WorldWideScience

Sample records for c codes

  1. Portable code development in C

    Energy Technology Data Exchange (ETDEWEB)

    Brown, S.A.

    1990-11-06

    With a new generation of high performance computers appearing around us on a time scale of months, a new challenge for developers of simulation codes is to write and maintain production codes that are both highly portable and maximally efficient. My contention is that C is the language that is both best suited to that goal and is widely available today. GLF is a new code written mainly in C which is intended to have all of the XRASER physics and run on any platform of interest. It demonstrates the power of the C paradigm for code developers and flexibility and ease of use for the users. Three fundamental problems are discussed: the C/UNIX development environment; the supporting tools and libraries which handle data and graphics portability issues; and the advantages of C in numerical simulation code development.

  2. C++ application development with Code::Blocks

    CERN Document Server

    Modak, Biplab Kumar

    2013-01-01

    This is a comprehensive tutorial with step-by-step instructions on how to develop applications with Code::Blocks.This book is for C++ developers who wish to use Code::Blocks to create applications with a consistent look and feel across multiple platforms. This book assumes that you are familiar with the basics of the C++ programming language.

  3. Manual and Fast C Code Optimization

    Directory of Open Access Journals (Sweden)

    Mohammed Fadle Abdulla

    2010-01-01

    Full Text Available Developing an application with high performance through the code optimization places a greater responsibility on the programmers. While most of the existing compilers attempt to automatically optimize the program code, manual techniques remain the predominant method for performing optimization. Deciding where to try to optimize code is difficult, especially for large complex applications. For manual optimization, the programmers can use his experiences in writing the code, and then he can use a software profiler in order to collect and analyze the performance data from the code. In this work, we have gathered the most experiences which can be applied to improve the style of writing programs in C language as well as we present an implementation of the manual optimization of the codes using the Intel VTune profiler. The paper includes two case studies to illustrate our optimization on the Heap Sort and Factorial functions.

  4. Writing robust C++ code for critical applications

    CERN Document Server

    CERN. Geneva

    2015-01-01

    **C++** is one of the most **complex**, expressive and powerful languages out there. However, its complexity makes it hard to write **robust** code. When using C++ to code **critical** applications, ensuring **reliability** is one of the key topics. Testing, debugging and profiling are all a major part of this kind of work. In the BE department we use C++ to write a big part of the controls system for beam operation, which implies putting a big focus on system stability and ensuring smooth operation. This talk will try to: - Highlight potential problems when writing C++ code, giving guidelines on writing defensive code that could have avoided such issues - Explain how to avoid common pitfalls (both in writing C++ code and at the debugging & profiling phase) - Showcase some tools and tricks useful to C++ development The attendees' proficiency in C++ should not be a concern. Anyone is free to join, even people that do not know C++, if only to learn the pitfalls a language may have. This may benefit f...

  5. C++ Coding Standards for the AMP Project

    Energy Technology Data Exchange (ETDEWEB)

    Evans, Thomas M [ORNL; Clarno, Kevin T [ORNL

    2009-09-01

    This document provides an initial starting point to define the C++ coding standards used by the AMP nuclear fuel performance integrated code project and a part of AMP's software development process. This document draws from the experiences, and documentation [1], of the developers of the Marmot Project at Los Alamos National Laboratory. Much of the software in AMP will be written in C++. The power of C++ can be abused easily, resulting in code that is difficult to understand and maintain. This document gives the practices that should be followed on the AMP project for all new code that is written. The intent is not to be onerous but to ensure that the code can be readily understood by the entire code team and serve as a basis for collectively defining a set of coding standards for use in future development efforts. At the end of the AMP development in fiscal year (FY) 2010, all developers will have experience with the benefits, restrictions, and limitations of the standards described and will collectively define a set of standards for future software development. External libraries that AMP uses do not have to meet these requirements, although we encourage external developers to follow these practices. For any code of which AMP takes ownership, the project will decide on any changes on a case-by-case basis. The practices that we are using in the AMP project have been in use in the Denovo project [2] for several years. The practices build on those given in References [3-5]; the practices given in these references should also be followed. Some of the practices given in this document can also be found in [6].

  6. Coded Modulation in C and MATLAB

    Science.gov (United States)

    Hamkins, Jon; Andrews, Kenneth S.

    2011-01-01

    This software, written separately in C and MATLAB as stand-alone packages with equivalent functionality, implements encoders and decoders for a set of nine error-correcting codes and modulators and demodulators for five modulation types. The software can be used as a single program to simulate the performance of such coded modulation. The error-correcting codes implemented are the nine accumulate repeat-4 jagged accumulate (AR4JA) low-density parity-check (LDPC) codes, which have been approved for international standardization by the Consultative Committee for Space Data Systems, and which are scheduled to fly on a series of NASA missions in the Constellation Program. The software implements the encoder and decoder functions, and contains compressed versions of generator and parity-check matrices used in these operations.

  7. C-Codes: Cyclic Lowest-Density MDS Array Codes Constructed Using Starters for RAID 6

    CERN Document Server

    Li, Mingqiang

    2011-01-01

    The distance-3 cyclic lowest-density MDS array code (called the C-Code) is a good choice for RAID 6 because of its optimal storage efficiency, optimal update complexity, optimal length, and cyclic symmetry. In this paper, the underlying connections between C-Codes (or quasi-C-Codes) and starters in group theory are revealed. It is shown that each C-Code (or quasi-C-Code) of length $2n$ can be constructed using an even starter (or even multi-starter) in $(Z_{2n},+)$. It is also shown that each C-Code (or quasi-C-Code) has a twin C-Code (or quasi-C-Code). Then, four infinite families (three of which are new) of C-Codes of length $p-1$ are constructed, where $p$ is a prime. Besides the family of length $p-1$, C-Codes for some sporadic even lengths are also presented. Even so, there are still some even lengths (such as 8) for which C-Codes do not exist. To cover this limitation, two infinite families (one of which is new) of quasi-C-Codes of length $2(p-1)$ are constructed for these even lengths.

  8. Experience with C++ Code Quality in ATLAS

    CERN Document Server

    Roe, Shaun; The ATLAS collaboration; Snyder, Scott; Martin-Haugh, Stewart; Obreshkov, Emil; Stewart, Graeme

    2015-01-01

    An explanation of tools used for code quality checking in Atlas offline software, including results and responses is given. The principle tools covered are: Coverity, cppcheck, 'include what you use', Undefined Behaviour Sanitizer

  9. Simulink Code Generation: Tutorial for Generating C Code from Simulink Models using Simulink Coder

    Science.gov (United States)

    MolinaFraticelli, Jose Carlos

    2012-01-01

    This document explains all the necessary steps in order to generate optimized C code from Simulink Models. This document also covers some general information on good programming practices, selection of variable types, how to organize models and subsystems, and finally how to test the generated C code and compare it with data from MATLAB.

  10. C++ Coding Standards 101 Rules, Guidelines, and Best Practices

    CERN Document Server

    Sutter, Herb

    2005-01-01

    Consistent, high-quality coding standards improve software quality, reduce time-to-market, promote teamwork, eliminate time wasted on inconsequential matters, and simplify maintenance. Now, two of the world's most respected C++ experts distill the rich collective experience of the global C++ community into a set of coding standards that every developer and development team can understand and use as a basis for their own coding standards.

  11. PENGECEKAN PLAGIARISME PADA CODE DALAM BAHASA C++

    Directory of Open Access Journals (Sweden)

    Liliana .

    2012-01-01

    Full Text Available Informatics department of Petra Christian University has used to practice programming for students at programming studio, especially students who take algorithms and programming course. The system is currently implemented is to provide practice programming skill according to their ability. Assessment is done by calculating the points of all questions are done correctly. Problem which occurs at about the work in programming studio is plagiarism among students’ work. Unfortunately, plagiarism checking consumes a lot of time. In one semester, each student can do about 100 questions. If the total of students taking programming course, at least 100 people, we need many people to do this work. Departing from this problem, we design and develop an application to check for plagiarism between two different answer files from the same question. The degree of similarity is calculated using combined method of Jaccard similarity coefficient and cosine similarity coefficient. This system is able to check similarities in source code files are the work of students with moderate levels of complexity.

  12. Runtime Detection of C-Style Errors in UPC Code

    Energy Technology Data Exchange (ETDEWEB)

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  13. Flowgen: Flowchart-Based Documentation for C++ Codes

    CERN Document Server

    Kosower, David A

    2014-01-01

    We present the Flowgen tool, which generates flowcharts from annotated C++ source code. The tool generates a set of interconnected high-level UML activity diagrams, one for each function or method in the C++ sources. It provides a simple and visual overview of complex implementations of numerical algorithms. Flowgen is complementary to the widely-used Doxygen documentation tool. The ultimate aim is to render complex C++ computer codes accessible, and to enhance collaboration between programmers and algorithm or science specialists. We describe the tool and a proof-of-concept application to the VINCIA plug-in for simulating collisions at CERN's Large Hadron Collider.

  14. Flowgen: Flowchart-based documentation for C + + codes

    Science.gov (United States)

    Kosower, David A.; Lopez-Villarejo, J. J.

    2015-11-01

    We present the Flowgen tool, which generates flowcharts from annotated C + + source code. The tool generates a set of interconnected high-level UML activity diagrams, one for each function or method in the C + + sources. It provides a simple and visual overview of complex implementations of numerical algorithms. Flowgen is complementary to the widely-used Doxygen documentation tool. The ultimate aim is to render complex C + + computer codes accessible, and to enhance collaboration between programmers and algorithm or science specialists. We describe the tool and a proof-of-concept application to the VINCIA plug-in for simulating collisions at CERN's Large Hadron Collider.

  15. Automatic translation of C/C++ parallel code into synchronous formalism using an SSA intermediate form

    OpenAIRE

    Besnard, Loïc; Gautier, Thierry; Moy, Matthieu; Talpin, Jean-Pierre; Johnson, Kenneth; Maraninchi, Florence

    2009-01-01

    We present an approach for the translation of imperative code (like C, C++) into the synchronous formalism \\signal, in order to use a model-checker to verify properties on the source code. The translation uses ßa\\ as an intermediate formalism, and the GCC compiler as a front-end. The contributions of this paper with respect to previous work are a more efficient translation scheme, and the management of parallel code. It is applied successfully on simple \\systemc\\ examples.

  16. C++ Builder 6.0 CEDV code for files processing

    CERN Document Server

    Tsyganov, Y S

    2015-01-01

    A RAD C++ Builder's 6.0 code CEDV under Windows XP has been designed for visualizing data obtained from heavy-ion-induced complete fusion reactions at the main U-400 cyclotron of FLNR. The main purpose of the code is processing the data from the experiments aimed to at studying chemical properties of SHE. Data from the Dubna Gas -Filled Recoil Separator could be processed too. Some subroutines for estimating statistical parameter are also presented ; these are based on modified BSC (background signal combination) approaches.

  17. Users manual for doctext: Producing documentation from C source code

    Energy Technology Data Exchange (ETDEWEB)

    Gropp, W.

    1995-03-01

    One of the major problems that software library writers face, particularly in a research environment, is the generation of documentation. Producing good, professional-quality documentation is tedious and time consuming. Often, no documentation is produced. For many users, however, much of the need for documentation may be satisfied by a brief description of the purpose and use of the routines and their arguments. Even for more complete, hand-generated documentation, this information provides a convenient starting point. We describe here a tool that may be used to generate documentation about programs written in the C language. It uses a structured comment convention that preserves the original C source code and does not require any additional files. The markup language is designed to be an almost invisible structured comment in the C source code, retaining readability in the original source. Documentation in a form suitable for the Unix man program (nroff), LaTeX, and the World Wide Web can be produced.

  18. CCD:An Integrated C Coding and Debugging Tool

    Institute of Scientific and Technical Information of China (English)

    金立群

    1993-01-01

    CCD is an integrated software tool which is intended to support the coding and debugging for C language It integrates a hybrid editor,an incremental semantic analyzer,a multi-entry parser,an incremental unparser and a source-level debugger into a single tool.The integration is realized by sharing common knowledge among all the components of the system and by task-oriented conbination of the components,Nonlocal attribute grammar is adopted for specifying the common knowledge about the syntax and semantics of C language.The incremental attribute evaluation is used to implement the semantic analyzer and the unparser to increase system efficiency.CCD keeps the preprocessors and comments most regular to make it practical.

  19. Code generation for the MPEG Reconfigurable Video Coding framework: From CAL actions to C functions

    OpenAIRE

    Wipliez, Matthieu; Roquier, Ghislain; Raulet, Mickael; Nezan, Jean François; Déforges, Olivier

    2008-01-01

    International audience The MPEG reconfigurable video coding (RVC) framework is a new standard under development by MPEG that aims at providing a unified specification of current MPEG video coding technologies. In this framework, a decoder is built as a configuration of video coding modules taken from the standard ldquoMPEG toolbox libraryrdquo. The elements of the library are specified using the CAL actor language (CAL). CAL is a dataflow based language providing computation models that ar...

  20. 50 CFR Table 3c to Part 680 - Crab Product Codes for Economic Data Reports

    Science.gov (United States)

    2010-10-01

    ... EXCLUSIVE ECONOMIC ZONE OFF ALASKA Pt. 680, Table 3c Table 3c to Part 680—Crab Product Codes for Economic... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Crab Product Codes for Economic Data Reports 3c Table 3c to Part 680 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT,...

  1. Sidelobe reduction of Barker codes, part 7.1C

    Science.gov (United States)

    Green, J. L.

    1984-01-01

    Barker codes can be realized as simple digital preprocessors, or with the use of a delay line, can be realized as an analogue device. Assuming the process observed has an autocorrelation time that is long compared to the code length, a gain in signal to noise, G = N where N is the number of elements in the code, may be realized. Typically Barker codes are implemented by shifting the phase of the transmitted signal by 0 or 180 degrees according to the code pattern. A typical detection scheme is shown where the output of the radar receiver is delayed by an analogue delay line or a shift register. The signal in each element of the delay line or shift register is continuously multiplied by the code and all elements are summed. A principal disadvantage was the sidelobe response. In the case of MST or ST radar echoes where there is a dynamic range as large as 60 dB, these unwanted sidelobes cause an increase in the apparent width of atmospheric layers, or some narrow layer to appear at several altitudes. The sidelobes of a Barker code may be reduced by tapering the response of the decoder. Optimum tapers, are shown. It is found that the sidelobe response is greatly reduced with very little loss in G.

  2. Software Review: "The Secret Codes of C.Y.P.H.E.R.: Operation Wildlife."

    Science.gov (United States)

    Bober, Marcie

    1992-01-01

    Describes "The Secret Codes of C.Y.P.H.E.R.: Operation Wildlife," a software program for language arts classrooms that joins natural science and communication/cryptography topics in a secret-agent interactive setting. (SR)

  3. Exact Gap Computation for Code Coverage Metrics in ISO-C

    CERN Document Server

    Richter, Dirk; 10.4204/EPTCS.80.4

    2012-01-01

    Test generation and test data selection are difficult tasks for model based testing. Tests for a program can be meld to a test suite. A lot of research is done to quantify the quality and improve a test suite. Code coverage metrics estimate the quality of a test suite. This quality is fine, if the code coverage value is high or 100%. Unfortunately it might be impossible to achieve 100% code coverage because of dead code for example. There is a gap between the feasible and theoretical maximal possible code coverage value. Our review of the research indicates, none of current research is concerned with exact gap computation. This paper presents a framework to compute such gaps exactly in an ISO-C compatible semantic and similar languages. We describe an efficient approximation of the gap in all the other cases. Thus, a tester can decide if more tests might be able or necessary to achieve better coverage.

  4. Joint L-/C-Band Code and Carrier Phase Linear Combinations for Galileo

    Directory of Open Access Journals (Sweden)

    Patrick Henkel

    2008-01-01

    Full Text Available Linear code combinations have been considered for suppressing the ionospheric error. In the L-band, this leads to an increased noise floor. In a combined L- and C-band (5010–5030 MHz approach, the ionosphere can be eliminated and the noise floor reduced at the same time. Furthermore, combinations that involve both code- and carrier-phase measurements are considered. A new L-band code-carrier combination with a wavelength of 3.215 meters and a noise level of 3.92 centimeters is found. The double difference integer ambiguities of this combination can be resolved by extending the system of equations with an ionosphere-free L-/C-band code combination. The probability of wrong fixing is reduced by several orders of magnitude when C-band measurements are included. Carrier smoothing can be used to further reduce the residual variance of the solution. The standard deviation is reduced by a factor 7.7 if C-band measurements are taken into account. These initial findings suggest that the combined use of L- and C-band measurements, as well as the combined code and phase processing are an attractive option for precise positioning.

  5. Sequence analysis of a cDNA coding for a pancreatic precursor to somatostatin.

    OpenAIRE

    Taylor, W.L.; Collier, K J; Deschenes, R J; Weith, H L; Dixon, J. E.

    1981-01-01

    A synthetic oligonucleotide having the sequence d(T-T-C-C-A-G-A-A-G-A-A) deduced from the amino acid sequence Phe-Phe-Trp-Lys of somatostatin-14 was used to prime the synthesis of a cDNA from channel catfish (Ictalurus punctatus) pancreatic poly(A)-RNA. The major product of this reaction was a cDNA fragment of 565 nucleotides. Chemical sequence analysis of the cDNA fragment revealed that it was complementary to a mRNA coding for somatostatin. The 565-nucleotide cDNA hybridizes strongly with a...

  6. HIGH QUALITY IMPLEMENTATION FOR AUTOMATIC GENERATION C# CODE BY EVENT-B PATTERN

    Directory of Open Access Journals (Sweden)

    Eman K Elsayed

    2014-01-01

    Full Text Available In this paper we proposed the logical correct path to implement automatically any algorithm or model in verified C# code. Our proposal depends on using the event-B as a formal method. It is suitable solution for un-experience in programming language and profession in mathematical modeling. Our proposal also integrates requirements, codes and verification in system development life cycle. We suggest also using event-B pattern. Our suggestion is classify into two cases, the algorithm case and the model case. The benefits of our proposal are reducing the prove effort, reusability, increasing the automation degree and generate high quality code. In this paper we applied and discussed the three phases of automatic code generation philosophy on two case studies the first is “minimum algorithm” and the second one is a model for ATM.

  7. TSC [Tokamak Simulation Code] simulations of Alcator C-MOD discharges

    International Nuclear Information System (INIS)

    The axisymmetric stability of the single X-point, nominal Alcator C-MOD configuration is investigated with the Tokamak Simulation Code. The resistive wall passive growth rate, in the absence of feedback stabilization, is obtained. The instability is suppressed with an appropriate active feedback system. 2 refs., 25 figs., 1 tab

  8. 基于C#的验证码的绘制%Draw the Verification Code Based on C#

    Institute of Scientific and Technical Information of China (English)

    马相芬

    2015-01-01

    the verification code technology is usually used some lines, random numbers, symbols and irregular characters, to pre⁃vent some hackers password data or in the network using robots to automatically register, login and irrigation. This paper introduces a realization method of the C# and the GDI+technology based on verification code.%验证码技术通常使用一些线条、随机数、符号和不规则的字符组成,借此防止一些黑客把密码数据化或者在网络上用机器人自动注册、登录和灌水。为此该文介绍了一种基于C#和GDI+技术的验证码的实现方法。

  9. Implementasi Convolutional Code dan Viterbi Decode pada DSK TMS320C6416T

    Directory of Open Access Journals (Sweden)

    Erika Kusumasari Rosita

    2013-03-01

    Full Text Available Dalam sistem komunikasi digital modern, dimana data ditransmisikan dalam bentuk bit-bit biner, dibutuhkan sistem yang tahan terhadap noise yang terdapat pada kanal transmisi, hal ini dibutuhkan agar data yang ditransmisikan  tersebut dapat diterima dengan benar. Kesalahan dalam pengiriman atau penerimaan data merupakan permasalahan yang mendasar yang memberikan dampak yang sangat signifikan pada sistem komunikasi. Untuk mengatasinya, maka diperlukan suatu metode pengkodean kanal yang mampu  mendeteksi kesalahan dan mengkoreksi kesalahan. Pada tugas akhir ini konvolusi code diimplementasikan pada sebuah DSP card seri TMS320C6416T untuk mengatasi masalah sistem komunikasi tersebut. Kode konvolusi  merupakan teknik Error Control Coding  untuk mendeteksi dan mengkoreksi error pada informasi akibat pengaruh noise. Analisis meliputi nilai BER yang diperoleh dengan mengubah parameter Eb/No pada blok AWGN,  dan uji coba rangkaian menggunakan DSK TMS320C6416T. Hasil penelitian menunjukkan sistem yang menggunakan konvolusi code dan viterbi decode dapat menurunkan probabilitas error dibandingkan dengan sistem model yang tidak menggunakan konvolusi code dan viterbi decode.

  10. Architectural Visualization of C/C++ Source Code for Program Comprehension

    Energy Technology Data Exchange (ETDEWEB)

    Panas, T; Epperly, T W; Quinlan, D; Saebjornsen, A; Vuduc, R

    2006-09-01

    Structural and behavioral visualization of large-scale legacy systems to aid program comprehension is still a major challenge. The challenge is even greater when applications are implemented in flexible and expressive languages such as C and C++. In this paper, we consider visualization of static and dynamic aspects of large-scale scientific C/C++ applications. For our investigation, we reuse and integrate specialized analysis and visualization tools. Furthermore, we present a novel layout algorithm that permits a compressive architectural view of a large-scale software system. Our layout is unique in that it allows traditional program visualizations, i.e., graph structures, to be seen in relation to the application's file structure.

  11. Simulations of the C-2/C-2U Field Reversed Configurations with the Q2D code

    Science.gov (United States)

    Onofri, Marco; Dettrick, Sean; Barnes, Daniel; Tajima, Toshiki; TAE Team

    2015-11-01

    C-2U was built to sustain advanced beam-driven FRCs for 5 + ms. The Q2D transport code is used to simulate the evolution of C-2U discharges and to study sustainment via fast ion current and pressure, with the latter comparable to the thermal plasma pressure. The code solves the MHD equations together with source terms due to neutral beams, which are calculated by a Monte Carlo method. We compare simulations with experimental results obtained in the HPF14 regime of C-2 (6 neutral beams with energy of 20 keV and total power of 4.2 MW). All simulations start from an initial equilibrium and transport coefficients are chosen to match experimental data. The best agreement is obtained when utilizing an enhanced energy transfer between fast ions and the plasma, which may be an indication of anomalous heating due to beneficial beam-plasma instabilities. Similar simulations of C-2U (neutral beam power increased to 10 + MW and angled beam injection) are compared with experimental results, where a steady state has been obtained for 5 + ms, correlated with the neutral beam pulse and limited by engineering constraints.

  12. Codes cross-correlation analysis and data/pilot code pairs optimization for Galileo E1 OS and GPS L1C

    Institute of Scientific and Technical Information of China (English)

    Yang Zaixiu; Huang Zhigang; Geng Shengqun

    2013-01-01

    The Galileo E1 open service (OS) and the global positioning system (GPS) LIC are intending to use the multiplexed binary offset carrier (MBOC) modulation in E1/L1 band,including both pilot and data components.The impact of data and pilot codes cross-correlation on the distortion of the discriminator function (i.e.,the S-curve) is investigated,when only the pilot (or data)components of MBOC signals are tracked.It is shown that the modulation schemes and the receiver configuration (e.g.,the correlator spacing) strongly affect the S-curve bias.In this paper,two methods are proposed to optimize the data/pilot code pairs of Galileo E1 OS and GPS L1C.The optimization goal is to obtain the minimum average S-curve bias when tracking only the pilot components a the specific correlator spacing.Figures of merit,such as S-curve bias,correlation loss and code tracking variance have been adopted for analyzing and comparing the un-optimized and optimized code pairs.Simulation results show that the optimized data/pilot code pairs could significantly mitigate the intra-channel codes cross-correlation,and then improve the code tracking performance of MBOC signals.

  13. RCC-E a Design Code for I and C and Electrical Systems

    International Nuclear Information System (INIS)

    The paper deals with the stakes and strength of the RCC-E code applicable to Electrical and Instrumentation and control systems and components as regards dealing with safety class functions. The document is interlacing specifications between Owners, safety authorities, designers, and suppliers IAEA safety guides and IEC standards. The code is periodically updated and published by French Society for Design and Construction rules for Nuclear Island Components (AFCEN). The code is compliant with third generation PWR nuclear islands and aims to suit with national regulations as needed in a companion document. The Feedback experience of Fukushima and the licensing of UKEPR in the framework of Generic Design Assessment are lessons learnt that should be considered in the upgrading of the code. The code gathers a set of requirements and relevant good practices of several PWR design and construction practices related to the electrical and I and C systems and components, and electrical engineering documents dealing with systems, equipment and layout designs. Comprehensive statement including some recent developments will be provided about: - Offsite and onsite sources requirements including sources dealing the total loss of off sites and main onsite sources. - Highlights of a relevant protection level against high frequencies disturbances emitted by lightning strokes, Interfaces data used by any supplier or designer such as site data, rooms temperature, equipment maximum design temperature, alternative current and direct current electrical network voltages and frequency variation ranges, environmental conditions decoupling data, - Environmental Qualification process including normal, mild (earthquake resistant), harsh and severe accident ambient conditions. A suit made approach based on families, which are defined as a combination of mission time, duration and abnormal conditions (pressure, temperature, radiation), enables to better cope with Environmental Qualifications

  14. SimTrack: A compact c++ code for particle orbit and spin tracking in accelerators

    Science.gov (United States)

    Luo, Yun

    2015-11-01

    SimTrack is a compact c++ code of 6-d symplectic element-by-element particle tracking in accelerators originally designed for head-on beam-beam compensation simulation studies in the Relativistic Heavy Ion Collider (RHIC) at Brookhaven National Laboratory. It provides a 6-d symplectic orbit tracking with the 4th order symplectic integration for magnet elements and the 6-d symplectic synchro-beam map for beam-beam interaction. Since its inception in 2009, SimTrack has been intensively used for dynamic aperture calculations with beam-beam interaction for RHIC. Recently, proton spin tracking and electron energy loss due to synchrotron radiation were added. In this paper, I will present the code architecture, physics models, and some selected examples of its applications to RHIC and a future electron-ion collider design eRHIC.

  15. A portable, parallel, object-oriented Monte Carlo neutron transport code in C++

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.R.; Cummings, J.C. [Los Alamos National Lab., NM (United States); Nolen, S.D. [Texas A and M Univ., College Station, TX (United States)]|[Los Alamos National Lab., NM (United States)

    1997-05-01

    We have developed a multi-group Monte Carlo neutron transport code using C++ and the Parallel Object-Oriented Methods and Applications (POOMA) class library. This transport code, called MC++, currently computes k and {alpha}-eigenvalues and is portable to and runs parallel on a wide variety of platforms, including MPPs, clustered SMPs, and individual workstations. It contains appropriate classes and abstractions for particle transport and, through the use of POOMA, for portable parallelism. Current capabilities of MC++ are discussed, along with physics and performance results on a variety of hardware, including all Accelerated Strategic Computing Initiative (ASCI) hardware. Current parallel performance indicates the ability to compute {alpha}-eigenvalues in seconds to minutes rather than hours to days. Future plans and the implementation of a general transport physics framework are also discussed.

  16. User's manual for three dimensional FDTD version C code for scattering from frequency-independent dielectric and magnetic materials

    Science.gov (United States)

    Beggs, John H.; Luebbers, Raymond J.; Kunz, Karl S.

    1992-01-01

    The Penn State Finite Difference Time Domain Electromagnetic Scattering Code Version C is a three-dimensional numerical electromagnetic scattering code based on the Finite Difference Time Domain (FDTD) technique. The supplied version of the code is one version of our current three-dimensional FDTD code set. The manual given here provides a description of the code and corresponding results for several scattering problems. The manual is organized into 14 sections: introduction, description of the FDTD method, operation, resource requirements, Version C code capabilities, a brief description of the default scattering geometry, a brief description of each subroutine, a description of the include file (COMMONC.FOR), a section briefly discussing radar cross section computations, a section discussing some scattering results, a new problem checklist, references, and figure titles.

  17. A Method to Assess Robustness of GPS C/A Code in Presence of CW Interferences

    Directory of Open Access Journals (Sweden)

    Beatrice Motella

    2010-01-01

    Full Text Available Navigation/positioning platforms integrated with wireless communication systems are being used in a rapidly growing number of new applications. The mutual benefits they can obtain from each other are intrinsically related to the interoperability level and to a properly designed coexistence. In this paper a new family of curves, called Interference Error Envelope (IEE, is used to assess the impact of possible interference due to other systems (e.g., communications transmitting in close bandwidths to Global Navigation Satellite System (GNSS signals. The focus is on the analysis of the GPS C/A code robustness against Continuous Wave (CW interference.

  18. Determination of the δ13C of dissolved inorganic carbon in water; RSIL lab code 1710

    Science.gov (United States)

    Singleton, Glenda L.; Revesz, Kinga; Coplen, Tyler B.

    2012-01-01

    The purpose of the Reston Stable Isotope Laboratory (RSIL) lab code 1710 is to present a method to determine the δ13C of dissolved inorganic carbon (DIC) of water. The DIC of water is precipitated using ammoniacal strontium chloride (SrCl2) solution to form strontium carbonate (SrCO3). The δ13C is analyzed by reacting SrCO3 with 100-percent phosphoric acid (H3PO4) to liberate carbon quantitatively as carbon dioxide (CO2), which is collected, purified by vacuum sublimation, and analyzed by dual inlet isotope-ratio mass spectrometry (DI-IRMS). The DI-IRMS is a DuPont double-focusing mass spectrometer. One ion beam passes through a slit in a forward collector and is collected in the rear collector. The other measurable ion beams are collected in the front collector. By changing the ion-accelerating voltage under computer control, the instrument is capable of measuring mass/charge (m/z) 45 or 46 in the rear collector and m/z 44 and 46 or 44 and 45, respectively, in the front collector. The ion beams from these m/z values are as follows: m/z 44 = CO2 = 12C16O16O, m/z 45 = CO2 = 13C16O16O primarily, and m/z 46 = CO2 = 12C16O18O primarily. The data acquisition and control software calculates δ13C values.

  19. The coding region of the human c-mos pseudogene contains Alu repeat insertions.

    Science.gov (United States)

    Zabarovsky, E R; Chumakov, I M; Prassolov, V S; Kisselev, L L

    1984-10-01

    We have determined the nucleotide sequence of an 841-bp fragment derived from a segment of the human genome previously cloned by Chumakov et al. [Gene 17 (1982) 19-26] and Zabarovsky et al. [Gene 23 (1983) 379-384] and containing regions homologous to the viral mos gene probe. This sequence displays homology with part of the coding region of the human and murine c-mos genes, contains several termination codons, and is interrupted by two Alu-family elements flanked by short direct repeats. Probably, the progenitor of the human c-mos gene was duplicated approximately at the time of mammalian divergence, was converted to a pseudogene, and acquired insertions of two Alu elements.

  20. Combining protein identification and quantification: C-terminal isotope-coded tagging using sulfanilic acid.

    Science.gov (United States)

    Panchaud, Alexandre; Guillaume, Elisabeth; Affolter, Michael; Robert, Fabien; Moreillon, Philippe; Kussmann, Martin

    2006-01-01

    Two methods of differential isotopic coding of carboxylic groups have been developed to date. The first approach uses d0- or d3-methanol to convert carboxyl groups into the corresponding methyl esters. The second relies on the incorporation of two 18O atoms into the C-terminal carboxylic group during tryptic digestion of proteins in H(2)18O. However, both methods have limitations such as chromatographic separation of 1H and 2H derivatives or overlap of isotopic distributions of light and heavy forms due to small mass shifts. Here we present a new tagging approach based on the specific incorporation of sulfanilic acid into carboxylic groups. The reagent was synthesized in a heavy form (13C phenyl ring), showing no chromatographic shift and an optimal isotopic separation with a 6 Da mass shift. Moreover, sulfanilic acid allows for simplified fragmentation in matrix-assisted laser desorption/ionization (MALDI) due the charge fixation of the sulfonate group at the C-terminus of the peptide. The derivatization is simple, specific and minimizes the number of sample treatment steps that can strongly alter the sample composition. The quantification is reproducible within an order of magnitude and can be analyzed either by electrospray ionization (ESI) or MALDI. Finally, the method is able to specifically identify the C-terminal peptide of a protein by using GluC as the proteolytic enzyme.

  1. Effects of wide band interference to GPS C/A code

    Institute of Scientific and Technical Information of China (English)

    ZOU Bin; CHEN Yu-shi; ZHOU Yi-gang; HAO Bing

    2006-01-01

    The NAVSTAR Global Positioning System (CPS), a networked system providing three-dimension user position and timing, is widely used during the past ten years. However, interferences to GPS introduce great dangers to GPS users. This paper gives an assessment of interferences to the GPS positioning signal. The work is mainly concentrated on effects of wide band interferences. Effects of traditional interferences such as continuous wave (CW), as well as broadband noise and pulse interference are studied. Furthermore, according to the GPS's signal characteristics, another kind of wideband interferences, named m sequence interference in this paper, is also studied. Simulation results show that m sequence interference is the most harmful to GPS C/A code if special m sequence is adopted and thus special countermeasures should be used to eliminate this effect.

  2. A C-code for the double folding interaction potential of two spherical nuclei

    Science.gov (United States)

    Gontchar, I. I.; Chushnyakova, M. V.

    2010-01-01

    We present a C-code designed to obtain the nucleus-nucleus potential by using the double folding model (DFM) and in particular to find the Coulomb barrier. The program calculates the nucleus-nucleus potential as a function of the distance between the centers of mass of colliding nuclei. The most important output parameters are the Coulomb barrier energy and the radius. Since many researchers use a Woods-Saxon profile for the nuclear term of the potential we provide an option in our code for fitting the DFM potential by such a profile. Program summaryProgram title: DFMSPH Catalogue identifier: AEFH_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEFH_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 5929 No. of bytes in distributed program, including test data, etc.: 115 740 Distribution format: tar.gz Programming language: C Computer: PC Operating system: Windows XP (with the GCC-compiler version 2) RAM: Below 10 Mbyte Classification: 17.9 Nature of problem: The code calculates in a semimicroscopic way the bare interaction potential between two colliding spherical nuclei as a function of the center of mass distance. The height and the position of the Coulomb barrier are found. The calculated potential is approximated by a conventional Woods-Saxon profile near the barrier. Dependence of the barrier parameters upon the characteristics of the effective NN forces (like, e.g. the range of the exchange part of the nuclear term) can be investigated. Solution method: The nucleus-nucleus potential is calculated using the double folding model with the Coulomb and the effective M3Y NN interactions. For the direct parts of the Coulomb and the nuclear terms, the Fourier transform method is used. In order to calculate the exchange parts the density matrix expansion method

  3. Conceptual OOP design of Pilot Code for Two-Fluid, Three-field Model with C++ 6.0

    Energy Technology Data Exchange (ETDEWEB)

    Chung, B. D.; Lee, Y. J

    2006-09-15

    To establish the concept of the objective oriented program (OOP) design for reactor safety analysis code, the preliminary OOP design for PILOT code, which based on one dimensional two fluid three filed model, has been attempted with C++ language feature. Microsoft C++ language has been used since it is available as groupware utilization in KAERI. The language has can be merged with Compac Visual Fortran 6.6 in Visual Studio platform. In the development platform, C++ has been used as main language and Fortran has been used as mixed language in connection with C++ main drive program. The mixed language environment is a specific feature provided in visual studio. Existing Fortran source was utilized for input routine of reading steam table from generated file and routine of steam property calculation. The calling convention and passing argument from C++ driver was corrected. The mathematical routine, such as inverse matrix conversion and tridiagonal matrix solver, has been used as PILOT Fortran routines. Simple volume and junction utilized in PILOT code can be treated as objects, since they are the basic construction elements of code system. Other routines for overall solution scheme have been realized as procedure C functions. The conceptual design which consists of hydraulic loop, component, volume, and junction class has been described in the appendix in order to give the essential OOP structure of system safety analysis code. The attempt shows that many part of system analysis code can be expressed as objects, although the overall structure should be maintained as procedure functions. The encapsulation of data and functions within an object can provide many beneficial aspects in programming of system code.

  4. The c-myc coding DNA sequences of cyprinids (Teleostei: Cypriniformes): Implications for phylogeny

    Institute of Scientific and Technical Information of China (English)

    KONG XiangHui; WANG XuZhen; GAN XiaoNi; HE ShunPing

    2007-01-01

    The family Cyprinidae is one of the largest fish families in the world, which is widely distributed in East Asian, with obvious difference in characteristic size among species. The phylogenetic analysis of cyprinid taxa based on the functionally important genes can help to understand the speciation and functional divergence of the Cyprinidae. The c-myc gene is an important gene regulating individual growth.In the present study, the sequence variations of the cyprinid c-myc gene and their phylogenetic significance were analyzed. The 41 complete sequences of the c-myc gene were obtained from cyprinids and outgroups through PCR amplification and clone. The coding DNA sequences of the c-myc gene were used to infer molecular phylogenetic relationships within the Cyprinidae. Myxocyprinus asiaticus (Catostomidae), Misgurnus anguillicaudatus (Cobitidae) and Hemimyzon sinensis (Homalopteridae)were assigned to the outgroup taxa. Phylogenetic analyses using maximum parsimony (MP), maximum likelihood (ML), and Bayesian retrieved similar topology. Within the Cyprinidae, Leuciscini and Barbini formed the monophyletic lineage respectively with high nodal supports. Leuciscini comprises Xenocyprinae, Cultrinae, East Asian species of Leuciscinae and Danioninae, Gobioninae and Acheilognathinae, and Barbini contains Schizothoracinae, Barbinae, Cyprininae and Labeoninae. Danio rerio, D.myersi and Rasbora trilineata were supposed to separate from Leuciscinae and Barbini and to form another lineage. The positions of some Danioninae species were still unresolved. Analyses of both amino acid variation with parsimony information and two high variation regions indicated that there is no correlation between variations of single amino acid or high variation regions and characteristic size of cyprinids. In addition, the species with smaller size were usually found to be basal within clades in the tree, which might be the results of the adaptation to the primitive ecology and survival pressure.

  5. A C-code for the double folding interaction potential for reactions involving deformed target nuclei

    Science.gov (United States)

    Gontchar, I. I.; Chushnyakova, M. V.

    2013-01-01

    We present a C-code designed to obtain the interaction potential between a spherical projectile nucleus and an axial-symmetrical deformed target nucleus and in particular to find the Coulomb barrier, by using the double folding model (DFM). The program calculates the nucleus-nucleus potential as a function of the distance between the centers of mass of colliding nuclei as well as of the angle between the axis of symmetry of the target nucleus and the beam direction. The most important output parameters are the Coulomb barrier energy and the radius. Since many researchers use a Woods-Saxon profile for the nuclear term of the potential we provide an option in our code for fitting the DFM potential by such a profile near the barrier. Program summaryProgram title: DFMDEF Catalogue identifier: AENI_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AENI_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 2245 No. of bytes in distributed program, including test data, etc.: 215442 Distribution format: tar.gz Programming language: C. Computer: PC, Mac. Operating system: Windows XP (with the GCC-compiler version 2), MacOS, Linux. RAM: 100 MB with average parameters set Classification: 17.9. Nature of problem: The code calculates in a semimicroscopic way the bare interaction potential between a spherical projectile nucleus and a deformed but axially symmetric target nucleus as a function of the center of mass distance as well as of the angle between the axis of symmetry of the target nucleus and the beam direction. The height and the position of the Coulomb barrier are found. The calculated potential is approximated by a conventional Woods-Saxon profile near the barrier. Dependence of the barrier parameters upon the characteristics of the effective NN forces (like, e

  6. C5 Benchmark Problem with Discrete Ordinate Radiation Transport Code DENOVO

    Energy Technology Data Exchange (ETDEWEB)

    Yesilyurt, Gokhan [ORNL; Clarno, Kevin T [ORNL; Evans, Thomas M [ORNL; Davidson, Gregory G [ORNL; Fox, Patricia B [ORNL

    2011-01-01

    The C5 benchmark problem proposed by the Organisation for Economic Co-operation and Development/Nuclear Energy Agency was modeled to examine the capabilities of Denovo, a three-dimensional (3-D) parallel discrete ordinates (S{sub N}) radiation transport code, for problems with no spatial homogenization. Denovo uses state-of-the-art numerical methods to obtain accurate solutions to the Boltzmann transport equation. Problems were run in parallel on Jaguar, a high-performance supercomputer located at Oak Ridge National Laboratory. Both the two-dimensional (2-D) and 3-D configurations were analyzed, and the results were compared with the reference MCNP Monte Carlo calculations. For an additional comparison, SCALE/KENO-V.a Monte Carlo solutions were also included. In addition, a sensitivity analysis was performed for the optimal angular quadrature and mesh resolution for both the 2-D and 3-D infinite lattices of UO{sub 2} fuel pin cells. Denovo was verified with the C5 problem. The effective multiplication factors, pin powers, and assembly powers were found to be in good agreement with the reference MCNP and SCALE/KENO-V.a Monte Carlo calculations.

  7. Meta-code for systematic analysis of chemical addition (SACHA): application to fluorination of C70 and carbon nanostructure growth.

    Science.gov (United States)

    Ewels, Christopher P; Lier, Gregory Van; Geerlings, Paul; Charlier, Jean-Christophe

    2007-01-01

    We present a new computer program able to systematically study chemical addition to and growth or evolution of carbon nanostructures. SACHA is a meta-code able to exploit a wide variety of pre-existing molecular structure codes, automating the otherwise onerous task of constructing, running, and analyzing the large number of input files that are required when exploring structural isomers and addition paths. By way of examples we consider fluorination of the fullerene cage C70 and carbon nanostructure growth through C2 addition. We discuss the possibilities for extension of this technique to rapidly and efficiently explore structural energy landscapes and application to other areas of chemical and materials research.

  8. Autocodecovergen: Prototype Of Data Driven Unit Test Genration Tool That Guarantees 100% Code Coverage For C#

    Directory of Open Access Journals (Sweden)

    Arpit Christi

    2012-10-01

    Full Text Available Unit testing has become an integral part of software development process as it ensures all your individualfunctions behave in a way they should behave. Obtaining 100% code coverage out of unit test suit isessential to ensure that all code paths are covered. This paper proposes a tool AutoCodeCoverGen thatguarantees 100% code coverage. It also discusses the core idea behind tool and evolution of the tool.Also, it shows how the tool differs from existing tools and what benefits it reaps for its users.

