance at high SNR's. However, we will argue that the selection mainly should be based on the performance at low SNR's, i.e. the convergence properties. Further, we will present a way to construct interleavers...... that significantly improve the performance of the turbo coding scheme at high SNR's, i.e. lowers the error floor...

  3. Direct GPS P-Code Acquisition Method Based on FFT

    Institute of Scientific and Technical Information of China (English)

    LI Hong; LU Mingquan; FENG Zhenming

    2008-01-01

    Recently, direct acquisition of GPS P-code has received considerable attention to enhance the anti-jamming and anti-spoofing capabilities of GPS receivers. This paper describes a P-code acquisition method that uses block searches with large-scale FFT to search code phases and carrier frequency offsets in parallel. To limit memory use, especially when implemented in hardware, only the largest correlation result with its position information was preserved after searching a block of resolution cells in both the time and frequency domains. A second search was used to solve the code phase slip problem induced by the code frequency offset. Simulation results demonstrate that the probability of detection is above 0.99 for carrier-to-noise density ratios in excess of 40 dB- Hz when the predetection integration time is 0.8 ms and 6 non-coherent integrations are used in the analysis.

  4. Bit-Interleaved Coded Multiple Beamforming with Perfect Coding

    CERN Document Server

    Li, Boyu

    2010-01-01

    When the channel state information is known by the transmitter as well as the receiver, beamforming techniques that employ Singular Value Decomposition (SVD) are commonly used in Multiple-Input Multiple-Output (MIMO) systems. Without channel coding, when a single symbol is transmitted, these systems achieve the full diversity order. Whereas, this property is lost when multiple symbols are simultaneously transmitted. Full diversity can be restored when channel coding is added, as long as the code rate Rc and the number of employed subchannels S satisfy the condition RcS =< 1. Moreover, by adding a proper constellation precoder, full diversity can be achieved for both uncoded and coded SVD systems, e.g., Fully Precoded Multiple Beamforming (FPMB) and Bit-Interleaved Coded Multiple Beamforming with Full Precoding (BICMB-FP). Perfect Space-Time Block Code (PSTBC) is a full-rate full-diversity space-time code, which achieves maximum coding gain for MIMO systems. Previously, Perfect Coded Multiple Beamforming (P...

  5. Practices in Code Discoverability: Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysical source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL (http://ascl.net) has on average added 19 new codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available ei...

  6. Obituary: Arthur Dodd Code (1923-2009)

    Science.gov (United States)

    Marché, Jordan D., II

    2009-12-01

    Former AAS president Arthur Dodd Code, age 85, passed away at Meriter Hospital in Madison, Wisconsin on 11 March 2009, from complications involving a long-standing pulmonary condition. Code was born in Brooklyn, New York on 13 August 1923, as the only child of former Canadian businessman Lorne Arthur Code and Jesse (Dodd) Code. An experienced ham radio operator, he entered the University of Chicago in 1940, but then enlisted in the U.S. Navy (1943-45) and was later stationed as an instructor at the Naval Research Laboratory, Washington, D.C. During the war, he gained extensive practical experience with the design and construction of technical equipment that served him well in years ahead. Concurrently, he took physics courses at George Washington University (some under the tutelage of George Gamow). In 1945, he was admitted to the graduate school of the University of Chicago, without having received his formal bachelor's degree. In 1950, he was awarded his Ph.D. for a theoretical study of radiative transfer in O- and B-type stars, directed by Subrahmanyan Chandrasekhar. hired onto the faculty of the Department of Astronomy at the University of Wisconsin-Madison (1951-56). He then accepted a tenured appointment at the California Institute of Technology and the Mount Wilson and Palomar Observatories (1956-58). But following the launch of Sputnik, Code returned to Wisconsin in 1958 as full professor of astronomy, director of the Washburn Observatory, and department chairman so that he could more readily pursue his interest in space astronomy. That same year, he was chosen a member of the Space Science Board of the National Academy of Sciences (created during the International Geophysical Year) and shortly became one of five principal investigators of the original NASA Space Science Working Group. In a cogent 1960 essay, Code argued that astrophysical investigations, when conducted from beyond the Earth's atmosphere, "cannot fail to have a tremendous impact on the

  7. Capacity achieving nonbinary LDPC coded non-uniform shaping modulation for adaptive optical communications.

    Science.gov (United States)

    Lin, Changyu; Zou, Ding; Liu, Tao; Djordjevic, Ivan B

    2016-08-01

    A mutual information inspired nonbinary coded modulation design with non-uniform shaping is proposed. Instead of traditional power of two signal constellation sizes, we design 5-QAM, 7-QAM and 9-QAM constellations, which can be used in adaptive optical networks. The non-uniform shaping and LDPC code rate are jointly considered in the design, which results in a better performance scheme for the same SNR values. The matched nonbinary (NB) LDPC code is used for this scheme, which further improves the coding gain and the overall performance. We analyze both coding performance and system SNR performance. We show that the proposed NB LDPC-coded 9-QAM has more than 2dB gain in symbol SNR compared to traditional LDPC-coded star-8-QAM. On the other hand, the proposed NB LDPC-coded 5-QAM and 7-QAM have even better performance than LDPC-coded QPSK. PMID:27505775

  8. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory textto algebraic coding theory. In the first chapter, you'll gain insideknowledge of coding fundamentals, which is essential for a deeperunderstanding of state-of-the-art coding systems.This book is a quick reference for those who are unfamiliar withthis topic, as well as for use with specific applications such as cryptographyand communication. Linear error-correcting block codesthrough elementary principles span eleven chapters of the text.Cyclic codes, some finite field algebra, Goppa codes, algebraic decodingalgorithms, and applications in public-key cryptography andsecret-key cryptography are discussed, including problems and solutionsat the end of each chapter. Three appendices cover the Gilbertbound and some related derivations, a derivation of the Mac-Williams' identities based on the probability of undetected error,and two important tools for algebraic decoding-namely, the finitefield Fourier transform and the Euclidean algorithm for polynomials.

  9. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-01-01

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine. PMID:18998785

  10. Low complexity hevc intra coding

    OpenAIRE

    Ruiz Coll, José Damián

    2016-01-01

    Over the last few decades, much research has focused on the development and optimization of video codecs for media distribution to end-users via the Internet, broadcasts or mobile networks, but also for videoconferencing and for the recording on optical disks for media distribution. Most of the video coding standards for delivery are characterized by using a high efficiency hybrid schema, based on inter-prediction coding for temporal picture decorrelation, and intra-prediction coding for spat...

  11. High performance scalable image coding

    Institute of Scientific and Technical Information of China (English)

    Gan Tao; He Yanmin; Zhu Weile

    2007-01-01

    A high performance scalable image coding algorithm is proposed. The salient features of this algorithm are the ways to form and locate the significant clusters. Thanks to the list structure, the new coding algorithm achieves fine fractional bit-plane coding with negligible additional complexity. Experiments show that it performs comparably or better than the state-of-the-art coders. Furthermore, the flexible codec supports both quality and resolution scalability, which is very attractive in many network applications.

  12. Numerical Coding of Nominal Data

    OpenAIRE

    Gniazdowski, Zenon; GRABOWSKI Michal

    2016-01-01

    In this paper, a novel approach for coding nominal data is proposed. For the given nominal data, a rank in a form of complex number is assigned. The proposed method does not lose any information about the attribute and brings other properties previously unknown. The approach based on these knew properties can been used for classification. The analyzed example shows that classification with the use of coded nominal data or both numerical as well as coded nominal data is more effective than the...

  13. BILINEAR FORMS AND LINEAR CODES

    Institute of Scientific and Technical Information of China (English)

    高莹

    2004-01-01

    Abraham Lempel et al[1] made a connection between linear codes and systems of bilinear forms over finite fields. In this correspondence, a new simple proof of a theorem in [1] is presented; in addition, the encoding process and the decoding procedure of RS codes are simplified via circulant matrices. Finally, the results show that the correspondence between bilinear forms and linear codes is not unique.

  14. Prefix Code Translation by Mapping

    Institute of Scientific and Technical Information of China (English)

    蒋贤春

    1994-01-01

    This paper introduces a new way of prefix code translation.It helps to finish the whole translation by mapping once (only one comparison instruction is needed for getting the length of prefix code),and returns the original data and the length of prefix code element.The decoding time is only about four times as many as the time accessing original data directly.

  15. Generalized PCM coding of Images

    OpenAIRE

    Prades Nebot, José; MORBEE, MARLEEN; DELP, EDWARD

    2012-01-01

    Pulse-code modulation (PCM) with embedded quantization allows the rate of the PCM bitstream to be reduced by simply removing a fixed number of least significant bits from each codeword. Although this source coding technique is extremely simple, it has poor coding efficiency. In this paper, we present a generalized PCM (GPCM) algorithm for images that simply removes bits from each codeword. In contrast to PCM, however, the number and the specific bits that a GPCM encoder removes in each cod...

  16. ACE spectrum of LDPC codes

    Directory of Open Access Journals (Sweden)

    Vukobratović Dejan

    2006-01-01

    Full Text Available Construction of short-length LDPC codes with good, both waterfall and error-floor, behavior is still an attractive research problem. Recently proposed construction algorithms in this field are based on remarkably simple ideas, but yet, their effectiveness can still be questioned. In this paper we investigate a novel measure of goodness of a given LDPC code namely its ACE spectrum, based on a previously introduced ACE metrics associated with each cycle in LDPC code graph.

  17. Ethical codes in business practice

    OpenAIRE

    Kobrlová, Marie

    2013-01-01

    The diploma thesis discusses the issues of ethics and codes of ethics in business. The theoretical part defines basic concepts of ethics, presents its historical development and the methods and tools of business ethics. It also focuses on ethical codes and the area of law and ethics. The practical part consists of a quantitative survey, which provides views of selected business entities of business ethics and the use of codes of ethics in practice.

  18. Explosive Formulation Code Naming SOP

    Energy Technology Data Exchange (ETDEWEB)

    Martz, H. E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-09-19

    The purpose of this SOP is to provide a procedure for giving individual HME formulations code names. A code name for an individual HME formulation consists of an explosive family code, given by the classified guide, followed by a dash, -, and a number. If the formulation requires preparation such as packing or aging, these add additional groups of symbols to the X-ray specimen name.

  19. Combinatorial aspects of code loops

    OpenAIRE

    Vojtěchovský, Petr

    2007-01-01

    The existence and uniqueness (up to equivalence) of code loops was first established by R. Griess. Nevertheless, the explicit construction of code loops remained open until T. Hsu introduced the notion of symplectic cubic spaces and their Frattini extensions, and pointed out how the construction of code loops followed from the (purely combinatorial) result of O. Chein and E. Goodaire. Within this paper, we focus on their combinatorial construction and prove a more general result using the lan...

  20. Astrophysics Source Code Library Enhancements

    CERN Document Server

    Hanisch, Robert J; Berriman, G Bruce; DuPrie, Kimberly; Mink, Jessica; Nemiroff, Robert J; Schmidt, Judy; Shamir, Lior; Shortridge, Keith; Taylor, Mark; Teuben, Peter J; Wallin, John

    2014-01-01

    The Astrophysics Source Code Library (ASCL; ascl.net) is a free online registry of codes used in astronomy research; it currently contains over 900 codes and is indexed by ADS. The ASCL has recently moved a new infrastructure into production. The new site provides a true database for the code entries and integrates the WordPress news and information pages and the discussion forum into one site. Previous capabilities are retained and permalinks to ascl.net continue to work. This improvement offers more functionality and flexibility than the previous site, is easier to maintain, and offers new possibilities for collaboration. This presentation covers these recent changes to the ASCL.

  1. Should you learn to code?

    CERN Document Server

    Team, The Hyperink

    2013-01-01

    On May 15, 2012 Jeff Atwood (co-founder of Stack Overflow) published a blog post titled "Please Don't Learn to Code" in response to Mayor Mike Bloomberg's resolution to learn how to code in 2012. In that post he argues against "learning to code just for the sake of learning how to code," a sentiment that sparked an active online debate. This book is a compilation of several different perspectives on that debate. Should programming be taught to every student as part of their core curriculum, similar to mathematics, reading, and writing? Should every working professional take time to learn a

  2. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  3. Programming Entity Framework Code First

    CERN Document Server

    Lerman, Julia

    2011-01-01

    Take advantage of the Code First data modeling approach in ADO.NET Entity Framework, and learn how to build and configure a model based on existing classes in your business domain. With this concise book, you'll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration. Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you're working with an exis

  4. Vectorization, parallelization and porting of nuclear codes (vectorization and parallelization). Progress report fiscal 1998

    International Nuclear Information System (INIS)

    Several computer codes in the nuclear field have been vectorized, parallelized and transported on the FUJITSU VPP500 system, the AP3000 system and the Paragon system at Center for Promotion of Computational Science and Engineering in Japan Atomic Energy Research Institute. We dealt with 12 codes in fiscal 1998. These results are reported in 3 parts, i.e., the vectorization and parallelization on vector processors part, the parallelization on scalar processors part and the porting part. In this report, we describe the vectorization and parallelization on vector processors. In this vectorization and parallelization on vector processors part, the vectorization of General Tokamak Circuit Simulation Program code GTCSP, the vectorization and parallelization of Molecular Dynamics NTV (n-particle, Temperature and Velocity) Simulation code MSP2, Eddy Current Analysis code EDDYCAL, Thermal Analysis Code for Test of Passive Cooling System by HENDEL T2 code THANPACST2 and MHD Equilibrium code SELENEJ on the VPP500 are described. In the parallelization on scalar processors part, the parallelization of Monte Carlo N-Particle Transport code MCNP4B2, Plasma Hydrodynamics code using Cubic Interpolated Propagation Method PHCIP and Vectorized Monte Carlo code (continuous energy model / multi-group model) MVP/GMVP on the Paragon are described. In the porting part, the porting of Monte Carlo N-Particle Transport code MCNP4B2 and Reactor Safety Analysis code RELAP5 on the AP3000 are described. (author)

  5. Vectorization, parallelization and porting of nuclear codes (vectorization and parallelization). Progress report fiscal 1998

    Energy Technology Data Exchange (ETDEWEB)

    Ishizuki, Shigeru; Kawai, Wataru; Nemoto, Toshiyuki [Fujitsu Ltd., Tokyo (Japan); Ogasawara, Shinobu; Kume, Etsuo; Adachi, Masaaki; Kawasaki, Nobuo [Center for Promotion of Computational Science and Engineering (Tokai Site), Japan Atomic Energy Research Institute, Tokai, Ibaraki (Japan); Yatake, Yo-ichi [Hitachi Ltd., Tokyo (Japan)

