WorldWideScience

Sample records for beneficiary identification code

  1. Improved code-based identification scheme

    CERN Document Server

    Cayrel, Pierre-Louis

    2010-01-01

    We revisit the 3-pass code-based identification scheme proposed by Stern at Crypto'93, and give a new 5-pass protocol for which the probability of the cheater is 1/2 (instead of 2/3 in the original Stern's proposal). Furthermore, we propose to use quasi-cyclic construction in order to dramatically reduce the size of the public key. The proposed scheme is zero-knowledge and relies on an NP-complete problem coming from coding theory (namely the q-ary Syndrome Decoding problem). Taking into account a recent study of a generalization of Stern's information-set-decoding algorithm for decoding linear codes over arbitrary finite fields Fq we suggest parameters so that the public key be 34Kbits while those of Stern's scheme is about 66Kbits. This provides a very practical identification (and possibly signature) scheme which is mostly attractive for light-weight cryptography

  2. 49 CFR 178.905 - Large Packaging identification codes.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Large Packaging identification codes. 178.905... FOR PACKAGINGS Large Packagings Standards § 178.905 Large Packaging identification codes. Large packaging code designations consist of: two numerals specified in paragraph (a) of this section; followed...

  3. DNA Bar-Coding for Phytoplasma Identification

    DEFF Research Database (Denmark)

    Makarova, Olga; Contaldo, Nicoletta; Paltrinieri, Samanta;

    2013-01-01

    Phytoplasma identi fi cation has proved dif fi cult due to their inability to be maintained in vitro. DNA barcoding is an identi fi cation method based on comparison of a short DNA sequence with known sequences from a database. A DNA barcoding tool has been developed for phytoplasma identi fi...... cation. While other sequencebased methods may be well adapted to identification of particular strains of phytoplasmas, often they cannot be used for the simultaneous identification of phytoplasmas from different groups. The phytoplasma DNA barcoding protocol in this chapter, based on the tuf and 16Sr...

  4. Permanent phonetic identification code for radiation workers

    International Nuclear Information System (INIS)

    This report describes a system of self-checking short and easily memorisable 4-digit 'Permanent Phonetic Radiation Code' (PPRC) using radix 128 for Indians occupationally exposed to radiation, to facilitate entry of all radiation dose data pertaining to an individual in a single record of a file. The logic of PPRC is computer compatible. The necessary computer program has been developed in Health Physics Division for printing the PPRCs in Devanagari script through dot-matrix printers for making it understandable to the majority of the persons concerned. (author)

  5. Bar code technology improves positive patient identification and transfusion safety.

    Science.gov (United States)

    Sandler, S G; Langeberg, A; Dohnalek, L

    2005-01-01

    As a result of human error, an estimated 1 in 12,000 blood transfusions is given to the wrong patient. The cause of nearly all of these errors is failure of hospital personnel to identify positively intended transfusion recipients, their blood samples for cross-matching, or their correct blood components. We describe our experience using a point-of-care bar code transfusion safety system that links patients' bar-coded wristbands, with bar-coded labels on blood sample tubes, blood component bags, and nurses' identification badges. The result was 100 % accuracy of matching patients, their blood samples, and components for transfusions. For verifying information before starting blood transfusions, nurses preferred bar code "double checks" to conventional visual "double checks" by a second nurse. Methods are needed to reinforce nurses' proficiency with technological approaches to transfusion safety, such as software-driven bar code scanning, in situations where transfusions are administered infrequently. PMID:16050151

  6. Adaptive error correction codes for face identification

    Science.gov (United States)

    Hussein, Wafaa R.; Sellahewa, Harin; Jassim, Sabah A.

    2012-06-01

    Face recognition in uncontrolled environments is greatly affected by fuzziness of face feature vectors as a result of extreme variation in recording conditions (e.g. illumination, poses or expressions) in different sessions. Many techniques have been developed to deal with these variations, resulting in improved performances. This paper aims to model template fuzziness as errors and investigate the use of error detection/correction techniques for face recognition in uncontrolled environments. Error correction codes (ECC) have recently been used for biometric key generation but not on biometric templates. We have investigated error patterns in binary face feature vectors extracted from different image windows of differing sizes and for different recording conditions. By estimating statistical parameters for the intra-class and inter-class distributions of Hamming distances in each window, we encode with appropriate ECC's. The proposed approached is tested for binarised wavelet templates using two face databases: Extended Yale-B and Yale. We shall demonstrate that using different combinations of BCH-based ECC's for different blocks and different recording conditions leads to in different accuracy rates, and that using ECC's results in significantly improved recognition results.

  7. Medicare Current Beneficiary Survey

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Characteristics and Perceptions of the Medicare Population Data from the 2010 Medicare Current Beneficiary Survey is a series of source books based on the...

  8. Two-dimensional burst identification codes and their use in burst correction

    OpenAIRE

    1988-01-01

    A new class of codes, called burst identification codes, is defined and studied. These codes can be used to determine the patterns of burst errors. Two-dimensional burst correcting codes can be easily constructed from burst identification codes. The resulting class of codes is simple to implement and has lower redundancy than other comparable codes. The results are pertinent to the study of radiation effects on VLSI RAM chips, which can cause two-dimensional bursts of errors.

  9. Improved Identification Schemes Based on Error-Correcting Codes

    OpenAIRE

    Véron, Pascal

    1997-01-01

    As it is often the case in public-key cryptography, the first practical identification schemes were based on hard problems from number theory (factoring, discrete logarithms). The security of the proposed scheme depends on an NP- complete problem from the theory of error correcting codes: the syndrome decoding problem which relies on the hardness of decoding a binary word of given weight and given syndrome. Starting from Stern's scheme [18], we define a dual version which, unlike the other sc...

  10. Bar Coding MS(2) Spectra for Metabolite Identification.

    Science.gov (United States)

    Spalding, Jonathan L; Cho, Kevin; Mahieu, Nathaniel G; Nikolskiy, Igor; Llufrio, Elizabeth M; Johnson, Stephen L; Patti, Gary J

    2016-03-01

    Metabolite identifications are most frequently achieved in untargeted metabolomics by matching precursor mass and full, high-resolution MS(2) spectra to metabolite databases and standards. Here we considered an alternative approach for establishing metabolite identifications that does not rely on full, high-resolution MS(2) spectra. First, we select mass-to-charge regions containing the most informative metabolite fragments and designate them as bins. We then translate each metabolite fragmentation pattern into a binary code by assigning 1's to bins containing fragments and 0's to bins without fragments. With 20 bins, this binary-code system is capable of distinguishing 96% of the compounds in the METLIN MS(2) library. A major advantage of the approach is that it extends untargeted metabolomics to low-resolution triple quadrupole (QqQ) instruments, which are typically less expensive and more robust than other types of mass spectrometers. We demonstrate a method of acquiring MS(2) data in which the third quadrupole of a QqQ instrument cycles over 20 wide isolation windows (coinciding with the location and width of our bins) for each precursor mass selected by the first quadrupole. Operating the QqQ instrument in this mode yields diagnostic bar codes for each precursor mass that can be matched to the bar codes of metabolite standards. Furthermore, our data suggest that using low-resolution bar codes enables QqQ instruments to make MS(2)-based identifications in untargeted metabolomics with a specificity and sensitivity that is competitive to high-resolution time-of-flight technologies. PMID:26837423

  11. 22 CFR 228.03 - Identification of principal geographic code numbers.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Identification of principal geographic code... § 228.03 Identification of principal geographic code numbers. The USAID Geographic Code Book sets forth the official description of all geographic codes used by USAID in authorizing or...

  12. Proposing national identification number on dental prostheses as universal personal identification code - A revolution in forensic odontology.

    Science.gov (United States)

    Baad, Rajendra K; Belgaumi, Uzma; Vibhute, Nupura; Kadashetti, Vidya; Chandrappa, Pramod Redder; Gugwad, Sushma

    2015-01-01

    The proper identification of a decedent is not only important for humanitarian and emotional reasons, but also for legal and administrative purposes. During the reconstructive identification process, all necessary information is gathered from the unknown body of the victim and hence that an objective reconstructed profile can be established. Denture marking systems are being used in various situations, and a number of direct and indirect methods are reported. We propose that national identification numbers be incorporated in all removable and fixed prostheses, so as to adopt a single and definitive universal personal identification code with the aim of achieving a uniform, standardized, easy, and fast identification method worldwide for forensic identification. PMID:26005294

  13. 21 CFR 11.300 - Controls for identification codes/passwords.

    Science.gov (United States)

    2010-04-01

    ... SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Signatures § 11.300 Controls for identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in... using suitable, rigorous controls. (d) Use of transaction safeguards to prevent unauthorized use...

  14. Who are the beneficiaries?

    Science.gov (United States)

    Tännsjö, Torbjörn

    1992-10-01

    Is it defensible that society spends money on medical or research projects intended to help people solve their fertility problems? Suppose that we want to answer this question from the point of view of a utilitarian cost-benefit analysis. The answer to the question then depends, of course, on how expensive these projects turn out to be, relative to the costs of other possible projects. But it depends also on how we assess the benefits of these projects. To whom do they accrue? Who are the beneficiaries of these projects? PMID:11652091

  15. Numerical identification of bacteria with a hand-held calculator as an alternative to code books.

    OpenAIRE

    Schindler, J; Schindler, Z

    1982-01-01

    The Hewlett-Packard HP 41C hand-held calculator can be used for the numerical identification of bacteria. The dimensions of the identification matrix are limited to about 30 by 22; however, many groups of clinically important bacteria can be numerically identified by this method. Hand-held calculators can be used as an alternative to code books. At present, these calculators and additional tests can help solve identification problems in profiles not contained in code books.

  16. Chronic Conditions among Medicare Beneficiaries

    Data.gov (United States)

    U.S. Department of Health & Human Services — The data used in the chronic condition reports are based upon CMS administrative enrollment and claims data for Medicare beneficiaries enrolled in the...

  17. Dental Services Among Medicare Beneficiaries

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Medicare Current Beneficiary Survey (MCBS) has a data highlight based on the 2012 Cost and Use Research Files. This work highlights dental information...

  18. Validation of ICD-9-CM coding algorithm for improved identification of hypoglycemia visits

    OpenAIRE

    Lieberman Rebecca M; Blanc Phillip G; Ginde Adit A; Camargo Carlos A

    2008-01-01

    Abstract Background Accurate identification of hypoglycemia cases by International Classification of Diseases, Ninth Revision, Clinical Modification (ICD-9-CM) codes will help to describe epidemiology, monitor trends, and propose interventions for this important complication in patients with diabetes. Prior hypoglycemia studies utilized incomplete search strategies and may be methodologically flawed. We sought to validate a new ICD-9-CM coding algorithm for accurate identification of hypoglyc...

  19. Proposing national identification number on dental prostheses as universal personal identification code - A revolution in forensic odontology

    Directory of Open Access Journals (Sweden)

    Rajendra K Baad

    2015-01-01

    Full Text Available The proper identification of a decedent is not only important for humanitarian and emotional reasons, but also for legal and administrative purposes. During the reconstructive identification process, all necessary information is gathered from the unknown body of the victim and hence that an objective reconstructed profile can be established. Denture marking systems are being used in various situations, and a number of direct and indirect methods are reported. We propose that national identification numbers be incorporated in all removable and fixed prostheses, so as to adopt a single and definitive universal personal identification code with the aim of achieving a uniform, standardized, easy, and fast identification method worldwide for forensic identification.

  20. Identification of ICD Codes Suggestive of Child Maltreatment

    Science.gov (United States)

    Schnitzer, Patricia G.; Slusher, Paula L.; Kruse, Robin L.; Tarleton, Molly M.

    2011-01-01

    Objective: In order to be reimbursed for the care they provide, hospitals in the United States are required to use a standard system to code all discharge diagnoses: the International Classification of Disease, 9th Revision, Clinical Modification (ICD-9). Although ICD-9 codes specific for child maltreatment exist, they do not identify all…

  1. Computational RNomics:Structure identification and functional prediction of non-coding RNAs in silico

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The eukaryotic genome contains varying numbers of non-coding RNA(ncRNA) genes."Computational RNomics" takes a multidisciplinary approach,like information science,to resolve the structure and function of ncRNAs.Here,we review the main issues in "Computational RNomics" of data storage and management,ncRNA gene identification and characterization,ncRNA target identification and functional prediction,and we summarize the main methods and current content of "computational RNomics".

  2. A simple and inexpensive bar-coding technique for denture identification

    Directory of Open Access Journals (Sweden)

    Sonali N Nalawade

    2011-01-01

    Full Text Available A number of commercial methods for identifying dentures are available. They can be either invasive or noninvasive techniques. The less sophisticated procedures include simple engraving with bur, and more sophisticated procedures use labels or chips. Bar coding system is a way of transferring data to the computer and huge data can be stored as a record. Bar coding can be easily incorporated during acrylization of the denture and thus could be used in individual identification.

  3. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Science.gov (United States)

    2010-04-01

    ... Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Signatures § 73.12 What security controls must I use for identification codes and passwords? If you use electronic signatures based upon...

  4. Towards a spectrum-based bar code for identification of weakly fluorescent microparticles

    International Nuclear Information System (INIS)

    Spectrally resolved detection of fluorescent probes can be used to identify multiple labeled target molecules in an unknown mixture. We study how the spectral shape, the experimental noise, and the number of spectral detection channels affect the success of identification of weakly fluorescent beads on basis of their emission spectra. The proposed formalism allows to estimate the performance of the spectral identification procedure with a given set of spectral codes on the basis of the reference spectra only. We constructed a simple prism-based setup for spectral detection and demonstrate that seven distinct but overlapping spectral codes realized by combining up to three fluorescent dyes bound to a single bead in a barcode-based manner can be reliably identified. The procedure allows correct identification even in the presence of known autofluorescence background stronger than the actual signal. (paper)

  5. One-time collision arbitration algorithm in radio-frequency identification based on the Manchester code

    Science.gov (United States)

    Liu, Chen-Chung; Chan, Yin-Tsung

    2011-02-01

    In radio-requency identification (RFID) systems, when multiple tags transmit data to a reader simultaneously, these data may collide and create unsuccessful identifications; hence, anticollision algorithms are needed to reduce collisions (collision cycles) to improve the tag identification speed. We propose a one-time collision arbitration algorithm to reduce both the number of collisions and the time consumption for tags' identification in RFID. The proposed algorithm uses Manchester coding to detect the locations of collided bits, uses the divide-and-conquer strategy to find the structure of colliding bits to generate 96-bit query strings as the 96-bit candidate query strings (96BCQSs), and uses query-tree anticollision schemes with 96BCQSs to identify tags. The performance analysis and experimental results show that the proposed algorithm has three advantages: (i) reducing the number of collisions to only one, so that the time complexity of tag identification is the simplest O(1), (ii) storing identified identification numbers (IDs) and the 96BCQSs in a register to save the used memory, and (iii) resulting in the number of bits transmitted by both the reader and tags being evidently less than the other algorithms in one-tag identification or in all tags identification.

  6. Predicting and Classifying User Identification Code System Based on Support Vector Machines

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (U ID) code that is the fingerprint for tracking the authorized user. The proposed hiding scheme makes use of a random number generator to scramble two copies of a UID,which will then be hidden in the randomly selected medium frequency coefficients of the host image. The linear support vector machine (SVM) will be used to train classifications by calculating the normalized correlation (NC) for the 2-class UID codes. The trained classifications will be the models used for identifying unreadable UID codes.Experimental results showed that the success of predicting the unreadable UID codes can be increased by applying SVM. The proposed scheme can be used to provide protections to intellectual property rights of digital images and to keep track of users to prevent collaborative piracies.

  7. Identification of Thioredoxin Target Disulfides Using Isotope-Coded Affinity Tags

    DEFF Research Database (Denmark)

    Hägglund, Per; Bunkenborg, Jakob; Maeda, Kenji; Finnie, Christine; Svensson, Birte

    extracts is described. The procedure utilizes the isotope-coded affinity tag (ICAT) reagents containing a thiol reactive iodoacetamide group and a biotin affinity tag to target peptides containing reduced cysteine residues. The identification of substrates for Trx and the extent of target disulfide......Thioredoxins (Trx) are small redox proteins that reduce disulfide bonds in various target proteins and maintain cellular thiol redox control. Here, a thiol-specific labeling and affinity enrichment approach for identification and relative quantification of Trx target disulfides in complex protein...

  8. OASDI Beneficiaries by State and County, 2010

    Data.gov (United States)

    Social Security Administration — This annual publication focuses on the Social Security beneficiary population people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the...

  9. OASDI Beneficiaries by State and County, 2011

    Data.gov (United States)

    Social Security Administration — This annual publication focuses on the Social Security beneficiary population people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the...

  10. OASDI Beneficiaries and Benefits by State-2014

    Data.gov (United States)

    Social Security Administration — This annual map focuses on the Social Security beneficiary population- people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits- at the state...

  11. OASDI Beneficiaries by State and County, 2006

    Data.gov (United States)

    Social Security Administration — This annual publication focuses on the Social Security beneficiary population people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the...

  12. OASDI Beneficiaries by State and County, 2001

    Data.gov (United States)

    Social Security Administration — This annual publication focuses on the Social Security beneficiary population people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the...

  13. OASDI Beneficiaries by State and County, 2014

    Data.gov (United States)

    Social Security Administration — This annual publication focuses on the Social Security beneficiary population people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the...

  14. OASDI Beneficiaries by State and County, 2002

    Data.gov (United States)

    Social Security Administration — This annual publication focuses on the Social Security beneficiary population people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the...

  15. OASDI Beneficiaries by State and County, 2008

    Data.gov (United States)

    Social Security Administration — This annual publication focuses on the Social Security beneficiary population people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the...

  16. OASDI Beneficiaries by State and County, 2007

    Data.gov (United States)

    Social Security Administration — This annual publication focuses on the Social Security beneficiary population people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the...

  17. OASDI Beneficiaries by State and County, 2000

    Data.gov (United States)

    Social Security Administration — This annual publication focuses on the Social Security beneficiary population people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the...

  18. OASDI Beneficiaries by State and County, 2009

    Data.gov (United States)

    Social Security Administration — This annual publication focuses on the Social Security beneficiary population people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the...

  19. OASDI Beneficiaries by State and County, 2003

    Data.gov (United States)

    Social Security Administration — This annual publication focuses on the Social Security beneficiary population people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the...

  20. OASDI Beneficiaries by State and County, 2005

    Data.gov (United States)

    Social Security Administration — This annual publication focuses on the Social Security beneficiary population people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the...

  1. OASDI Beneficiaries by State and County, 2013

    Data.gov (United States)

    Social Security Administration — This annual publication focuses on the Social Security beneficiary population people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the...

  2. OASDI Beneficiaries by State and County, 2004

    Data.gov (United States)

    Social Security Administration — This annual publication focuses on the Social Security beneficiary population people receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the...

  3. Analytical qualification of system identification (modal analysis) codes for use in the dynamic testing of nuclear power plant structures

    International Nuclear Information System (INIS)

    The analytical evaluation of two particular system identification codes used at Lawrence Livermore Laboratory is presented. Both codes are eigenparameter identification codes; however, one uses a time domain approach while the other a frequency domain approach. The evaluation was accomplished by analytically generating several time history signals in which the true modal parameters were known. These time histories ranged from widely spaced modes with spacing factors of 100 percent to closely spaced modes with spacing factors of 6 percent. These signals were then polluted with various levels of simulated measurement noise and the ability of our computer codes to extract the parameters from this noisy data was evaluated

  4. 42 CFR 411.23 - Beneficiary's cooperation.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Beneficiary's cooperation. 411.23 Section 411.23 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES MEDICARE... Medicare Payment: General Provisions § 411.23 Beneficiary's cooperation. (a) If CMS takes action to...

  5. Catching Of Stolen Vehicles With Unique Identification Code Using Embedded Systems

    Directory of Open Access Journals (Sweden)

    Mahesh Kumar Shakya

    2012-11-01

    Full Text Available The main purpose of this concept is to catch the stolen vehicles by a latest technology. This research work is developing a smart logic to identify the stolen vehicle on check post or Toll base. Still there is no technique to identify the vehicle on check posts by any mean. To employ this technology in use, we issue one unique identification code to every vehicle. This unique number is stored in the silicon chip and the chip is installed in the vehicle. No one can change this number because this UID chip is installed in the engine of the vehicle. This vehicle number is not available in the market. Now the vehicle is equipped with the UID code. This code is also stored in the Data base of check post or Toll base. Now when any vehicle passed through the check post/Toll then at the check post/Toll RF passive vehicle reader generates a 125 kHz frequency for decoding RF tag( which has been installed in the vehicle. If the data base does not find the stolen UID code then security gate gets OPEN and if the stolen UID code is matched with the data base then security gate remains closed and alarm becomes ON automatically and finally the stolen vehicle is caught

  6. A new method for species identification via protein-coding and non-coding DNA barcodes by combining machine learning with bioinformatic methods.

    Directory of Open Access Journals (Sweden)

    Ai-bing Zhang

    Full Text Available Species identification via DNA barcodes is contributing greatly to current bioinventory efforts. The initial, and widely accepted, proposal was to use the protein-coding cytochrome c oxidase subunit I (COI region as the standard barcode for animals, but recently non-coding internal transcribed spacer (ITS genes have been proposed as candidate barcodes for both animals and plants. However, achieving a robust alignment for non-coding regions can be problematic. Here we propose two new methods (DV-RBF and FJ-RBF to address this issue for species assignment by both coding and non-coding sequences that take advantage of the power of machine learning and bioinformatics. We demonstrate the value of the new methods with four empirical datasets, two representing typical protein-coding COI barcode datasets (neotropical bats and marine fish and two representing non-coding ITS barcodes (rust fungi and brown algae. Using two random sub-sampling approaches, we demonstrate that the new methods significantly outperformed existing Neighbor-joining (NJ and Maximum likelihood (ML methods for both coding and non-coding barcodes when there was complete species coverage in the reference dataset. The new methods also out-performed NJ and ML methods for non-coding sequences in circumstances of potentially incomplete species coverage, although then the NJ and ML methods performed slightly better than the new methods for protein-coding barcodes. A 100% success rate of species identification was achieved with the two new methods for 4,122 bat queries and 5,134 fish queries using COI barcodes, with 95% confidence intervals (CI of 99.75-100%. The new methods also obtained a 96.29% success rate (95%CI: 91.62-98.40% for 484 rust fungi queries and a 98.50% success rate (95%CI: 96.60-99.37% for 1094 brown algae queries, both using ITS barcodes.

  7. Computer code DYSAC for identification and dynamics analysis of multivariable systems based on the autoregressive model

    International Nuclear Information System (INIS)

    Usage is described of the computer code DYSAC (Dynamic System Analysis Code) developed for a hybrid computer for the identification and the analysis of system dynamics. A multivariable linear dynamic system is identified based on the autoregressive model using the time series data obtained from a system in operation and the system dynamics thus identified are analyzed. This code includes subroutines for the analysis of step response, frequency response, power spectrum, etc. In order to facilitate handling a large number of various experimental data and to perform the analysis in perspective, considerations for effective utilization of hybrid computer functions and terminal devices are taken in this code, such as; The experimental data record in an analog data recorder are directly input to the analog part of the hybrid computer. The computed results can be plotted on the graphic display and its hard copy is readily available. A series of messages for guidance is given on the display terminal by which the analysis though man-machine interactive computation can be performed. Thus, the required results can be obtained by performing case studies for which necessary parameters are input through the keyboard and the results displayed are checked. (auth.)

  8. Costs and Clinical Quality Among Medicare Beneficiaries..

    Data.gov (United States)

    U.S. Department of Health & Human Services — Authors of Costs and Clinical Quality Among Medicare Beneficiaries - Associations with Health Center Penetration of Low-Income Residents, published in Volume 4,...

  9. Medicare Current Beneficiary Survey - Limited Data Set

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Medicare Current Beneficiary Survey (MCBS) is a continuous, multipurpose survey of a representative national sample of the Medicare population. There are two...

  10. Basic Stand Alone Medicare Hospice Beneficiary PUF

    Data.gov (United States)

    U.S. Department of Health & Human Services — This release contains the Basic Stand Alone (BSA) Hospice Beneficiary Public Use Files (PUF) with information from Medicare hospice claims. The CMS BSA Hospice...

  11. National Beneficiary Survey (NBS) Round 2

    Data.gov (United States)

    Social Security Administration — A cross-sectional survey of a nationally representative sample of 4,864 social security beneficiaries age 18-64 receiving disability benefits in active pay status...

  12. National Beneficiary Survey (NBS) Round 4

    Data.gov (United States)

    Social Security Administration — A cross-sectional survey of a nationally representative sample of social security beneficiaries age 18-64 receiving disability benefits in active pay status as of...

  13. National Beneficiary Survey (NBS) Round 1

    Data.gov (United States)

    Social Security Administration — A cross-sectional survey of a nationally representative sample of 6,520 social security beneficiaries age 18-64 receiving disability benefits in active pay status...

  14. National Beneficiary Survey (NBS) Round 3

    Data.gov (United States)

    Social Security Administration — A cross-sectional survey of a nationally representative sample of social security beneficiaries age 18-64 receiving disability benefits in active pay status as of...

  15. Beneficiary Activation in the Medicare Population

    Data.gov (United States)

    U.S. Department of Health & Human Services — According to findings reported in Beneficiary Activation in the Medicare Population, published in Volume 4, Issue 4 of the Medicare and Medicaid Research Review,...

  16. Flow regime identification methodology with MCNP-X code and artificial neural network

    International Nuclear Information System (INIS)

    This paper presents flow regimes identification methodology in multiphase system in annular, stratified and homogeneous oil-water-gas regimes. The principle is based on recognition of the pulse height distributions (PHD) from gamma-ray with supervised artificial neural network (ANN) systems. The detection geometry simulation comprises of two NaI(Tl) detectors and a dual-energy gamma-ray source. The measurement of scattered radiation enables the dual modality densitometry (DMD) measurement principle to be explored. Its basic principle is to combine the measurement of scattered and transmitted radiation in order to acquire information about the different flow regimes. The PHDs obtained by the detectors were used as input to ANN. The data sets required for training and testing the ANN were generated by the MCNP-X code from static and ideal theoretical models of multiphase systems. The ANN correctly identified the three different flow regimes for all data set evaluated. The results presented show that PHDs examined by ANN may be applied in the successfully flow regime identification. (author)

  17. Identification and Role of Regulatory Non-Coding RNAs in Listeria monocytogenes

    Directory of Open Access Journals (Sweden)

    Mobarak Abu Mraheil

    2011-08-01

    Full Text Available Bacterial regulatory non-coding RNAs control numerous mRNA targets that direct a plethora of biological processes, such as the adaption to environmental changes, growth and virulence. Recently developed high-throughput techniques, such as genomic tiling arrays and RNA-Seq have allowed investigating prokaryotic cis- and trans-acting regulatory RNAs, including sRNAs, asRNAs, untranslated regions (UTR and riboswitches. As a result, we obtained a more comprehensive view on the complexity and plasticity of the prokaryotic genome biology. Listeria monocytogenes was utilized as a model system for intracellular pathogenic bacteria in several studies, which revealed the presence of about 180 regulatory RNAs in the listerial genome. A regulatory role of non-coding RNAs in survival, virulence and adaptation mechanisms of L. monocytogenes was confirmed in subsequent experiments, thus, providing insight into a multifaceted modulatory function of RNA/mRNA interference. In this review, we discuss the identification of regulatory RNAs by high-throughput techniques and in their functional role in L. monocytogenes.

  18. The Aspects code for probabilistic cross-identification of astrophysical sources: documentation and complements

    CERN Document Server

    Fioc, Michel

    2014-01-01

    Aspects ([asp{\\epsilon}], "ASsociation PositionnellE/ProbabilistE de CaTalogues de Sources" in French) is a Fortran 95 code for the cross-identification of astrophysical sources. Its source files are freely available. Given the coordinates and positional uncertainties of all the sources in two catalogs K and K', Aspects computes the probability that an object in K and one in K' are the same or that they have no counterpart. Three exclusive assumptions are considered: (1) Several-to-one associations: a K-source has at most one counterpart in K', but a K'-source may have several counterparts in K; (2) One-to-several associations: the same with K and K' swapped; (3) One-to-one associations: a K-source has at most one counterpart in K' and vice versa. To compute the probabilities of association, Aspects needs the a priori (i.e. ignoring positions) probability that an object has a counterpart. The code obtains estimates of this quantity by maximizing the likelihood to observe all the sources at their effective pos...

  19. Medicare Beneficiary Knowledge of the Part D Program

    Data.gov (United States)

    U.S. Department of Health & Human Services — Medicare Beneficiary Knowledge of the Part D Program and Its Relationship with Voluntary Enrollment According to findings appearing in Medicare Beneficiary...

  20. Regulatory beneficiaries and informal agency policymaking.

    Science.gov (United States)

    Mendelson, Nina A

    2007-03-01

    Administrative agencies frequently use guidance documents to set policy broadly and prospectively in areas ranging from Department of Education Title IX enforcement to Food and Drug Administration regulation of direct-to- consumer pharmaceutical advertising. In form, these guidances often closely resemble the policies agencies issue in ordinary notice-and-comment rulemaking. However, guidances are generally developed with little public participation and are often immune from judicial review. Nonetheless, guidances can prompt significant changes in behavior from those the agencies regulate. A number of commentators have guardedly defended the current state of affairs. Though guidances lack some important procedural safeguards, they can help agencies supervise low-level employees and supply valuable information to regulated entities regarding how an agency will implement a program. Thus far, however, the debate has largely ignored the distinct and substantial interests of regulatory beneficiaries--those who expect to benefit from government regulation of others. Regulatory beneficiaries include, among others, pharmaceutical consumers, environmental users, and workers seeking safe workplaces. When agencies make policy informally, regulatory beneficiaries suffer distinctive losses to their ability to participate in the agency's decision and to invoke judicial review. This Article argues that considering the interests of regulatory beneficiaries strengthens the case for procedural reform. The Article then assesses some possible solutions. PMID:17410678

  1. Method for non-destructive measurement of heat affected zone of identification code on nuclear fuel rod

    International Nuclear Information System (INIS)

    In a method for the nondestructive measurement of the depth of the heat affected zone underneath a laser generated identification code on a nuclear fuel rod tube, the change in impedance of an electromagnetic foil produced by a portion of the tube is measured before and after the etching of a bar code is performed by use of laser power. The impedance change in the coil produced by the bar code-bearing tube portion is compared with the impedance change produced in the coil by the same tube portion before the bar code is generated thereon to determine whether a maximum allowed depth of the heat affected zone of the tube portion has been exceeded. (author)

  2. Proposing national identification number on dental prostheses as universal personal identification code - A revolution in forensic odontology

    OpenAIRE

    Baad, Rajendra K.; Uzma Belgaumi; Nupura Vibhute; Vidya Kadashetti; Pramod Redder Chandrappa; Sushma Gugwad

    2015-01-01

    The proper identification of a decedent is not only important for humanitarian and emotional reasons, but also for legal and administrative purposes. During the reconstructive identification process, all necessary information is gathered from the unknown body of the victim and hence that an objective reconstructed profile can be established. Denture marking systems are being used in various situations, and a number of direct and indirect methods are reported. We propose that national identifi...

  3. Comparative Determinants of Productivity among Cassava Farmer-Beneficiaries and Non-Beneficiaries of Microfinance Institutions (MFIs) in Abia State Nigeria

    OpenAIRE

    Obike, Kingsley Chukwuemeka; Osundu, Charles Kelechi

    2013-01-01

    ABSTRACT This study investigated the comparative determinants of productivity among cassava farmer-beneficiaries and non-beneficiaries of Microfinance Institution (MFIs) in Abia state, Nigeria. Specifically, the study identified and examined factors influencing productivity of cassava farmers who are beneficiaries and non-beneficiaries of Microfinance Institutions (MFIs). Multistage random sampling technique was implored in sorting out respondents who are beneficiaries and non-beneficiaries o...

  4. Five-way Smoking Status Classification Using Text Hot-Spot Identification and Error-correcting Output Codes

    OpenAIRE

    Cohen, Aaron M.

    2008-01-01

    We participated in the i2b2 smoking status classification challenge task. The purpose of this task was to evaluate the ability of systems to automatically identify patient smoking status from discharge summaries. Our submission included several techniques that we compared and studied, including hot-spot identification, zero-vector filtering, inverse class frequency weighting, error-correcting output codes, and post-processing rules. We evaluated our approaches using the same methods as the i2...

  5. Five-way smoking status classification using text hot-spot identification and error-correcting output codes.

    Science.gov (United States)

    Cohen, Aaron M

    2008-01-01

    We participated in the i2b2 smoking status classification challenge task. The purpose of this task was to evaluate the ability of systems to automatically identify patient smoking status from discharge summaries. Our submission included several techniques that we compared and studied, including hot-spot identification, zero-vector filtering, inverse class frequency weighting, error-correcting output codes, and post-processing rules. We evaluated our approaches using the same methods as the i2b2 task organizers, using micro- and macro-averaged F1 as the primary performance metric. Our best performing system achieved a micro-F1 of 0.9000 on the test collection, equivalent to the best performing system submitted to the i2b2 challenge. Hot-spot identification, zero-vector filtering, classifier weighting, and error correcting output coding contributed additively to increased performance, with hot-spot identification having by far the largest positive effect. High performance on automatic identification of patient smoking status from discharge summaries is achievable with the efficient and straightforward machine learning techniques studied here. PMID:17947623

  6. Access of rural AFDC Medicaid beneficiaries to mental health services.

    Science.gov (United States)

    Lambert, D; Agger, M S

    1995-01-01

    This article examines geographic differences in the use of mental health services among Aid to Families with Dependent Children (AFDC)-eligible Medicaid beneficiaries in Maine. Findings indicate that rural AFDC beneficiaries have significantly lower utilization of mental health services than urban beneficiaries. Specialty mental health providers account for the majority of ambulatory visits for both rural and urban beneficiaries. However, rural beneficiaries rely more on primary-care providers than do urban beneficiaries. Differences in use are largely explained by variations in the supply of specialty mental health providers. This finding supports the long-held assumption that lower supply is a barrier to access to mental health services in rural areas. PMID:10153467

  7. Medicare Beneficiary Knowledge: Measurement Implications from a Qualitative Study

    OpenAIRE

    Teal, Cayla R.; Paterniti, Debora A; Murphy, Christi L.; John, Dolly A.; Morgan, Robert O.

    2006-01-01

    Medicare beneficiary knowledge about fee-for-service (FFS) Medicare versus managed care alternatives (MCA) has been studied extensively. However, these efforts might be compromised by lack of familiarity with common Medicare terminology. We used qualitative methods to examine beneficiaries' familiarity with Medicare Programs (FFS and MCA) and terminology. Twenty-one indepth, semi-structured beneficiary interview transcripts were analyzed through iterative review. Across sex, race/ethnicity, a...

  8. Identification and Analysis of Critical Gaps in Nuclear Fuel Cycle Codes Required by the SINEMA Program

    International Nuclear Information System (INIS)

    The current state of the art in nuclear fuel cycle (NFC) modeling is an eclectic mixture of codes with various levels of applicability, flexibility, and availability. In support of the advanced fuel cycle systems analyses, especially those by the Advanced Fuel Cycle Initiative (AFCI), University of Cincinnati in collaboration with Idaho State University carried out a detailed review of the existing codes describing various aspects of the nuclear fuel cycle and identified the research and development needs required for a comprehensive model of the global nuclear energy infrastructure and the associated nuclear fuel cycles. Relevant information obtained on the NFC codes was compiled into a relational database that allows easy access to various codes' properties. Additionally, the research analyzed the gaps in the NFC computer codes with respect to their potential integration into programs that perform comprehensive NFC analysis.

  9. Identification and Analysis of Critical Gaps in Nuclear Fuel Cycle Codes Required by the SINEMA Program

    Energy Technology Data Exchange (ETDEWEB)

    Adrian Miron; Joshua Valentine; John Christenson; Majd Hawwari; Santosh Bhatt; Mary Lou Dunzik-Gougar: Michael Lineberry

    2009-10-01

    The current state of the art in nuclear fuel cycle (NFC) modeling is an eclectic mixture of codes with various levels of applicability, flexibility, and availability. In support of the advanced fuel cycle systems analyses, especially those by the Advanced Fuel Cycle Initiative (AFCI), Unviery of Cincinnati in collaboration with Idaho State University carried out a detailed review of the existing codes describing various aspects of the nuclear fuel cycle and identified the research and development needs required for a comprehensive model of the global nuclear energy infrastructure and the associated nuclear fuel cycles. Relevant information obtained on the NFC codes was compiled into a relational database that allows easy access to various codes' properties. Additionally, the research analyzed the gaps in the NFC computer codes with respect to their potential integration into programs that perform comprehensive NFC analysis.

  10. Global identification and analysis of long non-coding RNAs in diploid strawberry Fragaria vesca during flower and fruit development

    OpenAIRE

    Kang, Chunying; Liu, Zhongchi

    2015-01-01

    Background Long non-coding RNAs (lncRNAs) are a new class of regulatory molecules with roles in diverse biological processes. While much effort has been invested in the analysis of lncRNAs from established plant models Arabidopsis, maize, and rice, almost nothing is known about lncRNAs from fruit crops, including those in the Rosaceae family. Results Here, we present a genome-scale identification and characterization of lncRNAs from a diploid strawberry, Fragaria vesca, based on rich RNA-seq ...

  11. On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices

    OpenAIRE

    Asghar, HJ; Steinfeld, R.; Li, S.; Kaafar, MA; Pieprzyk, J

    2015-01-01

    Human identification protocols are challenge-response protocols that rely on human computational ability to reply to random challenges from the server based on a public function of a shared secret and the challenge to authenticate the human user. One security criterion for a human identification protocol is the number of challenge-response pairs the adversary needs to observe before it can deduce the secret. In order to increase this number, protocol designers have tried to construct protocol...

  12. Code-Mixing in Social Media Text: The Last Language Identification Frontier?

    OpenAIRE

    Das, Amitava; Gambäck, Björn

    2015-01-01

    ABSTRACT: Automatic understanding of noisy social media text is one of the prime present-day research areas. Most research has so far concentrated on English texts ; however, more than half of the users are writing in other languages, making language identification a pre-requisite for comprehensive processing of social media text. Though language identification has been considered an almost solved problem in other applications, language detectors fail in the social media context due to pheno...

  13. Automatic Screening of Missing Objects and Identification with Group Coding of RF Tags

    OpenAIRE

    G. Vijayaraju

    2013-01-01

    Here the container of the shipping based phenomena it is a collection of the objects in a well oriented fashion by which there is a group oriented fashion related to the well efficient strategy of the objects based on the physical phenomena in a well efficient fashion respectively. Here by the enabling of the radio frequency identification based strategy in which object identification takes place in the system in a well efficient fashion and followed by the container oriented strategy in ...