  9. A comparison of the performance of a fluid code on the C90 and the iPSC/860

    International Nuclear Information System (INIS)

    The performance of nonlinear runs of a fluid code on the NERSC C90 and the ORNL Intel iPSC/860 is compared. This version of the KITE code is an initial value, three-dimensional, nonlinear, five-field code used for plasma turbulence studies. Because of the Fourier harmonic expansions in both sines and cosines, it has ten equations. The runs have from 385 to 513 radial grid points and 455 to 539 Fourier harmonics. The main components of the code are convolutions of Fourier harmonics and block tridiagonal matrix solves. Both parallel codes are optimized for the computer they use. With the collaboration of NERSC, microtasking calls have been added to the KITE serial code on the C90. The loop that contains calls to the block tridiagonal matrix solver is performed in parallel over the number of Fourier harmonics. The convolution routines also contain microtasking commands to compute the do loops in parallel over the number of Fourier harmonics. The authors are using an average of six concurrent CPUs for runs of thousands of timesteps in batch and many of the subroutines called every timestep are not microtasked yet. The KITE parallel code is running on 128 processors of the iPSC/860. The massively parallel version of this code allocates a radial region for each node. In this way, convolutions at a fixed radius are performed in parallel, and communication is limited to boundary values for each radial region. A second parallelization takes place for the block-tridiagonal solves. The Fourier components are distributed in nodes. In each node, the block-tridiagonal matrix is inverted for each of the allocated Fourier components. The authors compare CPU times, constraints imposed by memory size of the machines, difficulties in storing resulting data, and wallclock time needed to complete nonlinear runs

  10. Performance of the MTR core with MOX fuel using the MCNP4C2 code.

    Science.gov (United States)

    Shaaban, Ismail; Albarhoum, Mohamad

    2016-08-01

    The MCNP4C2 code was used to simulate the MTR-22 MW research reactor and perform the neutronic analysis for a new fuel namely: a MOX (U3O8&PuO2) fuel dispersed in an Al matrix for One Neutronic Trap (ONT) and Three Neutronic Traps (TNTs) in its core. Its new characteristics were compared to its original characteristics based on the U3O8-Al fuel. Experimental data for the neutronic parameters including criticality relative to the MTR-22 MW reactor for the original U3O8-Al fuel at nominal power were used to validate the calculated values and were found acceptable. The achieved results seem to confirm that the use of MOX fuel in the MTR-22 MW will not degrade the safe operational conditions of the reactor. In addition, the use of MOX fuel in the MTR-22 MW core leads to reduce the uranium fuel enrichment with (235)U and the amount of loaded (235)U in the core by about 34.84% and 15.21% for the ONT and TNTs cases, respectively. PMID:27213809

  11. Iterative MIMO Turbo Multiuser Detection and Equalization for STTrC-Coded Systems with Unknown Interference

    Directory of Open Access Journals (Sweden)

    Veselinovic Nenad

    2004-01-01

    Full Text Available Iterative multiuser detection in a single-carrier broadband multiple-input multiple-output (MIMO system is studied in this paper. A minimum mean squared error (MMSE low-complexity multiuser receiver is derived for space-division multiple-access (SDMA space-time trellis-coded (STTrC systems in frequency-selective fading channels. The receiver uses MMSE filtering to jointly detect several transmit antennas of the user of interest, while the interference from the undetected transmit antennas, cochannel interference (CCI, and intersymbol interference (ISI are all cancelled by the soft cancellation. The performances of two extreme receiver cases are evaluated. In the first case, only one transmit antenna of the user of interest is detected at a time and the remaining ones are cancelled by soft cancellation. In the second case, all the transmit antennas are detected jointly. The comparison of the two cases shows improvement with the latter one, both in single-user and multiuser communications and in the presence of unknown cochannel interference (UCCI. It is further shown that in the multiuser case, the proposed receivers approach the corresponding single-user bounds. The number of receive antenna elements required to achieve single-user bound is thereby equal to the number of users and not to the total number of transmit antennas.

  12. A simulation of a pebble bed reactor core by the MCNP-4C computer code

    Directory of Open Access Journals (Sweden)

    Bakhshayesh Moshkbar Khalil

    2009-01-01

    Full Text Available Lack of energy is a major crisis of our century; the irregular increase of fossil fuel costs has forced us to search for novel, cheaper, and safer sources of energy. Pebble bed reactors - an advanced new generation of reactors with specific advantages in safety and cost - might turn out to be the desired candidate for the role. The calculation of the critical height of a pebble bed reactor at room temperature, while using the MCNP-4C computer code, is the main goal of this paper. In order to reduce the MCNP computing time compared to the previously proposed schemes, we have devised a new simulation scheme. Different arrangements of kernels in fuel pebble simulations were investigated and the best arrangement to decrease the MCNP execution time (while keeping the accuracy of the results, chosen. The neutron flux distribution and control rods worth, as well as their shadowing effects, have also been considered in this paper. All calculations done for the HTR-10 reactor core are in good agreement with experimental results.

  13. Transduplication resulted in the incorporation of two protein-coding sequences into the Turmoil-1 transposable element of C. elegans

    Directory of Open Access Journals (Sweden)

    Pupko Tal

    2008-10-01

    Full Text Available Abstract Transposable elements may acquire unrelated gene fragments into their sequences in a process called transduplication. Transduplication of protein-coding genes is common in plants, but is unknown of in animals. Here, we report that the Turmoil-1 transposable element in C. elegans has incorporated two protein-coding sequences into its inverted terminal repeat (ITR sequences. The ITRs of Turmoil-1 contain a conserved RNA recognition motif (RRM that originated from the rsp-2 gene and a fragment from the protein-coding region of the cpg-3 gene. We further report that an open reading frame specific to C. elegans may have been created as a result of a Turmoil-1 insertion. Mutations at the 5' splice site of this open reading frame may have reactivated the transduplicated RRM motif. Reviewers This article was reviewed by Dan Graur and William Martin. For the full reviews, please go to the Reviewers' Reports section.

  14. SCALE: A modular code system for performing standardized computer analyses for licensing evaluation: Control modules C4, C6

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This Manual represents Revision 5 of the user documentation for the modular code system referred to as SCALE. The history of the SCALE code system dates back to 1969 when the current Computational Physics and Engineering Division at Oak Ridge National Laboratory (ORNL) began providing the transportation package certification staff at the U. S. Atomic Energy Commission with computational support in the use of the new KENO code for performing criticality safety assessments with the statistical Monte Carlo method. From 1969 to 1976 the certification staff relied on the ORNL staff to assist them in the correct use of codes and data for criticality, shielding, and heat transfer analyses of transportation packages. However, the certification staff learned that, with only occasional use of the codes, it was difficult to become proficient in performing the calculations often needed for an independent safety review. Thus, shortly after the move of the certification staff to the U.S. Nuclear Regulatory Commission (NRC), the NRC staff proposed the development of an easy-to-use analysis system that provided the technical capabilities of the individual modules with which they were familiar. With this proposal, the concept of the Standardized Computer Analyses for Licensing Evaluation (SCALE) code system was born. This volume is part of the manual related to the control modules for the newest updated version of this computational package.

  15. SCALE: A modular code system for performing standardized computer analyses for licensing evaluation: Control modules C4, C6

    International Nuclear Information System (INIS)

    This Manual represents Revision 5 of the user documentation for the modular code system referred to as SCALE. The history of the SCALE code system dates back to 1969 when the current Computational Physics and Engineering Division at Oak Ridge National Laboratory (ORNL) began providing the transportation package certification staff at the U. S. Atomic Energy Commission with computational support in the use of the new KENO code for performing criticality safety assessments with the statistical Monte Carlo method. From 1969 to 1976 the certification staff relied on the ORNL staff to assist them in the correct use of codes and data for criticality, shielding, and heat transfer analyses of transportation packages. However, the certification staff learned that, with only occasional use of the codes, it was difficult to become proficient in performing the calculations often needed for an independent safety review. Thus, shortly after the move of the certification staff to the U.S. Nuclear Regulatory Commission (NRC), the NRC staff proposed the development of an easy-to-use analysis system that provided the technical capabilities of the individual modules with which they were familiar. With this proposal, the concept of the Standardized Computer Analyses for Licensing Evaluation (SCALE) code system was born. This volume is part of the manual related to the control modules for the newest updated version of this computational package

  16. 5' coding region of the follicular epithelium yolk polypeptide 2 cDNA in the moth, Plodia interpunctella, contains an extended coding region.

    Science.gov (United States)

    Shirk, P D; Perera, O P

    1998-01-01

    The 5' region of YP2 cDNA, a follicular epithelium yolk protein subunit in the moth, Plodia interpunctella, shows that the polypeptide contains an extended internal coding region. Partial cDNA clones for YP2 were isolated from a pharate adult female ovarian cDNA expression library in Lambda Zap II by screening with antigen selected YP2 antiserum. The 5' sequence of the YP2 transcript was determined by 5' RACE PCR of ovarian mRNA using YP2 sequence-specific nested primers. The combined cDNA and 5' RACE sequencing showed the YP2 transcript to be 1971 bp in length up to the poly(A) tail with a single open reading frame for a predicted polypeptide of 616 amino acids. Northern analysis showed a single YP2 transcript to be present in ovarian RNA that was approximately 2 kb in length. The predicted amino acid sequence for YP2 from P. interpunctella is most closely related to egg specific protein (ESP) from Bombyx mori and the partial YP2 sequence from Galleria mellonella. YP2 from P. interpunctella also is similar to vertebrate lipases and contains a conserved lipid binding region. However, the 5' coding region of YP2 from P. interpunctella contains an in-frame insert of approximately 438 bp that had replaced an approximately 270-bp region as compared with ESP from B. mori and YP2 of G. mellonella. This suggests that the insert occurred by a recombinational event internal to the YP2 structural gene of P. interpunctella.

  17. Code C# for chaos analysis of relativistic many-body systems with reactions

    Science.gov (United States)

    Grossu, I. V.; Besliu, C.; Jipa, Al.; Stan, E.; Esanu, T.; Felea, D.; Bordeianu, C. C.

    2012-04-01

    In this work we present a reaction module for “Chaos Many-Body Engine” (Grossu et al., 2010 [1]). Following our goal of creating a customizable, object oriented code library, the list of all possible reactions, including the corresponding properties (particle types, probability, cross section, particle lifetime, etc.), could be supplied as parameter, using a specific XML input file. Inspired by the Poincaré section, we propose also the “Clusterization Map”, as a new intuitive analysis method of many-body systems. For exemplification, we implemented a numerical toy-model for nuclear relativistic collisions at 4.5 A GeV/c (the SKM200 Collaboration). An encouraging agreement with experimental data was obtained for momentum, energy, rapidity, and angular π distributions. Catalogue identifier: AEGH_v2_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEGH_v2_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 184 628 No. of bytes in distributed program, including test data, etc.: 7 905 425 Distribution format: tar.gz Programming language: Visual C#.NET 2005 Computer: PC Operating system: Net Framework 2.0 running on MS Windows Has the code been vectorized or parallelized?: Each many-body system is simulated on a separate execution thread. One processor used for each many-body system. RAM: 128 Megabytes Classification: 6.2, 6.5 Catalogue identifier of previous version: AEGH_v1_0 Journal reference of previous version: Comput. Phys. Comm. 181 (2010) 1464 External routines: Net Framework 2.0 Library Does the new version supersede the previous version?: Yes Nature of problem: Chaos analysis of three-dimensional, relativistic many-body systems with reactions. Solution method: Second order Runge-Kutta algorithm for simulating relativistic many-body systems with reactions

  18. DFMSPH14: A C-code for the double folding interaction potential of two spherical nuclei

    Science.gov (United States)

    Gontchar, I. I.; Chushnyakova, M. V.

    2016-09-01

    This is a new version of the DFMSPH code designed to obtain the nucleus-nucleus potential by using the double folding model (DFM) and in particular to find the Coulomb barrier. The new version uses the charge, proton, and neutron density distributions provided by the user. Also we added an option for fitting the DFM potential by the Gross-Kalinowski profile. The main functionalities of the original code (e.g. the nucleus-nucleus potential as a function of the distance between the centers of mass of colliding nuclei, the Coulomb barrier characteristics, etc.) have not been modified.

  19. GoCxx: a tool to easily leverage C++ legacy code for multicore-friendly Go libraries and frameworks

    International Nuclear Information System (INIS)

    Current HENP libraries and frameworks were written before multicore systems became widely deployed and used. From this environment, a ‘single-thread’ processing model naturally emerged but the implicit assumptions it encouraged are greatly impairing our abilities to scale in a multicore/manycore world. Writing scalable code in C++ for multicore architectures, while doable, is no panacea. Sure, C++11 will improve on the current situation (by standardizing on std::thread, introducing lambda functions and defining a memory model) but it will do so at the price of complicating further an already quite sophisticated language. This level of sophistication has probably already strongly motivated analysis groups to migrate to CPython, hoping for its current limitations with respect to multicore scalability to be either lifted (Grand Interpreter Lock removal) or for the advent of a new Python VM better tailored for this kind of environment (PyPy, Jython, …) Could HENP migrate to a language with none of the deficiencies of C++ (build time, deployment, low level tools for concurrency) and with the fast turn-around time, simplicity and ease of coding of Python? This paper will try to make the case for Go - a young open source language with built-in facilities to easily express and expose concurrency - being such a language. We introduce GoCxx, a tool leveraging gcc-xml's output to automatize the tedious work of creating Go wrappers for foreign languages, a critical task for any language wishing to leverage legacy and field-tested code. We will conclude with the first results of applying GoCxx to real C++ code.

  20. Expression of I-A and I-E,C region-coded Ia antigens on functional B cell subpopulations.

    Science.gov (United States)

    Frelinger, J A; Hibbler, F J; Hill, S W

    1978-12-01

    Ia antigens from specific subregions have been examined on functional B cell populations. Expression of both I-A and I-E,C region antigens was demonstrated on cells required for both lipopolysaccharide mitogenesis and polyclonal activation. Similar I-A and I-E,C subregion expression was found on cells required for response to the T-independent antigen, polyvinylpyrrolidone. TNP-specific IgM and hen egg lysozyme-specific IgG plaque-forming cells also express I-A and I-E,C region antigens. No evidence was found for an Ia- population responsive in the systems tested. Further, no evidence of preferential expression of I-A or I-E,C region antigens was observed in any system examined. Therefore, it appears that B cells express both I-A and I-E,C region-coded Ia antigens.

  1. COMMIX-1C code estimation for the pool dynamics of Istanbul Technical University TRIGA MARK-II reactor

    International Nuclear Information System (INIS)

    In this study, the COMMIX-1C code is used to investigate the pool dynamics of Istanbul Technical University (ITU)TRIGA MARK-II reactor by simulating the velocity, pressure and temperature distributions in the reactor pool as a function of core design parameters and pool configuration. COMMIX-1C is multi-purpose, three-dimensional. transient, single-phase, thermal-hydraulics computer code. For the mass, momentum and energy equations, it uses a porous-medium formulation, a finite-volume algorithm, a flow modulated skew-upwind discretization scheme to reduce numerical diffusion and k-ε two-equation turbulence model. Its implementation for the particular system requires geometric and physical modelling decisions. ITU TRIGA MARK-II reactor pool is considered partly as continuum and partly as porous medium. All the major pool components are explicitly modelled in the simulation. Shape of the pool structure and computational cells are accounted for using the concept of directional surface permeability, volume porosity, distributed resistance, and distributed heat source or sink. The results are compared to the results of the computer codes TRISTAN, TRIGATH and TRIGATH-R

  2. Performance Analysis of Code OptimizationBased on TMS320C6678 Multi-core DSP

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    In the development of modern DSP, more and more use of C/C++ as a development language has become a trend. Optimizationof C/C++ program has become an important link of the DSP software development. This article describes the structure features ofTMS320C6678 processor, illustrates the principle of efficient optimization method for C/C++, and analyzes the results.

  3. 基于 GCC的 TMS320C67xx 汇编代码的优化%TMS320C67xx assembler code optimization based on GCC

    Institute of Scientific and Technical Information of China (English)

    王浩

    2015-01-01

    In order to generate higher efficiency assembler code ,design and implement a TMS320C67xx assembler in‐struction level optimization algorithm based on GCC .Firstly ,assembler instructions are divided into different types ac‐cording to the function of instructions .Then ,link assembler instructions to the list .Secondly ,establish a read and write operation instruction list for each register .Finally ,through the judgment of instruction types and the analysis of read and write instructions list for each register ,complete the deletion of redundant code and the merging of instructions .The ex‐perimental results show that the execution efficiency of TMS320C67xx assembler code increased by about 20% after code optimization .Compared with the intermediate code optimization ,execution efficiency increased by about 15% .%为了使生成的汇编代码具有更高的执行效率,设计并实现了一种基于GCC的 TMS320C67xx汇编指令级的代码优化算法。首先,将汇编指令按照功能划分为不同的指令类型,并将汇编指令链接到链表中。然后,针对每一个寄存器建立对该寄存器的读写操作指令链表。最后,通过对指令类型的判断和对寄存器读写操作指令链表的分析,完成了冗余代码的删除和指令合并。实验结果表明,经过代码优化后,TMS320C67xx汇编代码的执行效率提高了20%左右,较中间代码级的优化算法执行效率提高了15%左右。

  4. Computational prediction of over-annotated protein-coding genes in the genome of Agrobacterium tumefaciens strain C58

    Science.gov (United States)

    Yu, Jia-Feng; Sui, Tian-Xiang; Wang, Hong-Mei; Wang, Chun-Ling; Jing, Li; Wang, Ji-Hua

    2015-12-01

    Agrobacterium tumefaciens strain C58 is a type of pathogen that can cause tumors in some dicotyledonous plants. Ever since the genome of A. tumefaciens strain C58 was sequenced, the quality of annotation of its protein-coding genes has been queried continually, because the annotation varies greatly among different databases. In this paper, the questionable hypothetical genes were re-predicted by integrating the TN curve and Z curve methods. As a result, 30 genes originally annotated as “hypothetical” were discriminated as being non-coding sequences. By testing the re-prediction program 10 times on data sets composed of the function-known genes, the mean accuracy of 99.99% and mean Matthews correlation coefficient value of 0.9999 were obtained. Further sequence analysis and COG analysis showed that the re-annotation results were very reliable. This work can provide an efficient tool and data resources for future studies of A. tumefaciens strain C58. Project supported by the National Natural Science Foundation of China (Grant Nos. 61302186 and 61271378) and the Funding from the State Key Laboratory of Bioelectronics of Southeast University.

  5. Simulation on C/A codes and analysis of GPS/pseudolite signals acquisition

    Institute of Scientific and Technical Information of China (English)

    ZHANG Lei

    2009-01-01

    The global positioning system (GPS) is an extremely mature technique in the navigation and position-ing field. However, there are still some limits in some aspects and for some special applications. Spe-cially, the performance of GPS needs to be improved with technological advances. As a GPS-like ground transmitter, the pseudolite provides a new research direction to achieve high positioning ac-curacy and reliability. In this paper, we describe the core technologies of designing and simulation on the coarse acquisition codes in constructing the pseudolite system. In the GPS/pseudolite integration system, the signal PRN 36 of the pseudolite and the GPS satellites signals are acquired in the modified receiver based on the computer software platform. It is shown that the pseudolite technology is ideally suited to augment the GPS alone and provide greater integrity, availability, and continuity of the navi-gation positioning system, especially for indoor use.

  6. Shielding analysis of the microtron MT-25 bunker using the MCNP-4C code and NCRP report 51

    International Nuclear Information System (INIS)

    A cyclic electron accelerator Microtron MT-25 will be installed in Havana (Cuba)). Electrons, neutrons and gamma radiation up to 25 MeV can be produced in the MT-25. A detailed shielding analysis for the bunker is carried out using two ways: the NCRP-51 Report and the Monte Carlo Method (MCNP-4C Code). The walls and ceiling thicknesses are estimated with dose constraints of 0.5 and 20 mSv y-1, respectively, and an area occupancy factor of 1/16. Both results are compared and a preliminary bunker design is shown. (authors)

  7. Construction of infectious cDNA clones of PRRSV: Separation of coding regions for nonstructural and structural proteins

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Porcine Reproductive and Respiratory Syndrome Virus (PRRSV), the causative agent of the ongoing "porcine high fever syndrome" in China, is capable of genetic and antigenic mutations at high fre- quency. How to design vaccine rationally to keep up with the ever-changing prevalent PRRSV variant is of great interest. We developed an infectious cDNA clone of an attenuated strain of Type II PRRSV, and further manipulated the infectious cDNA clone by inserting polylinker between ORF1 and ORF2, en- coding for nonstructural- or structural-protein, respectively. The cDNA was generated from the cell-attenuated virus strain, APRRS, via RT-PCR, and followed by nucleotide sequencing and molecular cloning. The full-length of the APRRS genomic RNA was determined as 15521 nucleotides in length excluding poly(A) tail, which has a 99.7% nucleotide identity with that of PRRSV Nsp strain, also a vac- cine strain. Based on the nucleotide sequencing results, the full-length cDNA clone was assembled in pBlueScript vector, under the control of T7 promoter at the immediate 5′ terminus of genome. To dis- cern the rescued viruses from that of parental virus, a Mlu I restriction site was engineered into ORF5 coding region. Upon transfection of the in vitro transcripts of both the original and Mlu I-tagged cDNAs into MA-104 cells, typical PRRSV cytopathic effects were observed. The rescued viruses from the full-length cDNA clones displayed the same virological and molecular properties. Subsequently, PCR-based mutagenesis was conducted to separate the coding regions between PRRSV nonstructural genes, ORF1, and structural proteins, ORF2-ORF7. The synthetic RNA of such mutant clone, pCSA, was infectious and the rescued virus shared similar properties with that of the parental virus. This study provided a valuable tool for development of chimeric PRRSV as vaccine candidate offering cross-protection to various genetically diversified PRRSV strains, and a platform for further develop- ment of

  8. SU-C-201-03: Coded Aperture Gamma-Ray Imaging Using Pixelated Semiconductor Detectors

    Energy Technology Data Exchange (ETDEWEB)

    Joshi, S [Wayne State University, Detroit, MI (United States); Kaye, W; Jaworski, J [H3D, Inc., Ann Arbor, MI (United States); He, Z [University of Michigan, Ann Arbor, MI (United States)

    2015-06-15

    Purpose: Improved localization of gamma-ray emissions from radiotracers is essential to the progress of nuclear medicine. Polaris is a portable, room-temperature operated gamma-ray imaging spectrometer composed of two 3×3 arrays of thick CdZnTe (CZT) detectors, which detect gammas between 30keV and 3MeV with energy resolution of <1% FWHM at 662keV. Compton imaging is used to map out source distributions in 4-pi space; however, is only effective above 300keV where Compton scatter is dominant. This work extends imaging to photoelectric energies (<300keV) using coded aperture imaging (CAI), which is essential for localization of Tc-99m (140keV). Methods: CAI, similar to the pinhole camera, relies on an attenuating mask, with open/closed elements, placed between the source and position-sensitive detectors. Partial attenuation of the source results in a “shadow” or count distribution that closely matches a portion of the mask pattern. Ideally, each source direction corresponds to a unique count distribution. Using backprojection reconstruction, the source direction is determined within the field of view. The knowledge of 3D position of interaction results in improved image quality. Results: Using a single array of detectors, a coded aperture mask, and multiple Co-57 (122keV) point sources, image reconstruction is performed in real-time, on an event-by-event basis, resulting in images with an angular resolution of ∼6 degrees. Although material nonuniformities contribute to image degradation, the superposition of images from individual detectors results in improved SNR. CAI was integrated with Compton imaging for a seamless transition between energy regimes. Conclusion: For the first time, CAI has been applied to thick, 3D position sensitive CZT detectors. Real-time, combined CAI and Compton imaging is performed using two 3×3 detector arrays, resulting in a source distribution in space. This system has been commercialized by H3D, Inc. and is being acquired for

  9. Ciberaprotestas y código (penal Cyberprotests and the (penal code

    Directory of Open Access Journals (Sweden)

    Edición Activismo y Movimientos sociales

    2012-06-01

    Full Text Available Las amplias y aceleradas transformaciones sociales y tecnológicas sucedidas de las últimas décadas están produciendo en la coyuntura de crisis importantes reacomodos globales en los sistemas productivos que empiezan a tener efectos políticos en la institucionalidad democrática configurada desde la posguerra europea. Parece emerger un ciclo de contestación con un sensible aumento de las movilizaciones en un número crecientes de países, en el que las redes sociales telemáticas contribuyen a un aumento de la capacidad de difusión y coordinación de unos movimientos sociales que, con su trabajo en red diversifican, repertorios de protestas y propuestas de alcance transnacional.Given the current turmoil of demonstrations and social protests that use Internet social networks as means of dissemination and organization, it seems Westerns governments are testing or trying to develop new measures of social control via modification of their legal codes. This article explores the situation of Spain in this respect, through four short interviews with communication and new media professionals: Elvira Huelbes (Journalist at Cuarto Poder, Jaime Pastor (Political Sciencies Professor in UNED, Javier de la Cueva (Lawyer specialized in ICTand Miguel Romero (Editor of Viento Sur.

  10. Simulation on C/A codes and analysis of GPS/pseudolite signals acquisition

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    The global positioning system(GPS) is an extremely mature technique in the navigation and position-ing field.However,there are still some limits in some aspects and for some special applications.Spe-cially,the performance of GPS needs to be improved with technological advances.As a GPS-like ground transmitter,the pseudolite provides a new research direction to achieve high positioning ac-curacy and reliability.In this paper,we describe the core technologies of designing and simulation on the coarse acquisition codes in constructing the pseudolite system.In the GPS/pseudolite integration system,the signal PRN 36 of the pseudolite and the GPS satellites signals are acquired in the modified receiver based on the computer software platform.It is shown that the pseudolite technology is ideally suited to augment the GPS alone and provide greater integrity,availability,and continuity of the navi-gation positioning system,especially for indoor use.

  11. Isolation of cDNA clones coding for human tissue factor: primary structure of the protein and cDNA

    Energy Technology Data Exchange (ETDEWEB)

    Spicer, E.K.; Horton, R.; Bloem, L.; Bach, R.; Williams, K.R.; Guha, A.; Kraus, J.; Lin, T.C.; Nemerson, Y.; Konigsberg, W.H.

    1987-08-01

    Tissue factor is a membrane-bound procoagulant protein that activates the extrinsic pathway of blood coagulation in the presence of factor VII and calcium. lambda Phage containing the tissue factor gene were isolated from a human placental cDNA library. The amino acid sequence deduced from the nucleotide sequence of the cDNAs indicates that tissue factor is synthesized as a higher molecular weight precursor with a leader sequence of 32 amino acids, while the mature protein is a single polypeptide chain composed of 263 residues. The derived primary structure of tissue factor has been confirmed by comparison to protein and peptide sequence data. The sequence of the mature protein suggests that there are three distinct domains: extracellular, residues 1-219; hydrophobic, residues 220-242; and cytoplasmic, residues 243-263. Three potential N-linked carbohydrate attachment sites occur in the extracellular domain. The amino acid sequence of tissue factor shows no significant homology with the vitamin K-dependent serine proteases, coagulation cofactors, or any other protein in the National Biomedical Research Foundation sequence data bank (Washington, DC).

  12. 28 CFR 2.80 - Guidelines for D.C. Code offenders.

    Science.gov (United States)

    2010-07-01

    ... correct any error in the calculation of the D.C. Board's guidelines. (5) Prisoners given initial hearings... found in 28 CFR 2.80, Appendix to § 2.80 (2000)). For a prisoner given an initial hearing under the § 2... mental faculty. (4) Other violence means any of the following felony offenses that does not qualify...

  13. 49 CFR Appendix C to Part 215 - FRA Freight Car Standards Defect Code

    Science.gov (United States)

    2010-10-01

    ... description of defects on bad order tags affixed to cars being moved for repair under § 215.9. However, it may...) Not located in design position. 215.115Defective roller bearing. (A)(1) Overheated; (2) Loose or... roller bearing adapter. (A) Cracked or broken. (B) Not in design position. (C) Worn excessively as...

  14. cDNA sequence coding for the alpha'-chain of the third complement component in the African lungfish.

    Science.gov (United States)

    Sato, A; Sültmann, H; Mayer, W E; Figueroa, F; Tichy, H; Klein, J

    1999-04-01

    cDNA clones coding for almost the entire C3 alpha-chain of the African lungfish (Protopterus aethiopicus), a representative of the Sarcopterygii (lobe-finned fishes), were sequenced and characterized. From the sequence it is deduced that the lungfish C3 molecule is probably a disulphide-bonded alpha:beta dimer similar to that of the C3 components of other jawed vertebrates. The deduced sequence contains conserved sites presumably recognized by proteolytic enzymes (e.g. factor I) involved in the activation and inactivation of the component. It also contains the conserved thioester region and the putative site for binding properdin. However, the site for the interaction with complement receptor 2 and factor H are poorly conserved. Either complement receptor 2 and factor H are not present in the lungfish or they bind to different residues at the same or a different site than mammalian complement receptor 2 and factor H. The C3 alpha-chain sequences faithfully reflect the phylogenetic relationships among vertebrate classes and can therefore be used to help to resolve the long-standing controversy concerning the origin of the tetrapods. PMID:10219761

  15. The characterization of cDNA clones coding for wheat storage proteins.

    OpenAIRE

    Bartels, D.; Thompson, R D

    1983-01-01

    Poly(A)+ RNA isolated from the developing wheat endosperm var. Chinese Spring, has been used as template for the construction of a cDNA library. Within the library, clones have been identified by in vitro translation of hybrid-selected mRNA which encode alpha/beta gliadin related sequences and gamma-gliadin related sequences. The DNA sequence of one such clone has been determined and it shows homology with that of a clone encoding a barley storage protein, B-hordein. The sequence includes a t...

  16. Construction of infectious cDNA clones of PRRSV:Separation of coding regions for nonstructural and structural proteins

    Institute of Scientific and Technical Information of China (English)

    YUAN ShiShan; WEI ZuZhang

    2008-01-01

    Porcine Reproductive and Respiratory Syndrome Virus (PRRSV), the causative agent of the ongoing"porcine high fever syndrome" in China, is capable of genetic and antigenic mutations at high frequency. How to design vaccine rationally to keep up with the ever-changing prevalent PRRSV variant is of great Interest. We developed an infectious cDNA clone of an attenuated strain of Type Ⅱ PRRSV, and further manipulated the infectious cDNA clone by inserting polylinker between ORF1 and ORF2, encoding for nonstructural- or structural-protein, respectively. The cDNA was generated from the cell-attenuated virus strain, APRRS, via RT-PCR, and followed by nucleotide sequencing and molecular cloning. The full-length of the APRRS genomic RNA was determined as 15521 nucleotides in length excluding poly(A) tail, which has a 99.7% nucleotide identity with that of PRRSV Nsp strain, also a vaccine strain. Based on the nucleotide sequencing results, the full-length cDNA clone was assembled in pBlueScript vector, under the control of T7 promoter at the immediate 5' terminus of genome. To discern the rescued viruses from that of parental virus, a Mlu I restriction site was engineered into ORF5 coding region. Upon trensfection of the in vitro transcripts of both the original and MIu I-tagged cDNAs into MA-104 cells, typical PRRSV cytopathic effects were observed. The rescued viruses from the full-length cDNA clones displayed the same virological and molecular properties. Subsequently,PCR-based mutagenesis was conducted to separate the coding regions between PRRSV nonstructural genes, ORF1, and structural proteins, ORF2-ORF7. The synthetic RNA of such mutant clone, pCSA,was infectious and the rescued virus shared similar properties with that of the parental virus. This study provided a valuable tool for development of chimeric PRRSV as vaccine candidate offering crose-protection to various genetically diversified PRRSV strains, and a platform for further development of PRRSV as a gene

  17. Varian 2100C/D Clinac 18 MV photon phase space file characterization and modeling by using MCNP Code

    Science.gov (United States)

    Ezzati, Ahad Ollah

    2015-07-01

    Multiple points and a spatial mesh based surface source model (MPSMBSS) was generated for 18MV Varian 2100 C/D Clinac phase space file (PSF) and implemented in MCNP code. The generated source model (SM) was benchmarked against PSF and measurements. PDDs and profiles were calculated using the SM and original PSF for different field sizes from 5 × 5 to 20 × 20 cm2. Agreement was within 2% of the maximum dose at 100cm SSD for beam profiles at the depths of 4cm and 15cm with respect to the original PSF. Differences between measured and calculated points were less than 2% of the maximum dose or 2mm distance to agreement (DTA) at 100 cm SSD. Thus it can be concluded that the modified MCNP code can be used for radiotherapy calculations including multiple source model (MSM) and using the source biasing capability of MPSMBSS can increase the simulation speed up to 3600 for field sizes smaller than 5 × 5 cm2.

  18. Code package MAG c user tool for numerical modeling of 1D shock wave and dynamic processes in solids

    Science.gov (United States)

    Rudenko, Vladimir; Shaburov, Michail

    1999-06-01

    Design and theoretical and numerical preparation of shock wave experiments require, as a rule, conduction of a large amount of calculations. Usually preparation of a problem for numerical solution, calculation and processing of the results is done be programmers c mathematicians. The appearance of powerful personal computers and interface tools allows to develop such user-oriented programs that a researcher can handle them without the help of a mathematician, even if he does not have special programming background. Code package MAG for numerical solution of 1D system of equations of hydrodynamics, elastoplastics, heat conduction and magnetic hydrodynamic. A number of modern models of elastoplastics and kinetics of power materials is implemented in it. The package includes libraries of equations of state, thermal physical and electromagnetic properties of substances. The code package is an interactive visual medium providing a user with the following capabilities: ? Input and edit initial data for a problem; ? Calculate separate problems, as well as series of problems with a possibility of automatic variation of parameters; ? View the modeled phenomena dynamically using the means of visualization; ? Control the process of calculation: terminate the calculation, change parameters, make express-processing of the results, continue the calculation etc.; ? Process the numerical results producing final plots and tables; ? Record and store numerical results in databases, including the formats supported by Microsoft Word, Acces, Exel; ? Make dynamic visual comparison of the results of several simultaneous calculations; ? Carry out automatic numerical optimization of a selected experimental scheme. The package is easy in use, allows prompt input and convenient information processing. The validity of numerical results obtained with the package MAG has been proved by numerous hydrodynamic experiments and comparisons with numerical results from similar programs. The package was

  19. The long non-coding RNA PARROT is an upstream regulator of c-Myc and affects proliferation and translation

    Science.gov (United States)

    Vučićević, Dubravka; Gehre, Maja; Dhamija, Sonam; Friis-Hansen, Lennart; Meierhofer, David; Sauer, Sascha; Ørom, Ulf Andersson

    2016-01-01

    Long non-coding RNAs are important regulators of gene expression and signaling pathways. The expression of long ncRNAs is dysregulated in cancer and other diseases. The identification and characterization of long ncRNAs is often challenging due to their low expression level and localization to chromatin. Here, we identify a functional long ncRNA, PARROT (Proliferation Associated RNA and Regulator Of Translation) transcribed by RNA polymerase II and expressed at a relatively high level in a number of cell lines. The PARROT long ncRNA is associated with proliferation in both transformed and normal cell lines. We characterize the long ncRNA PARROT as an upstream regulator of c-Myc affecting cellular proliferation and translation using RNA sequencing and mass spectrometry following depletion of the long ncRNA. PARROT is repressed during senescence of human mammary epithelial cells and overexpressed in some cancers, suggesting an important association with proliferation through regulation of c-Myc. With this study, we add to the knowledge of cytoplasmic functional long ncRNAs and extent the long ncRNA-Myc regulatory network in transformed and normal cells. PMID:27129154

  20. Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE

    Directory of Open Access Journals (Sweden)

    Mrs. S. Ramya

    2013-07-01

    Full Text Available Cloud computing techniques are used to share resources. It transfers the application software and databases to the centralized large data centers. Storing important data with cloud storage providers comes with serious security risks. The cloud can leak confidential data, modify the data, or return inconsistent data to different users. So, the cloud data security requires authentication and integrity analysis for the storage data values. An erasure code provides redundancy by breaking objects up into smaller fragments and storing the fragments in different places. The key is that you can recover the data from any combination of a smaller number of those fragments. With threshold proxy re-encryption scheme (PRE , a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval. It meets the requirements that storage servers independently perform encoding and re-encryption and key servers independently perform partial decryption. The system user forwards his data in the storage servers to another user without retrieving the data back. A major feature of the cloud services is that user’s data are usually processed remotely in unknown machines that users do not own or operate. Conditional Proxy Re-Encryption (C-PRE is proposed, whereby user has a fine-grained control over the delegation. As a result, user can flexibly assign her delegate, and decryption capability based on the conditions attached to the messages, using a proxy with no higher trust than in existing PRE schemes

  1. Comparative analysis of hepatitis C virus phylogenies from coding and non-coding regions: the 5' untranslated region (UTR fails to classify subtypes

    Directory of Open Access Journals (Sweden)

    Leitner Thomas

    2006-12-01

    Full Text Available Abstract Background The duration of treatment for HCV infection is partly indicated by the genotype of the virus. For studies of disease transmission, vaccine design, and surveillance for novel variants, subtype-level classification is also needed. This study used the Shimodaira-Hasegawa test and related statistical techniques to compare phylogenetic trees obtained from coding and non-coding regions of a whole-genome alignment for the reliability of subtyping in different regions. Results Different regions of the HCV genome yield inconsistent phylogenies, which can lead to erroneous conclusions about classification of a given infection. In particular, the highly conserved 5' untranslated region (UTR yields phylogenetic trees with topologies that differ from the HCV polyprotein and complete genome phylogenies. Phylogenetic trees from the NS5B gene reliably cluster related subtypes, and yield topologies consistent with those of the whole genome and polyprotein. Conclusion These results extend those from previous studies and indicate that, unlike the NS5B gene, the 5' UTR contains insufficient variation to resolve HCV classifications to the level of viral subtype, and fails to distinguish genotypes reliably. Use of the 5' UTR for clinical tests to characterize HCV infection should be replaced by a subtype-informative test.

  2. Predicting CYP2C19 catalytic parameters for enantioselective oxidations using artificial neural networks and a chirality code.

    Science.gov (United States)

    Hartman, Jessica H; Cothren, Steven D; Park, Sun-Ha; Yun, Chul-Ho; Darsey, Jerry A; Miller, Grover P

    2013-07-01

    Cytochromes P450 (CYP for isoforms) play a central role in biological processes especially metabolism of chiral molecules; thus, development of computational methods to predict parameters for chiral reactions is important for advancing this field. In this study, we identified the most optimal artificial neural networks using conformation-independent chirality codes to predict CYP2C19 catalytic parameters for enantioselective reactions. Optimization of the neural networks required identifying the most suitable representation of structure among a diverse array of training substrates, normalizing distribution of the corresponding catalytic parameters (k(cat), K(m), and k(cat)/K(m)), and determining the best topology for networks to make predictions. Among different structural descriptors, the use of partial atomic charges according to the CHelpG scheme and inclusion of hydrogens yielded the most optimal artificial neural networks. Their training also required resolution of poorly distributed output catalytic parameters using a Box-Cox transformation. End point leave-one-out cross correlations of the best neural networks revealed that predictions for individual catalytic parameters (k(cat) and K(m)) were more consistent with experimental values than those for catalytic efficiency (k(cat)/K(m)). Lastly, neural networks predicted correctly enantioselectivity and comparable catalytic parameters measured in this study for previously uncharacterized CYP2C19 substrates, R- and S-propranolol. Taken together, these seminal computational studies for CYP2C19 are the first to predict all catalytic parameters for enantioselective reactions using artificial neural networks and thus provide a foundation for expanding the prediction of cytochrome P450 reactions to chiral drugs, pollutants, and other biologically active compounds.

  3. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  4. The capsid-coding region hairpin element (cHP) is a critical determinant of dengue virus and West Nile virus RNA synthesis

    OpenAIRE

    Clyde, Karen; Barrera, Julio; Harris, Eva

    2008-01-01

    Dengue virus (DENV) and West Nile virus (WNV) are members of the Flavivirus genus of positive-strand RNA viruses. RNA sequences and structures, primarily in the untranslated regions, have been shown to modulate flaviviral gene expression and genome replication. Previously, we demonstrated that a structure in the DENV coding region (cHP) enhances translation start codon selection and is required for viral replication. Here we further characterize the role of the cHP in the DENV life cycle. We ...

  5. Hamevol1.0: a C++ code for differential equations based on Runge-Kutta algorithm. An application to matter enhanced neutrino oscillation

    CERN Document Server

    Aliani, P; Picariello, M; Torrente-Lujan, E; Torrente-Lujan, Emilio

    2003-01-01

    We present a C++ implementation of a fifth order semi-implicit Runge-Kutta algorithm for solving Ordinary Differential Equations. This algorithm can be used for studying many different problems and in particular it can be applied for computing the evolution of any system whose Hamiltonian is known. We consider in particular the problem of calculating the neutrino oscillation probabilities in presence of matter interactions. The time performance and the accuracy of this implementation is competitive with respect to the other analytical and numerical techniques used in literature. The algorithm design and the salient features of the code are presented and discussed and some explicit examples of code application are given.

  6. Line-Shape Code Comparison through Modeling and Fitting of Experimental Spectra of the C ii 723-nm Line Emitted by the Ablation Cloud of a Carbon Pellet

    Directory of Open Access Journals (Sweden)

    Mohammed Koubiti

    2014-07-01

    Full Text Available Various codes of line-shape modeling are compared to each other through the profile of the C ii 723-nm line for typical plasma conditions encountered in the ablation clouds of carbon pellets, injected in magnetic fusion devices. Calculations were performed for a single electron density of 1017 cm−3 and two plasma temperatures (T = 2 and 4 eV. Ion and electron temperatures were assumed to be equal (Te = Ti = T. The magnetic field, B, was set equal to either to zero or 4 T. Comparisons between the line-shape modeling codes and two experimental spectra of the C ii 723-nm line, measured perpendicularly to the B-field in the Large Helical Device (LHD using linear polarizers, are also discussed.

  7. Analysis of the variation of the attenuation curve in function of the radiation field size for k Vp X-ray beams using the MCNP-5C code

    Energy Technology Data Exchange (ETDEWEB)

    Fernandes, Marco A.R., E-mail: marco@cetea.com.b, E-mail: marfernandes@fmb.unesp.b [Universidade Estadual Paulista Julio de Mesquita Filho (FMB/UNESP), Botucatu, SP (Brazil). Fac. de Medicina; Ribeiro, Victor A.B. [Universidade Estadual Paulista Julio de Mesquita Filho (IBB/UNESP), Botucatu, SP (Brazil). Inst. de Biociencias; Viana, Rodrigo S.S.; Coelho, Talita S. [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil)

    2011-07-01

    The paper illustrates the use of the Monte Carlo method, MCNP-5C code, to analyze the attenuation curve behavior of the 50 kVp radiation beam from superficial radiotherapy equipment as Dermopan2 model. The simulations seek to verify the MCNP-5C code performance to study the variation of the attenuation curve - percentage depth dose (PDD) curve - in function of the radiation field dimension used at radiotherapy of skin tumors with 50 kVp X-ray beams. The PDD curve was calculated for six different radiation field sizes with circular geometry of 1.0, 2.0, 3.0, 4.0, 5.0 and 6.0 cm in diameter. The radiation source was modeled considering a tungsten target with inclination 30 deg, focal point of 6.5 mm in diameter and energy beam of 50 kVp; the X-ray spectrum was calculated with the MCNP-5C code adopting total filtration (beryllium window of 1 mm and aluminum additional filter of 1 mm). The PDD showed decreasing behavior with the attenuation depth similar what is presented on the literature. There was not significant variation at the PDD values for the radiation field between 1.0 and 4.0 cm in diameter. The differences increased for fields of 5.0 and 6.0 cm and at attenuation depth higher than 1.0 cm. When it is compared the PDD values for fields of 3.0 and 6.0 cm in diameter, it verifies the greater difference (12.6 %) at depth of 5.7 cm, proving the scattered radiation effect. The MCNP-5C code showed as an appropriate procedure to analyze the attenuation curves of the superficial radiotherapy beams. (author)

  8. Coding elements in exons 2 and 3 target c-myc mRNA downregulation during myogenic differentiation.

    OpenAIRE

    Yeilding, N M; W.M. Lee

    1997-01-01

    Downregulation in expression of the c-myc proto-oncogene is an early molecular event in differentiation of murine C2C12 myoblasts into multinucleated myotubes. During differentiation, levels of c-myc mRNA decrease 3- to 10-fold despite a lack of change in its transcription rate. To identify cis-acting elements that target c-myc mRNA for downregulation during myogenesis, we stably transfected C2C12 cells with mutant myc genes or chimeric genes in which various myc sequences were fused to the h...