    2000-03-01

    Several computer codes in the nuclear field have been vectorized, parallelized and transported on the FUJITSU VPP500 system, the AP3000 system and the Paragon system at Center for Promotion of Computational Science and Engineering in Japan Atomic Energy Research Institute. We dealt with 12 codes in fiscal 1998. These results are reported in 3 parts, i.e., the vectorization and parallelization on vector processors part, the parallelization on scalar processors part and the porting part. In this report, we describe the vectorization and parallelization on vector processors. In this vectorization and parallelization on vector processors part, the vectorization of General Tokamak Circuit Simulation Program code GTCSP, the vectorization and parallelization of Molecular Dynamics NTV (n-particle, Temperature and Velocity) Simulation code MSP2, Eddy Current Analysis code EDDYCAL, Thermal Analysis Code for Test of Passive Cooling System by HENDEL T2 code THANPACST2 and MHD Equilibrium code SELENEJ on the VPP500 are described. In the parallelization on scalar processors part, the parallelization of Monte Carlo N-Particle Transport code MCNP4B2, Plasma Hydrodynamics code using Cubic Interpolated Propagation Method PHCIP and Vectorized Monte Carlo code (continuous energy model / multi-group model) MVP/GMVP on the Paragon are described. In the porting part, the porting of Monte Carlo N-Particle Transport code MCNP4B2 and Reactor Safety Analysis code RELAP5 on the AP3000 are described. (author)

  6. Detecting overlapping coding sequences in virus genomes

    Directory of Open Access Journals (Sweden)

    Brown Chris M

    2006-02-01

    Full Text Available Abstract Background Detecting new coding sequences (CDSs in viral genomes can be difficult for several reasons. The typically compact genomes often contain a number of overlapping coding and non-coding functional elements, which can result in unusual patterns of codon usage; conservation between related sequences can be difficult to interpret – especially within overlapping genes; and viruses often employ non-canonical translational mechanisms – e.g. frameshifting, stop codon read-through, leaky-scanning and internal ribosome entry sites – which can conceal potentially coding open reading frames (ORFs. Results In a previous paper we introduced a new statistic – MLOGD (Maximum Likelihood Overlapping Gene Detector – for detecting and analysing overlapping CDSs. Here we present (a an improved MLOGD statistic, (b a greatly extended suite of software using MLOGD, (c a database of results for 640 virus sequence alignments, and (d a web-interface to the software and database. Tests show that, from an alignment with just 20 mutations, MLOGD can discriminate non-overlapping CDSs from non-coding ORFs with a typical accuracy of up to 98%, and can detect CDSs overlapping known CDSs with a typical accuracy of 90%. In addition, the software produces a variety of statistics and graphics, useful for analysing an input multiple sequence alignment. Conclusion MLOGD is an easy-to-use tool for virus genome annotation, detecting new CDSs – in particular overlapping or short CDSs – and for analysing overlapping CDSs following frameshift sites. The software, web-server, database and supplementary material are available at http://guinevere.otago.ac.nz/mlogd.html.

  7. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  8. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  9. Patched Conic Trajectory Code

    Science.gov (United States)

    Park, Brooke Anderson; Wright, Henry

    2012-01-01

    PatCon code was developed to help mission designers run trade studies on launch and arrival times for any given planet. Initially developed in Fortran, the required inputs included launch date, arrival date, and other orbital parameters of the launch planet and arrival planets at the given dates. These parameters include the position of the planets, the eccentricity, semi-major axes, argument of periapsis, ascending node, and inclination of the planets. With these inputs, a patched conic approximation is used to determine the trajectory. The patched conic approximation divides the planetary mission into three parts: (1) the departure phase, in which the two relevant bodies are Earth and the spacecraft, and where the trajectory is a departure hyperbola with Earth at the focus; (2) the cruise phase, in which the two bodies are the Sun and the spacecraft, and where the trajectory is a transfer ellipse with the Sun at the focus; and (3) the arrival phase, in which the two bodies are the target planet and the spacecraft, where the trajectory is an arrival hyperbola with the planet as the focus.

  10. B Vitamins

    Science.gov (United States)

    The B vitamins are B1 (thiamine) B2 (riboflavin) B3 (niacin) B5 (pantothenic acid) B6 B7 (biotin) B12 Folic acid ... help form red blood cells. You can get B vitamins from proteins such as fish, poultry, meat, ...

  11. Upgrade of FUMACS code package

    International Nuclear Information System (INIS)

    The FUMACS code package (an acronym of FUel MAnagement Code System) was developed at Rudjer Boskovic Institute in year 1991 with the aim to enable in-core fuel management analysis of the NPP Krsko core for nominal (full power) conditions. The modernization and uprating of the NPP Krsko core from 1876 to 1994 MW (th) performed in year 2000 resulted in the change of operating conditions. The old version of the FUMACS code package would not model properly the NPP Krsko core for the new operating conditions. The upgrade of the FUMACS code package to enable the modeling of the NPP Krsko core for uprated conditions and longer cycles required modifications of master files, libraries and codes. In order to make the code package more user friendly, Windows (95/98/NT) compatible version of the code package, with incorporated graphical user interface has been developed. The new version of the code package has been verified and validated for new operating conditions through modeling and comparison of results with referent design of a number of 12-month and 18-month operating cycles.(author)

  12. Accident consequence assessment code development

    International Nuclear Information System (INIS)

    This paper describes the new computer code system, OSCAAR developed for off-site consequence assessment of a potential nuclear accident. OSCAAR consists of several modules which have modeling capabilities in atmospheric transport, foodchain transport, dosimetry, emergency response and radiological health effects. The major modules of the consequence assessment code are described, highlighting the validation and verification of the models. (author)

  13. Recommendations for ECG diagnostic coding

    NARCIS (Netherlands)

    Bonner, R.E.; Caceres, C.A.; Cuddy, T.E.; Meijler, F.L.; Milliken, J.A.; Rautaharju, P.M.; Robles de Medina, E.O.; Willems, J.L.; Wolf, H.K.; Working Group 'Diagnostic Codes'

    1978-01-01

    The Oxford dictionary defines code as "a body of laws so related to each other as to avoid inconsistency and overlapping". It is obvious that natural language with its high degree of ambiguity does not qualify as a code in the sense of this definition. Everyday experiences provide ample evidence tha

  14. Using NAEYC's Code of Ethics.

    Science.gov (United States)

    Young Children, 1995

    1995-01-01

    Considers how to deal with an ethical dilemma concerning a caregiver's dislike for a child. Recognizes that no statement in NAEYC's Code of Ethical Conduct requires that a professional must like each child, and presents some ideals and principles from the code that may guide professionals through similar situations. (BAC)

  15. Cyclic Codes of Length 2

    Indian Academy of Sciences (India)

    Manju Pruthi

    2001-11-01

    In this paper explicit expressions of + 1 idempotents in the ring $R = F_q[X]/\\langle X^{2^m}-1\\rangle$ are given. Cyclic codes of length 2 over the finite field , of odd characteristic, are defined in terms of their generator polynomials. The exact minimum distance and the dimension of the codes are obtained.

  16. Revised Safety Code A2

    CERN Document Server

    SC Secretariat

    2005-01-01

    Please note that the revised Safety Code A2 (Code A2 rev.) entitled "REPORTING OF ACCIDENTS AND NEAR MISSES" is available on the web at the following url: https://edms.cern.ch/document/335502/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  17. Quantum Convolutional Error Correction Codes

    OpenAIRE

    Chau, H. F.

    1998-01-01

    I report two general methods to construct quantum convolutional codes for quantum registers with internal $N$ states. Using one of these methods, I construct a quantum convolutional code of rate 1/4 which is able to correct one general quantum error for every eight consecutive quantum registers.

  18. Flow Analysis of Code Customizations

    DEFF Research Database (Denmark)

    Hessellund, Anders; Sestoft, Peter

    2008-01-01

    Inconsistency between metadata and code customizations is a major concern in modern, configurable enterprise systems. The increasing reliance on metadata, in the form of XML files, and code customizations, in the form of Java files, has led to a hybrid development platform. The expected consistency...

  19. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions with a...

  20. ACCELERATION PHYSICS CODE WEB REPOSITORY.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.

    2006-06-26

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  1. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  2. Mobile Konami Code Source Files

    OpenAIRE

    Boomgaarden, Jacob; Corney, Joshua

    2015-01-01

    An archive file of Android source code projects available for import into Android Studio. These projects were utilized in the research for the following thesis: MOBILE KONAMI CODES: ANALYSIS OF ANDROID MALWARE SERVICES UTILIZING SENSOR AND RESOURCE-BASED STATE CHANGES. This thesis may be found here: http://calhoun.nps.edu/handle/10945/45163

  3. Non-Protein Coding RNAs

    CERN Document Server

    Walter, Nils G; Batey, Robert T

    2009-01-01

    This book assembles chapters from experts in the Biophysics of RNA to provide a broadly accessible snapshot of the current status of this rapidly expanding field. The 2006 Nobel Prize in Physiology or Medicine was awarded to the discoverers of RNA interference, highlighting just one example of a large number of non-protein coding RNAs. Because non-protein coding RNAs outnumber protein coding genes in mammals and other higher eukaryotes, it is now thought that the complexity of organisms is correlated with the fraction of their genome that encodes non-protein coding RNAs. Essential biological processes as diverse as cell differentiation, suppression of infecting viruses and parasitic transposons, higher-level organization of eukaryotic chromosomes, and gene expression itself are found to largely be directed by non-protein coding RNAs. The biophysical study of these RNAs employs X-ray crystallography, NMR, ensemble and single molecule fluorescence spectroscopy, optical tweezers, cryo-electron microscopy, and ot...

  4. Best practices for code release

    Science.gov (United States)

    Berriman, G. Bruce

    2016-01-01

    In this talk, I want to describe what I think are the best practices for releasing code and having it adopted by end users. Make sure your code is licensed, so users will know how the software can be used and modified, and place your code in a public repository that (and make sure that you follow institutional policies in doing this). Yet licensing and releasing code are not enough: the code must be organized and documented so users can understand what it does, what its limitations are, and how to build and use it. I will describe what I think are best practices in developing the content to support release, including tutorials, design documents, specifications of interfaces and so on. Much of what I have learned on based on ten years of experience in supporting releases of the Montage Image Mosaic Engine.

  5. PARAVT: Parallel Voronoi tessellation code

    Science.gov (United States)

    González, R. E.

    2016-10-01

    In this study, we present a new open source code for massive parallel computation of Voronoi tessellations (VT hereafter) in large data sets. The code is focused for astrophysical purposes where VT densities and neighbors are widely used. There are several serial Voronoi tessellation codes, however no open source and parallel implementations are available to handle the large number of particles/galaxies in current N-body simulations and sky surveys. Parallelization is implemented under MPI and VT using Qhull library. Domain decomposition takes into account consistent boundary computation between tasks, and includes periodic conditions. In addition, the code computes neighbors list, Voronoi density, Voronoi cell volume, density gradient for each particle, and densities on a regular grid. Code implementation and user guide are publicly available at https://github.com/regonzar/paravt.

  6. Continuous Non-malleable Codes

    DEFF Research Database (Denmark)

    Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus;

    2014-01-01

    -malleable codes where the adversary only is allowed to tamper a single time with an encoding. We show how to construct continuous non-malleable codes in the common split-state model where an encoding consist of two parts and the tampering can be arbitrary but has to be independent with both parts. Our main......Non-malleable codes are a natural relaxation of error correcting/ detecting codes that have useful applications in the context of tamper resilient cryptography. Informally, a code is non-malleable if an adversary trying to tamper with an encoding of a given message can only leave it unchanged...... or modify it to the encoding of a completely unrelated value. This paper introduces an extension of the standard non-malleability security notion - so-called continuous non-malleability - where we allow the adversary to tamper continuously with an encoding. This is in contrast to the standard notion of non...

  7. Portable code development in C

    Energy Technology Data Exchange (ETDEWEB)

    Brown, S.A.

    1990-11-06

    With a new generation of high performance computers appearing around us on a time scale of months, a new challenge for developers of simulation codes is to write and maintain production codes that are both highly portable and maximally efficient. My contention is that C is the language that is both best suited to that goal and is widely available today. GLF is a new code written mainly in C which is intended to have all of the XRASER physics and run on any platform of interest. It demonstrates the power of the C paradigm for code developers and flexibility and ease of use for the users. Three fundamental problems are discussed: the C/UNIX development environment; the supporting tools and libraries which handle data and graphics portability issues; and the advantages of C in numerical simulation code development.

  8. Code of practice for site radiography

    International Nuclear Information System (INIS)

    The Code of Practice is set out in Parts, entitled: introduction, administrative organisation (including organisation for radiological protection, medical supervision, personal monitoring, transfer record, control of sealed sources, equipment tests, site visits); operator competence equipment (including x-ray equipment, gamma ray equipment, pipeline crawler equipment, safety equipment); methods of work; carriage of sources by road; emergency procedures (including sections dealing with (a) x-ray apparatus, (b) radioactive substances in use, and (c) radioactive substances not in use); legal considerations. (U.K.)

  9. Super Special Codes using Super Matrices

    CERN Document Server

    Kandasamy, W B Vasantha; Ilanthenral, K

    2010-01-01

    The new classes of super special codes are constructed in this book using the specially constructed super special vector spaces. These codes mainly use the super matrices. These codes can be realized as a special type of concatenated codes. This book has four chapters. In chapter one basic properties of codes and super matrices are given. A new type of super special vector space is constructed in chapter two of this book. Three new classes of super special codes namely, super special row code, super special column code and super special codes are introduced in chapter three. Applications of these codes are given in the final chapter.

  10. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  11. Detecting non-coding selective pressure in coding regions

    Directory of Open Access Journals (Sweden)

    Blanchette Mathieu

    2007-02-01

    Full Text Available Abstract Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements.

  12. CYCLIC CODES OVER FORMAL POWER SERIES RINGS

    Institute of Scientific and Technical Information of China (English)

    Dougherty Steven T.; Liu Hongwei

    2011-01-01

    In this article, cyclic codes and negacyclic codes over formal power series rings are studied. The structure of cyclic codes over this class of rings is given, and the relationship between these codes and cyclic codes over finite chain rings is obtained. Using an isomorphism between cyclic and negacyclic codes over formal power series rings, the structure of negacyclic codes over the formal power series rings is obtained.

  13. HELIAS module development for systems codes

    Energy Technology Data Exchange (ETDEWEB)

    Warmer, F., E-mail: Felix.Warmer@ipp.mpg.de; Beidler, C.D.; Dinklage, A.; Egorov, K.; Feng, Y.; Geiger, J.; Schauer, F.; Turkin, Y.; Wolf, R.; Xanthopoulos, P.