  14. TPASS: a gamma-ray spectrum analysis and isotope identification computer code

    International Nuclear Information System (INIS)

    The gamma-ray spectral data-reduction and analysis computer code TPASS is described. This computer code is used to analyze complex Ge(Li) gamma-ray spectra to obtain peak areas corrected for detector efficiencies, from which are determined gamma-ray yields. These yields are compared with an isotope gamma-ray data file to determine the contributions to the observed spectrum from decay of specific radionuclides. A complete FORTRAN listing of the code and a complex test case are given

  15. MCBS Highlights: Prescription Drug Coverage Among Medicare Beneficiaries

    OpenAIRE

    Regan, Joseph F.; Petroski, Cara A.

    2007-01-01

    The Medicare Current Beneficiary Survey (MCBS) is a longitudinal survey of a nationally-representative sample of Medicare enrollees. The survey collects information on a variety of topics, including beneficiaries' health status; health care use and financing; and social, economic, and demographic characteristics. Medicare administrative data is regularly coupled with the information collected through the survey for validation purposes.

  16. 42 CFR 412.42 - Limitations on charges to beneficiaries.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Limitations on charges to beneficiaries. 412.42 Section 412.42 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN... Costs § 412.42 Limitations on charges to beneficiaries. (a) Prohibited charges. A hospital may...

  17. Identification of minority resistance mutations in the HIV-1 integrase coding region using next generation sequencing

    DEFF Research Database (Denmark)

    Fonager, Jannik; Larsson, Jonas T; Hussing, Christian;

    2015-01-01

    BACKGROUND: The current widely applied standard method to screen for HIV-1 genotypic resistance is based on Sanger population sequencing (Sseq), which does not allow for the identification of minority variants (MVs) below the limit of detection for the Sseq-method in patients receiving integrase...... mutations were detected by NGS analysis of integrase sequences from all three INSTI Res+ and one INSTI Res- patient. CONCLUSION: Our observations suggested that NGS demonstrated a higher sensitivity than sSEQ in the identification of INSTI relevant MVs both in patients at treatment baseline and in patients...

  18. Evaluvation of Antenatal Checkup Practices Observed among Beneficiaries & Non Beneficiaries Under Janani Suraksha Yojana Scheme in Indore, India

    Directory of Open Access Journals (Sweden)

    Shireen Sharma, V K Arora, Ahmed Shahjada, Piyusha Mahashabde, Abhishek Bachhotiya

    2014-01-01

    Full Text Available Introduction: Maternal mortality has been considered as a sign of social injustice to basic human health. GOI initiated some schemes to promote institutional deliveries with the ultimate objective of bringing down IMR and MMR one such scheme is Janani Suraksha Yojana under this scheme cash incentive is given to women opting for institutional delivery. Objective: To find out the utilization and association between services of ANC among Beneficiary and non- Beneficiary. Material & Method: A cross sectional study conducted over a period of one year, by using 30 clusters random sampling technique, with sample size of 450. Result: 69.5% was beneficiaries and 30.4% non-beneficiaries. 82.5% beneficiaries and 81.8% were found to be literate. Registration for ANC services, among beneficiary was found out to be 99.6% as compared to non-beneficiaries which was 97.8%. 74.4% beneficiaries had received 2tetanus and 72.8% had received more than 90 IFA tablets.

  19. Protein Coding Sequence Identification by Simultaneously Characterizing the Periodic and Random Features of DNA Sequences

    Directory of Open Access Journals (Sweden)

    Gao Jianbo

    2005-01-01

    Full Text Available Most codon indices used today are based on highly biased nonrandom usage of codons in coding regions. The background of a coding or noncoding DNA sequence, however, is fairly random, and can be characterized as a random fractal. When a gene-finding algorithm incorporates multiple sources of information about coding regions, it becomes more successful. It is thus highly desirable to develop new and efficient codon indices by simultaneously characterizing the fractal and periodic features of a DNA sequence. In this paper, we describe a novel way of achieving this goal. The efficiency of the new codon index is evaluated by studying all of the 16 yeast chromosomes. In particular, we show that the method automatically and correctly identifies which of the three reading frames is the one that contains a gene.

  20. BWR stability and bifurcation analysis using reduced order models and system codes: Identification of a subcritical Hopf bifurcation using RAMONA

    International Nuclear Information System (INIS)

    The system code RAMONA, as well as a recently developed BWR reduced order model (ROM), are employed for the stability analysis of a specific operational point of the Leibstadt nuclear power plant. This has been done in order to assess the ROM's applicability and limitations in a quantitative manner. In the context of a detailed local bifurcation analysis carried out using RAMONA in the neighbourhood of the chosen Leibstadt operational point, a bridge is built between the ROM and the system code. This has been achieved through interpreting RAMONA solutions on the basis of the physical mechanisms identified in the course of applying the ROM. This leads, for the first time, to the identification of a subcritical Poincare-Andronov-Hopf (PAH) bifurcation using a system code. As a consequence, the possibility of the so-called correspondence hypothesis is suggested to underline the relationship between a stable (unstable) limit cycle solution and the occurrence of a supercritical (subcritical) PAH bifurcation in the modeling of boiling water reactor stability behaviour

  1. Identification of evolutionarily conserved non-AUG-initiated N-terminal extensions in human coding sequences.

    LENUS (Irish Health Repository)

    Ivanov, Ivaylo P

    2011-05-01

    In eukaryotes, it is generally assumed that translation initiation occurs at the AUG codon closest to the messenger RNA 5\\' cap. However, in certain cases, initiation can occur at codons differing from AUG by a single nucleotide, especially the codons CUG, UUG, GUG, ACG, AUA and AUU. While non-AUG initiation has been experimentally verified for a handful of human genes, the full extent to which this phenomenon is utilized--both for increased coding capacity and potentially also for novel regulatory mechanisms--remains unclear. To address this issue, and hence to improve the quality of existing coding sequence annotations, we developed a methodology based on phylogenetic analysis of predicted 5\\' untranslated regions from orthologous genes. We use evolutionary signatures of protein-coding sequences as an indicator of translation initiation upstream of annotated coding sequences. Our search identified novel conserved potential non-AUG-initiated N-terminal extensions in 42 human genes including VANGL2, FGFR1, KCNN4, TRPV6, HDGF, CITED2, EIF4G3 and NTF3, and also affirmed the conservation of known non-AUG-initiated extensions in 17 other genes. In several instances, we have been able to obtain independent experimental evidence of the expression of non-AUG-initiated products from the previously published literature and ribosome profiling data.

  2. IDGAM. A PC code and database to help nuclide identification in activation analysis

    International Nuclear Information System (INIS)

    The document describes a PC diskette containing a code and database which helps researchers to identify the nuclides in a radioactive sample. Data can be retrieved by gamma-ray energy, nuclide or element. The PC diskette is available, costfree, from the IAEA Nuclear Data Section, upon request. (author). 6 refs, 5 figs

  3. Identification of maize long non-coding RNAs responsive to drought stress.

    Directory of Open Access Journals (Sweden)

    Wei Zhang

    Full Text Available Long non-coding RNAs (lncRNAs represent a class of riboregulators that either directly act in long form or are processed to shorter miRNAs and siRNAs. Emerging evidence shows that lncRNAs participate in stress responsive regulation. In this study, to identify the putative maize lncRNAs responsive to drought stress, 8449 drought responsive transcripts were first uploaded to the Coding Potential Calculator website for classification as protein coding or non-coding RNAs, and 1724 RNAs were identified as potential non-coding RNAs. A Perl script was written to screen these 1724 ncRNAs and 664 transcripts were ultimately identified as drought-responsive lncRNAs. Of these 664 transcripts, 126 drought-responsive lncRNAs were highly similar to known maize lncRNAs; the remaining 538 transcripts were considered as novel lncRNAs. Among the 664 lncRNAs identified as drought responsive, 567 were upregulated and 97 were downregulated in drought-stressed leaves of maize. 8 lncRNAs were identified as miRNA precursor lncRNAs, 62 were classified as both shRNA and siRNA precursors, and 279 were classified as siRNA precursors. The remaining 315 lncRNAs were classified as other lncRNAs that are likely to function as longer molecules. Among these 315 lncRNAs, 10 are identified as antisense lncRNAs and 7 could pair with 17 CDS sequences with near-perfect matches. Finally, RT-qPCR results confirmed that all selected lncRNAs could respond to drought stress. These findings extend the current view on lncRNAs as ubiquitous regulators under stress conditions.

  4. Identification and characterisation of coding tandem repeat variants in incA gene of Chlamydophila pecorum

    OpenAIRE

    Yousef Mohamad, Khalil; Rekiki, Abdessalem; Myers, Garry; Bavoil, Patrick M; Rodolakis, Annie

    2008-01-01

    Bacteria of the family Chlamydiaceae are obligate intracellular pathogens of human and animals. Chlamydophila pecorum is associated with different pathological conditions in ruminants, swine and koala. To characterize a coding tandem repeat (CTR) identified at the 3' end of incA gene of C. pecorum, 51 strains of different chlamydial species were examined. The CTR were observed in 18 of 18 tested C. pecorum isolates including symptomatic and asymptomatic animals from diverse geographical origi...

  5. Racial Disparities in Use of Chiropractic Services by Medicare Beneficiaries Aged 65 to 99 in Los Angeles County, California.

    Science.gov (United States)

    Whedon, James M; Kimura, Melissa N; Phillips, Reed B

    2016-04-01

    Racial and ethnic disparities in utilization of chiropractic services have been described at the state level, but little is known about such local disparities. We analyzed Medicare data for the year 2008 to evaluate by ZIP code for utilization of chiropractic services among older adults in Los Angeles County, California. We evaluated for availability and use of chiropractic services by racial/ethnic category, quantified geographic variations by coefficient of variation, and mapped utilization by selected racial/ethnic categories. Among 7502 beneficiaries who used chiropractic services, 72% were white, 12% Asian, 1% black, 1% Hispanic, and 14% other/unknown. Variation in the number of beneficiaries per ZIP code who used chiropractic services was highest among Hispanics, blacks, and Asians. We found evidence of racial disparities in use of chiropractic services at the local level in Los Angeles County. Older blacks and Hispanics in Los Angeles County may be underserved with regard to chiropractic care. PMID:26350244

  6. A Bar Code and Radio-Frequency Identification System for Transfusion Safety

    Institute of Scientific and Technical Information of China (English)

    Sandler SG; DiBandi L; Langeberg A; Gibble J; Wilson C; Feldman CF

    2006-01-01

    This presentation will describe a pilot study of radio-frequency (RF) identification tags ("chips") that was conducted in parallel with standard procedures for the collection and testing of Red Blood Cells (Greater Chesapeake and Potomac Region, American Red Cross Biomedical Services, Baltimore, MD) and transfusion (Georgetown University Hospital, Washington, DC). The purpose of the study was to evaluate whether multi-write RF chips could be attached to blood bags, programmed, and used to facilitate the collection of information from (1) a blood bag manufacturer to (2) a blood collection center and, subsequently, to (3) a hospital transfusion service.

  7. Identification of Genes Coding Aminoglycoside Modifying Enzymes in E. coli of UTI Patients in India

    Directory of Open Access Journals (Sweden)

    Abdul Rouf Mir

    2016-01-01

    Full Text Available This study is to probe the pattern of antibiotic resistance against aminoglycosides and its mechanism in E. coli obtained from patients from Chennai, India. Isolation and identification of pathogens were done on MacConkey agar. Antimicrobial sensitivity testing was done by disc diffusion test. The identification of genes encoding aminoglycoside modifying enzymes was done by Polymerase Chain Reaction (PCR. Out of 98 isolates, 71 (72.45% isolates were identified as E. coli and the remaining 27 (27.55% as other bacteria. Disc diffusion method results showed a resistance level of 72.15% for streptomycin, 73.4% for gentamicin, 63.26% for neomycin, 57.14% for tobramycin, 47.9% for netilmicin, and 8.16% for amikacin in E. coli. PCR screening showed the presence of four genes, namely, rrs, aacC2, aacA-aphD, and aphA3, in their plasmid DNA. The results point towards the novel mechanism of drug resistance in E. coli from UTI patients in India as they confirm the presence of genes encoding enzymes that cause resistance to aminoglycoside drugs. This could be an alarm for drug prescription to UTI patients.

  8. Genome-wide identification and characterization of long intergenic non-coding RNAs in Ganoderma lucidum.

    Directory of Open Access Journals (Sweden)

    Jianqin Li

    Full Text Available Ganoderma lucidum is a white-rot fungus best-known for its medicinal activities. We have previously sequenced its genome and annotated the protein coding genes. However, long non-coding RNAs in G. lucidum genome have not been analyzed. In this study, we have identified and characterized long intergenic non-coding RNAs (lincRNA in G. lucidum systematically. We developed a computational pipeline, which was used to analyze RNA-Seq data derived from G. lucidum samples collected from three developmental stages. A total of 402 lincRNA candidates were identified, with an average length of 609 bp. Analysis of their adjacent protein-coding genes (apcGenes revealed that 46 apcGenes belong to the pathways of triterpenoid biosynthesis and lignin degradation, or families of cytochrome P450, mating type B genes, and carbohydrate-active enzymes. To determine if lincRNAs and these apcGenes have any interactions, the corresponding pairs of lincRNAs and apcGenes were analyzed in detail. We developed a modified 3' RACE method to analyze the transcriptional direction of a transcript. Among the 46 lincRNAs, 37 were found unidirectionally transcribed, and 9 were found bidirectionally transcribed. The expression profiles of 16 of these 37 lincRNAs were found to be highly correlated with those of the apcGenes across the three developmental stages. Among them, 11 are positively correlated (r>0.8 and 5 are negatively correlated (r<-0.8. The co-localization and co-expression of lincRNAs and those apcGenes playing important functions is consistent with the notion that lincRNAs might be important regulators for cellular processes. In summary, this represents the very first study to identify and characterize lincRNAs in the genomes of basidiomycetes. The results obtained here have laid the foundation for study of potential lincRNA-mediated expression regulation of genes in G. lucidum.

  9. Computational Approaches to the Identification and Characterization of Non-Coding RNA Genes

    OpenAIRE

    Larsson, Pontus

    2009-01-01

    Non-coding RNAs (ncRNAs) have emerged as highly diverse and powerful key players in the cell, the range of capabilities spanning from catalyzing essential processes in all living organisms, e.g. protein synthesis, to being highly specific regulators of gene expression. To fully understand the functional significance of ncRNAs, it is of critical importance to identify and characterize the repertoire of ncRNAs in the cell. Practically every genome-wide screen to identify ncRNAs has revealed lar...

  10. Beneficiary price sensitivity in the Medicare prescription drug plan market.

    Science.gov (United States)

    Frakt, Austin B; Pizer, Steven D

    2010-01-01

    The Medicare stand-alone prescription drug plan (PDP) came into existence in 2006 as part of the Medicare prescription drug benefit. It is the most popular plan type among Medicare drug plans and large numbers of plans are available to all beneficiaries. In this article we present the first analysis of beneficiary price sensitivity in the PDP market. Our estimate of elasticity of enrollment with respect to premium, -1.45, is larger in magnitude than has been found in the Medicare HMO market. This high degree of beneficiary price sensitivity for PDPs is consistent with relatively low product differentiation, low fixed costs of entry in the PDP market, and the fact that, in contrast to changing HMOs, beneficiaries can select a PDP without disrupting doctor-patient relationships. PMID:19191252

  11. Basic Stand Alone Medicare Home Health Beneficiary PUF

    Data.gov (United States)

    U.S. Department of Health & Human Services — This release contains the Basic Stand Alone (BSA) Home Health Agency (HHA) Beneficiary Public Use Files (PUF) with information from Medicare HHA claims. The CMS BSA...

  12. Longitudinal Statistics for New Social Security Disability Insurance Beneficiaries.

    OpenAIRE

    David Stapleton; Su Liu; Dawn Phelps; Sarah Prenovitz

    2010-01-01

    This paper presents the findings from a longitudinal examination regarding the extent to which new Social Security Disability Insurance beneficiaries return to work and use disability insurance work incentives, based on Social Security Administration data.

  13. Shared Savings Program ACO Beneficiary-level RIF

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Centers for Medicare (CM) has created a set of standard analytical files that contain Shared Savings Program Accountable Care Organizations. Beneficiary-level...

  14. Basic Stand Alone Skilled Nursing Facility Beneficiary PUF

    Data.gov (United States)

    U.S. Department of Health & Human Services — This release contains the Basic Stand Alone (BSA) Skilled Nursing Facility (SNF) Beneficiary Public Use Files (PUF) with information from Medicare SNF claims. The...

  15. Automatic Screening of Missing Objects and Identification with Group Coding of RF Tags

    Directory of Open Access Journals (Sweden)

    G. Vijayaraju

    2013-11-01

    Full Text Available Here the container of the shipping based phenomena it is a collection of the objects in a well oriented fashion by which there is a group oriented fashion related to the well efficient strategy of the objects based on the physical phenomena in a well efficient fashion respectively. Here by the enabling of the radio frequency identification based strategy in which object identification takes place in the system in a well efficient fashion and followed by the container oriented strategy in a well effective fashion respectively. Here there is a problem with respect to the present strategy in which there is a problem with respect to the design oriented mechanism by which there is a no proper analysis takes place for the accurate identification of the objects based on the missing strategy plays a major role in the system based aspect respectively. Here a new technique is proposed in order to overcome the problem of the previous method here the present design oriented powerful strategy includes the object oriented determination of the ID based on the user oriented phenomena in a well effective manner where the data related to the strategy of the missing strategy plays a major role in the system based aspect in a well effective fashion by which that is from the perfect analysis takes place from the same phenomena without the help of the entire database n a well respective fashion takes place in the system respectively. Here the main key aspect of the present method is to effectively divide the entire data related to the particular aspect and define based on the present strategy in a well effective manner in which there is coordination has to be maintained in the system based aspect respectively. Simulations have been conducted on the present method and a lot of analysis takes place on the large number of the data sets in a well oriented fashion with respect to the different environmental conditions where there is an accurate analysis with respect to

  16. How Disability Beneficiaries Fared Before and After the Great Recession

    OpenAIRE

    Gina Livermore; Maura Bardos

    2015-01-01

    The Great Recession (December 2007 to June 2009) had far-reaching impacts on the U.S. economy, but it likely had a different effect on beneficiaries of the Social Security Administration (SSA) disability programs than on other working-age individuals. This data brief describes the experiences of working-age beneficiaries of Supplemental Security Income (SSI) and Social Security Disability Insurance (SSDI) from 2006–2010 (a period beginning before and ending after the Great Recession), compa...

  17. Earnings and Work Expectations of Social Security Disability Beneficiaries.

    OpenAIRE

    Gina A. Livermore

    2008-01-01

    The Ticket to Work and Work Incentives Improvement Act of 1999 prompted changes in the Supplemental Security Income (SSI) and Social Security Disability Insurance (SSDI) programs to help beneficiaries get and stay employed. This brief, the first in a new series from the Center for Studying Disability Policy at Mathematica, highlights the extent to which SSI and SSDI beneficiaries are working or trying to return to work. It also examines their interest in increasing their earnings and self-suf...

  18. Defining Beneficiaries of Collective Reparations: The experience of the IACtHR

    Directory of Open Access Journals (Sweden)

    Diana Contreras-Garduño

    2012-09-01

    Full Text Available

    Under international law, it is uncontested that the victims of gross and systematic human rights violations have the right to reparation. International tribunals have granted collective reparations as the most appropriate kind of reparation for these violations. This has been re-affirmed by the recent decision on reparations of the International Criminal Court in the Lubanga case. Since gross and systematic human rights violations involve large numbers of victims, collective reparations seem to be appropriate as they seek to provide redress to groups and communities. Yet, while there is a trend of international tribunals adjudicating gross human rights violations resorting to collective reparations, these reparations face numerous ambiguities such as the lack of a single definition and clear guidelines for the identification of their beneficiaries. This article examines the experience of the Inter-American Court of Human Rights, pioneer of collective reparations, in the identification of beneficiaries of gross and systematic human rights violations.

  19. Identification of neural firing patterns, frequency and temporal coding mechanisms in individual aortic baroreceptors

    Directory of Open Access Journals (Sweden)

    Huaguang eGu

    2015-08-01

    Full Text Available In rabbit depressor nerve fibers, an on-off firing pattern, period-1 firing, and integer multiple firing with quiescent state were observed as the static pressure level was increased. A bursting pattern with bursts at the systolic phase of blood pressure, continuous firing, and bursting with burst at diastolic phase and quiescent state at systolic phase were observed as the mean level of the dynamic blood pressure was increased. For both static and dynamic pressures, the firing frequency of the first two firing patterns increased and of the last firing pattern decreased due to the quiescent state. If the quiescent state is disregarded, the spike frequency becomes an increasing trend. The instantaneous spike frequency of the systolic phase bursting, continuous firing, and diastolic phase bursting can reflect the temporal process of the systolic phase, whole procedure, and diastolic phase of the dynamic blood pressure signal, respectively. With increasing the static current corresponding to pressure level, the deterministic Hodgkin-Huxley (HH model manifests a process from a resting state first to period-1 firing via a subcritical Hopf bifurcation and then to a resting state via a supercritical Hopf bifurcation, and the firing frequency increases. The on-off firing and integer multiple firing were here identified as noise-induced firing patterns near the subcritical and supercritical Hopf bifurcation points, respectively, using the stochastic HH model. The systolic phase bursting and diastolic phase bursting were identified as pressure-induced firings near the subcritical and supercritical Hopf bifurcation points, respectively, using an HH model with a dynamic signal. The firing, spike frequency, and instantaneous spike frequency observed in the experiment were simulated and explained using HH models. The results illustrate the dynamics of different firing patterns and the frequency and temporal coding mechanisms of aortic baroreceptor.

  20. Genome Wide Identification and Functional Prediction of Long Non-Coding RNAs Responsive to Sclerotinia sclerotiorum Infection in Brassica napus

    Science.gov (United States)

    Joshi, Raj Kumar; Megha, Swati; Basu, Urmila; Rahman, Muhammad H.; Kav, Nat N. V.

    2016-01-01

    Sclerotinia stem rot caused by Sclerotinia sclerotiorum affects canola production worldwide. Emerging evidence suggests that long non-coding RNAs (lncRNAs) play important roles in the regulation of gene expression in plants, in response to both abiotic and biotic stress. So far, identification of lncRNAs has been limited to a few model plant species, and their roles in mediating responses to biotic stresses are yet to be characterized in Brassica napus. The present study reports the identification of novel lncRNAs responsive to S. sclerotiorum infection in B. napus at two time points after infection (24 hpi and 48 hpi) using a stranded RNA-Sequencing technique and a detection pipeline for lncRNAs. Of the total 3,181 lncRNA candidates, 2,821 lncRNAs were intergenic, 111 were natural antisense transcripts, 76 possessed exonic overlap with the reference coding transcripts while the remaining 173 represented novel lnc- isoforms. Forty one lncRNAs were identified as the precursors for microRNAs (miRNAs) including miR156, miR169 and miR394, with significant roles in mediating plant responses to fungal phytopathogens. A total of 931 differentially expressed lncRNAs were identified in response to S. sclerotiorum infection and the expression of 12 such lncRNAs was further validated using qRT-PCR. B. napus antisense lncRNA, TCONS_00000966, having 90% overlap with a plant defensin gene, showed significant induction at both infection stages, suggesting its involvement in the transcriptional regulation of defense responsive genes under S. sclerotiorum infection. Additionally, nine lncRNAs showed overlap with cis-regulatory regions of differentially expressed genes of B. napus. Quantitative RT-PCR verification of a set of S. sclerotiorum responsive sense/antisense transcript pairs revealed contrasting expression patterns, supporting the hypothesis that steric clashes of transcriptional machinery may lead to inactivation of sense promoter. Our findings highlight the potential

  1. Identification and characterization of small non-coding RNAs from Chinese fir by high throughput sequencing

    Directory of Open Access Journals (Sweden)

    Wan Li-Chuan

    2012-08-01

    Full Text Available Abstract Background Small non-coding RNAs (sRNAs play key roles in plant development, growth and responses to biotic and abiotic stresses. At least four classes of sRNAs have been well characterized in plants, including repeat-associated siRNAs (rasiRNAs, microRNAs (miRNAs, trans-acting siRNAs (tasiRNAs and natural antisense transcript-derived siRNAs. Chinese fir (Cunninghamia lanceolata is one of the most important coniferous evergreen tree species in China. No sRNA from Chinese fir has been described to date. Results To obtain sRNAs in Chinese fir, we sequenced a sRNA library generated from seeds, seedlings, leaves, stems and calli, using Illumina high throughput sequencing technology. A comprehensive set of sRNAs were acquired, including conserved and novel miRNAs, rasiRNAs and tasiRNAs. With BLASTN and MIREAP we identified a total of 115 conserved miRNAs comprising 40 miRNA families and one novel miRNA with precursor sequence. The expressions of 16 conserved and one novel miRNAs and one tasiRNA were detected by RT-PCR. Utilizing real time RT-PCR, we revealed that four conserved and one novel miRNAs displayed developmental stage-specific expression patterns in Chinese fir. In addition, 209 unigenes were predicted to be targets of 30 Chinese fir miRNA families, of which five target genes were experimentally verified by 5' RACE, including a squamosa promoter-binding protein gene, a pentatricopeptide (PPR repeat-containing protein gene, a BolA-like family protein gene, AGO1 and a gene of unknown function. We also demonstrated that the DCL3-dependent rasiRNA biogenesis pathway, which had been considered absent in conifers, existed in Chinese fir. Furthermore, the miR390-TAS3-ARF regulatory pathway was elucidated. Conclusions We unveiled a complex population of sRNAs in Chinese fir through high throughput sequencing. This provides an insight into the composition and function of sRNAs in Chinese fir and sheds new light on land plant sRNA evolution.

  2. Development of PARA-ID Code to Simulate Inelastic Constitutive Equations and Their Parameter Identifications for the Next Generation Reactor Designs

    Energy Technology Data Exchange (ETDEWEB)

    Koo, Gyeong Hoi; Lee, J. H

    2006-03-15

    The establishment of the inelastic analysis technology is essential issue for a development of the next generation reactors subjected to elevated temperature operations. In this report, the peer investigation of constitutive equations in points of a ratcheting and creep-fatigue analysis is carried out and the methods extracting the constitutive parameters from experimental data are established. To perform simulations for each constitutive model, the PARA-ID (PARAmeter-IDentification) computer program is developed. By using this code, various simulations related with the parameter identification of the constitutive models are carried out.

  3. Analysis of Satisfaction Degree of the Public Insurance System Beneficiaries

    Directory of Open Access Journals (Sweden)

    Manuela PANAITESCU

    2013-08-01

    Full Text Available The public insurance system provides financial benefits to individuals that are obtained by collecting the due contributions. The analysis of satisfaction degree of the beneficiaries of the system was carried out to determine the challenges the system is facing and for determining the needs of the beneficiaries. In order to reduce the financial constraints the public insurance system is facing, it is necessary to create an appropriate insurance system that meets the needs of the beneficiaries. The research took into account that the public insurance system determines the quality of life of the population and has a strong influence on the economy, particularly on the labour market and the capital market.

  4. Medicare spending by beneficiaries with various types of supplemental insurance.

    Science.gov (United States)

    Khandker, R K; McCormack, L A

    1999-06-01

    The authors analyzed Medicare spending by elderly noninstitutionalized Medicare beneficiaries with and without supplemental insurance such as Medigap, employer-sponsored plans, and Medicaid. Use of a detailed survey of Medicare beneficiaries and their Medicare health insurance claims enabled the authors to control for health status, chronic conditions, functional limitations, and other factors that explain spending variations across supplemental insurance categories. The authors found that supplemental insurance was associated with a higher probability and level of Medicare spending, particularly for Part B services. Beneficiaries with both Medigap and employer plans had the highest levels of spending ceteris paribus, suggesting a possible moral hazard effect of insurance. Findings from this study are discussed in the context of the overall financing of health care for the elderly. PMID:10373721

  5. Local population characteristics and hemoglobin A1c testing rates among diabetic medicare beneficiaries.

    Directory of Open Access Journals (Sweden)

    Laura C Yasaitis

    Full Text Available BACKGROUND: Proposed payment reforms in the US healthcare system would hold providers accountable for the care delivered to an assigned patient population. Annual hemoglobin A1c (HbA1c tests are recommended for all diabetics, but some patient populations may face barriers to high quality healthcare that are beyond providers' control. The magnitude of fine-grained variations in care for diabetic Medicare beneficiaries, and their associations with local population characteristics, are unknown. METHODS: HbA1c tests were recorded for 480,745 diabetic Medicare beneficiaries. Spatial analysis was used to create ZIP code-level estimated testing rates. Associations of testing rates with local population characteristics that are outside the control of providers--population density, the percent African American, with less than a high school education, or living in poverty--were assessed. RESULTS: In 2009, 83.3% of diabetic Medicare beneficiaries received HbA1c tests. Estimated ZIP code-level rates ranged from 71.0% in the lowest decile to 93.1% in the highest. With each 10% increase in the percent of the population that was African American, associated HbA1c testing rates were 0.24% lower (95% CI -0.32--0.17; for identical increases in the percent with less than a high school education or the percent living in poverty, testing rates were 0.70% lower (-0.95--0.46 and 1.6% lower (-1.8--1.4, respectively. Testing rates were lowest in the least and most densely populated ZIP codes. Population characteristics explained 5% of testing rate variations. CONCLUSIONS: HbA1c testing rates are associated with population characteristics, but these characteristics fail to explain the vast majority of variations. Consequently, even complete risk-adjustment may have little impact on some process of care quality measures; much of the ZIP code-related variations in testing rates likely result from provider-based differences and idiosyncratic local factors not related to

  6. Identification of a positive transcription regulatory element within the coding region of the nifLA operon in Azotobacter vinelandii.

    Science.gov (United States)

    Mitra, Ranjana; Das, Hirendra K; Dixit, Aparna

    2005-07-01

    Nitrogen fixation in Azotobacter vinelandii is regulated by the nifLA operon. NifA activates the transcription of nif genes, while NifL antagonizes the transcriptional activator NifA in response to fixed nitrogen and molecular oxygen levels. However, transcriptional regulation of the nifLA operon of A. vinelandii itself is not fully understood. Using the S1 nuclease assay, we mapped the transcription start site of the nifLA operon, showing it to be similar to the sigma54-dependent promoters. We also identified a positive cis-acting regulatory element (+134 to +790) of the nifLA operon within the coding region of the nifL gene of A. vinelandii. Deletion of this element results in complete loss of promoter activity. Several protein factors bind to this region, and the specific binding sites have been mapped by DNase I foot printing. Two of these sites, namely dR1 (+134 to +204) and dR2 (+745 to +765), are involved in regulating the nifLA promoter activity. The absence of NtrC-like binding sites in the upstream region of the nifLA operon in A. vinelandii makes the identification of these downstream elements a highly significant finding. The interaction of the promoter with the proteins binding to the dR2 region spanning +745 to +765 appears to be dependent on the face of the helix as introduction of 4 bases just before this region completely disrupts promoter activity. Thus, the positive regulatory element present within the BglII-BglII fragment may play, in part; an important role in nifLA regulation in A. vinelandii. PMID:16000781

  7. 42 CFR 424.64 - Payment after beneficiary's death: Bill has not been paid.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Payment after beneficiary's death: Bill has not... Made in Special Situations § 424.64 Payment after beneficiary's death: Bill has not been paid. (a... has died and the bill has not been paid. (b) Situation. (1) The beneficiary has received covered...

  8. 42 CFR 424.62 - Payment after beneficiary's death: Bill has been paid.

    Science.gov (United States)

    2010-10-01

    ... beneficiary; (ii) The child or children, who were, for the month of death, entitled to monthly social security... 42 Public Health 3 2010-10-01 2010-10-01 false Payment after beneficiary's death: Bill has been... Made in Special Situations § 424.62 Payment after beneficiary's death: Bill has been paid. (a)...

  9. 42 CFR 411.51 - Beneficiary's responsibility with respect to no-fault insurance.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Beneficiary's responsibility with respect to no-fault insurance. 411.51 Section 411.51 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES....51 Beneficiary's responsibility with respect to no-fault insurance. (a) The beneficiary...

  10. 42 CFR 411.43 - Beneficiary's responsibility with respect to workers' compensation.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Beneficiary's responsibility with respect to workers' compensation. 411.43 Section 411.43 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... Beneficiary's responsibility with respect to workers' compensation. (a) The beneficiary is responsible...

  11. Research on Framework of Verification Code Rapid Identification Based on PIL%基于PIL的验证码快速识别框架的研究

    Institute of Scientific and Technical Information of China (English)

    胡光中; 欧阳鸿志

    2012-01-01

    The verification code is widely used on the network as a Turing test, the study of the verification code identification technology helps verification code development and solves some emerging issues. This paper presents a framework based on PIL library, through a combination of excellent features of Python and known identification methods, can quickly respond to common verification code in the form, and can achieve better recognition results.%验证码是网络上普遍采用的一种图灵测试,研究验证码识别技术有助于验证码发展和解决一些新生问题.本文提出一种基于PIL类库的识别框架,通过结合Python的优良特性和己知识别方法,能够快速应时常见验证码形式,并能达到较好的识别效果.

  12. The Work Experiences of New SSI Beneficiaries: A Longitudinal Perspective.

    OpenAIRE

    Yonatan Ben-Shalom; David Stapleton

    2012-01-01

    This issue brief uses longitudinal data to follow a group of Social Security Insurance beneficiaries and examine their efforts to return to work. Compared with shorter-term cross-sectional data, the longitudinal statistics show higher levels of employment and suspensions of benefits due to work.

  13. Reframing the Issues : Consulting with Beneficiaries Swaziland Urban Development Project

    OpenAIRE

    Kuehnast, Kathleen

    2001-01-01

    Unplanned and unregulated urban development is not unique to Swaziland, but addressing the issue through direct consultations with beneficiaries is an important improvement toward resolving this persistent problem. The Swaziland Urban Development Project includes standard infrastructure work, such as increasing urban roads, rehabilitating and expanding water and sewage services, and develo...

  14. 75 FR 9360 - Investment Advice-Participants and Beneficiaries

    Science.gov (United States)

    2010-03-02

    ... beneficiaries of individual retirement accounts and certain similar plans (IRAs) (74 FR 3822). The rules..., 2009. On February 4, 2009, the Department published in the Federal Register (74 FR 6007) an invitation... 74 FR 11847). In order to afford the Department additional time to consider the issues raised...

  15. 2010 National Beneficiary Survey: Methodology and Descriptive Statistics.

    OpenAIRE

    Debra Wright; Gina Livermore; Denise Hoffman; Eric Grau; Maura Bardos

    2012-01-01

    This report presents the sampling design and data collection activities for round 4 (2010) of the Social Security Administration’s National Beneficiary Survey (NBS). It also provides descriptive statistics on working-age individuals receiving Supplemental Security Income and Social Security Disability Insurance benefits, based on the nationally representative sample from the 2010 NBS.

  16. Lower Rehospitalization Rates among Rural Medicare Beneficiaries with Diabetes

    Science.gov (United States)

    Bennett, Kevin J.; Probst, Janice C.; Vyavaharkar, Medha; Glover, Saundra H.

    2012-01-01

    Purpose: We estimated the 30-day readmission rate of Medicare beneficiaries with diabetes, across levels of rurality. Methods: We merged the 2005 Medicare Chronic Conditions 5% sample data with the 2007 Area Resource File. The study population was delimited to those with diabetes and at least 1 hospitalization in the year. Unadjusted readmission…

  17. 5 CFR 870.802 - Designation of beneficiary.

    Science.gov (United States)

    2010-01-01

    ... Section 870.802 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE... people. The appropriate office must receive the designation before the death of the insured. (1) For... right cannot be waived or restricted. (g)(1) A designation of beneficiary is automatically cancelled...

  18. Identification of protein-coding and non-coding RNA expression profiles in CD34+ and in stromal cells in refractory anemia with ringed sideroblasts

    Directory of Open Access Journals (Sweden)

    Verjovski-Almeida Sergio

    2010-07-01

    Full Text Available Abstract Background Myelodysplastic syndromes (MDS are a group of clonal hematological disorders characterized by ineffective hematopoiesis with morphological evidence of marrow cell dysplasia resulting in peripheral blood cytopenia. Microarray technology has permitted a refined high-throughput mapping of the transcriptional activity in the human genome. Non-coding RNAs (ncRNAs transcribed from intronic regions of genes are involved in a number of processes related to post-transcriptional control of gene expression, and in the regulation of exon-skipping and intron retention. Characterization of ncRNAs in progenitor cells and stromal cells of MDS patients could be strategic for understanding gene expression regulation in this disease. Methods In this study, gene expression profiles of CD34+ cells of 4 patients with MDS of refractory anemia with ringed sideroblasts (RARS subgroup and stromal cells of 3 patients with MDS-RARS were compared with healthy individuals using 44 k combined intron-exon oligoarrays, which included probes for exons of protein-coding genes, and for non-coding RNAs transcribed from intronic regions in either the sense or antisense strands. Real-time RT-PCR was performed to confirm the expression levels of selected transcripts. Results In CD34+ cells of MDS-RARS patients, 216 genes were significantly differentially expressed (q-value ≤ 0.01 in comparison to healthy individuals, of which 65 (30% were non-coding transcripts. In stromal cells of MDS-RARS, 12 genes were significantly differentially expressed (q-value ≤ 0.05 in comparison to healthy individuals, of which 3 (25% were non-coding transcripts. Conclusions These results demonstrated, for the first time, the differential ncRNA expression profile between MDS-RARS and healthy individuals, in CD34+ cells and stromal cells, suggesting that ncRNAs may play an important role during the development of myelodysplastic syndromes.

  19. The fusion protein signal-peptide-coding region of canine distemper virus: a useful tool for phylogenetic reconstruction and lineage identification.

    Directory of Open Access Journals (Sweden)

    Nicolás Sarute

    Full Text Available Canine distemper virus (CDV; Paramyxoviridae, Morbillivirus is the etiologic agent of a multisystemic infectious disease affecting all terrestrial carnivore families with high incidence and mortality in domestic dogs. Sequence analysis of the hemagglutinin (H gene has been widely employed to characterize field strains, permitting the identification of nine CDV lineages worldwide. Recently, it has been established that the sequences of the fusion protein signal-peptide (Fsp coding region are extremely variable, suggesting that analysis of its sequence might be useful for strain characterization studies. However, the divergence of Fsp sequences among worldwide strains and its phylogenetic resolution has not yet been evaluated. We constructed datasets containing the Fsp-coding region and H gene sequences of the same strains belonging to eight CDV lineages. Both datasets were used to evaluate their phylogenetic resolution. The phylogenetic analysis revealed that both datasets clustered the same strains into eight different branches, corresponding to CDV lineages. The inter-lineage amino acid divergence was fourfold greater for the Fsp peptide than for the H protein. The likelihood mapping revealed that both datasets display strong phylogenetic signals in the region of well-resolved topologies. These features indicate that Fsp-coding region sequence analysis is suitable for evolutionary studies as it allows for straightforward identification of CDV lineages.