  9. RESEARCH ON AUTOMATICALLY GENERATING C + + CODE FROM UML CLASS AND SEQUENCE DIAGRAMS%基于UML类图和顺序图的C++代码自动生成方法的研究

    Institute of Scientific and Technical Information of China (English)

    王晓宇; 钱红兵

    2013-01-01

    UML是一种被广泛用于软件系统需求分析和详细设计的标准建模语言,研究将UML描述的软件详细设计自动生成代码的技术可以大大加速软件产品的开发进度,提高软件的质量.提出一种将UML类图和顺序图相结合生成具有静态结构和动态行为信息的C++代码的方法,从而解决现在多数代码生成工具只能将静态图转换为C++代码框架而不能处理动态行为模型转换的问题.该方法包括UML类图和顺序图的元模型以及相应的转换规则.最后通过一个采用Velocity技术实现的代码生成器生成代码的实例描述了代码生成的具体过程及结果.%UML is a standard modelling language and is widely used in requirement analysis and high level design of software system. Research on the technology of generating C++ code automatically from high level software design depicted by UML can greatly accelerate the development process of software products and improve its quality. We propose an approach, which integrates UML class and sequence diagrams to form the C ++ code containing both the static structure and dynamic behaviour information of the software system, therefore solves the problems of the current code generation tools that they are only able to transform static diagrams to C + + code frame other than dealing with the transformation of dynamic behaviour models. This approach consists of meta models of UML class and sequence diagrams as well as the corresponding transformation rules. A case of code generation by code generator, which is realized by Velocity, is used to present the specific process and result of code generation.

  10. Three-dimensional whole-core transport calculation of the OECD benchmark problem C5G7 MOX by the CRX code

    Energy Technology Data Exchange (ETDEWEB)

    Gil, Soo Lee; Nam, Zin Cho [Korea Advanced Institute of Science and Technology, Dept. of Nuclear and Quantum Engineering, Yusong-gu, Daejeon (Korea, Republic of)

    2005-07-01

    The OECD 3-dimensional benchmark problem C5G7 MOX was calculated by the CRX code. For 3-dimensional heterogeneous calculation, the CRX code uses a fusion technique of 2-dimensional/1-dimensional methods: the method of characteristics for radial 2-dimensional calculation and diamond difference scheme (DD) that is an S{sub N}-like method for axial 1-dimensional calculation. We improve the fusion method by using a linear characteristics (LC) solver in the 1-dimensional calculation. Here, we present brief structure of 2-dimensional/1-dimensional fusion method and the results of 3 configurations of benchmark problem. We also present results of several different 1-dimensional calculation options. Numerical results show that the LC scheme presents better performance than DD. In the results of the benchmark problem, k(eff) errors are less than 0.05% and the averages of pin power errors are less than 1% for all calculations.

  11. Proposals for an effective application of the continuous improvement at the ININ according to the IAEA 50-C/SG-Q new code

    International Nuclear Information System (INIS)

    This work contains the requirements of continuous improvement contained in the IAEA new code Quality assurance for safety in nuclear power plants and other nuclear installations, code 50-C/SG-Q. Assuming that it was the base for to elaborate the review No. 5 of the Quality assurance plan at ININ, it was done an analysis to give proposals for the application of continuous improvement in effective way. The relevant points which must be taken in account at the continuous improvement process are: Direction responsibility, involucring of all personnel, process planning, education and training, elaboration of improvement projects, investigation of processes which can be improved, continuation of the improvement process and its evaluation. With the implantation of an effective continuous improvement system it will be obtained to get a better quality and a more efficient safety. (Author)

  12. ABCXYZ: vector potential (A) and magnetic field (B) code (C) for Cartesian (XYZ) geometry using general current elements

    International Nuclear Information System (INIS)

    ABCXYZ is a computer code for obtaining the Cartesian components of the vector potential and the magnetic field on an observed grid from an arrangement of current-carrying wires. Arbitrary combinations of straight line segments, arcs, and loops are allowed in the specification of the currents. Arbitrary positions and orientations of the current-carrying elements are also allowed. Specification of the wire diameter permits the computation of well-defined fields, even in the interiors of the conductors. An optical feature generates magnetic field lines. Extensive graphical and printed output is available to the user including contour, grid-line, and field-line plots. 12 figures, 1 table

  13. Raising the standard: changes to the Australian Code of Good Manufacturing Practice (cGMP) for human blood and blood components, human tissues and human cellular therapy products.

    Science.gov (United States)

    Wright, Craig; Velickovic, Zlatibor; Brown, Ross; Larsen, Stephen; Macpherson, Janet L; Gibson, John; Rasko, John E J

    2014-04-01

    In Australia, manufacture of blood, tissues and biologicals must comply with the federal laws and meet the requirements of the Therapeutic Goods Administration (TGA) Manufacturing Principles as outlined in the current Code of Good Manufacturing Practice (cGMP). The Therapeutic Goods Order (TGO) No. 88 was announced concurrently with the new cGMP, as a new standard for therapeutic goods. This order constitutes a minimum standard for human blood, tissues and cellular therapeutic goods aimed at minimising the risk of infectious disease transmission. The order sets out specific requirements relating to donor selection, donor testing and minimisation of infectious disease transmission from collection and manufacture of these products. The Therapeutic Goods Manufacturing Principles Determination No. 1 of 2013 references the human blood and blood components, human tissues and human cellular therapy products 2013 (2013 cGMP). The name change for the 2013 cGMP has allowed a broadening of the scope of products to include human cellular therapy products. It is difficult to directly compare versions of the code as deletion of some clauses has not changed the requirements to be met, as they are found elsewhere amongst the various guidelines provided. Many sections that were specific for blood and blood components are now less prescriptive and apply to a wider range of cellular therapies, but the general overall intent remains the same. Use of 'should' throughout the document instead of 'must' allows flexibility for alternative processes, but these systems will still require justification by relevant logical argument and validation data to be acceptable to TGA. The cGMP has seemingly evolved so that specific issues identified at audit over the last decade have now been formalised in the new version. There is a notable risk management approach applied to most areas that refer to process justification and decision making. These requirements commenced on 31 May 2013 and a 12 month

  14. Cloning, sequence analysis, and expression of cDNA coding for the major house dust mite allergen, Der f 1, in Escherichia coli

    Directory of Open Access Journals (Sweden)

    Y. Cui

    2008-05-01

    Full Text Available Our objective was to clone, express and characterize adult Dermatophagoides farinae group 1 (Der f 1 allergens to further produce recombinant allergens for future clinical applications in order to eliminate side reactions from crude extracts of mites. Based on GenBank data, we designed primers and amplified the cDNA fragment coding for Der f 1 by nested-PCR. After purification and recovery, the cDNA fragment was cloned into the pMD19-T vector. The fragment was then sequenced, subcloned into the plasmid pET28a(+, expressed in Escherichia coli BL21 and identified by Western blotting. The cDNA coding for Der f 1 was cloned, sequenced and expressed successfully. Sequence analysis showed the presence of an open reading frame containing 966 bp that encodes a protein of 321 amino acids. Interestingly, homology analysis showed that the Der p 1 shared more than 87% identity in amino acid sequence with Eur m 1 but only 80% with Der f 1. Furthermore, phylogenetic analyses suggested that D. pteronyssinus was evolutionarily closer to Euroglyphus maynei than to D. farinae, even though D. pteronyssinus and D. farinae belong to the same Dermatophagoides genus. A total of three cysteine peptidase active sites were found in the predicted amino acid sequence, including 127-138 (QGGCGSCWAFSG, 267-277 (NYHAVNIVGYG and 284-303 (YWIVRNSWDTTWGDSGYGYF. Moreover, secondary structure analysis revealed that Der f 1 contained an a helix (33.96%, an extended strand (17.13%, a ß turn (5.61%, and a random coil (43.30%. A simple three-dimensional model of this protein was constructed using a Swiss-model server. The cDNA coding for Der f 1 was cloned, sequenced and expressed successfully. Alignment and phylogenetic analysis suggests that D. pteronyssinus is evolutionarily more similar to E. maynei than to D. farinae.

  15. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Property testing was initially studied from various motivations in 1990’s. A code C  GF (r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector’s coordinates. The problem of testing codes was firstly studied by Blum, Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs). How to characterize locally testable codes is a complex and challenge problem. The local tests have been studied for Reed-Solomon (RS), Reed-Muller (RM), cyclic, dual of BCH and the trace subcode of algebraicgeometric codes. In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions). We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  16. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2009-01-01

    Property testing was initially studied from various motivations in 1990's.A code C (∩)GF(r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector's coordinates.The problem of testing codes was firstly studied by Blum,Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs).How to characterize locally testable codes is a complex and challenge problem.The local tests have been studied for Reed-Solomon (RS),Reed-Muller (RM),cyclic,dual of BCH and the trace subcode of algebraicgeometric codes.In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions).We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  17. Time-Dependent Distribution Functions in C-Mod Calculated with the CQL3D-Hybrid-FOW, AORSA Full-Wave, and DC Lorentz Codes

    Science.gov (United States)

    Harvey, R. W. (Bob); Petrov, Yu. V.; Jaeger, E. F.; Berry, L. A.; Bonoli, P. T.; Bader, A.

    2015-11-01

    A time-dependent simulation of C-Mod pulsed ICRF power is made calculating minority hydrogen ion distribution functions with the CQL3D-Hybrid-FOW finite-orbit-width Fokker-Planck code. ICRF fields are calculated with the AORSA full wave code, and RF diffusion coefficients are obtained from these fields using the DC Lorentz gyro-orbit code. Prior results with a zero-banana-width simulation using the CQL3D/AORSA/DC time-cycles showed a pronounced enhancement of the H distribution in the perpendicular velocity direction compared to results obtained from Stix's quasilinear theory, in general agreement with experiment. The present study compares the new FOW results, including relevant gyro-radius effects, to determine the importance of these effects on the the NPA synthetic diagnostic time-dependence. The new NPA results give increased agreement with experiment, particularly in the ramp-down time after the ICRF pulse. Funded, through subcontract with Massachusetts Institute of Technology, by USDOE sponsored SciDAC Center for Simulation of Wave-Plasma Interactions.

  18. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  19. Human DNA contains sequences homologous to the 5'-non-coding region of hepatitis C virus: characterization with restriction endonucleases reveals individual varieties

    Institute of Scientific and Technical Information of China (English)

    Reinhard H Dennin; Jianer Wo

    2003-01-01

    Objective To investigate a 272 base pair section of the 5'-non-coding region of genomic DNA from the peripheral blood monounuclear cells of healthy hepatitis virus C (HCV)-negative human subjects (not patients). Results The suspected HCV-specific sequence was found in the DNA of each subject tested. The pre-PCR digestion assay reveals individual differences in their pattern of methylation, which may be due to possible epigenetic phenomena.Conclusions The results provide formal proof that these HCV-specific sequences are contained in the genomic or extra chromosomal target DNA, and probably belong to a new class of endogenous sequences.

  20. code {poems}

    Directory of Open Access Journals (Sweden)

    Ishac Bertran

    2012-08-01

    Full Text Available "Exploring the potential of code to communicate at the level of poetry," the code­ {poems} project solicited submissions from code­writers in response to the notion of a poem, written in a software language which is semantically valid. These selections reveal the inner workings, constitutive elements, and styles of both a particular software and its authors.

  1. From Skew-Cyclic Codes to Asymmetric Quantum Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Sole, Patrick; Yemen, Olfa

    2010-01-01

    We introduce an additive but not $\\F_{4}$-linear map $S$ from $\\F_{4}^{n}$ to $\\F_{4}^{2n}$ and exhibit some of its interesting structural properties. If $C$ is a linear $[n,k,d]_4$-code, then $S(C)$ is an additive $(2n,2^{2k},2d)_4$-code. If $C$ is an additive cyclic code then $S(C)$ is an additive quasi-cyclic code of index $2$. Moreover, if $C$ is a module $\\theta$-cyclic code, a recently introduced type of code which will be explained below, then $S(C)$ is equivalent to an additive cyclic code if $n$ is odd and to an additive quasi-cyclic code of index $2$ if $n$ is even. Given any $(n,M,d)_4$-code $C$, the code $S(C)$ is self-orthogonal under the trace Hermitian inner product. Since the mapping $S$ preserves nestedness, it can be used as a tool in constructing additive asymmetric quantum codes.

  2. Identification of intermediate-size non-coding RNAs involved in the UV-induced DNA damage response in C. elegans.

    Directory of Open Access Journals (Sweden)

    Aqian Li

    Full Text Available BACKGROUND: A network of DNA damage response (DDR mechanisms functions coordinately to maintain genome integrity and prevent disease. The Nucleotide Excision Repair (NER pathway is known to function in the response to UV-induced DNA damage. Although numbers of coding genes and miRNAs have been identified and reported to participate in UV-induced DNA damage response (UV-DDR, the precise role of non-coding RNAs (ncRNAs in UV-DDR remains largely unknown. METHODOLOGY/PRINCIPAL FINDINGS: We used high-throughput RNA-sequencing (RNA-Seq to discover intermediate-size (70-500 nt ncRNAs (is-ncRNAs in C. elegans, using the strains of L4 larvae of wild-type (N2, UV-irradiated (N2/UV100 and NER-deficient mutant (xpa-1, and 450 novel non-coding transcripts were initially identified. A customized microarray assay was then applied to examine the expression profiles of both novel transcripts and known is-ncRNAs, and 57 UV-DDR-related is-ncRNA candidates showed expression variations at different levels between UV irradiated strains and non- irradiated strains. The top ranked is-ncRNA candidates with expression differences were further validated by qRT-PCR analysis, of them, 8 novel is-ncRNAs were significantly up-regulated after UV irradiation. Knockdown of two novel is-ncRNAs, ncRNA317 and ncRNA415, by RNA interference, resulted in higher UV sensitivity and significantly decreased expression of NER-related genes in C. elegans. CONCLUSIONS/SIGNIFICANCE: The discovery of above two novel is-ncRNAs in this study indicated the functional roles of is-ncRNAs in the regulation of UV-DDR network, and aided our understanding of the significance of ncRNA involvement in the UV-induced DNA damage response.

  3. MuSiC: a Multibunch and multiparticle Simulation Code with an alternative approach to wakefield effects

    CERN Document Server

    Migliorati, M

    2015-01-01

    The simulation of beam dynamics in presence of collective effects requires a strong computational effort to take into account, in a self consistent way, the wakefield acting on a given charge and produced by all the others. Generally this is done by means of a convolution integral or sum. Moreover, if the electromagnetic fields consist of resonant modes with high quality factors, responsible, for example, of coupled bunch instabilities, a charge is also affected by itself in previous turns, and a very long record of wakefield must be properly taken into account. In this paper we present a new simulation code for the longitudinal beam dynamics in a circular accelerator, which exploits an alternative approach to the currently used convolution sum, reducing the computing time and avoiding the issues related to the length of wakefield for coupled bunch instabilities. With this approach it is possible to simulate, without the need of a large computing power, simultaneously, the single and multi-bunch beam dynamics...

  4. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study inclu...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 4.2 Affine variety codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 4.3 Some Gr¨obner basis theoretical tools . . . . . . . . . . . . . . . . . . . . . . . 155 4.4 A bound on the minimum distance of C(I,L) . . . . . . . . . . . . . . . . . . 157 4.5 The Feng-Rao bound...... for C(I,L)? . . . . . . . . . . . . . . . . . . . . . . . . 160 4.6 Using weighted degree orderings . . . . . . . . . . . . . . . . . . . . . . . . . 163 4.7 The order domain conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 4.8 Weight functions and order domains...

  5. Characterization of Co-60 sources to the treatment of the ophthalmic tumors using the MCNP-4C code

    International Nuclear Information System (INIS)

    Ophthalmic sources used in the treatment of ophthalmic tumors needed to be periodically controlled in order to have assurance of the administrated dose in the treatment. For this purpose, an human eye was simulated with all structures and composition was simulated by MCNP-4C with an ophthalmic source of Co-60 (model CKA-4 of Amersham). With this simulator, it was possible to determine the dose in the center-eye dephness and also the doses in the structures as retina, coroide, lenses, etc. To check the doses from MCNP-4C, it was realized measurements with radiological films type X-OMAT V of Kodak, with a Co-60 CKA-4 source and an acrylic simulator. The measurement allow the construction of the optical density versus the source distance. This curve will serve as a test data for the calculated dose values of MCNP-4C. (author)

  6. 基于XML的C代码抄袭检测算法%Plagiarism detection algorithm based on XML for C code.

    Institute of Scientific and Technical Information of China (English)

    钟美; 张丽萍; 刘东升

    2011-01-01

    This paper mainly studies a plagiarism detection algorithm based on XML for C code. It generates a XML text from C source code, extracts the structure information of XML text lines, calculates the XML text lines similarity and obtains the similarity of two programs. Plagiarism detection algorithm is implemented to classification test, specific categories are described as follows:the means of 12 kinds' plagiarism,complex semantics and complex data structures. Test results verify the effectiveness of plagiarism detection algorithm.%主要研究一种基于XML文本的C代码抄袭检测算法.将C程序源代码转化为XML文本,提取XML文本各行标记的属性,计算XML文本行的相似值,得到程序对的相似度.并对抄袭检测算法实行分类测试:按十二种抄袭手段分类;按复杂语义和复杂数据结构分类.测试结果对比验证了抄袭检测算法的有效性.

  7. Nucleotide sequence of cDNA coding for dianthin 30, a ribosome inactivating protein from Dianthus caryophyllus.

    Science.gov (United States)

    Legname, G; Bellosta, P; Gromo, G; Modena, D; Keen, J N; Roberts, L M; Lord, J M

    1991-08-27

    Rabbit antibodies raised against dianthin 30, a ribosome inactivating protein from carnation (Dianthus caryophyllus) leaves, were used to identify a full length dianthin precursor cDNA clone from a lambda gt11 expression library. N-terminal amino acid sequencing of purified dianthin 30 and dianthin 32 confirmed that the clone encoded dianthin 30. The cDNA was 1153 basepairs in length and encoded a precursor protein of 293 amino acid residues. The first 23 N-terminal amino acids of the precursor represented the signal sequence. The protein contained a carboxy-terminal region which, by analogy with barley lectin, may contain a vacuolar targeting signal.

  8. CELP语音编码与TMS 320 C54x%CELP Speech Coding and TMS 320 C54x

    Institute of Scientific and Technical Information of China (English)

    李镐炜; 黄芝平; 王跃科

    2000-01-01

    介绍了码激励线性预测(CELP)编码的基本原理和新近推出的TMS 320 C54x定点DSP芯片,结合其指令特点探讨了TMS 320 C54x在实现CELP类语音编码方案时的一些有效的编程方法.

  9. Code-Pointer Integrity

    OpenAIRE

    Volodymyr Kuznetsov; Laszlo Szekeres; Mathias Payer; George Candea; Sekar, R.; Dawn Song

    2014-01-01

    Systems code is often written in low-level languages like C/C++, which offer many benefits but also delegate memory management to programmers. This invites memory safety bugs that attackers can exploit to divert control flow and compromise the system. Deployed defense mechanisms (e.g., ASLR, DEP) are incomplete, and stronger defense mechanisms (e.g., CFI) often have high overhead and limited guarantees [19, 15, 9]. We introduce code-pointer integrity (CPI), a new design point that guarantees...

  10. [open quotes]Cryptic[close quotes] repeating triplets of purines and pyrimidines (cRRY(i)) are frequent and polymorphic: Analysis of coding cRRY(i) in the proopiomelanocortin (POMC) and TATA-binding protein (TBP) genes

    Energy Technology Data Exchange (ETDEWEB)

    Gostout, B.; Qiang Liu; Sommer, S.S. (Mayo Clinic/Foundation, Rochester, MN (United States))

    1993-06-01

    Triplets of the form of purine, purine, pyrimidine (RRY(i)) are enhanced in frequency in the genomes of primates, rodents, and bacteria. Some RRY(i) are [open quotes]cryptic[close quotes] repeats (cRRY(i)) in which no one tandem run of a trinucleotide predominates. A search of human GenBank sequence revealed that the sequences of cRRY(i) are highly nonrandom. Three randomly chosen human cRRY(i) were sequenced in search of polymorphic alleles. Multiple polymorphic alleles were found in cRRY(i) in the coding regions of the genes for proopiomelanocortin (POMC) and TATA-binding protein (TBP). The highly polymorphic TBP cRRY(i) was characterized in detail. Direct sequencing of 157 unrelated human alleles demonstrated the presence of 20 different alleles which resulted in 29--40 consecutive glutamines in the amino-terminal region of TBP. These alleles are differently distributed among the races. PCR was used to screen 1,846 additional alleles in order to characterize more fully the range of variation in the population. Three additional alleles were discovered, but there was no example of a substantial sequence amplification as is seen in the repeat sequences associated with X-linked spinal and bulbar muscular atrophy, myotonic dystrophy, or the fragile-X syndrome. The structure of the TBP cRRY(i) is conserved in the five monkey species examined. In the chimpanzee, examination of four individuals revealed that the cRRY(i) was highly polymorphic, but the pattern of polymorphism differed from that in humans. The TBP cRRY(i) displays both similarities with and differences from the previously described RRY(i) in the coding sequence of the androgen receptor. The data suggest how simple tandem repeats could evolve from cryptic repeats. 18 refs., 3 figs., 6 tabs.

  11. Non-coding RNA LINC00473 mediates decidualization of human endometrial stromal cells in response to cAMP signaling.

    Science.gov (United States)

    Liang, Xiao-Huan; Deng, Wen-Bo; Liu, Yue-Fang; Liang, Yu-Xiang; Fan, Zong-Min; Gu, Xiao-Wei; Liu, Ji-Long; Sha, Ai-Guo; Diao, Hong-Lu; Yang, Zeng-Ming

    2016-01-01

    Decidualization is an essential step in the establishment of pregnancy. However, the functional contributions of long intergenic noncoding RNAs (LincRNAs) to decidualization have not been explored. To explore the regulation and role of LincRNAs during human decidualization, human endometrial stromal cells (HESCs) are induced to undergo in vitro decidualization by treating with estradiol-17β, db-cAMP and medroxyprogesterone acetate. LINC00473 (LINC473) expression is highly induced in HESCs after decidual stimulus. We found that cAMP-PKA pathway regulates the expression of LINC473 through IL-11-mediated STAT3 phosphorylation. RNA interference-mediated down-regulation of LINC473 inhibits in vitro decidualization. These results suggested that LINC473 might be functionally required for human decidualization. This is the first report demonstrating the presence of LincRNA during human decidualization. PMID:26947914

  12. Non-coding RNA LINC00473 mediates decidualization of human endometrial stromal cells in response to cAMP signaling

    Science.gov (United States)

    Liang, Xiao-Huan; Deng, Wen-Bo; Liu, Yue-Fang; Liang, Yu-Xiang; Fan, Zong-Min; Gu, Xiao-Wei; Liu, Ji-Long; Sha, Ai-Guo; Diao, Hong-Lu; Yang, Zeng-Ming

    2016-01-01

    Decidualization is an essential step in the establishment of pregnancy. However, the functional contributions of long intergenic noncoding RNAs (LincRNAs) to decidualization have not been explored. To explore the regulation and role of LincRNAs during human decidualization, human endometrial stromal cells (HESCs) are induced to undergo in vitro decidualization by treating with estradiol-17β, db-cAMP and medroxyprogesterone acetate. LINC00473 (LINC473) expression is highly induced in HESCs after decidual stimulus. We found that cAMP-PKA pathway regulates the expression of LINC473 through IL-11-mediated STAT3 phosphorylation. RNA interference-mediated down-regulation of LINC473 inhibits in vitro decidualization. These results suggested that LINC473 might be functionally required for human decidualization. This is the first report demonstrating the presence of LincRNA during human decidualization. PMID:26947914

  13. McMPI – a managed-code message passing interface library for high performance communication in C#

    OpenAIRE

    Holmes, Daniel John

    2012-01-01

    This work endeavours to achieve technology transfer between established best-practice in academic high-performance computing and current techniques in commercial high-productivity computing. It shows that a credible high-performance message-passing communication library, with semantics and syntax following the Message-Passing Interface (MPI) Standard, can be built in pure C# (one of the .Net suite of computer languages). Message-passing has been the dominant paradigm in high-pe...

  14. C/C++代码自动生成脚本语言接口的实现%Implementation of Automatic Generating Scripting Language Interfaces with C/C++ Code

    Institute of Scientific and Technical Information of China (English)

    官尚元; 张芝萍; 徐立锋; 缪敬

    2005-01-01

    对于开发灵活的科学软件来说,脚本语言是一个强大的工具.然而开发人员经常遇到一个问题:如何将编译过的C/C++代码集成到一个解释器.为了解决上述问题,设计了一个可扩展的编译器--接口产生器(IG).IG主要任务是把编译过的C/C++代码集成到脚本语言解释器中.因此,该文的主要目的就是解决上述相关问题.

  15. Holographic codes

    CERN Document Server

    Latorre, Jose I

    2015-01-01

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  16. Isolation of a full-length mouse cDNA clone coding for an immunologically distinct p53 molecule.

    OpenAIRE

    Wolf, D; Harris, N; Goldfinger, N; Rotter, V

    1985-01-01

    Transfection of a cloned p53 gene into a p53 nonproducer Abelson murine leukemia virus-transformed cell line, L12, reconstituted p53 expression. The protein expressed in these cells was indistinguishable from that naturally expressed in p53 producer tumor cells. Conversely, p53 protein expressed in L12-derived clones that were established by transfection with a full-length p53 cDNA clone (pM8) exhibited a discrete immunological form. Immunoprecipitation of p53 with a panel of monoclonal anti-...

  17. Cloning and expression of a cDNA coding for the human platelet-derived growth factor receptor: Evidence for more than one receptor class

    International Nuclear Information System (INIS)

    The complete nucleotide sequence of a cDNA encoding the human platelet-derived growth factor (PDGF) receptor is presented. The cDNA contains an open reading frame that codes for a protein of 1106 amino acids. Comparison to the mouse PDGF receptor reveals an overall amino acid sequence identity of 86%. This sequence identity rises to 98% in the cytoplasmic split tyrosine kinase domain. RNA blot hybridization analysis of poly(A)+ RNA from human dermal fibroblasts detects a major and a minor transcript using the cDNA as a probe. Baby hamster kidney cells, transfected with an expression vector containing the receptor cDNA, express an ∼ 190-kDa cell surface protein that is recognized by an anti-human PDGF receptor antibody. The recombinant PDGF receptor is functional in the transfected baby hamster kidney cells as demonstrated by ligand-induced phosphorylation of the receptor. Binding properties of the recombinant PDGF receptor were also assessed with pure preparations of BB and AB isoforms of PDGF. Unlike human dermal fibroblasts, which bind both isoforms with high affinity, the transfected baby hamster kidney cells bind only the BB isoform of PDGF with high affinity. This observation is consistent with the existence of more than one PDGF receptor class

  18. Investigation Into The Impact Of Detector Parameters On Its Efficiency For The HPGe Detector Using The MCNP4C2 Code

    International Nuclear Information System (INIS)

    In the process of operation and exploitation of the gamma ray spectrometry using the HPGe GC1518 at Center for Nuclear Techniques in HoChiMinh City, its qualification tends to be bad. The experimental results indicate that the absolute efficiency decrease following the live time. This efficiency decreasing can be caused by the change of some physical parameters in relation to the detector. To more efficiently exploit it is very important to know the nature of this change. In this paper, the MCNP4C2 code is used to investigate the impact of geometrical parameters to the detector efficiency based on the detector specifications of the manufacture and on change by user. It was found that the thickness of the inactive germanium layer cause to this change. (author)

  19. Study the effects of different reflector types on the neutronic parameters of the 10 MW MTR reactor using the MCNP4C code

    International Nuclear Information System (INIS)

    Highlights: • A 3-D neutronic model for the 10 MW MTR has been conducted using the MCNP4C code. • Studying the effect of different reflectors on the neutronics parameters of the reactor. • Beryllium reflector was found to be the most efficient reflector among the studied reflectors. • The graphite reflector gave the highest maximum thermal neutron flux in the water trap. - Abstract: A 3-D neutronic model for the 10 MW MTR research reactor has been conducted for the HEU (93%), MEU (45%) and LEU (20%) fuels using the MCNP4C code. This model has been used to study the effect of different types of reflector materials on the reactor multiplication factor and neutron flux distribution in the reactor. It was found that the beryllium reflector was the most efficient reflector among the studied reflector groups (beryllium, heavy water, graphite and light water) since it gave the highest reactor multiplication factor, 1.21441. It followed by heavy water, graphite and light water with the following reactor multiplication factors: 1.19458, 1.19287 and 1.16867 respectively. The graphite reflector gave the highest maximum thermal neutron flux in the water trap, 2.576E14 n cm−2 s−1. It followed by heavy water, light water, and beryllium with the following results: 2.533E14, 2.526E14 and 2.525E14 n cm−2 s−1 respectively. Considerable gains in reactivity were not appreciably influenced by changing the fuel enrichment

  20. Cloning and characterization of a cDNA coding for the lipoprotein-associated coagulation inhibitor shows that it consists of three tandem Kunitz-type inhibitory domains

    Energy Technology Data Exchange (ETDEWEB)

    Wun, T.C.; Kretzmer, K.K.; Girard, T.J.; Miletich, J.P.; Broze, G.J. Jr.

    1988-05-05

    Human plasma contains a lipoprotein-associated coagulation inhibitor (LACI) which inactivates factor X/sub a/ directly, and in a X/sub a/-dependent fashion also inhibits the VII/sub a/-tissue factor complex of the extrinsic coagulation pathway. Rabbit polyclonal anti-LACI antiserum was used to screen human placental and fetal liver lambdagt11 cDNA libraries for the expression of LACI antigens. Immunologically positive clones were further tested for their ability to bind /sup 125/I-factor X/sub a/. Seven clones were obtained which are immunologically and functionally active. The longest cDNA insert (lambdaP9) of these isolates is 1.4 kilobases (kb) while other clones are 1.0 kb in length. Nucleotide sequence analysis shows that lambdaP9 consists of 1431 bases that include a 5'-noncoding sequence of 132 nucleotides, an open reading frame of 912 nucleotides, and a 3'-noncoding region of 387 nucleotides. The predicted sequence of mature LACI contains 18 cysteines and three potential N-linked glycosylation sites. The amino acid sequence analysis of purified LACI's NH/sub 2/ terminus and two of its proteolytic fragments match exactly those deduced from the cDNA sequence, indicating that the cDNA codes for LACI. The translated amino acid sequence of LACI shows several discernible domains, including a highly negatively charged NH/sub 2/ terminus, three tandem Kunitz-type inhibitory domains, and a highly positively charged carboxyl terminus. Northern blot analysis shows that the following liver-derived cell lines, Chang liver, HepG2 hepatoma, and SK hepatoma all, contain two major species of mRNA which hybridize with LACI cDNA.

  1. Determination of the δ15N and δ13C of total nitrogen and carbon in solids; RSIL lab code 1832

    Science.gov (United States)

    Revesz, Kinga; Qi, Haiping; Coplan, Tyler B.

    2006-01-01

    The purpose of the Reston Stable Isotope Laboratory (RSIL) lab code 1832 is to determine the δ(15N/14N), abbreviated as δ15N, and the δ(13C/12C), abbreviated as δ13C, of total nitrogen and carbon in a solid sample. A Carlo Erba NC 2500 elemental analyzer (EA) is used to convert total nitrogen and carbon in a solid sample into N2 and CO2 gas. The EA is connected to a continuous flow isotope-ratio mass spectrometer (CF-IRMS), which determines the relative difference in stable nitrogen isotope-amount ratio (15N/14N) of the product N2 gas and the relative difference in stable carbon isotope-amount ratio (13C/12C) of the product CO2 gas. The combustion is quantitative; no isotopic fractionation is involved. Samples are placed in tin capsules and loaded into a Costech Zero Blank Autosampler on the EA. Under computer control, samples then are dropped into a heated reaction tube that contains an oxidant, where combustion takes place in a helium atmosphere containing an excess of oxygen gas. Combustion products are transported by a helium carrier through a reduction furnace to remove excess oxygen and to convert all nitrous oxides into N2 and through a drying tube to remove water. The gas-phase products, mainly CO2 and N2, are separated by a gas chromatograph. The gas is then introduced into the IRMS through a Finnigan MAT (now Thermo Scientific) ConFlo II interface. The Finnigan MAT ConFlo II interface is used for introducing not only sample into the IRMS but also N2 and CO2 reference gases and helium for sample dilution. The flash combustion is quantitative; no isotopic fractionation is involved. The IRMS is a Thermo Scientific Delta V CF-IRMS. It has a universal triple collector, two wide cups with a narrow cup in the middle; it is capable of measuring mass/charge (m/z) 28, 29, 30 or with a magnet current change 44, 45, 46, simultaneously. The ion beams from these m/z values are as follows: m/z 28 = N2 = 14N/14N; m/z 29 = N2 = 14N/15N primarily; m/z 30 = NO = 14N/16O

  2. Calculation of the power distribution in the fuel rods of the low power research reactor using the MCNP4C code

    International Nuclear Information System (INIS)

    The Monte Carlo method, using the MCNP4C code, was used in this paper to calculate the power distribution in 3-D geometry in the fuel rods of the Syrian Miniature Neutron Source Reactor (MNSR). To normalize the MCNP4C result to the steady state nominal thermal power, the appropriate scaling factor was defined to calculate the power distribution precisely. The maximum power of the individual rod was found in the fuel ring number 2 and was found to be 105 W. The minimum power was found in the fuel ring number 9 and was 79.9 W. The total power in the total fuel rods was 30.9 k W. This result agrees very well with nominal power reported in the reactor safety analysis report which equals 30 k W. Finally, the peak power factors, which are defined as the ratios between the maximum to the average and the maximum to the minimum powers were calculated to be 1.18 and 1.31 respectively. (author)

  3. Evidence for linkage between the loci coding for the binding protein for the fourth component of human complement (C4BP) and for the C3b/C4b receptor.

    OpenAIRE

    Rodriguez de Cordoba, S; Dykman, T R; Ginsberg-Fellner, F; Ercilla, G; Aqua, M; Atkinson, J P; Rubinstein, P

    1984-01-01

    Three pedigrees informative for the segregation of genetic variants of the binding protein for the fourth component of complement (C4BP) and C3b/C4b receptor (C3bR) have been identified. There were 10 informative meioses with no recombinants, indicating a close linkage between the loci encoding C4BP and C3bR, C4BP and C3bR [maximum lod (logarithm of odds of linkage) score: 2.4 at recombinant fraction = 0.0]. In addition, in the four unrelated individuals who were doubly heterozygous (C4BP*1, ...

  4. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  5. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech......; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...... expression in the public realm. The book’s line of argument defends language against its invasion by economics, arguing that speech continues to underscore the human condition, however paradoxical this may seem in an era of pervasive computing....

  6. List Decoding of Matrix-Product Codes from nested codes: an application to Quasi-Cyclic codes

    DEFF Research Database (Denmark)

    Hernando, Fernando; Høholdt, Tom; Ruano, Diego

    2012-01-01

    A list decoding algorithm for matrix-product codes is provided when $C_1,..., C_s$ are nested linear codes and $A$ is a non-singular by columns matrix. We estimate the probability of getting more than one codeword as output when the constituent codes are Reed-Solomon codes. We extend this list...... decoding algorithm for matrix-product codes with polynomial units, which are quasi-cyclic codes. Furthermore, it allows us to consider unique decoding for matrix-product codes with polynomial units....

  7. A contribution to the analysis of the activity distribution of a radioactive source trapped inside a cylindrical volume, using the M.C.N.P.X. code

    Energy Technology Data Exchange (ETDEWEB)

    Portugal, L.; Oliveira, C.; Trindade, R.; Paiva, I. [Instituto Tecnologico e Nuclear, Dpto. Proteccao Radiologica e Seguranca Nuclear, Sacavem (Portugal)

    2006-07-01

    Orphan sources, activated materials or contaminated materials with natural or artificial radionuclides have been detected in scrap metal products destined to recycling. The consequences of the melting of a source during the process could result in economical, environmental and social impacts. From the point of view of the radioactive waste management, a scenario of 100 ton of contaminated steel in one piece is a major problem. So, it is of great importance to develop a methodology that would allow us to predict the activity distribution inside a volume of steel. In previous work we were able to distinguish between the cases where the source is disseminated all over the entire cylinder and the cases where it is concentrated in different volumes. Now the main goal is to distinguish between different radiuses of spherical source geometries trapped inside the cylinder. For this, a methodology was proposed based on the ratio of the counts of two regions of the gamma spectrum, obtained with a sodium iodide detector, using the M.C.N.P.X. Monte Carlo simulation code. These calculated ratios allow us to determine a function r = aR{sup 2} + bR + c, where R is the ratio between the counts of the two regions of the gamma spectrum and r is the radius of the source. For simulation purposes six {sup 60}Co sources were used (a point source, four spheres of 5 cm, 10 cm, 15 cm and 20 cm radius and the overall contaminated cylinder) trapped inside two types of matrix, concrete and stainless steel. The methodology applied has shown to predict and distinguish accurately the distribution of a source inside a material roughly independently of the matrix and density considered. (authors)

  8. SystemC-based Simulation Code Generation for AADL Software Component%基于SystemC的AADL软构件仿真代码转换技术

    Institute of Scientific and Technical Information of China (English)

    马春燕; 董云卫; 陆伟; 朱晓燕

    2011-01-01

    Currently, AADL in mission-critical and safety critical embedded field has a good application. In the design phase,how to simulate AADL model is urgent Model simulation can iteratively construct and refine design model for early detection of problems,assuring the quality of the design model,thereby reducing the cost of system development SystemC is a system description language of hardware and software co-simulation. The paper proposed conversion technology and implemented conversion tool for AADL software component to SystemC simulation code. At last, the paper used cruise control system as an example to explain the conversion technology and SystemC-based thread scheduling simulation. Through the research results, users can obtain SystemC-based simulation of AADL software components including the interaction,execution time and sequence between software components, and the thread scheduling simulation, and can implement software and hardware co-simulation through combining AADL hardware component simulation platform.%目前,AADL在任务关键和安全关键嵌入式领域有着良好的应用.如何在设计阶段对AADL模型进行仿真,并根据仿真结果迭代构造和精化设计模型,以尽早发现设计模型中存在的问题,保障设计模型的质量,进而减少系统开发的代价,是目前急需解决的技术挑战.SystemC是一种软硬件协同仿真的系统描述语言,由此提出了AADL软构件到SystemC仿真代码的转换技术上,设计和实现了转换工具,并以航行控制系统为例,阐释了转换技术和基于SystemC的线程调度仿真.通过本研究成果,用户可以实现基于SystemC的AADL软构件的仿真,包括软构件之间交互、执行时间和线程调度的仿真等,用户也可以将研究成果与基于SystemC的AADL执行平台构件仿真相结合,对软硬件进行协同仿真.

  9. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  10. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe...... the codes succinctly using Gröbner bases....

  11. MCNP code

    International Nuclear Information System (INIS)

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  12. ANIMAL code

    International Nuclear Information System (INIS)

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  13. A Mobile Application Prototype using Network Coding

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank;

    2010-01-01

    This paper looks into implementation details of network coding for a mobile application running on commercial mobile phones. We describe the necessary coding operations and algorithms that implements them. The coding algorithms forms the basis for a implementation in C++ and Symbian C++. We report...

  14. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  15. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  16. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  17. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...... in trees....

  18. Concatenated codes with convolutional inner codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Zyablov, Viktor

    1988-01-01

    The minimum distance of concatenated codes with Reed-Solomon outer codes and convolutional inner codes is studied. For suitable combinations of parameters the minimum distance can be lower-bounded by the product of the minimum distances of the inner and outer codes. For a randomized ensemble of...... concatenated codes a lower bound of the Gilbert-Varshamov type is proved...

  19. Evolution of naturally occurring 5'non-coding region variants of Hepatitis C virus in human populations of the South American region

    Directory of Open Access Journals (Sweden)

    García-Aguirre Laura

    2007-08-01

    Full Text Available Abstract Background Hepatitis C virus (HCV has been the subject of intense research and clinical investigation as its major role in human disease has emerged. Previous and recent studies have suggested a diversification of type 1 HCV in the South American region. The degree of genetic variation among HCV strains circulating in Bolivia and Colombia is currently unknown. In order to get insight into these matters, we performed a phylogenetic analysis of HCV 5' non-coding region (5'NCR sequences from strains isolated in Bolivia, Colombia and Uruguay, as well as available comparable sequences of HCV strains isolated in South America. Methods Phylogenetic tree analysis was performed using the neighbor-joining method under a matrix of genetic distances established under the Kimura-two parameter model. Signature pattern analysis, which identifies particular sites in nucleic acid alignments of variable sequences that are distinctly representative relative to a background set, was performed using the method of Korber & Myers, as implemented in the VESPA program. Prediction of RNA secondary structures was done by the method of Zuker & Turner, as implemented in the mfold program. Results Phylogenetic tree analysis of HCV strains isolated in the South American region revealed the presence of a distinct genetic lineage inside genotype 1. Signature pattern analysis revealed that the presence of this lineage is consistent with the presence of a sequence signature in the 5'NCR of HCV strains isolated in South America. Comparisons of these results with the ones found for Europe or North America revealed that this sequence signature is characteristic of the South American region. Conclusion Phylogentic analysis revealed the presence of a sequence signature in the 5'NCR of type 1 HCV strains isolated in South America. This signature is frequent enough in type 1 HCV populations circulating South America to be detected in a phylogenetic tree analysis as a distinct

  20. A Mobile Application Prototype using Network Coding

    OpenAIRE

    Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank; Larsen, Torben

    2010-01-01

    This paper looks into implementation details of network coding for a mobile application running on commercial mobile phones. We describe the necessary coding operations and algorithms that implements them. The coding algorithms forms the basis for a implementation in C++ and Symbian C++. We report on practical measurement results of coding throughput and energy consumption for a single-source multiple-sinks network, with and without recoding at the sinks. These results confirm that network cod...

  1. Quantum Cyclic Code

    CERN Document Server

    Dutta, Sagarmoy

    2010-01-01

    In this paper, we define and study \\emph{quantum cyclic codes}, a generalisation of cyclic codes to the quantum setting. Previously studied examples of quantum cyclic codes were all quantum codes obtained from classical cyclic codes via the CSS construction. However, the codes that we study are much more general. In particular, we construct cyclic stabiliser codes with parameters $[[5,1,3

  2. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  3. FCG: a code generator for lazy functional languages

    NARCIS (Netherlands)

    Langendoen, K.G.; Hartel, P.H.

    1992-01-01

    The FCG code generator produces portable code that supports efficient twospace copying garbage collection. The code generator transforms the output of the FAST compiler front end into an abstract machine code. This code explicitly uses a call stack, which is accessible to the garbage collector. In c

  4. C

    NARCIS (Netherlands)

    Sinninghe Damsté, J.S.; Schouten, S.; Volkman, J.K.

    2014-01-01

    A limited suite of C-27, C-29 and C-30 rearranged hopenes identified as neohop-13(18)-enes have been reported in immature Recent and ancient marine/lacustrine sediments and their presence has been explained by dehydration and isomerisation of ubiquitous hopanols or hopenes. Here we investigated the

  5. Strong Trinucleotide Circular Codes

    Directory of Open Access Journals (Sweden)

    Christian J. Michel

    2011-01-01

    Full Text Available Recently, we identified a hierarchy relation between trinucleotide comma-free codes and trinucleotide circular codes (see our previous works. Here, we extend our hierarchy with two new classes of codes, called DLD and LDL codes, which are stronger than the comma-free codes. We also prove that no circular code with 20 trinucleotides is a DLD code and that a circular code with 20 trinucleotides is comma-free if and only if it is a LDL code. Finally, we point out the possible role of the symmetric group ∑4 in the mathematical study of trinucleotide circular codes.

  6. ABCXYZ: vector potential (A) and magnetic field (B) code (C) for Cartesian (XYZ) geometry using general current elements. [In LRL TRAN for CDC > 600 computer

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, D.V.; Breazeal, J.; Finan, C.H.; Johnston, B.M.

    1976-09-14

    ABCXYZ is a computer code for obtaining the Cartesian components of the vector potential and the magnetic field on an observed grid from an arrangement of current-carrying wires. Arbitrary combinations of straight line segments, arcs, and loops are allowed in the specification of the currents. Arbitrary positions and orientations of the current-carrying elements are also allowed. Specification of the wire diameter permits the computation of well-defined fields, even in the interiors of the conductors. An optical feature generates magnetic field lines. Extensive graphical and printed output is available to the user including contour, grid-line, and field-line plots. 12 figures, 1 table.