    2015-02-15

    In order to study and design next-step fusion devices such as DEMO, comprehensive systems codes are commonly employed. In this work HELIAS-specific models are proposed which are designed to be compatible with systems codes. The subsequently developed models include: a geometry model based on Fourier coefficients which can represent the complex 3-D plasma shape, a basic island divertor model which assumes diffusive cross-field transport and high radiation at the X-point, and a coil model which combines scaling aspects based on the HELIAS 5-B reactor design in combination with analytic inductance and field calculations. In addition, stellarator-specific plasma transport is discussed. A strategy is proposed which employs a predictive confinement time scaling derived from 1-D neoclassical and 3-D turbulence simulations. This paper reports on the progress of the development of the stellarator-specific models while an implementation and verification study within an existing systems code will be presented in a separate work. This approach is investigated to ultimately allow one to conduct stellarator system studies, develop design points of HELIAS burning plasma devices, and to facilitate a direct comparison between tokamak and stellarator DEMO and power plant designs.

  14. SRAC95; general purpose neutronics code system

    Energy Technology Data Exchange (ETDEWEB)

    Okumura, Keisuke; Tsuchihashi, Keichiro [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment; Kaneko, Kunio

    1996-03-01

    SRAC is a general purpose neutronics code system applicable to core analyses of various types of reactors. Since the publication of JAERI-1302 for the revised SRAC in 1986, a number of additions and modifications have been made for nuclear data libraries and programs. Thus, the new version SRAC95 has been completed. The system consists of six kinds of nuclear data libraries(ENDF/B-IV, -V, -VI, JENDL-2, -3.1, -3.2), five modular codes integrated into SRAC95; collision probability calculation module (PIJ) for 16 types of lattice geometries, Sn transport calculation modules(ANISN, TWOTRAN), diffusion calculation modules(TUD, CITATION) and two optional codes for fuel assembly and core burn-up calculations(newly developed ASMBURN, revised COREBN). In this version, many new functions and data are implemented to support nuclear design studies of advanced reactors, especially for burn-up calculations. SRAC95 is available not only on conventional IBM-compatible computers but also on scalar or vector computers with the UNIX operating system. This report is the SRAC95 users manual which contains general description, contents of revisions, input data requirements, detail information on usage, sample input data and list of available libraries. (author).

  15. ETR/ITER systems code

    Energy Technology Data Exchange (ETDEWEB)

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.; Bulmer, R.H.; Busigin, A.; DuBois, P.F.; Fenstermacher, M.E.; Fink, J.; Finn, P.A.; Galambos, J.D.; Gohar, Y.; Gorker, G.E.; Haines, J.R.; Hassanein, A.M.; Hicks, D.R.; Ho, S.K.; Kalsi, S.S.; Kalyanam, K.M.; Kerns, J.A.; Lee, J.D.; Miller, J.R.; Miller, R.L.; Myall, J.O.; Peng, Y-K.M.; Perkins, L.J.; Spampinato, P.T.; Strickler, D.J.; Thomson, S.L.; Wagner, C.E.; Willms, R.S.; Reid, R.L. (ed.)

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs.

  16. Constructions of Rank Modulation Codes

    CERN Document Server

    Mazumdar, Arya; Zémor, Gilles

    2011-01-01

    Rank modulation is a way of encoding information to correct errors in flash memory devices as well as impulse noise in transmission lines. Modeling rank modulation involves construction of packings of the space of permutations equipped with the Kendall tau distance. We present several general constructions of codes in permutations that cover a broad range of code parameters. In particular, we show a number of ways in which conventional error-correcting codes can be modified to correct errors in the Kendall space. Codes that we construct afford simple encoding and decoding algorithms of essentially the same complexity as required to correct errors in the Hamming metric. For instance, from binary BCH codes we obtain codes correcting $t$ Kendall errors in $n$ memory cells that support the order of $n!/(\\log_2n!)^t$ messages, for any constant $t= 1,2,...$ We also construct families of codes that correct a number of errors that grows with $n$ at varying rates, from $\\Theta(n)$ to $\\Theta(n^{2})$. One of our constr...

  17. Stability analysis by ERATO code

    International Nuclear Information System (INIS)

    Problems in MHD stability calculations by ERATO code are described; which concern convergence property of results, equilibrium codes, and machine optimization of ERATO code. It is concluded that irregularity on a convergence curve is not due to a fault of the ERATO code itself but due to inappropriate choice of the equilibrium calculation meshes. Also described are a code to calculate an equilibrium as a quasi-inverse problem and a code to calculate an equilibrium as a result of a transport process. Optimization of the code with respect to I/O operations reduced both CPU time and I/O time considerably. With the FACOM230-75 APU/CPU multiprocessor system, the performance is about 6 times as high as with the FACOM230-75 CPU, showing the effectiveness of a vector processing computer for the kind of MHD computations. This report is a summary of the material presented at the ERATO workshop 1979(ORNL), supplemented with some details. (author)

  18. Network coding with modular lattices

    CERN Document Server

    Kendziorra, Andreas

    2010-01-01

    In [1], K\\"otter and Kschischang presented a new model for error correcting codes in network coding. The alphabet in this model is the subspace lattice of a given vector space, a code is a subset of this lattice and the used metric on this alphabet is the map d: (U, V) \\longmapsto dim(U + V) - dim(U \\bigcap V). In this paper we generalize this model to arbitrary modular lattices, i.e. we consider codes, which are subsets of modular lattices. The used metric in this general case is the map d: (x, y) \\longmapsto h(x \\bigvee y) - h(x \\bigwedge y), where h is the height function of the lattice. We apply this model to submodule lattices. Moreover, we show a method to compute the size of spheres in certain modular lattices and present a sphere packing bound, a sphere covering bound, and a singleton bound for codes, which are subsets of modular lattices. [1] R. K\\"otter, F.R. Kschischang: Coding for errors and erasures in random network coding, IEEE Trans. Inf. Theory, Vol. 54, No. 8, 2008

  19. ETR/ITER systems code

    International Nuclear Information System (INIS)

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs

  20. Coding design for error correcting output codes based on perceptron

    Science.gov (United States)

    Zhou, Jin-Deng; Wang, Xiao-Dan; Zhou, Hong-Jian; Cui, Yong-Hua; Jing, Sun

    2012-05-01

    It is known that error-correcting output codes (ECOC) is a common way to model multiclass classification problems, in which the research of encoding based on data is attracting more and more attention. We propose a method for learning ECOC with the help of a single-layered perception neural network. To achieve this goal, the code elements of ECOC are mapped to the weights of network for the given decoding strategy, and an object function with the constrained weights is used as a cost function of network. After the training, we can obtain a coding matrix including lots of subgroups of class. Experimental results on artificial data and University of California Irvine with logistic linear classifier and support vector machine as the binary learner show that our scheme provides better performance of classification with shorter length of coding matrix than other state-of-the-art encoding strategies.

  1. 15 CFR Appendix B to Part 30 - AES Filing Codes

    Science.gov (United States)

    2010-01-01

    ... exemptions: Currency Airline tickets Bank notes Internal revenue stamps State liquor stamps Advertising... Certificate Number Other License Types OPA—Other Partnership Agency License For export license exemptions under International Traffic in Arms Regulations, refer to 22 CFR 120-130 of the ITAR for the list...

  2. Network Coding Over The 232

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Heide, Janus; Vingelmann, Peter;

    2013-01-01

    Creating efficient finite field implementations has been an active research topic for several decades. Many appli- cations in areas such as cryptography, signal processing, erasure coding and now also network coding depend on this research to deliver satisfactory performance. In this paper we...... investigate the use of prime fields with a field size of 232 − 5, as this allows implementations which combines high field sizes and low complexity. First we introduce the algorithms needed to apply prime field arithmetics to arbitrary binary data. After this we present the initial throughput measurements...... will be useful in many network coding applications where large field sizes are required....

  3. Studies on DANESS Code Modeling

    International Nuclear Information System (INIS)

    The DANESS code modeling study has been performed. DANESS code is widely used in a dynamic fuel cycle analysis. Korea Atomic Energy Research Institute (KAERI) has used the DANESS code for the Korean national nuclear fuel cycle scenario analysis. In this report, the important models such as Energy-demand scenario model, New Reactor Capacity Decision Model, Reactor and Fuel Cycle Facility History Model, and Fuel Cycle Model are investigated. And, some models in the interface module are refined and inserted for Korean nuclear fuel cycle model. Some application studies have also been performed for GNEP cases and for US fast reactor scenarios with various conversion ratios

  4. Network Coding Fundamentals and Applications

    CERN Document Server

    Medard, Muriel

    2011-01-01

    Network coding is a field of information and coding theory and is a method of attaining maximum information flow in a network. This book is an ideal introduction for the communications and network engineer, working in research and development, who needs an intuitive introduction to network coding and to the increased performance and reliability it offers in many applications. This book is an ideal introduction for the research and development communications and network engineer who needs an intuitive introduction to the theory and wishes to understand the increased performance and reliabil

  5. Writing the Live Coding Book

    DEFF Research Database (Denmark)

    Cox, Geoff; Blackwell, Alan; Lee, Sang Wong

    2016-01-01

    This paper is a speculation on the relationship between coding and writing, and the ways in which technical innovations and capabilities enable us to rethink each in terms of the other. As a case study, we draw on recent experiences of preparing a book on live coding, which integrates a wide range...... of personal, historical, technical and critical perspectives. This book project has been both experimental and reflective, in a manner that allows us to draw on critical understanding of both code and writing, and point to the potential for new practices in the future....

  6. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...... steps, conventionally performed at the video encoder side, to the decoder side. Emerging applications such as wireless visual sensor networks and wireless video surveillance all require lightweight video encoding with high coding efficiency and error-resilience. The video data of DVC schemes differ from...

  7. LiveCode mobile development

    CERN Document Server

    Lavieri, Edward D

    2013-01-01

    A practical guide written in a tutorial-style, ""LiveCode Mobile Development Hotshot"" walks you step-by-step through 10 individual projects. Every project is divided into sub tasks to make learning more organized and easy to follow along with explanations, diagrams, screenshots, and downloadable material.This book is great for anyone who wants to develop mobile applications using LiveCode. You should be familiar with LiveCode and have access to a smartphone. You are not expected to know how to create graphics or audio clips.

  8. PRACTICAL ALGORITHMS FOR TORNADO CODES

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Tornado codes have been used in the error control of data transmission in IP network. The efficiency of this erasure codes is critically affected by the short cycles in its bipartite graph. To remove this effect,two algorithms are introduced: (1) while generating the graph, the cycle eliminating algorithm is used to reduce the number of the short cycles in it; (2) in the decoding algorithm, cycles that are inevitably in the graph are used to remove decoding efficiency degradation. The simulation results show that they have a better performance than that of general tornado codes.

  9. Use of the TRAC/BF1 code in BWR reactors instability studies

    International Nuclear Information System (INIS)

    The RETRAN and TRAC codes are examples of temporary codes that are used to analyze the stability of B.W.R. Although, in many cases, this codes present good results and predict the expected behaviour, they are very sensitive to the variations of core modeling, like for example, variations in the number of cells. This can question seriously the reliability and obviously the acceptability of the analysis done with this temporary codes. In this paper we present a work using the TRAC-BF1 code to simulate the in-phase and out-of-phase oscillations, and the influence of the chose of some parameters. (author)

  10. Rate-adaptive Constellation Shaping for Near-capacity Achieving Turbo Coded BICM

    DEFF Research Database (Denmark)

    Yankov, Metodi Plamenov; Forchhammer, Søren; Larsen, Knud J.;

    2014-01-01

    In this paper the problem of constellation shaping is considered. Mapping functions are designed for a many- to-one signal shaping strategy, combined with a turbo coded Bit-interleaved Coded Modulation (BICM), based on symmetric Huffman codes with binary reflected Gray-like properties. An algorithm...... quality estimation. Gains of more than 1dB are observed for high SNR compared to conventional turbo coded BICM, and it is shown that the mapping functions designed here significantly outperform current state of the art Turbo- Trellis Coded Modulation and other existing constellation shaping methods...

  11. TASS code topical report. V.3 TASS code user's manual

    International Nuclear Information System (INIS)

    TASS code has been developed by KAERI as a part of the nuclear safety enhancement project which has been funded by the long term nuclear research and development program. This manual is thus prepared for the TASS code users to help their non-LOCA licensing transient analyses for the CE and Westinghouse type plants operating or under construction in Korea. This user's manual describes the guidance for using TASS 1.0 code, TASS 1.0 input and TASS 1.0 standard output. The input of TASS 1.0 code is categorized and described in the areas of core power, primary system, secondary system, wall heat, malfunctions and leak, BOP, and control system. Sample input and output of the main feedwater line break event are included to illustrate its use. The TASS 1.0 code commands, data dictionary and the list of the input are appended to this manual. This TASS 1.0 code user's manual will be submitted as a part of the TASS 1.0 topical report to the regulatory body for its licensing review in the non-LOCA transient analyses for the CE and Westinghouse type plants in Korea. (author). 5 refs., 26 tabs., 7 figs

  12. Block error correction codes for face recognition

    Science.gov (United States)

    Hussein, Wafaa R.; Sellahewa, Harin; Jassim, Sabah A.

    2011-06-01

    Face recognition is one of the most desirable biometric-based authentication schemes to control access to sensitive information/locations and as a proof of identity to claim entitlement to services. The aim of this paper is to develop block-based mechanisms, to reduce recognition errors that result from varying illumination conditions with emphasis on using error correction codes. We investigate the modelling of error patterns in different parts/blocks of face images as a result of differences in illumination conditions, and we use appropriate error correction codes to deal with the corresponding distortion. We test the performance of our proposed schemes using the Extended Yale-B Face Database, which consists of face images belonging to 5 illumination subsets depending on the direction of light source from the camera. In our experiments each image is divided into three horizontal regions as follows: region1, three rows above the eyebrows, eyebrows and eyes; region2, nose region and region3, mouth and chin region. By estimating statistical parameters for errors in each region we select suitable BCH error correction codes that yield improved recognition accuracy for that particular region in comparison to applying error correction codes to the entire image. Discrete Wavelet Transform (DWT) to a depth of 3 is used for face feature extraction, followed by global/local binarization of coefficients in each subbands. We shall demonstrate that the use of BCH improves separation of the distribution of Hamming distances of client-client samples from the distribution of Hamming distances of imposter-client samples.