  20. Longitudinal Statistics for New Supplemental Security Income Beneficiaries

    OpenAIRE

    Yonatan Ben-Shalom; David Stapleton; Dawn Phelps; Maura Bardos

    2012-01-01

    Using Social Security Administration data, this paper presents findings from a longitudinal analysis of the extent to which new Supplemental Security Income (SSI) disability beneficiaries return to work and use SSI work incentives. Longitudinal statistics show that more than 8 percent of those first awarded SSI benefits as adults in 2001 had their benefits suspended due to work for at least a month by December 2007.

  1. Depression Following Thrombotic Cardiovascular Events in Elderly Medicare Beneficiaries: Risk of Morbidity and Mortality

    Directory of Open Access Journals (Sweden)

    Christopher M. Blanchette

    2009-01-01

    Full Text Available Purpose. Depression and antidepressant use may independently increase the risk of acute myocardial infarction and mortality in adults. However, no studies have looked at the effect of depression on a broader thrombotic event outcome, assessed antidepressant use, or evaluated elderly adults. Methods. A cohort of 7,051 community-dwelling elderly beneficiaries who experienced a thrombotic cardiovascular event (TCE were pooled from the 1997 to 2002 Medicare Current Beneficiary Survey and followed for 12 months. Baseline characteristics, antidepressant utilization, and death were ascertained from the survey, while indexed TCE, recurrent TCE, and depression (within 6 months of indexed TCE were taken from ICD-9 codes on Medicare claims. Time to death and first recurrent TCE were assessed using descriptive and multivariate statistics. Results. Of the elders with a depression claim, 71.6% had a recurrent TCE and 4.7% died within 12 months of their indexed TCE, compared to 67.6% and 3.9% of those elders without a depression claim. Of the antidepressant users, 72.6% experienced a recurrent TCE and 3.9% died, compared to 73.7% and 4.6% in the subset of selective serotonin reuptake inhibitor (SSRI users. Depression was associated with a shorter time to death (P=.008 in the unadjusted analysis. However, all adjusted comparisons revealed no effect by depression, antidepressant use, or SSRI use. Conclusions. Depression was not associated with time to death or recurrent TCEs in this study. Antidepressant use, including measures of any antidepressant use and SSRI use, was not associated with shorter time to death or recurrent TCE.

  2. PCR assay based on DNA coding for 16S rRNA for detection and identification of mycobacteria in clinical samples.

    Science.gov (United States)

    Kox, L F; van Leeuwen, J; Knijper, S; Jansen, H M; Kolk, A H

    1995-01-01

    A PCR and a reverse cross blot hybridization assay were developed for the detection and identification of mycobacteria in clinical samples. The PCR amplifies a part of the DNA coding for 16S rRNA with a set of primers that is specific for the genus Mycobacterium and that flanks species-specific sequences within the genes coding for 16S rRNA. The PCR product is analyzed in a reverse cross blot hybridization assay with probes specific for M. tuberculosis complex (pTub1), M. avium (pAvi3), M. intracellulare (pInt5 and pInt7), M. kansasii complex-M. scrofulaceum complex (pKan1), M. xenopi (pXen1), M. fortuitum (pFor1), M. smegmatis (pSme1), and Mycobacterium spp. (pMyc5a). The PCR assay can detect 10 fg of DNA, the equivalent of two mycobacteria. The specificities of the probes were tested with 108 mycobacterial strains (33 species) and 31 nonmycobacterial strains (of 17 genera). The probes pAvi3, pInt5, pInt7, pKan1, pXen1, and pMyc5a were specific. With probes pTub1, pFor1, and pSme1, slight cross hybridization occurred. However, the mycobacterial strains from which the cross-hybridizing PCR products were derived belonged to nonpathogenic or nonopportunistic species which do not occur in clinical samples. The test was used on 31 different clinical specimens obtained from patients suspected of having mycobacterial disease, including a patient with a double mycobacterial infection. The samples included sputum, bronchoalveolar lavage, tissue biopsy samples, cerebrospinal fluid, pus, peritoneal fluid, pleural fluid, and blood. The results of the PCR assay agreed with those of conventional identification methods or with clinical data, showing that the test can be used for the direct and rapid detection and identification of mycobacteria in clinical samples. PMID:8586707

  3. Choice of ICD-10 codes for the identification of acute coronary syndrome in the French hospitalization database.

    Science.gov (United States)

    Bezin, Julien; Girodet, Pierre-Olivier; Rambelomanana, Sahondra; Touya, Maëlys; Ferreira, Paul; Gilleron, Véronique; Robinson, Philip; Moore, Nicholas; Pariente, Antoine

    2015-12-01

    The objective of this study was to evaluate the performance of the ICD-10 (International Classification of Diseases and Related Health Problems, 10(th) Edition) coding in the French hospitalization database (PMSI) to identify acute coronary syndrome (ACS) occurrence. Eligible hospitalizations were those that occurred at the Bordeaux teaching hospitals between 1 January 2011 and 31 December 2011 and had one of the ICD-10 codes related to ischaemic heart diseases (I20 to I25, excluding I23 and I25.2). Among these, 100 hospitalizations were randomly selected; for each case, the ACS diagnosis was confirmed/excluded after medical file examination by an independent events validation committee and the performance of codes, and combinations of codes, to identify ACS was evaluated by calculating the positive predictive value (PPV). Of the individual codes, I20.0, I21 and I24 had the highest PPV; 100.0% for I24 (95%CI [15.8-100.0]); 90.0% for I21 (95%CI [76.3-97.2]); and 66.7% for I20.0 (95%CI [38.4-88.2]). The combination of I20.0 or I24 codes was able to identify 12 of the 56 validated ACS cases with a PPV of 70.6% (95%CI [44.0-89.7]), the combination of I21 or I24 identified 38 cases with a PPV of 90.5% (95%CI [77.4-97.3]), the combination of I20.0 or I21 identified 46 cases with a PPV of 83.6% (95%CI [71.2-92.2]), and the combination of I20.0, I21 or I24 identified 48 cases with a PPV of 84.2% (95%CI [72.1-92.5]). The combination of I20.0, I21 or I24 codes had the best performance to identify occurrence of ACS in the French hospitalization database. PMID:26301735

  4. Study and Redefining Beneficiary Participation in Process Of House Design

    Directory of Open Access Journals (Sweden)

    Monshizadeh Morteza

    2016-01-01

    Full Text Available Since housing has a special place in human life and his physical, psychological and interactions, so in addition the unity of humans, multiplicity and diversity of them must be considered. This possible only by beneficiary participation in the design process, but because society has different economic and social texture and classes; and settling suit because of the time and place of special indexes are entitled, so prepare a comprehensive model includes the testimony and circumstances; identify factors influencing participation optimum need to selection population and certain species of private construction. Standard tool to study topic does not exist, so in order to produce tools using qualitative research methods; interpretation - historical correlation to extract components and variables and their effects on each other and enjoyed target table Content consisting of four domains of general knowledge - specialized knowledge of participation - participation mechanisms and factors influencing participation achieved. Extracted factors are: the initial formation of partnership - partnership executive process - the role of participant - optimal participation; by study and analyze the theoretical model. Due to history and social aspects; cultural participation in Shiraz; promote scientific and participatory approach designed to make operating housing; bed and new horizons of development of facilities and areas in the design of residential environment created and due consultation and decision making in addition to beneficiary participation to promote optimum utility of space; mutual flexibility and utilization of space; increase fixation and motivation will lead beneficiary reside” and the main question: “how is the model of scientific position optimal participation planning instrument in private housing in the city of Shiraz, in the process of design, implementation and use”.

  5. 26 CFR 1.167(h)-1 - Life tenants and beneficiaries of trusts and estates.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Life tenants and beneficiaries of trusts and estates. 1.167(h)-1 Section 1.167(h)-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE... and Corporations § 1.167(h)-1 Life tenants and beneficiaries of trusts and estates. (a) Life...

  6. 42 CFR 405.1205 - Notifying beneficiaries of hospital discharge appeal rights.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Notifying beneficiaries of hospital discharge... Expedited Determinations and Reconsiderations of Provider Service Terminations, and Procedures for Inpatient Hospital Discharges § 405.1205 Notifying beneficiaries of hospital discharge appeal rights....

  7. 42 CFR 415.162 - Determining payment for physician services furnished to beneficiaries in teaching hospitals.

    Science.gov (United States)

    2010-10-01

    ... to beneficiaries is made by Medicare on the basis of reasonable cost if the hospital exercises the... organized medical staff of the teaching hospital or medical school as provided for in paragraph (d) of this... beneficiaries in a teaching hospital are payable as provider services on a reasonable-cost basis. (2)...

  8. The context dependence of beneficiary feedback effects on benefactors in plant facilitation.

    Science.gov (United States)

    Schöb, Christian; Callaway, Ragan M; Anthelme, Fabien; Brooker, Rob W; Cavieres, Lohengrin A; Kikvidze, Zaal; Lortie, Christopher J; Michalet, Richard; Pugnaire, Francisco I; Xiao, Sa; Cranston, Brittany H; García, Mary-Carolina; Hupp, Nicole R; Llambí, Luis D; Lingua, Emanuele; Reid, Anya M; Zhao, Liang; Butterfield, Bradley J

    2014-10-01

    Facilitative effects of some species on others are a major driver of biodiversity. These positive effects of a benefactor on its beneficiary can result in negative feedback effects of the beneficiary on the benefactor and reduced fitness of the benefactor. However, in contrast to the wealth of studies on facilitative effects in different environments, we know little about whether the feedback effects show predictable patterns of context dependence. We reanalyzed a global data set on alpine cushion plants, previously used to assess their positive effects on biodiversity and the nature of the beneficiary feedback effects, to specifically assess the context dependence of how small- and large-scale drivers alter the feedback effects of cushion-associated (beneficiary) species on their cushion benefactors using structural equation modelling. The effect of beneficiaries on cushions became negative when beneficiary diversity increased and facilitation was more intense. Local-scale biotic and climatic conditions mediated these community-scale processes, having indirect effects on the feedback effect. High-productivity sites demonstrated weaker negative feedback effects of beneficiaries on the benefactor. Our results indicate a limited impact of the beneficiary feedback effects on benefactor cushions, but strong context dependence. This context dependence may help to explain the ecological and evolutionary persistence of this widespread facilitative system. PMID:24985245

  9. Self-Reported Cancer Screening among Elderly Medicare Beneficiaries: A Rural-Urban Comparison

    Science.gov (United States)

    Fan, Lin; Mohile, Supriya; Zhang, Ning; Fiscella, Kevin; Noyes, Katia

    2012-01-01

    Purpose: We examined the rural-urban disparity of screening for breast cancer and colorectal cancer (CRC) among the elder Medicare beneficiaries and assessed rurality's independent impact on receipt of screening. Methods: Using 2005 Medicare Current Beneficiary Survey, we applied weighted logistic regression to estimate the overall rural-urban…

  10. 42 CFR 489.42 - Payment of offset amounts to beneficiary or other person.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Payment of offset amounts to beneficiary or other person. 489.42 Section 489.42 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... APPROVAL Handling of Incorrect Collections § 489.42 Payment of offset amounts to beneficiary or...

  11. 42 CFR 409.42 - Beneficiary qualifications for coverage of services.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Beneficiary qualifications for coverage of services. 409.42 Section 409.42 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND... Insurance § 409.42 Beneficiary qualifications for coverage of services. To qualify for Medicare coverage...

  12. A multisite randomized controlled trial on time to self-support among sickness absence beneficiaries

    DEFF Research Database (Denmark)

    Nielsen, Maj Britt D.; Vinsløv Hansen, Jørgen; Aust, Birgit;

    2015-01-01

    sickness absence beneficiaries at high risk for exclusion from the labour market. The aim of this article was to evaluate the effectiveness of the RTW programme on self-support. METHODS: Beneficiaries from three municipalities (denoted M1, M2 and M3) participated in a randomized controlled trial. We...

  13. 26 CFR 1.668(b)-4A - Information requirements with respect to beneficiary.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Information requirements with respect to... respect to beneficiary. (a) Information to be supplied by beneficiary—(1) In general. The beneficiary must... with respect to a prior taxable year (see § 1.668(b)-3A(c)), he must furnish all the information...

  14. 26 CFR 1.669(c)-3A - Information requirements with respect to beneficiary.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Information requirements with respect to beneficiary. 1.669(c)-3A Section 1.669(c)-3A Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE... respect to beneficiary. (a) Information to be supplied by beneficiary—(1) Use of exact method....

  15. Are Consumer-Directed Home Care Beneficiaries Satisfied? Evidence from Washington State

    Science.gov (United States)

    Wiener, Joshua M.; Anderson, Wayne L.; Khatutsky, Galina

    2007-01-01

    Purpose: This study analyzed the effect of consumer-directed versus agency-directed home care on satisfaction with paid personal assistance services among Medicaid beneficiaries in Washington State. Design and Methods: The study analyzed a survey of 513 Medicaid beneficiaries receiving home- and community-based services. As part of a larger study,…

  16. Identification of non-coding RNAs with a new composite feature in the Hybrid Random Forest Ensemble algorithm

    OpenAIRE

    Lertampaiporn, Supatcha; Thammarongtham, Chinae; Nukoolkit, Chakarida; Kaewkamnerdpong, Boonserm; Ruengjitchatchawalya, Marasri

    2014-01-01

    To identify non-coding RNA (ncRNA) signals within genomic regions, a classification tool was developed based on a hybrid random forest (RF) with a logistic regression model to efficiently discriminate short ncRNA sequences as well as long complex ncRNA sequences. This RF-based classifier was trained on a well-balanced dataset with a discriminative set of features and achieved an accuracy, sensitivity and specificity of 92.11%, 90.7% and 93.5%, respectively. The selected feature set includes a...

  17. Associations Between Vitamin D Level and Hospitalizations With and Without an Infection in a National Cohort of Medicare Beneficiaries.

    Science.gov (United States)

    Kempker, Jordan A; Magee, Matthew J; Cegielski, J Peter; Martin, Greg S

    2016-05-15

    Research has implicated low 25-hydroxyvitamin D (25(OH)D) level as a risk factor for infection; however, results have not been consistent. To further determine the nature of this relationship, we conducted a cohort study using Medicare beneficiaries participating in the 2001-2002 and 2003-2004 cycles of the National Health and Nutrition Examination Survey with data individually linked to hospital records from the Centers for Medicare and Medicaid Services. The primary exposure was a 25(OH)D level of ng/mL versus ≥15 ng/mL. The outcomes were a hospitalization with or without an infection within 1 year of participation in the National Health and Nutrition Examination Survey, as determined from the final hospital discharge codes (International Classification of Diseases, Ninth Revision, Clinical Modification). Of 1,713 individuals, 348 had a baseline serum 25(OH)D level of ng/mL, 77 experienced a hospitalization with an infection, and 287 experienced a hospitalization without an infection. In multivariable analyses, a serum 25(OH)D level of ng/mL was associated with a higher risk of hospitalization with an infection (risk ratio = 2.8, 95% confidence interval: 1.3, 5.9, P ng/mL and a higher subsequent risk for hospitalization with an infection among Medicare beneficiaries. PMID:27189328

  18. 20 CFR 411.610 - When should a beneficiary receive information on the procedures for resolving disputes?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When should a beneficiary receive information on the procedures for resolving disputes? 411.610 Section 411.610 Employees' Benefits SOCIAL SECURITY... Between Beneficiaries and Employment Networks § 411.610 When should a beneficiary receive information...

  19. Mobile, hybrid Compton/coded aperture imaging for detection, identification and localization of gamma-ray sources at stand-off distances

    Science.gov (United States)

    Tornga, Shawn R.

    The Stand-off Radiation Detection System (SORDS) program is an Advanced Technology Demonstration (ATD) project through the Department of Homeland Security's Domestic Nuclear Detection Office (DNDO) with the goal of detection, identification and localization of weak radiological sources in the presence of large dynamic backgrounds. The Raytheon-SORDS Tri-Modal Imager (TMI) is a mobile truck-based, hybrid gamma-ray imaging system able to quickly detect, identify and localize, radiation sources at standoff distances through improved sensitivity while minimizing the false alarm rate. Reconstruction of gamma-ray sources is performed using a combination of two imaging modalities; coded aperture and Compton scatter imaging. The TMI consists of 35 sodium iodide (NaI) crystals 5x5x2 in3 each, arranged in a random coded aperture mask array (CA), followed by 30 position sensitive NaI bars each 24x2.5x3 in3 called the detection array (DA). The CA array acts as both a coded aperture mask and scattering detector for Compton events. The large-area DA array acts as a collection detector for both Compton scattered events and coded aperture events. In this thesis, developed coded aperture, Compton and hybrid imaging algorithms will be described along with their performance. It will be shown that multiple imaging modalities can be fused to improve detection sensitivity over a broader energy range than either alone. Since the TMI is a moving system, peripheral data, such as a Global Positioning System (GPS) and Inertial Navigation System (INS) must also be incorporated. A method of adapting static imaging algorithms to a moving platform has been developed. Also, algorithms were developed in parallel with detector hardware, through the use of extensive simulations performed with the Geometry and Tracking Toolkit v4 (GEANT4). Simulations have been well validated against measured data. Results of image reconstruction algorithms at various speeds and distances will be presented as well as

  20. cDNA sequence of human transforming gene hst and identification of the coding sequence required for transforming activity

    International Nuclear Information System (INIS)

    The hst gene was originally identified as a transforming gene in DNAs from human stomach cancers and from a noncancerous portion of stomach mucosa by DNA-mediated transfection assay using NIH3T3 cells. cDNA clones of hst were isolated from the cDNA library constructed from poly(A)+ RNA of a secondary transformant induced by the DNA from a stomach cancer. The sequence analysis of the hst cDNA revealed the presence of two open reading frames. When this cDNA was inserted into an expression vector containing the simian virus 40 promoter, it efficiently induced the transformation of NIH3T3 cells upon transfection. It was found that one of the reading frames, which coded for 206 amino acids, was responsible for the transforming activity

  1. lncRNA-MFDL: identification of human long non-coding RNAs by fusing multiple features and using deep learning.

    Science.gov (United States)

    Fan, Xiao-Nan; Zhang, Shao-Wu

    2015-03-01

    Long noncoding RNAs (lncRNAs) are emerging as a novel class of noncoding RNAs and potent gene regulators, which play an important and varied role in cellular functions. lncRNAs are closely related with the occurrence and development of some diseases. High-throughput RNA-sequencing techniques combined with de novo assembly have identified a large number of novel transcripts. The discovery of large and 'hidden' transcriptomes urgently requires the development of effective computational methods that can rapidly distinguish between coding and long noncoding RNAs. In this study, we developed a powerful predictor (named as lncRNA-MFDL) to identify lncRNAs by fusing multiple features of the open reading frame, k-mer, the secondary structure and the most-like coding domain sequence and using deep learning classification algorithms. Using the same human training dataset and a 10-fold cross validation test, lncRNA-MFDL can achieve 97.1% prediction accuracy which is 5.7, 3.7, and 3.4% higher than that of CPC, CNCI and lncRNA-FMFSVM predictors, respectively. Compared with CPC and CNCI predictors in other species (e.g., anole lizard, zebrafish, chicken, gorilla, macaque, mouse, lamprey, orangutan, xenopus and C. elegans) testing datasets, the new lncRNA-MFDL predictor is also much more effective and robust. These results show that lncRNA-MFDL is a powerful tool for identifying lncRNAs. The lncRNA-MFDL software package is freely available at for academic users. PMID:25588719

  2. Perceptions of Usefulness: Using the Holland Code Theory, Multiple Intelligences Theory, and Role Model Identification to Determine a Career Niche in the Fashion Industry for First-Quarter Fashion Students

    Science.gov (United States)

    Green, Crystal D.

    2010-01-01

    This action research study investigated the perceptions that student participants had on the development of a career exploration model and a career exploration project. The Holland code theory was the primary assessment used for this research study, in addition to the Multiple Intelligences theory and the identification of a role model for the…

  3. Factors Associated with Preoperative Magnetic Resonance Imaging Use among Medicare Beneficiaries with Nonmetastatic Breast Cancer.

    Science.gov (United States)

    Henderson, Louise M; Weiss, Julie; Hubbard, Rebecca A; O'Donoghue, Cristina; DeMartini, Wendy B; Buist, Diana S M; Kerlikowske, Karla; Goodrich, Martha; Virnig, Beth; Tosteson, Anna N A; Lehman, Constance D; Onega, Tracy

    2016-01-01

    Preoperative breast magnetic resonance imaging (MRI) use among Medicare beneficiaries with breast cancer has substantially increased from 2005 to 2009. We sought to identify factors associated with preoperative breast MRI use among women diagnosed with ductal carcinoma in situ (DCIS) or stage I-III invasive breast cancer (IBC). Using Surveillance, Epidemiology, and End Results and Medicare data from 2005 to 2009 we identified women ages 66 and older with DCIS or stage I-III IBC who underwent breast-conserving surgery or mastectomy. We compared preoperative breast MRI use by patient, tumor and hospital characteristics stratified by DCIS and IBC using multivariable logistic regression. From 2005 to 2009, preoperative breast MRI use increased from 5.9% to 22.4% of women diagnosed with DCIS and 7.0% to 24.3% of women diagnosed with IBC. Preoperative breast MRI use was more common among women who were younger, married, lived in higher median income zip codes and had no comorbidities. Among women with IBC, those with lobular disease, smaller tumors (2 cm). The likelihood of receiving preoperative breast MRI is similar for women diagnosed with DCIS and IBC. Use of MRI is more common in women with IBC for tumors that are lobular and smaller while for DCIS MRI is used for evaluation of larger lesions. PMID:26511204

  4. Systematic identification of non-coding RNA 2,2,7-trimethylguanosine cap structures in Caenorhabditis elegans

    Directory of Open Access Journals (Sweden)

    Skogerbø Geir

    2007-09-01

    Full Text Available Abstract Background The 2,2,7-trimethylguanosine (TMG cap structure is an important functional characteristic of ncRNAs with critical cellular roles, such as some snRNAs. Here we used immunoprecipitation with both K121 and R1131 anti-TMG antibodies to systematically identify the TMG cap structures for all presently characterized ncRNAs in C. elegans. Results The two anti-TMG antibodies precipitated a similar group of the C. elegans ncRNAs. All snRNAs known to have a TMG cap structure were found in the precipitate, indicating that our identification system was efficient. Other ncRNA families related to splicing, such as SL RNAs and Sm Y RNAs, were also found in the precipitate, as were 7 C/D box snoRNAs. Further analysis showed that the SL RNAs and the Sm Y RNAs shared a very similar Sm binding site element (AAU4–5GGA, which sequence composition differed somewhat from those of other U snRNAs. There were also 16 ncRNAs without an Sm binding site element in the precipitate, suggesting that for these ncRNAs, TMG formation may occur independently of Sm proteins. Conclusion Our results showed that most ncRNAs predicted to be transcribed by RNA polymerase II had a TMG cap, while those predicted to be transcribed by RNA plymerase III or located in introns did not have a TMG cap structure. Compared to ncRNAs without a TMG cap, TMG-capped ncRNAs tended to have higher expression levels. Five functionally non-annotated ncRNAs also have a TMG cap structure, which might be helpful for identifying the cellular roles of these ncRNAs.

  5. Health care utilization and expenditures among Medicaid beneficiaries with neuropathic pain following spinal cord injury

    Directory of Open Access Journals (Sweden)

    Margolis JM

    2014-07-01

    Full Text Available Jay M Margolis,1 Paul Juneau,1 Alesia Sadosky,2 Joseph C Cappelleri,3 Thomas N Bryce,4 Edward C Nieshoff5 1Truven Health Analytics, Bethesda, MD, USA; 2Pfizer Inc., New York, NY, USA; 3Pfizer Inc., Groton, CT, USA; 4Department of Rehabilitation Medicine, The Icahn School of Medicine at Mount Sinai, New York, NY, USA; 5Department of Physical Medicine and Rehabilitation, Wayne State University School of Medicine, Detroit, MI, USA Background: The study aimed to evaluate health care resource utilization (HRU and costs for neuropathic pain (NeP secondary to spinal cord injury (SCI among Medicaid beneficiaries. Methods: The retrospective longitudinal cohort study used Medicaid beneficiary claims with SCI and evidence of NeP (SCI-NeP cohort matched with a cohort without NeP (SCI-only cohort. Patients had continuous Medicaid eligibility 6 months pre- and 12 months postindex, defined by either a diagnosis of central NeP (ICD-9-CM code 338.0x or a pharmacy claim for an NeP-related antiepileptic or antidepressant drug within 12 months following first SCI diagnosis. Demographics, clinical characteristics, HRU, and expenditures were compared between cohorts. Results: Propensity score-matched cohorts each consisted of 546 patients. Postindex percentages of patients with physician office visits, emergency department visits, SCI- and pain-related procedures, and outpatient prescription utilization were all significantly higher for SCI-NeP (P<0.001. Using regression models to account for covariates, adjusted mean expenditures were US$47,518 for SCI-NeP and US$30,150 for SCI only, yielding incremental costs of US$17,369 (95% confidence interval US$9,753 to US$26,555 for SCI-NeP. Factors significantly associated with increased cost included SCI type, trauma-related SCI, and comorbidity burden. Conclusion: Significantly higher HRU and total costs were incurred by Medicaid patients with NeP secondary to SCI compared with matched SCI-only patients. Keywords: spinal

  6. Identification of novel non-coding RNAs using profiles of short sequence reads from next generation sequencing data

    Directory of Open Access Journals (Sweden)

    Makunin Igor V

    2010-02-01

    Full Text Available Abstract Background The increasing interest in small non-coding RNAs (ncRNAs such as microRNAs (miRNAs, small interfering RNAs (siRNAs and Piwi-interacting RNAs (piRNAs and recent advances in sequencing technology have yielded large numbers of short (18-32 nt RNA sequences from different organisms, some of which are derived from small nucleolar RNAs (snoRNAs and transfer RNAs (tRNAs. We observed that these short ncRNAs frequently cover the entire length of annotated snoRNAs or tRNAs, which suggests that other loci specifying similar ncRNAs can be identified by clusters of short RNA sequences. Results We combined publicly available datasets of tens of millions of short RNA sequence tags from Drosophila melanogaster, and mapped them to the Drosophila genome. Approximately 6 million perfectly mapping sequence tags were then assembled into 521,302 tag-contigs (TCs based on tag overlap. Most transposon-derived sequences, exons and annotated miRNAs, tRNAs and snoRNAs are detected by TCs, which show distinct patterns of length and tag-depth for different categories. The typical length and tag-depth of snoRNA-derived TCs was used to predict 7 previously unrecognized box H/ACA and 26 box C/D snoRNA candidates. We also identified one snRNA candidate and 86 loci with a high number of tags that are yet to be annotated, 7 of which have a particular 18mer motif and are located in introns of genes involved in development. A subset of new snoRNA candidates and putative ncRNA candidates was verified by Northern blot. Conclusions In this study, we have introduced a new approach to identify new members of known classes of ncRNAs based on the features of TCs corresponding to known ncRNAs. A large number of the identified TCs are yet to be examined experimentally suggesting that many more novel ncRNAs remain to be discovered.

  7. 77 FR 43496 - Regulations Regarding Income-Related Monthly Adjustment Amounts to Medicare Beneficiaries...

    Science.gov (United States)

    2012-07-25

    ... Medicare Beneficiaries' Prescription Drug Coverage Premiums AGENCY: Social Security Administration. ACTION... Security Programs, Social Security Administration, 2-R-24 Operations Building, 6401 Security Boulevard... to a workable Social Security Administration (SSA) process to establish that an...

  8. 75 FR 75884 - Regulations Regarding Income-Related Monthly Adjustment Amounts to Medicare Beneficiaries...

    Science.gov (United States)

    2010-12-07

    ... Medicare Beneficiaries' Prescription Drug Coverage Premiums AGENCY: Social Security Administration. ACTION...) 966-2830. 3. Mail: Mail your comments to the Office of Regulations, Social Security Administration... INFORMATION CONTACT: Craig Streett, Office of Income Security Programs, Social Security Administration,...

  9. The Work Incentives Planning and Assistance Program Promoting Employment Among Social Security Disability Beneficiaries

    OpenAIRE

    Jody Schimmel; Bonnie O'Day; Allison Roche

    2012-01-01

    This issue brief summarizes findings from the Work Incentives Planning and Assistance program, a Social Security Administration program to promote employment by providing beneficiaries with information about federal work supports.

  10. Medicare hospital spending per patient (Medicare Spending per Beneficiary) – Additional Decimal Places

    Data.gov (United States)

    U.S. Department of Health & Human Services — The "Medicare hospital spending per patient (Medicare Spending per Beneficiary)" measure shows whether Medicare spends more, less or about the same per Medicare...

  11. 78 FR 53507 - Agency Information Collection (Beneficiary Travel Mileage Reimbursement Application Form...

    Science.gov (United States)

    2013-08-29

    ... for the beneficiary travel mileage reimbursement benefit in an efficient, convenient and accurate... Under OMB Review AGENCY: Veterans Health Administration, Department of Veterans Affairs. ACTION: Notice... announces that the Veterans Health Administration (VHA), Department of Veterans Affairs, will submit...

  12. 78 FR 36035 - Proposed Information Collection Activity: [Beneficiary Travel Mileage Reimbursement Application...

    Science.gov (United States)

    2013-06-14

    ... beneficiary travel mileage reimbursement benefit in an efficient, convenient and accurate manner. VHA must... Form]; Comment Request AGENCY: Veterans Health Administration, Department of Veterans Affairs. ACTION: Notice. SUMMARY: The Veterans Health Administration (VHA) is announcing an opportunity for public...

  13. How Many Disability Beneficiaries Forgo Cash Benefits Because of Work? Evidence from a New Measure.

    OpenAIRE

    Jody Schimmel; David Stapleton

    2012-01-01

    This issue brief summarizes findings from a longer report by Mathematica's disability experts, who used a new indicator to determine how many beneficiaries receiving Social Security Disability Insurance and Supplemental Security Income forgo cash benefits because of work.

  14. Reactor inlet header critical break identification and analysis for KAPP-3 and 4 using computer code RELAP-5/Mod.3.2

    International Nuclear Information System (INIS)

    Kakrapar Atomic Power Project units-3 and 4 (KAPP-3 and 4) are 700 MWe Pressurized Heavy Water Reactors (PHWR) are presently under construction. This paper presents the identification of critical break in Reactor Inlet Header and its analysis performed, for KAPP-3 and 4 as a part of safety studies to investigate the plant behavior. The limiting/critical break size at Reactor Inlet Header is identified by considering the peak sheath temperature during the Loss of coolant accident. System thermal hydraulics code RELAP-5/MOD3.2 has been used for the analysis. Here the overall thermal hydraulics of the plant along with various control systems, trip and actuation logics have been simulated. High pressure accumulators and low pressure recirculation system of emergency core cooling system are modeled. The modeling of secondary system includes modeling of Atmospheric Steam Discharge Valves (ASDVs), Safety Relief Valves (SRVs), Condensate Steam Discharge Valves (CSDVs), and Governor Valves, the U-tubes of the steam generator, the riser, the separator and the steam drum. Using this model, critical break size in the Reactor Outlet Header was identified and consequence of the event on maximum peak clad temperature and core parameters were evaluated. Following postulated accidents, the event progression and the variations of different parameters like different Header pressures, mass flow rate in the core, fuel clad temperature and rate of discharge from break etc have been studied. (author)

  15. Designing health insurance information for the Medicare beneficiary: a policy synthesis.

    OpenAIRE

    Davidson, B N

    1988-01-01

    Can Medicare beneficiaries make rational and informed decisions about their coverage under the Medicare program? Recent policy developments in the Medicare program have been based on the theory of competition in medical care. One of the key assumptions of the competitive model is the free flow of adequate information, enabling the consumer to make an informed choice from among the various sellers of a particular product. Options for Medicare beneficiaries in supplementing their basic Medicare...

  16. Reducing Cancer Screening Disparities in Medicare Beneficiaries Through Cancer Patient Navigation

    OpenAIRE

    Braun, Kathryn L; Thomas, William L.; Domingo, Jermy-Leigh B.; Allison, Amanda L; Ponce, Avette; Kamakana, P. Haunani; Brazzel, Sandra S.; Aluli, N. Emmett; Tsark, JoAnn U.

    2015-01-01

    Significant racial disparities in cancer mortality are seen between Medicare beneficiaries. A randomized controlled trial tested the use of lay navigators (care managers) to increase cancer screening of Asian and Pacific Islander Medicare beneficiaries. The study setting was Moloka‘i General Hospital on the island of Moloka‘i, Hawai‘i, which was one of six sites participating in the Cancer Prevention and Treatment Demonstration sponsored by the Centers for Medicare and Medicaid Services. Betw...

  17. Out-of-pocket health spending by poor and near-poor elderly Medicare beneficiaries.

    OpenAIRE

    Gross, D. J.; Alecxih, L; Gibson, M J; Corea, J; Caplan, C; Brangan, N

    1999-01-01

    OBJECTIVE: To estimate out-of-pocket health care spending by lower-income Medicare beneficiaries, and to examine spending variations between those who receive Medicaid assistance and those who do not receive such aid. DATA SOURCES AND COLLECTION: 1993 Medicare Current Beneficiary Survey (MCBS) Cost and Use files, supplemented with data from the Bureau of the Census (Current Population Survey); the Congressional Budget Office; the Health Care Financing Administration, Office of the Actuary (Na...

  18. Site investigation SFR. Rock type coding, overview geological mapping and identification of rock units and possible deformation zones in drill cores from the construction of SFR

    Energy Technology Data Exchange (ETDEWEB)

    Petersson, Jesper (Vattenfall Power Consultant AB, Stockholm (Sweden)); Curtis, Philip; Bockgaard, Niclas (Golder Associates AB (Sweden)); Mattsson, Haakan (GeoVista AB, Luleaa (Sweden))

    2011-01-15

    This report presents the rock type coding, overview lithological mapping and identification of rock units and possible deformation zones in drill cores from 32 boreholes associated with the construction of SFR. This work can be seen as complementary to single-hole interpretations of other older SFR boreholes earlier reported in /Petersson and Andersson 2010/: KFR04, KFR08, KFR09, KFR13, KFR35, KFR36, KFR54, KFR55, KFR7A, KFR7B and KFR7C. Due to deficiencies in the available material, the necessary activities have deviated somewhat from the established methodologies used during the recent Forsmark site investigations for the final repository for spent nuclear fuel. The aim of the current work has been, wherever possible, to allow the incorporation of all relevant material from older boreholes in the ongoing SFR geological modelling work in spite of the deficiencies. The activities include: - Rock type coding of the original geological mapping according to the nomenclature used during the preceding Forsmark site investigation. As part of the Forsmark site investigation such rock type coding has already been performed on most of the old SFR boreholes if the original geological mapping results were available. This earlier work has been complemented by rock type coding on two further boreholes: KFR01 and KFR02. - Lithological overview mapping, including documentation of (1) rock types, (2) ductile and brittle-ductile deformation and (3) alteration for drill cores from eleven of the boreholes for which no original geological borehole mapping was available (KFR31, KFR32, KFR34, KFR37,KFR38, KFR51, KFR69, KFR70, KFR71, KFR72 and KFR89). - Identification of possible deformation zones and merging of similar rock types into rock units. This follows SKB's established criteria and methodology of the geological Single-hole interpretation (SHI) process wherever possible. Deviations from the standard SHI process are associated with the lack of data, for example BIPS images

  19. THE PROTECTION OF CONTRADICTORY IN THE BRAZILIAN NEW CIVIL PROCEDURE CODE: THE PROHIBITION OF “SUPRISE DECISIONS”; CONDITION TO THE EXTENSION OF THE OBJECTIVE LIMITS OF “RES JUDICATA”; IDENTIFICATION OF UNMOTIVATED DECISIONS.

    Directory of Open Access Journals (Sweden)

    Paulo Henrique dos Santos Lucon

    2016-06-01

    Full Text Available This article aims to analyze different kinds of judicial protection to the contradictory principle in the new Civil Procedure Code. As a procedural fundamental right, contradictory demands real application by judges and legislators. The new Civil Procedure Code ruled the theme properly, which can be identified by the prohibition of “suprise decisions”; the prevision of contradictory as a condition to the extension of the objective limits of “res judicata” to the so called “prejudicial questions” and the identification of unmotivated decisions

  20. 20 CFR 411.400 - Can an EN to which a beneficiary's ticket is assigned refer the beneficiary to a State VR agency...

    Science.gov (United States)

    2010-04-01

    ...' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM State Vocational Rehabilitation Agencies' Participation Referrals by Employment Networks to State Vr Agencies § 411.400 Can an EN... beneficiary to the State VR agency for services. Agreements Between Employment Networks and State VR Agencies...

  1. Factors influencing Poverty Alleviation among Women Credit Beneficiaries in Tanzania: A Case Study of FINCA’s Women Credit beneficiaries in Mwanza

    Directory of Open Access Journals (Sweden)

    Samuel Nyambega Nyang’au

    2014-04-01

    Full Text Available Many credit schemes in Tanzania channel their funds to womenwith the objective of alleviating poverty among them. Despite this, majority ofwomen in the country continue to wallow in poverty. The present research wascarried out among the Foundation for International Community Assistance’s womencredit beneficiaries in Mwanza. The study set out to address the followingobjectives: to analyze the influence of the husband’s cooperation, relevanttraining and interest rate on poverty alleviation among women creditbeneficiaries in Tanzania taking Foundation for International CommunityAssistance in Mwanza as a case study. Using simple regression model, resultsshowed that cooperation from the husband as well as relevant training influencespoverty alleviation among women credit beneficiaries in Tanzania by 56 and 36percent respectively. But interest rate was found to have no significantinfluence at all. The paper recommends that seminars be conducted so thathusbands can be taught the importance of cooperating with their wives. Aboveall giving training to women credit beneficiaries will go a long way insharpening their business skills. Future researchers should research onlaziness and complacency among women credit beneficiaries and the influence onpoverty.