  7. Epetra developers coding guidelines.

    Energy Technology Data Exchange (ETDEWEB)

    Heroux, Michael Allen; Sexton, Paul Michael

    2003-12-01

    Epetra is a package of classes for the construction and use of serial and distributed parallel linear algebra objects. It is one of the base packages in Trilinos. This document describes guidelines for Epetra coding style. The issues discussed here go beyond correct C++ syntax to address issues that make code more readable and self-consistent. The guidelines presented here are intended to aid current and future development of Epetra specifically. They reflect design decisions that were made in the early development stages of Epetra. Some of the guidelines are contrary to more commonly used conventions, but we choose to continue these practices for the purposes of self-consistency. These guidelines are intended to be complimentary to policies established in the Trilinos Developers Guide.

  8. Joint source channel coding using arithmetic codes

    CERN Document Server

    Bi, Dongsheng

    2009-01-01

    Based on the encoding process, arithmetic codes can be viewed as tree codes and current proposals for decoding arithmetic codes with forbidden symbols belong to sequential decoding algorithms and their variants. In this monograph, we propose a new way of looking at arithmetic codes with forbidden symbols. If a limit is imposed on the maximum value of a key parameter in the encoder, this modified arithmetic encoder can also be modeled as a finite state machine and the code generated can be treated as a variable-length trellis code. The number of states used can be reduced and techniques used fo

  9. Combinatorial Batch Codes with Redundancy

    OpenAIRE

    Jung, Jiyoon; Mummert, Carl; Niese, Elizabeth; Schroeder, Michael w.

    2015-01-01

    A combinatorial batch code with redundancy $r$ and parameters $(n,k,m,t)$ can be represented as a system $C$ of $m$ (not necessarily distinct) subsets of an underlying $n$-element set $F$, so that each $k$-subset of $F$ can be covered by every $(m-r)$-subset $K$ of $C$ while taking no more than $t$ elements of $F$ with each set in $K$. The sum of the cardinalities of the sets in $C$ is the weight of the code. We focus on the case $t =1$, and determine the minimal weight for several ranges of ...

  10. The Coronary Artery Disease-associated Coding Variant in Zinc Finger C3HC-type Containing 1 (ZC3HC1) Affects Cell Cycle Regulation.

    Science.gov (United States)

    Jones, Peter D; Kaiser, Michael A; Ghaderi Najafabadi, Maryam; McVey, David G; Beveridge, Allan J; Schofield, Christine L; Samani, Nilesh J; Webb, Tom R

    2016-07-29

    Genome-wide association studies have to date identified multiple coronary artery disease (CAD)-associated loci; however, for most of these loci the mechanism by which they affect CAD risk is unclear. The CAD-associated locus 7q32.2 is unusual in that the lead variant, rs11556924, is not in strong linkage disequilibrium with any other variant and introduces a coding change in ZC3HC1, which encodes NIPA. In this study, we show that rs11556924 polymorphism is associated with lower regulatory phosphorylation of NIPA in the risk variant, resulting in NIPA with higher activity. Using a genome-editing approach we show that this causes an effective decrease in cyclin-B1 stability in the nucleus, thereby slowing its nuclear accumulation. By perturbing the rate of nuclear cyclin-B1 accumulation, rs11556924 alters the regulation of mitotic progression resulting in an extended mitosis. This study shows that the CAD-associated coding polymorphism in ZC3HC1 alters the dynamics of cell-cycle regulation by NIPA. PMID:27226629

  11. Cloning and expression of a cDNA covering the complete coding region of the P32 subunit of human pre-mRNA splicing factor SF2

    DEFF Research Database (Denmark)

    Honoré, B; Madsen, Peder; Rasmussen, H H;

    1993-01-01

    We have cloned and expressed a cDNA encoding the 32-kDa subunit (P32) of the human pre-mRNA splicing factor, SF2. This cDNA extends beyond the 5'-end of a previously reported cDNA [Krainer et al., Cell 66 (1991) 383-394]. Importantly, our fragment includes an ATG start codon which was absent from...

  12. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  13. Code Samples Used for Complexity and Control

    Science.gov (United States)

    Ivancevic, Vladimir G.; Reid, Darryn J.

    2015-11-01

    The following sections are included: * MathematicaⓇ Code * Generic Chaotic Simulator * Vector Differential Operators * NLS Explorer * 2C++ Code * C++ Lambda Functions for Real Calculus * Accelerometer Data Processor * Simple Predictor-Corrector Integrator * Solving the BVP with the Shooting Method * Linear Hyperbolic PDE Solver * Linear Elliptic PDE Solver * Method of Lines for a Set of the NLS Equations * C# Code * Iterative Equation Solver * Simulated Annealing: A Function Minimum * Simple Nonlinear Dynamics * Nonlinear Pendulum Simulator * Lagrangian Dynamics Simulator * Complex-Valued Crowd Attractor Dynamics * Freeform Fortran Code * Lorenz Attractor Simulator * Complex Lorenz Attractor * Simple SGE Soliton * Complex Signal Presentation * Gaussian Wave Packet * Hermitian Matrices * Euclidean L2-Norm * Vector/Matrix Operations * Plain C-Code: Levenberg-Marquardt Optimizer * Free Basic Code: 2D Crowd Dynamics with 3000 Agents

  14. A decoding method of an n length binary BCH code through (n + 1n length binary cyclic code

    Directory of Open Access Journals (Sweden)

    TARIQ SHAH

    2013-09-01

    Full Text Available For a given binary BCH code Cn of length n = 2 s - 1 generated by a polynomial of degree r there is no binary BCH code of length (n + 1n generated by a generalized polynomial of degree 2r. However, it does exist a binary cyclic code C (n+1n of length (n + 1n such that the binary BCH code Cn is embedded in C (n+1n . Accordingly a high code rate is attained through a binary cyclic code C (n+1n for a binary BCH code Cn . Furthermore, an algorithm proposed facilitates in a decoding of a binary BCH code Cn through the decoding of a binary cyclic code C (n+1n , while the codes Cn and C (n+1n have the same minimum hamming distance.

  15. Downregulation of miR-320a/383-sponge-like long non-coding RNA NLC1-C (narcolepsy candidate-region 1 genes) is associated with male infertility and promotes testicular embryonal carcinoma cell proliferation.

    Science.gov (United States)

    Lü, M; Tian, H; Cao, Y-X; He, X; Chen, L; Song, X; Ping, P; Huang, H; Sun, F

    2015-01-01

    Long non-coding RNAs (lncRNAs), which are extensively transcribed from the genome, have been proposed to be key regulators of diverse biological processes. However, little is known about the role of lncRNAs in regulating spermatogenesis in human males. Here, using microarray technology, we show altered expression of lncRNAs in the testes of infertile men with maturation arrest (MA) or hypospermatogenesis (Hypo), with 757 and 2370 differentially down-regulated and 475 and 163 up-regulated lncRNAs in MA and Hypo, respectively. These findings were confirmed by quantitative real-time PCR (qRT-PCR) assays on select lncRNAs, including HOTTIP, imsrna320, imsrna292 and NLC1-C (narcolepsy candidate-region 1 genes). Interestingly, NLC1-C, also known as long intergenic non-protein-coding RNA162 (LINC00162), was down-regulated in the cytoplasm and accumulated in the nucleus of spermatogonia and primary spermatocytes in the testes of infertile men with mixed patterns of MA compared with normal control. The accumulation of NLC1-C in the nucleus repressed miR-320a and miR-383 transcript and promoted testicular embryonal carcinoma cell proliferation by binding to Nucleolin. Here, we define a novel mechanism by which lncRNAs modulate miRNA expression at the transcriptional level by binding to RNA-binding proteins to regulate human spermatogenesis. PMID:26539909

  16. From ITU-T G.722.1 to ITU-T G.722.1 Annex C: A New Low-Complexity 14kHz Bandwidth Audio Coding Standard

    Directory of Open Access Journals (Sweden)

    Minjie Xie

    2007-04-01

    Full Text Available This paper describes the low-complexity 14kHz bandwidth audio coding algorithm which has been recently standardized by ITU-T as Recommendation G.722.1 Annex C (“G.722.1C”. The algorithm is an extension to ITU-T Recommendation G.722.1 and a doubled form of the G.722.1 algorithm to permit 14 kHz audio bandwidth using a 32 kHz audio sample rate, at 24, 32, and 48 kbit/s. The G. 722.1C codec features very high audio quality, extremely low computational complexity, and low algorithmic delay compared to other state-of-the-art audio coding algorithms. This codec is suitable for use in video conferencing and teleconferencing, and Internet streaming applications as well as a general-purpose 14 kHz audio codec. Subjective test results from the Characterization phase of G 722.1C are also presented in the paper.

  17. Deciphering Systemic Wound Responses of the Pumpkin Extrafascicular Phloem by Metabolomics and Stable Isotope-Coded Protein Labeling1[C][W

    Science.gov (United States)

    Gaupels, Frank; Sarioglu, Hakan; Beckmann, Manfred; Hause, Bettina; Spannagl, Manuel; Draper, John; Lindermayr, Christian; Durner, Jörg

    2012-01-01

    In cucurbits, phloem latex exudes from cut sieve tubes of the extrafascicular phloem (EFP), serving in defense against herbivores. We analyzed inducible defense mechanisms in the EFP of pumpkin (Cucurbita maxima) after leaf damage. As an early systemic response, wounding elicited transient accumulation of jasmonates and a decrease in exudation probably due to partial sieve tube occlusion by callose. The energy status of the EFP was enhanced as indicated by increased levels of ATP, phosphate, and intermediates of the citric acid cycle. Gas chromatography coupled to mass spectrometry also revealed that sucrose transport, gluconeogenesis/glycolysis, and amino acid metabolism were up-regulated after wounding. Combining ProteoMiner technology for the enrichment of low-abundance proteins with stable isotope-coded protein labeling, we identified 51 wound-regulated phloem proteins. Two Sucrose-Nonfermenting1-related protein kinases and a 32-kD 14-3-3 protein are candidate central regulators of stress metabolism in the EFP. Other proteins, such as the Silverleaf Whitefly-Induced Protein1, Mitogen Activated Protein Kinase6, and Heat Shock Protein81, have known defensive functions. Isotope-coded protein labeling and western-blot analyses indicated that Cyclophilin18 is a reliable marker for stress responses of the EFP. As a hint toward the induction of redox signaling, we have observed delayed oxidation-triggered polymerization of the major Phloem Protein1 (PP1) and PP2, which correlated with a decline in carbonylation of PP2. In sum, wounding triggered transient sieve tube occlusion, enhanced energy metabolism, and accumulation of defense-related proteins in the pumpkin EFP. The systemic wound response was mediated by jasmonate and redox signaling. PMID:23085839

  18. Time-dependent distribution functions and resulting synthetic NPA spectra in C-Mod calculated with the CQL3D-Hybrid-FOW, AORSA full-wave, and DC Lorentz codes

    Science.gov (United States)

    Harvey, R. W.; Petrov, Yu.; Jaeger, E. F.; Berry, L. A.; Bonoli, P. T.; Bader, A.

    2015-12-01

    A time-dependent simulation of C-Mod pulsed TCRF power is made obtaining minority hydrogen ion distributions with the CQL3D-Hybrid-FOW finite-orbit-width Fokker-Planck code. Cyclotron-resonant TCRF fields are calculated with the AORSA full wave code. The RF diffusion coefficients used in CQL3D are obtained with the DC Lorentz gyro-orbit code for perturbed particle trajectories in the combined equilibrium and TCRF electromagnetic fields. Prior results with a zero-banana-width simulation using the CQL3D/AORSA/DC time-cycles showed a pronounced enhancement of the H distribution in the perpendicular velocity direction compared to results obtained from Stix's quasilinear theory, and this substantially increased the rampup rate of the observed vertically-viewed neutral particle analyzer (NPA) flux, in general agreement with experiment. However, ramp down of the NPA flux after the pulse, remained long compared to the experiment. The present study compares the new FOW results, including relevant gyro-radius effects, to determine the importance of these new effects on the the NPA time-dependence.

  19. Z2Z4-linear codes: generator matrices and duality

    CERN Document Server

    Borges, J; Pujol, J; Rifa, J; Villanueva, M

    2007-01-01

    A code ${\\cal C}$ is $\\Z_2\\Z_4$-additive if the set of coordinates can be partitioned into two subsets $X$ and $Y$ such that the punctured code of ${\\cal C}$ by deleting the coordinates outside $X$ (respectively, $Y$) is a binary linear code (respectively, a quaternary linear code). In this paper $\\Z_2\\Z_4$-additive codes are studied. Their corresponding binary images, via the Gray map, are $\\Z_2\\Z_4$-linear codes, which seem to be a very distinguished class of binary group codes. As for binary and quaternary linear codes, for these codes the fundamental parameters are found and standard forms for generator and parity check matrices are given. For this, the appropriate inner product is deduced and the concept of duality for $\\Z_2\\Z_4$-additive codes is defined. Moreover, the parameters of the dual codes are computed. Finally, some conditions for self-duality of $\\Z_2\\Z_4$-additive codes are given.

  20. Genetic Immunization of BALB/c mice with a Plasmid Bearing the Gene Coding for a Hybrid Merozoite Surface Protein 1-Hepatitis B Virus Surface Protein Fusion Protects Mice against Lethal Plasmodium chabaudi chabaudi PC1 Infection

    OpenAIRE

    Wunderlich, Gerhard; Moura, Ivan C.; del Portillo, Hernando A

    2000-01-01

    The genetic immunization of rodents with a plasmid coding for a Plasmodium chabaudi merozoite surface protein 1 (C terminus)-hepatitis B virus surface fusion protein (pPcMSP119-HBs) provided protection of mice against subsequent lethal challenge with P. chabaudi chabaudi PC1-infected red blood cells. The percentage of survivor mice was higher in DNA-immunized mice than in animals immunized with a recombinant rPcMSP119– glutathione S-transferase fusion protein administered in Freund adjuvant. ...

  1. Genetic polymorphism of T6235C mutation in 3 non-coding region of CYP1A1 and GSTM1 genes and lung cancer susceptibility in the Mongolian population

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Objective To estimate the relative risk for lung cancer associated with genetic polymorphism of T6235C mutation in 3' non-coding region(MspⅠ)of cytochrome P450 1A1(CYP1A1)and glutathione S-transferase M1(GSTM1)in the Mongolian population in Inner Mongolian Region of China.Methods Polymerase chain reaction-restriction fragment length polymorphism(PCR-RFLP)and multiplex PCR methods were used to analyze blood samples obtained from 263 case subjects and 263 control subjects to determine their genotypes for CYP1...

  2. Correct Code Containing Containers

    OpenAIRE

    Dross, Claire; Filliâtre, Jean-Christophe; Moy, Yannick

    2011-01-01

    For critical software development, containers such as lists, vectors, sets or maps are an attractive alternative to ad-hoc data structures based on pointers. As standards like DO-178C put formal verification and testing on an equal footing, it is important to give users the ability to apply both to the verification of code using containers. In this paper, we present a definition of containers whose aim is to facilitate their use in certified software, using modern proof technology and novel s...

  3. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  4. Nonbinary quantum codes

    OpenAIRE

    Eric M. Rains

    1997-01-01

    We present several results on quantum codes over general alphabets (that is, in which the fundamental units may have more than 2 states). In particular, we consider codes derived from finite symplectic geometry assumed to have additional global symmetries. From this standpoint, the analogues of Calderbank-Shor-Steane codes and of GF(4)-linear codes turn out to be special cases of the same construction. This allows us to construct families of quantum codes from certain codes over number fields...

  5. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  6. Affine Grassmann codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant

    2010-01-01

    We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes.We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show that...... affine Grassmann codes have a large automorphism group and determine the number of minimum weight codewords....

  7. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  8. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  9. Polyphase alternating codes

    Directory of Open Access Journals (Sweden)

    M. Markkanen

    2008-08-01

    Full Text Available We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We handle a few specific examples in detail. The new codes offer an enlarged collection of code lengths for radar experiments.

  10. Coupling CFD code with system code and neutron kinetic code

    International Nuclear Information System (INIS)

    Highlights: • Coupling interface between CFD code Fluent and system code Athlet was created. • Athlet code is internally coupled with neutron kinetic code Dyn3D. • Explicit coupling of overlapped computational domains was used. • A coupled system of Athlet/Dyn3D+Fluent codes was successfully tested on a real case. - Abstract: The aim of this work was to develop the coupling interface between CFD code Fluent and system code Athlet internally coupled with neutron kinetic code Dyn3D. The coupling interface is intended for simulation of complex transients such as Main Steam Line Break scenarios, which cannot be modeled separately first by system and neutron kinetic code and then by CFD code, because of the feedback between the codes. In the first part of this article, the coupling method is described. Explicit coupling of overlapped computational domains is used in this work. The second part of the article presents a demonstration simulation performed by the coupled system of Athlet/Dyn3D and Fluent. The “Opening a Steam Dump to the Atmosphere” test carried out at the Temelin NPP (VVER-1000) was simulated by the coupled system. In this simulation, the primary and secondary circuits were modeled by Athlet, mixing in downcomer and lower plenum was simulated by Fluent and heat generation in the core was calculated by Dyn3D. The results of the simulation with Athlet/Dyn3D+Fluent were compared with the experimental data and the results from a calculation performed with Athlet/Dyn3D without Fluent

  11. The moving mesh code Shadowfax

    CERN Document Server

    Vandenbroucke, Bert

    2016-01-01

    We introduce the moving mesh code Shadowfax, which can be used to evolve a mixture of gas, subject to the laws of hydrodynamics and gravity, and any collisionless fluid only subject to gravity, such as cold dark matter or stars. The code is written in C++ and its source code is made available to the scientific community under the GNU Affero General Public License. We outline the algorithm and the design of our implementation, and demonstrate its validity through the results of a set of basic test problems, which are also part of the public version. We also compare Shadowfax with a number of other publicly available codes using different hydrodynamical integration schemes, illustrating the advantages and disadvantages of the moving mesh technique.

  12. The moving mesh code SHADOWFAX

    Science.gov (United States)

    Vandenbroucke, B.; De Rijcke, S.

    2016-07-01

    We introduce the moving mesh code SHADOWFAX, which can be used to evolve a mixture of gas, subject to the laws of hydrodynamics and gravity, and any collisionless fluid only subject to gravity, such as cold dark matter or stars. The code is written in C++ and its source code is made available to the scientific community under the GNU Affero General Public Licence. We outline the algorithm and the design of our implementation, and demonstrate its validity through the results of a set of basic test problems, which are also part of the public version. We also compare SHADOWFAX with a number of other publicly available codes using different hydrodynamical integration schemes, illustrating the advantages and disadvantages of the moving mesh technique.

  13. Locally Orderless Registration Code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  14. Automated determination of the stable carbon isotopic composition (δ13C) of total dissolved inorganic carbon (DIC) and total nonpurgeable dissolved organic carbon (DOC) in aqueous samples: RSIL lab codes 1851 and 1852

    Science.gov (United States)

    Révész, Kinga M.; Doctor, Daniel H.

    2014-01-01

    The purposes of the Reston Stable Isotope Laboratory (RSIL) lab codes 1851 and 1852 are to determine the total carbon mass and the ratio of the stable isotopes of carbon (δ13C) for total dissolved inorganic carbon (DIC, lab code 1851) and total nonpurgeable dissolved organic carbon (DOC, lab code 1852) in aqueous samples. The analysis procedure is automated according to a method that utilizes a total carbon analyzer as a peripheral sample preparation device for analysis of carbon dioxide (CO2) gas by a continuous-flow isotope ratio mass spectrometer (CF-IRMS). The carbon analyzer produces CO2 and determines the carbon mass in parts per million (ppm) of DIC and DOC in each sample separately, and the CF-IRMS determines the carbon isotope ratio of the produced CO2. This configuration provides a fully automated analysis of total carbon mass and δ13C with no operator intervention, additional sample preparation, or other manual analysis. To determine the DIC, the carbon analyzer transfers a specified sample volume to a heated (70 °C) reaction vessel with a preprogrammed volume of 10% phosphoric acid (H3PO4), which allows the carbonate and bicarbonate species in the sample to dissociate to CO2. The CO2 from the reacted sample is subsequently purged with a flow of helium gas that sweeps the CO2 through an infrared CO2 detector and quantifies the CO2. The CO2 is then carried through a high-temperature (650 °C) scrubber reactor, a series of water traps, and ultimately to the inlet of the mass spectrometer. For the analysis of total dissolved organic carbon, the carbon analyzer performs a second step on the sample in the heated reaction vessel during which a preprogrammed volume of sodium persulfate (Na2S2O8) is added, and the hydroxyl radicals oxidize the organics to CO2. Samples containing 2 ppm to 30,000 ppm of carbon are analyzed. The precision of the carbon isotope analysis is within 0.3 per mill for DIC, and within 0.5 per mill for DOC.

  15. Nucleotide sequence of a cDNA coding for the barley seed protein CMa: an inhibitor of insect α-amylase

    DEFF Research Database (Denmark)

    Rasmussen, Søren Kjærsgård; Johansson, A.

    1992-01-01

    The primary structure of the insect alpha-amylase inhibitor CMa of barley seeds was deduced from a full-length cDNA clone pc43F6. Analysis of RNA from barley endosperm shows high levels 15 and 20 days after flowering. The cDNA predicts an amino acid sequence of 119 residues preceded by a signal...... peptide of 25 amino acids. Ala and Leu account for 55% of the signal peptide. CMa is 60-85% identical with alpha-amylase inhibitors of wheat, but shows less than 50% identity to trypsin inhibitors of barley and wheat. The 10 Cys residues are located in identical positions compared to the cereal inhibitor...

  16. Advanced C and C++ compiling

    CERN Document Server

    Stevanovic, Milan

    2014-01-01

    Learning how to write C/C++ code is only the first step. To be a serious programmer, you need to understand the structure and purpose of the binary files produced by the compiler: object files, static libraries, shared libraries, and, of course, executables.Advanced C and C++ Compiling explains the build process in detail and shows how to integrate code from other developers in the form of deployed libraries as well as how to resolve issues and potential mismatches between your own and external code trees.With the proliferation of open source, understanding these issues is increasingly the res

  17. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  18. Polyphase alternating codes

    CERN Document Server

    Markkanen, Markku

    2007-01-01

    This work introduces a method for constructing polyphase alternating codes in which the length of a code transmission cycle can be $p^m$ or $p-1$, where $p$ is a prime number and $m$ is a positive integer. The relevant properties leading to the construction alternating codes and the algorithm for generating alternating codes is described. Examples of all practical and some not that practical polyphase code lengths are given.

  19. Constructing quantum codes

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Quantum error correcting codes are indispensable for quantum information processing and quantum computation.In 1995 and 1996,Shor and Steane gave first several examples of quantum codes from classical error correcting codes.The construction of efficient quantum codes is now an active multi-discipline research field.In this paper we review the known several constructions of quantum codes and present some examples.

  20. Platinum resistance thermometer calibration on the international practical temperature scale of 1968. [-182. 962 to +630. 74/sup 0/C; PRT68 code

    Energy Technology Data Exchange (ETDEWEB)

    Drake, S.R.

    1977-07-01

    A method using the defined equations of the International Practical Temperature Scale of 1968 (IPTS-68) for calibrating platinum resistance thermometers in the range from -182.962 to +630.74/sup 0/C is described. Incorporating the specified IPTS-68 procedure, the method also provides for the accommodation of additional data points in both the negative and positive scale regions at any desired temperature level. The PRT68 computer program, also described and illustrated, was written in FORTRAN language for the CDC-6600 computer to implement this method.

  1. Fibrillin binds calcium and is coded by cDNAs that reveal a multidomain structure and alternatively spliced exons at the 5[prime] end

    Energy Technology Data Exchange (ETDEWEB)

    Corson, G.M.; Chalberg, S.C.; Charbonneau, N.L.; Sakai, L.Y. (Oregon Health Sciences Univ., Portland (United States)); Dietz, H.C. (Johns Hopkins Univ. School of Medicine, Baltimore, MD (United States))

    1993-08-01

    Fibrillin is an important structural protein of the extracellular matrix. It is a large cysteine-rich glycoprotein with extensive intrachain disulfide bonds, likely contributed by multiple EGF-like repeats. The authors have previously published 6.9 kb of FBN1 cDNA sequence. FBN1 cDNA clones that extend the sequence 3089 bp in the 5[prime] direction are described in this report. The deduced primary structure suggests that fibrillin in composed of multiple domains. The most predominant features the presence of 43 calcium binding EGF-like repeats. They demonstrate here that fibrillin molecules bind calcium. In addition, three alternatively spliced exons at the 5[prime] end are described. Analysis of 5.8 kb of surrounding genomic sequence revealed a 1.8-kb CpG island spanning the alternatively spliced exons and the next downstream exon. Since FBN1 is the gene responsible for Marfan syndrome, the information presented here will be useful in identifying new mutations and in understanding the function of fibrillin in the pathogenesis of the disease. 42 refs., 7 figs.

  2. Chaos Many-Body Engine v03: A new version of code C# for chaos analysis of relativistic many-body systems with reactions

    Science.gov (United States)

    Grossu, I. V.; Besliu, C.; Jipa, Al.; Felea, D.; Esanu, T.; Stan, E.; Bordeianu, C. C.

    2013-04-01

    In this paper we present a new version of the Chaos Many-Body Engine C# application (Grossu et al. 2012 [1]). In order to benefit from the latest technological advantages, we migrated the application from .Net Framework 2.0 to .Net Framework 4.0. New tools were implemented also. Trying to estimate the particle interactions dependence on initial conditions, we considered a new distance, which takes into account only the structural differences between two systems. We used this distance for implementing the “Structural Lyapunov” function. We propose also a new precision test based on temporal reversed simulations. New version program summaryProgram title: Chaos Many-Body Engine v03 Catalogue identifier: AEGH_v3_0 Program summary URL: http://cpc.cs.qub.ac.uk/summaries/AEGH_v3_0.html Program obtainable from: CPC Program Library, Queen’s University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 214429 No. of bytes in distributed program, including test data, etc.: 9512380 Distribution format: tar.gz Programming language: Visual C# .Net 2010 Computer: PC Operating system: .Net Framework 4.0 running on MS Windows RAM: 128 MB Classification: 24.60.Lz, 05.45.a Catalogue identifier of previous version: AEGH_v2_0 Journal reference of previous version: Computer Physics Communications 183 (2012) 1055-1059 Does the new version supersede the previous version?: Yes Nature of problem: Chaos analysis of three-dimensional, relativistic many-body systems with reactions. Solution method: Second order Runge-Kutta algorithm. Implementation of temporal reversed simulation precision test, and “Structural Lyapunov” function. In order to benefit from the advantages involved in the latest technologies (e.g. LINQ Queries [2]), Chaos Many-Body Engine was migrated from .Net Framework 2.0 to .Net Framework 4.0. In addition to existing energy conservation

  3. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  4. Nonbinary quantum codes

    CERN Document Server

    Rains, E M

    1997-01-01

    We present several results on quantum codes over general alphabets (that is, in which the fundamental units may have more than 2 states). In particular, we consider codes derived from finite symplectic geometry assumed to have additional global symmetries. From this standpoint, the analogues of Calderbank-Shor-Steane codes and of GF(4)-linear codes turn out to be special cases of the same construction. This allows us to construct families of quantum codes from certain codes over number fields; in particular, we get analogues of quadratic residue codes, including a single-error correcting code encoding one letter in five, for any alphabet size. We also consider the problem of fault-tolerant computation through such codes, generalizing ideas of Gottesman.

  5. Polyphase alternating codes

    OpenAIRE

    M. Markkanen; Vierinen, J.; Markkanen, J.

    2007-01-01

    We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We ...

  6. Construction and decoding of matrix-product codes from nested codes

    DEFF Research Database (Denmark)

    Hernando, Fernando; Lally, Kristine; Ruano, Diego

    2009-01-01

    We consider matrix-product codes [C1 ... Cs] · A, where C1, ..., Cs  are nested linear codes and matrix A has full rank. We compute their minimum distance and provide a decoding algorithm when A is a non-singular by columns matrix. The decoding algorithm decodes up to half of the minimum distance....

  7. Estratégias utilizadas por aprendizes de línguas afins: a troca de código Strategies employed by learners of related languages: code-switching

    Directory of Open Access Journals (Sweden)

    Roberta Ferroni

    2012-12-01

    Full Text Available Neste artigo analisamos a troca de código, uma estratégia de compensação que consiste na utilização de uma palavra ou frase em L1, L3 ou L4, no interior do enunciado em L2, empregada por aprendizes de italiano LE cuja língua materna é o português brasileiro, durante a realização em dupla de uma tarefa escrita. A pesquisa, que se baseou nos instrumentos propostos pela etnografia, mostra que a troca de código constitui um potencial para o desenvolvimento da interlíngua e para a aquisição/aprendizagem de LE e que tal estratégia, além de compensar eventuais lacunas linguísticas originadas pela falta de recursos adequados para expressar-se em LE, é usada pelos falantes como procedimento típico da conversação bilíngue para facilitar a comunicação.In this paper we examine code-switching, an achievement strategy consisting in the use of a word or phrase from L1, L3 or L4 within an utterance in L2, as employed by learners of Italian as a foreign language who have Brazilian Portuguese as their mother tongue, while performing a written task in pairs. The research, based on tools provided by an ethnographic approach, shows that code-switching constitutes a potential for developing interlanguage and for the acquisition/learning of a foreign language and that such strategy, in addition to compensating eventual linguistic gaps originated by a lack of proper resources for expression in L2, is used by speakers as a typical procedure in bilingual conversation, in order to facilitate the communication.

  8. Thermodynamics of calcium silicate hydrates, development of a database to model concrete dissolution at 25°C using the EQ3/6 geochemical modeling code

    Energy Technology Data Exchange (ETDEWEB)

    Clodic, L; Meike, A

    1997-08-18

    Examination of the ability to model aqueous systems of interest to the repository proposed by the Yucca Mountain Project has revealed an historical deficit in the ability to model complex waterÐmaterial systems that contain ordinary Portland cement (OPC) at elevated temperature (e.g., Bruton et al., 1994; Meike et al., 1994). One of the reasons is that cement chemistry typically concentrates on two issues of importance to the concrete industry: the hydration of cement powder, which contains reactive phases that do not persist in the cured concrete, and the causes of mechanical degradation at earth surface temperatures such as delayed ettringite formation and alkali silica reaction. Such modeling capability is not available in the open literature, even from applications that might have developed high temperature approaches, such as deep drilling for oil and geothermal resource recovery. The ability to simulate the interaction between concrete, as it evolves over time, and water has become more critical as repository designers begin to consider the incorporation of OPC materials in the emplacement drifts. The Yucca Mountain Project is unique among the high-level radioactive waste repository projects in the world in terms of the need to understand and predict processes in excess of 100°C (see, e.g., Meike, 1997). Our aim has been to develop this capability in the area of aqueous chemistry.

  9. On kernels and nuclei of rank metric codes

    OpenAIRE

    Lunardon, Guglielmo; Trombetti, Rocco; Zhou, Yue

    2016-01-01

    For each rank metric code $\\mathcal{C}\\subseteq \\mathbb{K}^{m\\times n}$, we associate a translation structure, the kernel of which is showed to be invariant with respect to the equivalence on rank metric codes. When $\\mathbb{K}$ is a finite field $\\mathbb{F}_q$ and $\\mathcal{C}$ is a maximum rank distance code with minimum distance $d

  10. Network coding for computing: Linear codes

    CERN Document Server

    Appuswamy, Rathinakumar; Karamchandani, Nikhil; Zeger, Kenneth

    2011-01-01

    In network coding it is known that linear codes are sufficient to achieve the coding capacity in multicast networks and that they are not sufficient in general to achieve the coding capacity in non-multicast networks. In network computing, Rai, Dey, and Shenvi have recently shown that linear codes are not sufficient in general for solvability of multi-receiver networks with scalar linear target functions. We study single receiver networks where the receiver node demands a target function of the source messages. We show that linear codes may provide a computing capacity advantage over routing only when the receiver demands a `linearly-reducible' target function. % Many known target functions including the arithmetic sum, minimum, and maximum are not linearly-reducible. Thus, the use of non-linear codes is essential in order to obtain a computing capacity advantage over routing if the receiver demands a target function that is not linearly-reducible. We also show that if a target function is linearly-reducible,...

  11. The rluC gene of Escherichia coli codes for a pseudouridine synthase that is solely responsible for synthesis of pseudouridine at positions 955, 2504, and 2580 in 23 S ribosomal RNA.

    Science.gov (United States)

    Conrad, J; Sun, D; Englund, N; Ofengand, J

    1998-07-17

    Escherichia coli ribosomal RNA contains 10 pseudouridines, one in the 16 S RNA and nine in the 23 S RNA. Previously, the gene for the synthase responsible for the 16 S RNA pseudouridine was identified and cloned, as was a gene for a synthase that makes a single pseudouridine in 23 S RNA. The yceC open reading frame of E. coli is one of a set of genes homologous to these previously identified ribosomal RNA pseudouridine synthases. In this work, the gene was cloned, overexpressed, and shown to code for a pseudouridine synthase able to react with in vitro transcripts of 23 S ribosomal RNA. Deletion of the gene and analysis of the 23 S RNA from the deletion strain for the presence of pseudouridine at its nine known sites revealed that this synthase is solely responsible in vivo for the synthesis of three of the nine pseudouridine residues, at positions 955, 2504, and 2580. Therefore, this gene has been renamed rluC. Despite the absence of one-third of the normal complement of pseudouridines, there was no change in the exponential growth rate in either LB or M-9 medium at temperatures ranging from 24 to 42 degrees C. From this work and our previous studies, we have now identified three synthases that account for 50% of the pseudouridines in the E. coli ribosome.

  12. Construction of Codes for Network Coding

    CERN Document Server

    Elsenhans, Andreas-Stephan; Wassermann, Alfred

    2010-01-01

    Based on ideas of K\\"otter and Kschischang we use constant dimension subspaces as codewords in a network. We show a connection to the theory of q-analogues of a combinatorial designs, which has been studied in Braun, Kerber and Laue as a purely combinatorial object. For the construction of network codes we successfully modified methods (construction with prescribed automorphisms) originally developed for the q-analogues of a combinatorial designs. We then give a special case of that method which allows the construction of network codes with a very large ambient space and we also show how to decode such codes with a very small number of operations.

  13. On the dimension of twisted centralizer codes

    OpenAIRE

    Glasby, S. P.; Praeger, Cheryl E.; Alahmadi, Adel

    2016-01-01

    Given a field $F$, a scalar $\\lambda\\in F$ and a matrix $A\\in F^{n\\times n}$, the twisted centralizer code $C_F(A,\\lambda):=\\{B\\in F^{n\\times n}\\mid AB-\\lambda BA=0\\}$ is a linear code of length $n^2$. When $A$ is cyclic and $\\lambda\

  14. 29 CFR 510.21 - SIC codes.

    Science.gov (United States)

    2010-07-01

    ... reference was approved by the Director of the Federal Register in accordance with 5 U.S.C. 552(a) and 1 CFR... 29 Labor 3 2010-07-01 2010-07-01 false SIC codes. 510.21 Section 510.21 Labor Regulations Relating... Classification of Industries § 510.21 SIC codes. (a) The Conference Report specifically cites Puerto...

  15. Obfuscated Malicious Code Detection with Path Condition Analysis

    OpenAIRE

    Wenqing Fan; Xue Lei; Jing An

    2014-01-01

    Code obfuscation is one of the main methods to hide malicious code. This paper proposes a new dynamic method which can effectively detect obfuscated malicious code. This method uses ISR to conduct dynamic debugging. The constraint solving during debugging process can detect deeply hidden malicious code by covering different execution paths. Besides, for malicious code that reads external resources, usually the detection of abnormal behaviors can only be detected by taking the resources into c...

  16. TIPONLINE Code Table

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Coded items are entered in the tiponline data entry program. The codes and their explanations are necessary in order to use the data

  17. Proposals for an effective application of the continuous improvement at the ININ according to the IAEA 50-C/SG-Q new code; Propuestas para una aplicacion efectiva del proceso de mejora continua en el ININ, de acuerdo al nuevo codigo 50-C/SG-Q del OIEA

    Energy Technology Data Exchange (ETDEWEB)

    Cardenas A, B.M.; Olivares O, L.A. [Instituto Nacional de Investigaciones Nucleares, A.P. 18-1027, 11801 Mexico D.F. (Mexico)

    1997-07-01

    This work contains the requirements of continuous improvement contained in the IAEA new code {sup Q}uality assurance for safety in nuclear power plants and other nuclear installations, code 50-C/SG-Q. Assuming that it was the base for to elaborate the review No. 5 of the Quality assurance plan at ININ, it was done an analysis to give proposals for the application of continuous improvement in effective way. The relevant points which must be taken in account at the continuous improvement process are: Direction responsibility, involucring of all personnel, process planning, education and training, elaboration of improvement projects, investigation of processes which can be improved, continuation of the improvement process and its evaluation. With the implantation of an effective continuous improvement system it will be obtained to get a better quality and a more efficient safety. (Author)

  18. Unfolding the color code

    OpenAIRE

    Kubica, Aleksander; Yoshida, Beni; Pastawski, Fernando

    2015-01-01

    The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the ...

  19. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  20. Informal control code logic

    OpenAIRE

    Bergstra, J. A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  1. Refactoring test code

    NARCIS (Netherlands)

    Deursen, A. van; Moonen, L.M.F.; Bergh, A. van den; Kok, G.

    2001-01-01

    Two key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from refactoring product

  2. Informal Control code logic

    CERN Document Server

    Bergstra, Jan A

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  3. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow the...

  4. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a...

  5. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of...

  6. The Procions` code; Le code Procions

    Energy Technology Data Exchange (ETDEWEB)

    Deck, D.; Samba, G.

    1994-12-19

    This paper presents a new code to simulate plasmas generated by inertial confinement. This multi-kinds kinetic code is done with no angular approximation concerning ions and will work in plan and spherical geometry. First, the physical model is presented, using Fokker-Plank. Then, the numerical model is introduced in order to solve the Fokker-Plank operator under the Rosenbluth form. At the end, several numerical tests are proposed. (TEC). 17 refs., 27 figs.

  7. Professional C++

    CERN Document Server

    Gregoire, Marc; Kleper, Scott J

    2011-01-01

    Essential reading for experienced developers who are determined to master the latest release of C++ Although C++ is often the language of choice from game programming to major commercial software applications, it is also one of the most difficult to master. With this no-nonsense book, you will learn to conquer the latest release of C++. The author deciphers little-known features of C++, shares detailed code examples that you can then plug into your own code, and reveals the significant changes to C++ that accompany the latest release. You'll discover how to design and build applications that

  8. Universal Rateless Codes From Coupled LT Codes

    CERN Document Server

    Aref, Vahid

    2011-01-01

    It was recently shown that spatial coupling of individual low-density parity-check codes improves the belief-propagation threshold of the coupled ensemble essentially to the maximum a posteriori threshold of the underlying ensemble. We study the performance of spatially coupled low-density generator-matrix ensembles when used for transmission over binary-input memoryless output-symmetric channels. We show by means of density evolution that the threshold saturation phenomenon also takes place in this setting. Our motivation for studying low-density generator-matrix codes is that they can easily be converted into rateless codes. Although there are already several classes of excellent rateless codes known to date, rateless codes constructed via spatial coupling might offer some additional advantages. In particular, by the very nature of the threshold phenomenon one expects that codes constructed on this principle can be made to be universal, i.e., a single construction can uniformly approach capacity over the cl...

  9. Short collusion-secure fingerprint codes against three pirates

    CERN Document Server

    Nuida, Koji

    2010-01-01

    In this article, we propose a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates and give a theoretical security evaluation. Our pirate tracing algorithm combines a scoring method analogous to Tardos codes (J. ACM, 2008) with an extension of parent search techniques of some preceding 2-secure codes. Numerical examples show that our code lengths are significantly shorter than (about 30% to 40% of) the shortest known c-secure codes by Nuida et al. (Des. Codes Cryptogr., 2009) with c = 3. Some preliminary proposal for improving efficiency of our tracing algorithm is also given.

  10. Numerical Recipes in C++: The Art of Scientific Computing (2nd edn). Numerical Recipes Example Book (C++) (2nd edn). Numerical Recipes Multi-Language Code CD ROM with LINUX or UNIX Single-Screen License Revised Version

    International Nuclear Information System (INIS)

    The two Numerical Recipes books are marvellous. The principal book, The Art of Scientific Computing, contains program listings for almost every conceivable requirement, and it also contains a well written discussion of the algorithms and the numerical methods involved. The Example Book provides a complete driving program, with helpful notes, for nearly all the routines in the principal book. The first edition of Numerical Recipes: The Art of Scientific Computing was published in 1986 in two versions, one with programs in Fortran, the other with programs in Pascal. There were subsequent versions with programs in BASIC and in C. The second, enlarged edition was published in 1992, again in two versions, one with programs in Fortran (NR(F)), the other with programs in C (NR(C)). In 1996 the authors produced Numerical Recipes in Fortran 90: The Art of Parallel Scientific Computing as a supplement, called Volume 2, with the original (Fortran) version referred to as Volume 1. Numerical Recipes in C++ (NR(C++)) is another version of the 1992 edition. The numerical recipes are also available on a CD ROM: if you want to use any of the recipes, I would strongly advise you to buy the CD ROM. The CD ROM contains the programs in all the languages. When the first edition was published I bought it, and have also bought copies of the other editions as they have appeared. Anyone involved in scientific computing ought to have a copy of at least one version of Numerical Recipes, and there also ought to be copies in every library. If you already have NR(F), should you buy the NR(C++) and, if not, which version should you buy? In the preface to Volume 2 of NR(F), the authors say 'C and C++ programmers have not been far from our minds as we have written this volume, and we think that you will find that time spent in absorbing its principal lessons will be amply repaid in the future as C and C++ eventually develop standard parallel extensions'. In the preface and introduction to NR(C

  11. (Sigma-Delta) Codes

    OpenAIRE

    Boulagouaz, M.; Leroy, A

    2013-01-01

    In this paper we introduce the notion of cyclic ($f(t),\\sigma,\\delta$)-codes for $f(t)\\in \\Ore$. These codes generalize the $\\theta$-codes as introduced by D. Boucher, F. Ulmer, W. Geiselmann \\cite{BGU}. We construct generic and control matrices for these codes. As a particular case the ($\\si,\\de$)-$W$-code associated to a Wedderburn polynomial are defined and we show that their control matrices are given by generalized Vandermonde matrices. All the Wedderburn polynomials of $\\mathbb F_q[t;\\t...