  13. Foundational development of an advanced nuclear reactor integrated safety code.

    Energy Technology Data Exchange (ETDEWEB)

    Clarno, Kevin (Oak Ridge National Laboratory, Oak Ridge, TN); Lorber, Alfred Abraham; Pryor, Richard J.; Spotz, William F.; Schmidt, Rodney Cannon; Belcourt, Kenneth (Ktech Corporation, Albuquerque, NM); Hooper, Russell Warren; Humphries, Larry LaRon

    2010-02-01

    This report describes the activities and results of a Sandia LDRD project whose objective was to develop and demonstrate foundational aspects of a next-generation nuclear reactor safety code that leverages advanced computational technology. The project scope was directed towards the systems-level modeling and simulation of an advanced, sodium cooled fast reactor, but the approach developed has a more general applicability. The major accomplishments of the LDRD are centered around the following two activities. (1) The development and testing of LIME, a Lightweight Integrating Multi-physics Environment for coupling codes that is designed to enable both 'legacy' and 'new' physics codes to be combined and strongly coupled using advanced nonlinear solution methods. (2) The development and initial demonstration of BRISC, a prototype next-generation nuclear reactor integrated safety code. BRISC leverages LIME to tightly couple the physics models in several different codes (written in a variety of languages) into one integrated package for simulating accident scenarios in a liquid sodium cooled 'burner' nuclear reactor. Other activities and accomplishments of the LDRD include (a) further development, application and demonstration of the 'non-linear elimination' strategy to enable physics codes that do not provide residuals to be incorporated into LIME, (b) significant extensions of the RIO CFD code capabilities, (c) complex 3D solid modeling and meshing of major fast reactor components and regions, and (d) an approach for multi-physics coupling across non-conformal mesh interfaces.

  14. Sidelobe reduction of Barker codes, part 7.1C

    Science.gov (United States)

    Green, J. L.

    1984-01-01

    Barker codes can be realized as simple digital preprocessors, or with the use of a delay line, can be realized as an analogue device. Assuming the process observed has an autocorrelation time that is long compared to the code length, a gain in signal to noise, G = N where N is the number of elements in the code, may be realized. Typically Barker codes are implemented by shifting the phase of the transmitted signal by 0 or 180 degrees according to the code pattern. A typical detection scheme is shown where the output of the radar receiver is delayed by an analogue delay line or a shift register. The signal in each element of the delay line or shift register is continuously multiplied by the code and all elements are summed. A principal disadvantage was the sidelobe response. In the case of MST or ST radar echoes where there is a dynamic range as large as 60 dB, these unwanted sidelobes cause an increase in the apparent width of atmospheric layers, or some narrow layer to appear at several altitudes. The sidelobes of a Barker code may be reduced by tapering the response of the decoder. Optimum tapers, are shown. It is found that the sidelobe response is greatly reduced with very little loss in G.

  15. Assessment of systems codes and their coupling with CFD codes in thermal–hydraulic applications to innovative reactors

    International Nuclear Information System (INIS)

    Highlights: • The assessment of RELAP5, TRACE and CATHARE system codes on integral experiments is presented. • Code benchmark of CATHARE, DYN2B, and ATHLET on PHENIX natural circulation experiment. • Grid-free pool modelling based on proper orthogonal decomposition for system codes is explained. • The code coupling methodologies are explained. • The coupling of several CFD/system codes is tested against integral experiments. - Abstract: The THINS project of the 7th Framework EU Program on nuclear fission safety is devoted to the investigation of crosscutting thermal–hydraulic issues for innovative nuclear systems. A significant effort in the project has been dedicated to the qualification and validation of system codes currently employed in thermal–hydraulic transient analysis for nuclear reactors. This assessment is based either on already available experimental data, or on the data provided by test campaigns carried out in the frame of THINS project activities. Data provided by TALL and CIRCE facilities were used in the assessment of system codes for HLM reactors, while the PHENIX ultimate natural circulation test was used as reference for a benchmark exercise among system codes for sodium-cooled reactor applications. In addition, a promising grid-free pool model based on proper orthogonal decomposition is proposed to overcome the limits shown by the thermal–hydraulic system codes in the simulation of pool-type systems. Furthermore, multi-scale system-CFD solutions have been developed and validated for innovative nuclear system applications. For this purpose, data from the PHENIX experiments have been used, and data are provided by the tests conducted with new configuration of the TALL-3D facility, which accommodates a 3D test section within the primary circuit. The TALL-3D measurements are currently used for the validation of the coupling between system and CFD codes

  16. Introduction to coding and information theory

    CERN Document Server

    Roman, Steven

    1997-01-01

    This book is intended to introduce coding theory and information theory to undergraduate students of mathematics and computer science. It begins with a review of probablity theory as applied to finite sample spaces and a general introduction to the nature and types of codes. The two subsequent chapters discuss information theory: efficiency of codes, the entropy of information sources, and Shannon's Noiseless Coding Theorem. The remaining three chapters deal with coding theory: communication channels, decoding in the presence of errors, the general theory of linear codes, and such specific codes as Hamming codes, the simplex codes, and many others.

  17. Facilitating Internet-Scale Code Retrieval

    Science.gov (United States)

    Bajracharya, Sushil Krishna

    2010-01-01

    Internet-Scale code retrieval deals with the representation, storage, and access of relevant source code from a large amount of source code available on the Internet. Internet-Scale code retrieval systems support common emerging practices among software developers related to finding and reusing source code. In this dissertation we focus on some…

  18. Polynomial invariants of quantum codes

    CERN Document Server

    Rains, E M

    1997-01-01

    The weight enumerators (quant-ph/9610040) of a quantum code are quite powerful tools for exploring its structure. As the weight enumerators are quadratic invariants of the code, this suggests the consideration of higher-degree polynomial invariants. We show that the space of degree k invariants of a code of length n is spanned by a set of basic invariants in one-to-one correspondence with S_k^n. We then present a number of equations and inequalities in these invariants; in particular, we give a higher-order generalization of the shadow enumerator of a code, and prove that its coefficients are nonnegative. We also prove that the quartic invariants of a ((4,4,2)) are uniquely determined, an important step in a proof that any ((4,4,2)) is additive ([2]).

  19. The moving mesh code Shadowfax

    CERN Document Server

    Vandenbroucke, Bert

    2016-01-01

    We introduce the moving mesh code Shadowfax, which can be used to evolve a mixture of gas, subject to the laws of hydrodynamics and gravity, and any collisionless fluid only subject to gravity, such as cold dark matter or stars. The code is written in C++ and its source code is made available to the scientific community under the GNU Affero General Public License. We outline the algorithm and the design of our implementation, and demonstrate its validity through the results of a set of basic test problems, which are also part of the public version. We also compare Shadowfax with a number of other publicly available codes using different hydrodynamical integration schemes, illustrating the advantages and disadvantages of the moving mesh technique.

  20. Multimedia signal coding and transmission

    CERN Document Server

    Ohm, Jens-Rainer

    2015-01-01

    This textbook covers the theoretical background of one- and multidimensional signal processing, statistical analysis and modelling, coding and information theory with regard to the principles and design of image, video and audio compression systems. The theoretical concepts are augmented by practical examples of algorithms for multimedia signal coding technology, and related transmission aspects. On this basis, principles behind multimedia coding standards, including most recent developments like High Efficiency Video Coding, can be well understood. Furthermore, potential advances in future development are pointed out. Numerous figures and examples help to illustrate the concepts covered. The book was developed on the basis of a graduate-level university course, and most chapters are supplemented by exercises. The book is also a self-contained introduction both for researchers and developers of multimedia compression systems in industry.

  1. Tree Coding of Bilevel Images

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    1998-01-01

    be investigated within reasonable time prior to generating the code. A number of general-purpose coders are constructed according to this principle. Rissanen's (1989) one-pass algorithm, context, is presented in two modified versions. The baseline is proven to be a universal coder. The faster version, which...... probabilities to an arithmetic coder. The conditional probabilities are estimated from co-occurrence statistics of past pixels, the statistics are stored in a tree. By organizing the code length calculations properly, a vast number of possible models (trees) reflecting different pixel orderings can...... is one order of magnitude slower than JBIG, obtains excellent and highly robust compression performance. A multipass free tree coding scheme produces superior compression results for all test images. A multipass free template coding scheme produces significantly better results than JBIG for difficult...

  2. Electronic Code of Federal Regulations

    Data.gov (United States)

    National Archives and Records Administration — The Electronic Code of Federal Regulations (e-CFR) is the codification of the general and permanent rules published in the Federal Register by the executive...

  3. Allegheny County Zip Code Boundaries

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset demarcates the zip code boundaries that lie within Allegheny County. These are not clipped to the Allgeheny County boundary. If viewing this...

  4. Zip Codes - MDC_WCSZipcode

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — The WCSZipcode polygon feature class was created by Miami-Dade Enterprise Technology Department to be used in the WCS batch jobs to assign the actual zip code of...

  5. PARAVT: Parallel Voronoi Tessellation code

    CERN Document Server

    Gonzalez, Roberto E

    2016-01-01

    We present a new open source code for massive parallel computation of Voronoi tessellations(VT hereafter) in large data sets. The code is focused for astrophysical purposes where VT densities and neighbors are widely used. There are several serial Voronoi tessellation codes, however no open source and parallel implementations are available to handle the large number of particles/galaxies in current N-body simulations and sky surveys. Parallelization is implemented under MPI and VT using Qhull library. Domain decomposition take into account consistent boundary computation between tasks, and support periodic conditions. In addition, the code compute neighbors lists, Voronoi density and Voronoi cell volumes for each particle, and can compute density on a regular grid.

  6. Zip Code Level Enrollment Data

    Data.gov (United States)

    U.S. Department of Health & Human Services — The dataset includes is the number of Qualified Health Plan selections by ZIP code for 36 states that are participating in the Federally-facilitated Marketplace or...

  7. The Serializability of Network Codes

    CERN Document Server

    Blasiak, Anna

    2010-01-01

    Network coding theory studies the transmission of information in networks whose vertices may perform nontrivial encoding and decoding operations on data as it passes through the network. The main approach to deciding the feasibility of network coding problems aims to reduce the problem to optimization over a polytope of entropic vectors subject to constraints imposed by the network structure. In the case of directed acyclic graphs, these constraints are completely understood, but for general graphs the problem of enumerating them remains open: it is not known how to classify the constraints implied by a property that we call serializability, which refers to the absence of paradoxical circular dependencies in a network code. In this work we initiate the first systematic study of the constraints imposed on a network code by serializability. We find that serializability cannot be detected solely by evaluating the Shannon entropy of edge sets in the graph, but nevertheless, we give a polynomial-time algorithm tha...

  8. The moving mesh code SHADOWFAX

    Science.gov (United States)

    Vandenbroucke, B.; De Rijcke, S.

    2016-07-01

    We introduce the moving mesh code SHADOWFAX, which can be used to evolve a mixture of gas, subject to the laws of hydrodynamics and gravity, and any collisionless fluid only subject to gravity, such as cold dark matter or stars. The code is written in C++ and its source code is made available to the scientific community under the GNU Affero General Public Licence. We outline the algorithm and the design of our implementation, and demonstrate its validity through the results of a set of basic test problems, which are also part of the public version. We also compare SHADOWFAX with a number of other publicly available codes using different hydrodynamical integration schemes, illustrating the advantages and disadvantages of the moving mesh technique.

  9. Efficient codes and balanced networks.

    Science.gov (United States)

    Denève, Sophie; Machens, Christian K

    2016-03-01

    Recent years have seen a growing interest in inhibitory interneurons and their circuits. A striking property of cortical inhibition is how tightly it balances excitation. Inhibitory currents not only match excitatory currents on average, but track them on a millisecond time scale, whether they are caused by external stimuli or spontaneous fluctuations. We review, together with experimental evidence, recent theoretical approaches that investigate the advantages of such tight balance for coding and computation. These studies suggest a possible revision of the dominant view that neurons represent information with firing rates corrupted by Poisson noise. Instead, tight excitatory/inhibitory balance may be a signature of a highly cooperative code, orders of magnitude more precise than a Poisson rate code. Moreover, tight balance may provide a template that allows cortical neurons to construct high-dimensional population codes and learn complex functions of their inputs.

  10. FLYCHK Collisional-Radiative Code

    Science.gov (United States)

    SRD 160 FLYCHK Collisional-Radiative Code (Web, free access)   FLYCHK provides a capability to generate atomic level populations and charge state distributions for low-Z to mid-Z elements under NLTE conditions.

  11. Upper Air Observations - Synoptic Code

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Daily radiosonde and rawinsonde observations at standard and significant levels, recorded in synoptic code. Period of record 1950-1951.

  12. Hammerstein Model for Speech Coding

    Directory of Open Access Journals (Sweden)

    Turunen Jari

    2003-01-01

    Full Text Available A nonlinear Hammerstein model is proposed for coding speech signals. Using Tsay's nonlinearity test, we first show that the great majority of speech frames contain nonlinearities (over 80% in our test data when using 20-millisecond speech frames. Frame length correlates with the level of nonlinearity: the longer the frames the higher the percentage of nonlinear frames. Motivated by this result, we present a nonlinear structure using a frame-by-frame adaptive identification of the Hammerstein model parameters for speech coding. Finally, the proposed structure is compared with the LPC coding scheme for three phonemes /a/, /s/, and /k/ by calculating the Akaike information criterion of the corresponding residual signals. The tests show clearly that the residual of the nonlinear model presented in this paper contains significantly less information compared to that of the LPC scheme. The presented method is a potential tool to shape the residual signal in an encode-efficient form in speech coding.

  13. Summary of Code of Ethics.

    Science.gov (United States)

    Eklund, Kerri

    2016-01-01

    The Guide to the Code of Ethics for Nurses is an excellent guideline for all nurses regardless of their area of practice. I greatly enjoyed reading the revisions in place within the 2015 edition and refreshing my nursing conscience. I plan to always keep my Guide to the Code of Ethics for Nurses near in order to keep my moral compass from veering off the path of quality care.