  2. Work while receiving disability insurance benefits: additional findings from the New Beneficiary Followup Survey.

    Science.gov (United States)

    Schechter, E S

    1997-01-01

    From the foregoing analyses, the following picture emerges about persons who work after award of DI benefits: Almost one-quarter of the sample population attempted to reenter the labor force in the 10-year NBS-NBF period. The higher the level of education, the greater the proportion of persons who worked. Younger beneficiaries were more likely to work than older beneficiaries. About half of the beneficiaries who worked did so on a full-time (40-hour-or-more per week) basis. Most beneficiaries worked because of financial need. The profile of reasons for working did not vary across demographic groups and aspects of the first job held. Most beneficiaries began working without attributing this decision to an improvement in their health. Individuals pursued different methods of job search. No single approach emerged as the most successful. Job search modes did not vary for different groups and different jobs. Four activities were most likely to lead to job offers: persons checking where they had worked before, asking a friend, answering an ad, and following up a vocational rehabilitation lead. These findings were not conclusive because small numbers of persons engaged in these activities. Thirty percent of DI workers returned to their preentitlement employer. The beneficiaries' first postentitlement jobs had less exertion, fewer hours, and lower pay than did their job held prior to award. The likelihood of working was the same across a broad range of disabling health conditions. In terms of work return policy, formal work return programs aimed at young beneficiaries and those with higher levels of educational attainment would produce the greatest number of job placements. It appears that no targeting of programs is necessary along gender lines. The anomalous finding of an absence of the relationship between improvement in health and labor-force reentry requires further investigation. Any followup in this area of inquiry should plan to have the data collected close to

  3. Healthcare costs and utilization for Medicare beneficiaries with Alzheimer's

    Directory of Open Access Journals (Sweden)

    Kuo Tzu-Chun

    2008-05-01

    Full Text Available Abstract Background Alzheimer's disease (AD is a neurodegenerative disorder incurring significant social and economic costs. This study uses a US administrative claims database to evaluate the effect of AD on direct healthcare costs and utilization, and to identify the most common reasons for AD patients' emergency room (ER visits and inpatient admissions. Methods Demographically matched cohorts age 65 and over with comprehensive medical and pharmacy claims from the 2003–2004 MEDSTAT MarketScan® Medicare Supplemental and Coordination of Benefits (COB Database were examined: 1 25,109 individuals with an AD diagnosis or a filled prescription for an exclusively AD treatment; and 2 75,327 matched controls. Illness burden for each person was measured using Diagnostic Cost Groups (DCGs, a comprehensive morbidity assessment system. Cost distributions and reasons for ER visits and inpatient admissions in 2004 were compared for both cohorts. Regression was used to quantify the marginal contribution of AD to health care costs and utilization, and the most common reasons for ER and inpatient admissions, using DCGs to control for overall illness burden. Results Compared with controls, the AD cohort had more co-morbid medical conditions, higher overall illness burden, and higher but less variable costs ($13,936 s. $10,369; Coefficient of variation = 181 vs. 324. Significant excess utilization was attributed to AD for inpatient services, pharmacy, ER visits, and home health care (all p Conclusion Patients with AD have significantly more co-morbid medical conditions and higher healthcare costs and utilization than demographically-matched Medicare beneficiaries. Even after adjusting for differences in co-morbidity, AD patients incur excess ER visits and inpatient admissions.

  4. Variations Among Medicare Beneficiaries Living in Different Settings: Demographics, Health Status, and Service Use.

    Science.gov (United States)

    Degenholtz, Howard B; Park, Mijung; Kang, Yihuang; Nadash, Pamela

    2016-07-01

    Older people with complex health issues and needs for functional support are increasingly living in different types of residential care environments as alternatives to nursing homes. This study aims to compare the demographics and health-care expenditures of Medicare beneficiaries by the setting in which they live: nursing homes, residential care settings, and at home using data from the 2002 to 2010 Medicare Current Beneficiary Study (MCBS), a nationally representative survey of the Medicare population. All Medicare beneficiaries aged 65 years or older who participated in the fall MCBS interview (years 2002-2010) and were alive for the full year (N = 83,507) were included in the sample. We found that there is a gradient in health status, physical and cognitive functioning, and health-care use and spending across settings. Minority elderly are overrepresented in facilities and underrepresented in alternative living settings. PMID:26269562

  5. 20 CFR 411.635 - Can a beneficiary be represented in the dispute resolution process under the Ticket to Work program?

    Science.gov (United States)

    2010-04-01

    ... SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Ticket to Work Program Dispute Resolution Disputes Between Beneficiaries and Employment Networks § 411.635 Can a beneficiary...

  6. 20 CFR 411.625 - Can the beneficiary or the EN that is not a State VR agency request a review of the PM's...

    Science.gov (United States)

    2010-04-01

    ... SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Ticket to Work Program Dispute Resolution Disputes Between Beneficiaries and Employment Networks § 411.625 Can the beneficiary...

  7. 45 CFR 205.25 - Eligibility of supplemental security income beneficiaries for food stamps or surplus commodities.

    Science.gov (United States)

    2010-10-01

    ....25 Eligibility of supplemental security income beneficiaries for food stamps or surplus commodities... 45 Public Welfare 2 2010-10-01 2010-10-01 false Eligibility of supplemental security income beneficiaries for food stamps or surplus commodities. 205.25 Section 205.25 Public Welfare Regulations...

  8. 42 CFR 411.54 - Limitation on charges when a beneficiary has received a liability insurance payment or has a...

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Limitation on charges when a beneficiary has received a liability insurance payment or has a claim pending against a liability insurer. 411.54 Section... beneficiary has received a liability insurance payment or has a claim pending against a liability insurer....

  9. Time That Beneficiaries Spend Off the Rolls Due to Work and the Payments Generated for Employment Networks

    OpenAIRE

    David Stapleton; Jody Schimmel; Miriam Loewenberg; Sarah Prenovitz

    2010-01-01

    This report examines the extent to which Social Security Disability Insurance and Supplemental Security Income beneficiaries forgo benefits due to work (that is, were in non-payment status following suspension or termination because of earnings) from 2002 to 2006. The findings represent beneficiary experiences before the 2008 changes in the Ticket to Work regulations.

  10. The Impact of Changing Financial Work Incentives on the Earnings of Social Security Disability Insurance (SSDI) Beneficiaries

    Science.gov (United States)

    Weathers, Robert R., II; Hemmeter, Jeffrey

    2011-01-01

    SSDI beneficiaries lose their entire cash benefit if they perform work that is substantial gainful activity (SGA) after using Social Security work incentive programs. The complete loss of benefits might be a work disincentive for beneficiaries. We report results from a pilot project that replaces the complete loss of benefits with a gradual…

  11. Clinical coding. Code breakers.

    Science.gov (United States)

    Mathieson, Steve

    2005-02-24

    --The advent of payment by results has seen the role of the clinical coder pushed to the fore in England. --Examinations for a clinical coding qualification began in 1999. In 2004, approximately 200 people took the qualification. --Trusts are attracting people to the role by offering training from scratch or through modern apprenticeships. PMID:15768716

  12. 48 CFR 853.215-70 - VA Form 10-1170, Application for Furnishing Nursing Home Care to Beneficiaries of VA.

    Science.gov (United States)

    2010-10-01

    ..., Application for Furnishing Nursing Home Care to Beneficiaries of VA. 853.215-70 Section 853.215-70 Federal... 853.215-70 VA Form 10-1170, Application for Furnishing Nursing Home Care to Beneficiaries of VA. VA Form 10-1170, Application for Furnishing Nursing Home Care to Beneficiaries of VA, will be used...

  13. Permutation codes

    OpenAIRE

    Ericson, Thomas

    1993-01-01

    Slepians permutation codes are investigated in detail. In particular we optimize the initial vector and derive all dominating codes in dimension n 2 6. With the exception of the simplex and biorthogonal codes - which are always included as special cases of permutation codes - there are probably no further good codes in higher dimensions.

  14. Biometric Fingerprint System to Enable Rapid and Accurate Identification of Beneficiaries

    OpenAIRE

    Storisteanu, Daniel Matthew L; Norman, Toby L; Grigore, Alexandra; Norman, Tristram L

    2015-01-01

    Inability to uniquely identify clients impedes access to services and contributes to inefficiencies. Using a pocket-sized fingerprint scanner that wirelessly syncs with a health worker's smartphone, the SimPrints biometric system can link individuals' fingerprints to their health records. A pilot in Bangladesh will assess its potential.

  15. Transformation invariant sparse coding

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard

    2011-01-01

    Sparse coding is a well established principle for unsupervised learning. Traditionally, features are extracted in sparse coding in specific locations, however, often we would prefer invariant representation. This paper introduces a general transformation invariant sparse coding (TISC) model. The...... model decomposes images into features invariant to location and general transformation by a set of specified operators as well as a sparse coding matrix indicating where and to what degree in the original image these features are present. The TISC model is in general overcomplete and we therefore invoke...... sparse coding to estimate its parameters. We demonstrate how the model can correctly identify components of non-trivial artificial as well as real image data. Thus, the model is capable of reducing feature redundancies in terms of pre-specified transformations improving the component identification....

  16. Brassica genomics: a complement to, and early beneficiary of, the Arabidopsis sequence

    OpenAIRE

    Paterson, Andrew H.; Lan, Tien-Hung; Amasino, Richard; Osborn, Thomas C; Quiros, Carlos

    2001-01-01

    Those studying the genus Brassica will be among the early beneficiaries of the now-completed Arabidopsis sequence. The remarkable morphological diversity of Brassica species and their relatives offers valuable opportunities to advance our knowledge of plant growth and development, and our understanding of rapid phenotypic evolution.

  17. Returning Social Security Beneficiaries to the Work Force: A Proactive Disability Management Model.

    Science.gov (United States)

    Shrey, Donald E.; And Others

    1991-01-01

    Used multidisciplinary disability management model to assist Social Security Disability Insurance beneficiaries to return to work. The model, which emphasized multidisciplinary disability management, marketing and public relations, work incentives training, networking, and job-seeking skills training, facilitated 27 job placements out of the 107…

  18. 38 CFR 3.714 - Improved pension elections-public assistance beneficiaries.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Improved pension elections-public assistance beneficiaries. 3.714 Section 3.714 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUDICATION Pension, Compensation, and Dependency and Indemnity...

  19. 38 CFR 3.666 - Incarcerated beneficiaries and fugitive felons-pension.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Incarcerated beneficiaries and fugitive felons-pension. 3.666 Section 3.666 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUDICATION Pension, Compensation, and Dependency and Indemnity...

  20. 77 FR 14769 - Meeting of the Uniform Formulary Beneficiary Advisory Panel

    Science.gov (United States)

    2012-03-13

    ... Department of Defense (DoD) announces the following Federal Advisory Committee meeting of the Uniform... Formulary Beneficiary Advisory Panel, 4130 Stanley Road, Suite 208, Building 1000, San Antonio, TX 78234...: Dipeptidyl Peptidase--4(DPP-4) Inhibitors. d. Designated Newly Approved Drugs in Already-Reviewed Classes....

  1. 19 CFR 10.177 - Cost or value of materials produced in the beneficiary developing country.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Cost or value of materials produced in the beneficiary developing country. 10.177 Section 10.177 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION... RATE, ETC. General Provisions Generalized System of Preferences § 10.177 Cost or value of...

  2. 75 FR 5253 - Request for Information Regarding Lifetime Income Options for Participants and Beneficiaries in...

    Science.gov (United States)

    2010-02-02

    ... future retirement age based on the assumption of continued contributions? Should lifetime income payments... Regarding Lifetime Income Options for Participants and Beneficiaries in Retirement Plans AGENCY: Employee... ``Agencies'') are currently reviewing the rules under the Employee Retirement Income Security Act (ERISA)...

  3. 75 FR 8927 - Autism Services Demonstration Project for TRICARE Beneficiaries Under the Extended Care Health...

    Science.gov (United States)

    2010-02-26

    ... Notice in the Federal Register (FR) (72 FR 68130) of a TRICARE demonstration to increase access to IBI... of the Secretary Autism Services Demonstration Project for TRICARE Beneficiaries Under the Extended...: This notice provides a 2-year extension of the Department of Defense Enhanced Access to Autism...

  4. Disability Insurance Beneficiaries with Visual Impairments in Vocational Rehabilitation: Socio-Demographic Influences on Employment

    Science.gov (United States)

    Giesen, J. Martin; Cavenaugh, Brenda S.

    2013-01-01

    Introduction: Given mutual concerns of vocational rehabilitation and the Social Security Administration, our purpose was to evaluate the effect of current individual and economic factors on competitive employment for Social Security Disability Insurance (SSDI) beneficiaries with visual impairments in vocational rehabilitation. Methods: Using…

  5. 26 CFR 1.679-2 - Trusts treated as having a U.S. beneficiary.

    Science.gov (United States)

    2010-04-01

    ... by FTC, a foreign trust company. FTC forms IBC, an international business corporation formed under the laws of a foreign jurisdiction. IBC is the beneficiary of FT. IBC maintains an account with FB, a foreign bank. FB issues a debit card to B against the account maintained by IBC and B is allowed to...

  6. Improving the identification of people with dementia in primary care: evaluation of the impact of primary care dementia coding guidance on identified prevalence

    OpenAIRE

    Russell, Paul; Banerjee, Sube; Watt, Jen; Adleman, Rosalyn; Agoe, Belinda; Burnie, Nerida; Carefull, Alex; Chandan, Kiran; Constable, Dominie; Daniels, Mark; Davies, David; Deshmukh, Sid; Huddart, Martin; Jabin, Ashrafi; Jarrett, Penelope

    2013-01-01

    Objective Improving dementia care is a policy priority nationally and internationally; there is a ‘diagnosis gap’ with less than half of the cases of dementia ever diagnosed. The English Health Department's Quality and Outcomes Framework (QOF) encourages primary care recognition and recording of dementia. The codes for dementia are complex with the possibility of underidentification through miscoding. We developed guidance on coding of dementia; we report the impact of applying this to ‘clean...

  7. Identification and functional characterization of G6PC2 coding variants influencing glycemic traits define an effector transcript at the G6PC2-ABCB11 locus.

    Directory of Open Access Journals (Sweden)

    Anubha Mahajan

    2015-01-01

    Full Text Available Genome wide association studies (GWAS for fasting glucose (FG and insulin (FI have identified common variant signals which explain 4.8% and 1.2% of trait variance, respectively. It is hypothesized that low-frequency and rare variants could contribute substantially to unexplained genetic variance. To test this, we analyzed exome-array data from up to 33,231 non-diabetic individuals of European ancestry. We found exome-wide significant (P<5×10-7 evidence for two loci not previously highlighted by common variant GWAS: GLP1R (p.Ala316Thr, minor allele frequency (MAF=1.5% influencing FG levels, and URB2 (p.Glu594Val, MAF = 0.1% influencing FI levels. Coding variant associations can highlight potential effector genes at (non-coding GWAS signals. At the G6PC2/ABCB11 locus, we identified multiple coding variants in G6PC2 (p.Val219Leu, p.His177Tyr, and p.Tyr207Ser influencing FG levels, conditionally independent of each other and the non-coding GWAS signal. In vitro assays demonstrate that these associated coding alleles result in reduced protein abundance via proteasomal degradation, establishing G6PC2 as an effector gene at this locus. Reconciliation of single-variant associations and functional effects was only possible when haplotype phase was considered. In contrast to earlier reports suggesting that, paradoxically, glucose-raising alleles at this locus are protective against type 2 diabetes (T2D, the p.Val219Leu G6PC2 variant displayed a modest but directionally consistent association with T2D risk. Coding variant associations for glycemic traits in GWAS signals highlight PCSK1, RREB1, and ZHX3 as likely effector transcripts. These coding variant association signals do not have a major impact on the trait variance explained, but they do provide valuable biological insights.

  8. Phonological coding during reading.

    Science.gov (United States)

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. PMID:25150679

  9. Characteristics of Medicare Advantage and Fee-for-Service Beneficiaries Upon Enrollment in Medicare at Age 65.

    Science.gov (United States)

    Miller, Eric A; Decker, Sandra L; Parker, Jennifer D

    2016-01-01

    Previous research has found differences in characteristics of beneficiaries enrolled in Medicare fee-for-service versus Medicare Advantage (MA), but there has been limited research using more recent MA enrollment data. We used 1997-2005 National Health Interview Survey data linked to 2000-2009 Medicare enrollment data to compare characteristics of Medicare beneficiaries before their initial enrollment into Medicare fee-for-service or MA at age 65 and whether the characteristics of beneficiaries changed from 2006 to 2009 compared with 2000 to 2005. During this period of MA growth, the greatest increase in enrollment appears to have come from those with no chronic conditions and men. PMID:27232684

  10. Identification of Intermediate-Size Non-Coding RNAs Involved in the UV-Induced DNA Damage Response in C. elegans

    OpenAIRE

    Li, Aqian; Wei, Guifeng; Wang, Yunfei; Zhou, Ying; Zhang, Xian-En; Bi, Lijun; Chen, Runsheng

    2012-01-01

    Background A network of DNA damage response (DDR) mechanisms functions coordinately to maintain genome integrity and prevent disease. The Nucleotide Excision Repair (NER) pathway is known to function in the response to UV-induced DNA damage. Although numbers of coding genes and miRNAs have been identified and reported to participate in UV-induced DNA damage response (UV-DDR), the precise role of non-coding RNAs (ncRNAs) in UV-DDR remains largely unknown. Methodology/Principal Findings We used...

  11. Serotype identification and VP1 coding sequence analysis of foot-and-mouth disease virus from outbreaks in Eastern and Northern Uganda in 2008/9

    DEFF Research Database (Denmark)

    Kasambula, L.; Belsham, Graham; Siegismund, H. R.;

    2012-01-01

    regions, and the presence of FMDV RNA in these samples was determined using a standard diagnostic RT-PCR assay. From the total of 27 positive samples, the VP1 coding region was amplified and sequenced. Each of these sequences showed >99% identity to each other, and just five distinct sequences were...

  12. Identification of Bacterial Species Associated with the Sheep Scab Mite (Psoroptes ovis) by Using Amplified Genes Coding for 16S rRNA

    OpenAIRE

    Hogg, J.C.; Lehane, M. J.

    1999-01-01

    This was the first molecular study of the bacterial flora of the sheep scab mite (Psoroptes ovis). A sequence analysis of genes coding for 16S rRNA revealed that Serratia marcescens and bacteria closely related to Staphylococcus intermedius or Staphylococcus chromogens and Alloiococcus otitidis were present. These bacteria were associated with skin lesions, dermatitis, and otitis media caused by P. ovis.

  13. Review of current severe accident management approaches in Europe and identification of related modelling requirements for the computer code ASTEC V2.1

    Energy Technology Data Exchange (ETDEWEB)

    Hermsmeyer, S. [European Commission JRC, Petten (Netherlands). Inst. for Energy and Transport; Herranz, L.E.; Iglesias, R. [CIEMAT, Madrid (Spain); and others

    2015-07-15

    The severe accident at the Fukushima-Daiichi nuclear power plant (NPP) has led to a worldwide review of nuclear safety approaches and is bringing a refocussing of R and D in the field. To support these efforts several new Euratom FP7 projects have been launched. The CESAM project focuses on the improvement of the ASTEC computer code. ASTEC is jointly developed by IRSN and GRS and is considered as the European reference code for Severe Accident Analyses since it capitalizes knowledge from the extensive Euro-pean R and D in the field. The project aims at the code's enhancement and extension for use in Severe Accident Management (SAM) analysis of the NPPs of Generation II-III presently under operation or foreseen in the near future in Europe, spent fuel pools included. The work reported here is concerned with the importance, for the further development of the code, of SAM strategies to be simulated. To this end, SAM strategies applied in the EU have been compiled. This compilation is mainly based on the public information made available in the frame of the EU ''stress tests'' for NPPs and has been complemented by information pro-vided by the different CESAM partners. The context of SAM is explained and the strategies are presented. The modelling capabilities for the simulation of these strategies in the current production version 2.0 of ASTEC are discussed. Furthermore, the requirements for the next version of ASTEC V2.1 that is supported in the CESAM project are highlighted. They are a necessary complement to the list of code improvements that is drawn from consolidating new fields of application, like SFP and BWR model enhancements, and from new experimental results on severe accident phenomena.

  14. Review of current severe accident management approaches in Europe and identification of related modelling requirements for the computer code ASTEC V2.1

    International Nuclear Information System (INIS)

    The severe accident at the Fukushima-Daiichi nuclear power plant (NPP) has led to a worldwide review of nuclear safety approaches and is bringing a refocussing of R and D in the field. To support these efforts several new Euratom FP7 projects have been launched. The CESAM project focuses on the improvement of the ASTEC computer code. ASTEC is jointly developed by IRSN and GRS and is considered as the European reference code for Severe Accident Analyses since it capitalizes knowledge from the extensive Euro-pean R and D in the field. The project aims at the code's enhancement and extension for use in Severe Accident Management (SAM) analysis of the NPPs of Generation II-III presently under operation or foreseen in the near future in Europe, spent fuel pools included. The work reported here is concerned with the importance, for the further development of the code, of SAM strategies to be simulated. To this end, SAM strategies applied in the EU have been compiled. This compilation is mainly based on the public information made available in the frame of the EU ''stress tests'' for NPPs and has been complemented by information pro-vided by the different CESAM partners. The context of SAM is explained and the strategies are presented. The modelling capabilities for the simulation of these strategies in the current production version 2.0 of ASTEC are discussed. Furthermore, the requirements for the next version of ASTEC V2.1 that is supported in the CESAM project are highlighted. They are a necessary complement to the list of code improvements that is drawn from consolidating new fields of application, like SFP and BWR model enhancements, and from new experimental results on severe accident phenomena.

  15. Perception of beneficiaries towards adoption of e-money in the distribution of social assistance in Indonesia

    Directory of Open Access Journals (Sweden)

    Sartika Djamaluddin

    2016-04-01

    Full Text Available Wide access to formal finance for poor households through distribution of social assistance via electronic money (E-money is believed to accelerate eradication of poverty. We would like to find out the beneficiaries response to this payment method. This aims of this study is to investigate the perception of beneficiaries towards distribution of social assistance through e-money. We surveyed 230 beneficiaries in Jakarta, Cirebon and Pasuruan. The result of research indicates that the perception of PKH beneficiaries related to the cost, benefits and security of e-money is relatively good. However, from the aspect of ease of use and the respondents’ desire to use e-money, the perception is quite low. 

  16. Metal Emissions and Urban Incident Parkinson Disease: A Community Health Study of Medicare Beneficiaries by Using Geographic Information Systems

    OpenAIRE

    Willis, Allison W.; Evanoff, Bradley A.; Lian, Min; Galarza, Aiden; Wegrzyn, Andrew; Schootman, Mario; Racette, Brad A.

    2010-01-01

    Parkinson disease associated with farming and exposure to agricultural chemicals has been reported in numerous studies; little is known about Parkinson disease risk factors for those living in urban areas. The authors investigated the relation between copper, lead, or manganese emissions and Parkinson disease incidence in the urban United States, studying 29 million Medicare beneficiaries in the year 2003. Parkinson disease incidence was determined by using beneficiaries who had not changed r...

  17. The private health insurance choices of medicare beneficiaries: how much does price matter?

    Science.gov (United States)

    Rice, Thomas; Jacobson, Gretchen; Cubanski, Juliette; Neuman, Tricia

    2014-12-01

    This article presents, critiques, and analyzes the influence of prices on insurance choices made by Medicare beneficiaries in the Medicare Advantage, Part D, and Medigap markets. We define price as health insurance premiums for the Medicare Advantage and Medigap markets, and total out-of-pocket costs (including premiums and cost sharing) for the Part D market. In Medicare Advantage and Part D, prices only partly explain insurance choices. Enrollment decisions also may be influenced by other factors such as the perceived quality of the higher-premium plans, better provider networks, lower cost-sharing for services, more generous benefits, and a preference for certain brand-name products. In contrast, the one study available on the Medigap market concludes that price appears to be associated with plan selection. This may be because Medigap benefits are fully standardized, making it easier for beneficiaries to compare alternative policies. The article concludes by discussing policy options available to Medicare. PMID:25371217

  18. Work-Oriented Social Security Disability Beneficiaries: Characteristics and Employment-Related Activities.

    OpenAIRE

    Gina A. Livermore

    2009-01-01

    This brief discusses the characteristics of working-age individuals receiving Social Security disability benefits and describes their employment success. The findings suggest that beneficiaries fall into three broad groups based on work-related efforts and expectations. For 60 percent, gainful employment seems to be neither a plan nor an option. Of the 40 percent who are interested in working, about 20 percent are actively pursuing and achieving this goal.

  19. Return-to-Work Outcomes Among Social Security Disability Insurance Program Beneficiaries.

    OpenAIRE

    Yonatan Ben-Shalom; Arif Mamun

    2013-01-01

    This report follows a sample of working-age Social Security Disability Insurance program beneficiaries for five years after their first benefit award to learn how certain factors help or hinder achieving four important milestones: (1) first enrollment for employment services provided by a state vocational rehabilitation agency or employment network, (2) start of trial work period, (3) completion of trial work period, and (4) suspension or termination of benefits because of work. Younger benef...

  20. WorkOriented Social Security Disability Beneficiaries Characteristics and EmploymentRelated Activities

    OpenAIRE

    Gina A. Livermore

    2009-01-01

    This brief discusses the characteristics of working-age individuals receiving Social Security disability benefits and describes their employment success. The findings suggest that beneficiaries fall into three broad groups based on work-related efforts and expectations. For 60 percent, gainful employment seems to be neither a plan nor an option. Of the 40 percent who are interested in working, about 20 percent are actively pursuing and achieving this goal.

  1. Educational Development of NGO Beneficiaries in Bangladesh: A Disjunction between Programmes and Implementation

    OpenAIRE

    Mohammad Aktaruzzaman Khan; Md. Aminul Islam; Anees Janee Ali

    2014-01-01

    This study examines the relationship between NGO programmes and their clients’ educational development. NGOs play a very significant role with a view to achieving their development goal. Developing countries consider education as the key aspect for their socio-economic development. The study focuses on this perspective and asks the relationship between NGOs’ socio-economic and training programmes (by Kirkpatrick’s training taxonomy) and educational development of their beneficiaries. A quanti...

  2. The Effect of Medicaid Payment Generosity on Access and Use among Beneficiaries

    OpenAIRE

    Shen, Yu-Chu; Zuckerman, Stephen

    2005-01-01

    Objective: This study examines the effects of Medicaid payment generosity on access and care for adult and child Medicaid beneficiaries. Data Source: Three years of the National Surveys of America's Families (1997, 1999, 2002) are linked to the Urban Institute Medicaid capitation rate surveys, the Area Resource File, and the American Hospital Association survey files. Study Design: In order to identify the effect of payment generosity apart from unmeasured differences across areas, ...

  3. A prospective cohort study of long-term cognitive changes in older Medicare beneficiaries

    OpenAIRE

    Jones Michael P; Hockenberry Jason; Bentler Suzanne E; Wolinsky Fredric D; Weigel Paula A; Kaskie Brian; Wallace Robert B

    2011-01-01

    Abstract Background Promoting cognitive health and preventing its decline are longstanding public health goals, but long-term changes in cognitive function are not well-documented. Therefore, we first examined long-term changes in cognitive function among older Medicare beneficiaries in the Survey on Assets and Health Dynamics among the Oldest Old (AHEAD), and then we identified the risk factors associated with those changes in cognitive function. Methods We conducted a secondary analysis of ...

  4. GRADUATION DETERMINANTS OF PRODUCTIVE SAFETY NET PROGRAM BENEFICIARY HOUSEHOLDS: A LOGISTIC ANALYSIS, TIGRAI-ETHIOPIA

    OpenAIRE

    Yibrah Hagos Gebresilassie

    2013-01-01

    Household food security issues have become the concern of international communities as well as national government of Ethiopia. Social safety nets (like Productive Safety Net Program in Ethiopia) are programs that offer protection to poor rural people by providing income through transfer programs and employment opportunities. The main objective of this study was to identify the major graduation determinants of Productive safety Net Program beneficiary rural households using a logistic regress...

  5. Functional Limitations, Medication Support, and Responses to Drug Costs among Medicare Beneficiaries

    OpenAIRE

    Whaley, Christopher; Reed, Mary; Hsu, John; Fung, Vicki

    2015-01-01

    Objective: Standard Medicare Part D prescription drug benefits include substantial and complex cost-sharing. Many beneficiaries also have functional limitations that could affect self-care capabilities, including managing medications, but also have varying levels of social support to help with these activities. We examined the associations between drug cost responses, functional limitations, and social support. Data Sources and Study Setting We conducted telephone interviews in a stratified r...

  6. Functional Limitations, Medication Support, and Responses to Drug Costs among Medicare Beneficiaries

    OpenAIRE

    Whaley, Christopher; Reed, Mary; Hsu, John; Fung, Vicki

    2015-01-01

    Objective Standard Medicare Part D prescription drug benefits include substantial and complex cost-sharing. Many beneficiaries also have functional limitations that could affect self-care capabilities, including managing medications, but also have varying levels of social support to help with these activities. We examined the associations between drug cost responses, functional limitations, and social support. Data Sources and Study Setting We conducted telephone interviews in a stratified ra...

  7. Speech coding

    Science.gov (United States)

    Gersho, Allen

    1990-05-01

    Recent advances in algorithms and techniques for speech coding now permit high quality voice reproduction at remarkably low bit rates. The advent of powerful single-ship signal processors has made it cost effective to implement these new and sophisticated speech coding algorithms for many important applications in voice communication and storage. Some of the main ideas underlying the algorithms of major interest today are reviewed. The concept of removing redundancy by linear prediction is reviewed, first in the context of predictive quantization or DPCM. Then linear predictive coding, adaptive predictive coding, and vector quantization are discussed. The concepts of excitation coding via analysis-by-synthesis, vector sum excitation codebooks, and adaptive postfiltering are explained. The main idea of vector excitation coding (VXC) or code excited linear prediction (CELP) are presented. Finally low-delay VXC coding and phonetic segmentation for VXC are described.

  8. Use of MAAP code for identification of key plant vulnerabilities for the beyond design accidents and their mitigation at NPP Krsko

    International Nuclear Information System (INIS)

    NPP Krsko performed according to GL 88-20, Supplement 1-4 and RUJV requirement the Individual Plant Examination analyses. For the required deterministic analyses the MAAP 3.0B code was used. It was proven that such severe accident analysis can be used for evaluation of the overall level of safety improvement that can be gained with the different modifications and alternate design. In this paper one such important outcomes from these analyses will be presented. (author)

  9. Exceeding of Official Powers (Art. 286 of the Criminal Code of Russian Federation: Identification and Analysis of Signs of Object and Victim

    Directory of Open Access Journals (Sweden)

    Sergey D. Brazhnik

    2014-03-01

    Full Text Available In the present article authors defines attributes of object and victim in the framework of offense "abuse of power" (Article 286 of the Criminal Code of the Russian Federation and conduct comparative analysis. At the first place questions of what should be considered as object of crime in the Russian legal doctrine. Author believe that "vertical" objects are divided into general, intragenic, clan, group, specific and direct, "horizontal" - at primary, secondary and optional. Author carried out a comprehensive analysis of each object under consideration provisions of the Criminal Code of the Russian Federation. Authors give particular attention to the study of victims of this crime. According to authors, lack of the unified approach to this issue is largely generated by the procedural legislation. Author concludes that victims of the power abuse in the criminal law sense may be citizens (any individual, organizations (legal entities, irrespective of their legal form, society and the state. Based on the comprehensive analysis of legal acts, court practice and a wide range of scientific sources authors justify the appropriateness of amending Criminal Code of the Russian Federation.

  10. code {poems}

    Directory of Open Access Journals (Sweden)

    Ishac Bertran

    2012-08-01

    Full Text Available "Exploring the potential of code to communicate at the level of poetry," the code­ {poems} project solicited submissions from code­writers in response to the notion of a poem, written in a software language which is semantically valid. These selections reveal the inner workings, constitutive elements, and styles of both a particular software and its authors.

  11. Dynamic Frameproof Codes

    OpenAIRE

    Paterson, Maura

    2006-01-01

    There are many schemes in the literature for protecting digital data from piracy by the use of digital fingerprinting, such as frameproof codes, which prevent traitorous users from colluding to frame an innocent user, and traitor-tracing schemes, which enable the identification of users involved in piracy. The concept of traitor tracing has been applied to a digital broadcast setting in the form of dynamic traitor-tracing schemes and sequential traitor-tracing schemes, wh...

  12. Low-pass shotgun sequencing of the barley genome facilitates rapid identification of genes, conserved non-coding sequences and novel repeats

    Directory of Open Access Journals (Sweden)

    Graner Andreas

    2008-10-01

    Full Text Available Abstract Background Barley has one of the largest and most complex genomes of all economically important food crops. The rise of new short read sequencing technologies such as Illumina/Solexa permits such large genomes to be effectively sampled at relatively low cost. Based on the corresponding sequence reads a Mathematically Defined Repeat (MDR index can be generated to map repetitive regions in genomic sequences. Results We have generated 574 Mbp of Illumina/Solexa sequences from barley total genomic DNA, representing about 10% of a genome equivalent. From these sequences we generated an MDR index which was then used to identify and mark repetitive regions in the barley genome. Comparison of the MDR plots with expert repeat annotation drawing on the information already available for known repetitive elements revealed a significant correspondence between the two methods. MDR-based annotation allowed for the identification of dozens of novel repeat sequences, though, which were not recognised by hand-annotation. The MDR data was also used to identify gene-containing regions by masking of repetitive sequences in eight de-novo sequenced bacterial artificial chromosome (BAC clones. For half of the identified candidate gene islands indeed gene sequences could be identified. MDR data were only of limited use, when mapped on genomic sequences from the closely related species Triticum monococcum as only a fraction of the repetitive sequences was recognised. Conclusion An MDR index for barley, which was obtained by whole-genome Illumina/Solexa sequencing, proved as efficient in repeat identification as manual expert annotation. Circumventing the labour-intensive step of producing a specific repeat library for expert annotation, an MDR index provides an elegant and efficient resource for the identification of repetitive and low-copy (i.e. potentially gene-containing sequences regions in uncharacterised genomic sequences. The restriction that a particular

  13. Patient-Centered Medical Home Features and Health Care Expenditures of Medicare Beneficiaries with Chronic Disease Dyads.

    Science.gov (United States)

    Philpot, Lindsey M; Stockbridge, Erica L; Padrón, Norma A; Pagán, José A

    2016-06-01

    Three out of 4 Medicare beneficiaries have multiple chronic conditions, and managing the care of this growing population can be complex and costly because of care coordination challenges. This study assesses how different elements of the patient-centered medical home (PCMH) model may impact the health care expenditures of Medicare beneficiaries with the most prevalent chronic disease dyads (ie, co-occurring high cholesterol and high blood pressure, high cholesterol and heart disease, high cholesterol and diabetes, high cholesterol and arthritis, heart disease and high blood pressure). Data from the 2007-2011 Medical Expenditure Panel Survey suggest that increased access to PCMH features may differentially impact the distribution of health care expenditures across health care service categories depending on the combination of chronic conditions experienced by each beneficiary. For example, having no difficulty contacting a provider after regular hours was associated with significantly lower outpatient expenditures for beneficiaries with high cholesterol and diabetes (n = 635; P = 0.038), but it was associated with significantly higher inpatient expenditures for beneficiaries with high blood pressure and high cholesterol (n = 1599; P = 0.015), and no significant differences in expenditures in any category for beneficiaries with high blood pressure and heart disease (n = 1018; P > 0.05 for all categories). However, average total health care expenditures are largely unaffected by implementing the PCMH features considered. Understanding how the needs of Medicare beneficiaries with multiple chronic conditions can be met through the adoption of the PCMH model is important not only to be able to provide high-quality care but also to control costs. (Population Health Management 2016;19:206-211). PMID:26440215

  14. Sequence analysis and identification of new variations in the coding sequence of melatonin receptor gene (MTNR1A of Indian Chokla sheep breed

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Saxena

    2014-12-01

    Full Text Available Melatonin receptor 1A gene is the prime receptor mediating the effect of melatonin at the neuroendocrine level for control of seasonal reproduction in sheep. The aims of this study were to examine the polymorphism pattern of coding sequence of MTNR1A gene in Chokla sheep, a breed of Indian arid tract and to identify new variations in relation to its aseasonal status. Genomic DNAs of 101 Chokla sheep were collected and an 824 bp coding sequence of Exon II was amplified. RFLP was performed with enzyme RsaI and MnlI to assess the presence of polymorphism at position C606T and G612A, respectively. Genotyping revealed significantly higher frequency of M and R alleles than m and r alleles. RR and MM were found to be dominantly present in the group of studied population. Cloning and sequencing of Exon II followed by mutation/polymorphism analysis revealed ten mutations of which three were non-synonymous mutations (G706A, C893A, G931C. G706A leads to substitution of valine by isoleucine Val125I (U14109 in the fifth transmembrane domain. C893A leads to substitution of alanine by aspartic acid in the third extracellular loop. G931C mutation brings about substitution of amino acid alanine by proline in the seventh transmembrane helix, can affect the conformational stability of the molecule. Polyphen-2 analysis revealed that the polymorphism at position 931 is potentially damaging while the mutations at positions 706 and 893 were benign. It is concluded that G931C mutation of MTNR 1A gene, may explain, in part, the importance of melatonin structure integrity in influencing seasonality in sheep.

  15. Identification of mRNA-like non-coding RNAs and validation of a mighty one named MAR in Panax ginseng

    Institute of Scientific and Technical Information of China (English)

    Meizhen Wang; Bin Wu; Chao Chen; Shanfa Lu

    2015-01-01

    Increasing evidence suggests that long non‐coding RNAs (lncRNAs) play significant roles in plants. However, little is known about lncRNAs in Panax ginseng C. A. Meyer, an economical y significant medicinal plant species. A total of 3,688 mRNA‐like non‐coding RNAs (mlncRNAs), a class of lncRNAs, were identified in P. ginseng. Approximately 40%of the identified mlncRNAs were processed into smal RNAs, implying their regulatory roles via smal RNA‐mediated mechanisms. Eleven miRNA‐generating mlncRNAs also pro-duced siRNAs, suggesting the coordinated production of miRNAs and siRNAs in P. ginseng. The mlncRNA‐derived smal RNAs might be 21‐, 22‐, or 24‐nt phased and could be generated from both or only one strand of mlncRNAs, or from super long hairpin structures. A ful‐length mlncRNA, termed MAR (multiple‐function‐associated mlncRNA), was cloned. It gener-ated the most abundant siRNAs. The MAR siRNAs were predominantly 24‐nt and some of them were distributed in a phased pattern. A total of 228 targets were predicted for 71 MAR siRNAs. Degradome sequencing validated 68 predicted targets involved in diverse metabolic pathways, suggesting the significance of MAR in P. ginseng. Consistently, MAR was detected in al tissues analyzed and responded to methyl jasmonate (MeJA) treatment. It sheds light on the function of mlncRNAs in plants.