  12. Los códigos de buen gobierno corporativo en las entidades sin ánimo de lucro: en especial en las fundaciones (Codes of good corporate governance in non-profit organizations: especially in foundations

    Directory of Open Access Journals (Sweden)

    Belén García Álvarez

    2012-06-01

    Full Text Available Non-Profit Organizations must deal too with corporate governance problems. Therefore, it can be convenient that these types of Organizations have Codes of Good Corporate Governance in order to achieve an optimum attainment of their purposes of general interest and a higher responsibility and efficiency in the administration of the organization. This necessity makes clear especially in Organizations with partnership public-private. In a Code of Good Corporate Governance must deal several aspects, as transparency, accountability, duties and rights of donors and beneficiaries of the foundation, duties fiduciaries of the board members and directors, and enforcement (including options of private enforcement. A las entidades sin ánimo de lucro como, señaladamente las fundaciones, también se debe extender la noción de gobierno corporativo. En este sentido, resulta conveniente que las propias entidades se doten de instrumentos internos como puede ser un código de buen gobierno en aras de lograr una óptima consecución de los fines de interés general y una mayor responsabilidad y eficiencia en la administración de la entidad. Esta necesidad se acrecienta en las fundaciones por medio de las cuales se plasma la colaboración público-privada. En un código de esta naturaleza deben tratarse diversos aspectos, entre los que cabe destacar los mecanismos para lograr un mayor transparencia informativa y un mayor control de la fundación, así como la posición jurídica de los colaboradores, beneficiarios y donantes de la fundación. Igualmente, deben abordarse con rigor y profundidad los deberes de los miembros del Patronato, así como de los órganos directivos de la fundación. Asimismo, deben establecerse medidas para conseguir un adecuado cumplimiento de las disposiciones del código de buen gobierno. DOWNLOAD THIS PAPER FROM SSRN: http://ssrn.com/abstract=2043112

  13. Challenge: Code of environmental law; Herausforderung Umweltgesetzbuch

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-15

    Within the meeting ''Challenge: Code of environmental law'' at 16th February, 2007, in Berlin (Federal Republic of Germany) and organized by the Federal Ministry for the Environment, Nature Conservation and Nuclear Safety (Berlin, Federal Republic of Germany), the following lectures were held: (a) the new code of environmental law as a contribution to more modernness and efficiency in the environmental politics (Sigmar Gabriel); (b) The code of environmental law from the view of the economy (Martin Wansleben); (c) Significance of the code of environmental law from the view of jurisprudence (Michael Kloepfer); (d) Targets, content and utility of the code of environmental law: Summary of the panel discussion (Tanja Goenner, Klaus Mittelbach, Juergen Resch, Hans-Joachim Koch, Alfred Wirtz, Andreas Troge (moderator)); (e) Considerations to the coding of water law in the code of environmental law (Helge Wendenburg); (f) Considerations to the coding of water law: Summary of te discussion; (g) Considerations to the coding of nature conservation law (Jochen Flasbarth); (h) Considerations to the coding of nature conservation law: Summary of the discussion.

  14. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  15. Chinese remainder codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Aili; LIU Xiufeng

    2006-01-01

    Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory.The new type of linear codes take the congruence class in the congruence class ring R/I1 ∩ I2 ∩…∩ In for the information bit,embed R/Ji into R/I1 ∩ I2 ∩…∩ In,and assign the cosets of R/Ji as the subring of R/I1 ∩ I2 ∩…∩ In and the cosets of R/Ji in R/I1 ∩ I2 ∩…∩ In as check lines.Many code classes exist in the Chinese remainder codes that have high code rates.Chinese remainder codes are the essential generalization of Sun Zi codes.

  16. Chinese Remainder Codes

    Institute of Scientific and Technical Information of China (English)

    张爱丽; 刘秀峰; 靳蕃

    2004-01-01

    Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I1∩I2∩…∩In for the information bit, embed R/Ji into R/I1∩I2∩…∩In, and asssign the cosets of R/Ji as the subring of R/I1∩I2∩…∩In and the cosets of R/Ji in R/I1∩I2∩…∩In as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes.

  17. Accurate discrimination of conserved coding and non-coding regions through multiple indicators of evolutionary dynamics

    Directory of Open Access Journals (Sweden)

    Pesole Graziano

    2009-09-01

    Full Text Available Abstract Background The conservation of sequences between related genomes has long been recognised as an indication of functional significance and recognition of sequence homology is one of the principal approaches used in the annotation of newly sequenced genomes. In the context of recent findings that the number non-coding transcripts in higher organisms is likely to be much higher than previously imagined, discrimination between conserved coding and non-coding sequences is a topic of considerable interest. Additionally, it should be considered desirable to discriminate between coding and non-coding conserved sequences without recourse to the use of sequence similarity searches of protein databases as such approaches exclude the identification of novel conserved proteins without characterized homologs and may be influenced by the presence in databases of sequences which are erroneously annotated as coding. Results Here we present a machine learning-based approach for the discrimination of conserved coding sequences. Our method calculates various statistics related to the evolutionary dynamics of two aligned sequences. These features are considered by a Support Vector Machine which designates the alignment coding or non-coding with an associated probability score. Conclusion We show that our approach is both sensitive and accurate with respect to comparable methods and illustrate several situations in which it may be applied, including the identification of conserved coding regions in genome sequences and the discrimination of coding from non-coding cDNA sequences.

  18. Professional C++

    CERN Document Server

    Gregoire, Marc

    2014-01-01

    Master complex C++ programming with this helpful, in-depth resource From game programming to major commercial software applications, C++ is the language of choice. It is also one of the most difficult programming languages to master. While most competing books are geared toward beginners, Professional C++, Third Edition, shows experienced developers how to master the latest release of C++, explaining little known features with detailed code examples users can plug into their own codes. More advanced language features and programming techniques are presented in this newest edition of the book,

  19. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions.......We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when...

  20. On Polynomial Remainder Codes

    CERN Document Server

    Yu, Jiun-Hung

    2012-01-01

    Polynomial remainder codes are a large class of codes derived from the Chinese remainder theorem that includes Reed-Solomon codes as a special case. In this paper, we revisit these codes and study them more carefully than in previous work. We explicitly allow the code symbols to be polynomials of different degrees, which leads to two different notions of weight and distance. Algebraic decoding is studied in detail. If the moduli are not irreducible, the notion of an error locator polynomial is replaced by an error factor polynomial. We then obtain a collection of gcd-based decoding algorithms, some of which are not quite standard even when specialized to Reed-Solomon codes.

  1. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation......Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...

  2. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  3. Security of QR Codes

    OpenAIRE

    Kapsalis, Ioannis

    2013-01-01

    The 2-dimensional barcodes known as QR (Quick Response) Codesare increasing their popularity as they appear in more places in theurban environment. QR Codes can be considered as physical hyper-linksthat give the ability to users to access, through their mobile devicesthat are able to scan QR Codes, additional information located in aweb-page. Apart from marketing, QR Codes have been also adopted indifferent areas such as the on-line payments. This development alongwith the trend that some of ...

  4. Practices in Code Discoverability

    OpenAIRE

    Teuben, Peter; Allen, Alice; Nemiroff, Robert J.; Shamir, Lior

    2012-01-01

    Much of scientific progress now hinges on the reliability, falsifiability and reproducibility of computer source codes. Astrophysics in particular is a discipline that today leads other sciences in making useful scientific components freely available online, including data, abstracts, preprints, and fully published papers, yet even today many astrophysics source codes remain hidden from public view. We review the importance and history of source codes in astrophysics and previous efforts to d...

  5. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  6. Progressive fractal coding

    OpenAIRE

    Kopilovic, Ivan; Saupe, Dietmar; Hamzaoui, Raouf

    2001-01-01

    Progressive coding is an important feature of compression schemes. Wavelet coders are well suited for this purpose because the wavelet coefficients can be naturally ordered according to decreasing importance. Progressive fractal coding is feasible, but it was proposed only for hybrid fractal-wavelet schemes. We introduce a progressive fractal image coder in the spatial domain. A Lagrange optimization based on rate-distortion performance estimates determines an optimal ordering of the code bit...

  7. Tokamak Systems Code

    International Nuclear Information System (INIS)

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  8. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  9. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  10. Dosimetry analysis of distributions radials dose profiles of {sup 90}Sr + {sup 90}Y beta therapy applicators using the MCNP-4C code and radio chromium films; Analise dosimetrica de perfis de distribuicoes radias de doses relativas de um aplicador de betaterapia de {sup 90}Sr + {sup 90}Y utilizando o codigo MCNP-4C e filmes radiocromicos

    Energy Technology Data Exchange (ETDEWEB)

    Coelho, Talita S.; Yoriyaz, Helio [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil); Fernandes, Marco A.R., E-mail: tasallesc@gmail.co [UNESP, Botucatu, SP (Brazil). Faculdade de Medicina. Servico de Radioterapia; Louzada, Mario J.Q. [UNESP, Aracatuba, SP (Brazil). Curso de Medicina Veterinaria

    2011-07-01

    Although they are no longer manufactured, the applicators of {sup 90}Sr + {sup 90}Y acquired in the decades of 1990 are still in use, by having half-life of 28.5 years. These applicators have calibration certificate given by their manufacturers, where few have been re calibrated. Thus it becomes necessary to accomplish thorough dosimetry of these applicators. This paper presents a dosimetric analysis distribution radial dose profiles for emitted by an {sup 90}Sr + {sup 90}Y beta therapy applicator, using the MCNP-4C code to simulate the distribution radial dose profiles and radio chromium films to get them experimentally . The results with the simulated values were compared with the results of experimental measurements, where both curves show similar behavior, which may validate the use of MCNP-4C and radio chromium films for this type of dosimetry. (author)

  11. Dosimetry analysis of distribution radial dose profiles of {sup 90}Sr + {sup 90}Y beta therapy applicators using the MCNP-4C code and radio chromium films; Analise dosimetrica de perfis de distribuicoes radiais de doses relativas de um aplicador de betaterapia de {sup 90}Sr + {sup 90}Y utilizando o codigo MCNP-4C e filmes radiocromicos

    Energy Technology Data Exchange (ETDEWEB)

    Coelho, T.S.; Yoriyaz, H. [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil); Fernandes, M.A.R. [Universidade Estadual Paulista Julio de Mesquita Filho (UNESP), Botucatu, SP (Brazil). Fac. de Medicina. Servico de Radioterapia; Louzada, M.J.Q. [Universidade Estadual Paulista Julio de Mesquita Filho (UNESP), Aracatuba, SP (Brazil). Curso de Medicina Veterinaria

    2010-07-01

    Although they are no longer manufactured, the applicators of {sup 90}Sr +{sup 90}Y acquired in the decades of 1990 are still in use, by having half-life of 28.5 years. These applicators have calibration certificate given by their manufacturers, where few have been recalibrated. Thus it becomes necessary to accomplish thorough dosimetry of these applicators. This paper presents a dosimetric analysis distribution radial dose profiles for emitted by an {sup 90}Sr+{sup 90}Y beta therapy applicator, using the MCNP-4C code to simulate the distribution radial dose profiles and radiochromium films to get them experimentally . The results with the simulated values were compared with the results of experimental measurements, where both curves show similar behavior, which may validate the use of MCNP-4C and radiochromium films for this type of dosimetry. (author)

  12. Deuterons at energies of 10 MeV to 1 TeV: Conversion coefficients for fluence-to-absorbed dose, equivalent dose, effective dose and gray equivalent, calculated using Monte Carlo radiation transport code MCNPX 2.7.C

    International Nuclear Information System (INIS)

    Conversion coefficients were calculated for fluence-to-absorbed dose, fluence-to-equivalent dose, fluence-to-effective dose and fluence-to-gray equivalent for isotropic exposure of an adult female and an adult male to deuterons (2H+) in the energy range 10 MeV-1 TeV (0.01-1000 GeV). Coefficients were calculated using the Monte Carlo transport code MCNPX 2.7.C and BodyBuilderTM 1.3 anthropomorphic phantoms. Phantoms were modified to allow calculation of the effective dose to a Reference Person using tissues and tissue weighting factors from 1990 and 2007 recommendations of the International Commission on Radiological Protection (ICRP) and gray equivalent to selected tissues as recommended by the National Council on Radiation Protection and Measurements. Coefficients for the equivalent and effective dose incorporated a radiation weighting factor of 2. At 15 of 19 energies for which coefficients for the effective dose were calculated, coefficients based on ICRP 1990 and 2007 recommendations differed by < 3 %. The greatest difference, 47 %, occurred at 30 MeV. (authors)

  13. Helions at energies of 10 MeV to 1 TeV: Conversion coefficients for fluence-to-absorbed dose, equivalent dose, effective dose and gray equivalent, calculated using Monte Carlo radiation transport code MCNPX 2.7.C

    International Nuclear Information System (INIS)

    Conversion coefficients were calculated for fluence-to-absorbed dose, fluence-to-equivalent dose, fluence-to-effective dose and fluence-to-gray equivalent, for isotropic exposure of an adult male and an adult female to helions (3He2+) in the energy range of 10 MeV to 1 TeV (0.01-1000 GeV). Calculations were performed using Monte Carlo transport code MCNPX 2.7.C and BodyBuilderTM 1.3 anthropomorphic phantoms modified to allow calculation of effective dose using tissues and tissue weighting factors from either the 1990 or 2007 recommendations of the International Commission on Radiological Protection (ICRP), and gray equivalent to selected tissues as recommended by the National Council on Radiation Protection and Measurements. At 15 of the 19 energies for which coefficients for effective dose were calculated, coefficients based on ICRP 2007 and 1990 recommendations differed by less than 2%. The greatest difference, 62%, occurred at 100 MeV. Published by Oxford Univ. Press on behalf of the U.S. Government 2010. (authors)

  14. Tritons at energies of 10 MeV to 1 TeV: Conversion coefficients for fluence-to-absorbed dose, equivalent dose, effective dose, and gray equivalent, calculated using Monte Carlo radiation transport code MCNPX 2.7.C

    International Nuclear Information System (INIS)

    Conversion coefficients were calculated for fluence-to-absorbed dose, fluence-to-equivalent dose, fluence-to-effective dose and fluence-to-gray equivalent for isotropic exposure of an adult female and an adult male to tritons (3H+) in the energy range of 10 MeV to 1 TeV (0.01-1000 GeV). Coefficients were calculated using Monte Carlo transport code MCNPX 2.7.C and BodyBuilderTM 1.3 anthropomorphic phantoms. Phantoms were modified to allow calculation of effective dose to a Reference Person using tissues and tissue weighting factors from 1990 and 2007 recommendations of the International Commission on Radiological Protection (ICRP) and calculation of gray equivalent to selected tissues as recommended by the National Council on Radiation Protection and Measurements. At 15 of the 19 energies for which coefficients for effective dose were calculated, coefficients based on ICRP 2007 and 1990 recommendations differed by less than 3%. The greatest difference, 43%, occurred at 30 MeV. Published by Oxford Univ. Press on behalf of the US Government 2010. (authors)

  15. Research on universal combinatorial coding.

    Science.gov (United States)

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value.

  16. Code Generation = A* + BURS

    NARCIS (Netherlands)

    Nymeyer, A.; Katoen, J.P.; Westra, Y.; Alblas, H.; Gyimóthy, T.

    1996-01-01

    A system called BURS that is based on term rewrite systems and a search algorithm A* are combined to produce a code generator that generates optimal code. The theory underlying BURS is re-developed, formalised and explained in this work. The search algorithm uses a cost heuristic that is derived fro

  17. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alex

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  18. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  19. Codes of Conduct

    Science.gov (United States)

    Million, June

    2004-01-01

    Most schools have a code of conduct, pledge, or behavioral standards, set by the district or school board with the school community. In this article, the author features some schools that created a new vision of instilling code of conducts to students based on work quality, respect, safety and courtesy. She suggests that communicating the code…

  20. Code A1 Revised

    CERN Multimedia

    SC Secretariat

    2004-01-01

    Please note that the revised safety code A1 entitled 'MEDICAL CODE' is available on the web at the following url: https://edms.cern.ch/document/335476/last_released Paper copies can also be obtained from the SC Secretariat, e-mail : sc.secretariat@cern.ch SC Secretariat

  1. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  2. Computerized mega code recording.

    Science.gov (United States)

    Burt, T W; Bock, H C

    1988-04-01

    A system has been developed to facilitate recording of advanced cardiac life support mega code testing scenarios. By scanning a paper "keyboard" using a bar code wand attached to a portable microcomputer, the person assigned to record the scenario can easily generate an accurate, complete, timed, and typewritten record of the given situations and the obtained responses. PMID:3354937

  3. READING A NEURAL CODE

    NARCIS (Netherlands)

    BIALEK, W; RIEKE, F; VANSTEVENINCK, RRD; WARLAND, D

    1991-01-01

    Traditional approaches to neural coding characterize the encoding of known stimuli in average neural responses. Organisms face nearly the opposite task - extracting information about an unknown time-dependent stimulus from short segments of a spike train. Here the neural code was characterized from

  4. AZIMUT code abstract

    International Nuclear Information System (INIS)

    The brief description of the AZIMUT code for calculation the neutron flux in a cluster cell is presented. Code takes into account 1 and 2 azimuthal harmonics in the one-group P3-approximation and uses the heterogeneous approach. 2 refs

  5. Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Berriman, Bruce; Hanisch, Robert J; Mink, Jessica; Teuben, Peter J

    2012-01-01

    The Astrophysics Source Code Library (ASCL), founded in 1999, is a free on-line registry for source codes of interest to astronomers and astrophysicists. The library is housed on the discussion forum for Astronomy Picture of the Day (APOD) and can be accessed at http://ascl.net. The ASCL has a comprehensive listing that covers a significant number of the astrophysics source codes used to generate results published in or submitted to refereed journals and continues to grow. The ASCL currently has entries for over 500 codes; its records are citable and are indexed by ADS. The editors of the ASCL and members of its Advisory Committee were on hand at a demonstration table in the ADASS poster room to present the ASCL, accept code submissions, show how the ASCL is starting to be used by the astrophysics community, and take questions on and suggestions for improving the resource.

  6. Fracture flow code

    International Nuclear Information System (INIS)

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  7. Combustion chamber analysis code

    Science.gov (United States)

    Przekwas, A. J.; Lai, Y. G.; Krishnan, A.; Avva, R. K.; Giridharan, M. G.

    1993-05-01

    A three-dimensional, time dependent, Favre averaged, finite volume Navier-Stokes code has been developed to model compressible and incompressible flows (with and without chemical reactions) in liquid rocket engines. The code has a non-staggered formulation with generalized body-fitted-coordinates (BFC) capability. Higher order differencing methodologies such as MUSCL and Osher-Chakravarthy schemes are available. Turbulent flows can be modeled using any of the five turbulent models present in the code. A two-phase, two-liquid, Lagrangian spray model has been incorporated into the code. Chemical equilibrium and finite rate reaction models are available to model chemically reacting flows. The discrete ordinate method is used to model effects of thermal radiation. The code has been validated extensively against benchmark experimental data and has been applied to model flows in several propulsion system components of the SSME and the STME.

  8. Transformation invariant sparse coding

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard

    2011-01-01

    Sparse coding is a well established principle for unsupervised learning. Traditionally, features are extracted in sparse coding in specific locations, however, often we would prefer invariant representation. This paper introduces a general transformation invariant sparse coding (TISC) model....... The model decomposes images into features invariant to location and general transformation by a set of specified operators as well as a sparse coding matrix indicating where and to what degree in the original image these features are present. The TISC model is in general overcomplete and we therefore invoke...... sparse coding to estimate its parameters. We demonstrate how the model can correctly identify components of non-trivial artificial as well as real image data. Thus, the model is capable of reducing feature redundancies in terms of pre-specified transformations improving the component identification....

  9. A Goppa-like bound on the trellis state complexity of algebraic geometric codes

    OpenAIRE

    Munuera, Carlos; Torres, Fernando

    2002-01-01

    For a linear code $\\cC$ of length $n$ and dimension $k$, Wolf noticed that the trellis state complexity $s(\\cC)$ of $\\cC$ is upper bounded by $w(\\cC):=\\min(k,n-k)$. In this paper we point out some new lower bounds for $s(\\cC)$. In particular, if $\\cC$ is an Algebraic Geometric code, then $s(\\cC)\\geq w(\\cC)-(g-a)$, where $g$ is the genus of the underlying curve and $a$ is the abundance of the code.

  10. On Codes with w-identifiable Parent Property

    Institute of Scientific and Technical Information of China (English)

    MA Jun; XIONG Yu

    2008-01-01

    A code is said to be a w-identifiable parent property code (or w-IPP code for short) if whenever d is a descendant of w (or fewer) codewords, and one can always identify at least one of the parents of d. Let C be an (N, w + 1, q)-code and C* an (w + 1)-color graph for C. If a graph G is a subgraph of C* and consists of w + 1 edges with different colors, then G is called a (w + 1)-pattern of C*. In this paper, we proved that C is a w-IPP code if and only if there exists at most one vertex with color degree more than 1 in any (w + 1)-pattern of C*.

  11. Modelling of HTR (High Temperature Reactor Pebble-Bed 10 MW to Determine Criticality as A Variations of Enrichment and Radius of the Fuel (Kernel With the Monte Carlo Code MCNP4C

    Directory of Open Access Journals (Sweden)

    Hammam Oktajianto

    2014-12-01

    Full Text Available Gas-cooled nuclear reactor is a Generation IV reactor which has been receiving significant attention due to many desired characteristics such as inherent safety, modularity, relatively low cost, short construction period, and easy financing. High temperature reactor (HTR pebble-bed as one of type of gas-cooled reactor concept is getting attention. In HTR pebble-bed design, radius and enrichment of the fuel kernel are the key parameter that can be chosen freely to determine the desired value of criticality. This paper models HTR pebble-bed 10 MW and determines an effective of enrichment and radius of the fuel (Kernel to get criticality value of reactor. The TRISO particle coated fuel particle which was modelled explicitly and distributed in the fuelled region of the fuel pebbles using a Simple-Cubic (SC lattice. The pebble-bed balls and moderator balls distributed in the core zone using a Body-Centred Cubic lattice with assumption of a fresh fuel by the fuel enrichment was 7-17% at 1% range and the size of the fuel radius was 175-300 µm at 25 µm ranges. The geometrical model of the full reactor is obtained by using lattice and universe facilities provided by MCNP4C. The details of model are discussed with necessary simplifications. Criticality calculations were conducted by Monte Carlo transport code MCNP4C and continuous energy nuclear data library ENDF/B-VI. From calculation results can be concluded that an effective of enrichment and radius of fuel (Kernel to achieve a critical condition was the enrichment of 15-17% at a radius of 200 µm, the enrichment of 13-17% at a radius of 225 µm, the enrichments of 12-15% at radius of 250 µm, the enrichments of 11-14% at a radius of 275 µm and the enrichment of 10-13% at a radius of 300 µm, so that the effective of enrichments and radii of fuel (Kernel can be considered in the HTR 10 MW. Keywords—MCNP4C, HTR, enrichment, radius, criticality 

  12. Code generation of RHIC accelerator device objects

    International Nuclear Information System (INIS)

    A RHIC Accelerator Device Object is an abstraction which provides a software view of a collection of collider control points known as parameters. A grammar has been defined which allows these parameters, along with code describing methods for acquiring and modifying them, to be specified efficiently in compact definition files. These definition files are processed to produce C++ source code. This source code is compiled to produce an object file which can be loaded into a front end computer. Each loaded object serves as an Accelerator Device Object class definition. The collider will be controlled by applications which set and get the parameters in instances of these classes using a suite of interface routines. Significant features of the grammar are described with details about the generated C++ code

  13. Novel overlapping coding sequences in Chlamydia trachomatis

    DEFF Research Database (Denmark)

    Jensen, Klaus Thorleif; Petersen, Lise; Falk, Søren;

    2006-01-01

    Chlamydia trachomatis is the aetiological agent of trachoma and sexually transmitted infections. The C. trachomatis genome sequence revealed an organism adapted to the intracellular habitat with a high coding ratio and a small genome consisting of 1.042-kilobase (kb) with 895 annotated protein...... coding genes. Here, we repredict the protein-coding genes of the C. trachomatis genome using the gene-finder EasyGene that was trained specifically for C. trachomatis, and compare it with the primary C. trachomatis annotation. Our work predicts 15 genes not listed in the primary annotation and 853...... that are in agreement with the primary annotation. Forty two genes from the primary annotation are not predicted by EasyGene. The majority of these genes are listed as hypothetical in the primary annotation. The 15 novel predicted genes all overlap with genes on the complementary strand. We find homologues of several...

  14. Application of RS Codes in Decoding QR Code

    Institute of Scientific and Technical Information of China (English)

    Zhu Suxia(朱素霞); Ji Zhenzhou; Cao Zhiyan

    2003-01-01

    The QR Code is a 2-dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code's virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm.

  15. Computer Security: is your code sane?

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    How many of us write code? Software? Programs? Scripts? How many of us are properly trained in this and how well do we do it? Do we write functional, clean and correct code, without flaws, bugs and vulnerabilities*? In other words: are our codes sane?   Figuring out weaknesses is not that easy (see our quiz in an earlier Bulletin article). Therefore, in order to improve the sanity of your code, prevent common pit-falls, and avoid the bugs and vulnerabilities that can crash your code, or – worse – that can be misused and exploited by attackers, the CERN Computer Security team has reviewed its recommendations for checking the security compliance of your code. “Static Code Analysers” are stand-alone programs that can be run on top of your software stack, regardless of whether it uses Java, C/C++, Perl, PHP, Python, etc. These analysers identify weaknesses and inconsistencies including: employing undeclared variables; expressions resu...

  16. Report number codes

    International Nuclear Information System (INIS)

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  17. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity in the net...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof.......Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...

  18. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  19. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  20. FORIST unfolding code

    International Nuclear Information System (INIS)

    The FERDOR method is widely used to unfold neutron energy spectra from pulse-height distributions measured with NE-213 spectrometers. Two unfolding codes COOLC (developed at ORNL) and FORIST (modified version of COOLC developed at UIUC) implement the FERDOR method and are distributed by RSIC. Each code package contains an NE-213 response matrix, sample input data, and sample output. The smoothing (window) widths which are distributed with COOLC are not the most appropriate for all neutron spectrum measurements. The FORIST code determines an optimum set of window widths according to the desired statistical error in the smoothed spectrum

  1. Classical Holographic Codes

    CERN Document Server

    Brehm, Enrico M

    2016-01-01

    In this work, we introduce classical holographic codes. These can be understood as concatenated probabilistic codes and can be represented as networks uniformly covering hyperbolic space. In particular, classical holographic codes can be interpreted as maps from bulk degrees of freedom to boundary degrees of freedom. Interestingly, they are shown to exhibit features similar to those expected from the AdS/CFT correspondence. Among these are a version of the Ryu-Takayanagi formula and intriguing properties regarding bulk reconstruction and boundary representations of bulk operations. We discuss the relation of our findings with expectations from AdS/CFT and, in particular, with recent results from quantum error correction.

  2. Distributed multiple description coding

    CERN Document Server

    Bai, Huihui; Zhao, Yao

    2011-01-01

    This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC,

  3. Laser propagation code study

    OpenAIRE

    Rockower, Edward B.

    1985-01-01

    A number of laser propagation codes have been assessed as to their suitability for modeling Army High Energy Laser (HEL) weapons used in an anti- sensor mode. We identify a number of areas in which systems analysis HEL codes are deficient. Most notably, available HEL scaling law codes model the laser aperture as circular, possibly with a fixed (e.g. 10%) obscuration. However, most HELs have rectangular apertures with up to 30% obscuration. We present a beam-quality/aperture shape scaling rela...

  4. Extended calculations of OECD/NEA phase II-C burnup credit criticality benchmark problem for PWR spent fuel transport cask by using MCNP-4B2 code and JENDL-3.2 library

    Energy Technology Data Exchange (ETDEWEB)

    Kuroishi, Takeshi; Hoang, Anh Tuan; Nomura, Yasushi; Okuno, Hiroshi [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    2003-03-01

    The reactivity effect of the asymmetry of axial burnup profile in burnup credit criticality safety is studied for a realistic PWR spent fuel transport cask proposed in the current OECD/NEA Phase II-C benchmark problem. The axial burnup profiles are simulated in 21 material zones based on in-core flux measurements varying from strong asymmetry to more or less no asymmetry. Criticality calculations in a 3-D model have been performed using the continuous energy Monte Carlo code MCNP-4B2 and the nuclear data library JENDL-3.2. Calculation conditions are determined with consideration of the axial fission source convergence. Calculations are carried out not only for cases proposed in the benchmark but also for additional cases assuming symmetric burnup profile. The actinide-only approach supposed for first domestic introduction of burnup credit into criticality evaluation is also considered in addition to the actinide plus fission product approach adopted in the benchmark. The calculated results show that k{sub eff} and the end effect increase almost linearly with increasing burnup axial offset that is defined as one of typical parameters showing the intensity of axial burnup asymmetry. The end effect is more sensitive to the asymmetry of burnup profile for the higher burnup. For an axially distributed burnup, the axial fission source distribution becomes strongly asymmetric as its peak shifts toward the top end of the fuel's active zone where the local burnup is less than that of the bottom end. The peak of fission source distribution becomes higher with the increase of either the asymmetry of burnup profile or the assembly-averaged burnup. The conservatism of the assumption of uniform axial burnup based on the actinide-only approach is estimated quantitatively in comparison with the k{sub eff} result calculated with experiment-based strongest asymmetric axial burnup profile with the actinide plus fission product approach. (author)

  5. Los códigos de buen gobierno corporativo en las entidades sin ánimo de lucro: en especial en las fundaciones (Codes of good corporate governance in non-profit organizations: especially in foundations)

    OpenAIRE

    Belén García Álvarez

    2012-01-01

    Non-Profit Organizations must deal too with corporate governance problems. Therefore, it can be convenient that these types of Organizations have Codes of Good Corporate Governance in order to achieve an optimum attainment of their purposes of general interest and a higher responsibility and efficiency in the administration of the organization. This necessity makes clear especially in Organizations with partnership public-private. In a Code of Good Corporate Governance must deal several aspec...

  6. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  7. Der Code der Transparenz

    OpenAIRE

    Alloa, Emmanuel

    2015-01-01

    In allen Bereichen der Gesellschaft werden gegenwärtig Forderungen nach mehr Transparenz laut. Was steht hinter diesem Wort? Für Emmanuel Alloa wohnt der Transparenzforderung die Paradoxie inne, ein "codefreier Code" sein zu wollen.

  8. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  9. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  10. Secure Fractal Image Coding

    OpenAIRE

    Lian, Shiguo

    2007-01-01

    In recent work, various fractal image coding methods are reported, which adopt the self-similarity of images to compress the size of images. However, till now, no solutions for the security of fractal encoded images have been provided. In this paper, a secure fractal image coding scheme is proposed and evaluated, which encrypts some of the fractal parameters during fractal encoding, and thus, produces the encrypted and encoded image. The encrypted image can only be recovered by the correct ke...

  11. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  12. Coding of auditory space

    OpenAIRE

    Konishi­, Masakazu

    2003-01-01

    Behavioral, anatomical, and physiological approaches can be integrated in the study of sound localization in barn owls. Space representation in owls provides a useful example for discussion of place and ensemble coding. Selectivity for space is broad and ambiguous in low-order neurons. Parallel pathways for binaural cues and for different frequency bands converge on high-order space-specific neurons, which encode space more precisely. An ensemble of broadly tuned place-coding neurons may conv...

  13. The article 583 bis of the Criminal Code: an illicit committed in the name of religion? - L’article n° 583 bis du Code Pénal : un acte illicite commis au nom de la réligion? - L’articolo 583 bis c.p. un illecito compiuto in nome della religione?

    Directory of Open Access Journals (Sweden)

    Colombo C.

    2009-08-01

    Full Text Available Mutilations of female genital organs are a particularly difficult issue. That is the reason why it occupies historical, anthropological and medico-legal research. So the present article considers the situation in all these aspects together with the provisions introduced by Law n. 7, 9/1/2006 and article 583 bis of the Criminal Code for the Protection of the rights of women being mutilated.Indeed we believe that the mutilations are real and cause personal psychic injury. The custom of mutilation has nothing to do with religious beliefs, but is the product of old social prejudices against women, as an individual.La MGF (mutilation génitale féminine est un sujet de société tristement actuel dont on dit qu'elle est pratiquée au nom des croyances religieuses les plus ancestrales.C’est la raison pour laquelle j’ai voulu avant tout consulter, bien que brièvement, l'analyse anthropologique, historique, médico-légale et juridique effectuée sur cet argument pour me pencher ensuite sur la loi italienne n° 7 du 9/1/2006 et sur l’article n° 583bis du Code Pénal Italien, ayant trait à la sauvegarde des droits inaliénables de la femme qui subit une mutilation.En effet les mutilations sont de véritables lésions physiques et souffrances psychiques qui plus que motivées par des croyances religieuses sont dictées par d'anciens us et coutumes combles de préjugés sociaux envers la femme en tant qu’individu.Le mutilazioni degli organi genitali femminili rappresentano un tema tristemente attuale legato per “comodità” alle credenze religiose più arcaiche.Per questo motivo, l’articolo ha voluto, da subito, volgere uno sguardo, seppur breve, all’analisi antropologica, storica e medico-giuridica dell’argomento per poi considerare la legge n. 7 del 9/1/2006 (che ha attuato i principi della Dichiarazione e del Programma della IV Conferenza mondiale dell’ONU sulle donne - Pechino 1995, nonché le disposizioni degli artt. 2,3,32 della

  14. KENO-V code

    International Nuclear Information System (INIS)

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  15. Accumulative Landings System Code Tables

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Code Tables Used In Landings System. These tables assign meanings to the codes that appear in the data tables. Code tables exist for species, gear, state, county,...

  16. Code Formal Verification of Operation System

    Directory of Open Access Journals (Sweden)

    Yu Zhang

    2010-12-01

    Full Text Available with the increasing pressure on non-function attributes (security, safety and reliability requirements of an operation system, high–confidence operation system is becoming more important. Formal verification is the only known way to guarantee that a system is free of programming errors. We research on formal verification of operation system kernel in system code level and take theorem proving and model checking as the main technical methods to resolve the key techniques of verifying operation system kernel in C code level. We present a case study to the verification of real-world C systems code derived from an implementation of μC/OS – II in the end.

  17. Computer aided power flow software engineering and code generation

    Energy Technology Data Exchange (ETDEWEB)

    Bacher, R. [Swiss Federal Inst. of Tech., Zuerich (Switzerland)

    1996-02-01

    In this paper a software engineering concept is described which permits the automatic solution of a non-linear set of network equations. The power flow equation set can be seen as a defined subset of a network equation set. The automated solution process is the numerical Newton-Raphson solution process of the power flow equations where the key code parts are the numeric mismatch and the numeric Jacobian term computation. It is shown that both the Jacobian and the mismatch term source code can be automatically generated in a conventional language such as Fortran or C. Thereby one starts from a high level, symbolic language with automatic differentiation and code generation facilities. As a result of this software engineering process an efficient, very high quality newton-Raphson solution code is generated which allows easier implementation of network equation model enhancements and easier code maintenance as compared to hand-coded Fortran or C code.

  18. Computer aided power flow software engineering and code generation

    Energy Technology Data Exchange (ETDEWEB)

    Bacher, R. [Swiss Federal Inst. of Tech., Zuerich (Switzerland)

    1995-12-31

    In this paper a software engineering concept is described which permits the automatic solution of a non-linear set of network equations. The power flow equation set can be seen as a defined subset of a network equation set. The automated solution process is the numerical Newton-Raphson solution process of the power flow equations where the key code parts are the numeric mismatch and the numeric Jacobian term computation. It is shown that both the Jacobian and the mismatch term source code can be automatically generated in a conventional language such as Fortran or C. Thereby one starts from a high level, symbolic language with automatic differentiation and code generation facilities. As a result of this software engineering process an efficient, very high quality Newton-Raphson solution code is generated which allows easier implementation of network equation model enhancements and easier code maintenance as compared to hand-coded Fortran or C code.

  19. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes.......Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  20. Algebraic geometric codes with applications

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2007-01-01

    The theory of linear error-correcting codes from algebraic geomet-ric curves (algebraic geometric (AG) codes or geometric Goppa codes) has been well-developed since the work of Goppa and Tsfasman, Vladut, and Zink in 1981-1982. In this paper we introduce to readers some recent progress in algebraic geometric codes and their applications in quantum error-correcting codes, secure multi-party computation and the construction of good binary codes.

  1. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  2. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    that are subcodes of the binary Reed-Muller codes and can be very simply instrumented, 3) a new class of constacyclic codes that are subcodes of thep-ary "Reed-Muller codes," 4) two new classes of binary convolutional codes with large "free distance" derived from known binary cyclic codes, 5) two new classes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm....

  3. Classifying Coding DNA with Nucleotide Statistics

    Directory of Open Access Journals (Sweden)

    Nicolas Carels

    2009-10-01

    Full Text Available In this report, we compared the success rate of classification of coding sequences (CDS vs. introns by Codon Structure Factor (CSF and by a method that we called Universal Feature Method (UFM. UFM is based on the scoring of purine bias (Rrr and stop codon frequency. We show that the success rate of CDS/intron classification by UFM is higher than by CSF. UFM classifies ORFs as coding or non-coding through a score based on (i the stop codon distribution, (ii the product of purine probabilities in the three positions of nucleotide triplets, (iii the product of Cytosine (C, Guanine (G, and Adenine (A probabilities in the 1st, 2nd, and 3rd positions of triplets, respectively, (iv the probabilities of G in 1st and 2nd position of triplets and (v the distance of their GC3 vs. GC2 levels to the regression line of the universal correlation. More than 80% of CDSs (true positives of Homo sapiens (>250 bp, Drosophila melanogaster (>250 bp and Arabidopsis thaliana (>200 bp are successfully classified with a false positive rate lower or equal to 5%. The method releases coding sequences in their coding strand and coding frame, which allows their automatic translation into protein sequences with 95% confidence. The method is a natural consequence of the compositional bias of nucleotides in coding sequences.

  4. Error coding simulations

    Science.gov (United States)

    Noble, Viveca K.

    1993-01-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  5. Physical Layer Network Coding

    CERN Document Server

    Shengli, Zhang; Lam, Patrick P K

    2007-01-01

    A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to straightforward network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM) waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increase...

  6. Nested Quantum Error Correction Codes

    CERN Document Server

    Wang, Zhuo; Fan, Hen; Vedral, Vlatko

    2009-01-01

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  7. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes and...

  8. Phase-coded pulse aperiodic transmitter coding

    Directory of Open Access Journals (Sweden)

    I. I. Virtanen

    2009-07-01

    Full Text Available Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC, whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF. When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers – about seven milliseconds – whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  9. Analysis on Application of Turbo Product Code in UAV TT&C System%Turbo乘积码在无人机测控技术中的应用分析

    Institute of Scientific and Technical Information of China (English)

    周侃; 金松坡

    2012-01-01

    Turbo乘积码是一种易于硬件实现的分组码,具有延时短和纠错性能好等优越性。通过对Turbo乘积码Chase软输出改进算法的分析和仿真,得出了不同码率和测试序列个数等参数对Turbo乘积码译码性能的影响。结合无人机常用的BPSK测控信号进行了仿真实验,对仿真结果进行了性能分析,验证了Turbo乘积码在无人机测控系统中应用的可行性,并给出了Turbo乘积码在无人机测控领域应用的建议参数。%Turbo product code,as a block code easy to be implemented in hardware,has the advantages of short delay and good error correction performance.By an analysis and simulation of the improved Chase soft-output algorithm for Turbo product code,the effects of parameters such as bit rate and number of test sequences on the performance of Turbo product code decoding are obtained.Simulation experiments are conducted with the BPSK signal typically used by UAV.The analysis of the simulation results verifies the feasibility of applying the Turbo product code in UAV TTC system.Parameters are also proposed for the application of Turbo product code in UAV TTC system.

  10. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  11. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  12. Effect of non-coding RNA AsrC on the intracellular survival of Salmonella enterica serovar Typhi in macrophage%非编码 RNA AsrC 对巨噬细胞中伤寒沙门菌生存能力的影响

    Institute of Scientific and Technical Information of China (English)

    张琪; 杨如月; 徐蓉; 严蓉; 于佳慧; 印赟; 翟培臖; 张盈; 黄新祥

    2015-01-01

    目的:研究伤寒沙门菌非编码 RNA AsrC 对其在巨噬细胞中生存能力的影响及机制。方法:用 AsrC 高表达菌株和空质粒对照株分别感染巨噬细胞12,24 h,检测伤寒沙门菌在感染细胞中的生存能力;qRT-PCR 检测 asrC、rseC、rpoE mRNA 的表达水平;蛋白质印迹检测自噬标志蛋白 LC3的表达。结果:与空质粒对照株相比,AsrC 高表达菌株感染巨噬细胞12,24 h 后在巨噬细胞中的生存能力明显下降(P 均<0.01),asrC mRNA 表达水平增加(P 均<0.05),对侧靶基因 rseC mRNA 的表达水平增高(P 均<0.05),而 rpoE mRNA 的表达水平无明显变化(P >0.05);AsrC高表达菌株自噬标志蛋白 LC3的表达与空质粒对照株间的差异无统计学意义(P >0.05)。结论:伤寒沙门菌非编码RNA AsrC 高表达可降低其在巨噬细胞中的生存能力,可能与自噬无直接关系。%Objective:To investigate the influence of the non-coding RNA AsrC on the intracellular sur-vival of Salmonella enterica serover Typhi in macrophage and its mechanism.Methods:The macrophages intracellular survival assay was performed in AsrC overexpressing strain and the control strain;qRT-PCR was carried out to determine the transcriptional variation of asrC,rseC,rpoE;the expression of LC3 was de-tected by Western blotting.Results:Compared with the control strain,infected in 1 2,24 h,the AsrC in overexpressing strain showed lower intracellular survival in macrophage (both P 0.05);Western blot analysis revealed that the expression of LC3 had no significant difference between AsrC overexpressing strain and the control strain(P >0.05).Conclusion:Overexpression of AsrC might decrease the bacterial intracellular survival in macrophage,which might not be dependent on autophagy.

  13. Aeroacoustic Prediction Codes

    Science.gov (United States)

    Gliebe, P; Mani, R.; Shin, H.; Mitchell, B.; Ashford, G.; Salamah, S.; Connell, S.; Huff, Dennis (Technical Monitor)

    2000-01-01

    This report describes work performed on Contract NAS3-27720AoI 13 as part of the NASA Advanced Subsonic Transport (AST) Noise Reduction Technology effort. Computer codes were developed to provide quantitative prediction, design, and analysis capability for several aircraft engine noise sources. The objective was to provide improved, physics-based tools for exploration of noise-reduction concepts and understanding of experimental results. Methods and codes focused on fan broadband and 'buzz saw' noise and on low-emissions combustor noise and compliment work done by other contractors under the NASA AST program to develop methods and codes for fan harmonic tone noise and jet noise. The methods and codes developed and reported herein employ a wide range of approaches, from the strictly empirical to the completely computational, with some being semiempirical analytical, and/or analytical/computational. Emphasis was on capturing the essential physics while still considering method or code utility as a practical design and analysis tool for everyday engineering use. Codes and prediction models were developed for: (1) an improved empirical correlation model for fan rotor exit flow mean and turbulence properties, for use in predicting broadband noise generated by rotor exit flow turbulence interaction with downstream stator vanes: (2) fan broadband noise models for rotor and stator/turbulence interaction sources including 3D effects, noncompact-source effects. directivity modeling, and extensions to the rotor supersonic tip-speed regime; (3) fan multiple-pure-tone in-duct sound pressure prediction methodology based on computational fluid dynamics (CFD) analysis; and (4) low-emissions combustor prediction methodology and computer code based on CFD and actuator disk theory. In addition. the relative importance of dipole and quadrupole source mechanisms was studied using direct CFD source computation for a simple cascadeigust interaction problem, and an empirical combustor

  14. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  15. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  16. New code match strategy for wideband code division multiple access code tree management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%.

  17. Z2Z4-linear codes: rank and kernel

    CERN Document Server

    Fernandez-Cordoba, Cristina; Villanueva, Merce

    2008-01-01

    A code C is Z2Z4-additive if the set of coordinates can be partitioned into two subsets X and Y such that the punctured code of C by deleting the coordinates outside X (respectively, Y) is a binary linear code (respectively, a quaternary linear code). In this paper, the rank and dimension of the kernel for Z2Z4-linear codes, which are the corresponding binary codes of Z2Z4-additive codes, are studied. The possible values of these two parameters for Z2Z4-linear codes, giving lower and upper bounds, are established. For each possible rank r between these bounds, the construction of a Z2Z4-linear code with rank r is given. Equivalently, for each possible dimension of the kernel k, the construction of a Z2Z4-linear code with dimension of the kernel k is given. Finally, the bounds on the rank, once the kernel dimension is fixed, are established and the construction of a Z2Z4-additive code for each possible pair (r,k) is given.