  14. Verification of ONED90 code

    International Nuclear Information System (INIS)

    ONED90 developed by KAERI is a 1-dimensional 2-group diffusion theory code. For nuclear design and reactor simulation, the usage of ONED90 encompasses core follow calculation, load follow calculation, plant power control simulation, xenon oscillation simulation and control rod maneuvering, etc. In order to verify the validity of ONED90 code, two well-known benchmark problems are solved by ONED90 shows very similar result to reference solution. (Author) 11 refs., 5 figs., 13 tabs

  15. Training course on code implementation.

    Science.gov (United States)

    Allain, A; De Arango, R

    1992-01-01

    The International Baby Food Action Network (IBFAN) is a coalition of over 40 citizen groups in 70 countries. IBFAN monitors the progress worldwide of the implementation of the International Code of Marketing of Breastmilk Substitutes. The Code is intended to regulate the advertising and promotional techniques used to sell infant formula. The 1991 IBFAN report shows that 75 countries have taken some action to implement the International Code. During 1992, the IBFAN Code Documentation Center in Malaysia conducted 2 training courses to help countries draft legislation to implement and monitor compliance with the International Code. In April, government officials from 19 Asian and African countries attended the first course in Malaysia; the second course was conducted in Spanish in Guatemala and attended by officials from 15 Latin American and Caribbean countries. The resource people included representatives from NGOs in Africa, Asia, Latin America, Europe and North America with experience in Code implementation and monitoring at the national level. The main purpose of each course was to train government officials to use the International Code as a starting point for national legislation to protect breastfeeding. Participants reviewed recent information on lactation management, the advantages of breastfeeding, current trends in breastfeeding and the marketing practices of infant formula manufacturers. The participants studied the terminology contained in the International Code and terminology used by infant formula manufacturers to include breastmilk supplements such as follow-on formulas and cereal-based baby foods. Relevant World Health Assembly resolutions such as the one adopted in 1986 on the need to ban free and low-cost supplies to hospitals were examined. The legal aspects of the current Baby Friendly Hospital Initiative (BFHI) and the progress in the 12 BFHI test countries concerning the elimination of supplies were also examined. International Labor

  16. Summary of Code of Ethics.

    Science.gov (United States)

    Eklund, Kerri

    2016-01-01

    The Guide to the Code of Ethics for Nurses is an excellent guideline for all nurses regardless of their area of practice. I greatly enjoyed reading the revisions in place within the 2015 edition and refreshing my nursing conscience. I plan to always keep my Guide to the Code of Ethics for Nurses near in order to keep my moral compass from veering off the path of quality care. PMID:27183735

  17. Reliable Physical Layer Network Coding

    OpenAIRE

    Nazer, Bobak; Gastpar, Michael

    2011-01-01

    When two or more users in a wireless network transmit simultaneously, their electromagnetic signals are linearly superimposed on the channel. As a result, a receiver that is interested in one of these signals sees the others as unwanted interference. This property of the wireless medium is typically viewed as a hindrance to reliable communication over a network. However, using a recently developed coding strategy, interference can in fact be harnessed for network coding. In a wired network, (...

  18. Squares of Random Linear Codes

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego;

    2015-01-01

    a positive answer, for codes of dimension $k$ and length roughly $\\frac{1}{2}k^2$ or smaller. Moreover, the convergence speed is exponential if the difference $k(k+1)/2-n$ is at least linear in $k$. The proof uses random coding and combinatorial arguments, together with algebraic tools involving the precise...... computation of the number of quadratic forms of a given rank, and the number of their zeros....

  19. STANDARDIZING SOURCE CODE SECURITY AUDITS

    OpenAIRE

    Suzanna Schmeelk; Bill Mills; Leif Hedstrom

    2012-01-01

    A source code security audit is a powerful methodology for locating and removing security vulnerabilities.An audit can be used to (1) pass potentially prioritized list of vulnerabilities to developers (2) exploitvulnerabilities or (3) provide proof-of-concepts for potential vulnerabilities. The security audit researchcurrently remains disjoint with minor discussion of methodologies utilized in the field. This paperassembles a broad array of literature to promote standardizing source code secu...

  20. Interleaver Design for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl; Zyablov, Viktor

    1997-01-01

    By a combination of construction and random search based on a careful analysis of the low weight words and the distance properties of the component codes, it is possible to find interleavers for turbo coding with a high minimum distance. We have designed a block interleaver with permutations...... of each row, and found a combination of permutations where a tight upper bound to the minimum distance of the complete turbo scheme is 108....

  1. SUPERSTRUCTURE - AN ATOMIC STRUCTURE CODE

    OpenAIRE

    Eissner, W.

    1991-01-01

    We summarize the properties of the atomic structure code SUPERSTRUCTURE, which yields bound state energies in LS coupling and intermediate coupling as well as associated radiative data. Other data that can be computed include term coupling coefficients and radiative data with allowance for cascading. Results are given, mainly for members of the Be isoelectronic sequence, to demonstrate the power and range of the code. Other examples deal with "forbidden" transitions in N-like and He-like ions.

  2. Verification of ONED90 code

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Jong Hwa; Lee, Ki Bog; Zee, Sung Kyun; Lee, Chang Ho [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1993-12-01

    ONED90 developed by KAERI is a 1-dimensional 2-group diffusion theory code. For nuclear design and reactor simulation, the usage of ONED90 encompasses core follow calculation, load follow calculation, plant power control simulation, xenon oscillation simulation and control rod maneuvering, etc. In order to verify the validity of ONED90 code, two well-known benchmark problems are solved by ONED90 shows very similar result to reference solution. (Author) 11 refs., 5 figs., 13 tabs.

  3. Coded nanoscale self-assembly

    Indian Academy of Sciences (India)

    Prathyush Samineni; Debabrata Goswami

    2008-12-01

    We demonstrate coded self-assembly in nanostructures using the code seeded at the component level through computer simulations. Defects or cavities occur in all natural assembly processes including crystallization and our simulations capture this essential aspect under surface minimization constraints for self-assembly. Our bottom-up approach to nanostructures would provide a new dimension towards nanofabrication and better understanding of defects and crystallization process.

  4. A Pixel Domain Video Coding based on Turbo code and Arithmetic code

    Directory of Open Access Journals (Sweden)

    Cyrine Lahsini

    2012-05-01

    Full Text Available In recent years, with emerging applications such as multimedia sensors networks, wirelesslow-power surveillance and mobile camera phones, the traditional video coding architecture in beingchallenged. In fact, these applications have different requirements than those of the broadcast videodelivery systems: a low power consumption at the encoder side is essential.In this context, we propose a pixel-domain video coding scheme which fits well in these senarios.In this system, both the arithmetic and turbo codes are used to encode the video sequence's frames.Simulations results show significant gains over Pixel-domain Wyner-Ziv video codeingr.

  5. Parallel Bit Interleaved Coded Modulation

    CERN Document Server

    Ingber, Amir

    2010-01-01

    A new variant of bit interleaved coded modulation (BICM) is proposed. In the new scheme, called Parallel BICM, L identical binary codes are used in parallel using a mapper, a newly proposed finite-length interleaver and a binary dither signal. As opposed to previous approaches, the scheme does not rely on any assumptions of an ideal, infinite-length interleaver. Over a memoryless channel, the new scheme is proven to be equivalent to a binary memoryless channel. Therefore the scheme enables one to easily design coded modulation schemes using a simple binary code that was designed for that binary channel. The overall performance of the coded modulation scheme is analytically evaluated based on the performance of the binary code over the binary channel. The new scheme is analyzed from an information theoretic viewpoint, where the capacity, error exponent and channel dispersion are considered. The capacity of the scheme is identical to the BICM capacity. The error exponent of the scheme is numerically compared to...

  6. The Second Workshop on Lineshape Code Comparison: Isolated Lines

    Directory of Open Access Journals (Sweden)

    Spiros Alexiou

    2014-05-01

    Full Text Available In this work, we briefly summarize the theoretical aspects of isolated line broadening. We present and discuss test run comparisons from different participating lineshape codes for the 2s-2p transition for LiI, B III and NV.

  7. Decoding Technique of Concatenated Hadamard Codes and Its Performance

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    The decoding technique of concatenated Hadamard codes and its performance are studied. Efficient softin-soft-out decoding algorithms based on the fast Hadamard transform are developed. Performance required by CDMA mobile or PCS speech services, e.g. , BER= 10-3, can be achieved at Eb/No = 0.9 dB using short interleaving length of 192 bits.

  8. KWIC Index of nuclear codes (1975 edition)

    International Nuclear Information System (INIS)

    It is a KWIC Index for 254 nuclear codes in the Nuclear Code Abstracts (1975 edition). The classification of nuclear codes and the form of index are the same as those in the Computer Programme Library at Ispra, Italy. (auth.)

  9. Serial-data correlator/code translator

    Science.gov (United States)

    Morgan, L. E.

    1977-01-01

    System, consisting of sampling flip flop, memory (either RAM or ROM), and memory buffer, correlates sampled data with predetermined acceptance code patterns, translates acceptable code patterns to nonreturn-to-zero code, and identifies data dropouts.

  10. Regularized Robust Coding for Face Recognition

    CERN Document Server

    Meng, Yang; Jian, Yang; Zhang, David

    2012-01-01

    Recently the sparse representation based classification (SRC) has been proposed for robust face recognition (FR). In SRC, the testing image is coded as a sparse linear combination of the training samples, and the representation fidelity is measured by the l2-norm or l1-norm of the coding residual. Such a sparse coding model assumes that the coding residual follows Gaussian or Laplacian distribution, which may not be effective enough to describe the coding residual in practical FR systems. Meanwhile, the sparsity constraint on the coding coefficients makes SRC's computational cost very high. In this paper, we propose a new face coding model, namely regularized robust coding (RRC), which could robustly regress a given signal with regularized regression coefficients. By assuming that the coding residual and the coding coefficient are respectively independent and identically distributed, the RRC seeks for a maximum a posterior solution of the coding problem. An iteratively reweighted regularized robust coding (IR...

  11. Discrete Cosine Transform Image Coding With Sliding Block Codes

    Science.gov (United States)

    Divakaran, Ajay; Pearlman, William A.

    1989-11-01

    A transform trellis coding scheme for images is presented. A two dimensional discrete cosine transform is applied to the image followed by a search on a trellis structured code. This code is a sliding block code that utilizes a constrained size reproduction alphabet. The image is divided into blocks by the transform coding. The non-stationarity of the image is counteracted by grouping these blocks in clusters through a clustering algorithm, and then encoding the clusters separately. Mandela ordered sequences are formed from each cluster i.e identically indexed coefficients from each block are grouped together to form one dimensional sequences. A separate search ensues on each of these Mandela ordered sequences. Padding sequences are used to improve the trellis search fidelity. The padding sequences absorb the error caused by the building up of the trellis to full size. The simulations were carried out on a 256x256 image ('LENA'). The results are comparable to any existing scheme. The visual quality of the image is enhanced considerably by the padding and clustering.

  12. Reliability in Source Coding with Side Information

    OpenAIRE

    Kelly, Benjamin G.; Wagner, Aaron B.

    2011-01-01

    We study error exponents for source coding with side information. Both achievable exponents and converse bounds are obtained for the following two cases: lossless source coding with coded information (SCCSI) and lossy source coding with full side information (Wyner-Ziv). These results recover and extend several existing results on source-coding error exponents and are tight in some circumstances. Our bounds have a natural interpretation as a two-player game between nature and the code designe...

  13. Blind recognition of punctured convolutional codes

    Institute of Scientific and Technical Information of China (English)

    LU Peizhong; LI Shen; ZOU Yan; LUO Xiangyang

    2005-01-01

    This paper presents an algorithm for blind recognition of punctured convolutional codes which is an important problem in adaptive modulation and coding. For a given finite sequence of convolutional code, the parity check matrix of the convolutional code is first computed by solving a linear system with adequate error tolerance. Then a minimal basic encoding matrix of the original convolutional code and its puncturing pattern are determined according to the known parity check matrix of the punctured convolutional code.

  14. LLVM-based overlapped executable code generator

    OpenAIRE

    V. Aranov; A. Terentiev

    2014-01-01

    Overlapped executable code is an attractive artifact of obfuscation technology not yet widely covered and researched. Overlapped code and opaque predicates technologies together allows creation of prominent software obfuscation technologies featuring both obscure executable code and code protected from patching due to hard-to-track relations with other code. The paper provides polynomial algorithm to generate overlapped executable code using LLVM framework and discuss results of the generatio...

  15. Quantized Network Coding for Correlated Sources

    OpenAIRE

    Nabaee, Mahdy; Labeau, Fabrice

    2012-01-01

    Non-adaptive joint source network coding of correlated sources is discussed in this paper. By studying the information flow in the network, we propose quantized network coding as an alternative for packet forwarding. This technique has both network coding and distributed source coding advantages, simultaneously. Quantized network coding is a combination of random linear network coding in the (infinite) field of real numbers and quantization to cope with the limited capacity of links. With the...

  16. A New Method for Constructing Circuit Codes

    OpenAIRE

    Byrnes, Kevin M.

    2016-01-01

    Circuit codes are constructed from induced cycles in the graph of the $n$ dimensional hypercube. They are both theoretically and practically important, as circuit codes can be used as error correcting codes. When constructing circuit codes, the length of the cycle determines its accuracy and a parameter called the spread determines how many errors it can detect. We present a new method for constructing a circuit code of spread $k+1$ from a circuit code of spread $k$. This method leads to reco...

  17. New Orthogonal Small Set Kasami Code Sequence

    OpenAIRE

    I Nyoman Pramaita; I G.A.G.K. Diafari; DNKP Negara; Agus Dharma

    2015-01-01

    In this paper, the authors propose the design of a new orthogonal small set Kasami code sequence generated using combination of non-orthogonal m-sequence and small set Kasami code sequence. The authors demonstrate that the proposed code sequence has comparable auto-correlation function (ACF), cross- correlation function (CCF), peak cross-correlation values with that of the existing orthogonal small set Kasami code sequence. Though the proposed code sequence has less code sequence sets than th...

  18. A NEW UEP SCHEME FOR ROBUST VIDEO TRANSMISSION IN LDPC CODED MIMO-OFDM SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Ru Congchong; Zheng Haifeng; Yin Liuguo; Lu Jianhua; Chen Changwen

    2007-01-01

    In order to improve the video transmission performance in Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing(MIMO-OFDM)system,a new scheme,which integrates Multiple Description Coding(MDC),Low Density Parity Check(LDPC)coding and hybrid space time coding,is proposed in this letter.In particular,a hybrid space time coding algorithm is combined with LDPC codes to perform Unequal Error Protection(UEP)of MDC encoded video streams.Comparing with the UEP transmission with only LDPC codes,the proposed scheme achieves more than 1dB gain in terms of Signal to Noise Ratio(SNR)when the Peak Signal to Noise Ratio(PSNR)of reconstructed video is above 30dB.

  19. Wireless Network Coding with Local Network Views: Coded Layer Scheduling

    CERN Document Server

    Vahid, Alireza; Avestimehr, A Salman; Sabharwal, Ashutosh

    2011-01-01

    One of the fundamental challenges in the design of distributed wireless networks is the large dynamic range of network state. Since continuous tracking of global network state at all nodes is practically impossible, nodes can only acquire limited local views of the whole network to design their transmission strategies. In this paper, we study multi-layer wireless networks and assume that each node has only a limited knowledge, namely 1-local view, where each S-D pair has enough information to perform optimally when other pairs do not interfere, along with connectivity information for rest of the network. We investigate the information-theoretic limits of communication with such limited knowledge at the nodes. We develop a novel transmission strategy, namely Coded Layer Scheduling, that solely relies on 1-local view at the nodes and incorporates three different techniques: (1) per layer interference avoidance, (2) repetition coding to allow overhearing of the interference, and (3) network coding to allow inter...