  16. Identification of novel growth phase- and media-dependent small non-coding RNAs in Streptococcus pyogenes M49 using intergenic tiling arrays

    Directory of Open Access Journals (Sweden)

    Patenge Nadja

    2012-10-01

    Full Text Available Abstract Background Small non-coding RNAs (sRNAs have attracted attention as a new class of gene regulators in both eukaryotes and bacteria. Genome-wide screening methods have been successfully applied in Gram-negative bacteria to identify sRNA regulators. Many sRNAs are well characterized, including their target mRNAs and mode of action. In comparison, little is known about sRNAs in Gram-positive pathogens. In this study, we identified novel sRNAs in the exclusively human pathogen Streptococcus pyogenes M49 (Group A Streptococcus, GAS M49, employing a whole genome intergenic tiling array approach. GAS is an important pathogen that causes diseases ranging from mild superficial infections of the skin and mucous membranes of the naso-pharynx, to severe toxic and invasive diseases. Results We identified 55 putative sRNAs in GAS M49 that were expressed during growth. Of these, 42 were novel. Some of the newly-identified sRNAs belonged to one of the common non-coding RNA families described in the Rfam database. Comparison of the results of our screen with the outcome of two recently published bioinformatics tools showed a low level of overlap between putative sRNA genes. Previously, 40 potential sRNAs have been reported to be expressed in a GAS M1T1 serotype, as detected by a whole genome intergenic tiling array approach. Our screen detected 12 putative sRNA genes that were expressed in both strains. Twenty sRNA candidates appeared to be regulated in a medium-dependent fashion, while eight sRNA genes were regulated throughout growth in chemically defined medium. Expression of candidate genes was verified by reverse transcriptase-qPCR. For a subset of sRNAs, the transcriptional start was determined by 5′ rapid amplification of cDNA ends-PCR (RACE-PCR analysis. Conclusions In accord with the results of previous studies, we found little overlap between different screening methods, which underlines the fact that a comprehensive analysis of s

  17. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  18. From theoretical to actual ecosystem services: mapping beneficiaries and spatial flows in ecosystem service assessments

    Directory of Open Access Journals (Sweden)

    Kenneth J. Bagstad

    2014-06-01

    Full Text Available Ecosystem services mapping and modeling has focused more on supply than demand, until recently. Whereas the potential provision of economic benefits from ecosystems to people is often quantified through ecological production functions, the use of and demand for ecosystem services has received less attention, as have the spatial flows of services from ecosystems to people. However, new modeling approaches that map and quantify service-specific sources (ecosystem capacity to provide a service, sinks (biophysical or anthropogenic features that deplete or alter service flows, users (user locations and level of demand, and spatial flows can provide a more complete understanding of ecosystem services. Through a case study in Puget Sound, Washington State, USA, we quantify and differentiate between the theoretical or in situ provision of services, i.e., ecosystems' capacity to supply services, and their actual provision when accounting for the location of beneficiaries and the spatial connections that mediate service flows between people and ecosystems. Our analysis includes five ecosystem services: carbon sequestration and storage, riverine flood regulation, sediment regulation for reservoirs, open space proximity, and scenic viewsheds. Each ecosystem service is characterized by different beneficiary groups and means of service flow. Using the ARtificial Intelligence for Ecosystem Services (ARIES methodology we map service supply, demand, and flow, extending on simpler approaches used by past studies to map service provision and use. With the exception of the carbon sequestration service, regions that actually provided services to people, i.e., connected to beneficiaries via flow paths, amounted to 16-66% of those theoretically capable of supplying services, i.e., all ecosystems across the landscape. These results offer a more complete understanding of the spatial dynamics of ecosystem services and their effects, and may provide a sounder basis for

  19. Code Cactus

    International Nuclear Information System (INIS)

    This code handles the following problems: -1) Analysis of thermal experiments on a water loop at high or low pressure; steady state or transient behavior; -2) Analysis of thermal and hydrodynamic behavior of water-cooled and moderated reactors, at either high or low pressure, with boiling permitted; fuel elements are assumed to be flat plates: - Flowrate in parallel channels coupled or not by conduction across plates, with conditions of pressure drops or flowrate, variable or not with respect to time is given; the power can be coupled to reactor kinetics calculation or supplied by the code user. The code, containing a schematic representation of safety rod behavior, is a one dimensional, multi-channel code, and has as its complement (FLID), a one-channel, two-dimensional code. (authors)

  20. Identification and functional analysis of acute myeloid leukemia susceptibility associated single nucleotide polymorphisms at non-protein coding regions of RUNX1.

    Science.gov (United States)

    Xu, Xin; Ren, Xiuyu; Wang, Haiying; Zhao, Yao; Yi, Zhengjun; Wang, Kaifeng; Zhang, Shizhuang; Wang, Lin; Samuelson, David J; Hu, Zhenbo

    2016-06-01

    Little is known about the susceptibility to acute myeloid leukemia. We aim to search non-protein coding regions of key hematopoiesis transcription factors for genetic variations associated with acute myeloid leukemia susceptibility. We genotyped SNPs of RUNX1 P1 promoter, P2 promoter, +23 enhancer, intron 5.2 enhancer, PU.1 promoter, CEBPA promoter, and CEBPE promoter from acute myeloid leukemia patients and healthy controls. Rs2249650 and rs2268276 at RUNX1 intron 5.2 enhancer were found to be associated with acute myeloid leukemia susceptibility. Artificial reporters containing different rs2249650 and rs2268276 alleles showed differential activities in the K562 cell line, a human immortalized myeloid leukemia line. Rs2249650 contributes to reporter activities more than rs2268276. Gel shift assay is consistent with the luciferase assay. Supershift assay indicated that one potential binding protein was PU.1. To sum up, rs2268276 and especially rs2249650 may be qualified as new acute myeloid leukemia susceptibility-associated SNPs. PMID:26374622

  1. Analysis of α, β Gross Radioactivity and Identification of Radioactivity as γ Radiation from Water and Sediment Code River in Yogyakarta

    International Nuclear Information System (INIS)

    An analysis has been carried out on the natural radioactivity of water and sediment Code river. Measurement of radioactivity by applying two methods the gross α and β activity analysis and the r spectrometry analysis. In the gross α and β activity analysis, the (natural) radiation exposure measured by a counter using scintillation detector, GM (β) counter and analyzed by gross methods (no different in energy radiation and decaying modes), and also to find out gamma radioactivity and to identify the content of radionuclide by gamma spectrometry using HPGe detector. The gross alpha radioactivity on the sediment: sample was 0.006 to 0.048 Bq/gram, while on the water sample was 0.006 to 0.024 Bq/litre in. The gross Beta radioactivity on the sediment: sample was 0.58 to 0.807 Bq/gram, while on the water sample was 0.253 to 0.355 Bq/litre. Gamma radioactivity of sediment samples was 0.093 to 0.379 Bq/gram; and the water sample was 0.0002 to 0.0081 Bq/litre. Identified radionuclides were Pb that is uranium series, TI is thorium series, Bi is uranium series, Ac is thorium series and K is primordial radionuclide. (author)

  2. Gratuitous right of use, regulated by the new Civil Code

    OpenAIRE

    Raluca DIMITRIU

    2013-01-01

    The gratuitous right of use is regulated by the new Civil Code as one of the rights corresponding to the public property. The paper aims to analyse this right in the context of the current legislation, in view of the beneficiaries, the content and the juridical characteristics, as well as the legal limits of the gratuitous right of use. There are identified the categories of legal persons who can exercise the gratuitous right of use and the conditions which should be fulfilled in order to exe...

  3. NHRIC (National Health Related Items Code)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The National Health Related Items Code (NHRIC) is a system for identification and numbering of marketed device packages that is compatible with other numbering...

  4. Identification of genes for small non-coding RNAs that belong to the regulon of the two-component regulatory system CiaRH in Streptococcus

    Directory of Open Access Journals (Sweden)

    Hakenbeck Regine

    2010-11-01

    Full Text Available Abstract Background Post-transcriptional regulation by small RNAs (sRNAs in bacteria is now recognized as a wide-spread regulatory mechanism modulating a variety of physiological responses including virulence. In Streptococcus pneumoniae, an important human pathogen, the first sRNAs to be described were found in the regulon of the CiaRH two-component regulatory system. Five of these sRNAs were detected and designated csRNAs for cia-dependent small RNAs. CiaRH pleiotropically affects β-lactam resistance, autolysis, virulence, and competence development by yet to be defined molecular mechanisms. Since CiaRH is highly conserved among streptococci, it is of interest to determine if csRNAs are also included in the CiaRH regulon in this group of organisms consisting of commensal as well as pathogenic species. Knowledge on the participation of csRNAs in CiaRH-dependent regulatory events will be the key to define the physiological role of this important control system. Results Genes for csRNAs were predicted in streptococcal genomes and data base entries other than S. pneumoniae by searching for CiaR-activated promoters located in intergenic regions that are followed by a transcriptional terminator. 61 different candidate genes were obtained specifying csRNAs ranging in size from 51 to 202 nt. Comparing these genes among each other revealed 40 different csRNA types. All streptococcal genomes harbored csRNA genes, their numbers varying between two and six. To validate these predictions, S. mitis, S. oralis, and S. sanguinis were subjected to csRNA-specific northern blot analysis. In addition, a csRNA gene from S. thermophilus plasmid pST0 introduced into S. pneumoniae was also tested. Each of the csRNAs was detected on these blots and showed the anticipated sizes. Thus, the method applied here is able to predict csRNAs with high precision. Conclusions The results of this study strongly suggest that genes for small non-coding RNAs, csRNAs, are part of

  5. Enhancing Privacy for Biometric Identification Cards

    CERN Document Server

    Balanoiu, Paul

    2010-01-01

    Most developed countries have started the implementation of biometric electronic identification cards, especially passports. The European Union and the United States of America struggle to introduce and standardize these electronic documents. Due to the personal nature of the biometric elements used for the generation of these cards, privacy issues were raised on both sides of the Atlantic Ocean, leading to civilian protests and concerns. The lack of transparency from the public authorities responsible with the implementation of such identification systems, and the poor technological approaches chosen by these authorities, are the main reasons for the negative popularity of the new identification methods. The following article shows an approach that provides all the benefits of modern technological advances in the fields of biometrics and cryptography, without sacrificing the privacy of those that will be the beneficiaries of the new system.

  6. GRADUATION DETERMINANTS OF PRODUCTIVE SAFETY NET PROGRAM BENEFICIARY HOUSEHOLDS: A LOGISTIC ANALYSIS, TIGRAI-ETHIOPIA

    Directory of Open Access Journals (Sweden)

    Yibrah Hagos Gebresilassie

    2013-12-01

    Full Text Available Household food security issues have become the concern of international communities as well as national government of Ethiopia. Social safety nets (like Productive Safety Net Program in Ethiopia are programs that offer protection to poor rural people by providing income through transfer programs and employment opportunities. The main objective of this study was to identify the major graduation determinants of Productive safety Net Program beneficiary rural households using a logistic regression technique from a total of 400 sample respondents using Eastern zone of Tigrai regional national state, northern Ethiopia, as case study site. The researcher was initially identified about sixteen predicting factors of which just ten of them were found to be statistically significant, and all exhibited the expected signs. Regression results revealed thatan introduction to integrated agricultural package make use of, male-headed household, age squared of the household head, educational status of the household head, saving culture, male adults, non-government organizations follow-up, access to credit, access to petty trading and irrigation have led productive safety net program beneficiary households to have more probability of graduation. Finally, it is recommended that assisting farming rural households to diversify and expand their sources of income in order to be able to meet their minimum food requirement and graduate soon through the provision of integrated agricultural packages. Besides, program participants should be followed up by non-government organizations and highly engaged in petty trading to graduate sooner, boost their income and food secure.

  7. Ideas and Countermeasures for Perfecting Rural Public Product Supply from the Perspective of Main Beneficiaries

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    On the basis of defining the concept of rural public product supply, the weaknesses of the supply mechanism of rural public product are analyzed. The shortages of rural public product supply lead to the difficult ties in developing agriculture and rural economy; enriching farmers and narrowing the urban and rural income gap. Problems in rural public product supply are further analyzed. Firstly, the national finance used in agriculture is low. Secondly, farmers are not separated from decision system and the beneficiaries separate from the decision-makers. Thirdly, farmers are not fully treated as civilians. Fourthly, rural areas lack the selection and supervision mechanism of public product. The ideas and countermeasures on perfecting rural public product are put forward from the perspective of main beneficiaries. The supply of rural public product should take intensifying the self development capability of farmers as core; farmers should actively participate in the making the rural public product decision and fight for their right to say. Farmers should unit together through organizations to improve the organizational level. Farmers should actively participate in trainings on them and try to get the updated information from the local government. The village collective should protect the supply of rural public product.

  8. System Identification

    NARCIS (Netherlands)

    Keesman, K.J.

    2011-01-01

    Summary System Identification Introduction.- Part I: Data-based Identification.- System Response Methods.- Frequency Response Methods.- Correlation Methods.- Part II: Time-invariant Systems Identification.- Static Systems Identification.- Dynamic Systems Identification.- Part III: Time-varying Syste

  9. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  10. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  11. 19 CFR 10.196 - Cost or value of materials produced in a beneficiary country or countries.

    Science.gov (United States)

    2010-04-01

    ... composed is not wholly the growth, product, or manufacture of a beneficiary country and (2) the tanning... would be eligible for duty-free treatment only if the direct costs attributable to the tanning operation... transporting the materials to the manufacturer's plant; (iii) The actual cost of waste or spoilage...

  12. NSURE code

    International Nuclear Information System (INIS)

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  13. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  14. Beyond Stabilizer Codes II: Clifford Codes

    OpenAIRE

    Klappenecker, Andreas; Roetteler, Martin

    2000-01-01

    Knill introduced a generalization of stabilizer codes, in this note called Clifford codes. It remained unclear whether or not Clifford codes can be superior to stabilizer codes. We show that Clifford codes are stabilizer codes provided that the abstract error group has an abelian index group. In particular, if the errors are modelled by tensor products of Pauli matrices, then the associated Clifford codes are necessarily stabilizer codes.

  15. MCNP code

    International Nuclear Information System (INIS)

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  16. ANIMAL code

    International Nuclear Information System (INIS)

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  17. Geographic disparities in chronic obstructive pulmonary disease (COPD hospitalization among Medicare beneficiaries in the United States

    Directory of Open Access Journals (Sweden)

    Holt JB

    2011-06-01

    Full Text Available James B Holt, Xingyou Zhang, Letitia Presley-Cantrell, Janet B CroftNational Center for Chronic Disease Prevention and Health Promotion, US Centers for Disease Control and Prevention, Atlanta, GA, USABackground: Hospitalizations for persons with chronic obstructive pulmonary disease (COPD result in significant health care resource use and excess expenditures. Despite well-documented sociodemographic disparities in COPD outcomes, no study has characterized geographic variations in COPD hospitalization across the US.Methods: Almost 3.8 million COPD hospitalization records were extracted from Medicare claims for 1995–2006, and the total population of eligible Medicare beneficiaries was extracted from the Medicare enrollment records to calculate COPD hospitalization rates by Health Service Area (HSA, (n = 949. Spatial cluster analysis and Bayesian hierarchical spatial modeling were used to characterize the geography of COPD hospitalizations.Results: The overall COPD hospitalization rate was 11.30 per 1,000 beneficiaries for the aggregated period 1995–2006. HSA-level COPD hospitalization rates had a median of 11.7 and a range of 3.0 (Cache, UT to 76.3 (Pike, KY. Excessive hospitalization risk was concentrated in Appalachia, the southern Great Lakes, the Mississippi Delta, the Deep South, and west Texas. In the Bayesian spatial mixture model, 73% of variability of COPD hospitalization relative risk was attributed to unidentified regional social and physical environments shared by HSAs rather than to unique local HSA factors (27%.Conclusion: We discovered distinct geographic patterns in COPD hospitalization rates and risks attributed to both regionally-shared environmental risk factors and HSA-unique environmental contexts. The correlates of these geographic patterns remain to be determined. Geographic comparisons of COPD hospitalization risk provide insights for better public health practice, policies, and programs for COPD prevention

  18. Irradiation test of bar code label

    International Nuclear Information System (INIS)

    The irradiation test of bar code label tagged on radioactive waste container was done to determine the effect of radiation. Low and medium radioactive waste is that below total activity of 4,000Bq/g according to the Korean nuclear law. The irradiation amount to radiate bar code label tagged on radioactive waste container was calculated by MCNP-4b computer code. The nuclide such as Co-60 and Cs-137 was assumed to contribute 50 % of total activity. Real irradiation amount for bar code label was finally calculated by the dimensions of the container and the bar code label. The identification of post and the physical deflection of irradiated bar code label was tested by the bar code reader. The coated bar code label was suitable to use on low and medium radioactive waste container

  19. Multiple Encryption-based Algorithm of Agricultural Product Trace Code

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    To establish a sound traceability system of agricultural products and guarantee security of agricultural products,an algorithm is proposed to encrypt trace code of agricultural products.Original trace code consists of 34 digits indicating such information as place of origin,name of product,date of production and authentication.Area code is used to indicate enterprise information,the encrypted algorithm is designed because of the increasing code length,such coding algorithms as system conversion and section division are applied for the encrypted conversion of code of origin place and production date code,moreover,section identification code and authentication code are permutated and combined to produce check code.Through the multiple encryption and code length compression,34 digits are compressed to 20 on the basis of ensuring complete coding information,shorter code length and better encryption enable the public to know information about agricultural products without consulting professional database.

  20. Benefit adequacy among elderly Social Security retired-worker beneficiaries and the SSI federal benefit rate.

    Science.gov (United States)

    Rupp, Kalman; Strand, Alexander; Davies, Paul; Sears, Jim

    2007-01-01

    Both target effectiveness and administrative simplicity are desirable properties in the design of minimum benefit packages for public retirement programs. The federal benefit rate (FBR) of the Supplemental Security Income (SSI) program has been proposed by some analysts as a potentially attractive basis of establishing a new minimum benefit for Social Security on both of these grounds. This type of proposal is related to a broader array of minimum benefit proposals that would establish a Social Security benefit floor based on the poverty rate. In contrast to Social Security, the SSI program is means tested, including both an income and asset screen and also a categorical eligibility screen (the requirement to qualify as aged or disabled). The SSI FBR provides an inflation-adjusted, guaranteed income floor for aged and disabled people with low assets. The FBR has been perceived by proponents as a minimal measure of Social Security benefit adequacy because it represents a subpoverty income level for a family of one or two depending on marital status. For this same reason it has been seen as a target-effective tool of designing a minimum Social Security benefit. An FBR-based minimum benefit has also been viewed as administratively simple to implement; the benefit can be calculated from Social Security administrative records using a completely automated electronic process. Therefore-in contrast to the SSI program itself-an FBR-based minimum benefit would incur virtually no ongoing administrative costs, would not require a separate application for a means-tested program, and would avoid the perception of welfare stigma. While these ideas have been discussed in the literature and among policymakers in the United States over the years, and similar proposals have been considered or implemented in several foreign countries, there have been no previous analyses measuring the size of the potentially affected beneficiary population. Nor has there been any systematic assessment

  1. 基于改进链码法的LuGre摩擦模型动态参数辨识%Parameters identification for LuGre friction model based on modified chain code recognition method

    Institute of Scientific and Technical Information of China (English)

    刘柏希

    2012-01-01

    Aimed at the shortcoming of traditional parameters identification methods for LuGre friction model,a new parameters identification method based on genetic algorithms and modified chain code recognition method was presented.Firstly,LuGre friction model was briefly introduced.Secondly,the optimization objective function with measured and simulated friction force in stead state was established.Thirdly,the relationships among displacement-friction force curve in presliding regime,stiffness coefficient and damping coefficient of LuGre friction model were studied.Many displacement-friction force curves with different shape were simulated using different stiffness coefficients.The shape characteristics of those simulated displacement-friction force curves were extracted using modified chain code and Fourier descriptor.The Euclidean distance based on shape characteristics was employed as the measurement of similar degree between measured displacement-friction force curves and simulated displacement-friction force curves.When the distance is less than the given error,the corresponding stiffness coefficient of simulated displacement-friction force curve is regarded as the true one.In the end,a numerical example was given to show the correctness and effectiveness of the presented method.%针对现有LuGre摩擦模型动态参数辨识方法辨识精度不高,收敛性难以保证及参数初值难以确定等不足,提出了一种基于改进链码特征识别法的参数辨识方法。首先,研究LuGre摩擦模型中两个动态参数-鬃毛刚度系数与阻尼系数之间的关系,以及鬃毛刚度系数与预滑动阶段位移-摩擦力曲线形状之间的对应关系;然后,改进现有Freeman链码的采样方式和码间距,利用改进的链码结合傅立叶描绘子提取位移-摩擦力曲线的形状特征并形成特征向量;最后,以加噪声原始位移-摩擦力曲线和仿真位移-摩擦力曲线的特征向量为参数建立度量两曲线相似程度

  2. Hammerstein Model for Speech Coding

    Directory of Open Access Journals (Sweden)

    Turunen Jari

    2003-01-01

    Full Text Available A nonlinear Hammerstein model is proposed for coding speech signals. Using Tsay's nonlinearity test, we first show that the great majority of speech frames contain nonlinearities (over 80% in our test data when using 20-millisecond speech frames. Frame length correlates with the level of nonlinearity: the longer the frames the higher the percentage of nonlinear frames. Motivated by this result, we present a nonlinear structure using a frame-by-frame adaptive identification of the Hammerstein model parameters for speech coding. Finally, the proposed structure is compared with the LPC coding scheme for three phonemes /a/, /s/, and /k/ by calculating the Akaike information criterion of the corresponding residual signals. The tests show clearly that the residual of the nonlinear model presented in this paper contains significantly less information compared to that of the LPC scheme. The presented method is a potential tool to shape the residual signal in an encode-efficient form in speech coding.

  3. Oil royalties payment impact on socio-economic beneficiary countries development; O impacto do pagamento de royalties do petroleo no desenvolvimento socio-economico dos municipios beneficiarios

    Energy Technology Data Exchange (ETDEWEB)

    Lucchesi, Cesar Augusto M.; Anuatti Neto, Francisco [Universidade de Sao Paulo (USP), Ribeirao Preto, SP (Brazil). Faculdade de Economia, Administracao e Contabilidade

    2004-07-01

    This research proposes to evaluate oil royalties payment impact on socio-economic beneficiary counties indicators. In the first step, it has been made royalties payments distribution among beneficiary counties (942), what showed a meaningful paid resources concentration between 1993 and 1999, when 20% of the beneficiaries apportioned of 98,5% from this period paid royalties. For these 188 greatest exaction counties the royalties impact analyses on County Human Development Index (IDH-M) evolution showed the received royalties amount positively influenced the 2000 IDH-M additional comparing to 1991. It indicates the petroleum industry contribution to municipal development of those counties which receive these resources. (author)

  4. CANAL code

    International Nuclear Information System (INIS)

    The CANAL code presented here optimizes a realistic iron free extraction channel which has to provide a given transversal magnetic field law in the median plane: the current bars may be curved, have finite lengths and cooling ducts and move in a restricted transversal area; terminal connectors may be added, images of the bars in pole pieces may be included. A special option optimizes a real set of circular coils

  5. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  6. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing in...

  7. Concatenated codes with convolutional inner codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Zyablov, Viktor

    1988-01-01

    The minimum distance of concatenated codes with Reed-Solomon outer codes and convolutional inner codes is studied. For suitable combinations of parameters the minimum distance can be lower-bounded by the product of the minimum distances of the inner and outer codes. For a randomized ensemble of...... concatenated codes a lower bound of the Gilbert-Varshamov type is proved...

  8. 20 CFR 411.600 - Is there a process for resolving disputes between beneficiaries and ENs that are not State VR...

    Science.gov (United States)

    2010-04-01

    ... SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Ticket to Work Program Dispute Resolution Disputes Between Beneficiaries and Employment Networks § 411.600 Is there a process...

  9. Accurate discrimination of conserved coding and non-coding regions through multiple indicators of evolutionary dynamics

    Directory of Open Access Journals (Sweden)

    Pesole Graziano

    2009-09-01

    Full Text Available Abstract Background The conservation of sequences between related genomes has long been recognised as an indication of functional significance and recognition of sequence homology is one of the principal approaches used in the annotation of newly sequenced genomes. In the context of recent findings that the number non-coding transcripts in higher organisms is likely to be much higher than previously imagined, discrimination between conserved coding and non-coding sequences is a topic of considerable interest. Additionally, it should be considered desirable to discriminate between coding and non-coding conserved sequences without recourse to the use of sequence similarity searches of protein databases as such approaches exclude the identification of novel conserved proteins without characterized homologs and may be influenced by the presence in databases of sequences which are erroneously annotated as coding. Results Here we present a machine learning-based approach for the discrimination of conserved coding sequences. Our method calculates various statistics related to the evolutionary dynamics of two aligned sequences. These features are considered by a Support Vector Machine which designates the alignment coding or non-coding with an associated probability score. Conclusion We show that our approach is both sensitive and accurate with respect to comparable methods and illustrate several situations in which it may be applied, including the identification of conserved coding regions in genome sequences and the discrimination of coding from non-coding cDNA sequences.

  10. Easing the Part D Transition An Evaluation of Federal and State Efforts to Ensure Dual Eligibles and Other LowIncome Beneficiaries Maintain Prescription Drug Coverage

    OpenAIRE

    Ann Bagchi; Matthew Hodges; Christine Yip; Sandra Nelson

    2008-01-01

    The Centers for Medicare & Medicaid Services (CMS) anticipated problems transitioning drug coverage for dual eligible beneficiaries from Medicaid to Medicare when Medicare Part D was implemented in 2006. This report examines the administrative efficiency of the "Point-of-Sale Facilitated Enrollment" process and state-to-plan demonstrations, set up to facilitate the transition, by examining characteristics of beneficiaries in the two programs. It also looks at alternative approaches for ensuri...

  11. Symptoms of poverty within a group of land reform beneficiaries in the Midlands of KwaZulu-Natal: Analysis and policy recommendations

    OpenAIRE

    Shinns, L.H.; Lyne, Michael C.

    2004-01-01

    This study identifies different dimensions of poverty affecting the current and future well-being of households within a community of land reform beneficiaries in the Midlands of KwaZulu-Natal. A census survey of the beneficiary households was conducted in May 2002 to gather data on poverty indicators. Principal Component Analysis was used to construct an index of the standard of housing, which was then combined with variables measuring other symptoms of poverty (income, wealth and health) in...

  12. Trends in Antihypertensive Medication Discontinuation and Low Adherence Among Medicare Beneficiaries Initiating Treatment From 2007 to 2012.

    Science.gov (United States)

    Tajeu, Gabriel S; Kent, Shia T; Kronish, Ian M; Huang, Lei; Krousel-Wood, Marie; Bress, Adam P; Shimbo, Daichi; Muntner, Paul

    2016-09-01

    Low antihypertensive medication adherence is common. During recent years, the impact of low medication adherence on increased morbidity and healthcare costs has become more recognized, leading to interventions aimed at improving adherence. We analyzed a 5% sample of Medicare beneficiaries initiating antihypertensive medication between 2007 and 2012 to assess whether reductions occurred in discontinuation and low adherence. Discontinuation was defined as having no days of antihypertensive medication supply for the final 90 days of the 365 days after initiation. Low adherence was defined as having a proportion of days covered gap in the previous year. In conclusion, low adherence to antihypertensive medication has decreased among Medicare beneficiaries; however, rates of discontinuation and low adherence remain high. PMID:27432867

  13. Relative Mortality in U.S. Medicare Beneficiaries with Parkinson Disease and Hip and Pelvic Fractures

    Science.gov (United States)

    Harris-Hayes, Marcie; Willis, Allison W.; Klein, Sandra E.; Czuppon, Sylvia; Crowner, Beth; Racette, Brad A.

    2014-01-01

    Background: Parkinson disease is a neurodegenerative disease that affects gait and postural stability, resulting in an increased risk of falling. The purpose of this study was to estimate mortality associated with demographic factors after hip or pelvic (hip/pelvic) fracture in people with Parkinson disease. A secondary goal was to compare the mortality associated with Parkinson disease to that associated with other common medical conditions in patients with hip/pelvic fracture. Methods: This was a retrospective observational cohort study of 1,980,401 elderly Medicare beneficiaries diagnosed with hip/pelvic fracture from 2000 to 2005 who were identified with use of the Beneficiary Annual Summary File. The race/ethnicity distribution of the sample was white (93.2%), black (3.8%), Hispanic (1.2%), and Asian (0.6%). Individuals with Parkinson disease (131,215) were identified with use of outpatient and carrier claims. Cox proportional hazards models were used to estimate the risk of death associated with demographic and clinical variables and to compare mortality after hip/pelvic fracture between patients with Parkinson disease and those with other medical conditions associated with high mortality after hip/pelvic fracture, after adjustment for race/ethnicity, sex, age, and modified Charlson comorbidity score. Results: Among those with Parkinson disease, women had lower mortality after hip/pelvic fracture than men (adjusted hazard ratio [HR] = 0.63, 95% confidence interval [CI]) = 0.62 to 0.64), after adjustment for covariates. Compared with whites, blacks had a higher (HR = 1.12, 95% CI = 1.09 to 1.16) and Hispanics had a lower (HR = 0.87, 95% CI = 0.81 to 0.95) mortality, after adjustment for covariates. Overall, the adjusted mortality rate after hip/pelvic fracture in individuals with Parkinson disease (HR = 2.41, 95% CI = 2.37 to 2.46) was substantially elevated compared with those without the disease, a finding similar to the increased mortality associated with a

  14. Antihypertensive medication classes used among medicare beneficiaries initiating treatment in 2007-2010.

    Directory of Open Access Journals (Sweden)

    Shia T Kent

    Full Text Available After the 2003 publication of the Seventh Report of the Joint National Committee on Prevention, Detection, Evaluation, and Treatment of High Blood Pressure (JNC 7 guidelines, there was a 5-10% increase in patients initiating antihypertensive medication with a thiazide-type diuretic, but most patients still did not initiate treatment with this class. There are few contemporary published data on antihypertensive medication classes filled by patients initiating treatment.We used the 5% random Medicare sample to study the initiation of antihypertensive medication between 2007 and 2010. Initiation was defined by the first antihypertensive medication fill preceded by 365 days with no antihypertensive medication fills. We restricted our analysis to beneficiaries ≥ 65 years who had two or more outpatient visits with a hypertension diagnosis and full Medicare fee-for-service coverage for the 365 days prior to initiation of antihypertensive medication. Between 2007 and 2010, 32,142 beneficiaries in the 5% Medicare sample initiated antihypertensive medication. Initiation with a thiazide-type diuretic decreased from 19.2% in 2007 to 17.9% in 2010. No other changes in medication classes initiated occurred over this period. Among those initiating antihypertensive medication in 2010, 31.3% filled angiotensin-converting enzyme inhibitors (ACE-Is, 26.9% filled beta blockers, 17.2% filled calcium channel blockers, and 14.4% filled angiotensin receptor blockers (ARBs. Initiation with >1 antihypertensive medication class decreased from 25.6% in 2007 to 24.1% in 2010. Patients initiated >1 antihypertensive medication class most commonly with a thiazide-type diuretic and either an ACE-I or ARB.These results suggest that JNC 7 had a limited long-term impact on the choice of antihypertensive medication class and provide baseline data prior to the publication of the 2014 Evidence-Based Guideline for the Management of High Blood Pressure in Adults from the Panel

  15. Quantum Cyclic Code

    CERN Document Server

    Dutta, Sagarmoy

    2010-01-01

    In this paper, we define and study \\emph{quantum cyclic codes}, a generalisation of cyclic codes to the quantum setting. Previously studied examples of quantum cyclic codes were all quantum codes obtained from classical cyclic codes via the CSS construction. However, the codes that we study are much more general. In particular, we construct cyclic stabiliser codes with parameters $[[5,1,3

  16. Longitudinal Statistics on Work Activity and Use of Employment Supports for New Social Security Disability Insurance Beneficiaries

    OpenAIRE

    Su Liu; David C. Stapleton

    2011-01-01

    Using Social Security Administration data, this paper presents findings from a longitudinal analysis of the extent to which new Supplemental Security Income (SSI) disability beneficiaries return to work and use SSI work incentives. Longitudinal statistics show that more than 8 percent of those first awarded SSI benefits as adults in 2001 had their benefits suspended due to work for at least a month by December 2007.

  17. Perspective on Beneficiaries Experiences of Participation in Community-Based Agriculture and Rural Development Program in Guba, Northern Nigeria

    Directory of Open Access Journals (Sweden)

    Sule Ahmadu

    2012-03-01

    Full Text Available The objective of this paper is to explore beneficiaries’ experiences on participation in the on-going International Fund for Agriculture Development/Community-based agriculture and rural development program (IFAD/CBARDP among farmers in Guba community in Northern Nigeria. The paper illustrates beneficiaries’ experiences on how they are participating and the factors that motivated their participation in the program using qualitative research methods of data collection and analysis. Data for the study was collected from eight key informants purposely selected as being participants of the program. Although, theoretically, participation entails the full involvement of beneficiaries in all the stages of the development process, findings of the study revealed that beneficiaries’ participation in the program was only evident in some stages of the development cycle. Several factors were found to have motivated beneficiaries’ participation in the program but the desire for meeting tangible material benefits featured above all other considerations. However, group leadership style, workshops and seminars, the approach adopted in the program, the officials/beneficiaries relationship and the publicity accorded to the program were found to have motivated beneficiaries’ participation as well. At the end, the paper recommended the active and full involvement of beneficiaries in future development initiatives in order to achieve sustainable rural development programs.

  18. Determinants of Repayment of Loan Beneficiaries of Micro Finance Institutions in Southeast States of Nigeria

    Directory of Open Access Journals (Sweden)

    Eugene Chukwuemeka Okorji

    2012-09-01

    Full Text Available The study investigated the loan repayment, its determinantsand socio-economic characteristics of microfinance loanbeneficiaries in the Southeast states of Nigeria. It was carriedout in three states of the five southeast states. Using a multistagesampling technique, a total of 144 loan beneficiaries in thethree segments of MFIs, namely; formal (commercial and developmentbanks; semi-formal (NGOs-MFIs and informal(ROSCAS, “Isusu” and co-operative societies were randomlyselected and interviewed in the three states. An ordinary leastsquare (OLS multiple regression analysis was carried out toisolate and examine the determinants of loan repayment fromthe respondents’ perspective. Results showed that beneficiarieshad low level of education, operated enterprises at a relativelysmall scale, had large family size and were of middle age.Further, it was found out that the majority of the respondentswere involved in farming enterprise (crop and poultry eventhough trading was the most prominent single non-farmingenterprise (trading, processing and artisanship. The result affirmedthat the informal sector respondents recorded the bestrepayment rate, followed by the respondents of semi-formaland the banks brought the rear. Outstanding among the determinantsof loan repayments from the respondents’ perspectivewere; loan size, level of education, experience, profitabilityand portfolio diversity. These, therefore deserve special attentionin loan administration of MFIs.

  19. Survey on the Viewpoints of Credit Beneficiaries Qua Consumers in Order to increase Banking Accountability

    Directory of Open Access Journals (Sweden)

    Dragoş Ilie

    2014-02-01

    Full Text Available The paper aims to demonstrate that the unprecedented granting of consumer credits to population in recent years, under the circumstances of a spectacular goods supply growth, has adversely affected some consumers, and jeopardized the protection of their life, health and safety. The research method consists in a survey that gave, to a number of 560 credit beneficiaries, qua consumers, the opportunity to freely express their viewpoints. Data collection and processing has resulted in the filling of a 14 queries questionnaire by each of the 560 consumers in the South-Western Oltenia region and, subsequently, in data analysis. The main findings show that consumers have experienced a decline in what concerns their standard of living and that sustainable consumption of goods was barely stimulated. Based on the survey results, the paper proposes a banking accountability indicators system and a consumer credits quality pattern of analysis that would increase banking accountability towards such credits by reducing their negative externalities on people’s lives, stimulating sustainable consumption, giving thorough and accurate information, managing complaints and disputes, educating and raising consumers awareness.

  20. ALL MEMBERS AND BENEFICIARIES OF THE PENSION FUND ARE INVITED TO ATTEND THE ANNUAL GENERAL ASSEMBLY

    CERN Multimedia

    2000-01-01

    Annual General Assembly to be held in the CERN Auditorium on Wednesday 4 October 2000 at 14.30 hrs The Agenda comprises: 1. Opening Remarks: - P. Levaux 2. The Swiss provident system: - C. Cuénoud recent trends 3. Annual Report 1999: - C. Cuénoud Presentation and results Copies of the Report are available from divisional secretariats. 4. Pension Fund’s investment policy and performance: - G. Maurin 5. Questions from members and beneficiaries Persons wishing to ask questions are encouraged to submit them, where possible, in writing in advance, addressed to Mr C. Cuénoud, Administrator of the Fund. 5. Conclusions P. Levaux As usual, participants are invited to drinks after the assembly. NB The minutes of the 1999 General Assembly are available from the Administration of the Fund (tel.(+4122)767 9194; e-mail Graziella.Praire@cern.ch) SOME ASPECTS OF THE FUND’S ACTIVITIES IN 1999 The Governing Board (at 31 December 1999) Members Appointed by C. Bovet (Alternate: E. Chiaveri...

  1. Quantum Convolutional BCH Codes

    CERN Document Server

    Aly, S A; Klappenecker, A; Roetteler, M; Sarvepalli, P K; Aly, Salah A.; Grassl, Markus; Klappenecker, Andreas; Roetteler, Martin; Sarvepalli, Pradeep Kiran

    2007-01-01

    Quantum convolutional codes can be used to protect a sequence of qubits of arbitrary length against decoherence. We introduce two new families of quantum convolutional codes. Our construction is based on an algebraic method which allows to construct classical convolutional codes from block codes, in particular convolutional BCH codes. These codes have the property that they contain their Euclidean, respectively Hermitian, dual codes. Hence, they can be used to define quantum convolutional codes by the stabilizer code construction. We compute BCH-like bounds on the free distances which can be controlled as in the case of block codes, and establish that the codes have non-catastrophic encoders.

  2. Concatenated Conjugate Codes

    CERN Document Server

    Hamada, M

    2006-01-01

    A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is known that conjugate code pairs are applicable to (quantum) cryptography. We give a construction method for efficiently decodable conjugate code pairs.

  3. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  4. Code-Mixing in Social Media Text

    Directory of Open Access Journals (Sweden)

    Amitava Das

    Full Text Available Automatic understanding of noisy social media text is one of the prime presentday research areas. Most research has so far concentrated on English texts; however, more than half of the users are writing in other languages, making language identification a prerequisite for comprehensive processing of social media text. Though language identification has been considered an almost solved problem in other applications, language detectors fail in the social media context due to phenomena such as code-mixing, code-switching, lexical borrowings, Anglicisms, and phonetic typing. This paper reports an initial study to understand the characteristics of code-mixing in the social media context and presents a system developed to automatically detect language boundaries in code-mixed social media text, here exemplified by Facebook messages in mixed English-Bengali and English-Hindi.

  5. Changes in Initial Treatment for Prostate Cancer Among Medicare Beneficiaries, 1999–2007

    International Nuclear Information System (INIS)

    Purpose: In the absence of evidence from large clinical trials, optimal therapy for localized prostate cancer remains unclear; however, treatment patterns continue to change. We examined changes in the management of patients with prostate cancer in the Medicare population. Methods and Materials: We conducted a retrospective claims-based analysis of the use of radiation therapy, surgery, and androgen deprivation therapy in the 12 months after diagnosis of prostate cancer in a nationally representative 5% sample of Medicare claims. Patients were Medicare beneficiaries 67 years or older with incident prostate cancer diagnosed between 1999 and 2007. Results: There were 20,918 incident cases of prostate cancer between 1999 and 2007. The proportion of patients receiving androgen deprivation therapy decreased from 55% to 36%, and the proportion of patients receiving no active therapy increased from 16% to 23%. Intensity-modulated radiation therapy replaced three-dimensional conformal radiation therapy as the most common method of radiation therapy, accounting for 77% of external beam radiotherapy by 2007. Minimally invasive radical prostatectomy began to replace open surgical approaches, being used in 49% of radical prostatectomies by 2007. Conclusions: Between 2002 and 2007, the use of androgen deprivation therapy decreased, open surgical approaches were largely replaced by minimally invasive radical prostatectomy, and intensity-modulated radiation therapy replaced three-dimensional conformal radiation therapy as the predominant method of radiation therapy in the Medicare population. The aging of the population and the increasing use of newer, higher-cost technologies in the treatment of patients with prostate cancer may have important implications for nationwide health care costs.