  18. Comparação do código de ética médica do Brasil e de 11 países Comparison of the code of medical ethics of Brazil with those of eleven countries

    Directory of Open Access Journals (Sweden)

    Jayme Augusto Rocha Vianna

    2006-12-01

    Full Text Available OBJETIVO: Comparar o Código de Ética Médica do Conselho Federal de Medicina do Brasil com códigos de diferentes países com o objetivo de melhorar a compreensão da sua estrutura, contribuindo para o cumprimento de seus objetivos. MÉTODOS: Foram estudados 11 países dos cinco continentes: Argentina, Chile, Canadá, Estados Unidos, Portugal, Reino Unido, África do Sul, Egito, China, Índia e Austrália. As informações foram obtidas na internet, pelo acesso a sites de agências reguladoras e associações médicas. Os códigos foram descritos e comparados segundo informações sobre sua organização elaboradora, abrangência espacial, obrigatoriedade, data de elaboração, organização das orientações, e documentos auxiliares. RESULTADOS: Os códigos de ética médica estudados eram: 59% elaborados pela agência reguladora da medicina de seu país, 92% com abrangência nacional, 67% obrigatórios para todos os médicos e 73% tiveram sua última reelaboração após o ano 2000. Foi observada relação entre a organização elaboradora e a obrigatoriedade e abrangência espacial dos códigos. Foi evidenciada a necessidade de atualização sistemática dos códigos, o que freqüentemente é realizado por meio de documentos auxiliares, entretanto, pode haver dificuldade de conhecimento desse conteúdo. Foi observada a possibilidade de organizar as orientações por tópicos, na forma de pequenos textos para cada tema. CONCLUSÃO: Este estudo apresentou sugestões quanto ao Código de Ética Médica do Brasil: realizar uma revisão e atualização do código; organizar suas orientações de modo a incluir explicações e justificativas; e separar as resoluções de caráter ético, melhorando sua divulgação.OBJECTIVE: Compare the Code of Medical Ethics of the Federal Council of Medicine of Brazil with codes from 11 different countries, with the purpose of improving the comprehension of their structure and contribute to the achievement of

  19. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi;

    2015-01-01

    as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  20. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause...

  1. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  2. On Asymmetric Quantum MDS Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Ling, San

    2010-01-01

    Assuming the validity of the MDS Conjecture, the weight distribution of all MDS codes is known. Using a recently-established characterization of asymmetric quantum error-correcting codes, linear MDS codes can be used to construct asymmetric quantum MDS codes with $d_{z} \\geq d_{x}\\geq 2$ for all possible values of length $n$ for which linear MDS codes over $\\F_{q}$ are known to exist.

  3. ARC Code TI: Growler

    Data.gov (United States)

    National Aeronautics and Space Administration — Growler is a C++-based distributed object and event architecture. It is written in C++, and supports serialization of C++ objects as part of its Remote Method...

  4. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...

  5. The Particle Accelerator Simulation Code PyORBIT

    Energy Technology Data Exchange (ETDEWEB)

    Gorlov, Timofey V [ORNL; Holmes, Jeffrey A [ORNL; Cousineau, Sarah M [ORNL; Shishlo, Andrei P [ORNL

    2015-01-01

    The particle accelerator simulation code PyORBIT is presented. The structure, implementation, history, parallel and simulation capabilities, and future development of the code are discussed. The PyORBIT code is a new implementation and extension of algorithms of the original ORBIT code that was developed for the Spallation Neutron Source accelerator at the Oak Ridge National Laboratory. The PyORBIT code has a two level structure. The upper level uses the Python programming language to control the flow of intensive calculations performed by the lower level code implemented in the C++ language. The parallel capabilities are based on MPI communications. The PyORBIT is an open source code accessible to the public through the Google Open Source Projects Hosting service.

  6. Law of genome evolution direction: Coding information quantity grows

    Institute of Scientific and Technical Information of China (English)

    Liao-fu LUO

    2009-01-01

    The problem of the directionality of genome evolution is studied. Based on the analysis of C-value paradox and the evolution of genome size, we propose that the function-coding information quantity of a genome always grows in the course of evolution through sequence duplication, expansion of code,and gene transfer from outside. The function-coding information quantity of a genome consists of two parts, p-coding information quantity that encodes functional protein and n-coding information quantity that encodes other functional elements. The evidences on the law of the evolutionary directionality are indicated. The needs of function are the motive force for the expansion of coding information quantity,and the information quantity expansion is the way to make functional innovation and extension for a species. Therefore, the increase of coding information quantity of a genome is a measure of the acquired new function, and it determines the directionality of genome evolution.

  7. CALMAR: A New Versatile Code Library for Adjustment from Measurements

    Directory of Open Access Journals (Sweden)

    Grégoire G.

    2016-01-01

    Full Text Available CALMAR, a new library for adjustment has been developed. This code performs simultaneous shape and level adjustment of an initial prior spectrum from measured reactions rates of activation foils. It is written in C++ using the ROOT data analysis framework,with all linear algebra classes. STAYSL code has also been reimplemented in this library. Use of the code is very flexible : stand-alone, inside a C++ code, or driven by scripts. Validation and test cases are under progress. Theses cases will be included in the code package that will be available to the community. Future development are discussed. The code should support the new Generalized Nuclear Data (GND format. This new format has many advantages compared to ENDF.

  8. CALMAR: A New Versatile Code Library for Adjustment from Measurements

    Science.gov (United States)

    Grégoire, G.; Fausser, C.; Destouches, C.; Thiollay, N.

    2016-02-01

    CALMAR, a new library for adjustment has been developed. This code performs simultaneous shape and level adjustment of an initial prior spectrum from measured reactions rates of activation foils. It is written in C++ using the ROOT data analysis framework,with all linear algebra classes. STAYSL code has also been reimplemented in this library. Use of the code is very flexible : stand-alone, inside a C++ code, or driven by scripts. Validation and test cases are under progress. Theses cases will be included in the code package that will be available to the community. Future development are discussed. The code should support the new Generalized Nuclear Data (GND) format. This new format has many advantages compared to ENDF.

  9. Code source sans code: le cas de l'ENIAC.

    OpenAIRE

    De Mol, Liesbeth

    2016-01-01

    Doctoral Qu’est-ce qu’un programme ? Qu’est-ce qu’un code (source) ? Est-ce un « texte » susceptible d’une analyse littéraire ou plutôt quelque chose qui réside dans les circuit électroniques de l’ordinateur ? Est-ce un objet technique ou formel ? D’un certain point de vue, ces questions purement philosophiques ont peu à voir avec une réalité quelle qu’elle soit. Mais en informatique, ces questions sont au cœur de la discipline et les réponses qu’on leur donne déterminent des décisions qui...

  10. Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes

    CERN Document Server

    Senger, Christian; Bossert, Martin; Zyablov, Victor

    2008-01-01

    Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one...

  11. Code Club: bringing programming to UK primary schools through Scratch

    OpenAIRE

    Smith, Neil; Sutcliffe, Clare; Sandvik, Linda

    2014-01-01

    Code Club is a network of after-school programming clubs for primary (US: elementary) schoolchildren, run by technically-competent volunteers in conjunction with (generally technically-unskilled) teachers. The main motivation of Code Club is to inspire children with a sense of fun and achievement for programming and digital creativity. This paper reports on the first year of Code Club in 1000 UK schools. The results were extremely positive, but some children had difficulty understanding the c...

  12. CTI Correction Code

    Science.gov (United States)

    Massey, Richard; Stoughton, Chris; Leauthaud, Alexie; Rhodes, Jason; Koekemoer, Anton; Ellis, Richard; Shaghoulian, Edgar

    2013-07-01

    Charge Transfer Inefficiency (CTI) due to radiation damage above the Earth's atmosphere creates spurious trailing in images from Charge-Coupled Device (CCD) imaging detectors. Radiation damage also creates unrelated warm pixels, which can be used to measure CTI. This code provides pixel-based correction for CTI and has proven effective in Hubble Space Telescope Advanced Camera for Surveys raw images, successfully reducing the CTI trails by a factor of ~30 everywhere in the CCD and at all flux levels. The core is written in java for speed, and a front-end user interface is provided in IDL. The code operates on raw data by returning individual electrons to pixels from which they were unintentionally dragged during readout. Correction takes about 25 minutes per ACS exposure, but is trivially parallelisable to multiple processors.

  13. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  14. Sinusoidal transform coding

    Science.gov (United States)

    Mcaulay, Robert J.; Quatieri, Thomas F.

    1988-01-01

    It has been shown that an analysis/synthesis system based on a sinusoidal representation of speech leads to synthetic speech that is essentially perceptually indistinguishable from the original. Strategies for coding the amplitudes, frequencies and phases of the sine waves have been developed that have led to a multirate coder operating at rates from 2400 to 9600 bps. The encoded speech is highly intelligible at all rates with a uniformly improving quality as the data rate is increased. A real-time fixed-point implementation has been developed using two ADSP2100 DSP chips. The methods used for coding and quantizing the sine-wave parameters for operation at the various frame rates are described.

  15. Confocal coded aperture imaging

    Energy Technology Data Exchange (ETDEWEB)

    Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

    2001-01-01

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  16. Code of Practice

    International Nuclear Information System (INIS)

    This Code of Practice introduces accepted safety procedures associated with the use of alpha, beta, gamma and X-radiation in secondary schools (pupils aged 12 to 18) in Ireland, and summarises good practice and procedures as they apply to radiation protection. Typical dose rates at various distances from sealed sources are quoted, and simplified equations are used to demonstrate dose and shielding calculations. The regulatory aspects of radiation protection are outlined, and references to statutory documents are given

  17. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  18. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  19. Structural coding versus free-energy predictive coding.

    Science.gov (United States)

    van der Helm, Peter A

    2016-06-01

    Focusing on visual perceptual organization, this article contrasts the free-energy (FE) version of predictive coding (a recent Bayesian approach) to structural coding (a long-standing representational approach). Both use free-energy minimization as metaphor for processing in the brain, but their formal elaborations of this metaphor are fundamentally different. FE predictive coding formalizes it by minimization of prediction errors, whereas structural coding formalizes it by minimization of the descriptive complexity of predictions. Here, both sides are evaluated. A conclusion regarding competence is that FE predictive coding uses a powerful modeling technique, but that structural coding has more explanatory power. A conclusion regarding performance is that FE predictive coding-though more detailed in its account of neurophysiological data-provides a less compelling cognitive architecture than that of structural coding, which, for instance, supplies formal support for the computationally powerful role it attributes to neuronal synchronization. PMID:26407895

  20. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  1. Coding Opportunity Densification Strategies for Instantly Decodable Network Coding

    OpenAIRE

    Sorour, Sameh; Valaee, Shahrokh

    2012-01-01

    In this paper, we aim to identify the strategies that can maximize and monotonically increase the density of the coding opportunities in instantly decodable network coding (IDNC).Using the well-known graph representation of IDNC, first derive an expression for the exact evolution of the edge set size after the transmission of any arbitrary coded packet. From the derived expressions, we show that sending commonly wanted packets for all the receivers can maximize the number of coding opportunit...

  2. TASS code topical report. V.1 TASS code technical manual

    International Nuclear Information System (INIS)

    TASS 1.0 code has been developed at KAERI for the initial and reload non-LOCA safety analysis for the operating PWRs as well as the PWRs under construction in Korea. TASS code will replace various vendor's non-LOCA safety analysis codes currently used for the Westinghouse and ABB-CE type PWRs in Korea. This can be achieved through TASS code input modifications specific to each reactor type. The TASS code can be run interactively through the keyboard operation. A simimodular configuration used in developing the TASS code enables the user easily implement new models. TASS code has been programmed using FORTRAN77 which makes it easy to install and port for different computer environments. The TASS code can be utilized for the steady state simulation as well as the non-LOCA transient simulations such as power excursions, reactor coolant pump trips, load rejections, loss of feedwater, steam line breaks, steam generator tube ruptures, rod withdrawal and drop, and anticipated transients without scram (ATWS). The malfunctions of the control systems, components, operator actions and the transients caused by the malfunctions can be easily simulated using the TASS code. This technical report describes the TASS 1.0 code models including reactor thermal hydraulic, reactor core and control models. This TASS code models including reactor thermal hydraulic, reactor core and control models. This TASS code technical manual has been prepared as a part of the TASS code manual which includes TASS code user's manual and TASS code validation report, and will be submitted to the regulatory body as a TASS code topical report for a licensing non-LOCA safety analysis for the Westinghouse and ABB-CE type PWRs operating and under construction in Korea. (author). 42 refs., 29 tabs., 32 figs

  3. Shadowfax: Moving mesh hydrodynamical integration code

    Science.gov (United States)

    Vandenbroucke, Bert

    2016-05-01

    Shadowfax simulates galaxy evolution. Written in object-oriented modular C++, it evolves a mixture of gas, subject to the laws of hydrodynamics and gravity, and any collisionless fluid only subject to gravity, such as cold dark matter or stars. For the hydrodynamical integration, it makes use of a (co-) moving Lagrangian mesh. The code has a 2D and 3D version, contains utility programs to generate initial conditions and visualize simulation snapshots, and its input/output is compatible with a number of other simulation codes, e.g. Gadget2 (ascl:0003.001) and GIZMO (ascl:1410.003).

  4. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  5. Analysis of the optimality of the standard genetic code.

    Science.gov (United States)

    Kumar, Balaji; Saini, Supreet

    2016-07-19

    Many theories have been proposed attempting to explain the origin of the genetic code. While strong reasons remain to believe that the genetic code evolved as a frozen accident, at least for the first few amino acids, other theories remain viable. In this work, we test the optimality of the standard genetic code against approximately 17 million genetic codes, and locate 29 which outperform the standard genetic code at the following three criteria: (a) robustness to point mutation; (b) robustness to frameshift mutation; and (c) ability to encode additional information in the coding region. We use a genetic algorithm to generate and score codes from different parts of the associated landscape, which are, as a result, presumably more representative of the entire landscape. Our results show that while the genetic code is sub-optimal for robustness to frameshift mutation and the ability to encode additional information in the coding region, it is very strongly selected for robustness to point mutation. This coupled with the observation that the different performance indicator scores for a particular genetic code are negatively correlated makes the standard genetic code nearly optimal for the three criteria tested in this work. PMID:27327359

  6. 48 CFR 9.108-2 - Relationship with the Internal Revenue Code and Treasury regulations.

    Science.gov (United States)

    2010-10-01

    ... Internal Revenue Code and Treasury regulations. 9.108-2 Section 9.108-2 Federal Acquisition Regulations... Prospective Contractors 9.108-2 Relationship with the Internal Revenue Code and Treasury regulations. (a....C. 395, but also are similarly covered in the Internal Revenue Code at 26 U.S.C. 7874. A...

  7. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli. PMID:23724797

  8. A Theoretical Model of Code of Ethics Conceptualized From Companies’ Public Disclosures on Ethics

    OpenAIRE

    Elena Roxana Anghel-Ilcu

    2014-01-01

    Codes of ethics encompass companies’ vision on business conduct and ethics in relation with its stakeholders. Presenting a code of ethics is rather a voluntarily process, therefore a large amount of heterogeneity is found among such codes. A general model of code of ethics would be a necessarily instrument because it would deliver some starting guidance for companies willing to present an ethical code of their own. Therefore, this paper aims to conceptualize a general and synthetic model of c...

  9. High Energy Transport Code HETC

    International Nuclear Information System (INIS)

    The physics contained in the High Energy Transport Code (HETC), in particular the collision models, are discussed. An application using HETC as part of the CALOR code system is also given. 19 refs., 5 figs., 3 tabs

  10. The Tap code - a code similar to Morse code for communication by tapping

    OpenAIRE

    Rafler, Stephan

    2013-01-01

    A code is presented for fast, easy and efficient communication over channels that allow only two signal types: a single sound (e.g. a knock), or no sound (i.e. silence). This is a true binary code while Morse code is a ternary code and does not work in such situations. Thus the presented code is more universal than Morse and can be used in much more situations. Additionally it is very tolerant to variations in signal strength or duration. The paper contains various ways in which the code can ...

  11. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  12. Emerging Views on the CTD Code

    Science.gov (United States)

    Zhang, David W.; Rodríguez-Molina, Juan B.; Tietjen, Joshua R.; Nemec, Corey M.; Ansari, Aseem Z.

    2012-01-01

    The C-terminal domain (CTD) of RNA polymerase II (Pol II) consists of conserved heptapeptide repeats that function as a binding platform for different protein complexes involved in transcription, RNA processing, export, and chromatin remodeling. The CTD repeats are subject to sequential waves of posttranslational modifications during specific stages of the transcription cycle. These patterned modifications have led to the postulation of the “CTD code” hypothesis, where stage-specific patterns define a spatiotemporal code that is recognized by the appropriate interacting partners. Here, we highlight the role of CTD modifications in directing transcription initiation, elongation, and termination. We examine the major readers, writers, and erasers of the CTD code and examine the relevance of describing patterns of posttranslational modifications as a “code.” Finally, we discuss major questions regarding the function of the newly discovered CTD modifications and the fundamental insights into transcription regulation that will necessarily emerge upon addressing those challenges. PMID:22567385

  13. Emerging Views on the CTD Code

    Directory of Open Access Journals (Sweden)

    David W. Zhang

    2012-01-01

    Full Text Available The C-terminal domain (CTD of RNA polymerase II (Pol II consists of conserved heptapeptide repeats that function as a binding platform for different protein complexes involved in transcription, RNA processing, export, and chromatin remodeling. The CTD repeats are subject to sequential waves of posttranslational modifications during specific stages of the transcription cycle. These patterned modifications have led to the postulation of the “CTD code” hypothesis, where stage-specific patterns define a spatiotemporal code that is recognized by the appropriate interacting partners. Here, we highlight the role of CTD modifications in directing transcription initiation, elongation, and termination. We examine the major readers, writers, and erasers of the CTD code and examine the relevance of describing patterns of posttranslational modifications as a “code.” Finally, we discuss major questions regarding the function of the newly discovered CTD modifications and the fundamental insights into transcription regulation that will necessarily emerge upon addressing those challenges.

  14. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  15. Ethical Codes in the Professions.

    Science.gov (United States)

    Schmeiser, Cynthia B.

    1992-01-01

    Whether the measurement profession should consider developing and adopting a code of professional conduct is explored after a brief review of existing references to standards of conduct and a review of other professional codes. Issues include the need for a code of ethics, its usefulness, and its enforcement. (SLD)

  16. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy mac...

  17. Coding Issues in Grounded Theory

    Science.gov (United States)

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  18. Direct construction of code loops

    OpenAIRE

    Nagy, Gabor P.

    2004-01-01

    Code loops were introduced by R. L. Griess. R.L. Griess and T. Hsu gave methods to construct the corresponding code loop from any given doubly even binary code; both these methods used some kind of induction. In this paper, we present a global construction of the loop, where we apply the correspondance between the concepts of Moufang loops and groups with triality.

  19. 19 CFR 142.45 - Use of bar code by entry filer.

    Science.gov (United States)

    2010-04-01

    ... filer and a product description below the bar code. (b) Multiple commodity processing. Multiple... variable allowed. The commodities should be listed on one invoice with C-4 Code labels for each...

  20. TWEED Code Book

    OpenAIRE

    Engene, Jan Oskar

    2006-01-01

    The TWEED data set contains information on more than 11.000 events related to internal (or domestic) terrorism in 18 West European countries for the 1950 through 2004 period. The code book describes the structure of the data set, the countries covered, and the variables included and functions as a user’s guide to the data set. The data set is available at: http://www.uib.no/people/sspje/tweed.htm The data set Terrorism in Western Europe: Events Data, TWEED, contains information on events r...

  1. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  2. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...... the impact of interference from other transmissions. Unlike these conventional studies, in this paper, we apply PLNC to a large-scale cellular network in the presence of intercell interference (ICI). In cellular networks, a terminal and a Base Station (BS) have different transmission power, which causes...

  3. TRIPOLI-4: Monte Carlo transport code functionalities and applications; TRIPOLI-4: code de transport Monte Carlo fonctionnalites et applications

    Energy Technology Data Exchange (ETDEWEB)

    Both, J.P.; Lee, Y.K.; Mazzolo, A.; Peneliau, Y.; Petit, O.; Roesslinger, B. [CEA Saclay, Dir. de l' Energie Nucleaire (DEN), Service d' Etudes de Reacteurs et de Modelisation Avancee, 91 - Gif sur Yvette (France)

    2003-07-01

    Tripoli-4 is a three dimensional calculations code using the Monte Carlo method to simulate the transport of neutrons, photons, electrons and positrons. This code is used in four application fields: the protection studies, the criticality studies, the core studies and the instrumentation studies. Geometry, cross sections, description of sources, principle. (N.C.)

  4. New quantum codes constructed from quaternary BCH codes

    Science.gov (United States)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  5. ON CLASSICAL BCH CODES AND QUANTUM BCH CODES

    Institute of Scientific and Technical Information of China (English)

    Xu Yajie; Ma Zhi; Zhang Chunyuan

    2009-01-01

    It is a regular way of constructing quantum error-correcting codes via codes with self-orthogonal property, and whether a classical Bose-Chaudhuri-Hocquenghem (BCH) code is self-orthogonal can be determined by its designed distance. In this paper, we give the sufficient and necessary condition for arbitrary classical BCH codes with self-orthogonal property through algorithms. We also give a better upper bound of the designed distance of a classical narrow-sense BCH code which contains its Euclidean dual. Besides these, we also give one algorithm to compute the dimension of these codes. The complexity of all algorithms is analyzed. Then the results can be applied to construct a series of quantum BCH codes via the famous CSS constructions.

  6. Code-switching in letter writing

    Directory of Open Access Journals (Sweden)

    P.S. Sobahle

    2013-02-01

    Full Text Available The study sets out to investigate code switching in letter writing among a small group ofXhosa speaking people. Code switching is found in informal speech and informal writing. It was established from the data that the closer people are, the more code switching there is. Code switching seems to follow a pattern in that it was observed to occur: (a only with certain people (b when talking about certain topics (c when wanting to exclude another person (d when emphasising a point. Code switching also appears to have a 'grammar' of its own. It is not in any way a pidgin. It is clear from the data that code switching does not reflect denial of one's identity. English, being the medium of education for Blacks in South Africa, is therefore bound to be reflected not only in their speech but also in their writing. Die studie het ten doe/ om registeroorskakeling in die skryf van briewe deur 'n klein groepie Xhosasprekendes te ondersoek. Registeroorskakeling word gevind in informele spraak en informele skryfwerk. Daar is uit die data vasgestel dat hoe intiemer mense is hoe meer vind registeroorskakeling plaas. Volgens waarneming blyk dit dat registeroorskakeling 'n patroon volg, want dit het voorgekom: (a net by sekere mense (b wanneer oor sekere onderwerpe gepraat is (c wanneer 'n ander per soon uitgeskakel is (d wanneer 'n mening beklemtoon is. Registeroorskakeling blyk 'n eie grammatika te he. Dit is geensins "pidgin" nie. Dit blyk uit data dat die skrywer se identiteit nie verlore raak tydens registeroorskakeling nie. Omdat Engels die medium van onderrig vir Swartes in Suid-Afrika is, sal dit noodwendig nie net in hulle spraak nie, maar ook in hul skryfwerk gereflekteer word.

  7. Getting Kodo: Network Coding for the ns-3 simulator

    DEFF Research Database (Denmark)

    Hernandez, Nestor; Pedersen, Morten Videbæk; Vingelmann, Peter;

    2016-01-01

    Network Coding (NC) has been shown to improve current and upcoming communication systems in terms of throughput, energy consumption and delay reduction. However, today's evaluations on network coding solutions rely on homegrown simulators that might not accurately model realistic systems. In this...... work, we present for the first time the steps to use Kodo, a C++11 network coding library into the ns-3 simulator and show its potential with basic examples. Our purpose is to allow ns-3 users to use a flexible and reliable set of network coding functionalities together with the technologies simulated...

  8. Modeling report of DYMOND code (DUPIC version)

    Energy Technology Data Exchange (ETDEWEB)

    Park, Joo Hwan [KAERI, Taejon (Korea, Republic of); Yacout, Abdellatif M. [Argonne National Laboratory, Ilinois (United States)

    2003-04-01

    The DYMOND code employs the ITHINK dynamic modeling platform to assess the 100-year dynamic evolution scenarios for postulated global nuclear energy parks. Firstly, DYMOND code has been developed by ANL(Argonne National Laboratory) to perform the fuel cycle analysis of LWR once-through and LWR-FBR mixed plant. Since the extensive application of DYMOND code has been requested, the first version of DYMOND has been modified to adapt the DUPIC, MSR and RTF fuel cycle. DYMOND code is composed of three parts; the source language platform, input supply and output. But those platforms are not clearly distinguished. This report described all the equations which were modeled in the modified DYMOND code (which is called as DYMOND-DUPIC version). It divided into five parts;Part A deals model in reactor history which is included amount of the requested fuels and spent fuels. Part B aims to describe model of fuel cycle about fuel flow from the beginning to the end of fuel cycle. Part C is for model in re-processing which is included recovery of burned uranium, plutonium, minor actinide and fission product as well as the amount of spent fuels in storage and disposal. Part D is for model in other fuel cycle which is considered the thorium fuel cycle for MSR and RTF reactor. Part E is for model in economics. This part gives all the information of cost such as uranium mining cost, reactor operating cost, fuel cost etc.

  9. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  10. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  11. Codon Distribution in Error-Detecting Circular Codes

    Directory of Open Access Journals (Sweden)

    Elena Fimmel

    2016-03-01

    Full Text Available In 1957, Francis Crick et al. suggested an ingenious explanation for the process of frame maintenance. The idea was based on the notion of comma-free codes. Although Crick’s hypothesis proved to be wrong, in 1996, Arquès and Michel discovered the existence of a weaker version of such codes in eukaryote and prokaryote genomes, namely the so-called circular codes. Since then, circular code theory has invariably evoked great interest and made significant progress. In this article, the codon distributions in maximal comma-free, maximal self-complementary C3 and maximal self-complementary circular codes are discussed, i.e., we investigate in how many of such codes a given codon participates. As the main (and surprising result, it is shown that the codons can be separated into very few classes (three, or five, or six with respect to their frequency. Moreover, the distribution classes can be hierarchically ordered as refinements from maximal comma-free codes via maximal self-complementary C3 codes to maximal self-complementary circular codes.

  12. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani;

    2014-01-01

    oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains......Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...

  13. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  14. Three Paradigms for Mixing Coding and Games: Coding in a Game, Coding as a Game, and Coding for a Game

    OpenAIRE

    Foster, Stephen

    2015-01-01

    Games for teaching coding have been an educational holy grail since at least the early 1980s. Yet for decades, with games more popular than ever and with the need to teach kids coding having been well-recognized, no blockbuster coding games have arisen (see Chapter 2). Over the years, the research community has made various games for teaching computer science: a survey made by shows that most do not teach coding, and of the ones that do teach coding, most are research prototypes (not produc...

  15. On constructing disjoint linear codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Weiguo; CAI Mian; XIAO Guozhen

    2007-01-01

    To produce a highly nonlinear resilient function,the disjoint linear codes were originally proposed by Johansson and Pasalic in IEEE Trans.Inform.Theory,2003,49(2):494-501.In this paper,an effective method for finding a set of such disjoint linear codes is presented.When n≥2k,we can find a set of[n,k] disjoint linear codes with joint linear codes exists with cardinality at least 2.We also describe a result on constructing a set of [n,k] disjoint linear codes with minimum distance at least some fixed positive integer.

  16. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    related to the iterative encoding of graph codes with MDS component code. The last chapter deals with affine Grassmann codes and Grassmann codes. We begin with some previously known codes and prove that they are also Tanner codes of the incidence graph of the point–line partial geometry......This thesis consists of six chapters. The first chapter, contains a short introduction to coding theory in which we explain the coding theory concepts we use. In the second chapter, we present the required theory for evaluation codes and also give an example of some fundamental codes in coding...... theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four...

  17. Calculation codes in radiation protection, radiation physics and dosimetry

    International Nuclear Information System (INIS)

    These scientific days had for objective to draw up the situation of calculation codes of radiation transport, of sources estimation, of radiation doses managements and to draw the future perspectives. (N.C.)

  18. Validación de los códigos diagnósticos de cáncer de colon y recto del Conjunto Mínimo Básico de Datos Validation of colorectal cancer diagnostic codes in a hospital administration data set

    Directory of Open Access Journals (Sweden)

    Mirari Márquez Cid

    2006-08-01

    Full Text Available Objetivo: Validar la capacidad del Conjunto Mínimo Básico de Datos (CMBD para detectar casos incidentes de cáncer de colon y recto utilizando como estándar de referencia el Registro de Cáncer de Murcia (RCM y medir la concordancia entre el CMBD y el registro de cáncer en tumores colorrectales. Material y método: Estudio de validación transversal del CMBD del Hospital Virgen de la Arrixaca de Murcia. La población de estudio son los casos incidentes de colon-recto del año 2000 del RCM y los casos del CMBD en el citado hospital para el mismo año con algún código diagnóstico CIE-9 entre 153.0 y 154.1 eliminando reingresos. Durante el proceso se van a realizar 2 análisis: sólo con el diagnóstico principal y con todos los diagnósticos. Se calcula la sensibilidad, la especificidad, el valor predictivo positivo (VPP y negativo (VPN y la concordancia con sus intervalos de confianza (IC del 95%. Resultados: Con sólo el primer diagnóstico, el CMBD detecta el 80% de los casos incidentes de cáncer colorrectal con un VPP del 75%; considerando todos los diagnósticos, detecta el 85% con un VPP del 64%. La concordancia en la codificación es elevada tanto con 3 dígitos (índice kappa del 88% (IC del 95%, 0,79-0,97 en primer diagnóstico, y del 89% (IC del 95%, 0,80-0,97 en todos los diagnósticos como de 4 dígitos (índice kappa del 77% (IC del 95%, 0,68-0,85 en el primer diagnóstico, y del 78% (IC del 95%, 0,70-0,86 en todos diagnósticos en ambos análisis. Conclusiones: El CMBD es una buena fuente para detectar casos incidentes de cáncer al presentar una elevada sensibilidad. La alta concordancia encontrada en las localizaciones tumorales de colon-recto contribuye a consolidar el CMBD como fuente de datos para los registros de cáncer.Objectives: To validate the ability of a hospital administration data set (minimum data set [MDS] to detect incident cases of colorectal cancer using the Murcia Cancer Registry (MCR as the gold standard

  19. Allele coding in genomic evaluation

    DEFF Research Database (Denmark)

    Standen, Ismo; Christensen, Ole Fredslund

    2011-01-01

    coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being the best. \\paragraph*{Conclusions:} Different allele coding methods lead to the same inference in the marker-based and equivalent models when a fixed...... effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous...... genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call...

  20. Rcpp: Seamless R and C++ Integration

    OpenAIRE

    Dirk Eddelbuettel; Romain Francois

    2011-01-01

    The Rcpp package simplifies integrating C++ code with R. It provides a consistent C++ class hierarchy that maps various types of R objects (vectors, matrices, functions, environments, . . . ) to dedicated C++ classes. Object interchange between R and C++ is managed by simple, flexible and extensible concepts which include broad support for C++ Standard Template Library idioms. C++ code can both be compiled, linked and loaded on the fly, or added via packages. Flexible error and exception code...

  1. Practices in Code Discoverability: Astrophysics Source Code Library

    Science.gov (United States)

    Allen, A.; Teuben, P.; Nemiroff, R. J.; Shamir, L.

    2012-09-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysics source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL has on average added 19 codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available either via a download site or from an identified source. This paper provides the history and description of the ASCL. It lists the requirements for including codes, examines the advantages of the ASCL, and outlines some of its future plans.

  2. Making your code citable with the Astrophysics Source Code Library

    Science.gov (United States)

    Allen, Alice; DuPrie, Kimberly; Schmidt, Judy; Berriman, G. Bruce; Hanisch, Robert J.; Mink, Jessica D.; Nemiroff, Robert J.; Shamir, Lior; Shortridge, Keith; Taylor, Mark B.; Teuben, Peter J.; Wallin, John F.

    2016-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) is a free online registry of codes used in astronomy research. With nearly 1,200 codes, it is the largest indexed resource for astronomy codes in existence. Established in 1999, it offers software authors a path to citation of their research codes even without publication of a paper describing the software, and offers scientists a way to find codes used in refereed publications, thus improving the transparency of the research. It also provides a method to quantify the impact of source codes in a fashion similar to the science metrics of journal articles. Citations using ASCL IDs are accepted by major astronomy journals and if formatted properly are tracked by ADS and other indexing services. The number of citations to ASCL entries increased sharply from 110 citations in January 2014 to 456 citations in September 2015. The percentage of code entries in ASCL that were cited at least once rose from 7.5% in January 2014 to 17.4% in September 2015. The ASCL's mid-2014 infrastructure upgrade added an easy entry submission form, more flexible browsing, search capabilities, and an RSS feeder for updates. A Changes/Additions form added this past fall lets authors submit links for papers that use their codes for addition to the ASCL entry even if those papers don't formally cite the codes, thus increasing the transparency of that research and capturing the value of their software to the community.

  3. Finite-Length Analysis of BATS Codes

    OpenAIRE

    Yang, Shenghao; Ng, Tsz-Ching; Yeung, Raymond W.

    2013-01-01

    BATS codes were proposed for communication through networks with packet loss. A BATS code consists of an outer code and an inner code. The outer code is a matrix generation of a fountain code, which works with the inner code that comprises random linear coding at the intermediate network nodes. In this paper, the performance of finite-length BATS codes is analyzed with respect to both belief propagation (BP) decoding and inactivation decoding. Our results enable us to evaluate efficiently the...

  4. On network coding for acyclic networks with delays

    CERN Document Server

    Prasad, K

    2011-01-01

    Problems related to network coding for acyclic, instantaneous networks (where the edges of the acyclic graph representing the network are assumed to have zero-delay) have been extensively dealt with in the recent past. The most prominent of these problems include (a) the existence of network codes that achieve maximum rate of transmission, (b) efficient network code constructions, and (c) field size issues. In practice, however, networks have transmission delays. In network coding theory, such networks with transmission delays are generally abstracted by assuming that their edges have integer delays. Note that using enough memory at the nodes of an acyclic network with integer delays can effectively simulate instantaneous behavior, which is probably why only acyclic instantaneous networks have been primarily focused on thus far. In this work, we elaborate on issues ((a), (b) and (c) above) related to network coding for acyclic networks with integer delays, which have till now been overlooked. We show that the...

  5. Investigating the Simulink Auto-Coding Process

    Science.gov (United States)

    Gualdoni, Matthew J.

    2016-01-01

    Model based program design is the most clear and direct way to develop algorithms and programs for interfacing with hardware. While coding "by hand" results in a more tailored product, the ever-growing size and complexity of modern-day applications can cause the project work load to quickly become unreasonable for one programmer. This has generally been addressed by splitting the product into separate modules to allow multiple developers to work in parallel on the same project, however this introduces new potentials for errors in the process. The fluidity, reliability and robustness of the code relies on the abilities of the programmers to communicate their methods to one another; furthermore, multiple programmers invites multiple potentially differing coding styles into the same product, which can cause a loss of readability or even module incompatibility. Fortunately, Mathworks has implemented an auto-coding feature that allows programmers to design their algorithms through the use of models and diagrams in the graphical programming environment Simulink, allowing the designer to visually determine what the hardware is to do. From here, the auto-coding feature handles converting the project into another programming language. This type of approach allows the designer to clearly see how the software will be directing the hardware without the need to try and interpret large amounts of code. In addition, it speeds up the programming process, minimizing the amount of man-hours spent on a single project, thus reducing the chance of human error as well as project turnover time. One such project that has benefited from the auto-coding procedure is Ramses, a portion of the GNC flight software on-board Orion that has been implemented primarily in Simulink. Currently, however, auto-coding Ramses into C++ requires 5 hours of code generation time. This causes issues if the tool ever needs to be debugged, as this code generation will need to occur with each edit to any part of

  6. Immature transformed rat islet beta-cells differentially express C-peptides derived from the genes coding for insulin I and II as well as a transfected human insulin gene

    DEFF Research Database (Denmark)

    Blume, N; Petersen, J S; Andersen, L C;

    1992-01-01

    Synthetic peptides representing unique sequences in rat proinsulin C-peptide I and II were used to generate highly specific antisera, which, when applied on sections of normal rat pancreas, confirm a homogeneous coexpression of the two C-peptides in all islet beta-cells. Insulin gene expression...... of transcription.(ABSTRACT TRUNCATED AT 250 WORDS)...

  7. A synthetic peptide corresponding to the C-terminal 25 residues of phage MS2 coded lysis protein dissipates the protonmotive force in Escherichia coli membrane vesicles by generating hydrophilic pores

    NARCIS (Netherlands)

    Goessens, Wil H.F.; Driessen, Arnold J.M.; Wilschut, Jan; Duin, Jan van

    1988-01-01

    The RNA phage MS2 encodes a protein, 75 amino acids long, that is necessary and sufficient for lysis of the host cell. DNA deletion analysis has shown that the lytic activity is confined to the C-terminal half of the protein. We have examined the effects of a synthetic peptide, covering the C-termin

  8. Mutations of C19orf12, coding for a transmembrane glycine zipper containing mitochondrial protein, cause mis-localization of the protein, inability to respond to oxidative stress and increased mitochondrial Ca2+

    DEFF Research Database (Denmark)

    Venco, Paola; Bonora, Massimo; Giorgi, Carlotta;

    2015-01-01

    Mutations in C19orf12 have been identified in patients affected by Neurodegeneration with Brain Iron Accumulation (NBIA), a clinical entity characterized by iron accumulation in the basal ganglia. By using western blot analysis with specific antibody and confocal studies, we showed that wild-type C...

  9. Calculation codes in radiation protection, radiation physics and dosimetry; Codes de calcul en radioprotection, radiophysique et dosimetrie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    These scientific days had for objective to draw up the situation of calculation codes of radiation transport, of sources estimation, of radiation doses managements and to draw the future perspectives. (N.C.)

  10. Um estudo empírico sobre a importância do código de ética profissional para o contabilista An empirical study on the importance professional code of ethics for accountants

    Directory of Open Access Journals (Sweden)

    Francisco José dos Santos Alves

    2007-06-01

    Full Text Available Este estudo trata de uma pesquisa empírica e de natureza quantitativa, com o objetivo de investigar a influência do Código de Ética sobre o processo decisório ético do profissional de Contabilidade. O questionário foi aplicado por meio da Internet e respondido por 2262 contadores e técnicos em Contabilidade com registro ativo no Conselho Regional de Contabilidade de 4 Estados brasileiros. Seus resultados, obtidos por meio da regressão logística multivariada, sugerem, entre outros aspectos, a existência de uma contradição: a maioria dos profissionais considera o Código de Ética Profissional do Contabilista importante como guia de conduta, mas apenas uma minoria se predispõe a cumprir algumas ou todas as normas emanadas do Conselho Federal de Contabilidade.This study aims to investigate the influence of the Code of Ethics (CEPC in the ethical decision-making process of Brazilian accountants. It adopts a descriptive research approach and a quantitative method for analysis of data. Questionnaires were conducted via Internet and returned by 2262 accountants and accountant technicians, certified and chartered by the Regional Council of Accounting in the states of Rio de Janeiro, São Paulo, Minas Gerais and Rio Grande do Sul. The results obtained show, among others, a contradiction: approximately 73% of professionals polled totally agree with the statement claiming that the Code is important as a guide of conduct; however, only 44% are willing to comply with the guidelines established by the Federal Council of Accounting.

  11. Les codes correcteurs

    OpenAIRE

    Rigo, Michel

    2009-01-01

    Qu'on le veuille ou non, nous vivons dans un monde où les informations et les moyens de communication sont omniprésents. Les exemples où se mêlent informatique et télécommunications sont nombreux. Que ce soit l'Internet, la musique achetée en ligne ou gravée sur CD, les baladeurs de type iPod et autres appareils portables, les supports mémoire de tout type, la photographie numérique, la présence d'ordinateurs de bord sophistiqués dans nos voitures, etc. Sans code correcteur, le CD (implémenta...

  12. Homomorphic encryption from codes

    CERN Document Server

    Bogdanov, Andrej

    2011-01-01

    We propose a new homomorphic encryption scheme based on the hardness of decoding under independent random noise from certain affine families of codes. Unlike in previous lattice-based homomorphic encryption schemes, where the message is hidden in the noisy part of the ciphertext, our scheme carries the message in the affine part of the transformation and applies noise only to achieve security. Our scheme can tolerate noise of arbitrary magnitude, as long as the noise vector has sufficiently small hamming weight (and its entries are independent). Our design achieves "proto-homomorphic" properties in an elementary manner: message addition and multiplication are emulated by pointwise addition and multiplication of the ciphertext vectors. Moreover, the extremely simple nature of our decryption makes the scheme easily amenable to bootstrapping. However, some complications are caused by the inherent presence of noticeable encryption error. Our main technical contribution is the development of two new techniques for...

  13. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely...... as conceptions of good governance from other international organizations. While values converge, they are balanced and communicated differently, and seem to some extent to be translated into the national cultures. The set of global public values derived from this analysis include public interest, regime dignity......, transparency, neutrality, impartiality, effectiveness, accountability, and legality. The normative context of public administration, as expressed in codes, seems to ignore the New Public Management and Reinventing Government reform movements....

  14. Crystalizing the genetic code

    CERN Document Server

    Frappat, L; Sorba, Paul

    2000-01-01

    New developments are presented in the framework of the model introduced by the authors in refs. [1,2] and in which nucleotides as well as codons are classified in crystal bases of the quantum group U_q(sl(2)+sl(2)) in the limit q -> 0. An operator which gives the correspondence between the amino-acids and the codons is now obtained for any known genetic code. The free energy released by base pairing of dinucleotides as well as the relative hydrophilicity and hydrophobicity of the dinucleosides are also computed. For the vertebrate series, a universal behaviour in the ratios of codon usage frequencies is put in evidence and is shown to fit nicely in our model. Then a first attempt to represent the mutations relative to the deletion of a pyrimidine by action of a suitable crystal spinor operator is proposed. Finally recent theoretical descriptions are reviewed and compared with our model.

  15. Taxation Dilemma and Future Trends of C2C E-Commerce Code in China:Analysis from Foreign Speculation and China-based context%我国C2C模式的征税困境与未来走向——基于域外考察与本土语境的分析

    Institute of Scientific and Technical Information of China (English)

    侯卓

    2014-01-01

    我国C2C电子商务发展迅猛,在带来了积极的经济效益和社会效益的同时,也给我国的税收体系带来了巨大的冲击.对我国C2C电子商务的发展如何给予法律规制,在立法与征管两方面存在着新问题.域外经验显示,西方国家在此问题上坚持了多样性与普遍性相结合的法律进路,但是基本趋势是在征税技术日趋成熟的条件下,对于个体网上交易开征税收.就我国而言,C2C电子商务税收的立法思路应当在支持对C2C电子商务的扶植政策与维护税法基本原则之间寻求可税性和政策性的平衡,同时在程序立法上以征管技术为导向予以补正.

  16. Selection of Code and Interleaver for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1998-01-01

    The selection of component codes for turbo coding has often been based on the performance at high SNR's. However, we will argue that the selection mainly should be based on the performance at low SNR's, i.e. the convergence properties. Further, we will present a way to construct interleavers...... that significantly improve the performance of the turbo coding scheme at high SNR's, i.e. lowers the error floor...