  20. Requirements of a Better Secure Program Coding

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2012-01-01

    Full Text Available Secure program coding refers to how manage the risks determined by the security breaches because of the program source code. The papers reviews the best practices must be doing during the software development life cycle for secure software assurance, the methods and techniques used for a secure coding assurance, the most known and common vulnerabilities determined by a bad coding process and how the security risks are managed and mitigated. As a tool of the better secure program coding, the code review process is presented, together with objective measures for code review assurance and estimation of the effort for the code improvement.

  1. Cyclic codes over $M_2(\\F_2)$

    CERN Document Server

    Alahmadi, Adel; Sboui, Houda; Yemen, Olfa

    2012-01-01

    The ring in the title is the first non commutative ring to have been used as alphabet for block codes. The original motivation was the construction of some quaternionic modular lattices from codes. The new application is the construction of space time codes obtained by concatenation from the Golden code. In this article, we derive structure theorems for cyclic codes over that ring, and use them to characterize the lengths where self dual cyclic codes exist. These codes in turn give rise to formally self dual quaternary codes.

  2. Chooz B; Chooz B

    Energy Technology Data Exchange (ETDEWEB)

    Barillot, Pascale; Baize, Jean-Marc [eds.] [Electricite de France (EDF), 75 - Paris (France)

    1997-11-03

    This EDF press communique give information related to the exploitation of the Chooz B NPP. A calendar of the Chooz B1 and B2 NPPs exploitation is given as well as information about the local economic impact. The exploitation of the PWR reactors of the French nuclear sector corresponds to a accumulated experience of 600 year-reactor. Significant technological evolution has been recorded, namely in the test-control system, the turbo-alternator group 'Arabelle' and in the vapor generators. The reactor safety is based on the high professionalism of the exploitation personnel, on the computer-assisted behaviour allowing the choice of operators and on the conception based upon the experience accumulated by the French nuclear power plants, equivalent to 600 year-reactor operation. EDF operates a system of continual surveillance which allows the monitoring the environmental effects caused by the NPP exploitation. The following issues concerning the environment impact are reported in this document: - The effluent releases in the environment; - Health studies conducted in the NPPs' neighbourhood; - New authorizations for waste release; - Radioactive waste management. The report also mentions the French-Belgian partnership in the PWR construction, the socio-economic regional impact of the EDF activities related with the Chooz NPP operation, and the partnership with the associated service companies. Six appendices are attached to the report containing the following information: - A general layout of Chooz NPP; - Chooz B key figures; Chooz B key data; - Security and public information; - Evolution of PWR system in France; - World's nuclear systems.

  3. On Code Parameters and Coding Vector Representation for Practical RLNC

    DEFF Research Database (Denmark)

    Heide, Janus; Pedersen, Morten Videbæk; Fitzek, Frank;

    2011-01-01

    RLNC provides a theoretically efficient method for coding. The drawbacks associated with it are the complexity of the decoding and the overhead resulting from the encoding vector. Increasing the field size and generation size presents a fundamental trade-off between packet-based throughput...... to higher energy consumption. Therefore, the optimal trade-off is system and topology dependent, as it depends on the cost in energy of performing coding operations versus transmitting data. We show that moderate field sizes are the correct choice when trade-offs are considered. The results show that sparse...

  4. Blurring in bar code signals

    Science.gov (United States)

    Tang, Hong

    1997-10-01

    When a bar code symbol is passed over a scanner, it is struck across by a fast moving laser beam. The laser light is scattered by the bar code. The total scattered power is modulated by the reflectivity of the bars and spaces in the symbol. A fraction of the scattered light is collected and focused onto a photodetector that converts the light variation into an electronic signal. The electronic signal is then digitized for analysis by a computer. The scanning and detection process can be modeled by a convolution of the laser beam profile and the bar code reflectivity function. The switching between states in the digitized bar code signal, which represents transitions from a space to a bar or vice versa, is determined by a zero-crossing point in the second derivative of the analog signal. The laser profile acts like a smoothing function. It blurs the analog electronic signal. If the width of the laser profile is less than the minimum width of bars and spaces in the bar code reflectivity function, the transition point is not affected by the location of its neighboring edges. If the laser profile is wider than the minimum width in the bar code, the transition point can be shifted due to the locations of its neighboring edges. The behavior of the shift of transition is analyzed here for all cases in a UPC symbol. It is found that the amount of shift in the transition point is almost the same for several different cases within the depth of field of the scanner. The knowledge of the behavior of transition point shift can be used to accurately compensate printing errors in an over-printed bar code. The modulation transfer function (MTF) of bar code scanning is the Fourier transform of the marginal function of the scanning laser beam. The MTF through focus for a scanning system is presented. By using an aperture with central obscuration in the laser focusing system, the high frequency resolution of bar code scanning can be enhanced and the depth of field of the scanner can

  5. Automata-Based Programming Technology Extension for Generation of JML Annotated Java Card Code

    OpenAIRE

    Andrey, A.

    2008-01-01

    This paper gives an overview of the ongoing research project which concerns generation of dependable Java Card code. According to the automata-based programming technology, code is generated from a high-level application behavior description which is based on finite state machines. An extra benefit from the use of such description is the possibility of generation of formal application specification in Java Modeling Language. Conformance of the code against its specification could be checked b...

  6. AEST: Adaptive Eigenvalue Stability Code

    Science.gov (United States)

    Zheng, L.-J.; Kotschenreuther, M.; Waelbroeck, F.; van Dam, J. W.; Berk, H.

    2002-11-01

    An adaptive eigenvalue linear stability code is developed. The aim is on one hand to include the non-ideal MHD effects into the global MHD stability calculation for both low and high n modes and on the other hand to resolve the numerical difficulty involving MHD singularity on the rational surfaces at the marginal stability. Our code follows some parts of philosophy of DCON by abandoning relaxation methods based on radial finite element expansion in favor of an efficient shooting procedure with adaptive gridding. The δ W criterion is replaced by the shooting procedure and subsequent matrix eigenvalue problem. Since the technique of expanding a general solution into a summation of the independent solutions employed, the rank of the matrices involved is just a few hundreds. This makes easier to solve the eigenvalue problem with non-ideal MHD effects, such as FLR or even full kinetic effects, as well as plasma rotation effect, taken into account. To include kinetic effects, the approach of solving for the distribution function as a local eigenvalue ω problem as in the GS2 code will be employed in the future. Comparison of the ideal MHD version of the code with DCON, PEST, and GATO will be discussed. The non-ideal MHD version of the code will be employed to study as an application the transport barrier physics in tokamak discharges.

  7. Performance of FSO-OFDM based on BCH code

    Directory of Open Access Journals (Sweden)

    Jiao Xiao-lu

    2016-01-01

    Full Text Available As contrasted with the traditional OOK (on-off key system, FSO-OFDM system can resist the atmospheric scattering and improve the spectrum utilization rate effectively. Due to the instability of the atmospheric channel, the system will be affected by various factors, and resulting in a high BER. BCH code has a good error correcting ability, particularly in the short-length and medium-length code, and its performance is close to the theoretical value. It not only can check the burst errors but also can correct the random errors. Therefore, the BCH code is applied to the system to reduce the system BER. At last, the semi-physical simulation has been conducted with MATLAB. The simulation results show that when the BER is 10-2, the performance of OFDM is superior 4dB compared with OOK. In different weather conditions (extension rain, advection fog, dust days, when the BER is 10-5, the performance of BCH (255,191 channel coding is superior 4~5dB compared with uncoded system. All in all, OFDM technology and BCH code can reduce the system BER.

  8. Comparison of photon-production processing codes LAPHNGAS, MACK-IV, and NJOY

    International Nuclear Information System (INIS)

    Several laboratories have independently developed computer codes that use evaluated data from the ENDF/B file to produce group-averaged cross sections and transfer matrices for neutron-induced photon production. There have been several instances in which these codes have produced discrepant data sets; such a situation naturally casts doubt on the validity of all the codes. For a series of specified test cases, the results from three of these codes (NJOY, LAPHNGAS, and MACK-IV) were systematically compared with each other and with hand calculations. Several shortcomings in the codes were discovered and repaired. One major difference of philosophy was resolved. Consequently, the codes have arrived at substantial agreement on all of the nearly 1200 nonzero group constants calculated in the study. Results are tabulated for future comparisons with other codes. 4 figures, 6 tables

  9. The DIPSI [Direct Implicit Plasma Surface Interactions] computer code user's manual

    International Nuclear Information System (INIS)

    DIPSI (Direct Implicit Plasma Surface Interactions) is a one-dimensional, bounded particle-in-cell (PIC) simulation code designed to investigate the interaction of plasma with a solid surface, such as a limiter or divertor plate in a tokamak fusion device. Plasma confinement and transport may be studied in a system which includes an applied magnetic field (oriented normal to the solid surface) and/or a self-consistent electrostatic potential. The PIC code DIPSI is an offshoot of the PIC code TESS (Tandem Experiment Simulation Studies) which was developed to study plasma confinement in mirror devices. The codes DIPSI and TESS are direct descendants of the PIC code ES1 that was created by A. B. Langdon. This document provides the user with a brief description of the methods used in the code and a tutorial on the use of the code. 11 refs., 2 tabs

  10. ASME Code Efforts Supporting HTGRs

    Energy Technology Data Exchange (ETDEWEB)

    D.K. Morton

    2012-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  11. ASME Code Efforts Supporting HTGRs

    Energy Technology Data Exchange (ETDEWEB)

    D.K. Morton

    2011-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  12. ASME Code Efforts Supporting HTGRs

    Energy Technology Data Exchange (ETDEWEB)

    D.K. Morton

    2010-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  13. Calcium: a code coupling tool

    International Nuclear Information System (INIS)

    Today, the calculation performances of computers allow the precise and global simulation of complex industrial processes such as the functioning of a nuclear reactor core. One can question the need for the elaboration of new global numerical models in order to make use of the overall capability of computers. Another less time consuming solution consist in the coupling of existing well validated numerical models in order to make them working together. This paper presents the basic principles of the coupling of numerical codes, the tools required, the Calcium tool for codes coupling and an example of application of this tool in the coupling of the THYC (EdF), COCCINELLE (EdF) and CATHARE (CEA-EdF-Framatome) codes for the modeling of the thermal-hydraulic and neutronic behaviour of a reactor core during accidental situation. (J.S.)

  14. Automated Verification of Code Generated from Models: Comparing Specifications with Observations

    Science.gov (United States)

    Gerlich, R.; Sigg, D.; Gerlich, R.

    2008-08-01

    The interest for automatic code generation from models is increasing. A specification is expressed as model and verification and validation is performed in the application domain. Once the model is formally correct and complete, code can be generated automatically. The general belief is that this code should be correct as well. However, this might be not true: Many parameters impact the generation of code and its correctness: it depends on conditions changing from application to application, the properties of the code depend on the environment where it is executed. From the principles of ISVV (Independent Software Verification and Validation) it even must be doubted that the automatically generated code is correct. Therefore an additional activity is required proving the correctness of the whole chain from modelling level down to execution on the target platform. Certification of a code generator is the state-of-the-art approach dealing with such risks,. Scade [1] was the first code generator certified according to DO178B. The certification costs are a significant disadvantage of this certification approach. All codes needs to be analysed manually, and this procedure has to be repeated for recertification after each maintenance step. But certification does not guarantee at all that the generated code does comply with the model. Certification is based on compliance of the code of the code generator with given standards. Such compliance never can guarantee correctness of the whole chain through transformation down to the environment for execution, though the belief is that certification implies well-formed code at a reduced fault rate. The approach presented here goes a direction different from manual certification.. It is guided by the idea of automated proof: each time code is generated from a model the properties of the code when being executed in its environment are compared with the properties specified in the model. This allows to conclude on the correctness of

  15. A Novel Error Correcting System Based on Product Codes for Future Magnetic Recording Channels

    CERN Document Server

    Van, Vo Tam

    2012-01-01

    We propose a novel construction of product codes for high-density magnetic recording based on binary low-density parity check (LDPC) codes and binary image of Reed Solomon (RS) codes. Moreover, two novel algorithms are proposed to decode the codes in the presence of both AWGN errors and scattered hard errors (SHEs). Simulation results show that at a bit error rate (bER) of approximately 10^-8, our method allows improving the error performance by approximately 1.9dB compared with that of a hard decision decoder of RS codes of the same length and code rate. For the mixed error channel including random noises and SHEs, the signal-to-noise ratio (SNR) is set at 5dB and 150 to 400 SHEs are randomly generated. The bit error performance of the proposed product code shows a significant improvement over that of equivalent random LDPC codes or serial concatenation of LDPC and RS codes.

  16. Impact testing and analysis for structural code benchmarking

    International Nuclear Information System (INIS)

    Sandia National Laboratories, in cooperation with industry and other national laboratories, has been benchmarking computer codes used to predict the structural, thermal, criticality, and shielding behavior of radioactive materials packages. The first step in the benchmarking of the codes was to develop standard problem sets and to compare the results from several codes and users. This step for structural analysis codes has been completed as described in Structural Code Benchmarking for the Analysis of Impact Response of Nuclear Material Shipping Casks, R.E. Glass, Sandia National Laboratories, 1985. The problem set is shown in Fig. 1. This problem set exercised the ability of the codes to predict the response to end (axisymmetric) and side (plane strain) impacts with both elastic and elastic/plastic materials. The results from these problems showed that there is good agreement in predicting elastic response. Significant differences occurred in predicting strains for the elastic/plastic models. An example of the variation in predicting plastic behavior is given, which shows the hoop strain as a function of time at the impacting end of Model B. These differences in predicting plastic strains demonstrated a need for benchmark data for a cask-like problem

  17. Coded optical time domain reflectometry: principle and applications

    Science.gov (United States)

    Park, Namkyoo; Lee, Jeonghwan; Park, Jonghan; Shim, Jae Gwang; Yoon, Hosung; Kim, Jin Hee; Kim, Kyoungmin; Byun, Jae-Oh; Bolognini, Gabriele; Lee, Duckey; Di Pasquale, Fabrizio

    2007-11-01

    In this paper, we will briefly outline our contributions for the physical realization of coded OTDR, along with its principles and also highlight recent key results related with its applications. For the communication network application, we report a multi-port / multi-wavelength, high-speed supervisory system for the in-service monitoring of a bidirectional WDM-PON system transmission line up to 16 ports x 32 nodes (512 users) capacity. Monitoring of individual branch traces up to 60 km was achieved with the application of a 127-bit simplex code, corresponding to a 7.5dB SNR coding gain effectively reducing the measurement time about 30 times when compared to conventional average mode OTDR. Transmission experiments showed negligible penalty from the monitoring system to the transmission signal quality, at a 2.5Gbps / 125Mbps (down / up stream) data rate. As an application to sensor network, a Raman scattering based coded-OTDR distributed temperature sensor system will be presented. Utilizing a 255-bit Simplex coded OTDR together with optimized sensing link (composed of cascaded fibers with different Raman coefficients), significant enhancement in the interrogation distance (19.5km from coding gain, and 9.6km from link-combination optimization) was achieved to result a total sensing range of 37km (at 17m/3K spatial/temperature resolution), employing a conventional off-shelf low power (80mW) laser diode.