  6. Geographic and Ethnic Variation in Parkinson Disease: A Population-Based Study of US Medicare Beneficiaries

    Science.gov (United States)

    Wright Willis, Allison; Evanoff, Bradley A.; Lian, Min; Criswell, Susan R.; Racette, Brad A.

    2010-01-01

    Background Parkinson disease is a common neurodegenerative disease. The racial, sex, age, and geographic distributions of Parkinson disease in the US are unknown. Methods We performed a serial cross-sectional study of US Medicare beneficiaries aged 65 and older from the years 1995, and 2000–2005. Using over 450,000 Parkinson disease cases per year, we calculated Parkinson disease prevalence and annual incidence by race, age, sex, and county. Spatial analysis investigated the geographic distribution of Parkinson disease. Results Age-standardized Parkinson disease prevalence (per 100,000) was 2,168.18 (±95.64) in White men, but 1,036.41 (±86.01) in Blacks, and 1,138.56 (±46.47) in Asians. The incidence ratio in Blacks as compared to Whites (0.74; 95% CI = 0.732–0.748) was higher than the prevalence ratio (0.58; 95% CI = 0.575–0.581), whereas the incidence ratio for Asians (0.69; 95% CI = 0.657–0.723) was similar to the prevalence ratio (0.62; 95% CI = 0.617–0.631). Bayesian mapping of Parkinson disease revealed a concentration in the Midwest and Northeast regions. Mean county incidence by quartile ranged from 279 to 3,111, and prevalence from 1,175 to 13,800 (per 100,000). Prevalence and incidence in urban counties were greater than in rural ones (p < 0.01). Cluster analysis supported a nonrandom distribution of both incident and prevalent Parkinson disease cases (p < 0.001). Conclusions Parkinson disease is substantially more common in Whites, and is nonrandomly distributed in the Midwest and Northeastern US. PMID:20090375

  7. Association between age and use of intensive care among surgical Medicare beneficiaries

    Science.gov (United States)

    Wunsch, Hannah; Gershengorn, Hayley B.; Guerra, Carmen; Rowe, John; Li, Guohua

    2013-01-01

    Purpose To determine the role age plays in use of intensive care for patients who have major surgery. Materials and Methods Retrospective cohort study examining the association between age and admission to an intensive care unit (ICU) for all Medicare beneficiaries aged 65 or older who had a hospitalization for one of five surgical procedures: esophagectomy, cystectomy, pancreaticoduodenectomy (PD), elective open abdominal aortic aneurysm repair (open AAA), and elective endovascular AAA repair (endo AAA) from 2004–08. The primary outcome was admission to an ICU. Secondary outcomes were complications and hospital mortality. We used multi-level mixed-effects logistic regression to adjust for other patient and hospital-level factors associated with each outcome. Results The percentage of hospitalized patients admitted to ICU ranged from 41.3% for endo AAA to 81.5% for open AAA. In-hospital mortality also varied, from 1.1% for endo AAA to 6.8% for esophagectomy. After adjusting for other factors, age was associated with admission to ICU for cystectomy (Adjusted Odds Ratio (AOR) 1.56 (95% CI 1.36–1.78) for age 80–84+; 2.25 (1.85–2.75) age 85+ compared with age 65–69), PD (AOR 1.26 (1.06–1.50) age 80–84; 1.49 (1.11–1.99) age 85+) and esophagectomy (AOR 1.26 (1.02–1.55) age 80–84; 1.28 (0.91–1.80) age 85+). Age was not associated with use of intensive care for open or endo AAA. Older age was associated with increases in complication rates and in-hospital mortality for all five surgical procedures. Conclusions The association between age and use of intensive care was procedure-specific. Complication rates and in-hospital mortality increased with age for all five surgical procedures. PMID:23787024

  8. Twisted Permutation Codes

    OpenAIRE

    Gillespie, Neil I.; Praeger, Cheryl E.; Spiga, Pablo

    2014-01-01

    We introduce twisted permutation codes, which are frequency permutation arrays analogous to repetition permutation codes, namely, codes obtained from the repetition construction applied to a permutation code. In particular, we show that a lower bound for the minimum distance of a twisted permutation code is the minimum distance of a repetition permutation code. We give examples where this bound is tight, but more importantly, we give examples of twisted permutation codes with minimum distance...

  9. Transitive nonpropelinear perfect codes

    OpenAIRE

    Mogilnykh, I. Yu.; Solov'eva, F. I.

    2014-01-01

    A code is called transitive if its automorphism group (the isometry group) of the code acts transitively on its codewords. If there is a subgroup of the automorphism group acting regularly on the code, the code is called propelinear. Using Magma software package we establish that among 201 equivalence classes of transitive perfect codes of length 15 from \\cite{ost} there is a unique nonpropelinear code. We solve the existence problem for transitive nonpropelinear perfect codes for any admissi...

  10. THE PROTECTION OF CONTRADICTORY IN THE BRAZILIAN NEW CIVIL PROCEDURE CODE: THE PROHIBITION OF “SUPRISE DECISIONS”; CONDITION TO THE EXTENSION OF THE OBJECTIVE LIMITS OF “RES JUDICATA”; IDENTIFICATION OF UNMOTIVATED DECISIONS.

    OpenAIRE

    Paulo Henrique dos Santos Lucon

    2016-01-01

    This article aims to analyze different kinds of judicial protection to the contradictory principle in the new Civil Procedure Code. As a procedural fundamental right, contradictory demands real application by judges and legislators. The new Civil Procedure Code ruled the theme properly, which can be identified by the prohibition of “suprise decisions”; the prevision of contradictory as a condition to the extension of the objective limits of “res judicata” to the so called “prejudicial questio...

  11. Homological stabilizer codes

    International Nuclear Information System (INIS)

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev’s toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev’s toric code or to the topological color codes. - Highlights: ► We show that Kitaev’s toric codes are equivalent to homological stabilizer codes on 4-valent graphs. ► We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. ► We find and classify all 2D homological stabilizer codes. ► We find optimal codes among the homological stabilizer codes.

  12. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  13. Barriers and facilitators for implementation of a return-to-work intervention for sickness absence beneficiaries with mental health problems

    DEFF Research Database (Denmark)

    Martin, Marie H. T.; Moefelt, Louise; Dahl Nielsen, Maj Britt;

    2015-01-01

    guidelines. Data sources were individual and group interviews, observations, national registers, and documents used in the intervention. RESULTS: The quality of the implementation varied greatly across the three settings. Barriers included lack of skills to assess MHPs according to the inclusion criteria......AIMS: Evidence for the effectiveness of return-to-work (RTW) interventions aimed at sickness absence beneficiaries with mental health problems (MHPs) is still relatively sparse and mostly inconclusive. This may in part reflect the varying settings and inconsistent implementations associated with...

  14. Structural Identification Problem

    Directory of Open Access Journals (Sweden)

    Suvorov Aleksei

    2016-01-01

    Full Text Available The identification problem of the existing structures though the Quasi-Newton and its modification, Trust region algorithms is discussed. For the structural problems, which could be represented by means of the mathematical modelling of the finite element code discussed method is extremely useful. The nonlinear minimization problem of the L2 norm for the structures with linear elastic behaviour is solved by using of the Optimization Toolbox of Matlab. The direct and inverse procedures for the composition of the desired function to minimize are illustrated for the spatial 3D truss structure as well as for the problem of plane finite elements. The truss identification problem is solved with 2 and 3 unknown parameters in order to compare the computational efforts and for the graphical purposes. The particular commands of the Matlab codes are present in this paper.

  15. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...... including an outer BCH code correcting a few bit errors....

  16. Fluorescent taggants with temporally coded signatures.

    Science.gov (United States)

    Wang, Siyang; Vyas, Raul; Dwyer, Chris

    2016-07-11

    In this paper, resonance energy transfer (RET) networks between chromophores are used to implement fluorescent taggants with temporally coded signatures. Because the temporal signature of such a fluorescent taggant is a phase-type distribution defined by the geometry of its RET network, the taggant design is not constrained by resolvable dyes and has a significantly larger coding capacity than spectrally or lifetime coded fluorescent taggants. Meanwhile, the detection process becomes highly efficient when the signatures are coded in the time domain. The taggant identification method is based on the multinomial distribution of detected photons and Maximum Likelihood Estimation, which guarantees high accuracy even with only a few hundred photons and also applies to a mixture of taggants in multiplex detection. Therefore, these temporally coded fluorescent taggants have great potential for both in situ and Lidar applications. PMID:27410827

  17. Bilingualism affects audiovisual phoneme identification

    OpenAIRE

    Burfin, Sabine; Pascalis, Olivier; Ruiz Tada, Elisa; Costa, Albert; Savariaux, Christophe; Kandel, Sonia

    2014-01-01

    We all go through a process of perceptual narrowing for phoneme identification. As we become experts in the languages we hear in our environment we lose the ability to identify phonemes that do not exist in our native phonological inventory. This research examined how linguistic experience—i.e., the exposure to a double phonological code during childhood—affects the visual processes involved in non-native phoneme identification in audiovisual speech perception. We conducted a phoneme identifi...

  18. Affine Grassmann codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant

    2010-01-01

    We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes.We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show that...... affine Grassmann codes have a large automorphism group and determine the number of minimum weight codewords....

  19. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both the...... coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  20. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  1. Polyphase alternating codes

    Directory of Open Access Journals (Sweden)

    M. Markkanen

    2008-08-01

    Full Text Available We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We handle a few specific examples in detail. The new codes offer an enlarged collection of code lengths for radar experiments.

  2. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  3. Discriminative sparse coding on multi-manifolds

    KAUST Repository

    Wang, J.J.-Y.

    2013-09-26

    Sparse coding has been popularly used as an effective data representation method in various applications, such as computer vision, medical imaging and bioinformatics. However, the conventional sparse coding algorithms and their manifold-regularized variants (graph sparse coding and Laplacian sparse coding), learn codebooks and codes in an unsupervised manner and neglect class information that is available in the training set. To address this problem, we propose a novel discriminative sparse coding method based on multi-manifolds, that learns discriminative class-conditioned codebooks and sparse codes from both data feature spaces and class labels. First, the entire training set is partitioned into multiple manifolds according to the class labels. Then, we formulate the sparse coding as a manifold-manifold matching problem and learn class-conditioned codebooks and codes to maximize the manifold margins of different classes. Lastly, we present a data sample-manifold matching-based strategy to classify the unlabeled data samples. Experimental results on somatic mutations identification and breast tumor classification based on ultrasonic images demonstrate the efficacy of the proposed data representation and classification approach. 2013 The Authors. All rights reserved.

  4. Coupling CFD code with system code and neutron kinetic code

    Energy Technology Data Exchange (ETDEWEB)

    Vyskocil, Ladislav, E-mail: Ladislav.Vyskocil@ujv.cz; Macek, Jiri

    2014-11-15

    Highlights: • Coupling interface between CFD code Fluent and system code Athlet was created. • Athlet code is internally coupled with neutron kinetic code Dyn3D. • Explicit coupling of overlapped computational domains was used. • A coupled system of Athlet/Dyn3D+Fluent codes was successfully tested on a real case. - Abstract: The aim of this work was to develop the coupling interface between CFD code Fluent and system code Athlet internally coupled with neutron kinetic code Dyn3D. The coupling interface is intended for simulation of complex transients such as Main Steam Line Break scenarios, which cannot be modeled separately first by system and neutron kinetic code and then by CFD code, because of the feedback between the codes. In the first part of this article, the coupling method is described. Explicit coupling of overlapped computational domains is used in this work. The second part of the article presents a demonstration simulation performed by the coupled system of Athlet/Dyn3D and Fluent. The “Opening a Steam Dump to the Atmosphere” test carried out at the Temelin NPP (VVER-1000) was simulated by the coupled system. In this simulation, the primary and secondary circuits were modeled by Athlet, mixing in downcomer and lower plenum was simulated by Fluent and heat generation in the core was calculated by Dyn3D. The results of the simulation with Athlet/Dyn3D+Fluent were compared with the experimental data and the results from a calculation performed with Athlet/Dyn3D without Fluent.

  5. Coupling CFD code with system code and neutron kinetic code

    International Nuclear Information System (INIS)

    Highlights: • Coupling interface between CFD code Fluent and system code Athlet was created. • Athlet code is internally coupled with neutron kinetic code Dyn3D. • Explicit coupling of overlapped computational domains was used. • A coupled system of Athlet/Dyn3D+Fluent codes was successfully tested on a real case. - Abstract: The aim of this work was to develop the coupling interface between CFD code Fluent and system code Athlet internally coupled with neutron kinetic code Dyn3D. The coupling interface is intended for simulation of complex transients such as Main Steam Line Break scenarios, which cannot be modeled separately first by system and neutron kinetic code and then by CFD code, because of the feedback between the codes. In the first part of this article, the coupling method is described. Explicit coupling of overlapped computational domains is used in this work. The second part of the article presents a demonstration simulation performed by the coupled system of Athlet/Dyn3D and Fluent. The “Opening a Steam Dump to the Atmosphere” test carried out at the Temelin NPP (VVER-1000) was simulated by the coupled system. In this simulation, the primary and secondary circuits were modeled by Athlet, mixing in downcomer and lower plenum was simulated by Fluent and heat generation in the core was calculated by Dyn3D. The results of the simulation with Athlet/Dyn3D+Fluent were compared with the experimental data and the results from a calculation performed with Athlet/Dyn3D without Fluent

  6. Identification of the 3' and 5' terminal sequences of the 8 rna genome segments of european and north american genotypes of infectious salmon anemia virus (an orthomyxovirus and evidence for quasispecies based on the non-coding sequences of transcripts

    Directory of Open Access Journals (Sweden)

    Riveroll Angela

    2010-11-01

    Full Text Available Abstract Background Infectious salmon anemia (ISA virus (ISAV is a pathogen of marine-farmed Atlantic salmon (Salmo salar; a disease first diagnosed in Norway in 1984. This virus, which was first characterized following its isolation in cell culture in 1995, belongs to the family Orthomyxoviridae, genus, Isavirus. The Isavirus genome consists of eight single-stranded RNA segments of negative sense, each with one to three open reading frames flanked by 3' and 5' non-coding regions (NCRs. Although the terminal sequences of other members of the family Orthomyxoviridae such as Influenzavirus A have been extensively analyzed, those of Isavirus remain largely unknown, and the few reported are from different ISAV strains and on different ends of the different RNA segments. This paper describes a comprehensive analysis of the 3' and 5' end sequences of the eight RNA segments of ISAV of both European and North American genotypes, and evidence of quasispecies of ISAV based on sequence variation in the untranslated regions (UTRs of transcripts. Results Two different ISAV strains and two different RNA preparations were used in this study. ISAV strain ADL-PM 3205 ISAV-07 (ADL-ISAV-07 of European genotype was the source of total RNA extracted from ISAV-infected TO cells, which contained both viral mRNA and cRNA. ISAV strain NBISA01 of North American genotype was the source of vRNA extracted from purified virus. The NCRs of each segment were identified by sequencing cDNA prepared by three different methods, 5' RACE (Rapid amplification of cDNA ends, 3' RACE, and RNA ligation mediated PCR. Sequence analysis of five clones each derived from one RT-PCR product from each NCR of ISAV transcripts of segments 1 to 8 revealed significant heterogeneity among the clones of the same segment end, providing unequivocal evidence for presence of intra-segment ISAV quasispecies. Both RNA preparations (mRNA/cRNA and vRNA yielded complementary sequence information, allowing the

  7. Teseo code validation

    International Nuclear Information System (INIS)

    In this report some validation tests for the TESEO code are described. The TESEO code was developed at ENEA - Clementel Center in the framework of the C2RV code sequence. This code sequence produces multigroup resonance cross sections for fast reactor analysis. It consists of the codes TESEO, MC2-II, GERES, ANISN, MEDIL. The TESEO code processes basic nuclear data in ENDF-B format and produces an ultrafine group (2082 groups) cross section library for the MC2-II code. To validate the TESEO algorithms, the data produced by TESEO code were compared with the data produced by other well-tested codes which use different algorithms. No substantial differences was found between these data and the data produced by TESEO code. TESEO algorithms showed high reliability. A detailed study of TESEO calculation options was carried out. Their use and functions are shown to inform the user of the code

  8. Comparative learning of pitch and loudness identification.

    Science.gov (United States)

    Houtsma, A J; Durlach, N I; Horowitz, D M

    1987-01-01

    This study investigated possible similarities between the ability to identify pitches and the ability to identify loudnesses. Systematic training of musically naive subjects indicated that frequency identification performance improves at about the same rate as intensity identification performance. Examination of frequency and intensity identification behavior of musically trained subjects showed that their ability to code pitch information efficiently does not generalize to an ability to encode loudness information more efficiently than untrained subjects. Intensity identification training curves of musically trained and untrained subjects are similar, but final performance levels are below frequency identification performance levels exhibited by musically trained subjects, especially those with absolute pitch. PMID:3819170

  9. The application of bar coding technology at WIPP

    International Nuclear Information System (INIS)

    Bar coding at the Waste Isolation Pilot Plant (WIPP) can be used to track waste containers within the facility, control transuranic (TRU) waste inventory flow, and reduce manpower and error in recording package identification or control parameters. By choosing where and when to bar code, precise timelines or time-and-motion studies can be conducted to aid in streamlining waste handling throughput at WIPP. Additionally, the use of bar codes as waste container identification (ID) numbers increases the accuracy of recording the ID numbers by four orders of magnitude. The bar code label can also be utilized for other functions, such as shipping labels. Also, the bar code is integrated with the waste management data base such that the entire data base can be accessed on a computer using a bar code

  10. Locally Orderless Registration Code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  11. Decentralized Network Coding

    OpenAIRE

    Fragouli, C.; Soljanin, E.

    2004-01-01

    This paper proposes deterministic algorithms for decentralized network coding. Decentralized coding allows to locally specify the coding operations at network nodes without knowledge of the overall network topology, and to accommodate future changes in the network such as addition of receivers. To the best of our knowledge, these are the first deterministic decentralized algorithms proposed for network coding.

  12. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... discusses code as the artist’s material and, further, formulates a critique of Cramer. The seductive magic in computer-generated art does not lie in the magical expression, but nor does it lie in the code/material/text itself. It lies in the nature of code to do something – as if it was magic: in the...

  13. Oil and gas field code master list, 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-12-16

    This document contains data collected through October 1993 and provides standardized field name spellings and codes for all identified oil and/or gas fields in the United States. Other Federal and State government agencies, as well as industry, use the EIA Oil and Gas Field Code Master List as the standard for field identification. A machine-readable version of the Oil and Gas Field Code Master List is available from the National Technical Information Service.

  14. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  15. Polyphase alternating codes

    CERN Document Server

    Markkanen, Markku

    2007-01-01

    This work introduces a method for constructing polyphase alternating codes in which the length of a code transmission cycle can be $p^m$ or $p-1$, where $p$ is a prime number and $m$ is a positive integer. The relevant properties leading to the construction alternating codes and the algorithm for generating alternating codes is described. Examples of all practical and some not that practical polyphase code lengths are given.

  16. Constructing quantum codes

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Quantum error correcting codes are indispensable for quantum information processing and quantum computation.In 1995 and 1996,Shor and Steane gave first several examples of quantum codes from classical error correcting codes.The construction of efficient quantum codes is now an active multi-discipline research field.In this paper we review the known several constructions of quantum codes and present some examples.

  17. Molecular cloning and characterization of the cDNA coding for the biotin-containing subunit of 3-methylcrotonoyl-CoA carboxylase: identification of the biotin carboxylase and biotin-carrier domains.

    OpenAIRE

    Song, J.; Wurtele, E S; Nikolau, B J

    1994-01-01

    Soybean genomic clones were isolated based on hybridization to probes that code for the conserved biotinylation domain of biotin-containing enzymes. The corresponding cDNA was isolated and expressed in Escherichia coli through fusion to the bacterial trpE gene. The resulting chimeric protein was biotinylated in E. coli. Antibodies raised against the chimeric protein reacted specifically with an 85-kDa biotin-containing polypeptide from soybean and inhibited 3-methylcrotonoyl-CoA carboxylase (...

  18. LACEwING: Lessons from a New Moving Group Code

    CERN Document Server

    Riedel, Adric R

    2015-01-01

    With all the new discoveries being made about nearby young stars, the ability to find new nearby young stars is as important as ever, and membership identification codes will continue to perform a vital role in scientific research. In the process of creating a new moving group membership identification code - LocAting Constituent mEmbers In Nearby Groups (LACEwING) - we have discovered a few pointers relevant to astronomers trying to use codes like LACEwING to locate young stars.

  19. 26 CFR 1.642(h)-3 - Meaning of “beneficiaries succeeding to the property of the estate or trust”.

    Science.gov (United States)

    2010-04-01

    ... property of the estate or trustâ. 1.642(h)-3 Section 1.642(h)-3 Internal Revenue INTERNAL REVENUE SERVICE... § 1.642(h)-3 Meaning of “beneficiaries succeeding to the property of the estate or trust”. (a) The... excess of deductions over gross income for which a deduction is allowed, under section 642(h). (b)...

  20. Providing Health Benefits and WorkRelated Services to Social Security Disability Insurance Beneficiaries SixMonth Results from the Accelerated Benefits Demonstration

    OpenAIRE

    David Wittenburg; Anne Warren; Deborah Peikes; Stephen Freedman

    2010-01-01

    This brief, the second in a series, evaluates the impacts of the Accelerated Benefits Demonstration, which provides earlier access to health coverage and related services to uninsured beneficiaries. Early findings indicate that the demonstration increased the use of health care services and reduced reported unmet health care needs for these individuals during the first six months following random assignment.

  1. 26 CFR 1.662(a)-1 - Inclusion of amounts in gross income of beneficiaries of estates and complex trusts; general.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Inclusion of amounts in gross income of beneficiaries of estates and complex trusts; general. 1.662(a)-1 Section 1.662(a)-1 Internal Revenue INTERNAL... Trusts Which May Accumulate Income Or Which Distribute Corpus § 1.662(a)-1 Inclusion of amounts in...

  2. Patient Satisfaction, Empowerment, and Health and Disability Status Effects of a Disease Management-Health Promotion Nurse Intervention among Medicare Beneficiaries with Disabilities

    Science.gov (United States)

    Friedman, Bruce; Wamsley, Brenda R.; Liebel, Dianne V.; Saad, Zabedah B.; Eggert, Gerald M.

    2009-01-01

    Purpose: To report the impact on patient and informal caregiver satisfaction, patient empowerment, and health and disability status of a primary care-affiliated disease self-management-health promotion nurse intervention for Medicare beneficiaries with disabilities and recent significant health services use. Design and Methods: The Medicare…

  3. The relationship between type of drug therapy and blood glucose self-monitoring test strips claimed by beneficiaries of the Seniors' Pharmacare Program in Nova Scotia, Canada

    Directory of Open Access Journals (Sweden)

    Sketris Ingrid

    2008-05-01

    Full Text Available Abstract Background The healthcare expenditure on self-monitoring of blood glucose (SMBG test strips under the Nova Scotia Seniors' Pharmacare Program (NSSPP has increased significantly in recent years. The objective of this study was to identify the frequency and cost of claims for blood glucose monitoring test strips by NSSPP beneficiaries in the fiscal year 2005/06 and to explore the variation in the use of test strips by type of treatment, age and sex. Methods Retrospective analysis was conducted using pharmacy administrative claims data for NSSPP beneficiaries. Study subjects were aged ≥ 65 years on October 1, 2004, received SMBG test strips in the 110 days prior to April 1, 2005, and were alive throughout the twelve month study period. Subjects were categorized into four groups: insulin only, oral antihyperglycemic agents (OAA only, both OAA and insulin; and no reimbursed diabetes medications. Statistical analysis was performed to identify differences in expenditure by medication group and in frequency of SMBG test strips claimed by medication group, age, and sex. Results Of 13,564 included beneficiaries, 13.2% were categorized as insulin only, 53.5% OAA only, 7.2% both OAA and insulin, and 26.0% no reimbursed diabetes medications. Over half (58.7% were femle. The insulin only category had the highest mean (± SD number of SMBG test strips claimed per day (2.0 ± 1.5 with a mean annual total cost of $615 ± $441/beneficiary. Beneficiaries aged 80 years and above claimed fewer test strips than beneficiaries below 80 years. Conclusion This population based study shows that in Nova Scotia the SMBG test strips claimed by the majority of seniors were within Canadian guidelines. However, a small proportion of beneficiaries claimed for SMBG test strips infrequently or too frequently, which suggests areas for improvement. The provincial drug plan covers the majority of the costs of test strip utilization, suggesting that the majority of test

  4. From Barcode to QR Code Applications

    Directory of Open Access Journals (Sweden)

    László Várallyai

    2012-12-01

    Full Text Available This paper shows the Zsohár Horticulture Company in Nagyrákos, how they want to change their barcode identification system to QR code. They cultivate herbaceous, perpetual decorational plants, rock-garden, flower-bed and swamp perpetuals, decorational grasses and spices. A part of the perpetuals are evergreens, but most of them has special organs - such as onions, thick-, bulbous roots, "winter-proof" buds - so they can survive winter. In the first part of the paper I introduce the different barcode standards, how can it be printed and how can it be read. In the second part of the paper I give details about the quick response code (QR code and the two-dimensional (2D barcode. Third part of this paper illustrates the QR code usability in agriculture focused on the gardening.

  5. Consensus Recommendations for Advancing Breast Cancer: Risk Identification and Screening in Ethnically Diverse Younger Women

    Directory of Open Access Journals (Sweden)

    Alexander Stojadinovic, Thomas A Summers, John Eberhardt, Albert Cerussi, Warren Grundfest, Charles M. Peterson, Michael Brazaitis, Elizabeth Krupinski, Harold Freeman

    2011-01-01

    Full Text Available A need exists for a breast cancer risk identification paradigm that utilizes relevant demographic, clinical, and other readily obtainable patient-specific data in order to provide individualized cancer risk assessment, direct screening efforts, and detect breast cancer at an early disease stage in historically underserved populations, such as younger women (under age 40 and minority populations, who represent a disproportionate number of military beneficiaries. Recognizing this unique need for military beneficiaries, a consensus panel was convened by the USA TATRC to review available evidence for individualized breast cancer risk assessment and screening in young (< 40, ethnically diverse women with an overall goal of improving care for military beneficiaries. In the process of review and discussion, it was determined to publish our findings as the panel believes that our recommendations have the potential to reduce health disparities in risk assessment, health promotion, disease prevention, and early cancer detection within and in other underserved populations outside of the military. This paper aims to provide clinicians with an overview of the clinical factors, evidence and recommendations that are being used to advance risk assessment and screening for breast cancer in the military.

  6. cDNA cloning and transient expression of the Epstein-Barr virus-determined nuclear antigen EBNA3B in human cells and identification of novel transcripts from its coding region.

    OpenAIRE

    Kerdiles, B; Walls, D; Triki, H.; Perricaudet, M; Joab, I

    1990-01-01

    Recombinant plasmids containing sequences from the BamHI-E rightward reading frames 2a and 2b (BERF2a and 2b) of the Epstein-Barr virus (EBV) genome were isolated from a library of cDNA clones which had been previously made from the EBV B95-8 lymphoblastoid cell line (M. Bodescot, O. Brison, and M. Perricaudet, Nucleic Acids Res. 14:7103-7114, 1986). The characterization of these clones in combination with RNase mapping experiments led to the identification of one leftward and several rightwa...

  7. Legal Interpretation on Abstract Designation of Insurance Beneficiary%抽象指定下保险受益人确定的法理解释

    Institute of Scientific and Technical Information of China (English)

    李娟

    2015-01-01

    我国保险实务上,被保险人指定受益人时多采用抽象指定方式,即身份指定方式。一旦被保险人与受益人身份关系发生变化,如何确定受益人,司法裁判与学术界分歧颇大。依保险法与民法之法理解释,受益人确定应尊重被保险人真意,其路径应为对抽象指定方式这一意思表示行为本身进行解释。由此得出的结论是,受益人应该为被保险人死亡之时具有与之相关身份之人。%In the insurance practice in China,sometimes the insured appoints beneficiary by means of abstract designation,that is to say an identity designation.If the relationship between the in-sured and the beneficiary changes,who is the real beneficiary will be a problem.On this issue,the judicial and academic circles have disagreements.In accordance with legal interpretation of the in-surance law and civil law,the insured′s wish about who is beneficiary should be respected,and the solution to the problem is to interpret the abstract designation itself.The paper concludes that the beneficiary should have the corresponding relationship with the insured when the insured dies.

  8. Stability of return to work after a coordinated and tailored intervention for sickness absence compensation beneficiaries with mental health problems

    DEFF Research Database (Denmark)

    Martin, Marie H. T.; D. Nielsen, Maj Britt; Pedersen, Jacob;

    2015-01-01

    , coordinated and tailored RTW-intervention in terms of stability of RTW, cumulative sickness absence and labour market status after 2 years among sickness absence compensation beneficiaries with MHPs. METHODS: In a quasi-randomised, controlled trial, we followed recipients of the intervention (n = 88) and of...... conventional case management (n = 80) for 2 years to compare their risk of recurrent sickness absence and unemployment after RTW, their cumulative sickness absence and their labour market status after 2 years. RESULTS: We found no statistically significant intervention effect in terms of the risk of recurrent...... problems is limited, as most research to date has been done in the context of musculoskeletal disorders. A complex, multidisciplinary intervention, detached from the workplace, does not appear to improve the stability of RTW and may actually lead to more sickness absence days and less self-support when...

  9. Privacy Act of 1974; matching program--HCFA. Notice of a matching program--the Internal Revenue Service (IRS), the Social Security Administration (SSA), and HCFA--disclosure of IRS taxpayer identity and filing status information to be matched with SSA earned income information for Medicare beneficiaries and their spouses.

    Science.gov (United States)

    1990-09-21

    As required by Section 6202 of the Omnibus Budget Reconciliation Act of 1989 (OBRA 1989), Public Law 101-239, the Department of Health and Human Services is providing public notice that the IRS and the SSA will disclose certain information regarding the taxpayer identification and filing status and the earned income of Medicare beneficiaries and their spouses for HCFA's use in identifying Medicare secondary payer (MSP) situations. This will enable HCFA to seek recovery of identified mistaken payments that were the liability of another primary insurer or other type of payer. The matching report set forth below is in compliance with the Computer Matching and Privacy Protection Act of 1988 (Pub. L. No. 100-503). PMID:10107026

  10. Polyphase alternating codes

    OpenAIRE

    M. Markkanen; Vierinen, J.; Markkanen, J.

    2007-01-01

    We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We ...

  11. Metal Emissions and Urban Incident Parkinson Disease: A Community Health Study of Medicare Beneficiaries by Using Geographic Information Systems

    Science.gov (United States)

    Willis, Allison W.; Evanoff, Bradley A.; Lian, Min; Galarza, Aiden; Wegrzyn, Andrew; Schootman, Mario; Racette, Brad A.

    2010-01-01

    Parkinson disease associated with farming and exposure to agricultural chemicals has been reported in numerous studies; little is known about Parkinson disease risk factors for those living in urban areas. The authors investigated the relation between copper, lead, or manganese emissions and Parkinson disease incidence in the urban United States, studying 29 million Medicare beneficiaries in the year 2003. Parkinson disease incidence was determined by using beneficiaries who had not changed residence since 1995. Over 35,000 nonmobile incident Parkinson disease cases, diagnosed by a neurologist, were identified for analysis. Age-, race-, and sex-standardized Parkinson disease incidence was compared between counties with high cumulative industrial release of copper, manganese, or lead (as reported to the Environmental Protection Agency) and counties with no/low reported release of all 3 metals. Parkinson disease incidence (per 100,000) in counties with no/low copper/lead/manganese release was 274.0 (95% confidence interval (CI): 226.8, 353.5). Incidence was greater in counties with high manganese release: 489.4 (95% CI: 368.3, 689.5) (relative risk = 1.78, 95% CI: 1.54, 2.07) and counties with high copper release: 304.2 (95% CI: 276.0, 336.8) (relative risk = 1.1, 95% CI: 0.94, 1.31). Urban Parkinson disease incidence is greater in counties with high reported industrial release of copper or manganese. Environmental exposure to metals may be a risk factor for Parkinson disease in urban areas. PMID:20959505

  12. Oral health service utilization by elderly beneficiaries of the Mexican Institute of Social Security in México city

    Directory of Open Access Journals (Sweden)

    Solórzano-Santos Fortino

    2007-12-01

    Full Text Available Abstract Background The aging population poses a challenge to Mexican health services. The aim of this study is to describe recent oral health services utilization and its association with socio-demographic characteristics and co-morbidity in Mexican Social Security beneficiaries 60 years and older. Methods A sample of 700 individuals aged 60+ years was randomly chosen from the databases of the Mexican Institute of Social Security (IMSS. These participants resided in the southwest of Mexico City and made up the final sample of a cohort study for identifying risk factors for root caries in elderly patients. Sociodemographic variables, presence of cognitive decline, depression, morbidity, medication consumption, and utilization of as well as reasons for seeking oral health services within the past 12 months were collected through a questionnaire. Clinical oral assessments were carried out to determine coronal and root caries experience. Results The sample consisted of 698 individuals aged 71.6 years on average, of whom 68.3% were women. 374 participants (53.6% had made use of oral health services within the past 12 months. 81% of those who used oral health services sought private medical care, 12.8% sought social security services, and 6.2% public health services. 99.7% had experienced coronal caries and 44.0% root caries. Female sex (OR = 2.0, 6 years' schooling or less (OR = 1.4, and caries experience in more than 22 teeth (OR = 0.6 are factors associated with the utilization of these services. Conclusion About half the elderly beneficiaries of social security have made use of oral health services within the past 12 months, and many of them have to use private services. Being a woman, having little schooling, and low caries experience are factors associated with the use of these services.

  13. Construction of Codes for Network Coding

    CERN Document Server

    Elsenhans, Andreas-Stephan; Wassermann, Alfred

    2010-01-01

    Based on ideas of K\\"otter and Kschischang we use constant dimension subspaces as codewords in a network. We show a connection to the theory of q-analogues of a combinatorial designs, which has been studied in Braun, Kerber and Laue as a purely combinatorial object. For the construction of network codes we successfully modified methods (construction with prescribed automorphisms) originally developed for the q-analogues of a combinatorial designs. We then give a special case of that method which allows the construction of network codes with a very large ambient space and we also show how to decode such codes with a very small number of operations.

  14. Sequence of the intron/exon junctions of the coding region of the human androgen receptor gene and identification of a point mutation in a family with complete androgen insensitivity

    International Nuclear Information System (INIS)

    Androgens act through a receptor protein (AR) to mediate sex differentiation and development of the male phenotype. The authors have isolated the eight exons in the amino acid coding region of the AR gene from a human X chromosome library. Nucleotide sequences of the AR gene intron/exon boundaries were determined for use in designing synthetic oligonucleotide primers to bracket coding exons for amplification by the polymerase chain reaction. Genomic DNA was amplified from 46, XY phenotypic female siblings with complete androgen insensitivity syndrome. AR binding affinity for dihydrotestosterone in the affected siblings was lower than in normal males, but the binding capacity was normal. Sequence analysis of amplified exons demonstrated within the AR steroid-binding domain (exon G) a single guanine to adenine mutation, resulting in replacement of valine with methionine at amino acid residue 866. As expected, the carrier mother had both normal and mutant AR genes. Thus, a single point mutation in the steroid-binding domain of the AR gene correlated with the expression of an AR protein ineffective in stimulating male sexual development

  15. TIPONLINE Code Table

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Coded items are entered in the tiponline data entry program. The codes and their explanations are necessary in order to use the data

  16. Balanced Permutation Codes

    OpenAIRE

    Gabrys, Ryan; Milenkovic, Olgica

    2016-01-01

    Motivated by charge balancing constraints for rank modulation schemes, we introduce the notion of balanced permutations and derive the capacity of balanced permutation codes. We also describe simple interleaving methods for permutation code constructions and show that they approach capacity

  17. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  18. On Coding Non-Contiguous Letter Combinations

    Directory of Open Access Journals (Sweden)

    Frédéric eDandurand

    2011-06-01

    Full Text Available Starting from the hypothesis that printed word identification initially involves the parallel mapping of visual features onto location-specific letter identities, we analyze the type of information that would be involved in optimally mapping this location-specific orthographic code onto a location-invariant lexical code. We assume that some intermediate level of coding exists between individual letters and whole words, and that this involves the representation of letter combinations. We then investigate the nature of this intermediate level of coding given the constraints of optimality. This intermediate level of coding is expected to compress data while retaining as much information as possible about word identity. Information conveyed by letters is a function of how much they constrain word identity and how visible they are. Optimization of this coding is a combination of minimizing resources (using the most compact representations and maximizing information. We show that in a large proportion of cases, non-contiguous letter sequences contain more information than contiguous sequences, while at the same time requiring less precise coding. Moreover, we found that the best predictor of human performance in orthographic priming experiments was within-word ranking of conditional probabilities, rather than average conditional probabilities. We conclude that from an optimality perspective, readers learn to select certain contiguous and non-contiguous letter combinations as information that provides the best cue to word identity.

  19. Unfolding the color code

    OpenAIRE

    Kubica, Aleksander; Yoshida, Beni; Pastawski, Fernando

    2015-01-01

    The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the ...

  20. Informal control code logic

    OpenAIRE

    Bergstra, J. A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  1. Informal Control code logic

    OpenAIRE

    Bergstra, Jan A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  2. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow the...

  3. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a...

  4. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of...

  5. The Procions` code; Le code Procions

    Energy Technology Data Exchange (ETDEWEB)

    Deck, D.; Samba, G.

    1994-12-19

    This paper presents a new code to simulate plasmas generated by inertial confinement. This multi-kinds kinetic code is done with no angular approximation concerning ions and will work in plan and spherical geometry. First, the physical model is presented, using Fokker-Plank. Then, the numerical model is introduced in order to solve the Fokker-Plank operator under the Rosenbluth form. At the end, several numerical tests are proposed. (TEC). 17 refs., 27 figs.

  6. Universal Rateless Codes From Coupled LT Codes

    CERN Document Server

    Aref, Vahid

    2011-01-01

    It was recently shown that spatial coupling of individual low-density parity-check codes improves the belief-propagation threshold of the coupled ensemble essentially to the maximum a posteriori threshold of the underlying ensemble. We study the performance of spatially coupled low-density generator-matrix ensembles when used for transmission over binary-input memoryless output-symmetric channels. We show by means of density evolution that the threshold saturation phenomenon also takes place in this setting. Our motivation for studying low-density generator-matrix codes is that they can easily be converted into rateless codes. Although there are already several classes of excellent rateless codes known to date, rateless codes constructed via spatial coupling might offer some additional advantages. In particular, by the very nature of the threshold phenomenon one expects that codes constructed on this principle can be made to be universal, i.e., a single construction can uniformly approach capacity over the cl...