  17. Obituary: Arthur Dodd Code (1923-2009)

    Science.gov (United States)

    Marché, Jordan D., II

    2009-12-01

    Former AAS president Arthur Dodd Code, age 85, passed away at Meriter Hospital in Madison, Wisconsin on 11 March 2009, from complications involving a long-standing pulmonary condition. Code was born in Brooklyn, New York on 13 August 1923, as the only child of former Canadian businessman Lorne Arthur Code and Jesse (Dodd) Code. An experienced ham radio operator, he entered the University of Chicago in 1940, but then enlisted in the U.S. Navy (1943-45) and was later stationed as an instructor at the Naval Research Laboratory, Washington, D.C. During the war, he gained extensive practical experience with the design and construction of technical equipment that served him well in years ahead. Concurrently, he took physics courses at George Washington University (some under the tutelage of George Gamow). In 1945, he was admitted to the graduate school of the University of Chicago, without having received his formal bachelor's degree. In 1950, he was awarded his Ph.D. for a theoretical study of radiative transfer in O- and B-type stars, directed by Subrahmanyan Chandrasekhar. hired onto the faculty of the Department of Astronomy at the University of Wisconsin-Madison (1951-56). He then accepted a tenured appointment at the California Institute of Technology and the Mount Wilson and Palomar Observatories (1956-58). But following the launch of Sputnik, Code returned to Wisconsin in 1958 as full professor of astronomy, director of the Washburn Observatory, and department chairman so that he could more readily pursue his interest in space astronomy. That same year, he was chosen a member of the Space Science Board of the National Academy of Sciences (created during the International Geophysical Year) and shortly became one of five principal investigators of the original NASA Space Science Working Group. In a cogent 1960 essay, Code argued that astrophysical investigations, when conducted from beyond the Earth's atmosphere, "cannot fail to have a tremendous impact on the

  18. Bit-Interleaved Coded Multiple Beamforming with Perfect Coding

    CERN Document Server

    Li, Boyu

    2010-01-01

    When the channel state information is known by the transmitter as well as the receiver, beamforming techniques that employ Singular Value Decomposition (SVD) are commonly used in Multiple-Input Multiple-Output (MIMO) systems. Without channel coding, when a single symbol is transmitted, these systems achieve the full diversity order. Whereas, this property is lost when multiple symbols are simultaneously transmitted. Full diversity can be restored when channel coding is added, as long as the code rate Rc and the number of employed subchannels S satisfy the condition RcS =< 1. Moreover, by adding a proper constellation precoder, full diversity can be achieved for both uncoded and coded SVD systems, e.g., Fully Precoded Multiple Beamforming (FPMB) and Bit-Interleaved Coded Multiple Beamforming with Full Precoding (BICMB-FP). Perfect Space-Time Block Code (PSTBC) is a full-rate full-diversity space-time code, which achieves maximum coding gain for MIMO systems. Previously, Perfect Coded Multiple Beamforming (P...

  19. Practices in Code Discoverability: Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysical source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL (http://ascl.net) has on average added 19 new codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available ei...

  20. MCOR - Monte Carlo depletion code for reference LWR calculations

    Energy Technology Data Exchange (ETDEWEB)

    Puente Espel, Federico, E-mail: fup104@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Tippayakul, Chanatip, E-mail: cut110@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Ivanov, Kostadin, E-mail: kni1@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Misu, Stefan, E-mail: Stefan.Misu@areva.com [AREVA, AREVA NP GmbH, Erlangen (Germany)

    2011-04-15

    Research highlights: > Introduction of a reference Monte Carlo based depletion code with extended capabilities. > Verification and validation results for MCOR. > Utilization of MCOR for benchmarking deterministic lattice physics (spectral) codes. - Abstract: The MCOR (MCnp-kORigen) code system is a Monte Carlo based depletion system for reference fuel assembly and core calculations. The MCOR code is designed as an interfacing code that provides depletion capability to the LANL Monte Carlo code by coupling two codes: MCNP5 with the AREVA NP depletion code, KORIGEN. The physical quality of both codes is unchanged. The MCOR code system has been maintained and continuously enhanced since it was initially developed and validated. The verification of the coupling was made by evaluating the MCOR code against similar sophisticated code systems like MONTEBURNS, OCTOPUS and TRIPOLI-PEPIN. After its validation, the MCOR code has been further improved with important features. The MCOR code presents several valuable capabilities such as: (a) a predictor-corrector depletion algorithm, (b) utilization of KORIGEN as the depletion module, (c) individual depletion calculation of each burnup zone (no burnup zone grouping is required, which is particularly important for the modeling of gadolinium rings), and (d) on-line burnup cross-section generation by the Monte Carlo calculation for 88 isotopes and usage of the KORIGEN libraries for PWR and BWR typical spectra for the remaining isotopes. Besides the just mentioned capabilities, the MCOR code newest enhancements focus on the possibility of executing the MCNP5 calculation in sequential or parallel mode, a user-friendly automatic re-start capability, a modification of the burnup step size evaluation, and a post-processor and test-matrix, just to name the most important. The article describes the capabilities of the MCOR code system; from its design and development to its latest improvements and further ameliorations. Additionally

  1. Mutations of C19orf12, coding for a transmembrane glycine zipper containing mitochondrial protein, cause mis-localization of the protein, inability to respond to oxidative stress and increased mitochondrial Ca2+.

    Directory of Open Access Journals (Sweden)

    Paola eVenco

    2015-05-01

    Full Text Available Mutations in C19orf12 have been identified in patients affected by Neurodegeneration with Brain Iron Accumulation (NBIA, a clinical entity characterized by iron accumulation in the basal ganglia. By using western blot analysis with specific antibody and confocal studies, we showed that wild-type C19orf12 protein was not exclusively present in mitochondria, but also in the Endoplasmic Reticulum (ER and MAM (Mitochondria Associated Membrane, while mutant C19orf12 variants presented a different localization. Moreover, after induction of oxidative stress, a GFP-tagged C19orf12 wild-type protein was able to relocate to the cytosol. On the contrary, mutant isoforms were not able to respond to oxidative stress. High mitochondrial calcium concentration and increased H2O2 induced apoptosis were found in fibroblasts derived from one patient as compared to controls.C19orf12 protein is a 17kDa mitochondrial membrane-associated protein whose function is still unknown. Our in silico investigation suggests that, the glycine zipper motifs of C19orf12 form helical regions spanning the membrane. The N- and C-terminal regions with respect to the transmembrane portion, on the contrary, are predicted to rearrange in a structural domain, which is homologues to the N-terminal regulatory domain of the magnesium transporter MgtE, suggesting that C19orf12 may act as a regulatory protein for human MgtE transporters. The mutations here described affect respectively one glycine residue of the glycine zipper motifs, which are involved in dimerization of transmembrane helices and predicted to impair the correct localization of the protein into the membranes, and one residue present in the regulatory domain, which is important for protein-protein interaction.

  2. Cinder creative coding cookbook

    CERN Document Server

    Madeira, Rui

    2013-01-01

    Full of easytofollow recipes and images that will teach powerful techniques and algorithms, building from basic projects to challenging applications. This book is for artists, designers, and programmers who have previous knowledge of C++, but not necessarily of Cinder.

  3. Source Code Generator Based on Dynamic Frames

    Directory of Open Access Journals (Sweden)

    Danijel Radošević

    2011-06-01

    Full Text Available Normal 0 21 false false false HR X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Obična tablica"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} This paper presents the model of source code generator based on dynamic frames. The model is named as the SCT model because if its three basic components: Specification (S, which describes the application characteristics, Configuration (C, which describes the rules for building applications, and Templates (T, which refer to application building blocks. The process of code generation dynamically creates XML frames containing all building elements (S, C ant T until final code is produced. This approach is compared to existing XVCL frames based model for source code generating. The SCT model is described by both XML syntax and the appropriate graphical elements. The SCT model is aimed to build complete applications, not just skeletons. The main advantages of the presented model are its textual and graphic description, a fully configurable generator, and the reduced overhead of the generated source code. The presented SCT model is shown on development of web application example in order to demonstrate its features and justify our design choices.

  4. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory textto algebraic coding theory. In the first chapter, you'll gain insideknowledge of coding fundamentals, which is essential for a deeperunderstanding of state-of-the-art coding systems.This book is a quick reference for those who are unfamiliar withthis topic, as well as for use with specific applications such as cryptographyand communication. Linear error-correcting block codesthrough elementary principles span eleven chapters of the text.Cyclic codes, some finite field algebra, Goppa codes, algebraic decodingalgorithms, and applications in public-key cryptography andsecret-key cryptography are discussed, including problems and solutionsat the end of each chapter. Three appendices cover the Gilbertbound and some related derivations, a derivation of the Mac-Williams' identities based on the probability of undetected error,and two important tools for algebraic decoding-namely, the finitefield Fourier transform and the Euclidean algorithm for polynomials.

  5. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-01-01

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine. PMID:18998785

  6. Els codis socials de conducta: notes històriques sobre la civilitat i l’educació cívica Social codes of conduct: historical notes on civic-mindedness and civic education En torno a los códigos sociales de conducta. Algunas notas históricas sobre la civilidad y la educación cívica

    Directory of Open Access Journals (Sweden)

    Félix F. Santolaria Sierra

    2011-12-01

    Full Text Available L'article intenta reflexionar el tema de l'educació per a la ciutadania des d'una perspectiva històrica, tot centrant-se en el nucli dels codis socials de conducta, com una part de les virtuts cíviques i del substrat sociocultural i moral previ que sustenta la vida comunitària pròpia. Es presenta l'obra històrica de Norbert Elias, entesa com a part del model historiogràfic de la narrativa de les emocions i de la teoria de la modernització i del procés civilitzador dins de la sociologia històrica. A més, s'aporten estudis per a la discussió crítica d'aquests models i teories des de la dimensió temporal (cronològica, la funcional i la logicoconceptual. _____________________________________________ L’article tente de réfléchir sur le thème de l’éducation à la citoyenneté dans une perspective historique, tout en se centrant sur le noyau des codes de conduite sociaux, comme faisant partie des vertus civiques et du substrat socioculturel et moral préalable qui sustente la vie communautaire. Nous présentons l’oeuvre historique de Norbert Elias, comprise comme partie du modèle historiographique de la narration des émotions, de la théorie de la modernisation et du processus civilisateur au sein de la sociologie historique. En outre, nous apportons des études pour la discussion critique de ces modèles et théories dans la perspective des dimensions temporelle (chronologique, fonctionnelle et logico-conceptuelle.The aim of this paper is to reflect on the topic of citizenship education from a historical perspective. We focus on the central theme of social codes of conduct, as part of the civic virtues and past sociocultural and moral foundations that support the life of the community itself. We present the historical work of Norbert Elias, which is considered to be part of the historiographic model of emotional narrative and the theory of modernization and the civilizing process in historical sociology. In addition, we

  7. Low complexity hevc intra coding

    OpenAIRE

    Ruiz Coll, José Damián

    2016-01-01

    Over the last few decades, much research has focused on the development and optimization of video codecs for media distribution to end-users via the Internet, broadcasts or mobile networks, but also for videoconferencing and for the recording on optical disks for media distribution. Most of the video coding standards for delivery are characterized by using a high efficiency hybrid schema, based on inter-prediction coding for temporal picture decorrelation, and intra-prediction coding for spat...

  8. High performance scalable image coding

    Institute of Scientific and Technical Information of China (English)

    Gan Tao; He Yanmin; Zhu Weile

    2007-01-01

    A high performance scalable image coding algorithm is proposed. The salient features of this algorithm are the ways to form and locate the significant clusters. Thanks to the list structure, the new coding algorithm achieves fine fractional bit-plane coding with negligible additional complexity. Experiments show that it performs comparably or better than the state-of-the-art coders. Furthermore, the flexible codec supports both quality and resolution scalability, which is very attractive in many network applications.

  9. Numerical Coding of Nominal Data

    OpenAIRE

    Gniazdowski, Zenon; GRABOWSKI Michal

    2016-01-01

    In this paper, a novel approach for coding nominal data is proposed. For the given nominal data, a rank in a form of complex number is assigned. The proposed method does not lose any information about the attribute and brings other properties previously unknown. The approach based on these knew properties can been used for classification. The analyzed example shows that classification with the use of coded nominal data or both numerical as well as coded nominal data is more effective than the...

  10. BILINEAR FORMS AND LINEAR CODES

    Institute of Scientific and Technical Information of China (English)

    高莹

    2004-01-01

    Abraham Lempel et al[1] made a connection between linear codes and systems of bilinear forms over finite fields. In this correspondence, a new simple proof of a theorem in [1] is presented; in addition, the encoding process and the decoding procedure of RS codes are simplified via circulant matrices. Finally, the results show that the correspondence between bilinear forms and linear codes is not unique.

  11. Prefix Code Translation by Mapping

    Institute of Scientific and Technical Information of China (English)

    蒋贤春

    1994-01-01

    This paper introduces a new way of prefix code translation.It helps to finish the whole translation by mapping once (only one comparison instruction is needed for getting the length of prefix code),and returns the original data and the length of prefix code element.The decoding time is only about four times as many as the time accessing original data directly.

  12. Generalized PCM coding of Images

    OpenAIRE

    Prades Nebot, José; MORBEE, MARLEEN; DELP, EDWARD

    2012-01-01

    Pulse-code modulation (PCM) with embedded quantization allows the rate of the PCM bitstream to be reduced by simply removing a fixed number of least significant bits from each codeword. Although this source coding technique is extremely simple, it has poor coding efficiency. In this paper, we present a generalized PCM (GPCM) algorithm for images that simply removes bits from each codeword. In contrast to PCM, however, the number and the specific bits that a GPCM encoder removes in each cod...

  13. ACE spectrum of LDPC codes

    Directory of Open Access Journals (Sweden)

    Vukobratović Dejan

    2006-01-01

    Full Text Available Construction of short-length LDPC codes with good, both waterfall and error-floor, behavior is still an attractive research problem. Recently proposed construction algorithms in this field are based on remarkably simple ideas, but yet, their effectiveness can still be questioned. In this paper we investigate a novel measure of goodness of a given LDPC code namely its ACE spectrum, based on a previously introduced ACE metrics associated with each cycle in LDPC code graph.

  14. Ethical codes in business practice

    OpenAIRE

    Kobrlová, Marie

    2013-01-01

    The diploma thesis discusses the issues of ethics and codes of ethics in business. The theoretical part defines basic concepts of ethics, presents its historical development and the methods and tools of business ethics. It also focuses on ethical codes and the area of law and ethics. The practical part consists of a quantitative survey, which provides views of selected business entities of business ethics and the use of codes of ethics in practice.

  15. Explosive Formulation Code Naming SOP

    Energy Technology Data Exchange (ETDEWEB)

    Martz, H. E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-09-19

    The purpose of this SOP is to provide a procedure for giving individual HME formulations code names. A code name for an individual HME formulation consists of an explosive family code, given by the classified guide, followed by a dash, -, and a number. If the formulation requires preparation such as packing or aging, these add additional groups of symbols to the X-ray specimen name.

  16. Combinatorial aspects of code loops

    OpenAIRE

    Vojtěchovský, Petr

    2007-01-01

    The existence and uniqueness (up to equivalence) of code loops was first established by R. Griess. Nevertheless, the explicit construction of code loops remained open until T. Hsu introduced the notion of symplectic cubic spaces and their Frattini extensions, and pointed out how the construction of code loops followed from the (purely combinatorial) result of O. Chein and E. Goodaire. Within this paper, we focus on their combinatorial construction and prove a more general result using the lan...

  17. The DIT nuclear fuel assembly physics design code

    International Nuclear Information System (INIS)

    The DIT code is the Combustion Engineering, Inc. (C-E) nuclear fuel assembly design code. It belongs to a class of codes, all similar in structure and strategy, that may be characterized by the spectrum and spatial calculations being performed in two dimensions and in a single job step for the entire assembly. The forerunner of this class of codes is the United Kingdom Atomic Energy Authority WIMS code, the first version of which was completed 25 yr ago. The structure and strategy of assembly spectrum codes have remained remarkably similar to the original concept thus proving its usefulness. As other organizations, including C-E, have developed their own versions of the concept, many important variations have been added that significantly influence the accuracy and performance of the resulting computational tool. Those features, which are unique to the DIT code and which might be of interest to the community of fuel assembly physics design code users and developers, are described and discussed

  18. Astrophysics Source Code Library Enhancements

    CERN Document Server

    Hanisch, Robert J; Berriman, G Bruce; DuPrie, Kimberly; Mink, Jessica; Nemiroff, Robert J; Schmidt, Judy; Shamir, Lior; Shortridge, Keith; Taylor, Mark; Teuben, Peter J; Wallin, John

    2014-01-01

    The Astrophysics Source Code Library (ASCL; ascl.net) is a free online registry of codes used in astronomy research; it currently contains over 900 codes and is indexed by ADS. The ASCL has recently moved a new infrastructure into production. The new site provides a true database for the code entries and integrates the WordPress news and information pages and the discussion forum into one site. Previous capabilities are retained and permalinks to ascl.net continue to work. This improvement offers more functionality and flexibility than the previous site, is easier to maintain, and offers new possibilities for collaboration. This presentation covers these recent changes to the ASCL.

  19. Should you learn to code?

    CERN Document Server

    Team, The Hyperink

    2013-01-01

    On May 15, 2012 Jeff Atwood (co-founder of Stack Overflow) published a blog post titled "Please Don't Learn to Code" in response to Mayor Mike Bloomberg's resolution to learn how to code in 2012. In that post he argues against "learning to code just for the sake of learning how to code," a sentiment that sparked an active online debate. This book is a compilation of several different perspectives on that debate. Should programming be taught to every student as part of their core curriculum, similar to mathematics, reading, and writing? Should every working professional take time to learn a

  20. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  1. Programming Entity Framework Code First

    CERN Document Server

    Lerman, Julia

    2011-01-01

    Take advantage of the Code First data modeling approach in ADO.NET Entity Framework, and learn how to build and configure a model based on existing classes in your business domain. With this concise book, you'll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration. Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you're working with an exis

  2. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  3. CH-TRU Waste Content Codes

    Energy Technology Data Exchange (ETDEWEB)

    Washington TRU Solutions LLC

    2008-01-16

    The CH-TRU Waste Content Codes (CH-TRUCON) document describes the inventory of the U.S. Department of Energy (DOE) CH-TRU waste within the transportation parameters specified by the Contact-Handled Transuranic Waste Authorized Methods for Payload Control (CH-TRAMPAC). The CH-TRAMPAC defines the allowable payload for the Transuranic Package Transporter-II (TRUPACT-II) and HalfPACT packagings. This document is a catalog of TRUPACT-II and HalfPACT authorized contents and a description of the methods utilized to demonstrate compliance with the CH-TRAMPAC. A summary of currently approved content codes by site is presented in Table 1. The CH-TRAMPAC describes "shipping categories" that are assigned to each payload container. Multiple shipping categories may be assigned to a single content code. A summary of approved content codes and corresponding shipping categories is provided in Table 2, which consists of Tables 2A, 2B, and 2C. Table 2A provides a summary of approved content codes and corresponding shipping categories for the "General Case," which reflects the assumption of a 60-day shipping period as described in the CH-TRAMPAC and Appendix 3.4 of the CH-TRU Payload Appendices. For shipments to be completed within an approximately 1,000-mile radius, a shorter shipping period of 20 days is applicable as described in the CH-TRAMPAC and Appendix 3.5 of the CH-TRU Payload Appendices. For shipments to WIPP from Los Alamos National Laboratory (LANL), Nevada Test Site, and Rocky Flats Environmental Technology Site, a 20-day shipping period is applicable. Table 2B provides a summary of approved content codes and corresponding shipping categories for "Close-Proximity Shipments" (20-day shipping period). For shipments implementing the controls specified in the CH-TRAMPAC and Appendix 3.6 of the CH-TRU Payload Appendices, a 10-day shipping period is applicable. Table 2C provides a summary of approved content codes and corresponding shipping categories for "Controlled Shipments

  4. The use of beam code in external radiotherapy; Utilisation du code beam en radiotherapie externe

    Energy Technology Data Exchange (ETDEWEB)

    Guillerminet, C.; Gschwind, R.; Makovicka, L. [CREST - UMR 6000 CNRS, 25 - Montbeliard (France)

    2003-07-01

    This code, in constant evolution, has several assets because it allows in one hand to better characterize the beams at the energy and angular level of accelerators at medical use; these data being accessible only by simulation and on the other hand to establish a three dimensional dose calculation fro any phantom. The limit factors are the calculation time, the size of voxels need important dimension tables for the data storage, and the compatibility between the code and the different images formats. (N.C.)

  5. The multipath and SNR Quality in civil code L2

    Science.gov (United States)

    Polezel, W. G.; Souza, E. M.; Monico, J. F.

    2007-12-01

    The new generation of GPS satellites, with the addition of the new L2C civil code, may provide to the users better positioning capabilities. The new code in the L2 may increase the signal robustness, improve resistance to interference, reduce tracking noise and consequently, improve accuracy and provide better positioning inside buildings and in wooded areas. The second civil frequency code will eliminate the need of using fragile semi- codeless tracking techniques currently used in connection with L2. The L2C has a different structure that allows civil and military share the same code. L2C owns two codes of different length: moderate code (CM) and long code (CL). The CM was chosen to have 10.230 chips repeated to every 20 millisecond. The CL was chosen to have 767250 chips with period of 1.5 second. The main reasons for these choices were due to excellent correlation properties. Furthermore, L2C enhances performance by having no data modulation on CL code, which improves, among others, the threshold tracking performance. Comparing the L2C acquisition with the C/A, the CM code is ten times longer than the C/A and the two components have half the total power. This is an important feature for many low-power applications. Although this signal has several advantages, some investigations about its performance are necessary, mainly about the provided accuracy under some effects, for example, multipath. Thus, this paper aims to analyze the L2C signal, as well as its quality using some parameters, such as Signal to Noise Ratio (SNR) and multipath level (MP). The experiment was realized at Sao Paulo State University UNESP in Presidente Prudente, Brazil. The data were collected by two receivers of different brands, both able to collect the L2C signal, and connected to the same antenna, thought the use of a splitter. The results showed that the MP and SNR values were better for the modernized satellites. Furthermore, the SNR values of the two receivers were similar while the

  6. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  7. Patched Conic Trajectory Code

    Science.gov (United States)

    Park, Brooke Anderson; Wright, Henry

    2012-01-01

    PatCon code was developed to help mission designers run trade studies on launch and arrival times for any given planet. Initially developed in Fortran, the required inputs included launch date, arrival date, and other orbital parameters of the launch planet and arrival planets at the given dates. These parameters include the position of the planets, the eccentricity, semi-major axes, argument of periapsis, ascending node, and inclination of the planets. With these inputs, a patched conic approximation is used to determine the trajectory. The patched conic approximation divides the planetary mission into three parts: (1) the departure phase, in which the two relevant bodies are Earth and the spacecraft, and where the trajectory is a departure hyperbola with Earth at the focus; (2) the cruise phase, in which the two bodies are the Sun and the spacecraft, and where the trajectory is a transfer ellipse with the Sun at the focus; and (3) the arrival phase, in which the two bodies are the target planet and the spacecraft, where the trajectory is an arrival hyperbola with the planet as the focus.

  8. THE MCNPX MONTE CARLO RADIATION TRANSPORT CODE

    Energy Technology Data Exchange (ETDEWEB)

    WATERS, LAURIE S. [Los Alamos National Laboratory; MCKINNEY, GREGG W. [Los Alamos National Laboratory; DURKEE, JOE W. [Los Alamos National Laboratory; FENSIN, MICHAEL L. [Los Alamos National Laboratory; JAMES, MICHAEL R. [Los Alamos National Laboratory; JOHNS, RUSSELL C. [Los Alamos National Laboratory; PELOWITZ, DENISE B. [Los Alamos National Laboratory

    2007-01-10

    MCNPX (Monte Carlo N-Particle eXtended) is a general-purpose Monte Carlo radiation transport code with three-dimensional geometry and continuous-energy transport of 34 particles and light ions. It contains flexible source and tally options, interactive graphics, and support for both sequential and multi-processing computer platforms. MCNPX is based on MCNP4B, and has been upgraded to most MCNP5 capabilities. MCNP is a highly stable code tracking neutrons, photons and electrons, and using evaluated nuclear data libraries for low-energy interaction probabilities. MCNPX has extended this base to a comprehensive set of particles and light ions, with heavy ion transport in development. Models have been included to calculate interaction probabilities when libraries are not available. Recent additions focus on the time evolution of residual nuclei decay, allowing calculation of transmutation and delayed particle emission. MCNPX is now a code of great dynamic range, and the excellent neutronics capabilities allow new opportunities to simulate devices of interest to experimental particle physics; particularly calorimetry. This paper describes the capabilities of the current MCNPX version 2.6.C, and also discusses ongoing code development.

  9. CHEETAH: A next generation thermochemical code

    Energy Technology Data Exchange (ETDEWEB)

    Fried, L.; Souers, P.

    1994-11-01

    CHEETAH is an effort to bring the TIGER thermochemical code into the 1990s. A wide variety of improvements have been made in Version 1.0. We have improved the robustness and ease of use of TIGER. All of TIGER`s solvers have been replaced by new algorithms. We find that CHEETAH solves a wider variety of problems with no user intervention (e.g. no guesses for the C-J state) than TIGER did. CHEETAH has been made simpler to use than TIGER; typical use of the code occurs with the new standard run command. CHEETAH will make the use of thermochemical codes more attractive to practical explosive formulators. We have also made an extensive effort to improve over the results of TIGER. CHEETAH`s version of the BKW equation of state (BKWC) is able to accurately reproduce energies from cylinder tests; something that other BKW parameter sets have been unable to do. Calculations performed with BKWC execute very quickly; typical run times are under 10 seconds on a workstation. In the future we plan to improve the underlying science in CHEETAH. More accurate equations of state will be used in the gas and the condensed phase. A kinetics capability will be added to the code that will predict reaction zone thickness. Further ease of use features will eventually be added; an automatic formulator that adjusts concentrations to match desired properties is planned.

  10. Nuclear science references coding manual

    Energy Technology Data Exchange (ETDEWEB)

    Ramavataram, S.; Dunford, C.L.

    1996-08-01

    This manual is intended as a guide to Nuclear Science References (NSR) compilers. The basic conventions followed at the National Nuclear Data Center (NNDC), which are compatible with the maintenance and updating of and retrieval from the Nuclear Science References (NSR) file, are outlined. In Section H, the structure of the NSR file such as the valid record identifiers, record contents, text fields as well as the major TOPICS for which are prepared are enumerated. Relevant comments regarding a new entry into the NSR file, assignment of , generation of and linkage characteristics are also given in Section II. In Section III, a brief definition of the Keyword abstract is given followed by specific examples; for each TOPIC, the criteria for inclusion of an article as an entry into the NSR file as well as coding procedures are described. Authors preparing Keyword abstracts either to be published in a Journal (e.g., Nucl. Phys. A) or to be sent directly to NNDC (e.g., Phys. Rev. C) should follow the illustrations in Section III. The scope of the literature covered at the NNDC, the categorization into Primary and Secondary sources, etc., is discussed in Section IV. Useful information regarding permitted character sets, recommended abbreviations, etc., is given under Section V as Appendices.

  11. Upgrade of FUMACS code package

    International Nuclear Information System (INIS)

    The FUMACS code package (an acronym of FUel MAnagement Code System) was developed at Rudjer Boskovic Institute in year 1991 with the aim to enable in-core fuel management analysis of the NPP Krsko core for nominal (full power) conditions. The modernization and uprating of the NPP Krsko core from 1876 to 1994 MW (th) performed in year 2000 resulted in the change of operating conditions. The old version of the FUMACS code package would not model properly the NPP Krsko core for the new operating conditions. The upgrade of the FUMACS code package to enable the modeling of the NPP Krsko core for uprated conditions and longer cycles required modifications of master files, libraries and codes. In order to make the code package more user friendly, Windows (95/98/NT) compatible version of the code package, with incorporated graphical user interface has been developed. The new version of the code package has been verified and validated for new operating conditions through modeling and comparison of results with referent design of a number of 12-month and 18-month operating cycles.(author)

  12. Accident consequence assessment code development

    International Nuclear Information System (INIS)

    This paper describes the new computer code system, OSCAAR developed for off-site consequence assessment of a potential nuclear accident. OSCAAR consists of several modules which have modeling capabilities in atmospheric transport, foodchain transport, dosimetry, emergency response and radiological health effects. The major modules of the consequence assessment code are described, highlighting the validation and verification of the models. (author)

  13. Recommendations for ECG diagnostic coding

    NARCIS (Netherlands)

    Bonner, R.E.; Caceres, C.A.; Cuddy, T.E.; Meijler, F.L.; Milliken, J.A.; Rautaharju, P.M.; Robles de Medina, E.O.; Willems, J.L.; Wolf, H.K.; Working Group 'Diagnostic Codes'

    1978-01-01

    The Oxford dictionary defines code as "a body of laws so related to each other as to avoid inconsistency and overlapping". It is obvious that natural language with its high degree of ambiguity does not qualify as a code in the sense of this definition. Everyday experiences provide ample evidence tha

  14. Using NAEYC's Code of Ethics.

    Science.gov (United States)

    Young Children, 1995

    1995-01-01

    Considers how to deal with an ethical dilemma concerning a caregiver's dislike for a child. Recognizes that no statement in NAEYC's Code of Ethical Conduct requires that a professional must like each child, and presents some ideals and principles from the code that may guide professionals through similar situations. (BAC)

  15. Cyclic Codes of Length 2

    Indian Academy of Sciences (India)

    Manju Pruthi

    2001-11-01

    In this paper explicit expressions of + 1 idempotents in the ring $R = F_q[X]/\\langle X^{2^m}-1\\rangle$ are given. Cyclic codes of length 2 over the finite field , of odd characteristic, are defined in terms of their generator polynomials. The exact minimum distance and the dimension of the codes are obtained.

  16. Revised Safety Code A2

    CERN Document Server

    SC Secretariat

    2005-01-01

    Please note that the revised Safety Code A2 (Code A2 rev.) entitled "REPORTING OF ACCIDENTS AND NEAR MISSES" is available on the web at the following url: https://edms.cern.ch/document/335502/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  17. Quantum Convolutional Error Correction Codes

    OpenAIRE

    Chau, H. F.

    1998-01-01

    I report two general methods to construct quantum convolutional codes for quantum registers with internal $N$ states. Using one of these methods, I construct a quantum convolutional code of rate 1/4 which is able to correct one general quantum error for every eight consecutive quantum registers.

  18. Flow Analysis of Code Customizations

    DEFF Research Database (Denmark)

    Hessellund, Anders; Sestoft, Peter

    2008-01-01

    Inconsistency between metadata and code customizations is a major concern in modern, configurable enterprise systems. The increasing reliance on metadata, in the form of XML files, and code customizations, in the form of Java files, has led to a hybrid development platform. The expected consistency...

  19. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions with a...

  20. ACCELERATION PHYSICS CODE WEB REPOSITORY.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.

    2006-06-26

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  1. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  2. Mobile Konami Code Source Files

    OpenAIRE

    Boomgaarden, Jacob; Corney, Joshua

    2015-01-01

    An archive file of Android source code projects available for import into Android Studio. These projects were utilized in the research for the following thesis: MOBILE KONAMI CODES: ANALYSIS OF ANDROID MALWARE SERVICES UTILIZING SENSOR AND RESOURCE-BASED STATE CHANGES. This thesis may be found here: http://calhoun.nps.edu/handle/10945/45163

  3. Ombuds’ corner: Code of Conduct and change of behaviour

    CERN Multimedia

    Vincent Vuillemin

    2012-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Is our Code of Conduct actually effective in influencing behaviour? Research studies suggest that codes, while necessary, are insufficient as a means of encouraging respectful behaviour among employees. Codes are only a potential means of influencing employee behaviour. For a Code of Conduct to be effective, several elements must be in place. Firstly, there needs to be communication and effective training using relevant examples to make the code real. It should be embraced by the leaders and accepted by the personnel. Finally, it should be embedded in the CERN culture and not seen as a separate entity, which requires serious discussions to raise awareness. In addition, every c...

  4. Non-Protein Coding RNAs

    CERN Document Server

    Walter, Nils G; Batey, Robert T

    2009-01-01

    This book assembles chapters from experts in the Biophysics of RNA to provide a broadly accessible snapshot of the current status of this rapidly expanding field. The 2006 Nobel Prize in Physiology or Medicine was awarded to the discoverers of RNA interference, highlighting just one example of a large number of non-protein coding RNAs. Because non-protein coding RNAs outnumber protein coding genes in mammals and other higher eukaryotes, it is now thought that the complexity of organisms is correlated with the fraction of their genome that encodes non-protein coding RNAs. Essential biological processes as diverse as cell differentiation, suppression of infecting viruses and parasitic transposons, higher-level organization of eukaryotic chromosomes, and gene expression itself are found to largely be directed by non-protein coding RNAs. The biophysical study of these RNAs employs X-ray crystallography, NMR, ensemble and single molecule fluorescence spectroscopy, optical tweezers, cryo-electron microscopy, and ot...

  5. Best practices for code release

    Science.gov (United States)

    Berriman, G. Bruce

    2016-01-01

    In this talk, I want to describe what I think are the best practices for releasing code and having it adopted by end users. Make sure your code is licensed, so users will know how the software can be used and modified, and place your code in a public repository that (and make sure that you follow institutional policies in doing this). Yet licensing and releasing code are not enough: the code must be organized and documented so users can understand what it does, what its limitations are, and how to build and use it. I will describe what I think are best practices in developing the content to support release, including tutorials, design documents, specifications of interfaces and so on. Much of what I have learned on based on ten years of experience in supporting releases of the Montage Image Mosaic Engine.

  6. PARAVT: Parallel Voronoi tessellation code

    Science.gov (United States)

    González, R. E.

    2016-10-01

    In this study, we present a new open source code for massive parallel computation of Voronoi tessellations (VT hereafter) in large data sets. The code is focused for astrophysical purposes where VT densities and neighbors are widely used. There are several serial Voronoi tessellation codes, however no open source and parallel implementations are available to handle the large number of particles/galaxies in current N-body simulations and sky surveys. Parallelization is implemented under MPI and VT using Qhull library. Domain decomposition takes into account consistent boundary computation between tasks, and includes periodic conditions. In addition, the code computes neighbors list, Voronoi density, Voronoi cell volume, density gradient for each particle, and densities on a regular grid. Code implementation and user guide are publicly available at https://github.com/regonzar/paravt.

  7. Continuous Non-malleable Codes

    DEFF Research Database (Denmark)

    Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus;

    2014-01-01

    -malleable codes where the adversary only is allowed to tamper a single time with an encoding. We show how to construct continuous non-malleable codes in the common split-state model where an encoding consist of two parts and the tampering can be arbitrary but has to be independent with both parts. Our main......Non-malleable codes are a natural relaxation of error correcting/ detecting codes that have useful applications in the context of tamper resilient cryptography. Informally, a code is non-malleable if an adversary trying to tamper with an encoding of a given message can only leave it unchanged...... or modify it to the encoding of a completely unrelated value. This paper introduces an extension of the standard non-malleability security notion - so-called continuous non-malleability - where we allow the adversary to tamper continuously with an encoding. This is in contrast to the standard notion of non...

  8. Super Special Codes using Super Matrices

    CERN Document Server

    Kandasamy, W B Vasantha; Ilanthenral, K

    2010-01-01

    The new classes of super special codes are constructed in this book using the specially constructed super special vector spaces. These codes mainly use the super matrices. These codes can be realized as a special type of concatenated codes. This book has four chapters. In chapter one basic properties of codes and super matrices are given. A new type of super special vector space is constructed in chapter two of this book. Three new classes of super special codes namely, super special row code, super special column code and super special codes are introduced in chapter three. Applications of these codes are given in the final chapter.

  9. Lowering the Error Floor of LDPC Codes Using Cyclic Liftings

    CERN Document Server

    Asvadi, Reza; Ahmadian-Attari, Mahmoud

    2010-01-01

    Cyclic liftings are proposed to lower the error floor of low-density parity-check (LDPC) codes. The liftings are designed to eliminate dominant trapping sets of the base code by removing the short cycles which form the trapping sets. We derive a necessary and sufficient condition for the cyclic permutations assigned to the edges of a cycle $c$ of length $\\ell(c)$ in the base graph such that the inverse image of $c$ in the lifted graph consists of only cycles of length strictly larger than $\\ell(c)$. The proposed method is universal in the sense that it can be applied to any LDPC code over any channel and for any iterative decoding algorithm. It also preserves important properties of the base code such as degree distributions, encoder and decoder structure, and in some cases, the code rate. The proposed method is applied to both structured and random codes over the binary symmetric channel (BSC). The error floor improves consistently by increasing the lifting degree, and the results show significant improvemen...

  10. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  11. Antisense and sense expression of cDNA coding for CYP73A15, a class II cinnamate 4-hydroxylase, leads to a delayed and reduced production of lignin in tobacco

    Science.gov (United States)

    Blee, K.; Choi, J. W.; O'Connell, A. P.; Jupe, S. C.; Schuch, W.; Lewis, N. G.; Bolwell, G. P.

    2001-01-01

    A number of plant species contain the class II of genes encoding the cytochrome P450, CYP73, the cognate protein of which cinnamic acid 4-hydroxylase, is the second enzyme of the phenylpropanoid pathway. In order to begin to determine possible functionality, tobacco has been transformed with a truncated French bean class II cinnamate hydroxylase (CYP73A15) in the sense and antisense orientations. Signals for C4H protein could be detected in vascular tissue from wild-type plants using heterologous probes. The transformed plants showed a normal phenotype, even though detectable C4H protein was much reduced in tissue prints. Young propagated transformants displayed a range of reduced C4H activities, as well as either reduced or no phloroglucinol-stainable lignin. However, all mature tobacco plants showed the accumulation of lignin, even though its deposition was apparently delayed. This was not due to induction of tyrosine ammonia-lyase activity, which was not detected, but instead it is presumed due to sufficient C4H residual activity. Analysis of the lignin content of the plants showed reductions of up to 30% with a slightly reduced syringyl to guaiacyl ratio as compared to wild type. This reduction level was favourable in comparison with some other targets in the lignification pathway that have been manipulated including that of class I cinnamate 4-hydroxylase. It is proposed that the class II cinnamate 4-hydroxylase might also function in lignification in a number of species including French bean and tobacco, based on these data.

  12. Detecting non-coding selective pressure in coding regions

    Directory of Open Access Journals (Sweden)

    Blanchette Mathieu

    2007-02-01

    Full Text Available Abstract Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements.

  13. MEMOPS: data modelling and automatic code generation.

    Science.gov (United States)

    Fogh, Rasmus H; Boucher, Wayne; Ionides, John M C; Vranken, Wim F; Stevens, Tim J; Laue, Ernest D

    2010-03-25

    In recent years the amount of biological data has exploded to the point where much useful information can only be extracted by complex computational analyses. Such analyses are greatly facilitated by metadata standards, both in terms of the ability to compare data originating from different sources, and in terms of exchanging data in standard forms, e.g. when running processes on a distributed computing infrastructure. However, standards thrive on stability whereas science tends to constantly move, with new methods being developed and old ones modified. Therefore maintaining both metadata standards, and all the code that is required to make them useful, is a non-trivial problem. Memops is a framework that uses an abstract definition of the metadata (described in UML) to generate internal data structures and subroutine libraries for data access (application programming interfaces--APIs--currently in Python, C and Java) and data storage (in XML files or databases). For the individual project these libraries obviate the need for writing code for input parsing, validity checking or output. Memops also ensures that the code is always internally consistent, massively reducing the need for code reorganisation. Across a scientific domain a Memops-supported data model makes it easier to support complex standards that can capture all the data produced in a scientific area, share them among all programs in a complex software pipeline, and carry them forward to deposition in an archive. The principles behind the Memops generation code will be presented, along with example applications in Nuclear Magnetic Resonance (NMR) spectroscopy and structural biology.

  14. Detecting overlapping coding sequences in virus genomes

    Directory of Open Access Journals (Sweden)

    Brown Chris M

    2006-02-01

    Full Text Available Abstract Background Detecting new coding sequences (CDSs in viral genomes can be difficult for several reasons. The typically compact genomes often contain a number of overlapping coding and non-coding functional elements, which can result in unusual patterns of codon usage; conservation between related sequences can be difficult to interpret – especially within overlapping genes; and viruses often employ non-canonical translational mechanisms – e.g. frameshifting, stop codon read-through, leaky-scanning and internal ribosome entry sites – which can conceal potentially coding open reading frames (ORFs. Results In a previous paper we introduced a new statistic – MLOGD (Maximum Likelihood Overlapping Gene Detector – for detecting and analysing overlapping CDSs. Here we present (a an improved MLOGD statistic, (b a greatly extended suite of software using MLOGD, (c a database of results for 640 virus sequence alignments, and (d a web-interface to the software and database. Tests show that, from an alignment with just 20 mutations, MLOGD can discriminate non-overlapping CDSs from non-coding ORFs with a typical accuracy of up to 98%, and can detect CDSs overlapping known CDSs with a typical accuracy of 90%. In addition, the software produces a variety of statistics and graphics, useful for analysing an input multiple sequence alignment. Conclusion MLOGD is an easy-to-use tool for virus genome annotation, detecting new CDSs – in particular overlapping or short CDSs – and for analysing overlapping CDSs following frameshift sites. The software, web-server, database and supplementary material are available at http://guinevere.otago.ac.nz/mlogd.html.

  15. 结球甘蓝ARC1与Exo70A1编码区cDNA的克隆及进化分析%Cloning and Phylogenetic Analysis of cDNA Sequences Coding for ARC1 and Exo70A1 in Brassica oleracesvar.capitata L.

    Institute of Scientific and Technical Information of China (English)

    杨丹; 廉小平; 周燕; 张贺翠; 杜丹; 高启国; 任雪松; 朱利泉

    2016-01-01

    Interaction between ARC1 and Exo70A1 in Brassica is a key point of self-incompatibility(SI)signal transduction. In order to study the evolutionary relationship of ARC1 and Exo70A1 from 10 cultivars of SI head cabbages developed in recent years,we successfully cloned and sequenced cDNAs of ARC1 and Exo70A1. Furthermore,by bioinformatics,we had mutation and evolutionary analysis of those coding region sequences,including interaction region and non-interaction regions of ARC1-Exo70A1 from the 10 cabbages and prior published 83 ARC1 and 73 Exo70A1 sequences. The results revealed that:1)The coding nucleic acid sequences of ARC1 and Exo70A1 from the 10 cabbage materials presented parallel evolutionary relationships,and belonged to the Brassica branch. 2)The evolution rate of coding sequence of ARC1 was faster than Exo70A1. 3)The interaction coding region of ARC1-Exo70A1 was obviously in the progress of co-evolution,while the non-interaction coding area of ARC1-Exo70A1 showed significant differentiation rate in evolution. 4)The evolutionary rate of interaction coding area was faster than non-interaction coding region.%在甘蓝自交不亲和信号传导过程中,ARC1与Exo70A1的相互作用起着承上启下的关键作用。为了研究10种自交不亲和结球甘蓝材料ARC1和Exo70A1的进化关系,对其编码区cDNA进行了克隆和测序;在此基础上采用生物信息学方法,对这10种材料和前人已发表的83条ARC1和73条Exo70A1的相关序列的ARC1-Exo70A1的互作区和非互作区编码序列进行了变异和进化分析。结果发现:(1)所选育的10种结球甘蓝材料的ARC1与Exo70A1的编码区核酸序列存在平行进化关系,且均聚类于芸薹属分支下;(2)ARC1比Exo70A1编码区序列进化速率快;(3)ARC1和Exo70A1互作编码区核酸序列存在明显的协同进化,而ARC1和Exo70A1非互作编码区核酸序列则在进化上呈现明显分异;(4)ARC1和Exo70A1互作编码区cDNA的

  16. QR Code Image Correction based on Corner Detection and Convex Hull Algorithm

    OpenAIRE

    Suran Kong

    2013-01-01

    Since the angular deviation produced when shooting a QR code image by a camera would cause geometric distortion of the QR code image, the traditional algorithm of QR code image correction would produce distortion. Therefore this paper puts forward the algorithm which combines corner detection with convex hull algorithm. Firstly, binaryzation of the collected QR code image with uneven light is obtained by the methods of local threshold and mathematical morphology. Next, the outline of the QR c...

  17. ABINIT: a computer code for matter

    International Nuclear Information System (INIS)

    The PAW (Projector Augmented Wave) method has been implemented in the ABINIT Code that computes electronic structures in atoms. This method relies on the simultaneous use of a set of auxiliary functions (in plane waves) and a sphere around each atom. This method allows the computation of systems including many atoms and gives the expression of energy, forces, stress... in terms of the auxiliary function only. We have generated atomic data for iron at very high pressure (over 200 GPa). We get a bcc-hcp transition around 10 GPa and the magnetic order disappears around 50 GPa. This method has been validated on a series of metals. The development of the PAW method has required a great effort for the massive parallelization of the ABINIT code. (A.C.)