  18. Physical Network Coding in Two-Way Wireless Relay Channels

    CERN Document Server

    Popovski, Petar

    2007-01-01

    It has recently been recognized that the wireless networks represent a fertile ground for devising communication modes based on network coding. A particularly suitable application of the network coding arises for the two--way relay channels, where two nodes communicate with each other assisted by using a third, relay node. Such a scenario enables application of \\emph{physical network coding}, where the network coding is either done (a) jointly with the channel coding or (b) through physical combining of the communication flows over the multiple access channel. In this paper we first group the existing schemes for physical network coding into two generic schemes, termed 3--step and 2--step scheme, respectively. We investigate the conditions for maximization of the two--way rate for each individual scheme: (1) the Decode--and--Forward (DF) 3--step schemes (2) three different schemes with two steps: Amplify--and--Forward (AF), JDF and Denoise--and--Forward (DNF). While the DNF scheme has a potential to offer the...

  19. Signal Constellations for Multilevel Coded Modulation with Sparse Graph Codes

    NARCIS (Netherlands)

    Cronie, Harm S.

    2005-01-01

    A method to combine error-correction coding and spectral efficient modulation for transmission over channels with Gaussian noise is presented. The method of modulation leads to a signal constellation in which the constellation symbols have a nonuniform distribution. This gives a so-called shape gain

  20. Opportunistic Adaptive Transmission for Network Coding Using Nonbinary LDPC Codes

    Directory of Open Access Journals (Sweden)

    Cocco Giuseppe

    2010-01-01

    Full Text Available Network coding allows to exploit spatial diversity naturally present in mobile wireless networks and can be seen as an example of cooperative communication at the link layer and above. Such promising technique needs to rely on a suitable physical layer in order to achieve its best performance. In this paper, we present an opportunistic packet scheduling method based on physical layer considerations. We extend channel adaptation proposed for the broadcast phase of asymmetric two-way bidirectional relaying to a generic number of sinks and apply it to a network context. The method consists of adapting the information rate for each receiving node according to its channel status and independently of the other nodes. In this way, a higher network throughput can be achieved at the expense of a slightly higher complexity at the transmitter. This configuration allows to perform rate adaptation while fully preserving the benefits of channel and network coding. We carry out an information theoretical analysis of such approach and of that typically used in network coding. Numerical results based on nonbinary LDPC codes confirm the effectiveness of our approach with respect to previously proposed opportunistic scheduling techniques.

  1. List Decoding of Matrix-Product Codes from nested codes: an application to Quasi-Cyclic codes

    DEFF Research Database (Denmark)

    Hernando, Fernando; Høholdt, Tom; Ruano, Diego

    2012-01-01

    A list decoding algorithm for matrix-product codes is provided when $C_1,..., C_s$ are nested linear codes and $A$ is a non-singular by columns matrix. We estimate the probability of getting more than one codeword as output when the constituent codes are Reed-Solomon codes. We extend this list...... decoding algorithm for matrix-product codes with polynomial units, which are quasi-cyclic codes. Furthermore, it allows us to consider unique decoding for matrix-product codes with polynomial units....

  2. Teachers' Code-Switching in Classroom Instructions for Low English Proficient Learners

    Science.gov (United States)

    Ahmad, Badrul Hisham; Jusoff, Kamaruzaman

    2009-01-01

    Due to the alarming signals of declining proficiency level among English Language learners in Malaysia, this study set out to learn more about the learners' perceptions of the teachers' code-switching in English Language classrooms. The objectives of this study were to investigate: a) learners' perceptions of teachers' code-switching, b) the…

  3. Multiple-valued logic-protected coding for an optical non-quantum communication line

    NARCIS (Netherlands)

    Antipov, A. L.; Bykovsky, A. Yu.; Vasiliev, N. A.; Egorov, A. A.

    2006-01-01

    A simple and cheap method of secret coding in an optical line is proposed based on multiple-valued logic. This method is shown to have very high cryptography resources and is designated for bidirectional information exchange in a team of mobile robots, where quantum teleportation coding cannot yet b

  4. An Analysis of Syndrome Coding

    Science.gov (United States)

    Amiruzzaman, Md; Abdullah-Al-Wadud, M.; Chung, Yoojin

    In this paper a detail analysis is presented based on BCH syndrome coding for covert channel data hiding methods. The experimented technique is nothing but a syndrome coding algorithm with a coset based approach, analyzed results are showing that the examined method has more flexibility to choose coset, also providing less modification distortion caused by data hiding. Analyzed method presented by clear mathematical way. As it is mathematical equation dependent, hence analyzed results are showing that the analyzed method has fast computation ability and find perfect roots for modification.

  5. Combinatorial Batch Codes with Redundancy

    OpenAIRE

    Jung, Jiyoon; Mummert, Carl; Niese, Elizabeth; Schroeder, Michael w.

    2015-01-01

    A combinatorial batch code with redundancy $r$ and parameters $(n,k,m,t)$ can be represented as a system $C$ of $m$ (not necessarily distinct) subsets of an underlying $n$-element set $F$, so that each $k$-subset of $F$ can be covered by every $(m-r)$-subset $K$ of $C$ while taking no more than $t$ elements of $F$ with each set in $K$. The sum of the cardinalities of the sets in $C$ is the weight of the code. We focus on the case $t =1$, and determine the minimal weight for several ranges of ...

  6. Hybrid codes: Methods and applications

    Energy Technology Data Exchange (ETDEWEB)

    Winske, D. (Los Alamos National Lab., NM (USA)); Omidi, N. (California Univ., San Diego, La Jolla, CA (USA))

    1991-01-01

    In this chapter we discuss hybrid'' algorithms used in the study of low frequency electromagnetic phenomena, where one or more ion species are treated kinetically via standard PIC methods used in particle codes and the electrons are treated as a single charge neutralizing massless fluid. Other types of hybrid models are possible, as discussed in Winske and Quest, but hybrid codes with particle ions and massless fluid electrons have become the most common for simulating space plasma physics phenomena in the last decade, as we discuss in this paper.

  7. Generation of the library of neutron cross sections for the Record code of the Fuel Management System (FMS)

    International Nuclear Information System (INIS)

    On the basis of the library structure of the RECORD code a method to generate the neutron cross sections by means of the ENDF-B/IV database and the NJOY code has been developed. The obtained cross sections are compared with those of the current library which was processed using the ENDF-B/III version. (Author)

  8. Computer code for quantitative ALARA evaluations

    International Nuclear Information System (INIS)

    A FORTRAN computer code has been developed to simplify the determination of whether dose reduction actions meet the as low as is reasonably achievable (ALARA) criterion. The calculations are based on the methodology developed for the Atomic Industrial Forum. The code is used for analyses of eight types of dose reduction actions, characterized as follows: reduce dose rate, reduce job frequency, reduce productive working time, reduce crew size, increase administrative dose limit for the task, and increase the workers' time utilization and dose utilization through (a) improved working conditions, (b) basic skill training, or (c) refresher training for special skills. For each type of action, two analysis modes are available. The first is a generic analysis in which the program computes potential benefits (in dollars) for a range of possible improvements, e.g., for a range of lower dose rates. Generic analyses are most useful in the planning stage and for evaluating the general feasibility of alternative approaches. The second is a specific analysis in which the potential annual benefits of a specific level of improvement and the annual implementation cost are compared. The potential benefits reflect savings in operational and societal costs that can be realized if occupational radiation doses are reduced. Because the potential benefits depend upon many variables which characterize the job, the workplace, and the workers, there is no unique relationship between the potential dollar savings and the dose savings. The computer code permits rapid quantitative analyses of alternatives and is a tool that supplements the health physicist's professional judgment. The program output provides a rational basis for decision-making and a record of the assumptions employed

  9. Model-Driven Engineering of Machine Executable Code

    Science.gov (United States)

    Eichberg, Michael; Monperrus, Martin; Kloppenburg, Sven; Mezini, Mira

    Implementing static analyses of machine-level executable code is labor intensive and complex. We show how to leverage model-driven engineering to facilitate the design and implementation of programs doing static analyses. Further, we report on important lessons learned on the benefits and drawbacks while using the following technologies: using the Scala programming language as target of code generation, using XML-Schema to express a metamodel, and using XSLT to implement (a) transformations and (b) a lint like tool. Finally, we report on the use of Prolog for writing model transformations.

  10. Channel coding techniques for wireless communications

    CERN Document Server

    Deergha Rao, K

    2015-01-01

    The book discusses modern channel coding techniques for wireless communications such as turbo codes, low-density parity check (LDPC) codes, space–time (ST) coding, RS (or Reed–Solomon) codes and convolutional codes. Many illustrative examples are included in each chapter for easy understanding of the coding techniques. The text is integrated with MATLAB-based programs to enhance the understanding of the subject’s underlying theories. It includes current topics of increasing importance such as turbo codes, LDPC codes, Luby transform (LT) codes, Raptor codes, and ST coding in detail, in addition to the traditional codes such as cyclic codes, BCH (or Bose–Chaudhuri–Hocquenghem) and RS codes and convolutional codes. Multiple-input and multiple-output (MIMO) communications is a multiple antenna technology, which is an effective method for high-speed or high-reliability wireless communications. PC-based MATLAB m-files for the illustrative examples are provided on the book page on Springer.com for free dow...

  11. Practical Source Coding with Side Information

    OpenAIRE

    Cappellari, Lorenzo

    2010-01-01

    In this chapter, we presented the SCSI problem and discussed several practical solutions. Our main contribution is the coding method based on continuous-valued syndromes, which is an embodiment of the theoretically optimal superposition coding approach. We showed that this coding method is very practical due to the separation between channel and source coding.

  12. The environment and ASME performance test codes

    International Nuclear Information System (INIS)

    Today, federal, state and local governmental agencies have enacted comprehensive legislation on power generation emission limits which affects all aspects of the energy sector. This paper reviews the indirect impact of Performance Test Codes on environmental testing, reviewing past, current, and future practices. Existing codes and three new codes currently under development will be cited along with possible future code development

  13. The environment and ASME performance test codes

    Energy Technology Data Exchange (ETDEWEB)

    Bannister, R.L. [Westinghouse Electric Corp., Orlando, FL (United States); Macak, J.J. III [Mostardi-Platt Associates, Inc., Elmhurst, IL (United States); Newby, R.A. [Westinghouse Science and Technology Center, Pittsburgh, PA (United States)

    1995-12-31

    Today, federal, state and local governmental agencies have enacted comprehensive legislation on power generation emission limits which affects all aspects of the energy sector. This paper reviews the indirect impact of Performance Test Codes on environmental testing, reviewing past, current, and future practices. Existing codes and three new codes currently under development will be cited along with possible future code development.

  14. Type Ⅱ codes over finite rings

    Institute of Scientific and Technical Information of China (English)

    DOUGHERTY; Steven; T

    2010-01-01

    In this paper,we generalize the concept of Type Ⅱ codes to arbitrary finite rings. We focus on Type Ⅱ codes over finite chain rings and use the Chinese Remainder Theorem on these codes to study Type Ⅱ codes over principal ideal rings.

  15. SPARSE SEQUENCE CONSTRUCTION OF LDPC CODES

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    This letter proposes a novel and simple construction of regular Low-Density Parity-Check (LDPC) codes using sparse binary sequences. It utilizes the cyclic cross correlation function of sparse sequences to generate codes with girth8. The new codes perform well using the sumproduct decoding. Low encodingcomplexity can also be achieved due to the inherent quasi-cyclic structure of the codes.

  16. Source-optimized irregular repeat accumulate codes with inherent unequal error protection capabilities and their application to scalable image transmission.

    Science.gov (United States)

    Lan, Ching-Fu; Xiong, Zixiang; Narayanan, Krishna R

    2006-07-01

    The common practice for achieving unequal error protection (UEP) in scalable multimedia communication systems is to design rate-compatible punctured channel codes before computing the UEP rate assignments. This paper proposes a new approach to designing powerful irregular repeat accumulate (IRA) codes that are optimized for the multimedia source and to exploiting the inherent irregularity in IRA codes for UEP. Using the end-to-end distortion due to the first error bit in channel decoding as the cost function, which is readily given by the operational distortion-rate function of embedded source codes, we incorporate this cost function into the channel code design process via density evolution and obtain IRA codes that minimize the average cost function instead of the usual probability of error. Because the resulting IRA codes have inherent UEP capabilities due to irregularity, the new IRA code design effectively integrates channel code optimization and UEP rate assignments, resulting in source-optimized channel coding or joint source-channel coding. We simulate our source-optimized IRA codes for transporting SPIHT-coded images over a binary symmetric channel with crossover probability p. When p = 0.03 and the channel code length is long (e.g., with one codeword for the whole 512 x 512 image), we are able to operate at only 9.38% away from the channel capacity with code length 132380 bits, achieving the best published results in terms of average peak signal-to-noise ratio (PSNR). Compared to conventional IRA code design (that minimizes the probability of error) with the same code rate, the performance gain in average PSNR from using our proposed source-optimized IRA code design is 0.8759 dB when p = 0.1 and the code length is 12800 bits. As predicted by Shannon's separation principle, we observe that this performance gain diminishes as the code length increases. PMID:16830898

  17. QR Codes: Taking Collections Further

    Science.gov (United States)

    Ahearn, Caitlin

    2014-01-01

    With some thought and direction, QR (quick response) codes are a great tool to use in school libraries to enhance access to information. From March through April 2013, Caitlin Ahearn interned at Sanborn Regional High School (SRHS) under the supervision of Pam Harland. As a result of Harland's un-Deweying of the nonfiction collection at SRHS,…

  18. Microcomputer-Based Food Coding

    OpenAIRE

    Ellis, Lynda B. M.; Chow, Stephen Y.; Buzzard, I. Marilyn

    1983-01-01

    We have developed a prototype microcomputer system which will help a nutritionist classify foods into categories suitable for nutrient composition analyses. This system has been developed on an Apple II microcomputer in the Pascal language. It presently can handle 2300 different codes on one 5-1/4 inch floppy disk.

  19. Coded continuous wave meteor radar

    Science.gov (United States)

    Vierinen, Juha; Chau, Jorge L.; Pfeffer, Nico; Clahsen, Matthias; Stober, Gunter

    2016-03-01

    The concept of a coded continuous wave specular meteor radar (SMR) is described. The radar uses a continuously transmitted pseudorandom phase-modulated waveform, which has several advantages compared to conventional pulsed SMRs. The coding avoids range and Doppler aliasing, which are in some cases problematic with pulsed radars. Continuous transmissions maximize pulse compression gain, allowing operation at lower peak power than a pulsed system. With continuous coding, the temporal and spectral resolution are not dependent on the transmit waveform and they can be fairly flexibly changed after performing a measurement. The low signal-to-noise ratio before pulse compression, combined with independent pseudorandom transmit waveforms, allows multiple geographically separated transmitters to be used in the same frequency band simultaneously without significantly interfering with each other. Because the same frequency band can be used by multiple transmitters, the same interferometric receiver antennas can be used to receive multiple transmitters at the same time. The principles of the signal processing are discussed, in addition to discussion of several practical ways to increase computation speed, and how to optimally detect meteor echoes. Measurements from a campaign performed with a coded continuous wave SMR are shown and compared with two standard pulsed SMR measurements. The type of meteor radar described in this paper would be suited for use in a large-scale multi-static network of meteor radar transmitters and receivers. Such a system would be useful for increasing the number of meteor detections to obtain improved meteor radar data products.

  20. Halftone Coding with JBIG2

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    2000-01-01

    The emerging international standard for compression of bilevel images and bi-level documents, JBIG2,provides a mode dedicated for lossy coding of halftones. The encoding procedure involves descreening of the bi-levelimage into gray-scale, encoding of the gray-scale image, and construction of a...

  1. Reliability-Based Code Calibration

    DEFF Research Database (Denmark)

    Faber, M.H.; Sørensen, John Dalsgaard

    2003-01-01

    . Thereafter the code calibration problem is presented in its principal decision theoretical form and it is discussed how acceptable levels of failure probability (or target reliabilities) may be established. Furthermore suggested values for acceptable annual failure probabilities are given for ultimate...

  2. Unconditional Continuous Variable Dense Coding

    CERN Document Server

    Ralph, T C

    2002-01-01

    We investigate the conditions under which unconditional dense coding can be achieved using continuous variable entanglement. We consider the effect of entanglement impurity and detector efficiency and discuss experimental verification. We conclude that the requirements for a strong demonstration are not as stringent as previously thought and are within the reach of present technology.

  3. FORTRAN Static Source Code Analyzer

    Science.gov (United States)

    Merwarth, P.

    1984-01-01

    FORTRAN Static Source Code Analyzer program, SAP (DEC VAX version), automatically gathers statistics on occurrences of statements and structures within FORTRAN program and provides reports of those statistics. Provisions made for weighting each statistic and provide an overall figure of complexity.

  4. Coding as literacy metalithikum IV

    CERN Document Server

    Bühlmann, Vera; Moosavi, Vahid

    2015-01-01

    Recent developments in computer science, particularly "data-driven procedures" have opened a new level of design and engineering. This has also affected architecture. The publication collects contributions on Coding as Literacy by computer scientists, mathematicians, philosophers, cultural theorists, and architects. "Self-Organizing Maps" (SOM) will serve as the concrete reference point for all further discussions.

  5. Understanding Code Patterns - Analysis, Interpretation & Measurement

    CERN Document Server

    Dundas, Jitesh

    2011-01-01

    This research paper aims to find, analyze and understand code patterns in any software system and measure its quality by defining standards and proposing a formula for the same. Every code that is written can be divided into different code segments, each having its own impact on the overall system. We can analyze these code segments to get the code quality. The measures used in this paper include Lines of Code, Number of calls made by a module, Execution time, the system knowledge of user and developers, the use of generalization, inheritance, reusability and other object-oriented concepts. The entire software code is divided into code snippets, based on the logic that they implement. Each of these code snippets has an impact. This measure is called Impact Factor and is valued by the software developer and/or other system stakeholders. Efficiency = (Code Area / Execution Time) * Qr

  6. Vectorization of nuclear codes 88-1

    International Nuclear Information System (INIS)

    In this report, we describe the vectorization of thermal reactor standard neutronics code system SRAC, three dimensional neutron diffusion code CITATION, two dimensional discrete ordinates transport code TWOTRAN-II, multi-dimensional core burn-up calculation code COREBN, two and three dimensional neutron diffusion code CITATION-FBR. CITATION code, TWOTRAN code, collision probability method code PIJ in SRAC system are also vectorized. The performance ratio of the vectorized version to the original one is from 1.8 to 8.6 for SRC, from 2.3 to 10.1 for CITATION, 4.2 for TWOTRAN-II, from 2.9 to 10.4 for COREBN, from 3.9 to 13.3 for CITATION-FBR. In this report, we describe sample input data, summary of the codes, vectorization techniques and performance evaluation of the vectorized codes. (author)

  7. Transversal Clifford gates on folded surface codes

    Science.gov (United States)

    Moussa, Jonathan E.

    2016-10-01

    Surface and color codes are two forms of topological quantum error correction in two spatial dimensions with complementary properties. Surface codes have lower-depth error detection circuits and well-developed decoders to interpret and correct errors, while color codes have transversal Clifford gates and better code efficiency in the number of physical qubits needed to achieve a given code distance. A formal equivalence exists between color codes and folded surface codes, but it does not guarantee the transferability of any of these favorable properties. However, the equivalence does imply the existence of constant-depth circuit implementations of logical Clifford gates on folded surface codes. We achieve and improve this result by constructing two families of folded surface codes with transversal Clifford gates. This construction is presented generally for qudits of any dimension. The specific application of these codes to universal quantum computation based on qubit fusion is also discussed.

  8. A class of Sudan-decodable codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2000-01-01

    In this article, Sudan's algorithm is modified into an efficient method to list-decode a class of codes which can be seen as a generalization of Reed-Solomon codes. The algorithm is specialized into a very efficient method for unique decoding. The code construction can be generalized based...... on algebraic-geometry codes and the decoding algorithms are generalized accordingly. Comparisons with Reed-Solomon and Hermitian codes are made....

  9. Polytope Codes Against Adversaries in Networks

    OpenAIRE

    Kosut, Oliver; Tong, Lang; Tse, David

    2011-01-01

    Network coding is studied when an adversary controls a subset of nodes in the network of limited quantity but unknown location. This problem is shown to be more difficult than when the adversary controls a given number of edges in the network, in that linear codes are insufficient. To solve the node problem, the class of Polytope Codes is introduced. Polytope Codes are constant composition codes operating over bounded polytopes in integer vector fields. The polytope structure creates addition...

  10. Light-water reactor safety analysis codes

    International Nuclear Information System (INIS)

    A brief review of the evolution of light-water reactor safety analysis codes is presented. Included is a summary comparison of the technical capabilities of major system codes. Three recent codes are described in more detail to serve as examples of currently used techniques. Example comparisons between calculated results using these codes and experimental data are given. Finally, a brief evaluation of current code capability and future development trends is presented

  11. Quantum Goppa Codes over Hyperelliptic Curves

    OpenAIRE

    Niehage, Annika

    2005-01-01

    This Diplom thesis provides an explicit construction of a quantum Goppa code for any hyperelliptic curve over a non-binary field. Hyperelliptic curves have conjugate pairs of rational places. We use these pairs to construct self-orthogonal classical Goppa codes with respect to a weighted inner product. These codes are also self-orthogonal with respect to a symplectic inner product and therefore define quantum stabilizer codes. A final transformation leads to a quantum Goppa code with respect ...

  12. Benchmark and partial validation testing of the FLASH computer code, Version 3.0

    Energy Technology Data Exchange (ETDEWEB)

    Martian, P.; Smith, C.S.

    1993-09-01

    This document presents methods and results of benchmark testing (i.e., code-to-code comparisons) and partial validation testing (i.e., tests which compare field data to the computer generated solutions) of the FLASH computer code, Version 3.0, which were conducted to determine if the code is ready for performance assessment studies of the Radioactive Waste Management Complex. Three test problems are presented that were designed to check computational efficiency, accuracy of the numerical algorithms, and the capability of the code to simulate diverse hydrological conditions. These test problems were designed to specifically test the code`s ability to simulate, (a) seasonal infiltration in response to meteorological conditions, (b) changing watertable elevations due to a transient areal source of water, (i.e., influx from spreading basins), and (c) infiltration into fractured basalt as a result of seasonal water in drainage ditches. The FLASH simulations generally compared well with the benchmark codes, indicating good stability and acceptable computational efficiency while simulating a wide range of conditions. The code appears operational for modeling both unsaturated and saturated flow in fractured, heterogeneous porous media. However, the code failed to converge when a unsaturated to saturated transition occurred. Consequently, the code should not be used when this condition occurs or is expected to occur, i.e. when perched water is present or when infiltration rates exceed the saturated conductivity of the soil.

  13. Performance Comparison of Turbo Codes with other Forward Error Correcting Codes

    Directory of Open Access Journals (Sweden)

    Kapil Narwal

    2012-03-01

    Full Text Available : In this paper, we compare performance of turbo codes with different FEC codes presented in literatures. Performance and overall coding gain are compared for Convolutional codes, CTC, TPC and LDPC codes. Turbo Codes tend to work best at low code rates and not so well at high code rates. LDPC’s work very well at high code rates and at low code rates LDPC’s Performance can be very close to Shannon capacity. The decoder complexity of TPC is much less than the Convolutional Turbo Codes (CTC. The performance of TPC is close to capacity for higher code rates, but is not great for low code rates where CTC outperforms.Index terms —

  14. Unidirectional Error Correcting Codes for Memory Systems: A Comparative Study

    CERN Document Server

    Al-Ani, Muzhir

    2010-01-01

    In order to achieve fault tolerance, highly reliable system often require the ability to detect errors as soon as they occur and prevent the speared of erroneous information throughout the system. Thus, the need for codes capable of detecting and correcting byte errors are extremely important since many memory systems use b-bit-per-chip organization. Redundancy on the chip must be put to make fault-tolerant design available. This paper examined several methods of computer memory systems, and then a proposed technique is designed to choose a suitable method depending on the organization of memory systems. The constructed codes require a minimum number of check bits with respect to codes used previously, then it is optimized to fit the organization of memory systems according to the requirements for data and byte lengths.

  15. Amino acid codes in mitochondria as possible clues to primitive codes

    Science.gov (United States)

    Jukes, T. H.

    1981-01-01

    Differences between mitochondrial codes and the universal code indicate that an evolutionary simplification has taken place, rather than a return to a more primitive code. However, these differences make it evident that the universal code is not the only code possible, and therefore earlier codes may have differed markedly from the previous code. The present universal code is probably a 'frozen accident.' The change in CUN codons from leucine to threonine (Neurospora vs. yeast mitochondria) indicates that neutral or near-neutral changes occurred in the corresponding proteins when this code change took place, caused presumably by a mutation in a tRNA gene.

  16. PetriCode: A Tool for Template-Based Code Generation from CPN Models

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge

    2014-01-01

    levels of abstraction. The elements of the models are annotated with code generation pragmatics enabling PetriCode to use a template-based approach to generate code while keeping the models uncluttered from implementation artefacts. PetriCode is the realization of our code generation approach which has...

  17. The Mystery Behind the Code: Differentiated Instruction with Quick Response Codes in Secondary Physical Education

    Science.gov (United States)

    Adkins, Megan; Wajciechowski, Misti R.; Scantling, Ed

    2013-01-01

    Quick response codes, better known as QR codes, are small barcodes scanned to receive information about a specific topic. This article explains QR code technology and the utility of QR codes in the delivery of physical education instruction. Consideration is given to how QR codes can be used to accommodate learners of varying ability levels as…

  18. Biological Information Transfer Beyond the Genetic Code: The Sugar Code

    Science.gov (United States)

    Gabius, H.-J.

    In the era of genetic engineering, cloning, and genome sequencing the focus of research on the genetic code has received an even further accentuation in the public eye. In attempting, however, to understand intra- and intercellular recognition processes comprehensively, the two biochemical dimensions established by nucleic acids and proteins are not sufficient to satisfactorily explain all molecular events in, for example, cell adhesion or routing. The consideration of further code systems is essential to bridge this gap. A third biochemical alphabet forming code words with an information storage capacity second to no other substance class in rather small units (words, sentences) is established by monosaccharides (letters). As hardware oligosaccharides surpass peptides by more than seven orders of magnitude in the theoretical ability to build isomers, when the total of conceivable hexamers is calculated. In addition to the sequence complexity, the use of magnetic resonance spectroscopy and molecular modeling has been instrumental in discovering that even small glycans can often reside in not only one but several distinct low-energy conformations (keys). Intriguingly, conformers can display notably different capacities to fit snugly into the binding site of nonhomologous receptors (locks). This process, experimentally verified for two classes of lectins, is termed "differential conformer selection." It adds potential for shifts of the conformer equilibrium to modulate ligand properties dynamically and reversibly to the well-known changes in sequence (including anomeric positioning and linkage points) and in pattern of substitution, for example, by sulfation. In the intimate interplay with sugar receptors (lectins, enzymes, and antibodies) the message of coding units of the sugar code is deciphered. Their recognition will trigger postbinding signaling and the intended biological response. Knowledge about the driving forces for the molecular rendezvous, i

  19. Clean Code - Why you should care

    CERN Document Server

    CERN. Geneva

    2015-01-01

    - Martin Fowler Writing code is communication, not solely with the computer that executes it, but also with other developers and with oneself. A developer spends a lot of his working time reading and understanding code that was written by other developers or by himself in the past. The readability of the code plays an important factor for the time to find a bug or add new functionality, which in turn has a big impact on the productivity. Code that is difficult to undestand, hard to maintain and refactor, and offers many spots for bugs to hide is not considered to be "clean code". But what could considered as "clean code" and what are the advantages of a strict application of its guidelines? In this presentation we will take a look on some typical "code smells" and proposed guidelines to improve your coding skills to write cleaner code that is less bug prone and better to maintain.

  20. Modulation transfer function of bar code scanning

    Science.gov (United States)

    Tang, Hong; Milster, Tom D.

    1998-09-01

    Bar code scanners are ubiquitous in supermarkets. As a bar code is passed over a scanner, a laser beam scans across the bar code. The scattered light is modulated by the reflectivity of the bars and spaces of the bar code. The bar code scanning process can be described as a 1D convolution of the scanning laser profile and the bar code reflectivity function. The modulation transfer function (MTF) of bar code scanning is the Fourier transform of the marginal profile of the laser beam. The properties of the MTF of bar code scanning is similar to that of an incoherent imaging system. Measurements of the MTF of bar code scanning at one focus position are presented. The experimental results are then discussed.