  7. Flow regimes and heat transfer modes identification in ANGRA 2 core, during small break in the primary loop with area of 100 cm2, simulated with RELAP5 code

    International Nuclear Information System (INIS)

    Identifying the flow regimes and the heat transfer modes is important for the analysis of accidents such as the Loss-of-Coolant Accident (LOCA). The aim of this paper is to identify the flow regimes, the heat transfer modes, and the correlations used in the RELAP5/MOD3.2.gama code in ANGRA 2 during the Small-Break Loss-of-Coolant Accident (SBLOCA) with a 100cm2-rupture area in the cold leg of primary loop. The Chapter 15 of the Final Safety Analysis Report of ANGRA 2 (FSAR - A2) reports this specific kind of accident. The results from this work demonstrated the several flow regimes and heat transfer modes that can be present in the core of ANGRA 2 during the postulated accident. (author)

  8. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important to...... understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  9. Codes from difference sets

    CERN Document Server

    Ding, Cunsheng

    2014-01-01

    This is the first monograph on codebooks and linear codes from difference sets and almost difference sets. It aims at providing a survey of constructions of difference sets and almost difference sets as well as an in-depth treatment of codebooks and linear codes from difference sets and almost difference sets. To be self-contained, this monograph covers necessary mathematical foundations and the basics of coding theory. It also contains tables of best BCH codes and best cyclic codes over GF(2) and GF(3) up to length 125 and 79, respectively. This repository of tables can be used to benchmark

  10. (Sigma-Delta) Codes

    OpenAIRE

    Boulagouaz, M.; Leroy, A

    2013-01-01

    In this paper we introduce the notion of cyclic ($f(t),\\sigma,\\delta$)-codes for $f(t)\\in \\Ore$. These codes generalize the $\\theta$-codes as introduced by D. Boucher, F. Ulmer, W. Geiselmann \\cite{BGU}. We construct generic and control matrices for these codes. As a particular case the ($\\si,\\de$)-$W$-code associated to a Wedderburn polynomial are defined and we show that their control matrices are given by generalized Vandermonde matrices. All the Wedderburn polynomials of $\\mathbb F_q[t;\\t...

  11. ATM Security Using Fingerprint Biometric Identifer: An Investigative Study

    OpenAIRE

    Moses Okechukwu Onyesolu; Ignatius Majesty Ezeani

    2012-01-01

    The growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use personal identification numbers (PIN's) for identification and security clearances. Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. An embedded fingerprint biometric auth...

  12. UPTF test instrumentation. Measurement system identification, engineering units and computed parameters

    International Nuclear Information System (INIS)

    This modified and revised version of the preceding report provides a comprehensive coverage of the information on the identification of the measurement system for the complete conventional and advanced instrumentation used in the Upper Plenum Test Facility - UPTF. In particular, the list of the measurement system identification, e.g. measuring instruments, sensor location, uncertainties, measurement identification code etc., has been updated and amended to include the identification codes for the computed parameters. The measurement identification codes, which also stand for the identification of the corresponding measured quantities in engineering units, and the identification codes derived therefrom for the computed parameters have been adequately defined in the description of the measurement system identification. (orig.)

  13. XSOR codes users manual

    International Nuclear Information System (INIS)

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  14. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  15. Remote-Handled Transuranic Content Codes

    International Nuclear Information System (INIS)

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document represents the development of a uniform content code system for RH-TRU waste to be transported in the 72-Bcask. It will be used to convert existing waste form numbers, content codes, and site-specific identification codes into a system that is uniform across the U.S. Department of Energy (DOE) sites.The existing waste codes at the sites can be grouped under uniform content codes without any lossof waste characterization information. The RH-TRUCON document provides an all-encompassing description for each content code and compiles this information for all DOE sites. Compliance with waste generation, processing, and certification procedures at the sites (outlined in this document foreach content code) ensures that prohibited waste forms are not present in the waste. The content code gives an overall description of the RH-TRU waste material in terms of processes and packaging, as well as the generation location. This helps to provide cradle-to-grave traceability of the waste material so that the various actions required to assess its qualification as payload for the 72-B cask can be performed. The content codes also impose restrictions and requirements on the manner in which a payload can be assembled. The RH-TRU Waste Authorized Methods for Payload Control (RH-TRAMPAC), Appendix 1.3.7 of the 72-B Cask Safety Analysis Report (SAR), describes the current governing procedures applicable for the qualification of waste as payload for the 72-B cask. The logic for this classification is presented in the 72-B Cask SAR. Together, these documents (RH-TRUCON, RH-TRAMPAC, and relevant sections of the 72-B Cask SAR) present the foundation and justification for classifying RH-TRU waste into content codes. Only content codes described in thisdocument can be considered for transport in the 72-B cask. Revisions to this document will be madeas additional waste qualifies for transport. Each content code uniquely

  16. Permutation codes for sources.

    Science.gov (United States)

    Berger, T.; Jelinek, F.; Wolf, J. K.

    1972-01-01

    Source encoding techniques based on permutation codes are investigated. For a broad class of distortion measures it is shown that optimum encoding of a source permutation code is easy to instrument even for very long block lengths. Also, the nonparametric nature of permutation encoding is well suited to situations involving unknown source statistics. For the squared-error distortion measure a procedure for generating good permutation codes of a given rate and block length is described. The performance of such codes for a memoryless Gaussian source is compared both with the rate-distortion function bound and with the performance of various quantization schemes. The comparison reveals that permutation codes are asymptotically ideal for small rates and perform as well as the best entropy-coded quantizers presently known for intermediate rates. They can be made to compare favorably at high rates, too, provided the coding delay associated with extremely long block lengths is tolerable.

  17. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Property testing was initially studied from various motivations in 1990’s. A code C  GF (r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector’s coordinates. The problem of testing codes was firstly studied by Blum, Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs). How to characterize locally testable codes is a complex and challenge problem. The local tests have been studied for Reed-Solomon (RS), Reed-Muller (RM), cyclic, dual of BCH and the trace subcode of algebraicgeometric codes. In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions). We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  18. Chinese remainder codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Aili; LIU Xiufeng

    2006-01-01

    Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory.The new type of linear codes take the congruence class in the congruence class ring R/I1 ∩ I2 ∩…∩ In for the information bit,embed R/Ji into R/I1 ∩ I2 ∩…∩ In,and assign the cosets of R/Ji as the subring of R/I1 ∩ I2 ∩…∩ In and the cosets of R/Ji in R/I1 ∩ I2 ∩…∩ In as check lines.Many code classes exist in the Chinese remainder codes that have high code rates.Chinese remainder codes are the essential generalization of Sun Zi codes.

  19. Chinese Remainder Codes

    Institute of Scientific and Technical Information of China (English)

    张爱丽; 刘秀峰; 靳蕃

    2004-01-01

    Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I1∩I2∩…∩In for the information bit, embed R/Ji into R/I1∩I2∩…∩In, and asssign the cosets of R/Ji as the subring of R/I1∩I2∩…∩In and the cosets of R/Ji in R/I1∩I2∩…∩In as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes.

  20. Optimal patch code design via device characterization

    Science.gov (United States)

    Wu, Wencheng; Dalal, Edul N.

    2012-01-01

    In many color measurement applications, such as those for color calibration and profiling, "patch code" has been used successfully for job identification and automation to reduce operator errors. A patch code is similar to a barcode, but is intended primarily for use in measurement devices that cannot read barcodes due to limited spatial resolution, such as spectrophotometers. There is an inherent tradeoff between decoding robustness and the number of code levels available for encoding. Previous methods have attempted to address this tradeoff, but those solutions have been sub-optimal. In this paper, we propose a method to design optimal patch codes via device characterization. The tradeoff between decoding robustness and the number of available code levels is optimized in terms of printing and measurement efforts, and decoding robustness against noises from the printing and measurement devices. Effort is drastically reduced relative to previous methods because print-and-measure is minimized through modeling and the use of existing printer profiles. Decoding robustness is improved by distributing the code levels in CIE Lab space rather than in CMYK space.

  1. Application of isotope coded affinity tag (ICAT) analysis for the identification of differentially expressed proteins following infection of atlantic salmon (Salmo salar) with infectious hematopoietic necrosis virus (IHNV) or Renibacterium salmoninarum (BKD).

    Science.gov (United States)

    Booy, A T; Haddow, J D; Ohlund, L B; Hardie, D B; Olafson, R W

    2005-01-01

    Aquaculture and commercial fisheries worldwide suffer from significant economic loss due to diseases of net-pen reared fish. In British Columbia, infectious hematopoietic necrosis (IHN) and bacterial kidney disease (BKD) epidemics occur because there are currently no commercially available drugs or fully licensed vaccines to treat these diseases. With a better understanding of the molecular mechanisms underlying these diseases, this circumstance might be significantly improved. In the present study, we have used a proteomics approach in an effort to identify and quantitate differentially expressed proteins in the liver and kidneys of diseased and healthy Atlantic salmon (Salmo salar). Isotope coded affinity tagging (ICAT), 2D gel electrophoresis, and multidimensional liquid chromatography coupled to tandem mass spectrometry (2D-LC MS/MS) were used to identify hundreds of differentially expressed proteins. While the direct significance of changes in expression levels of many proteins remains to be elucidated, others appear to be more clearly related to the infectious process. Examples of the latter are discussed here and include, a natural killer cell enhancement factor (NKEF), procathepsin L, superoxide-producing NADPH oxidase and interferon-induced viral resistance protein Mx (IFI-Mx). PMID:15822907

  2. Hominoid-specific de novo protein-coding genes originating from long non-coding RNAs.

    Directory of Open Access Journals (Sweden)

    Chen Xie

    2012-09-01

    Full Text Available Tinkering with pre-existing genes has long been known as a major way to create new genes. Recently, however, motherless protein-coding genes have been found to have emerged de novo from ancestral non-coding DNAs. How these genes originated is not well addressed to date. Here we identified 24 hominoid-specific de novo protein-coding genes with precise origination timing in vertebrate phylogeny. Strand-specific RNA-Seq analyses were performed in five rhesus macaque tissues (liver, prefrontal cortex, skeletal muscle, adipose, and testis, which were then integrated with public transcriptome data from human, chimpanzee, and rhesus macaque. On the basis of comparing the RNA expression profiles in the three species, we found that most of the hominoid-specific de novo protein-coding genes encoded polyadenylated non-coding RNAs in rhesus macaque or chimpanzee with a similar transcript structure and correlated tissue expression profile. According to the rule of parsimony, the majority of these hominoid-specific de novo protein-coding genes appear to have acquired a regulated transcript structure and expression profile before acquiring coding potential. Interestingly, although the expression profile was largely correlated, the coding genes in human often showed higher transcriptional abundance than their non-coding counterparts in rhesus macaque. The major findings we report in this manuscript are robust and insensitive to the parameters used in the identification and analysis of de novo genes. Our results suggest that at least a portion of long non-coding RNAs, especially those with active and regulated transcription, may serve as a birth pool for protein-coding genes, which are then further optimized at the transcriptional level.

  3. Atypical Fiscal States: Fiscal Inactivity State and the Fiscal Body Ex-Officio Cancellation of the Registration Code for VAT Purposes

    Directory of Open Access Journals (Sweden)

    Răducu Emil Buziernescu

    2013-11-01

    Full Text Available The state of fiscal inactivity of a tax payer, as well as the cancellation of the registration code for VAT purposes, generate important fiscal effects, both for the tax payers concerned and for the beneficiaries that purchase goods and services from them. In case these tax payers continue to develop economic activities, they are subject to the obligations regarding the payment of the taxes and dues stipulated by the law, but, in the respective period, they do not benefit from the right of deductibility of expenses and of the value added tax corresponding to the purchases performed. Correlatively, the beneficiaries that purchase goods and services from such persons do not have the right to deduct the value added tax corresponding to the acquisitions performed and of the respective expenses. In this article, we shall present the legal status of these atypical fiscal states, respectively: the situations that generate these states, the fiscal effects produced on the suppliers/providers; the fiscal effects on the beneficiaries; the situations of reactivating or re-registering of the tax p

  4. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  5. Self-reported colorectal cancer screening of Medicare beneficiaries in family medicine vs. internal medicine practices in the United States: a cross-sectional study

    Directory of Open Access Journals (Sweden)

    Higgins Angela Y

    2012-03-01

    Full Text Available Abstract Background The benefit of screening for decreasing the risk of death from colorectal cancer (CRC has been shown, yet many patients in primary care are still not undergoing screening according to guidelines. There are known variations in delivery of preventive health care services among primary care physicians. This study compared self-reported CRC screening rates and patient awareness of the need for CRC screening of patients receiving care from family medicine (FPs vs. internal medicine (internists physicians. Methods Nationally representative sample of non-institutionalized beneficiaries who received medical care from FPs or internists in 2006 (using Medicare Current Beneficiary Survey. The main outcome was the percentage of patients screened in 2007. We also examined the percentage of patients offered screening. Results Patients of FPs, compared to those of internists, were less likely to have received an FOBT kit or undergone home FOBT, even after accounting for patients' characteristics. Compared to internists, FPs' patients were more likely to have heard of colonoscopy, but were less likely to receive a screening colonoscopy recommendation (18% vs. 27%, or undergo a colonoscopy (43% vs. 46%, adjusted odds ratios [AOR], 95% confidence interval [CI]-- 0.65, 0.51-0.81 or any CRC screening (52% vs. 60%, AOR, CI--0.80, 0.68-0.94. Among subgroups examined, higher income beneficiaries receiving care from internists had the highest screening rate (68%, while disabled beneficiaries receiving care from FPs had the lowest screening rate (34%. Conclusion Patients cared for by FPs had a lower rate of screening compared to those cared for by internists, despite equal or higher levels of awareness; a difference that remained statistically significant after accounting for socioeconomic status and access to healthcare. Both groups of patients remained below the national goal of 70 percent.

  6. Main food sources of carotenoids, according to the purpose and degree of processing, for beneficiaries of the 'Bolsa Família' in Brazil

    OpenAIRE

    Alan Giovanini de Oliveira Sartori; Marina Vieira da Silva

    2014-01-01

    The intake of carotenoids is associated with antioxidant properties and some of these substances have activity of pro-vitamin A. This study aimed to estimate the intake of carotenoids (average values) by the Brazilian population focusing on beneficiaries of the 'Bolsa Família' Program and identify the dietary sources, according to the purpose and degree of processing and the inclusion of food additives. The database used is the personal food consumption module of the Household Budget Survey o...

  7. Security of QR Codes

    OpenAIRE

    Kapsalis, Ioannis

    2013-01-01

    The 2-dimensional barcodes known as QR (Quick Response) Codesare increasing their popularity as they appear in more places in theurban environment. QR Codes can be considered as physical hyper-linksthat give the ability to users to access, through their mobile devicesthat are able to scan QR Codes, additional information located in aweb-page. Apart from marketing, QR Codes have been also adopted indifferent areas such as the on-line payments. This development alongwith the trend that some of ...

  8. Practices in Code Discoverability

    OpenAIRE

    Teuben, Peter; Allen, Alice; Nemiroff, Robert J.; Shamir, Lior

    2012-01-01

    Much of scientific progress now hinges on the reliability, falsifiability and reproducibility of computer source codes. Astrophysics in particular is a discipline that today leads other sciences in making useful scientific components freely available online, including data, abstracts, preprints, and fully published papers, yet even today many astrophysics source codes remain hidden from public view. We review the importance and history of source codes in astrophysics and previous efforts to d...

  9. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  10. Progressive fractal coding

    OpenAIRE

    Kopilovic, Ivan; Saupe, Dietmar; Hamzaoui, Raouf

    2001-01-01

    Progressive coding is an important feature of compression schemes. Wavelet coders are well suited for this purpose because the wavelet coefficients can be naturally ordered according to decreasing importance. Progressive fractal coding is feasible, but it was proposed only for hybrid fractal-wavelet schemes. We introduce a progressive fractal image coder in the spatial domain. A Lagrange optimization based on rate-distortion performance estimates determines an optimal ordering of the code bit...

  11. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  12. Locally Repairable Codes

    OpenAIRE

    Papailiopoulos, Dimitris S.; Dimakis, Alexandros G.

    2012-01-01

    Distributed storage systems for large-scale applications typically use replication for reliability. Recently, erasure codes were used to reduce the large storage overhead, while increasing data reliability. A main limitation of off-the-shelf erasure codes is their high-repair cost during single node failure events. A major open problem in this area has been the design of codes that {\\it i)} are repair efficient and {\\it ii)} achieve arbitrarily high data rates. In this paper, we explore the r...

  13. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  14. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  15. Tokamak Systems Code

    International Nuclear Information System (INIS)

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  16. Particle identification

    International Nuclear Information System (INIS)

    A variety of subjects are addressed within the general context of searching for limitations in capability of particle identification due to high average rates. Topics receiving attention included Cerenkov ring imaging, transition radiation, synchrotron radiation, time-of-flight, high P spectrometer, heavy quark tagging with leptons, general purpose muon and electron detector, and dE/dx. It is concluded that particle identification will probably not represent a primary obstacle at luminosities of 1033cm-2sec-1

  17. The association of longitudinal and interpersonal continuity of care with emergency department use, hospitalization, and mortality among Medicare beneficiaries.

    Directory of Open Access Journals (Sweden)

    Suzanne E Bentler

    Full Text Available BACKGROUND: Continuity of medical care is widely believed to lead to better health outcomes and service utilization patterns for patients. Most continuity studies, however, have only used administrative claims to assess longitudinal continuity with a provider. As a result, little is known about how interpersonal continuity (the patient's experience at the visit relates to improved health outcomes and service use. METHODS: We linked claims-based longitudinal continuity and survey-based self-reported interpersonal continuity indicators for 1,219 Medicare beneficiaries who completed the National Health and Health Services Use Questionnaire. With these linked data, we prospectively evaluated the effect of both types of continuity of care indicators on emergency department use, hospitalization, and mortality over a five-year period. RESULTS: Patient-reported continuity was associated with reduced emergency department use, preventable hospitalization, and mortality. Most of the claims-based measures, including those most frequently used to assess continuity, were not associated with reduced utilization or mortality. CONCLUSION: Our results indicate that the patient- and claims-based indicators of continuity have very different effects on these important health outcomes, suggesting that reform efforts must include the patient-provider experience when evaluating health care quality.

  18. Research on universal combinatorial coding.

    Science.gov (United States)

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value. PMID:24772019

  19. Comparative Evaluation of Cash Benefit Scheme of Janani Suraksha Yojana for Beneficiary Mothers from Different Health Care Settings of Rewa District, Madhya Pradesh, India.

    Directory of Open Access Journals (Sweden)

    Trivedi R

    2014-05-01

    Full Text Available Introduction: For better outcomes in mother and child health, Government of India launched the National Rural Health Mission (NRHM in 2005 with a major objective of providing accessible, affordable and quality health care to the rural population; especially the vulnerable. Reduction in MMR to 100/100,000 is one of its goals and the Janani Suraksha Yojana (JSY is the key strategy of NRHM to achieve this reduction. The JSY, as a safe motherhood intervention and modified alternative of the National Maternity Benefit Scheme (NMBS, has been implemented in all states and Union territories with special focus on low performing states. The main objective and vision of JSY is to reduce maternal, neo-natal mortality and promote institutional delivery among the poor pregnant women of rural and urban areas. This scheme is 100% centrally sponsored and has an integrated delivery and post delivery care with the help of a key person i.e. ASHA (Accredited Social Health Activist, followed by cash monetary help to the women. Objectives: 1To evaluate cash benefit service provided under JSY at different health care settings. 2 To know the perception and elicit suggestions of beneficiaries on quality of cash benefit scheme of JSY. Methodology: This is a health care institute based observational cross sectional study including randomly selected 200 JSY beneficiary mothers from the different health care settings i.e., Primary Health Centres, Community Health Centres, District Hospital and Medical College Hospital of Rewa District of Madhya Pradesh state. Data was collected with the help of set pro forma and then analysed with Epi Info 2000. Chi square test was applied appropriately. Results: 60% and 80% beneficiaries from PHC and CHC received cash within 1 week after discharge whereas 100% beneficiaries of District Hospital and Medical College Hospital received cash at the time of discharge; the overall distribution of time of cash disbursement among beneficiaries of

  20. AZIMUT code abstract

    International Nuclear Information System (INIS)

    The brief description of the AZIMUT code for calculation the neutron flux in a cluster cell is presented. Code takes into account 1 and 2 azimuthal harmonics in the one-group P3-approximation and uses the heterogeneous approach. 2 refs

  1. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven...

  2. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alex

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  3. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  4. Computerized mega code recording.

    Science.gov (United States)

    Burt, T W; Bock, H C

    1988-04-01

    A system has been developed to facilitate recording of advanced cardiac life support mega code testing scenarios. By scanning a paper "keyboard" using a bar code wand attached to a portable microcomputer, the person assigned to record the scenario can easily generate an accurate, complete, timed, and typewritten record of the given situations and the obtained responses. PMID:3354937

  5. Codes of Conduct

    Science.gov (United States)

    Million, June

    2004-01-01

    Most schools have a code of conduct, pledge, or behavioral standards, set by the district or school board with the school community. In this article, the author features some schools that created a new vision of instilling code of conducts to students based on work quality, respect, safety and courtesy. She suggests that communicating the code…

  6. Code A1 Revised

    CERN Multimedia

    SC Secretariat

    2004-01-01

    Please note that the revised safety code A1 entitled 'MEDICAL CODE' is available on the web at the following url: https://edms.cern.ch/document/335476/last_released Paper copies can also be obtained from the SC Secretariat, e-mail : sc.secretariat@cern.ch SC Secretariat

  7. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  8. Fracture flow code

    International Nuclear Information System (INIS)

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  9. Code blue: seizures.

    Science.gov (United States)

    Hoerth, Matthew T; Drazkowski, Joseph F; Noe, Katherine H; Sirven, Joseph I

    2011-06-01

    Eyewitnesses frequently perceive seizures as life threatening. If an event occurs on the hospital premises, a "code blue" can be called which consumes considerable resources. The purpose of this study was to determine the frequency and characteristics of code blue calls for seizures and seizure mimickers. A retrospective review of a code blue log from 2001 through 2008 identified 50 seizure-like events, representing 5.3% of all codes. Twenty-eight (54%) occurred in inpatients; the other 22 (44%) events involved visitors or employees on the hospital premises. Eighty-six percent of the events were epileptic seizures. Seizure mimickers, particularly psychogenic nonepileptic seizures, were more common in the nonhospitalized group. Only five (17.9%) inpatients had a known diagnosis of epilepsy, compared with 17 (77.3%) of the nonhospitalized patients. This retrospective survey provides insights into how code blues are called on hospitalized versus nonhospitalized patients for seizure-like events. PMID:21546315

  10. Signal trend identification with fuzzy methods

    International Nuclear Information System (INIS)

    A fuzzy-logic-based methodology for on-line signal trend identification is introduced. Although signal trend identification is complicated by the presence of noise, fuzzy logic can help capture important features of on-line signals and classify incoming power plant signals into increasing, decreasing and steady-state trend categories. In order to verify the methodology, a code named PROTREN is developed and tested using plant data. The results indicate that the code is capable of detecting transients accurately, identifying trends reliably, and not misinterpreting a steady-state signal as a transient one

  11. JUPITER PROJECT - JOINT UNIVERSAL PARAMETER IDENTIFICATION AND EVALUATION OF RELIABILITY

    Science.gov (United States)

    The JUPITER (Joint Universal Parameter IdenTification and Evaluation of Reliability) project builds on the technology of two widely used codes for sensitivity analysis, data assessment, calibration, and uncertainty analysis of environmental models: PEST and UCODE.

  12. Optimizing ATLAS code with different profilers

    International Nuclear Information System (INIS)

    After the current maintenance period, the LHC will provide higher energy collisions with increased luminosity. In order to keep up with these higher rates, ATLAS software needs to speed up substantially. However, ATLAS code is composed of approximately 6M lines, written by many different programmers with different backgrounds, which makes code optimisation a challenge. To help with this effort different profiling tools and techniques are being used. These include well known tools, such as the Valgrind suite and Intel Amplifier; less common tools like Pin, PAPI, and GOoDA; as well as techniques such as library interposing. In this paper we will mainly focus on Pin tools and GOoDA. Pin is a dynamic binary instrumentation tool which can obtain statistics such as call counts, instruction counts and interrogate functions' arguments. It has been used to obtain CLHEP Matrix profiles, operations and vector sizes for linear algebra calculations which has provided the insight necessary to achieve significant performance improvements. Complimenting this, GOoDA, an in-house performance tool built in collaboration with Google, which is based on hardware performance monitoring unit events, is used to identify hot-spots in the code for different types of hardware limitations, such as CPU resources, caches, or memory bandwidth. GOoDA has been used in improvement of the performance of new magnetic field code and identification of potential vectorization targets in several places, such as Runge-Kutta propagation code

  13. Bar code usage in nuclear materials accountability

    International Nuclear Information System (INIS)

    The age old method of physically taking an inventory of materials by listing each item's identification number has lived beyond its usefulness. In this age of computerization, which offers the local grocery store a quick, sure, and easy means to inventory, it is time for nuclear materials facilities to automate accountability activities. The Oak Ridge Y-12 Plant began investigating the use of automated data collection devices in 1979. At that time, bar code and optical-character-recognition (OCR) systems were reviewed with the purpose of directly entering data into DYMCAS (Dynamic Special Nuclear Materials Control and Accountability System). Both of these systems appeared applicable; however, other automated devices already employed for production control made implementing the bar code and OCR seem improbable. However, the DYMCAS was placed on line for nuclear material accountability, a decision was made to consider the bar code for physical inventory listings. For the past several months a development program has been underway to use a bar code device to collect and input data to the DYMCAS on the uranium recovery operations. Programs have been completed and tested, and are being employed to ensure that data will be compatible and useful. Bar code implementation and expansion of its use for all nuclear material inventory activity in Y-12 is presented

  14. Application of RS Codes in Decoding QR Code

    Institute of Scientific and Technical Information of China (English)

    Zhu Suxia(朱素霞); Ji Zhenzhou; Cao Zhiyan

    2003-01-01

    The QR Code is a 2-dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code's virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm.

  15. Report number codes

    International Nuclear Information System (INIS)

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  16. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  17. Distributed multiple description coding

    CERN Document Server

    Bai, Huihui; Zhao, Yao

    2011-01-01

    This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC,

  18. Classical Holographic Codes

    CERN Document Server

    Brehm, Enrico M

    2016-01-01

    In this work, we introduce classical holographic codes. These can be understood as concatenated probabilistic codes and can be represented as networks uniformly covering hyperbolic space. In particular, classical holographic codes can be interpreted as maps from bulk degrees of freedom to boundary degrees of freedom. Interestingly, they are shown to exhibit features similar to those expected from the AdS/CFT correspondence. Among these are a version of the Ryu-Takayanagi formula and intriguing properties regarding bulk reconstruction and boundary representations of bulk operations. We discuss the relation of our findings with expectations from AdS/CFT and, in particular, with recent results from quantum error correction.

  19. Speaking In Code

    OpenAIRE

    Croxall, Brian

    2014-01-01

    Brian Croxall Emory University Over the last five years, there have been countless articles written about the digital humanities. It’s been called both the savior and the death knell of scholarship in the twenty-first century. But what do we mean when we say “digital humanities”? How “digital” and how “humanities” need we be? Why is so much faith being placed in code and code words? In this presentation, Brian Croxall argues that digital humanists need to speak in code less frequently and tha...

  20. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  1. Laser propagation code study

    OpenAIRE

    Rockower, Edward B.

    1985-01-01

    A number of laser propagation codes have been assessed as to their suitability for modeling Army High Energy Laser (HEL) weapons used in an anti- sensor mode. We identify a number of areas in which systems analysis HEL codes are deficient. Most notably, available HEL scaling law codes model the laser aperture as circular, possibly with a fixed (e.g. 10%) obscuration. However, most HELs have rectangular apertures with up to 30% obscuration. We present a beam-quality/aperture shape scaling rela...

  2. Enigma fuel performance code

    International Nuclear Information System (INIS)

    The Enigma fuel performance code has been developed jointly by BNFL and the CEGB's Berkeley Nuclear Laboratories. Its development arose from the need for a code capable of analysing all aspects of light water reactor (LWR) fuel behaviour which would also provide a suitable framework for future submodel development. The submodels incorporated into Enigma reflect the significant progress which has been made in recent years in modelling the important physical processes which determine fuel behaviour. The Enigma code has been subjected to an extensive programme of validation which has demonstrated its suitability for LWR performance analysis. (author)

  3. FORIST unfolding code

    International Nuclear Information System (INIS)

    The FERDOR method is widely used to unfold neutron energy spectra from pulse-height distributions measured with NE-213 spectrometers. Two unfolding codes COOLC (developed at ORNL) and FORIST (modified version of COOLC developed at UIUC) implement the FERDOR method and are distributed by RSIC. Each code package contains an NE-213 response matrix, sample input data, and sample output. The smoothing (window) widths which are distributed with COOLC are not the most appropriate for all neutron spectrum measurements. The FORIST code determines an optimum set of window widths according to the desired statistical error in the smoothed spectrum

  4. FORTRAN code-evaluation system

    Science.gov (United States)

    Capps, J. D.; Kleir, R.

    1977-01-01

    Automated code evaluation system can be used to detect coding errors and unsound coding practices in any ANSI FORTRAN IV source code before they can cause execution-time malfunctions. System concentrates on acceptable FORTRAN code features which are likely to produce undesirable results.

  5. No More Perfect Codes: Classification of Perfect Quantum Codes

    OpenAIRE

    Li, Zhuo; Xing, Lijuan

    2009-01-01

    We solve the problem of the classification of perfect quantum codes. We prove that the only nontrivial perfect quantum codes are those with the parameters . There exist no other nontrivial perfect quantum codes.

  6. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  7. Importance of Building Code

    Directory of Open Access Journals (Sweden)

    Reshmi Banerjee

    2015-06-01

    Full Text Available A building code, or building control, is a set of rules that specify the minimum standards for constructed objects such as buildings and non building structures. The main purpose of building codes are to protect public health, safety and general welfare as they relate to the construction and occupancy of buildings and structures. The building code becomes law of a particular jurisdiction when formally enacted by the appropriate governmental or private authority. Building codes are generally intended to be applied by architects, engineers, constructors and regulators but are also used for various purposes by safety inspectors, environmental scientists, real estate developers, subcontractors, manufacturers of building products and materials, insurance companies, facility managers, tenants and others.

  8. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  9. Induction technology optimization code

    International Nuclear Information System (INIS)

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  10. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  11. Der Code der Transparenz

    OpenAIRE

    Alloa, Emmanuel

    2015-01-01

    In allen Bereichen der Gesellschaft werden gegenwärtig Forderungen nach mehr Transparenz laut. Was steht hinter diesem Wort? Für Emmanuel Alloa wohnt der Transparenzforderung die Paradoxie inne, ein "codefreier Code" sein zu wollen.

  12. Genotypic Identification

    Science.gov (United States)

    In comparison with traditional, phenotype-based procedures for detection and identification of foodborne pathogen Listeria monocytogenes, molecular techniques are superior in terms of sensitivity, specificity and speed. This chapter provides a comprehensive review on the use of molecular methods for...

  13. The moment code BEDLAM

    Energy Technology Data Exchange (ETDEWEB)

    Channell, P.J.; Healy, L.M.; Lysenko, W.P.

    1985-10-01

    This paper describes the status of BEDLAM and presents the results of some tests. We simulated a section of radio-frequency quadrupole (RFQ) linac, neglecting space charge, to test the new code. Agreement with a Particle-In-Cell (PIC) simulation was excellent. We also verified that the fourth-order solution is more accurate than the second-order solution, which indicates the convergence of the method. We believe these results justify the continued development of moment simulation codes.

  14. Code-Pointer Integrity

    OpenAIRE

    Volodymyr Kuznetsov; Laszlo Szekeres; Mathias Payer; George Candea; Sekar, R.; Dawn Song

    2014-01-01

    Systems code is often written in low-level languages like C/C++, which offer many benefits but also delegate memory management to programmers. This invites memory safety bugs that attackers can exploit to divert control flow and compromise the system. Deployed defense mechanisms (e.g., ASLR, DEP) are incomplete, and stronger defense mechanisms (e.g., CFI) often have high overhead and limited guarantees [19, 15, 9]. We introduce code-pointer integrity (CPI), a new design point that guarantees...

  15. Towards advanced code simulators

    International Nuclear Information System (INIS)

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  16. Secure Fractal Image Coding

    OpenAIRE

    Lian, Shiguo

    2007-01-01

    In recent work, various fractal image coding methods are reported, which adopt the self-similarity of images to compress the size of images. However, till now, no solutions for the security of fractal encoded images have been provided. In this paper, a secure fractal image coding scheme is proposed and evaluated, which encrypts some of the fractal parameters during fractal encoding, and thus, produces the encrypted and encoded image. The encrypted image can only be recovered by the correct ke...

  17. Coding of auditory space

    OpenAIRE

    Konishi­, Masakazu

    2003-01-01

    Behavioral, anatomical, and physiological approaches can be integrated in the study of sound localization in barn owls. Space representation in owls provides a useful example for discussion of place and ensemble coding. Selectivity for space is broad and ambiguous in low-order neurons. Parallel pathways for binaural cues and for different frequency bands converge on high-order space-specific neurons, which encode space more precisely. An ensemble of broadly tuned place-coding neurons may conv...

  18. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  19. PEAR code review

    International Nuclear Information System (INIS)

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  20. On Expanded Cyclic Codes

    CERN Document Server

    Wu, Yingquan

    2008-01-01

    The paper has a threefold purpose. The first purpose is to present an explicit description of expanded cyclic codes defined in $\\GF(q^m)$. The proposed explicit construction of expanded generator matrix and expanded parity check matrix maintains the symbol-wise algebraic structure and thus keeps many important original characteristics. The second purpose of this paper is to identify a class of constant-weight cyclic codes. Specifically, we show that a well-known class of $q$-ary BCH codes excluding the all-zero codeword are constant-weight cyclic codes. Moreover, we show this class of codes achieve the Plotkin bound. The last purpose of the paper is to characterize expanded cyclic codes utilizing the proposed expanded generator matrix and parity check matrix. We analyze the properties of component codewords of a codeword and particularly establish the precise conditions under which a codeword can be represented by a subbasis. With the new insights, we present an improved lower bound on the minimum distance of...

  1. KENO-V code

    International Nuclear Information System (INIS)

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  2. CERN access card: Introduction of a bar code

    CERN Multimedia

    Relations with the Host States Service

    2004-01-01

    Before the latest version of the implementation measures relating to Operational Circular No. 2 comes into force, we would like to inform you that, in future, CERN access cards may bear a bar code to transcribe the holder's identification number. Relations with the Host States Service http://www.cern.ch/relations/ Tel. 72848

  3. CERN access cards - Introduction of a bar code (Reminder)

    CERN Multimedia

    Relations with the Host States Service

    2004-01-01

    In accordance with the latest revised version of the implementation measures relating to Operational Circular No. 2, CERN access cards may bear a bar code transcribing the holder's identification number (the revised version of this subsidiary document to the aforementioned Circular will be published shortly). Relations with the Host States Service http://www.cern.ch/relations/ relations.secretariat@cern.ch Tel. 72848

  4. 20 CFR 422.112 - Employer identification numbers.

    Science.gov (United States)

    2010-04-01

    ... Procedures § 422.112 Employer identification numbers. (a) General. Most employers are required by section 6109 of the Internal Revenue Code and by Internal Revenue Service (IRS) regulations at 26 CFR 31.6011(b... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Employer identification numbers....

  5. Hierarchical Character-Word Models for Language Identification

    OpenAIRE

    Jaech, Aaron; Mulcaire, George; Hathi, Shobhit; Ostendorf, Mari; Smith, Noah A.

    2016-01-01

    Social media messages' brevity and unconventional spelling pose a challenge to language identification. We introduce a hierarchical model that learns character and contextualized word-level representations for language identification. Our method performs well against strong base- lines, and can also reveal code-switching.

  6. Accumulative Landings System Code Tables

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Code Tables Used In Landings System. These tables assign meanings to the codes that appear in the data tables. Code tables exist for species, gear, state, county,...

  7. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes.......Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  8. Mixed Burst Error Correcting Codes

    OpenAIRE

    Sethi, Amita

    2015-01-01

    In this paper, we construct codes which are an improvement on the previously known block wise burst error correcting codes in terms of their error correcting capabilities. Along with different bursts in different sub-blocks, the given codes also correct overlapping bursts of a given length in two consecutive sub-blocks of a code word. Such codes are called mixed burst correcting (mbc) codes.

  9. Nuclear code abstracts (1975 edition)

    International Nuclear Information System (INIS)

    Nuclear Code Abstracts is compiled in the Nuclear Code Committee to exchange information of the nuclear code developments among members of the committee. Enlarging the collection, the present one includes nuclear code abstracts obtained in 1975 through liaison officers of the organizations in Japan participating in the Nuclear Energy Agency's Computer Program Library at Ispra, Italy. The classification of nuclear codes and the format of code abstracts are the same as those in the library. (auth.)

  10. Algebraic geometric codes with applications

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2007-01-01

    The theory of linear error-correcting codes from algebraic geomet-ric curves (algebraic geometric (AG) codes or geometric Goppa codes) has been well-developed since the work of Goppa and Tsfasman, Vladut, and Zink in 1981-1982. In this paper we introduce to readers some recent progress in algebraic geometric codes and their applications in quantum error-correcting codes, secure multi-party computation and the construction of good binary codes.

  11. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  12. Coding and traceability for cells, tissues and organs for transplantation.

    Science.gov (United States)

    Strong, D Michael; Shinozaki, Naoshi

    2010-11-01

    Modern transplantation of cells, tissues and organs has been practiced within the last century achieving both life saving and enhancing results. Associated risks have been recognized including infectious disease transmission, malignancy, immune mediated disease and graft failure. This has resulted in establishment of government regulation, professional standard setting and establishment of vigilance and surveillance systems for early detection and prevention and to improve patient safety. The increased transportation of grafts across national boundaries has made traceability difficult and sometimes impossible. Experience during the first Gulf War with mis-identification of blood units coming from multiple countries without standardized coding and labeling has led international organizations to develop standardized nomenclature and coding for blood. Following this example, cell therapy and tissue transplant practitioners have also moved to standardization of coding systems. Establishment of an international coding system has progressed rapidly and implementation for blood has demonstrated multiple advantages. WHO has held two global consultations on human cells and tissues for transplantation, which recognized the global circulation of cells and tissues and growing commercialization and the need for means of coding to identify tissues and cells used in transplantation, are essential for full traceability. There is currently a wide diversity in the identification and coding of tissue and cell products. For tissues, with a few exceptions, product terminology has not been standardized even at the national level. Progress has been made in blood and cell therapies with a slow and steady trend towards implementation of the international code ISBT 128. Across all fields, there are now 3,700 licensed facilities in 66 countries. Efforts are necessary to encourage the introduction of a standardized international coding system for donation identification numbers, such as ISBT

  13. From Barcode to QR Code Applications

    OpenAIRE

    László Várallyai

    2012-01-01

    This paper shows the Zsohár Horticulture Company in Nagyrákos, how they want to change their barcode identification system to QR code. They cultivate herbaceous, perpetual decorational plants, rock-garden, flower-bed and swamp perpetuals, decorational grasses and spices. A part of the perpetuals are evergreens, but most of them has special organs - such as onions, thick-, bulbous roots, "winter-proof" buds - so they can survive winter. In the first part of the paper I introduce the different ...