  18. Optimizing Extender Code for NCSX Analyses

    International Nuclear Information System (INIS)

    Extender is a parallel C++ code for calculating the magnetic field in the vacuum region of a stellarator. The code was optimized for speed and augmented with tools to maintain a specialized NetCDF database. Two parallel algorithms were examined. An even-block work-distribution scheme was comparable in performance to a master-slave scheme. Large speedup factors were achieved by representing the plasma surface with a spline rather than Fourier series. The accuracy of this representation and the resulting calculations relied on the density of the spline mesh. The Fortran 90 module db access was written to make it easy to store Extender output in a manageable database. New or updated data can be added to existing databases. A generalized PBS job script handles the generation of a database from scratch

  19. Decodeurs rapides pour codes topologiques quantiques

    Science.gov (United States)

    Duclos-Cianci, Guillaume

    L'encodage topologique de l'information quantique a attire beaucoup d'attention, car c'est un modele qui semble propice a resister aux erreurs locales. Tout d'abord, le modele du calcul topologique est base sur la statistique anyonique non-Abelienne universelle et sur son controle. Des anyons indesirables peuvent apparaitre soudainement, en raison de fluctuations thermiques ou de processus virtuels. La presence de ces anyons peut corrompre l'information encodee, il est necessaire de les eliminer: la correction consiste a fusionner les defauts tout en preservant la topologie du systeme. Ensuite, dans le cas des codes topologiques, on doit aussi proteger l'information encodee dans la topologie. En effet, dans ces systemes, on n'a acces qu'a une fraction de l'information decrivant l'erreur. Elle est recueillie par des mesures et peut etre interpretee en termes de particules. Ces defauts peuplent le code et doivent etre annihiles adequatement dans le but de preserver l'information encodee. Dans ce memoire, nous proposons un algorithme efficace, appele decodeur, pouvant etre utilise dans les deux contextes decrits ci-haut. Pour y parvenir, cet algorithme s'inspire de methodes de renormalisation et de propagation de croyance. Il est exponentiellement plus rapide que les methodes deja existantes, etant de complexite O (ℓ2 log ℓ) en serie et, si on parallelise, O (log ℓ) en temps, contre O (ℓ6) pour les autres decodeurs. Le temps etant le facteur limitant dans le probleme du decodage, cette caracteristique est primordiale. De plus, il tolere une plus grande amplitude de bruit que les methodes existantes; il possede un seuil de ˜ 16.5% sur le canal depolarisant surpassant le seuil deja etabli de ˜ 15.5%. Finalement, il est plus versatile. En effet, en etant limite au code de Kitaev, on ne savait pas decoder les codes topologiques de maniere generale (e.g. codes de couleur). Or, le decodeur propose dans ce memoire peut traiter la grande classe des codes

  20. CYCLIC CODES OVER FORMAL POWER SERIES RINGS

    Institute of Scientific and Technical Information of China (English)

    Dougherty Steven T.; Liu Hongwei

    2011-01-01

    In this article, cyclic codes and negacyclic codes over formal power series rings are studied. The structure of cyclic codes over this class of rings is given, and the relationship between these codes and cyclic codes over finite chain rings is obtained. Using an isomorphism between cyclic and negacyclic codes over formal power series rings, the structure of negacyclic codes over the formal power series rings is obtained.

  1. Context-Based 2D-VLC Entropy Coder in AVS Video Coding Standard

    Institute of Scientific and Technical Information of China (English)

    Qiang Wang; De-Bin Zhao; Wen Gao

    2006-01-01

    In this paper, a Context-based 2D Variable Length Coding (C2DVLC) method for coding the transformed residuals in AVS video coding standard is presented. One feature in C2DVLC is the usage of multiple 2D-VLC tables and another feature is the usage of simple Exponential-Golomb codes. C2DVLC employs context-based adaptive multiple table coding to exploit the statistical correlation between DCT coefficients of one block for higher coding efficiency. ExpGolomb codes are applied to code the pairs of the run-length of zero coefficients and the nonzero coefficient for lower storage requirement. C2DVLC is a low complexity coder in terms of both computational time and memory requirement.The experimental results show that C2DVLC can gain 0.34dB in average for the tested videos when compared with the traditional 2D-VLC coding method like that used in MPEG-2. And compared with CAVLC in H.264/AVC, C2DVLC shows similar coding efficiency.

  2. Monastère autonome et vigilance particulière de l'Evêque diocésain : De l'interprétation du c. 615 du code de droit canonique

    OpenAIRE

    Bamberg, Anne

    2008-01-01

    Article d'abord paru en espagnol dans la revue Ius canonicum sous le titre Monasterio autónomo y vigilancia particular del Obispo diocesano. En torno a la interpretación del c. 615 del Código de Derecho Canónico. International audience Es en la materia de los monasterios llamados autónomos en la que el legislador canónico exige a los Obispos diocesanos una vigilancia particular. En efecto, cuando no hay jerarquía interna, el servicio de la autoridad puede fácilmente deslizarse hacia los...

  3. Isolation and sequence of cDNA clones coding for a member of the family of high mobility group proteins (HMG-T) in trout and analysis of HMG-T-mRNA's in trout tissues.

    OpenAIRE

    Pentecost, B T; Wright, J. M.; Dixon, G H

    1985-01-01

    A specific oligonucleotide has been used to isolate a cDNA prepared from the mRNA for a trout High Mobility Group (HMG) protein closely related to trout HMG-T and bovine HMG 1 and 2 proteins. The sequence isolated more closely resembles bovine HMG-1 than the previously sequenced HMG-T protein in regions corresponding to the N terminal half of the protein. Northern blot analysis at low stringency indicated that 2 related sequences are expressed in total trout testis mRNA. Southern blots of tot...

  4. cDNA cloning and transient expression of the Epstein-Barr virus-determined nuclear antigen EBNA3B in human cells and identification of novel transcripts from its coding region.

    OpenAIRE

    Kerdiles, B; Walls, D; Triki, H.; Perricaudet, M; Joab, I

    1990-01-01

    Recombinant plasmids containing sequences from the BamHI-E rightward reading frames 2a and 2b (BERF2a and 2b) of the Epstein-Barr virus (EBV) genome were isolated from a library of cDNA clones which had been previously made from the EBV B95-8 lymphoblastoid cell line (M. Bodescot, O. Brison, and M. Perricaudet, Nucleic Acids Res. 14:7103-7114, 1986). The characterization of these clones in combination with RNase mapping experiments led to the identification of one leftward and several rightwa...

  5. The Dit nuclear fuel assembly physics design code

    International Nuclear Information System (INIS)

    DIT is the Combustion Engineering, Inc. (C-E) nuclear fuel assembly design code. It belongs to a class of codes, all similar in structure and strategy, which may be characterized by the spectrum and spatial calculations being performed in 2D and in a single job step for the entire assembly. The forerunner of this class of codes is the U.K.A.E.A. WIMS code, the first version of which was completed 25 years ago. The structure and strategy of assembly spectrum codes have remained remarkably similar to the original concept thus proving its usefulness. As other organizations, including C-E, have developed their own versions of the concept, many important variations have been added which significantly influence the accuracy and performance of the resulting computational tool. This paper describes and discusses those features which are unique to the DIT code and which might be of interest to the community of fuel assembly physics design code users and developers

  6. ETR/ITER systems code

    Energy Technology Data Exchange (ETDEWEB)

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.; Bulmer, R.H.; Busigin, A.; DuBois, P.F.; Fenstermacher, M.E.; Fink, J.; Finn, P.A.; Galambos, J.D.; Gohar, Y.; Gorker, G.E.; Haines, J.R.; Hassanein, A.M.; Hicks, D.R.; Ho, S.K.; Kalsi, S.S.; Kalyanam, K.M.; Kerns, J.A.; Lee, J.D.; Miller, J.R.; Miller, R.L.; Myall, J.O.; Peng, Y-K.M.; Perkins, L.J.; Spampinato, P.T.; Strickler, D.J.; Thomson, S.L.; Wagner, C.E.; Willms, R.S.; Reid, R.L. (ed.)

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs.

  7. Constructions of Rank Modulation Codes

    CERN Document Server

    Mazumdar, Arya; Zémor, Gilles

    2011-01-01

    Rank modulation is a way of encoding information to correct errors in flash memory devices as well as impulse noise in transmission lines. Modeling rank modulation involves construction of packings of the space of permutations equipped with the Kendall tau distance. We present several general constructions of codes in permutations that cover a broad range of code parameters. In particular, we show a number of ways in which conventional error-correcting codes can be modified to correct errors in the Kendall space. Codes that we construct afford simple encoding and decoding algorithms of essentially the same complexity as required to correct errors in the Hamming metric. For instance, from binary BCH codes we obtain codes correcting $t$ Kendall errors in $n$ memory cells that support the order of $n!/(\\log_2n!)^t$ messages, for any constant $t= 1,2,...$ We also construct families of codes that correct a number of errors that grows with $n$ at varying rates, from $\\Theta(n)$ to $\\Theta(n^{2})$. One of our constr...

  8. Stability analysis by ERATO code

    International Nuclear Information System (INIS)

    Problems in MHD stability calculations by ERATO code are described; which concern convergence property of results, equilibrium codes, and machine optimization of ERATO code. It is concluded that irregularity on a convergence curve is not due to a fault of the ERATO code itself but due to inappropriate choice of the equilibrium calculation meshes. Also described are a code to calculate an equilibrium as a quasi-inverse problem and a code to calculate an equilibrium as a result of a transport process. Optimization of the code with respect to I/O operations reduced both CPU time and I/O time considerably. With the FACOM230-75 APU/CPU multiprocessor system, the performance is about 6 times as high as with the FACOM230-75 CPU, showing the effectiveness of a vector processing computer for the kind of MHD computations. This report is a summary of the material presented at the ERATO workshop 1979(ORNL), supplemented with some details. (author)

  9. Network coding with modular lattices

    CERN Document Server

    Kendziorra, Andreas

    2010-01-01

    In [1], K\\"otter and Kschischang presented a new model for error correcting codes in network coding. The alphabet in this model is the subspace lattice of a given vector space, a code is a subset of this lattice and the used metric on this alphabet is the map d: (U, V) \\longmapsto dim(U + V) - dim(U \\bigcap V). In this paper we generalize this model to arbitrary modular lattices, i.e. we consider codes, which are subsets of modular lattices. The used metric in this general case is the map d: (x, y) \\longmapsto h(x \\bigvee y) - h(x \\bigwedge y), where h is the height function of the lattice. We apply this model to submodule lattices. Moreover, we show a method to compute the size of spheres in certain modular lattices and present a sphere packing bound, a sphere covering bound, and a singleton bound for codes, which are subsets of modular lattices. [1] R. K\\"otter, F.R. Kschischang: Coding for errors and erasures in random network coding, IEEE Trans. Inf. Theory, Vol. 54, No. 8, 2008

  10. ETR/ITER systems code

    International Nuclear Information System (INIS)

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs

  11. Coding design for error correcting output codes based on perceptron

    Science.gov (United States)

    Zhou, Jin-Deng; Wang, Xiao-Dan; Zhou, Hong-Jian; Cui, Yong-Hua; Jing, Sun

    2012-05-01

    It is known that error-correcting output codes (ECOC) is a common way to model multiclass classification problems, in which the research of encoding based on data is attracting more and more attention. We propose a method for learning ECOC with the help of a single-layered perception neural network. To achieve this goal, the code elements of ECOC are mapped to the weights of network for the given decoding strategy, and an object function with the constrained weights is used as a cost function of network. After the training, we can obtain a coding matrix including lots of subgroups of class. Experimental results on artificial data and University of California Irvine with logistic linear classifier and support vector machine as the binary learner show that our scheme provides better performance of classification with shorter length of coding matrix than other state-of-the-art encoding strategies.

  12. The Impact of Regional Differences on Elementary School Teachers' Attitudes Towards Their Students' Use of Code Switching in a South Texas School District El impacto de las diferencias regionales en las actitudes de docentes de primaria respecto a la alternancia de códigos por parte de los estudiantes en un distrito escolar del sur de Texas

    Directory of Open Access Journals (Sweden)

    Guadalupe Nancy Nava Gómez

    2012-04-01

    Full Text Available This study focused on investigating whether the teachers' geographical distribution influences their attitudes towards their students' use of code switching. The study was guided by the following research question: Are there differences between teachers' opinions of the north elementary schools and teachers' opinions of the south elementary schools, which are predominantly Hispanic, towards their students' use of code switching? If so, why? A twenty-item structured survey was utilized. The population consisted of 279 elementary school teachers at seven Northern and seven Southern schools in the same South Texas region. The data were analyzed with descriptive statistics. Findings showed that Southern teachers had more prejudices towards code switching than those from the North, who were more receptive to this socio-cultural and linguistic phenomenon due to the ethnic makeup of their classrooms.En esta investigación se buscó indagar si la ubicación geográfica de los maestros de primaria influía en su percepción acerca de la alternancia de códigos de los estudiantes de un distrito escolar del sur de Texas. La pregunta central fue: ¿Existe alguna diferencia entre la opinión de los maestros de escuela primaria del sur y aquellos maestros del norte, quienes son principalmente hispanos, en cuanto al uso de la alternancia de códigos de sus alumnos? En caso afirmativo, ¿por qué? Se usó un instrumento de 20 reactivos. La población estudiada fueron 279 maestros de 7 escuelas primarias del norte y 7 del sur de la misma región. Se usó un método de estadística descriptiva para analizar los datos. Los resultados muestran que los maestros del sur tienen más prejuicios acerca de la alternancia de códigos que los del norte. Estos últimos se caracterizan por ser más receptivos a este fenómeno sociocultural y lingüístico debido a la conformación de sus aulas de clase.

  13. Automated Code Generation for Lattice Quantum Chromodynamics and beyond

    CERN Document Server

    Barthou, Denis; Dolbeau, Romain; Grosdidier, Gilbert; Eisenbeis, Christina; Kruse, Michael; Pene, Olivier; Petrov, Konstantin; Tadonki, Claude

    2014-01-01

    We present here our ongoing work on a Domain Specific Language which aims to simplify Monte-Carlo simulations and measurements in the domain of Lattice Quantum Chromodynamics. The tool-chain, called Qiral, is used to produce high-performance OpenMP C code from LaTeX sources. We discuss conceptual issues and details of implementation and optimization. The comparison of the performance of the generated code to the well-established simulation software is also made.

  14. An algebraic hypothesis about the primeval genetic code

    OpenAIRE

    Sanchez, Robersy; Grau, Ricardo

    2008-01-01

    A plausible architecture of an ancient genetic code is derived from an extended base triplet vector space over the Galois field of the extended base alphabet {D, G, A, U, C}, where the letter D represents one or more hypothetical bases with unspecific pairing. We hypothesized that the high degeneration of a primeval genetic code with five bases and the gradual origin and improvements of a primitive DNA repair system could make possible the transition from the ancient to the modern genetic cod...

  15. A code for obtaining temperature distribution by finite element method

    International Nuclear Information System (INIS)

    The ELEFIB Fortran language computer code using finite element method for calculating temperature distribution of linear and two dimensional problems, in permanent region or in the transient phase of heat transfer, is presented. The formulation of equations uses the Galerkin method. Some examples are shown and the results are compared with other papers. The comparative evaluation shows that the elaborated code gives good values. (M.C.K.)

  16. Network Coding Over The 232

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Heide, Janus; Vingelmann, Peter;

    2013-01-01

    Creating efficient finite field implementations has been an active research topic for several decades. Many appli- cations in areas such as cryptography, signal processing, erasure coding and now also network coding depend on this research to deliver satisfactory performance. In this paper we...... investigate the use of prime fields with a field size of 232 − 5, as this allows implementations which combines high field sizes and low complexity. First we introduce the algorithms needed to apply prime field arithmetics to arbitrary binary data. After this we present the initial throughput measurements...... will be useful in many network coding applications where large field sizes are required....

  17. Studies on DANESS Code Modeling

    International Nuclear Information System (INIS)

    The DANESS code modeling study has been performed. DANESS code is widely used in a dynamic fuel cycle analysis. Korea Atomic Energy Research Institute (KAERI) has used the DANESS code for the Korean national nuclear fuel cycle scenario analysis. In this report, the important models such as Energy-demand scenario model, New Reactor Capacity Decision Model, Reactor and Fuel Cycle Facility History Model, and Fuel Cycle Model are investigated. And, some models in the interface module are refined and inserted for Korean nuclear fuel cycle model. Some application studies have also been performed for GNEP cases and for US fast reactor scenarios with various conversion ratios

  18. Network Coding Fundamentals and Applications

    CERN Document Server

    Medard, Muriel

    2011-01-01

    Network coding is a field of information and coding theory and is a method of attaining maximum information flow in a network. This book is an ideal introduction for the communications and network engineer, working in research and development, who needs an intuitive introduction to network coding and to the increased performance and reliability it offers in many applications. This book is an ideal introduction for the research and development communications and network engineer who needs an intuitive introduction to the theory and wishes to understand the increased performance and reliabil

  19. Writing the Live Coding Book

    DEFF Research Database (Denmark)

    Cox, Geoff; Blackwell, Alan; Lee, Sang Wong

    2016-01-01

    This paper is a speculation on the relationship between coding and writing, and the ways in which technical innovations and capabilities enable us to rethink each in terms of the other. As a case study, we draw on recent experiences of preparing a book on live coding, which integrates a wide range...... of personal, historical, technical and critical perspectives. This book project has been both experimental and reflective, in a manner that allows us to draw on critical understanding of both code and writing, and point to the potential for new practices in the future....

  20. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...... steps, conventionally performed at the video encoder side, to the decoder side. Emerging applications such as wireless visual sensor networks and wireless video surveillance all require lightweight video encoding with high coding efficiency and error-resilience. The video data of DVC schemes differ from...

  1. LiveCode mobile development

    CERN Document Server

    Lavieri, Edward D

    2013-01-01

    A practical guide written in a tutorial-style, ""LiveCode Mobile Development Hotshot"" walks you step-by-step through 10 individual projects. Every project is divided into sub tasks to make learning more organized and easy to follow along with explanations, diagrams, screenshots, and downloadable material.This book is great for anyone who wants to develop mobile applications using LiveCode. You should be familiar with LiveCode and have access to a smartphone. You are not expected to know how to create graphics or audio clips.

  2. PRACTICAL ALGORITHMS FOR TORNADO CODES

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Tornado codes have been used in the error control of data transmission in IP network. The efficiency of this erasure codes is critically affected by the short cycles in its bipartite graph. To remove this effect,two algorithms are introduced: (1) while generating the graph, the cycle eliminating algorithm is used to reduce the number of the short cycles in it; (2) in the decoding algorithm, cycles that are inevitably in the graph are used to remove decoding efficiency degradation. The simulation results show that they have a better performance than that of general tornado codes.

  3. TASS code topical report. V.3 TASS code user's manual

    International Nuclear Information System (INIS)

    TASS code has been developed by KAERI as a part of the nuclear safety enhancement project which has been funded by the long term nuclear research and development program. This manual is thus prepared for the TASS code users to help their non-LOCA licensing transient analyses for the CE and Westinghouse type plants operating or under construction in Korea. This user's manual describes the guidance for using TASS 1.0 code, TASS 1.0 input and TASS 1.0 standard output. The input of TASS 1.0 code is categorized and described in the areas of core power, primary system, secondary system, wall heat, malfunctions and leak, BOP, and control system. Sample input and output of the main feedwater line break event are included to illustrate its use. The TASS 1.0 code commands, data dictionary and the list of the input are appended to this manual. This TASS 1.0 code user's manual will be submitted as a part of the TASS 1.0 topical report to the regulatory body for its licensing review in the non-LOCA transient analyses for the CE and Westinghouse type plants in Korea. (author). 5 refs., 26 tabs., 7 figs

  4. Introduction to coding and information theory

    CERN Document Server

    Roman, Steven

    1997-01-01

    This book is intended to introduce coding theory and information theory to undergraduate students of mathematics and computer science. It begins with a review of probablity theory as applied to finite sample spaces and a general introduction to the nature and types of codes. The two subsequent chapters discuss information theory: efficiency of codes, the entropy of information sources, and Shannon's Noiseless Coding Theorem. The remaining three chapters deal with coding theory: communication channels, decoding in the presence of errors, the general theory of linear codes, and such specific codes as Hamming codes, the simplex codes, and many others.

  5. Facilitating Internet-Scale Code Retrieval

    Science.gov (United States)

    Bajracharya, Sushil Krishna

    2010-01-01

    Internet-Scale code retrieval deals with the representation, storage, and access of relevant source code from a large amount of source code available on the Internet. Internet-Scale code retrieval systems support common emerging practices among software developers related to finding and reusing source code. In this dissertation we focus on some…

  6. Polynomial invariants of quantum codes

    CERN Document Server

    Rains, E M

    1997-01-01

    The weight enumerators (quant-ph/9610040) of a quantum code are quite powerful tools for exploring its structure. As the weight enumerators are quadratic invariants of the code, this suggests the consideration of higher-degree polynomial invariants. We show that the space of degree k invariants of a code of length n is spanned by a set of basic invariants in one-to-one correspondence with S_k^n. We then present a number of equations and inequalities in these invariants; in particular, we give a higher-order generalization of the shadow enumerator of a code, and prove that its coefficients are nonnegative. We also prove that the quartic invariants of a ((4,4,2)) are uniquely determined, an important step in a proof that any ((4,4,2)) is additive ([2]).

  7. Multimedia signal coding and transmission

    CERN Document Server

    Ohm, Jens-Rainer

    2015-01-01

    This textbook covers the theoretical background of one- and multidimensional signal processing, statistical analysis and modelling, coding and information theory with regard to the principles and design of image, video and audio compression systems. The theoretical concepts are augmented by practical examples of algorithms for multimedia signal coding technology, and related transmission aspects. On this basis, principles behind multimedia coding standards, including most recent developments like High Efficiency Video Coding, can be well understood. Furthermore, potential advances in future development are pointed out. Numerous figures and examples help to illustrate the concepts covered. The book was developed on the basis of a graduate-level university course, and most chapters are supplemented by exercises. The book is also a self-contained introduction both for researchers and developers of multimedia compression systems in industry.

  8. Tree Coding of Bilevel Images

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    1998-01-01

    be investigated within reasonable time prior to generating the code. A number of general-purpose coders are constructed according to this principle. Rissanen's (1989) one-pass algorithm, context, is presented in two modified versions. The baseline is proven to be a universal coder. The faster version, which...... probabilities to an arithmetic coder. The conditional probabilities are estimated from co-occurrence statistics of past pixels, the statistics are stored in a tree. By organizing the code length calculations properly, a vast number of possible models (trees) reflecting different pixel orderings can...... is one order of magnitude slower than JBIG, obtains excellent and highly robust compression performance. A multipass free tree coding scheme produces superior compression results for all test images. A multipass free template coding scheme produces significantly better results than JBIG for difficult...

  9. Electronic Code of Federal Regulations

    Data.gov (United States)

    National Archives and Records Administration — The Electronic Code of Federal Regulations (e-CFR) is the codification of the general and permanent rules published in the Federal Register by the executive...

  10. Allegheny County Zip Code Boundaries

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset demarcates the zip code boundaries that lie within Allegheny County. These are not clipped to the Allgeheny County boundary. If viewing this...

  11. Zip Codes - MDC_WCSZipcode

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — The WCSZipcode polygon feature class was created by Miami-Dade Enterprise Technology Department to be used in the WCS batch jobs to assign the actual zip code of...

  12. PARAVT: Parallel Voronoi Tessellation code

    CERN Document Server

    Gonzalez, Roberto E

    2016-01-01

    We present a new open source code for massive parallel computation of Voronoi tessellations(VT hereafter) in large data sets. The code is focused for astrophysical purposes where VT densities and neighbors are widely used. There are several serial Voronoi tessellation codes, however no open source and parallel implementations are available to handle the large number of particles/galaxies in current N-body simulations and sky surveys. Parallelization is implemented under MPI and VT using Qhull library. Domain decomposition take into account consistent boundary computation between tasks, and support periodic conditions. In addition, the code compute neighbors lists, Voronoi density and Voronoi cell volumes for each particle, and can compute density on a regular grid.

  13. Zip Code Level Enrollment Data

    Data.gov (United States)

    U.S. Department of Health & Human Services — The dataset includes is the number of Qualified Health Plan selections by ZIP code for 36 states that are participating in the Federally-facilitated Marketplace or...

  14. The Serializability of Network Codes

    CERN Document Server

    Blasiak, Anna

    2010-01-01

    Network coding theory studies the transmission of information in networks whose vertices may perform nontrivial encoding and decoding operations on data as it passes through the network. The main approach to deciding the feasibility of network coding problems aims to reduce the problem to optimization over a polytope of entropic vectors subject to constraints imposed by the network structure. In the case of directed acyclic graphs, these constraints are completely understood, but for general graphs the problem of enumerating them remains open: it is not known how to classify the constraints implied by a property that we call serializability, which refers to the absence of paradoxical circular dependencies in a network code. In this work we initiate the first systematic study of the constraints imposed on a network code by serializability. We find that serializability cannot be detected solely by evaluating the Shannon entropy of edge sets in the graph, but nevertheless, we give a polynomial-time algorithm tha...

  15. Efficient codes and balanced networks.

    Science.gov (United States)

    Denève, Sophie; Machens, Christian K

    2016-03-01

    Recent years have seen a growing interest in inhibitory interneurons and their circuits. A striking property of cortical inhibition is how tightly it balances excitation. Inhibitory currents not only match excitatory currents on average, but track them on a millisecond time scale, whether they are caused by external stimuli or spontaneous fluctuations. We review, together with experimental evidence, recent theoretical approaches that investigate the advantages of such tight balance for coding and computation. These studies suggest a possible revision of the dominant view that neurons represent information with firing rates corrupted by Poisson noise. Instead, tight excitatory/inhibitory balance may be a signature of a highly cooperative code, orders of magnitude more precise than a Poisson rate code. Moreover, tight balance may provide a template that allows cortical neurons to construct high-dimensional population codes and learn complex functions of their inputs.

  16. FLYCHK Collisional-Radiative Code

    Science.gov (United States)

    SRD 160 FLYCHK Collisional-Radiative Code (Web, free access)   FLYCHK provides a capability to generate atomic level populations and charge state distributions for low-Z to mid-Z elements under NLTE conditions.

  17. Upper Air Observations - Synoptic Code

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Daily radiosonde and rawinsonde observations at standard and significant levels, recorded in synoptic code. Period of record 1950-1951.

  18. Hammerstein Model for Speech Coding

    Directory of Open Access Journals (Sweden)

    Turunen Jari

    2003-01-01

    Full Text Available A nonlinear Hammerstein model is proposed for coding speech signals. Using Tsay's nonlinearity test, we first show that the great majority of speech frames contain nonlinearities (over 80% in our test data when using 20-millisecond speech frames. Frame length correlates with the level of nonlinearity: the longer the frames the higher the percentage of nonlinear frames. Motivated by this result, we present a nonlinear structure using a frame-by-frame adaptive identification of the Hammerstein model parameters for speech coding. Finally, the proposed structure is compared with the LPC coding scheme for three phonemes /a/, /s/, and /k/ by calculating the Akaike information criterion of the corresponding residual signals. The tests show clearly that the residual of the nonlinear model presented in this paper contains significantly less information compared to that of the LPC scheme. The presented method is a potential tool to shape the residual signal in an encode-efficient form in speech coding.

  19. Summary of Code of Ethics.

    Science.gov (United States)

    Eklund, Kerri

    2016-01-01

    The Guide to the Code of Ethics for Nurses is an excellent guideline for all nurses regardless of their area of practice. I greatly enjoyed reading the revisions in place within the 2015 edition and refreshing my nursing conscience. I plan to always keep my Guide to the Code of Ethics for Nurses near in order to keep my moral compass from veering off the path of quality care.

  20. Verification of ONED90 code

    International Nuclear Information System (INIS)

    ONED90 developed by KAERI is a 1-dimensional 2-group diffusion theory code. For nuclear design and reactor simulation, the usage of ONED90 encompasses core follow calculation, load follow calculation, plant power control simulation, xenon oscillation simulation and control rod maneuvering, etc. In order to verify the validity of ONED90 code, two well-known benchmark problems are solved by ONED90 shows very similar result to reference solution. (Author) 11 refs., 5 figs., 13 tabs

  1. Training course on code implementation.

    Science.gov (United States)

    Allain, A; De Arango, R

    1992-01-01

    The International Baby Food Action Network (IBFAN) is a coalition of over 40 citizen groups in 70 countries. IBFAN monitors the progress worldwide of the implementation of the International Code of Marketing of Breastmilk Substitutes. The Code is intended to regulate the advertising and promotional techniques used to sell infant formula. The 1991 IBFAN report shows that 75 countries have taken some action to implement the International Code. During 1992, the IBFAN Code Documentation Center in Malaysia conducted 2 training courses to help countries draft legislation to implement and monitor compliance with the International Code. In April, government officials from 19 Asian and African countries attended the first course in Malaysia; the second course was conducted in Spanish in Guatemala and attended by officials from 15 Latin American and Caribbean countries. The resource people included representatives from NGOs in Africa, Asia, Latin America, Europe and North America with experience in Code implementation and monitoring at the national level. The main purpose of each course was to train government officials to use the International Code as a starting point for national legislation to protect breastfeeding. Participants reviewed recent information on lactation management, the advantages of breastfeeding, current trends in breastfeeding and the marketing practices of infant formula manufacturers. The participants studied the terminology contained in the International Code and terminology used by infant formula manufacturers to include breastmilk supplements such as follow-on formulas and cereal-based baby foods. Relevant World Health Assembly resolutions such as the one adopted in 1986 on the need to ban free and low-cost supplies to hospitals were examined. The legal aspects of the current Baby Friendly Hospital Initiative (BFHI) and the progress in the 12 BFHI test countries concerning the elimination of supplies were also examined. International Labor

  2. Summary of Code of Ethics.

    Science.gov (United States)

    Eklund, Kerri

    2016-01-01

    The Guide to the Code of Ethics for Nurses is an excellent guideline for all nurses regardless of their area of practice. I greatly enjoyed reading the revisions in place within the 2015 edition and refreshing my nursing conscience. I plan to always keep my Guide to the Code of Ethics for Nurses near in order to keep my moral compass from veering off the path of quality care. PMID:27183735

  3. Reliable Physical Layer Network Coding

    OpenAIRE

    Nazer, Bobak; Gastpar, Michael

    2011-01-01

    When two or more users in a wireless network transmit simultaneously, their electromagnetic signals are linearly superimposed on the channel. As a result, a receiver that is interested in one of these signals sees the others as unwanted interference. This property of the wireless medium is typically viewed as a hindrance to reliable communication over a network. However, using a recently developed coding strategy, interference can in fact be harnessed for network coding. In a wired network, (...

  4. Squares of Random Linear Codes

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego;

    2015-01-01

    a positive answer, for codes of dimension $k$ and length roughly $\\frac{1}{2}k^2$ or smaller. Moreover, the convergence speed is exponential if the difference $k(k+1)/2-n$ is at least linear in $k$. The proof uses random coding and combinatorial arguments, together with algebraic tools involving the precise...... computation of the number of quadratic forms of a given rank, and the number of their zeros....

  5. STANDARDIZING SOURCE CODE SECURITY AUDITS

    OpenAIRE

    Suzanna Schmeelk; Bill Mills; Leif Hedstrom

    2012-01-01

    A source code security audit is a powerful methodology for locating and removing security vulnerabilities.An audit can be used to (1) pass potentially prioritized list of vulnerabilities to developers (2) exploitvulnerabilities or (3) provide proof-of-concepts for potential vulnerabilities. The security audit researchcurrently remains disjoint with minor discussion of methodologies utilized in the field. This paperassembles a broad array of literature to promote standardizing source code secu...

  6. Interleaver Design for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl; Zyablov, Viktor

    1997-01-01

    By a combination of construction and random search based on a careful analysis of the low weight words and the distance properties of the component codes, it is possible to find interleavers for turbo coding with a high minimum distance. We have designed a block interleaver with permutations...... of each row, and found a combination of permutations where a tight upper bound to the minimum distance of the complete turbo scheme is 108....

  7. SUPERSTRUCTURE - AN ATOMIC STRUCTURE CODE

    OpenAIRE

    Eissner, W.

    1991-01-01

    We summarize the properties of the atomic structure code SUPERSTRUCTURE, which yields bound state energies in LS coupling and intermediate coupling as well as associated radiative data. Other data that can be computed include term coupling coefficients and radiative data with allowance for cascading. Results are given, mainly for members of the Be isoelectronic sequence, to demonstrate the power and range of the code. Other examples deal with "forbidden" transitions in N-like and He-like ions.

  8. Verification of ONED90 code

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Jong Hwa; Lee, Ki Bog; Zee, Sung Kyun; Lee, Chang Ho [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1993-12-01

    ONED90 developed by KAERI is a 1-dimensional 2-group diffusion theory code. For nuclear design and reactor simulation, the usage of ONED90 encompasses core follow calculation, load follow calculation, plant power control simulation, xenon oscillation simulation and control rod maneuvering, etc. In order to verify the validity of ONED90 code, two well-known benchmark problems are solved by ONED90 shows very similar result to reference solution. (Author) 11 refs., 5 figs., 13 tabs.

  9. Coded nanoscale self-assembly

    Indian Academy of Sciences (India)

    Prathyush Samineni; Debabrata Goswami

    2008-12-01

    We demonstrate coded self-assembly in nanostructures using the code seeded at the component level through computer simulations. Defects or cavities occur in all natural assembly processes including crystallization and our simulations capture this essential aspect under surface minimization constraints for self-assembly. Our bottom-up approach to nanostructures would provide a new dimension towards nanofabrication and better understanding of defects and crystallization process.

  10. Adecuación a los códigos de conducta para información biomédica en internet de sitios web útiles para el seguimiento farmacoterapéutico Adherence to codes of conduct for biomedical information on the internet in useful websites for pharmacotherapy follow-up

    Directory of Open Access Journals (Sweden)

    Inés Azpilicueta Cengotitabengoa

    2007-06-01

    Full Text Available Objetivos: Evaluar la adecuación de los sitios web destinados a proporcionar información para la realización de seguimiento farmacoterapéutico a 4 códigos de conducta. Métodos: Estudio descriptivo del cumplimiento de los criterios de calidad de 19 sitios web seleccionados por ser los de mayor utilización por los farmacéuticos en un estudio previo. Se realizó un análisis descriptivo y se estimó el coeficiente kappa para valorar la concordancia entre evaluadores (criterios de Fleiss. Resultados y conclusiones: Fisterra fue la página mejor valorada en los 4 códigos, y la fuente de acceso a guías clínicas mejor calificada. La Cochrane Library y Pubmed las mejor valoradas en revisiones y fuentes secundarias. JAMA y British Medical Journal fueron las revistas mejor calificadas seguidas de Atención Primaria y Medicina Clínica. Entre los vademécums, el BOT y el Martindale obtuvieron las mejores calificaciones y el Boletín Terapéutico Andaluz y el Butlletí Groc recibieron altas calificaciones de entre los boletines de medicamentos. La Organización Mundial de la Salud fue la agencia mejor calificada. Los sitios con menor calificación fueron Pharmaceutical Care, Seguimiento Farmacoterapéutico y el Vademécum Internacional España MediMedia-Medicom. La concordancia entre evaluadores fue aceptable para los 4 códigos. Conclusiones: La calidad de los sitios web que utilizan los farmacéuticos es muy variable, aunque la mayoría superan los 60 puntos (sobre 100 en los 4 códigos de conducta usados en la evaluación.Objectives: To assess adherence to four codes of conduct in websites providing information useful for pharmacotherapy follow-up. Methods: We performed a descriptive study of adherence to quality criteria in 19 websites. These sites had been identified in a previous study as being those most frequently used by pharmacists. A descriptive analysis was performed and the kappa coefficient was calculated to evaluate interrater

  11. Design of Blood Glucose Meter's Application Layer Code Based on thep C/OS-III RTOS%基于μ/OS-III实时操作系统的血糖仪应用层程序设计

    Institute of Scientific and Technical Information of China (English)

    成洁

    2011-01-01

    血糖仪表是测量血液中的葡萄糖含量的装置。本文描述了如何用Freescale公司推出的ARMCortex?-M4系列MCU来做为控制核心,在此控制平台上移植UCOSIII操作系统,搭建应用层程序,开发一款血糖仪表。%The blood glucose meter is a device that measures the level of glucose in the blood. This application describes the implementation of a kind. of blood glucose meter using Freescale's ARM Cortex-M4 series microcontroller as a kernel, This application includes the porting of p C/OS-III on it and building application layer code.

  12. CLONING AND SEQUENCE ANALYSIS OF A PROTEIN PHOSPHATASE 2C CODING GENE FROM LEISHMANIA DONOVANI 1S%杜氏利什曼原虫蛋白磷酸酶-2C的基因克隆化

    Institute of Scientific and Technical Information of China (English)

    成军; 夏小兵; 王刚; 刘妍; 钟彦伟; 王琳; 杨继珍

    2001-01-01

    目的克隆杜氏利什曼原虫(Leishmania donovani,Ld)1S株蛋白磷酸酶2C(PP2C)的编码基因,为应用这种编码T细胞抗原的基因进行基因疫苗研究奠定基础。方法体外培养杜氏利什曼原虫1S株无鞭毛体,常规方法从虫体提取制备基因组DNA。以夏科氏利什曼原虫(Leishmania chagasi,Lc)的PP2C基因序列为参照,设计并合成利什曼原虫PP2C基因序列特异性的引物。结果以杜氏利什曼原虫的基因组为模板,利用多聚酶链反应(PCR)技术,扩增获得了杜氏利什曼原虫PP2C的全长编码基因。基因序列测定结果表明,杜氏利什曼原虫1S株PP2C基因序列长度为1 317bp,开放读码框架由1 221bp组成,编码产物为406个氨基酸残基。获得的杜氏利什曼原虫1S株的PP2C基因与来源于夏科氏利什曼原虫的PP2C氨基酸残基序列的同源性为95%(387/406)。结论本研究克隆了杜氏利什曼原虫的PP2C基因,为应用诱导T细胞免疫应答抗原的编码基因进行杜氏利什曼原虫的基因疫苗研究奠定了基础。

  13. A Pixel Domain Video Coding based on Turbo code and Arithmetic code

    Directory of Open Access Journals (Sweden)

    Cyrine Lahsini

    2012-05-01

    Full Text Available In recent years, with emerging applications such as multimedia sensors networks, wirelesslow-power surveillance and mobile camera phones, the traditional video coding architecture in beingchallenged. In fact, these applications have different requirements than those of the broadcast videodelivery systems: a low power consumption at the encoder side is essential.In this context, we propose a pixel-domain video coding scheme which fits well in these senarios.In this system, both the arithmetic and turbo codes are used to encode the video sequence's frames.Simulations results show significant gains over Pixel-domain Wyner-Ziv video codeingr.

  14. Parallel Bit Interleaved Coded Modulation

    CERN Document Server

    Ingber, Amir

    2010-01-01

    A new variant of bit interleaved coded modulation (BICM) is proposed. In the new scheme, called Parallel BICM, L identical binary codes are used in parallel using a mapper, a newly proposed finite-length interleaver and a binary dither signal. As opposed to previous approaches, the scheme does not rely on any assumptions of an ideal, infinite-length interleaver. Over a memoryless channel, the new scheme is proven to be equivalent to a binary memoryless channel. Therefore the scheme enables one to easily design coded modulation schemes using a simple binary code that was designed for that binary channel. The overall performance of the coded modulation scheme is analytically evaluated based on the performance of the binary code over the binary channel. The new scheme is analyzed from an information theoretic viewpoint, where the capacity, error exponent and channel dispersion are considered. The capacity of the scheme is identical to the BICM capacity. The error exponent of the scheme is numerically compared to...

  15. Designing a Long Acting Erythropoietin by Fusing Three Carboxyl-Terminal Peptides of Human Chorionic Gonadotropin β Subunit to the N-Terminal and C-Terminal Coding Sequence

    Directory of Open Access Journals (Sweden)

    Fuad Fares

    2011-01-01

    Full Text Available A new analog of EPO was designed by fusing one and two CTPs to the N-terminal and C-terminal ends of EPO (EPO-(CTP3, respectively. This analog was expressed and secreted efficiently in CHO cells. The in vitro test shows that the activity of EPO-(CTP3 in TFI-1 cell proliferation assay is similar to that of EPO-WT and commercial rHEPO. However, in vivo studies indicated that treatment once a week with EPO-(CTP3 (15 μg/kg dramatically increased (~8 folds haematocrit as it was compared to rHuEPO. Moreover, it was found that EPO-(CTP3 is more effective than rHuEPO and Aranesp in increasing reticulocyte number in mice blood. The detected circulatory half-lives of rHuEPO, Aranesp, and EPO-(CTP3 following IV injection of 20 IU were 4.4, 10.8, and 13.1 h, respectively. These data established the rational for using this chimera as a long-acting EPO analog in clinics. The therapeutic efficacy of EPO-CTP analog needs to be established in higher animals and in human clinical trials.

  16. Code of practice for site radiography

    International Nuclear Information System (INIS)

    The Code of Practice is set out in Parts, entitled: introduction, administrative organisation (including organisation for radiological protection, medical supervision, personal monitoring, transfer record, control of sealed sources, equipment tests, site visits); operator competence equipment (including x-ray equipment, gamma ray equipment, pipeline crawler equipment, safety equipment); methods of work; carriage of sources by road; emergency procedures (including sections dealing with (a) x-ray apparatus, (b) radioactive substances in use, and (c) radioactive substances not in use); legal considerations. (U.K.)

  17. Mastering openFrameworks creative coding demystified

    CERN Document Server

    Yanc, Chris

    2013-01-01

    This book gives clear and effective instructions, stuffed with practical examples, to build your own fun, stunning and highly-interactive openFrameworks applications. Each chapter is focused differently and has a new theme to it,This book targets visual artists, designers, programmers and those interested in creative coding by getting started with openFrameworks. This book will help you understand the capabilities of openFrameworks to help you create visually stunning and fully interactive applications. You should have a basic knowledge of object oriented programming, such as C++, Java, Python

  18. KWIC Index of nuclear codes (1975 edition)

    International Nuclear Information System (INIS)

    It is a KWIC Index for 254 nuclear codes in the Nuclear Code Abstracts (1975 edition). The classification of nuclear codes and the form of index are the same as those in the Computer Programme Library at Ispra, Italy. (auth.)

  19. Serial-data correlator/code translator

    Science.gov (United States)

    Morgan, L. E.

    1977-01-01

    System, consisting of sampling flip flop, memory (either RAM or ROM), and memory buffer, correlates sampled data with predetermined acceptance code patterns, translates acceptable code patterns to nonreturn-to-zero code, and identifies data dropouts.

  20. Regularized Robust Coding for Face Recognition

    CERN Document Server

    Meng, Yang; Jian, Yang; Zhang, David

    2012-01-01

    Recently the sparse representation based classification (SRC) has been proposed for robust face recognition (FR). In SRC, the testing image is coded as a sparse linear combination of the training samples, and the representation fidelity is measured by the l2-norm or l1-norm of the coding residual. Such a sparse coding model assumes that the coding residual follows Gaussian or Laplacian distribution, which may not be effective enough to describe the coding residual in practical FR systems. Meanwhile, the sparsity constraint on the coding coefficients makes SRC's computational cost very high. In this paper, we propose a new face coding model, namely regularized robust coding (RRC), which could robustly regress a given signal with regularized regression coefficients. By assuming that the coding residual and the coding coefficient are respectively independent and identically distributed, the RRC seeks for a maximum a posterior solution of the coding problem. An iteratively reweighted regularized robust coding (IR...