  14. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  15. Improvement of QR Code Recognition Based on Pillbox Filter Analysis

    Directory of Open Access Journals (Sweden)

    Jia-Shing Sheu

    2013-04-01

    Full Text Available The objective of this paper is to perform the innovation design for improving the recognition of a captured QR code image with blur through the Pillbox filter analysis. QR code images can be captured by digital video cameras. Many factors contribute to QR code decoding failure, such as the low quality of the image. Focus is an important factor that affects the quality of the image. This study discusses the out-of-focus QR code image and aims to improve the recognition of the contents in the QR code image. Many studies have used the pillbox filter (circular averaging filter method to simulate an out-of-focus image. This method is also used in this investigation to improve the recognition of a captured QR code image. A blurred QR code image is separated into nine levels. In the experiment, four different quantitative approaches are used to reconstruct and decode an out-of-focus QR code image. These nine reconstructed QR code images using methods are then compared. The final experimental results indicate improvements in identification.

  16. The Aster code

    International Nuclear Information System (INIS)

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  17. Physical Layer Network Coding

    CERN Document Server

    Shengli, Zhang; Lam, Patrick P K

    2007-01-01

    A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to straightforward network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM) waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increase...

  18. Error coding simulations

    Science.gov (United States)

    Noble, Viveca K.

    1993-01-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  19. Coded source neutron imaging

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; Santos-Villalobos, Hector J [ORNL

    2011-01-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100 m) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100um and 10um aperture hole diameters show resolutions matching the hole diameters.

  20. Non-coding genome functions in diabetes.

    Science.gov (United States)

    Cebola, Inês; Pasquali, Lorenzo

    2016-01-01

    Most of the genetic variation associated with diabetes, through genome-wide association studies, does not reside in protein-coding regions, making the identification of functional variants and their eventual translation to the clinic challenging. In recent years, high-throughput sequencing-based methods have enabled genome-scale high-resolution epigenomic profiling in a variety of human tissues, allowing the exploration of the human genome outside of the well-studied coding regions. These experiments unmasked tens of thousands of regulatory elements across several cell types, including diabetes-relevant tissues, providing new insights into their mechanisms of gene regulation. Regulatory landscapes are highly dynamic and cell-type specific and, being sensitive to DNA sequence variation, can vary with individual genomes. The scientific community is now in place to exploit the regulatory maps of tissues central to diabetes etiology, such as pancreatic progenitors and adult islets. This giant leap forward in the understanding of pancreatic gene regulation is revolutionizing our capacity to discriminate between functional and non-functional non-coding variants, opening opportunities to uncover regulatory links between sequence variation and diabetes susceptibility. In this review, we focus on the non-coding regulatory landscape of the pancreatic endocrine cells and provide an overview of the recent developments in this field. PMID:26438568

  1. Aftershock identification

    OpenAIRE

    Zaliapin, Ilya; Gabrielov, Andrei; Keilis-Borok, Vladimir; Wong, Henry

    2007-01-01

    Earthquake aftershock identification is closely related to the question "Are aftershocks different from the rest of earthquakes?" We give a positive answer to this question and introduce a general statistical procedure for clustering analysis of seismicity that can be used, in particular, for aftershock detection. The proposed approach expands the analysis of Baiesi and Paczuski [PRE, 69, 066106 (2004)] based on the space-time-magnitude nearest-neighbor distance $\\eta$ between earthquakes. We...

  2. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes and...

  3. Phase-coded pulse aperiodic transmitter coding

    Directory of Open Access Journals (Sweden)

    I. I. Virtanen

    2009-07-01

    Full Text Available Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC, whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF. When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers – about seven milliseconds – whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  4. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi;

    2015-01-01

    The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered as...... waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access......, in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of...

  5. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  6. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  7. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  8. Decoding the productivity code

    DEFF Research Database (Denmark)

    Hansen, David

    , that is, the productivity code of the 21st century, is dissolved. Today, organizations are pressured for operational efficiency, often in terms of productivity, due to increased global competition, demographical changes, and use of natural resources. Taylor’s principles for rationalization founded...... that swing between rationalization and employee development. The productivity code is the lack of alternatives to this ineffective approach. This thesis decodes the productivity code based on the results from a 3-year action research study at a medium-sized manufacturing facility. During the project period....... The improvement system consists of five elements: The improvement process, participants, management, organization, and technology. The improvement system is not an organizational structure but rather a capability and readiness to organize the right improvement activities for a given challenge, i...

  9. A modular code supervisor

    International Nuclear Information System (INIS)

    Large industrial computer CEA codes in the field of scientific computing, mechanics, thermohydraulics, and neutronics, are decomposed in sets of separate modules. Each module performs a well-defined task and all information exchanged by the modules are contained in data structures, taken as input or given as output. The advantage of this structure is the great flexibility offered to experienced user to solve a large number of different problems, but to choose, order, monitor large sequences of modules and understand what each module requires as input and output is out of the interest of the common user. The aim is to conserve entirely this flexibility in dealing with knowledge relevant from scientific or technical fields and not from the code itself. The first part of this paper describes the three main steps of the software: specification phase, generating algorithm, translation in code command language. The second part describes how the authors obtain explanations from the modelization of operators and from a particular representation of the internal structure of the generated particular representation of the internal structure of the generated plan (triangular table) that lead to a generalization allowing synthesis of sequences of operators or the transformations of the total order of the generated plan in a partial one. The software is the first part of the modular codes supervisor. It was applied to CRONOS, neutronic reactor core code, which has the command language GIBIANE. It will be extended to the reactor calculations supervisor, SAGA, using the ensemble of the codes developed by CEA/DMT/SERMA

  10. Identification of Genes Coding for Exported Proteins of Actinobacillus actinomycetemcomitans

    OpenAIRE

    Mintz, Keith P.; Fives-Taylor, Paula M.

    1999-01-01

    Random fusions of genomic DNA fragments to a partial gene encoding a signal sequence-deficient bacterial alkaline phosphatase were utilized to screen for exported proteins of Actinobacillus actinomycetemcomitans in Escherichia coli. Twenty-four PhoA+ clones were isolated and sequenced. Membrane localization signals in the form of signal sequences were deduced from most of these sequences. Several of the deduced amino acid sequences were found to be homologous to known exported or membrane-ass...

  11. Simple method for identification of plasmid-coded proteins

    International Nuclear Information System (INIS)

    Proteins encoded by plasmid DNA are specifically labeled in uv-irradiated cells of Escherichia coli carrying recA and uvrA mutations because extensive degradation of the chromosome DNA occurs concurrently with amplification of plasmid DNA

  12. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  13. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  14. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well as...

  15. CONCEPT computer code

    International Nuclear Information System (INIS)

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  16. Aeroacoustic Prediction Codes

    Science.gov (United States)

    Gliebe, P; Mani, R.; Shin, H.; Mitchell, B.; Ashford, G.; Salamah, S.; Connell, S.; Huff, Dennis (Technical Monitor)

    2000-01-01

    This report describes work performed on Contract NAS3-27720AoI 13 as part of the NASA Advanced Subsonic Transport (AST) Noise Reduction Technology effort. Computer codes were developed to provide quantitative prediction, design, and analysis capability for several aircraft engine noise sources. The objective was to provide improved, physics-based tools for exploration of noise-reduction concepts and understanding of experimental results. Methods and codes focused on fan broadband and 'buzz saw' noise and on low-emissions combustor noise and compliment work done by other contractors under the NASA AST program to develop methods and codes for fan harmonic tone noise and jet noise. The methods and codes developed and reported herein employ a wide range of approaches, from the strictly empirical to the completely computational, with some being semiempirical analytical, and/or analytical/computational. Emphasis was on capturing the essential physics while still considering method or code utility as a practical design and analysis tool for everyday engineering use. Codes and prediction models were developed for: (1) an improved empirical correlation model for fan rotor exit flow mean and turbulence properties, for use in predicting broadband noise generated by rotor exit flow turbulence interaction with downstream stator vanes: (2) fan broadband noise models for rotor and stator/turbulence interaction sources including 3D effects, noncompact-source effects. directivity modeling, and extensions to the rotor supersonic tip-speed regime; (3) fan multiple-pure-tone in-duct sound pressure prediction methodology based on computational fluid dynamics (CFD) analysis; and (4) low-emissions combustor prediction methodology and computer code based on CFD and actuator disk theory. In addition. the relative importance of dipole and quadrupole source mechanisms was studied using direct CFD source computation for a simple cascadeigust interaction problem, and an empirical combustor

  17. Extended quantum color coding

    International Nuclear Information System (INIS)

    The quantum color coding scheme proposed by Korff and Kempe [e-print quant-ph/0405086] is easily extended so that the color coding quantum system is allowed to be entangled with an extra auxiliary quantum system. It is shown that in the extended scheme we need only ∼2√(N) quantum colors to order N objects in large N limit, whereas ∼N/e quantum colors are required in the original nonextended version. The maximum success probability has asymptotics expressed by the Tracy-Widom distribution of the largest eigenvalue of a random Gaussian unitary ensemble (GUE) matrix

  18. CPM: Masking code pointers to prevent code injection attacks

    OpenAIRE

    Philippaerts, Pieter; Younan, Yves; Muylle, Stijn; Piessens, Frank; Lachmund, Sven; Walter, Thomas

    2013-01-01

    Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. By enforcing the correct semantics of code pointers, CPM thwarts attacks that modify code pointers to divert the application’s control flow. It does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. This paper reports on two prototype implementations on very distinct processor architec...

  19. New code match strategy for wideband code division multiple access code tree management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%.

  20. Higher-order CIS codes

    OpenAIRE

    Carlet, Claude; Freibert, Finley; Guilley, Sylvain; Kiermaier, Michael; Kim, Jon-Lark; Solé, Patrick

    2014-01-01

    We introduce {\\bf complementary information set codes} of higher-order. A binary linear code of length $tk$ and dimension $k$ is called a complementary information set code of order $t$ ($t$-CIS code for short) if it has $t$ pairwise disjoint information sets. The duals of such codes permit to reduce the cost of masking cryptographic algorithms against side-channel attacks. As in the case of codes for error correction, given the length and the dimension of a $t$-CIS code, we look for the high...

  1. Defining pediatric traumatic brain injury using International Classification of Diseases Version 10 Codes: A systematic review

    OpenAIRE

    Chan, Vincy; Thurairajah, Pravheen; Colantonio, Angela

    2015-01-01

    Background Although healthcare administrative data are commonly used for traumatic brain injury (TBI) research, there is currently no consensus or consistency on the International Classification of Diseases Version 10 (ICD-10) codes used to define TBI among children and youth internationally. This study systematically reviewed the literature to explore the range of ICD-10 codes that are used to define TBI in this population. The identification of the range of ICD-10 codes to define this popul...

  2. Veronese subspace codes

    OpenAIRE

    Cossidente, Antonio; Pavese, Francesco

    2015-01-01

    Using the correspondence between quadrics of ${\\rm PG}(2,q)$ and points of ${\\rm PG}(5,q)$, a family of $(6,q^3(q^2-1)(q-1)/3+(q^2+1)(q^2+q+1),4;3)_q$ constant dimension subspace codes is constructed.

  3. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  4. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  5. Whale Identification

    Science.gov (United States)

    1991-01-01

    R:BASE for DOS, a computer program developed under NASA contract, has been adapted by the National Marine Mammal Laboratory and the College of the Atlantic to provide and advanced computerized photo matching technique for identification of humpback whales. The program compares photos with stored digitized descriptions, enabling researchers to track and determine distribution and migration patterns. R:BASE is a spinoff of RIM (Relational Information Manager), which was used to store data for analyzing heat shielding tiles on the Space Shuttle Orbiter. It is now the world's second largest selling line of microcomputer database management software.

  6. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...

  7. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 4.2 Affine variety codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 4.3 Some Gr¨obner basis theoretical tools . . . . . . . . . . . . . . . . . . . . . . . 155 4.4 A bound on the minimum distance of C(I,L) . . . . . . . . . . . . . . . . . . 157 4.5 The Feng-Rao bound for...

  8. Lossy Joint Source-Channel Coding Using Raptor Codes

    Directory of Open Access Journals (Sweden)

    H. V. Poor

    2008-09-01

    Full Text Available The straightforward application of Shannon's separation principle may entail a significant suboptimality in practical systems with limited coding delay and complexity. This is particularly evident when the lossy source code is based on entropy-coded quantization. In fact, it is well known that entropy coding is not robust to residual channel errors. In this paper, a joint source-channel coding scheme is advocated that combines the advantages and simplicity of entropy-coded quantization with the robustness of linear codes. The idea is to combine entropy coding and channel coding into a single linear encoding stage. If the channel is symmetric, the scheme can asymptotically achieve the optimal rate-distortion limit. However, its advantages are more clearly evident under finite coding delay and complexity. The sequence of quantization indices is decomposed into bitplanes, and each bitplane is independently mapped onto a sequence of channel coded symbols. The coding rate of each bitplane is chosen according to the bitplane conditional entropy rate. The use of systematic raptor encoders is proposed, in order to obtain a continuum of coding rates with a single basic encoding algorithm. Simulations show that the proposed scheme can outperform the separated baseline scheme for finite coding length and comparable complexity and, as expected, it is much more robust to channel errors in the case of channel capacity mismatch.

  9. Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes

    CERN Document Server

    Senger, Christian; Bossert, Martin; Zyablov, Victor

    2008-01-01

    Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one...

  10. ATM Security Using Fingerprint Biometric Identifer: An Investigative Study

    Directory of Open Access Journals (Sweden)

    Moses Okechukwu Onyesolu

    2012-04-01

    Full Text Available The growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use personal identification numbers (PIN's for identification and security clearances. Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. An embedded fingerprint biometric authentication scheme for automated teller machine (ATM banking systems is proposed in this paper. In this scheme, a fingerprint biometric technique is fused with the ATM for person authentication to ameliorate the security level.

  11. CTI Correction Code

    Science.gov (United States)

    Massey, Richard; Stoughton, Chris; Leauthaud, Alexie; Rhodes, Jason; Koekemoer, Anton; Ellis, Richard; Shaghoulian, Edgar

    2013-07-01

    Charge Transfer Inefficiency (CTI) due to radiation damage above the Earth's atmosphere creates spurious trailing in images from Charge-Coupled Device (CCD) imaging detectors. Radiation damage also creates unrelated warm pixels, which can be used to measure CTI. This code provides pixel-based correction for CTI and has proven effective in Hubble Space Telescope Advanced Camera for Surveys raw images, successfully reducing the CTI trails by a factor of ~30 everywhere in the CCD and at all flux levels. The core is written in java for speed, and a front-end user interface is provided in IDL. The code operates on raw data by returning individual electrons to pixels from which they were unintentionally dragged during readout. Correction takes about 25 minutes per ACS exposure, but is trivially parallelisable to multiple processors.

  12. Sinusoidal transform coding

    Science.gov (United States)

    Mcaulay, Robert J.; Quatieri, Thomas F.

    1988-01-01

    It has been shown that an analysis/synthesis system based on a sinusoidal representation of speech leads to synthetic speech that is essentially perceptually indistinguishable from the original. Strategies for coding the amplitudes, frequencies and phases of the sine waves have been developed that have led to a multirate coder operating at rates from 2400 to 9600 bps. The encoded speech is highly intelligible at all rates with a uniformly improving quality as the data rate is increased. A real-time fixed-point implementation has been developed using two ADSP2100 DSP chips. The methods used for coding and quantizing the sine-wave parameters for operation at the various frame rates are described.

  13. The Liege Oscillation Code

    CERN Document Server

    Scuflaire, R; Théado, S; Bourge, P -O; Miglio, A; Godart, M; Thoul, A; Noels, A

    2007-01-01

    The Liege Oscillation code can be used as a stand-alone program or as a library of subroutines that the user calls from a Fortran main program of his own to compute radial and non-radial adiabatic oscillations of stellar models. We describe the variables and the equations used by the program and the methods used to solve them. A brief account is given of the use and the output of the program.

  14. Code of Practice

    International Nuclear Information System (INIS)

    This Code of Practice introduces accepted safety procedures associated with the use of alpha, beta, gamma and X-radiation in secondary schools (pupils aged 12 to 18) in Ireland, and summarises good practice and procedures as they apply to radiation protection. Typical dose rates at various distances from sealed sources are quoted, and simplified equations are used to demonstrate dose and shielding calculations. The regulatory aspects of radiation protection are outlined, and references to statutory documents are given

  15. Computer code FIT

    International Nuclear Information System (INIS)

    This is a description of the computer code FIT, written in FORTRAN-77 for a PDP 11/34. FIT is an interactive program to decude position, width and intensity of lines of X-ray spectra (max. length of 4K channels). The lines (max. 30 lines per fit) may have Gauss- or Voigt-profile, as well as exponential tails. Spectrum and fit can be displayed on a Tektronix terminal. (orig.)

  16. Efficient Block Truncation Coding

    Directory of Open Access Journals (Sweden)

    K.Somasundaram,

    2010-09-01

    Full Text Available Block Truncation Coding (BTC is one of the lossy image compression techniques. The computational complexity involved in this method is very simple. In the proposed method, the feature of inter-pixel correlation is exploited to further reduce the requirement of bits to store a block. The proposed method gives very good performance in terms of bit-rate and PSNR values when compared to the conventional BTC.

  17. Tokamak simulation code manual

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs.

  18. Tokamak simulation code manual

    International Nuclear Information System (INIS)

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs

  19. Orthopedics coding and funding.

    Science.gov (United States)

    Baron, S; Duclos, C; Thoreux, P

    2014-02-01

    The French tarification à l'activité (T2A) prospective payment system is a financial system in which a health-care institution's resources are based on performed activity. Activity is described via the PMSI medical information system (programme de médicalisation du système d'information). The PMSI classifies hospital cases by clinical and economic categories known as diagnosis-related groups (DRG), each with an associated price tag. Coding a hospital case involves giving as realistic a description as possible so as to categorize it in the right DRG and thus ensure appropriate payment. For this, it is essential to understand what determines the pricing of inpatient stay: namely, the code for the surgical procedure, the patient's principal diagnosis (reason for admission), codes for comorbidities (everything that adds to management burden), and the management of the length of inpatient stay. The PMSI is used to analyze the institution's activity and dynamism: change on previous year, relation to target, and comparison with competing institutions based on indicators such as the mean length of stay performance indicator (MLS PI). The T2A system improves overall care efficiency. Quality of care, however, is not presently taken account of in the payment made to the institution, as there are no indicators for this; work needs to be done on this topic. PMID:24461230

  20. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  1. OACoder: Postcode Coding Tool

    Directory of Open Access Journals (Sweden)

    Muhammad Adnan

    2013-10-01

    Full Text Available Geodemographic classifications are small area classifications of social, economic and demographic characteristics. The Output Area Classification (OAC is a free geodemographic classification. It is an Office of National Statistics validated measure that summarises neighbourhood conditions at the Output Area Level across the United Kingdom. Linkage of these valuable statistics has been problematic for users more used to address records that are georeferenced using unit postcodes. OACoder resolves this problem by allowing users to link corresponding OAC codes to each of the postcode addresses. OACoder is an open source software, and it is developed and tested to work on different versions of windows operating systems.  It is stored in Figshare. The source code of the OACoder is stored in SourceForge. As open source software, OACoder has reuse potential across a range of applications. The functionality of OACoder can be extended to work with the new version of OAC (2011 OAC. It is also possible to reuse the source code and extend the functionality to work on different operating systems other than Windows. Different components of the software can be reused for the purpose of reading/writing CSV files and handling large data sets.

  2. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  3. DIANE multiparticle transport code

    International Nuclear Information System (INIS)

    DIANE is a three-dimensional multigroup Monte Carlo code that performs coupled neutron-photon-electron and light charged particle Monte Carlo transport on a fixed geometry and/or an imploding material (for example an Inertial-Confinement- Fusion plasma target). DIANE's multigroup data are provided by the nuclear data code ZADIG. ZADIG groups cross sections from international data libraries in ENDF7 format. In order to better account for resonances, a specific multigroup treatment, called 'mini-group' has been implemented. For photons, photo-atomic interactions are considered as well as photonuclear reactions. Coherent scattering may include anomalous scattering factors. Incoherent scattering include scattering function from EPDL97. We also account for fluorescence X-rays and Auger electrons. For neutrons, all the reaction channels relevant are processed by ZADIG. The ZADIG code integrates the Secondary Source Bremsstrahlung (SSB) model that simulates electron-photon cascade from electron slowing down. For light ions, DIANE solves the Boltzmann-Fokker-Planck equation. The continuous effect of Coulomb interaction with the background plasma can be treated by three Fokker- Planck terms (slowing-down, energy straggling and angular deflection). The effect of electric and magnetic fields through the Lorentz force can also be taken into account

  4. Quality Improvement of MARS Code and Establishment of Code Coupling

    International Nuclear Information System (INIS)

    The improvement of MARS code quality and coupling with regulatory auditing code have been accomplished for the establishment of self-reliable technology based regulatory auditing system. The unified auditing system code was realized also by implementing the CANDU specific models and correlations. As a part of the quality assurance activities, the various QA reports were published through the code assessments. The code manuals were updated and published a new manual which describe the new models and correlations. The code coupling methods were verified though the exercise of plant application. The education-training seminar and technology transfer were performed for the code users. The developed MARS-KS is utilized as reliable auditing tool for the resolving the safety issue and other regulatory calculations. The code can be utilized as a base technology for GEN IV reactor applications

  5. Structural coding versus free-energy predictive coding.

    Science.gov (United States)

    van der Helm, Peter A

    2016-06-01

    Focusing on visual perceptual organization, this article contrasts the free-energy (FE) version of predictive coding (a recent Bayesian approach) to structural coding (a long-standing representational approach). Both use free-energy minimization as metaphor for processing in the brain, but their formal elaborations of this metaphor are fundamentally different. FE predictive coding formalizes it by minimization of prediction errors, whereas structural coding formalizes it by minimization of the descriptive complexity of predictions. Here, both sides are evaluated. A conclusion regarding competence is that FE predictive coding uses a powerful modeling technique, but that structural coding has more explanatory power. A conclusion regarding performance is that FE predictive coding-though more detailed in its account of neurophysiological data-provides a less compelling cognitive architecture than that of structural coding, which, for instance, supplies formal support for the computationally powerful role it attributes to neuronal synchronization. PMID:26407895

  6. Coding Opportunity Densification Strategies for Instantly Decodable Network Coding

    OpenAIRE

    Sorour, Sameh; Valaee, Shahrokh

    2012-01-01

    In this paper, we aim to identify the strategies that can maximize and monotonically increase the density of the coding opportunities in instantly decodable network coding (IDNC).Using the well-known graph representation of IDNC, first derive an expression for the exact evolution of the edge set size after the transmission of any arbitrary coded packet. From the derived expressions, we show that sending commonly wanted packets for all the receivers can maximize the number of coding opportunit...

  7. TASS code topical report. V.1 TASS code technical manual

    International Nuclear Information System (INIS)

    TASS 1.0 code has been developed at KAERI for the initial and reload non-LOCA safety analysis for the operating PWRs as well as the PWRs under construction in Korea. TASS code will replace various vendor's non-LOCA safety analysis codes currently used for the Westinghouse and ABB-CE type PWRs in Korea. This can be achieved through TASS code input modifications specific to each reactor type. The TASS code can be run interactively through the keyboard operation. A simimodular configuration used in developing the TASS code enables the user easily implement new models. TASS code has been programmed using FORTRAN77 which makes it easy to install and port for different computer environments. The TASS code can be utilized for the steady state simulation as well as the non-LOCA transient simulations such as power excursions, reactor coolant pump trips, load rejections, loss of feedwater, steam line breaks, steam generator tube ruptures, rod withdrawal and drop, and anticipated transients without scram (ATWS). The malfunctions of the control systems, components, operator actions and the transients caused by the malfunctions can be easily simulated using the TASS code. This technical report describes the TASS 1.0 code models including reactor thermal hydraulic, reactor core and control models. This TASS code models including reactor thermal hydraulic, reactor core and control models. This TASS code technical manual has been prepared as a part of the TASS code manual which includes TASS code user's manual and TASS code validation report, and will be submitted to the regulatory body as a TASS code topical report for a licensing non-LOCA safety analysis for the Westinghouse and ABB-CE type PWRs operating and under construction in Korea. (author). 42 refs., 29 tabs., 32 figs

  8. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  9. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  10. Particle identification

    International Nuclear Information System (INIS)

    Particle IDentification (PID) is fundamental to particle physics experiments. This paper reviews PID strategies and methods used by the large LHC experiments, which provide outstanding examples of the state-of-the-art. The first part focuses on the general design of these experiments with respect to PID and the technologies used. Three PID techniques are discussed in more detail: ionization measurements, time-of-flight measurements and Cherenkov imaging. Four examples of the implementation of these techniques at the LHC are given, together with selections of relevant examples from other experiments and short overviews on new developments. Finally, the Alpha Magnetic Spectrometer (AMS 02) experiment is briefly described as an impressive example of a space-based experiment using a number of familiar PID techniques.

  11. Aftershock identification

    CERN Document Server

    Zaliapin, Ilya; Keilis-Borok, Vladimir; Wong, Henry

    2007-01-01

    Earthquake aftershock identification is closely related to the question ``Are aftershocks different from the rest of earthquakes?'' We give a positive answer to this question and introduce a general statistical procedure for clustering analysis of seismicity that can be used, in particular, for aftershock detection. The proposed approach expands the analysis of Baiesi and Paczuski [PRE, 69, 066106 (2004)] based on the space-time-magnitude nearest-neighbor distance $\\eta$ between earthquakes. We show that for a homogeneous Poisson marked point field with exponential marks, the distance $\\eta$ has Weibull distribution, which bridges our results with classical correlation analysis for unmarked point fields. We introduce a 2D distribution of spatial and temporal components of $\\eta$, which allows us to identify the clustered part of a point field. The proposed technique is applied to several synthetic seismicity models and to the observed seismicity of Southern California.

  12. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  13. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli. PMID:23724797

  14. High Energy Transport Code HETC

    International Nuclear Information System (INIS)

    The physics contained in the High Energy Transport Code (HETC), in particular the collision models, are discussed. An application using HETC as part of the CALOR code system is also given. 19 refs., 5 figs., 3 tabs

  15. Improvements in the BCG code

    International Nuclear Information System (INIS)

    Some improvements introduced in the BCG code with the objective of making the code faster in execution are reported. The impact of these improvements in terms of CPU time saving is discussed for a sample problem. (author)

  16. The Tap code - a code similar to Morse code for communication by tapping

    OpenAIRE

    Rafler, Stephan

    2013-01-01

    A code is presented for fast, easy and efficient communication over channels that allow only two signal types: a single sound (e.g. a knock), or no sound (i.e. silence). This is a true binary code while Morse code is a ternary code and does not work in such situations. Thus the presented code is more universal than Morse and can be used in much more situations. Additionally it is very tolerant to variations in signal strength or duration. The paper contains various ways in which the code can ...

  17. The Source Term Code Package

    International Nuclear Information System (INIS)

    The Source Term Code Package (STCP) is a set of computer codes which allows analyses of nuclear reactor accidents to produce predictions of fission product release to the environment as a function of reactor design and specifications for the assumed accident. The codes are basically those used in the analyses performed for the BMI-2104 report but they have been combined, improved and streamlined for easier use. The objective in preparing this code package was to make the calculations more direct, traceable and user-independent, with documentation for release to the public. It is important to note that the STCP is not intended to be a research tool but a code for general use in making source term predictions that has a sound and definable basis and produces reasonably accurate results in comparison with more detailed codes. The STCP has four major elements. The overall thermal-hydraulics is provided by the MARCH-3 code which combines the previously separate codes MARCH2, CORCON Mod 2 and CORSORM. Release of fission products and aerosols during core/concrete interactions is predicted with the VANESA code. Detailed thermal-hydraulics and fission product transport in the reactor coolant system are provided by the TRAPMELT3 code formed by combining the previously separate TRAPMELT and MERGE codes. Finally, fission product transport in the containment is predicted by the NAUA-4 code as modified to include fission product removal by pressure suppression pools (SPARC code) and within ice compartments (ICEDF code). The fission product and aerosol groups being tracked in the code package are noble gases, iodine, caesium, tellurium, barium, strontium, ruthenium, lanthanum and cerium groups. Additionally, in-vessel-produced aerosols and ex-vessel-produced aerosols are tracked. The code package produces time-dependent locational distributions, physical forms and transport rates for these groups throughout the course of the accident. (author)

  18. Cross-Domain Sparse Coding

    OpenAIRE

    Wang, Jim Jing-Yan

    2013-01-01

    Sparse coding has shown its power as an effective data representation method. However, up to now, all the sparse coding approaches are limited within the single domain learning problem. In this paper, we extend the sparse coding to cross domain learning problem, which tries to learn from a source domain to a target domain with significant different distribution. We impose the Maximum Mean Discrepancy (MMD) criterion to reduce the cross-domain distribution difference of sparse codes, and also ...

  19. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  20. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  1. Ethical Codes in the Professions.

    Science.gov (United States)

    Schmeiser, Cynthia B.

    1992-01-01

    Whether the measurement profession should consider developing and adopting a code of professional conduct is explored after a brief review of existing references to standards of conduct and a review of other professional codes. Issues include the need for a code of ethics, its usefulness, and its enforcement. (SLD)

  2. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...... machinery of algebraic geometry....

  3. Fresnel zone plate coded imaging

    International Nuclear Information System (INIS)

    The author introduced the principle of the Fresnel-zone-plate coded imaging, and design a Fresnel zone plate coded image camera with high spatial resolution. A experimental simulation with two-aperture visible light source is made. The result shows that this coded image camera can reveal the source distribution truly

  4. Distributed Video Coding: Iterative Improvements

    DEFF Research Database (Denmark)

    Luong, Huynh Van

    Nowadays, emerging applications such as wireless visual sensor networks and wireless video surveillance are requiring lightweight video encoding with high coding efficiency and error-resilience. Distributed Video Coding (DVC) is a new coding paradigm which exploits the source statistics at the...

  5. Geochemical computer codes. A review

    International Nuclear Information System (INIS)

    In this report a review of available codes is performed and some code intercomparisons are also discussed. The number of codes treating natural waters (groundwater, lake water, sea water) is large. Most geochemical computer codes treat equilibrium conditions, although some codes with kinetic capability are available. A geochemical equilibrium model consists of a computer code, solving a set of equations by some numerical method and a data base, consisting of thermodynamic data required for the calculations. There are some codes which treat coupled geochemical and transport modeling. Some of these codes solve the equilibrium and transport equations simultaneously while other solve the equations separately from each other. The coupled codes require a large computer capacity and have thus as yet limited use. Three code intercomparisons have been found in literature. It may be concluded that there are many codes available for geochemical calculations but most of them require a user that us quite familiar with the code. The user also has to know the geochemical system in order to judge the reliability of the results. A high quality data base is necessary to obtain a reliable result. The best results may be expected for the major species of natural waters. For more complicated problems, including trace elements, precipitation/dissolution, adsorption, etc., the results seem to be less reliable. (With 44 refs.) (author)

  6. Direct construction of code loops

    OpenAIRE

    Nagy, Gabor P.

    2004-01-01

    Code loops were introduced by R. L. Griess. R.L. Griess and T. Hsu gave methods to construct the corresponding code loop from any given doubly even binary code; both these methods used some kind of induction. In this paper, we present a global construction of the loop, where we apply the correspondance between the concepts of Moufang loops and groups with triality.

  7. A STUDY TO ASSESS THE ASSOCIATION OF SET - UP BEING PROVIDED AND BENEFICIARY ASSESSMENT OF SPECIAL CARE NEWBORN UNITS (SCNUS OF INDORE AND UJJAIN DIVISIONS OF M. P. AT DIFFERENT LEVELS

    Directory of Open Access Journals (Sweden)

    Rajendra Kumar

    2015-02-01

    Full Text Available INTRODUCTION: The neonatal mortality rate in India is high and stagnant. Special Care Newborn Units (SCNUs have been set up at different levels Health Care Delivery System to provide quality newborn - care services in several hospitals to meet this challenge. Many units are located in the districts where the burden of neonatal deaths is high, and access to special newborn care is poor. MATERIALS AND METHODS: The study was conducted to assess the functioning of SCNUs in six centers of India. The evaluation was based on an analysis of secondary data from the six units that had been functioning for at least three year. A cross - sectional survey was conducted to assess the availability of infrastructure, equipment’s and human resources and assessment of the beneficiaries. Desc riptive statistics were used for analyzing the inputs (R esources and outcomes ( A ssessment of the beneficiaries. Correlation coefficients were estimated to understand the possible association of satisfaction rate of beneficiaries with factors, such as bed : doctor ratio, bed: nurse ratio, average duration of stay, and bed occupancy rate. RESULTS: The major reasons for admission and the major causes of deaths were birth asphyxia, sepsis, and LBW/prematurity. Likart’s Analysis is used to analyze Beneficiaries Assessment. Beneficiaries were not found at Level I NBSUs at the time of evaluation. The units had a varying nurse: bed ratio (1:1 - 1:2.14. The bed occupancy rate ranged from 83% to 121% (median 115%, and the average duration of stay ranged from three da ys to 8 days (median 5 days. Repair and maintenance of equipment were a major concern. CONCLUSION: It is possible to set up and manage quality SCNUs and improve the survival of newborns with LBW and sepsis in developing countries, although several challen ges relating to infrastructure, human resources and maintenance of equipment remain.

  8. From Skew-Cyclic Codes to Asymmetric Quantum Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Sole, Patrick; Yemen, Olfa

    2010-01-01

    We introduce an additive but not $\\F_{4}$-linear map $S$ from $\\F_{4}^{n}$ to $\\F_{4}^{2n}$ and exhibit some of its interesting structural properties. If $C$ is a linear $[n,k,d]_4$-code, then $S(C)$ is an additive $(2n,2^{2k},2d)_4$-code. If $C$ is an additive cyclic code then $S(C)$ is an additive quasi-cyclic code of index $2$. Moreover, if $C$ is a module $\\theta$-cyclic code, a recently introduced type of code which will be explained below, then $S(C)$ is equivalent to an additive cyclic code if $n$ is odd and to an additive quasi-cyclic code of index $2$ if $n$ is even. Given any $(n,M,d)_4$-code $C$, the code $S(C)$ is self-orthogonal under the trace Hermitian inner product. Since the mapping $S$ preserves nestedness, it can be used as a tool in constructing additive asymmetric quantum codes.

  9. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  10. Correct Code Containing Containers

    OpenAIRE

    Dross, Claire; Filliâtre, Jean-Christophe; Moy, Yannick

    2011-01-01

    For critical software development, containers such as lists, vectors, sets or maps are an attractive alternative to ad-hoc data structures based on pointers. As standards like DO-178C put formal verification and testing on an equal footing, it is important to give users the ability to apply both to the verification of code using containers. In this paper, we present a definition of containers whose aim is to facilitate their use in certified software, using modern proof technology and novel s...

  11. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...... the impact of interference from other transmissions. Unlike these conventional studies, in this paper, we apply PLNC to a large-scale cellular network in the presence of intercell interference (ICI). In cellular networks, a terminal and a Base Station (BS) have different transmission power, which causes...

  12. TWEED Code Book

    OpenAIRE

    Engene, Jan Oskar

    2006-01-01

    The TWEED data set contains information on more than 11.000 events related to internal (or domestic) terrorism in 18 West European countries for the 1950 through 2004 period. The code book describes the structure of the data set, the countries covered, and the variables included and functions as a user’s guide to the data set. The data set is available at: http://www.uib.no/people/sspje/tweed.htm The data set Terrorism in Western Europe: Events Data, TWEED, contains information on events r...

  13. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  14. ON CLASSICAL BCH CODES AND QUANTUM BCH CODES

    Institute of Scientific and Technical Information of China (English)

    Xu Yajie; Ma Zhi; Zhang Chunyuan

    2009-01-01

    It is a regular way of constructing quantum error-correcting codes via codes with self-orthogonal property, and whether a classical Bose-Chaudhuri-Hocquenghem (BCH) code is self-orthogonal can be determined by its designed distance. In this paper, we give the sufficient and necessary condition for arbitrary classical BCH codes with self-orthogonal property through algorithms. We also give a better upper bound of the designed distance of a classical narrow-sense BCH code which contains its Euclidean dual. Besides these, we also give one algorithm to compute the dimension of these codes. The complexity of all algorithms is analyzed. Then the results can be applied to construct a series of quantum BCH codes via the famous CSS constructions.

  15. Nuclear fuel assembly identification using computer vision

    International Nuclear Information System (INIS)

    A new method of identifying fuel assemblies has been developed. The method uses existing in-cell TV cameras to read the notch-coded handling sockets of Fast Flux Test Facility (FFTF) assemblies. A computer looks at the TV image, locates the notches, decodes the notch pattern, and produces the identification number. A TV camera is the only in-cell equipment required, thus avoiding complex mechanisms in the hot cell. Assemblies can be identified in any location where the handling socket is visible from the camera. Other advantages include low cost, rapid identification, low maintenance, and ease of use

  16. Compensation for the Ecological Beneficiaries in International Watershed%国际流域生态受益方补偿的困局与破解

    Institute of Scientific and Technical Information of China (English)

    曾彩琳

    2015-01-01

    To protect watershed resources and the environment and to promote the coordinated develop-ment of upstream and downstream regions, the compensation for the ecological beneficiaries has been widely practiced in various countries. In contrast, the compensation in international river basins is rare due to the existence of multiple barriers. It is still at the preliminary level regardless of its depth and breadth. To extend the compensation in international basins requires international legislations to establish the principle of ecological beneficiary compensation, strengthening organizations such as making corresponding changes in the form of the organization, membership and functions, and strengthening the cooperation among the concerned states to determine the rights and obligations of the parties by negotiation.%国内流域生态受益方补偿实践已在各国广泛展开,但由于多重障碍的存在,国际流域生态受益方补偿却并不多见。无论从深度上还是广度上,国际流域生态受益方补偿都尚停留于初级层面。要使生态受益方补偿充分运用于国际流域,就必须完善国际立法,确立生态受益方补偿原则;健全组织机构,在机构的形式、成员组成及职能等方面进行相应变革;加强流域国间的合作,以协商方式来确定各方在补偿中的权利及义务。

  17. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  18. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  19. Survey of source term codes

    International Nuclear Information System (INIS)

    The type, scope and role of current source term codes is reviewed. Issues and problems that are generic to most or all such codes are identified. These include numerical problems, fundamental physical and chemical databases, uncertainties in fuel degradation and thermal-hydraulics calculations, how to benchmark systems application codes against mechanistic codes and weaknesses in phenomenological modelling. It is concluded that further code development to address these issues is justified. This should be tightly coupled to experimental work within an internationally agreed framework. (Author)

  20. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag