WorldWideScience

Sample records for c codes

  1. Portable code development in C

    Energy Technology Data Exchange (ETDEWEB)

    Brown, S.A.

    1990-11-06

    With a new generation of high performance computers appearing around us on a time scale of months, a new challenge for developers of simulation codes is to write and maintain production codes that are both highly portable and maximally efficient. My contention is that C is the language that is both best suited to that goal and is widely available today. GLF is a new code written mainly in C which is intended to have all of the XRASER physics and run on any platform of interest. It demonstrates the power of the C paradigm for code developers and flexibility and ease of use for the users. Three fundamental problems are discussed: the C/UNIX development environment; the supporting tools and libraries which handle data and graphics portability issues; and the advantages of C in numerical simulation code development.

  2. Atlas C++ Coding Standard Specification

    CERN Document Server

    Albrand, S; Barberis, D; Bosman, M; Jones, B; Stavrianakou, M; Arnault, C; Candlin, D; Candlin, R; Franck, E; Hansl-Kozanecka, Traudl; Malon, D; Qian, S; Quarrie, D; Schaffer, R D

    2001-01-01

    This document defines the ATLAS C++ coding standard, that should be adhered to when writing C++ code. It has been adapted from the original "PST Coding Standard" document (http://pst.cern.ch/HandBookWorkBook/Handbook/Programming/programming.html) CERN-UCO/1999/207. The "ATLAS standard" comprises modifications, further justification and examples for some of the rules in the original PST document. All changes were discussed in the ATLAS Offline Software Quality Control Group and feedback from the collaboration was taken into account in the "current" version.

  3. C++ application development with Code::Blocks

    CERN Document Server

    Modak, Biplab Kumar

    2013-01-01

    This is a comprehensive tutorial with step-by-step instructions on how to develop applications with Code::Blocks.This book is for C++ developers who wish to use Code::Blocks to create applications with a consistent look and feel across multiple platforms. This book assumes that you are familiar with the basics of the C++ programming language.

  4. Writing robust C++ code for critical applications

    CERN Document Server

    CERN. Geneva

    2015-01-01

    **C++** is one of the most **complex**, expressive and powerful languages out there. However, its complexity makes it hard to write **robust** code. When using C++ to code **critical** applications, ensuring **reliability** is one of the key topics. Testing, debugging and profiling are all a major part of this kind of work. In the BE department we use C++ to write a big part of the controls system for beam operation, which implies putting a big focus on system stability and ensuring smooth operation. This talk will try to: - Highlight potential problems when writing C++ code, giving guidelines on writing defensive code that could have avoided such issues - Explain how to avoid common pitfalls (both in writing C++ code and at the debugging & profiling phase) - Showcase some tools and tricks useful to C++ development The attendees' proficiency in C++ should not be a concern. Anyone is free to join, even people that do not know C++, if only to learn the pitfalls a language may have. This may benefit f...

  5. C++ Coding Standards for the AMP Project

    Energy Technology Data Exchange (ETDEWEB)

    Evans, Thomas M [ORNL; Clarno, Kevin T [ORNL

    2009-09-01

    This document provides an initial starting point to define the C++ coding standards used by the AMP nuclear fuel performance integrated code project and a part of AMP's software development process. This document draws from the experiences, and documentation [1], of the developers of the Marmot Project at Los Alamos National Laboratory. Much of the software in AMP will be written in C++. The power of C++ can be abused easily, resulting in code that is difficult to understand and maintain. This document gives the practices that should be followed on the AMP project for all new code that is written. The intent is not to be onerous but to ensure that the code can be readily understood by the entire code team and serve as a basis for collectively defining a set of coding standards for use in future development efforts. At the end of the AMP development in fiscal year (FY) 2010, all developers will have experience with the benefits, restrictions, and limitations of the standards described and will collectively define a set of standards for future software development. External libraries that AMP uses do not have to meet these requirements, although we encourage external developers to follow these practices. For any code of which AMP takes ownership, the project will decide on any changes on a case-by-case basis. The practices that we are using in the AMP project have been in use in the Denovo project [2] for several years. The practices build on those given in References [3-5]; the practices given in these references should also be followed. Some of the practices given in this document can also be found in [6].

  6. Coded Modulation in C and MATLAB

    Science.gov (United States)

    Hamkins, Jon; Andrews, Kenneth S.

    2011-01-01

    This software, written separately in C and MATLAB as stand-alone packages with equivalent functionality, implements encoders and decoders for a set of nine error-correcting codes and modulators and demodulators for five modulation types. The software can be used as a single program to simulate the performance of such coded modulation. The error-correcting codes implemented are the nine accumulate repeat-4 jagged accumulate (AR4JA) low-density parity-check (LDPC) codes, which have been approved for international standardization by the Consultative Committee for Space Data Systems, and which are scheduled to fly on a series of NASA missions in the Constellation Program. The software implements the encoder and decoder functions, and contains compressed versions of generator and parity-check matrices used in these operations.

  7. Experience with C++ Code Quality in ATLAS

    CERN Document Server

    Roe, Shaun; The ATLAS collaboration; Snyder, Scott; Martin-Haugh, Stewart; Obreshkov, Emil; Stewart, Graeme

    2015-01-01

    An explanation of tools used for code quality checking in Atlas offline software, including results and responses is given. The principle tools covered are: Coverity, cppcheck, 'include what you use', Undefined Behaviour Sanitizer

  8. Simulink Code Generation: Tutorial for Generating C Code from Simulink Models using Simulink Coder

    Science.gov (United States)

    MolinaFraticelli, Jose Carlos

    2012-01-01

    This document explains all the necessary steps in order to generate optimized C code from Simulink Models. This document also covers some general information on good programming practices, selection of variable types, how to organize models and subsystems, and finally how to test the generated C code and compare it with data from MATLAB.

  9. C++ Coding Standards 101 Rules, Guidelines, and Best Practices

    CERN Document Server

    Sutter, Herb

    2005-01-01

    Consistent, high-quality coding standards improve software quality, reduce time-to-market, promote teamwork, eliminate time wasted on inconsequential matters, and simplify maintenance. Now, two of the world's most respected C++ experts distill the rich collective experience of the global C++ community into a set of coding standards that every developer and development team can understand and use as a basis for their own coding standards.

  10. PENGECEKAN PLAGIARISME PADA CODE DALAM BAHASA C++

    Directory of Open Access Journals (Sweden)

    Liliana .

    2012-01-01

    Full Text Available Informatics department of Petra Christian University has used to practice programming for students at programming studio, especially students who take algorithms and programming course. The system is currently implemented is to provide practice programming skill according to their ability. Assessment is done by calculating the points of all questions are done correctly. Problem which occurs at about the work in programming studio is plagiarism among students’ work. Unfortunately, plagiarism checking consumes a lot of time. In one semester, each student can do about 100 questions. If the total of students taking programming course, at least 100 people, we need many people to do this work. Departing from this problem, we design and develop an application to check for plagiarism between two different answer files from the same question. The degree of similarity is calculated using combined method of Jaccard similarity coefficient and cosine similarity coefficient. This system is able to check similarities in source code files are the work of students with moderate levels of complexity.

  11. Runtime Detection of C-Style Errors in UPC Code

    Energy Technology Data Exchange (ETDEWEB)

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  12. Flowgen: Flowchart-based documentation for C + + codes

    Science.gov (United States)

    Kosower, David A.; Lopez-Villarejo, J. J.

    2015-11-01

    We present the Flowgen tool, which generates flowcharts from annotated C + + source code. The tool generates a set of interconnected high-level UML activity diagrams, one for each function or method in the C + + sources. It provides a simple and visual overview of complex implementations of numerical algorithms. Flowgen is complementary to the widely-used Doxygen documentation tool. The ultimate aim is to render complex C + + computer codes accessible, and to enhance collaboration between programmers and algorithm or science specialists. We describe the tool and a proof-of-concept application to the VINCIA plug-in for simulating collisions at CERN's Large Hadron Collider.

  13. Automatic translation of C/C++ parallel code into synchronous formalism using an SSA intermediate form

    OpenAIRE

    Besnard, Loïc; Gautier, Thierry; Moy, Matthieu; Talpin, Jean-Pierre; Johnson, Kenneth; Maraninchi, Florence

    2009-01-01

    We present an approach for the translation of imperative code (like C, C++) into the synchronous formalism \\signal, in order to use a model-checker to verify properties on the source code. The translation uses ßa\\ as an intermediate formalism, and the GCC compiler as a front-end. The contributions of this paper with respect to previous work are a more efficient translation scheme, and the management of parallel code. It is applied successfully on simple \\systemc\\ examples.

  14. C++ builder 6.0 CEDV code for files processing

    International Nuclear Information System (INIS)

    A RAD C++ Borland's Builder 6.0 code CEDV under Windows XP has been designed for visualizing data obtained from heavy-ion-induced complete fusion reactions at the main U-400 cyclotron of the FLNR. The main purpose of the code is processing the data from the experiments aimed at studying chemical properties of SHE. Data from the Dubna Gas-Filled Recoil Separator could be processed, too. Some subroutines for estimating statistical parameters are also presented; these are based on modified BSC (background signal combination) approaches. Examples of application both for chemistry experiments and the experiments performed at the Dubna Gas-Filled Recoil Separator are presented

  15. Code generation for the MPEG Reconfigurable Video Coding framework: From CAL actions to C functions

    OpenAIRE

    Wipliez, Matthieu; Roquier, Ghislain; Raulet, Mickael; Nezan, Jean François; Déforges, Olivier

    2008-01-01

    International audience The MPEG reconfigurable video coding (RVC) framework is a new standard under development by MPEG that aims at providing a unified specification of current MPEG video coding technologies. In this framework, a decoder is built as a configuration of video coding modules taken from the standard ldquoMPEG toolbox libraryrdquo. The elements of the library are specified using the CAL actor language (CAL). CAL is a dataflow based language providing computation models that ar...

  16. The discrete dipole approximation code DDscat.C++: features, limitations and plans

    Science.gov (United States)

    Choliy, V. Ya.

    2013-08-01

    We present a new freely available open-source C++ software for numerical solution of the electromagnetic waves absorption and scattering problems within the Discrete Dipole Approximation paradigm. The code is based upon the famous and free Fortan-90 code DDSCAT by B. Draine and P. Flatau. Started as a teaching project, the presented code DDscat.C++ differs from the parent code DDSCAT with a number of features, essential for C++ but quite seldom in Fortran. This article introduces the new code, explains its features, presents timing information and some plans for further development.

  17. Test procedures on the object code of I and C safety systems software

    International Nuclear Information System (INIS)

    Object code based software analysis offers additional possibilities to perform some verification tasks on I and C software: it closes gaps in the area of code verification for low level assembler code; it enables the assessor to get additional information about the integrated executable code (complexity of the integrated product, concurrent usage of memory and I/O resources, correctness of compilation and linking processes, information about the runtime consumption)

  18. Nuclear densimeter of soil simulated in MCNP-4C code

    International Nuclear Information System (INIS)

    The Monte Carlo code (MCNPX) was used to simulate a nuclear densimeter for measuring soil density. An Americium source (E = 60 keV) and a NaI (Tl) detector were placed on soil surface. Results from MCNP shown that scattered photon fluxes may be used to determining soil density. Linear regressions between scattered photons fluxes and soil density were calculated and shown correlation coefficients near unity. (author)

  19. Joint L-/C-Band Code and Carrier Phase Linear Combinations for Galileo

    Directory of Open Access Journals (Sweden)

    Patrick Henkel

    2008-01-01

    Full Text Available Linear code combinations have been considered for suppressing the ionospheric error. In the L-band, this leads to an increased noise floor. In a combined L- and C-band (5010–5030 MHz approach, the ionosphere can be eliminated and the noise floor reduced at the same time. Furthermore, combinations that involve both code- and carrier-phase measurements are considered. A new L-band code-carrier combination with a wavelength of 3.215 meters and a noise level of 3.92 centimeters is found. The double difference integer ambiguities of this combination can be resolved by extending the system of equations with an ionosphere-free L-/C-band code combination. The probability of wrong fixing is reduced by several orders of magnitude when C-band measurements are included. Carrier smoothing can be used to further reduce the residual variance of the solution. The standard deviation is reduced by a factor 7.7 if C-band measurements are taken into account. These initial findings suggest that the combined use of L- and C-band measurements, as well as the combined code and phase processing are an attractive option for precise positioning.

  20. Sequence analysis of a cDNA coding for a pancreatic precursor to somatostatin.

    OpenAIRE

    Taylor, W.L.; Collier, K J; Deschenes, R J; Weith, H L; Dixon, J. E.

    1981-01-01

    A synthetic oligonucleotide having the sequence d(T-T-C-C-A-G-A-A-G-A-A) deduced from the amino acid sequence Phe-Phe-Trp-Lys of somatostatin-14 was used to prime the synthesis of a cDNA from channel catfish (Ictalurus punctatus) pancreatic poly(A)-RNA. The major product of this reaction was a cDNA fragment of 565 nucleotides. Chemical sequence analysis of the cDNA fragment revealed that it was complementary to a mRNA coding for somatostatin. The 565-nucleotide cDNA hybridizes strongly with a...

  1. HIGH QUALITY IMPLEMENTATION FOR AUTOMATIC GENERATION C# CODE BY EVENT-B PATTERN

    Directory of Open Access Journals (Sweden)

    Eman K Elsayed

    2014-01-01

    Full Text Available In this paper we proposed the logical correct path to implement automatically any algorithm or model in verified C# code. Our proposal depends on using the event-B as a formal method. It is suitable solution for un-experience in programming language and profession in mathematical modeling. Our proposal also integrates requirements, codes and verification in system development life cycle. We suggest also using event-B pattern. Our suggestion is classify into two cases, the algorithm case and the model case. The benefits of our proposal are reducing the prove effort, reusability, increasing the automation degree and generate high quality code. In this paper we applied and discussed the three phases of automatic code generation philosophy on two case studies the first is “minimum algorithm” and the second one is a model for ATM.

  2. Heat diffusion in the presence of magnetic field: code M.C.D

    International Nuclear Information System (INIS)

    The 2D code M.C.D. described here allows to study without hydrodynamics the heat diffusion in the presence of magnetic field in laser created plasmas. First tests in plane geometry show that the magnetic field above is no able to explain the strong limitations of the thermal conduction observed in laser created plasmas

  3. TSC [Tokamak Simulation Code] simulations of Alcator C-MOD discharges

    International Nuclear Information System (INIS)

    The axisymmetric stability of the single X-point, nominal Alcator C-MOD configuration is investigated with the Tokamak Simulation Code. The resistive wall passive growth rate, in the absence of feedback stabilization, is obtained. The instability is suppressed with an appropriate active feedback system. 2 refs., 25 figs., 1 tab

  4. Real time implementation of a linear predictive coding algorithm on digital signal processor DSP32C

    International Nuclear Information System (INIS)

    Pulse Code Modulation (PCM) has been widely used in speech coding. However, due to its high bit rate. PCM has severe limitations in application where high spectral efficiency is desired, for example, in mobile communication, CD quality broadcasting system etc. These limitation have motivated research in bit rate reduction techniques. Linear predictive coding (LPC) is one of the most powerful complex techniques for bit rate reduction. With the introduction of powerful digital signal processors (DSP) it is possible to implement the complex LPC algorithm in real time. In this paper we present a real time implementation of the LPC algorithm on AT and T's DSP32C at a sampling frequency of 8192 HZ. Application of the LPC algorithm on two speech signals is discussed. Using this implementation , a bit rate reduction of 1:3 is achieved for better than tool quality speech, while a reduction of 1.16 is possible for speech quality required in military applications. (author)

  5. Validation the Monte Carlo code RMC with C5G7 benchmark

    International Nuclear Information System (INIS)

    Highlights: • The RMC code was verified based on the benchmark of C5G7. • Calculation speed of RMC is better than MCNP, especially in the flux tallies. • Eigenvalues calculated by RMC were within 2σ of the benchmark in all cases. • The pin by pin flux tallies of RMC are consistent with MCNP well. - Abstract: RMC (Reactor Monte Carlo code) is a new 3D Monte Carlo neutron transport code being developed by Department of Engineering Physics in Tsinghua University. The current version of RMC is a β version. In this paper, based on 2D and 3D benchmark of C5G7, the criticality calculation capacity of RMC was verified. Comparisons were made between the benchmark eigenvalues and those outputs by the RMC code. The RMC-generated eigenvalues were within two standard deviations of the benchmark and MCNP values in all cases. Additionally, the flux was compared pin by pin between MCNP and RMC. The flux tallies generated by RMC were found to be in well agreement with those from MCNP

  6. Architectural Visualization of C/C++ Source Code for Program Comprehension

    Energy Technology Data Exchange (ETDEWEB)

    Panas, T; Epperly, T W; Quinlan, D; Saebjornsen, A; Vuduc, R

    2006-09-01

    Structural and behavioral visualization of large-scale legacy systems to aid program comprehension is still a major challenge. The challenge is even greater when applications are implemented in flexible and expressive languages such as C and C++. In this paper, we consider visualization of static and dynamic aspects of large-scale scientific C/C++ applications. For our investigation, we reuse and integrate specialized analysis and visualization tools. Furthermore, we present a novel layout algorithm that permits a compressive architectural view of a large-scale software system. Our layout is unique in that it allows traditional program visualizations, i.e., graph structures, to be seen in relation to the application's file structure.

  7. Comparison of WDM/Pulse-Position-Modulation (WDM/PPM) with Code/Pulse-Position-Swapping (C/PPS) Based on Wavelength/Time Codes

    Energy Technology Data Exchange (ETDEWEB)

    Mendez, A J; Hernandez, V J; Gagliardi, R M; Bennett, C V

    2009-06-19

    Pulse position modulation (PPM) signaling is favored in intensity modulated/direct detection (IM/DD) systems that have average power limitations. Combining PPM with WDM over a fiber link (WDM/PPM) enables multiple accessing and increases the link's throughput. Electronic bandwidth and synchronization advantages are further gained by mapping the time slots of PPM onto a code space, or code/pulse-position-swapping (C/PPS). The property of multiple bits per symbol typical of PPM can be combined with multiple accessing by using wavelength/time [W/T] codes in C/PPS. This paper compares the performance of WDM/PPM and C/PPS for equal wavelengths and bandwidth.

  8. RCC-E a Design Code for I and C and Electrical Systems

    International Nuclear Information System (INIS)

    The paper deals with the stakes and strength of the RCC-E code applicable to Electrical and Instrumentation and control systems and components as regards dealing with safety class functions. The document is interlacing specifications between Owners, safety authorities, designers, and suppliers IAEA safety guides and IEC standards. The code is periodically updated and published by French Society for Design and Construction rules for Nuclear Island Components (AFCEN). The code is compliant with third generation PWR nuclear islands and aims to suit with national regulations as needed in a companion document. The Feedback experience of Fukushima and the licensing of UKEPR in the framework of Generic Design Assessment are lessons learnt that should be considered in the upgrading of the code. The code gathers a set of requirements and relevant good practices of several PWR design and construction practices related to the electrical and I and C systems and components, and electrical engineering documents dealing with systems, equipment and layout designs. Comprehensive statement including some recent developments will be provided about: - Offsite and onsite sources requirements including sources dealing the total loss of off sites and main onsite sources. - Highlights of a relevant protection level against high frequencies disturbances emitted by lightning strokes, Interfaces data used by any supplier or designer such as site data, rooms temperature, equipment maximum design temperature, alternative current and direct current electrical network voltages and frequency variation ranges, environmental conditions decoupling data, - Environmental Qualification process including normal, mild (earthquake resistant), harsh and severe accident ambient conditions. A suit made approach based on families, which are defined as a combination of mission time, duration and abnormal conditions (pressure, temperature, radiation), enables to better cope with Environmental Qualifications

  9. Verification of the shift Monte Carlo code with the C5G7 reactor benchmark

    Energy Technology Data Exchange (ETDEWEB)

    Sly, N. C.; Mervin, B. T. [Dept. of Nuclear Engineering, Univ. of Tennessee, 311 Pasqua Engineering Building, Knoxville, TN 37996-2300 (United States); Mosher, S. W.; Evans, T. M.; Wagner, J. C. [Oak Ridge National Laboratory, PO Box 2008, Oak Ridge, TN 37831 (United States); Maldonado, G. I. [Dept. of Nuclear Engineering, Univ. of Tennessee, 311 Pasqua Engineering Building, Knoxville, TN 37996-2300 (United States)

    2012-07-01

    Shift is a new hybrid Monte Carlo/deterministic radiation transport code being developed at Oak Ridge National Laboratory. At its current stage of development, Shift includes a parallel Monte Carlo capability for simulating eigenvalue and fixed-source multigroup transport problems. This paper focuses on recent efforts to verify Shift's Monte Carlo component using the two-dimensional and three-dimensional C5G7 NEA benchmark problems. Comparisons were made between the benchmark eigenvalues and those output by the Shift code. In addition, mesh-based scalar flux tally results generated by Shift were compared to those obtained using MCNP5 on an identical model and tally grid. The Shift-generated eigenvalues were within three standard deviations of the benchmark and MCNP5-1.60 values in all cases. The flux tallies generated by Shift were found to be in very good agreement with those from MCNP. (authors)

  10. A portable, parallel, object-oriented Monte Carlo neutron transport code in C++

    International Nuclear Information System (INIS)

    We have developed a multi-group Monte Carlo neutron transport code using C++ and the Parallel Object-Oriented Methods and Applications (POOMA) class library. This transport code, called MC++, currently computes k and α-eigenvalues and is portable to and runs parallel on a wide variety of platforms, including MPPs, clustered SMPs, and individual workstations. It contains appropriate classes and abstractions for particle transport and, through the use of POOMA, for portable parallelism. Current capabilities of MC++ are discussed, along with physics and performance results on a variety of hardware, including all Accelerated Strategic Computing Initiative (ASCI) hardware. Current parallel performance indicates the ability to compute α-eigenvalues in seconds to minutes rather than hours to days. Future plans and the implementation of a general transport physics framework are also discussed

  11. Implementation of an anisotropic turbulence model in the COMMIX- 1C/ATM computer code

    International Nuclear Information System (INIS)

    The computer code COMMIX-1C/ATM, which describes single-phase, three-dimensional transient thermofluiddynamic problems, has provided the framework for the extension of the standard k-var-epsilon turbulence model to a six-equation model with additional transport equations for the turbulence heat fluxes and the variance of temperature fluctuations. The new, model, which allows simulation of anisotropic turbulence in stratified shear flows, is referred to as the Anisotropic Turbulence Model (ATM) has been verified with numerical computations of stable and unstable stratified shear flow between parallel plates

  12. A Method to Assess Robustness of GPS C/A Code in Presence of CW Interferences

    Directory of Open Access Journals (Sweden)

    Beatrice Motella

    2010-01-01

    Full Text Available Navigation/positioning platforms integrated with wireless communication systems are being used in a rapidly growing number of new applications. The mutual benefits they can obtain from each other are intrinsically related to the interoperability level and to a properly designed coexistence. In this paper a new family of curves, called Interference Error Envelope (IEE, is used to assess the impact of possible interference due to other systems (e.g., communications transmitting in close bandwidths to Global Navigation Satellite System (GNSS signals. The focus is on the analysis of the GPS C/A code robustness against Continuous Wave (CW interference.

  13. Determination of the δ13C of dissolved inorganic carbon in water; RSIL lab code 1710

    Science.gov (United States)

    Singleton, Glenda L.; Revesz, Kinga; Coplen, Tyler B.

    2012-01-01

    The purpose of the Reston Stable Isotope Laboratory (RSIL) lab code 1710 is to present a method to determine the δ13C of dissolved inorganic carbon (DIC) of water. The DIC of water is precipitated using ammoniacal strontium chloride (SrCl2) solution to form strontium carbonate (SrCO3). The δ13C is analyzed by reacting SrCO3 with 100-percent phosphoric acid (H3PO4) to liberate carbon quantitatively as carbon dioxide (CO2), which is collected, purified by vacuum sublimation, and analyzed by dual inlet isotope-ratio mass spectrometry (DI-IRMS). The DI-IRMS is a DuPont double-focusing mass spectrometer. One ion beam passes through a slit in a forward collector and is collected in the rear collector. The other measurable ion beams are collected in the front collector. By changing the ion-accelerating voltage under computer control, the instrument is capable of measuring mass/charge (m/z) 45 or 46 in the rear collector and m/z 44 and 46 or 44 and 45, respectively, in the front collector. The ion beams from these m/z values are as follows: m/z 44 = CO2 = 12C16O16O, m/z 45 = CO2 = 13C16O16O primarily, and m/z 46 = CO2 = 12C16O18O primarily. The data acquisition and control software calculates δ13C values.

  14. 3D PiC code investigations of Auroral Kilometric Radiation mechanisms

    International Nuclear Information System (INIS)

    Efficient (∼1%) electron cyclotron radio emissions are known to originate in the X mode from regions of locally depleted plasma in the Earths polar magnetosphere. These emissions are commonly referred to as the Auroral Kilometric Radiation (AKR). AKR occurs naturally in these polar regions where electrons are accelerated by electric fields into the increasing planetary magnetic dipole. Here conservation of the magnetic moment converts axial to rotational momentum forming a horseshoe distribution in velocity phase space. This distribution is unstable to cyclotron emission with radiation emitted in the X-mode. Initial studies were conducted in the form of 2D PiC code simulations [1] and a scaled laboratory experiment that was constructed to reproduce the mechanism of AKR. As studies progressed, 3D PiC code simulations were conducted to enable complete investigation of the complex interaction dimensions. A maximum efficiency of 1.25% is predicted from these simulations in the same mode and frequency as measured in the experiment. This is also consistent with geophysical observations and the predictions of theory.

  15. A group of neutronics calculations in the MNSR using the MCNP-4C code

    International Nuclear Information System (INIS)

    The MCNP-4C code was used to model the 3-D core configuration for the Syrian Miniature Neutron Source Reactor (MNSR). The continuous energy neutron cross sections were evaluated from ENDF/B-VI library to calculate the thermal and fast neutron fluxes in the MNSR inner and outer irradiation sites. The thermal fluxes in the MNSR inner irradiation sites were measured for the first time using the multiple foil activation method. Good agreements were noticed between the calculated and measured results. This model is used as well to calculate neutron flux spectrum in the reactor inner and outer irradiation sites and the reactor thermal power. Three 3-D neutronic models for the Syrian MNSR reactor using the MCNP-4C code were developed also to assess the possibility of fuel conversion from 89.87 % HEU fuel (UAl4-Al) to 19.75 % LEU fuel (UO2). This model is used in this paper to calculate the following reactor core physics parameters: clean cold core excess reactivity, calibration of the control rod worth and calculation its shut down margin, calibration of the top beryllium shim plate reflector, axial neutron flux distributions in the inner and outer irradiation sites and the kinetics parameters ( ιp l and βeff). (authors)

  16. MC++: A parallel, portable, Monte Carlo neutron transport code in C++

    International Nuclear Information System (INIS)

    MC++ is an implicit multi-group Monte Carlo neutron transport code written in C++ and based on the Parallel Object-Oriented Methods and Applications (POOMA) class library. MC++ runs in parallel on and is portable to a wide variety of platforms, including MPPs, SMPs, and clusters of UNIX workstations. MC++ is being developed to provide transport capabilities to the Accelerated Strategic Computing Initiative (ASCI). It is also intended to form the basis of the first transport physics framework (TPF), which is a C++ class library containing appropriate abstractions, objects, and methods for the particle transport problem. The transport problem is briefly described, as well as the current status and algorithms in MC++ for solving the transport equation. The alpha version of the POOMA class library is also discussed, along with the implementation of the transport solution algorithms using POOMA. Finally, a simple test problem is defined and performance and physics results from this problem are discussed on a variety of platforms

  17. Simulation of absorbed dose in human blood with MCNP 4C code

    International Nuclear Information System (INIS)

    Biological dosimetry, based on the analysis of solid stained dicentric chromosomes, has been used since the mid 1960s. The intervening years have seen great improvements bringing the technique to a point where dicentric analysis has become a routine component of the radiological protection programs of many countries. Experience of its application in thousands of cases of actual or suspected overexposures has proved the worth of the method. The aberrations scored in the lymphocytes are interpreted in terms of absorbed dose by reference to a dose response calibration curve. This curve will have been produced by exposure of blood in vitro to doses of the appropriate quality of radiation. The doses given to the specimens should be traceable via a physical instrument such as an ionization chamber, to a primary or secondary standard. An alternative to obtain the information about absorbed dose in a specific blood volume is through the Monte Carlo method. The use of such technique is worldwide when physical measurements are inconvenient or impossible, and particularly useful for the solution of complex problems that cannot be modeled by codes that use deterministic methods. It is applied to particle systems as neutrons and electrons, as well as photons or still in mixed systems. Due to difficulties that involve the use of neutrons, this technique has shown extreme importance for preliminary research and experimental arrangements with neutron sources. In this study, the main objective was to simulate the dose absorbed by a blood sample in an experimental arrangement through the irradiation with sources of 241AmBe. It was used the code Monte Carlo N-Particle version 4C (MCNP 4C) whose data had been processed parallel in a computational structure in a cluster. This method allowed estimating the absorbed dose in a specific blood volume, making possible the experimental setup arrangement. (author)

  18. Conceptual OOP design of Pilot Code for Two-Fluid, Three-field Model with C++ 6.0

    Energy Technology Data Exchange (ETDEWEB)

    Chung, B. D.; Lee, Y. J

    2006-09-15

    To establish the concept of the objective oriented program (OOP) design for reactor safety analysis code, the preliminary OOP design for PILOT code, which based on one dimensional two fluid three filed model, has been attempted with C++ language feature. Microsoft C++ language has been used since it is available as groupware utilization in KAERI. The language has can be merged with Compac Visual Fortran 6.6 in Visual Studio platform. In the development platform, C++ has been used as main language and Fortran has been used as mixed language in connection with C++ main drive program. The mixed language environment is a specific feature provided in visual studio. Existing Fortran source was utilized for input routine of reading steam table from generated file and routine of steam property calculation. The calling convention and passing argument from C++ driver was corrected. The mathematical routine, such as inverse matrix conversion and tridiagonal matrix solver, has been used as PILOT Fortran routines. Simple volume and junction utilized in PILOT code can be treated as objects, since they are the basic construction elements of code system. Other routines for overall solution scheme have been realized as procedure C functions. The conceptual design which consists of hydraulic loop, component, volume, and junction class has been described in the appendix in order to give the essential OOP structure of system safety analysis code. The attempt shows that many part of system analysis code can be expressed as objects, although the overall structure should be maintained as procedure functions. The encapsulation of data and functions within an object can provide many beneficial aspects in programming of system code.

  19. Conceptual OOP design of Pilot Code for Two-Fluid, Three-field Model with C++ 6.0

    International Nuclear Information System (INIS)

    To establish the concept of the objective oriented program (OOP) design for reactor safety analysis code, the preliminary OOP design for PILOT code, which based on one dimensional two fluid three filed model, has been attempted with C++ language feature. Microsoft C++ language has been used since it is available as groupware utilization in KAERI. The language has can be merged with Compac Visual Fortran 6.6 in Visual Studio platform. In the development platform, C++ has been used as main language and Fortran has been used as mixed language in connection with C++ main drive program. The mixed language environment is a specific feature provided in visual studio. Existing Fortran source was utilized for input routine of reading steam table from generated file and routine of steam property calculation. The calling convention and passing argument from C++ driver was corrected. The mathematical routine, such as inverse matrix conversion and tridiagonal matrix solver, has been used as PILOT Fortran routines. Simple volume and junction utilized in PILOT code can be treated as objects, since they are the basic construction elements of code system. Other routines for overall solution scheme have been realized as procedure C functions. The conceptual design which consists of hydraulic loop, component, volume, and junction class has been described in the appendix in order to give the essential OOP structure of system safety analysis code. The attempt shows that many part of system analysis code can be expressed as objects, although the overall structure should be maintained as procedure functions. The encapsulation of data and functions within an object can provide many beneficial aspects in programming of system code

  20. Pressure vessel design codes: A review of their applicability to HTGR components at temperatures above 800 deg C

    International Nuclear Information System (INIS)

    The governments of USA and Federal Republic of Germany have approved of cooperation between the two countries in an endeavour to establish structural design code for gas reactor components intended to operate at temperatures exceeding 800 deg C. The basis of existing codes and their applicability to gas reactor component design are reviewed in this paper. This review has raised a number of important questions as to the direct applicability of the present codes. The status of US and FRG cooperative efforts to obtain answers to these questions are presented

  1. C5 Benchmark Problem with Discrete Ordinate Radiation Transport Code DENOVO

    International Nuclear Information System (INIS)

    The C5 benchmark problem proposed by the Organisation for Economic Co-operation and Development/Nuclear Energy Agency was modeled to examine the capabilities of Denovo, a three-dimensional (3-D) parallel discrete ordinates (SN) radiation transport code, for problems with no spatial homogenization. Denovo uses state-of-the-art numerical methods to obtain accurate solutions to the Boltzmann transport equation. Problems were run in parallel on Jaguar, a high-performance supercomputer located at Oak Ridge National Laboratory. Both the two-dimensional (2-D) and 3-D configurations were analyzed, and the results were compared with the reference MCNP Monte Carlo calculations. For an additional comparison, SCALE/KENO-V.a Monte Carlo solutions were also included. In addition, a sensitivity analysis was performed for the optimal angular quadrature and mesh resolution for both the 2-D and 3-D infinite lattices of UO2 fuel pin cells. Denovo was verified with the C5 problem. The effective multiplication factors, pin powers, and assembly powers were found to be in good agreement with the reference MCNP and SCALE/KENO-V.a Monte Carlo calculations.

  2. Application of the INSTANT-HPS PN Transport Code to the C5G7 Benchmark Problem

    International Nuclear Information System (INIS)

    INSTANT is the INL's next generation neutron transport solver to support high-fidelity multi-physics reactor simulation INSTANT is in continuous development to extend its capability Code is designed to take full advantage of middle to large cluster (10-1000 processors) Code is designed to focus on method adaptation while also mesh adaptation will be possible. It utilizes the most modern computing techniques to generate a neutronics tool of full-core transport calculations for reactor analysis and design. It can perform calculations on unstructured 2D/3D triangular, hexagonal and Cartesian geometries. Calculations can be easily extended to more geometries because of the independent mesh framework coded with the model Fortran. This code has a multigroup solver with thermal rebalance and Chebyshev acceleration. It employs second-order PN and Hybrid Finite Element method (PNHFEM) discretization scheme. Three different in-group solvers - preconditioned Conjugate Gradient (CG) method, preconditioned Generalized Minimal Residual Method (GMRES) and Red-Black iteration - have been implemented and parallelized with the spatial domain decomposition in the code. The input is managed with extensible markup language (XML) format. 3D variables including the flux distributions are outputted into VTK files, which can be visualized by tools such as VisIt and ParaView. An extension of the code named INSTANTHPS provides the capability to perform 3D heterogeneous transport calculations within fuel pins. C5G7 is an OECD/NEA benchmark problem created to test the ability of modern deterministic transport methods and codes to treat reactor core problems without spatial homogenization. This benchmark problem had been widely analyzed with various code packages. In this transaction, results of the applying the INSTANT-HPS code to the C5G7 problem are summarized.

  3. The new deterministic 3-D radiation transport code Multitrans: C5G7 MOX fuel assembly benchmark

    International Nuclear Information System (INIS)

    The novel deterministic three-dimensional radiation transport code MultiTrans is based on combination of the advanced tree multigrid technique and the simplified P3 (SP3) radiation transport approximation. In the tree multigrid technique, an automatic mesh refinement is performed on material surfaces. The tree multigrid is generated directly from stereo-lithography (STL) files exported by computer-aided design (CAD) systems, thus allowing an easy interface for construction and upgrading of the geometry. The deterministic MultiTrans code allows fast solution of complicated three-dimensional transport problems in detail, offering a new tool for nuclear applications in reactor physics. In order to determine the feasibility of a new code, computational benchmarks need to be carried out. In this work, MultiTrans code is tested for a seven-group three-dimensional MOX fuel assembly transport benchmark without spatial homogenization (NEA C5G7 MOX). (author)

  4. A comparison of the performance of a fluid code on the C90 and the iPSC/860

    International Nuclear Information System (INIS)

    The performance of nonlinear runs of a fluid code on the NERSC C90 and the ORNL Intel iPSC/860 is compared. This version of the KITE code is an initial value, three-dimensional, nonlinear, five-field code used for plasma turbulence studies. Because of the Fourier harmonic expansions in both sines and cosines, it has ten equations. The runs have from 385 to 513 radial grid points and 455 to 539 Fourier harmonics. The main components of the code are convolutions of Fourier harmonics and block tridiagonal matrix solves. Both parallel codes are optimized for the computer they use. With the collaboration of NERSC, microtasking calls have been added to the KITE serial code on the C90. The loop that contains calls to the block tridiagonal matrix solver is performed in parallel over the number of Fourier harmonics. The convolution routines also contain microtasking commands to compute the do loops in parallel over the number of Fourier harmonics. The authors are using an average of six concurrent CPUs for runs of thousands of timesteps in batch and many of the subroutines called every timestep are not microtasked yet. The KITE parallel code is running on 128 processors of the iPSC/860. The massively parallel version of this code allocates a radial region for each node. In this way, convolutions at a fixed radius are performed in parallel, and communication is limited to boundary values for each radial region. A second parallelization takes place for the block-tridiagonal solves. The Fourier components are distributed in nodes. In each node, the block-tridiagonal matrix is inverted for each of the allocated Fourier components. The authors compare CPU times, constraints imposed by memory size of the machines, difficulties in storing resulting data, and wallclock time needed to complete nonlinear runs

  5. Performance of the MTR core with MOX fuel using the MCNP4C2 code.

    Science.gov (United States)

    Shaaban, Ismail; Albarhoum, Mohamad

    2016-08-01

    The MCNP4C2 code was used to simulate the MTR-22 MW research reactor and perform the neutronic analysis for a new fuel namely: a MOX (U3O8&PuO2) fuel dispersed in an Al matrix for One Neutronic Trap (ONT) and Three Neutronic Traps (TNTs) in its core. Its new characteristics were compared to its original characteristics based on the U3O8-Al fuel. Experimental data for the neutronic parameters including criticality relative to the MTR-22 MW reactor for the original U3O8-Al fuel at nominal power were used to validate the calculated values and were found acceptable. The achieved results seem to confirm that the use of MOX fuel in the MTR-22 MW will not degrade the safe operational conditions of the reactor. In addition, the use of MOX fuel in the MTR-22 MW core leads to reduce the uranium fuel enrichment with (235)U and the amount of loaded (235)U in the core by about 34.84% and 15.21% for the ONT and TNTs cases, respectively. PMID:27213809

  6. Implementation of scalable video coding deblocking filter from high-level SystemC description

    Science.gov (United States)

    Carballo, Pedro P.; Espino, Omar; Neris, Romén.; Hernández-Fernández, Pedro; Szydzik, Tomasz M.; Núñez, Antonio

    2013-05-01

    This paper describes key concepts in the design and implementation of a deblocking filter (DF) for a H.264/SVC video decoder. The DF supports QCIF and CIF video formats with temporal and spatial scalability. The design flow starts from a SystemC functional model and has been refined using high-level synthesis methodology to RTL microarchitecture. The process is guided with performance measurements (latency, cycle time, power, resource utilization) with the objective of assuring the quality of results of the final system. The functional model of the DF is created in an incremental way from the AVC DF model using OpenSVC source code as reference. The design flow continues with the logic synthesis and the implementation on the FPGA using various strategies. The final implementation is chosen among the implementations that meet the timing constraints. The DF is capable to run at 100 MHz, and macroblocks are processed in 6,500 clock cycles for a throughput of 130 fps for QCIF format and 37 fps for CIF format. The proposed architecture for the complete H.264/SVC decoder is composed of an OMAP 3530 SOC (ARM Cortex-A8 GPP + DSP) and the FPGA Virtex-5 acting as a coprocessor for DF implementation. The DF is connected to the OMAP SOC using the GPMC interface. A validation platform has been developed using the embedded PowerPC processor in the FPGA, composing a SoC that integrates the frame generation and visualization in a TFT screen. The FPGA implements both the DF core and a GPMC slave core. Both cores are connected to the PowerPC440 embedded processor using LocalLink interfaces. The FPGA also contains a local memory capable of storing information necessary to filter a complete frame and to store a decoded picture frame. The complete system is implemented in a Virtex5 FX70T device.

  7. Transduplication resulted in the incorporation of two protein-coding sequences into the Turmoil-1 transposable element of C. elegans

    Directory of Open Access Journals (Sweden)

    Pupko Tal

    2008-10-01

    Full Text Available Abstract Transposable elements may acquire unrelated gene fragments into their sequences in a process called transduplication. Transduplication of protein-coding genes is common in plants, but is unknown of in animals. Here, we report that the Turmoil-1 transposable element in C. elegans has incorporated two protein-coding sequences into its inverted terminal repeat (ITR sequences. The ITRs of Turmoil-1 contain a conserved RNA recognition motif (RRM that originated from the rsp-2 gene and a fragment from the protein-coding region of the cpg-3 gene. We further report that an open reading frame specific to C. elegans may have been created as a result of a Turmoil-1 insertion. Mutations at the 5' splice site of this open reading frame may have reactivated the transduplicated RRM motif. Reviewers This article was reviewed by Dan Graur and William Martin. For the full reviews, please go to the Reviewers' Reports section.

  8. SCALE: A modular code system for performing standardized computer analyses for licensing evaluation: Control modules C4, C6

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This Manual represents Revision 5 of the user documentation for the modular code system referred to as SCALE. The history of the SCALE code system dates back to 1969 when the current Computational Physics and Engineering Division at Oak Ridge National Laboratory (ORNL) began providing the transportation package certification staff at the U. S. Atomic Energy Commission with computational support in the use of the new KENO code for performing criticality safety assessments with the statistical Monte Carlo method. From 1969 to 1976 the certification staff relied on the ORNL staff to assist them in the correct use of codes and data for criticality, shielding, and heat transfer analyses of transportation packages. However, the certification staff learned that, with only occasional use of the codes, it was difficult to become proficient in performing the calculations often needed for an independent safety review. Thus, shortly after the move of the certification staff to the U.S. Nuclear Regulatory Commission (NRC), the NRC staff proposed the development of an easy-to-use analysis system that provided the technical capabilities of the individual modules with which they were familiar. With this proposal, the concept of the Standardized Computer Analyses for Licensing Evaluation (SCALE) code system was born. This volume is part of the manual related to the control modules for the newest updated version of this computational package.

  9. SCALE: A modular code system for performing standardized computer analyses for licensing evaluation: Control modules C4, C6

    International Nuclear Information System (INIS)

    This Manual represents Revision 5 of the user documentation for the modular code system referred to as SCALE. The history of the SCALE code system dates back to 1969 when the current Computational Physics and Engineering Division at Oak Ridge National Laboratory (ORNL) began providing the transportation package certification staff at the U. S. Atomic Energy Commission with computational support in the use of the new KENO code for performing criticality safety assessments with the statistical Monte Carlo method. From 1969 to 1976 the certification staff relied on the ORNL staff to assist them in the correct use of codes and data for criticality, shielding, and heat transfer analyses of transportation packages. However, the certification staff learned that, with only occasional use of the codes, it was difficult to become proficient in performing the calculations often needed for an independent safety review. Thus, shortly after the move of the certification staff to the U.S. Nuclear Regulatory Commission (NRC), the NRC staff proposed the development of an easy-to-use analysis system that provided the technical capabilities of the individual modules with which they were familiar. With this proposal, the concept of the Standardized Computer Analyses for Licensing Evaluation (SCALE) code system was born. This volume is part of the manual related to the control modules for the newest updated version of this computational package

  10. Two human cDNA molecules coding for the Duchenne muscular dystrophy (DMD) locus are highly homologous

    Energy Technology Data Exchange (ETDEWEB)

    Rosenthal, A.; Speer, A.; Billwitz, H. (Zentralinstitut fuer Molekularbiologie, Berlin-Buch (Germany Democratic Republic)); Cross, G.S.; Forrest, S.M.; Davies, K.E. (Univ. of Oxford (England))

    1989-07-11

    Recently the complete sequence of the human fetal cDNA coding for the Duchenne muscular dystrophy (DMD) locus was reported and a 3,685 amino acid long, rod-shaped cytoskeletal protein (dystrophin) was predicted as the protein product. Independently, the authors have isolated and sequenced different DMD cDNA molecules from human adult and fetal muscle. The complete 12.5 kb long sequence of all their cDNA clones has now been determined and they report here the nucleotide (nt) and amino acid (aa) differences between the sequences of both groups. The cDNA sequence comprises the whole coding region but lacks the first 110 nt from the 5{prime}-untranslated region and the last 1,417 nt of the 3{prime}-untranslated region. They have found 11 nt differences (approximately 99.9% homology) from which 7 occurred at the aa level.

  11. GB - a preliminary linking code between MCNP4C and Origen2.1 - DEN/UFMG version

    International Nuclear Information System (INIS)

    Nowadays it is possible to perform burnup simulation in a detailed 3D geometry and a continuous energy description by the Monte Carlo method. This paper describes an initial project to create and verify a connection code to link Origen2.1 (Oak Ridge National Laboratory) and MCNP4C (Los Alamos National Laboratory). Essentially the code includes point depletion capability to the MCNP code. The incorporation of point depletion capability is explicit and can be summarized by three steps: 1-Monte Carlo determines reaction rates, 2-the reaction rates are used to determine microscopic cross sections for depletion equations, 3-solution of depletion equations (given by Origen2.1) determines number densities for next MCNP step. To evaluate the initial version of the program, we focused on comparing the results with one of the major Monte Carlo burnup codes: MCNPX version 2.6.0. The input files for all codes share the same MCNP geometry, nuclear data library and core thermal power. While simulating 75 time steps at 800 kw of a Heat Pipe Power System model, we have found that the codes generate very similar results. The neutron flux and criticality value of the core agree, especially in the begin of burnup when the influence of fission products are not very considerable. The small difference encountered was probably caused by the difference in the number of isotopes considered in the transport models (89 MCNPX x 25 GB (author)

  12. Code C# for chaos analysis of relativistic many-body systems with reactions

    Science.gov (United States)

    Grossu, I. V.; Besliu, C.; Jipa, Al.; Stan, E.; Esanu, T.; Felea, D.; Bordeianu, C. C.

    2012-04-01

    In this work we present a reaction module for “Chaos Many-Body Engine” (Grossu et al., 2010 [1]). Following our goal of creating a customizable, object oriented code library, the list of all possible reactions, including the corresponding properties (particle types, probability, cross section, particle lifetime, etc.), could be supplied as parameter, using a specific XML input file. Inspired by the Poincaré section, we propose also the “Clusterization Map”, as a new intuitive analysis method of many-body systems. For exemplification, we implemented a numerical toy-model for nuclear relativistic collisions at 4.5 A GeV/c (the SKM200 Collaboration). An encouraging agreement with experimental data was obtained for momentum, energy, rapidity, and angular π distributions. Catalogue identifier: AEGH_v2_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEGH_v2_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 184 628 No. of bytes in distributed program, including test data, etc.: 7 905 425 Distribution format: tar.gz Programming language: Visual C#.NET 2005 Computer: PC Operating system: Net Framework 2.0 running on MS Windows Has the code been vectorized or parallelized?: Each many-body system is simulated on a separate execution thread. One processor used for each many-body system. RAM: 128 Megabytes Classification: 6.2, 6.5 Catalogue identifier of previous version: AEGH_v1_0 Journal reference of previous version: Comput. Phys. Comm. 181 (2010) 1464 External routines: Net Framework 2.0 Library Does the new version supersede the previous version?: Yes Nature of problem: Chaos analysis of three-dimensional, relativistic many-body systems with reactions. Solution method: Second order Runge-Kutta algorithm for simulating relativistic many-body systems with reactions

  13. An assessment of S E A O N C draft code for resilient sliding isolators in nuclear power plants

    International Nuclear Information System (INIS)

    The displacement responses of rigid structures supported on resilient sliding isolation system with various frictions to six different ground motions normalized to ground velocity ;levels from 1 to 25 inches per Second are evaluated. Through the application of an equivalent damping procedure, the minimum required displacement capacities as dictated by the S E A O N C draft code are also estimated. It is concluded that, even though the code displacement requirement is on the conservative side, the displacement capacity requirement is not excessive. (author)

  14. Calibration of a foot borne spectrometry system using the MCNP 4C code

    International Nuclear Information System (INIS)

    The increased interest for the cycling of radioactive Caesium in natural ecosystems has gained need for rapid and reliable methods to investigate the deposition density in natural soils. One commonly used method, soil sampling, is a good method that correctly used gives information of both the horizontal and vertical distribution of the desired nuclide. The main disadvantage is that the method is time consuming regarding sampling, preparation and measurements. An alternative method is the use of semiconductors or scintillation detectors in the field i.e. in cars, airplanes, or helicopters. Theses methods are rapid and integrate over large areas which gives a more reliable mean value provided that the operator has some basic knowledge about the depth distribution of the radio nuclides and bulk density in the soil. To be effective the systems are often connected to a GPS to give the exact coordinate for each measurement. In a situation where the area of interest is too large to cover by soil samples and measurements by airplane not will give a spatial resolution good enough, one feasible method is to use a foot borne gamma spectrometry system. The advantage of a foot borne system is that the operator can cover a quite large area within a few hours and that the method can detect small anomalies in the deposition field which may be difficult to discover with soil samples. This abstract describes the calibration of a foot borne gamma-spectrometry system carried in a back-pack and consisting of a NaI-detector, a GPS and a system for logging activity and position. The detector system and surroundings has been modeled in the Monte Carlo code MCNP 4C (Figure 1). The Monte Carlo method gives the possibility to study the influence of complex geometries that are difficult to create for a practical calibration using real activity. The results of the MCNP calibration model, has been compared to foot borne gamma-spectrometry field measurements in a Cs-137 deposition area. A

  15. Calculate Some Characteristic Parameters Of VVER-1000's Fuel Assembly By MCNP4C2 Code

    International Nuclear Information System (INIS)

    This report presents the descriptions of parameters characteristics of the LEU and MOX Fuel Assemblies of VVER-1000 reactor, and calculation results such as infinite neutron multiplication factor kinf, two groups energies constants, neutron flux distribution by using Monte Carlo code MCNP. (author)

  16. GoCxx: a tool to easily leverage C++ legacy code for multicore-friendly Go libraries and frameworks

    International Nuclear Information System (INIS)

    Current HENP libraries and frameworks were written before multicore systems became widely deployed and used. From this environment, a ‘single-thread’ processing model naturally emerged but the implicit assumptions it encouraged are greatly impairing our abilities to scale in a multicore/manycore world. Writing scalable code in C++ for multicore architectures, while doable, is no panacea. Sure, C++11 will improve on the current situation (by standardizing on std::thread, introducing lambda functions and defining a memory model) but it will do so at the price of complicating further an already quite sophisticated language. This level of sophistication has probably already strongly motivated analysis groups to migrate to CPython, hoping for its current limitations with respect to multicore scalability to be either lifted (Grand Interpreter Lock removal) or for the advent of a new Python VM better tailored for this kind of environment (PyPy, Jython, …) Could HENP migrate to a language with none of the deficiencies of C++ (build time, deployment, low level tools for concurrency) and with the fast turn-around time, simplicity and ease of coding of Python? This paper will try to make the case for Go - a young open source language with built-in facilities to easily express and expose concurrency - being such a language. We introduce GoCxx, a tool leveraging gcc-xml's output to automatize the tedious work of creating Go wrappers for foreign languages, a critical task for any language wishing to leverage legacy and field-tested code. We will conclude with the first results of applying GoCxx to real C++ code.

  17. Comparison of Calculated Neutron Fluxes at Specimen Position of Neutron Radiography Facility using MCNP4C code with Measurement

    International Nuclear Information System (INIS)

    The objective of the study is to compare the thermal neutron fluxes at specimen positions of neutron radiography facility calculated by MCNP4C code with the measurement. A model for calculation was developed using details of the reactor core configuration no. 14 and neutron radiography facility installed at the existing research reactor, TRR-1/M1 reactor. Assuming all fresh fuel elements and all control rod out condition, the thermal neutron fluxes at various specimen positions were calculated using MCNP4C code. The calculation are verified by the measurement using foil activation method. Generally, the calculated neutron fluxes are overestimated by 16-20% which is reasonably good agreement and acceptable for the complex system. The discrepancy is expected to the assumption of using fresh fuel elements, all control rod out condition, and also lacks of information in develop a more accurate model for calculation. This study shows the possibility of using the MCNP4C code to verify the thermal neutron fluxes at specimen position and shielding design of the new neutron radiography facility at the new Thai research reactor

  18. cDNA sequence of human transforming gene hst and identification of the coding sequence required for transforming activity

    International Nuclear Information System (INIS)

    The hst gene was originally identified as a transforming gene in DNAs from human stomach cancers and from a noncancerous portion of stomach mucosa by DNA-mediated transfection assay using NIH3T3 cells. cDNA clones of hst were isolated from the cDNA library constructed from poly(A)+ RNA of a secondary transformant induced by the DNA from a stomach cancer. The sequence analysis of the hst cDNA revealed the presence of two open reading frames. When this cDNA was inserted into an expression vector containing the simian virus 40 promoter, it efficiently induced the transformation of NIH3T3 cells upon transfection. It was found that one of the reading frames, which coded for 206 amino acids, was responsible for the transforming activity

  19. Steady state thermal-hydraulic analysis using computer code cobra-3c/rertr for low power research reactors

    International Nuclear Information System (INIS)

    A number of codes are available for performing the steady state and transient thermal-hydraulics of nuclear reactors Viz RELAP,COBRA,PARET,etc. However COBRA-3C/RERTR is a verstile tool for the thermal hydraulic analysis of research reactors with steady state and transient capability . The steady state capability of the code is tested for a reference core of research reactor similar to PARR. Reference core under consideration is of 6x4 configuration with UAL-Al fuel and with 18 standard and 6 control elements. Safety margins against different critical phenomena like onset of nucleate boiling, departure from nucleate boiling and onset of flow instability are evaluated as a function of operating power and flow rate. Results indicate that COBRA-3C/RERTR can be used for a range of steady state parametric evaluations of PARR-1 type cores with any type of fuel used i.e. LEU, HEU, silicide, Oxide or aluminide with plate type geometry. The results reported, demonstrate the useful capability of the code and may provide a basis for comparison of results for any type of LEU, HEU or mixed cores, in future

  20. COMMIX-1C code estimation for the pool dynamics of Istanbul Technical University TRIGA MARK-II reactor

    International Nuclear Information System (INIS)

    In this study, the COMMIX-1C code is used to investigate the pool dynamics of Istanbul Technical University (ITU)TRIGA MARK-II reactor by simulating the velocity, pressure and temperature distributions in the reactor pool as a function of core design parameters and pool configuration. COMMIX-1C is multi-purpose, three-dimensional. transient, single-phase, thermal-hydraulics computer code. For the mass, momentum and energy equations, it uses a porous-medium formulation, a finite-volume algorithm, a flow modulated skew-upwind discretization scheme to reduce numerical diffusion and k-ε two-equation turbulence model. Its implementation for the particular system requires geometric and physical modelling decisions. ITU TRIGA MARK-II reactor pool is considered partly as continuum and partly as porous medium. All the major pool components are explicitly modelled in the simulation. Shape of the pool structure and computational cells are accounted for using the concept of directional surface permeability, volume porosity, distributed resistance, and distributed heat source or sink. The results are compared to the results of the computer codes TRISTAN, TRIGATH and TRIGATH-R

  1. Performance Analysis of Code OptimizationBased on TMS320C6678 Multi-core DSP

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    In the development of modern DSP, more and more use of C/C++ as a development language has become a trend. Optimizationof C/C++ program has become an important link of the DSP software development. This article describes the structure features ofTMS320C6678 processor, illustrates the principle of efficient optimization method for C/C++, and analyzes the results.

  2. MYCN/c-MYC-induced microRNAs repress coding gene networks associated with poor outcome in MYCN/c-MYC-activated tumors.

    Science.gov (United States)

    Mestdagh, P; Fredlund, E; Pattyn, F; Schulte, J H; Muth, D; Vermeulen, J; Kumps, C; Schlierf, S; De Preter, K; Van Roy, N; Noguera, R; Laureys, G; Schramm, A; Eggert, A; Westermann, F; Speleman, F; Vandesompele, J

    2010-03-01

    Increased activity of MYC protein-family members is a common feature in many cancers. Using neuroblastoma as a tumor model, we established a microRNA (miRNA) signature for activated MYCN/c-MYC signaling in two independent primary neuroblastoma tumor cohorts and provide evidence that c-MYC and MYCN have overlapping functions. On the basis of an integrated approach including miRNA and messenger RNA (mRNA) gene expression data we show that miRNA activation contributes to widespread mRNA repression, both in c-MYC- and MYCN-activated tumors. c-MYC/MYCN-induced miRNA activation was shown to be dependent on c-MYC/MYCN promoter binding as evidenced by chromatin immunoprecipitation. Finally, we show that pathways, repressed through c-MYC/MYCN miRNA activation, are highly correlated to tumor aggressiveness and are conserved across different tumor entities suggesting that c-MYC/MYCN activate a core set of miRNAs for cooperative repression of common transcriptional programs related to disease aggressiveness. Our results uncover a widespread correlation between miRNA activation and c-MYC/MYCN-mediated coding gene expression modulation and further substantiate the overlapping functions of c-MYC and MYCN in the process of tumorigenesis. PMID:19946337

  3. 基于 GCC的 TMS320C67xx 汇编代码的优化%TMS320C67xx assembler code optimization based on GCC

    Institute of Scientific and Technical Information of China (English)

    王浩

    2015-01-01

    In order to generate higher efficiency assembler code ,design and implement a TMS320C67xx assembler in‐struction level optimization algorithm based on GCC .Firstly ,assembler instructions are divided into different types ac‐cording to the function of instructions .Then ,link assembler instructions to the list .Secondly ,establish a read and write operation instruction list for each register .Finally ,through the judgment of instruction types and the analysis of read and write instructions list for each register ,complete the deletion of redundant code and the merging of instructions .The ex‐perimental results show that the execution efficiency of TMS320C67xx assembler code increased by about 20% after code optimization .Compared with the intermediate code optimization ,execution efficiency increased by about 15% .%为了使生成的汇编代码具有更高的执行效率,设计并实现了一种基于GCC的 TMS320C67xx汇编指令级的代码优化算法。首先,将汇编指令按照功能划分为不同的指令类型,并将汇编指令链接到链表中。然后,针对每一个寄存器建立对该寄存器的读写操作指令链表。最后,通过对指令类型的判断和对寄存器读写操作指令链表的分析,完成了冗余代码的删除和指令合并。实验结果表明,经过代码优化后,TMS320C67xx汇编代码的执行效率提高了20%左右,较中间代码级的优化算法执行效率提高了15%左右。

  4. 49 CFR Appendix C to Part 215 - FRA Freight Car Standards Defect Code

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAILROAD FREIGHT CAR SAFETY STANDARDS Pt. 215, App. C Appendix C to... 13/4″. (C)(1) Rim thickness is 11/16″ or less; (2) Rim thickness is 5/8″ or less; (3) Rim thickness is 9/16″ or less; (D) Wheel cracked or broken in: (1) rim, (2) flange, (3) plate or (4) hub area....

  5. Computational prediction of over-annotated protein-coding genes in the genome of Agrobacterium tumefaciens strain C58

    Science.gov (United States)

    Yu, Jia-Feng; Sui, Tian-Xiang; Wang, Hong-Mei; Wang, Chun-Ling; Jing, Li; Wang, Ji-Hua

    2015-12-01

    Agrobacterium tumefaciens strain C58 is a type of pathogen that can cause tumors in some dicotyledonous plants. Ever since the genome of A. tumefaciens strain C58 was sequenced, the quality of annotation of its protein-coding genes has been queried continually, because the annotation varies greatly among different databases. In this paper, the questionable hypothetical genes were re-predicted by integrating the TN curve and Z curve methods. As a result, 30 genes originally annotated as “hypothetical” were discriminated as being non-coding sequences. By testing the re-prediction program 10 times on data sets composed of the function-known genes, the mean accuracy of 99.99% and mean Matthews correlation coefficient value of 0.9999 were obtained. Further sequence analysis and COG analysis showed that the re-annotation results were very reliable. This work can provide an efficient tool and data resources for future studies of A. tumefaciens strain C58. Project supported by the National Natural Science Foundation of China (Grant Nos. 61302186 and 61271378) and the Funding from the State Key Laboratory of Bioelectronics of Southeast University.

  6. Shielding analysis of the microtron MT-25 bunker using the MCNP-4C code and NCRP report 51

    International Nuclear Information System (INIS)

    A cyclic electron accelerator Microtron MT-25 will be installed in Havana (Cuba)). Electrons, neutrons and gamma radiation up to 25 MeV can be produced in the MT-25. A detailed shielding analysis for the bunker is carried out using two ways: the NCRP-51 Report and the Monte Carlo Method (MCNP-4C Code). The walls and ceiling thicknesses are estimated with dose constraints of 0.5 and 20 mSv y-1, respectively, and an area occupancy factor of 1/16. Both results are compared and a preliminary bunker design is shown. (authors)

  7. SOURCES 4C : a code for calculating ([alpha],n), spontaneous fission, and delayed neutron sources and spectra.

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, W. B. (William B.); Perry, R. T. (Robert T.); Shores, E. F. (Erik F.); Charlton, W. S. (William S.); Parish, Theodore A.; Estes, G. P. (Guy P.); Brown, T. H. (Thomas H.); Arthur, Edward D. (Edward Dana),; Bozoian, Michael; England, T. R.; Madland, D. G.; Stewart, J. E. (James E.)

    2002-01-01

    SOURCES 4C is a computer code that determines neutron production rates and spectra from ({alpha},n) reactions, spontaneous fission, and delayed neutron emission due to radionuclide decay. The code is capable of calculating ({alpha},n) source rates and spectra in four types of problems: homogeneous media (i.e., an intimate mixture of a-emitting source material and low-Z target material), two-region interface problems (i.e., a slab of {alpha}-emitting source material in contact with a slab of low-Z target material), three-region interface problems (i.e., a thin slab of low-Z target material sandwiched between {alpha}-emitting source material and low-Z target material), and ({alpha},n) reactions induced by a monoenergetic beam of {alpha}-particles incident on a slab of target material. Spontaneous fission spectra are calculated with evaluated half-life, spontaneous fission branching, and Watt spectrum parameters for 44 actinides. The ({alpha},n) spectra are calculated using an assumed isotropic angular distribution in the center-of-mass system with a library of 107 nuclide decay {alpha}-particle spectra, 24 sets of measured and/or evaluated ({alpha},n) cross sections and product nuclide level branching fractions, and functional {alpha}-particle stopping cross sections for Z < 106. The delayed neutron spectra are taken from an evaluated library of 105 precursors. The code provides the magnitude and spectra, if desired, of the resultant neutron source in addition to an analysis of the'contributions by each nuclide in the problem. LASTCALL, a graphical user interface, is included in the code package.

  8. Construction of infectious cDNA clones of PRRSV: Separation of coding regions for nonstructural and structural proteins

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Porcine Reproductive and Respiratory Syndrome Virus (PRRSV), the causative agent of the ongoing "porcine high fever syndrome" in China, is capable of genetic and antigenic mutations at high fre- quency. How to design vaccine rationally to keep up with the ever-changing prevalent PRRSV variant is of great interest. We developed an infectious cDNA clone of an attenuated strain of Type II PRRSV, and further manipulated the infectious cDNA clone by inserting polylinker between ORF1 and ORF2, en- coding for nonstructural- or structural-protein, respectively. The cDNA was generated from the cell-attenuated virus strain, APRRS, via RT-PCR, and followed by nucleotide sequencing and molecular cloning. The full-length of the APRRS genomic RNA was determined as 15521 nucleotides in length excluding poly(A) tail, which has a 99.7% nucleotide identity with that of PRRSV Nsp strain, also a vac- cine strain. Based on the nucleotide sequencing results, the full-length cDNA clone was assembled in pBlueScript vector, under the control of T7 promoter at the immediate 5′ terminus of genome. To dis- cern the rescued viruses from that of parental virus, a Mlu I restriction site was engineered into ORF5 coding region. Upon transfection of the in vitro transcripts of both the original and Mlu I-tagged cDNAs into MA-104 cells, typical PRRSV cytopathic effects were observed. The rescued viruses from the full-length cDNA clones displayed the same virological and molecular properties. Subsequently, PCR-based mutagenesis was conducted to separate the coding regions between PRRSV nonstructural genes, ORF1, and structural proteins, ORF2-ORF7. The synthetic RNA of such mutant clone, pCSA, was infectious and the rescued virus shared similar properties with that of the parental virus. This study provided a valuable tool for development of chimeric PRRSV as vaccine candidate offering cross-protection to various genetically diversified PRRSV strains, and a platform for further develop- ment of

  9. SU-C-201-03: Coded Aperture Gamma-Ray Imaging Using Pixelated Semiconductor Detectors

    Energy Technology Data Exchange (ETDEWEB)

    Joshi, S [Wayne State University, Detroit, MI (United States); Kaye, W; Jaworski, J [H3D, Inc., Ann Arbor, MI (United States); He, Z [University of Michigan, Ann Arbor, MI (United States)

    2015-06-15

    Purpose: Improved localization of gamma-ray emissions from radiotracers is essential to the progress of nuclear medicine. Polaris is a portable, room-temperature operated gamma-ray imaging spectrometer composed of two 3×3 arrays of thick CdZnTe (CZT) detectors, which detect gammas between 30keV and 3MeV with energy resolution of <1% FWHM at 662keV. Compton imaging is used to map out source distributions in 4-pi space; however, is only effective above 300keV where Compton scatter is dominant. This work extends imaging to photoelectric energies (<300keV) using coded aperture imaging (CAI), which is essential for localization of Tc-99m (140keV). Methods: CAI, similar to the pinhole camera, relies on an attenuating mask, with open/closed elements, placed between the source and position-sensitive detectors. Partial attenuation of the source results in a “shadow” or count distribution that closely matches a portion of the mask pattern. Ideally, each source direction corresponds to a unique count distribution. Using backprojection reconstruction, the source direction is determined within the field of view. The knowledge of 3D position of interaction results in improved image quality. Results: Using a single array of detectors, a coded aperture mask, and multiple Co-57 (122keV) point sources, image reconstruction is performed in real-time, on an event-by-event basis, resulting in images with an angular resolution of ∼6 degrees. Although material nonuniformities contribute to image degradation, the superposition of images from individual detectors results in improved SNR. CAI was integrated with Compton imaging for a seamless transition between energy regimes. Conclusion: For the first time, CAI has been applied to thick, 3D position sensitive CZT detectors. Real-time, combined CAI and Compton imaging is performed using two 3×3 detector arrays, resulting in a source distribution in space. This system has been commercialized by H3D, Inc. and is being acquired for

  10. Ciberaprotestas y código (penal Cyberprotests and the (penal code

    Directory of Open Access Journals (Sweden)

    Edición Activismo y Movimientos sociales

    2012-06-01

    Full Text Available Las amplias y aceleradas transformaciones sociales y tecnológicas sucedidas de las últimas décadas están produciendo en la coyuntura de crisis importantes reacomodos globales en los sistemas productivos que empiezan a tener efectos políticos en la institucionalidad democrática configurada desde la posguerra europea. Parece emerger un ciclo de contestación con un sensible aumento de las movilizaciones en un número crecientes de países, en el que las redes sociales telemáticas contribuyen a un aumento de la capacidad de difusión y coordinación de unos movimientos sociales que, con su trabajo en red diversifican, repertorios de protestas y propuestas de alcance transnacional.Given the current turmoil of demonstrations and social protests that use Internet social networks as means of dissemination and organization, it seems Westerns governments are testing or trying to develop new measures of social control via modification of their legal codes. This article explores the situation of Spain in this respect, through four short interviews with communication and new media professionals: Elvira Huelbes (Journalist at Cuarto Poder, Jaime Pastor (Political Sciencies Professor in UNED, Javier de la Cueva (Lawyer specialized in ICTand Miguel Romero (Editor of Viento Sur.

  11. Isolation of cDNA clones coding for human tissue factor: primary structure of the protein and cDNA

    International Nuclear Information System (INIS)

    Tissue factor is a membrane-bound procoagulant protein that activates the extrinsic pathway of blood coagulation in the presence of factor VII and calcium. λ Phage containing the tissue factor gene were isolated from a human placental cDNA library. The amino acid sequence deduced from the nucleotide sequence of the cDNAs indicates that tissue factor is synthesized as a higher molecular weight precursor with a leader sequence of 32 amino acids, while the mature protein is a single polypeptide chain composed of 263 residues. The derived primary structure of tissue factor has been confirmed by comparison to protein and peptide sequence data. The sequence of the mature protein suggests that there are three distinct domains: extracellular, residues 1-219; hydrophobic, residues 220-242; and cytoplasmic, residues 243-263. Three potential N-linked carbohydrate attachment sites occur in the extracellular domain. The amino acid sequence of tissue factor shows no significant homology with the vitamin K-dependent serine proteases, coagulation cofactors, or any other protein in the National Biomedical Research Foundation sequence data bank (Washington, DC)

  12. cDNA sequence coding for the alpha'-chain of the third complement component in the African lungfish.

    Science.gov (United States)

    Sato, A; Sültmann, H; Mayer, W E; Figueroa, F; Tichy, H; Klein, J

    1999-04-01

    cDNA clones coding for almost the entire C3 alpha-chain of the African lungfish (Protopterus aethiopicus), a representative of the Sarcopterygii (lobe-finned fishes), were sequenced and characterized. From the sequence it is deduced that the lungfish C3 molecule is probably a disulphide-bonded alpha:beta dimer similar to that of the C3 components of other jawed vertebrates. The deduced sequence contains conserved sites presumably recognized by proteolytic enzymes (e.g. factor I) involved in the activation and inactivation of the component. It also contains the conserved thioester region and the putative site for binding properdin. However, the site for the interaction with complement receptor 2 and factor H are poorly conserved. Either complement receptor 2 and factor H are not present in the lungfish or they bind to different residues at the same or a different site than mammalian complement receptor 2 and factor H. The C3 alpha-chain sequences faithfully reflect the phylogenetic relationships among vertebrate classes and can therefore be used to help to resolve the long-standing controversy concerning the origin of the tetrapods. PMID:10219761

  13. Cloning and characterization of a cDNA coding for mouse placental alkaline phosphatase

    International Nuclear Information System (INIS)

    Mouse alkaline phosphatase was partially purified from placenta. Data obtained by immunoblotting analysis suggested that the primary structure of this enzyme has a much greater homology to that of human and bovine liver ALPs than to the human placental isozyme. Therefore, a full-length cDNA encoding human liver-type ALP was used as a probe to isolate the mouse placental ALP cDNA. The cloned mouse cDNA is 2459 base pairs long and is composed of an open reading frame encoding a 524-amino acid polypeptide that contains a putative signal peptide of 17 amino acids. Homology at the amino acid level of the mouse placental ALP is 90% to the human liver isozyme but only 55% to the human placental counterpart. RNA blot hybridization results indicate that the mouse placental ALP is encoded by a gene identical to the gene expressed in mouse liver, kidney, and teratocarcinoma stem cells. This gene is therefore evolutionarily highly conserved in mouse and human

  14. The characterization of cDNA clones coding for wheat storage proteins.

    OpenAIRE

    Bartels, D.; Thompson, R D

    1983-01-01

    Poly(A)+ RNA isolated from the developing wheat endosperm var. Chinese Spring, has been used as template for the construction of a cDNA library. Within the library, clones have been identified by in vitro translation of hybrid-selected mRNA which encode alpha/beta gliadin related sequences and gamma-gliadin related sequences. The DNA sequence of one such clone has been determined and it shows homology with that of a clone encoding a barley storage protein, B-hordein. The sequence includes a t...

  15. Construction of infectious cDNA clones of PRRSV:Separation of coding regions for nonstructural and structural proteins

    Institute of Scientific and Technical Information of China (English)

    YUAN ShiShan; WEI ZuZhang

    2008-01-01

    Porcine Reproductive and Respiratory Syndrome Virus (PRRSV), the causative agent of the ongoing"porcine high fever syndrome" in China, is capable of genetic and antigenic mutations at high frequency. How to design vaccine rationally to keep up with the ever-changing prevalent PRRSV variant is of great Interest. We developed an infectious cDNA clone of an attenuated strain of Type Ⅱ PRRSV, and further manipulated the infectious cDNA clone by inserting polylinker between ORF1 and ORF2, encoding for nonstructural- or structural-protein, respectively. The cDNA was generated from the cell-attenuated virus strain, APRRS, via RT-PCR, and followed by nucleotide sequencing and molecular cloning. The full-length of the APRRS genomic RNA was determined as 15521 nucleotides in length excluding poly(A) tail, which has a 99.7% nucleotide identity with that of PRRSV Nsp strain, also a vaccine strain. Based on the nucleotide sequencing results, the full-length cDNA clone was assembled in pBlueScript vector, under the control of T7 promoter at the immediate 5' terminus of genome. To discern the rescued viruses from that of parental virus, a Mlu I restriction site was engineered into ORF5 coding region. Upon trensfection of the in vitro transcripts of both the original and MIu I-tagged cDNAs into MA-104 cells, typical PRRSV cytopathic effects were observed. The rescued viruses from the full-length cDNA clones displayed the same virological and molecular properties. Subsequently,PCR-based mutagenesis was conducted to separate the coding regions between PRRSV nonstructural genes, ORF1, and structural proteins, ORF2-ORF7. The synthetic RNA of such mutant clone, pCSA,was infectious and the rescued virus shared similar properties with that of the parental virus. This study provided a valuable tool for development of chimeric PRRSV as vaccine candidate offering crose-protection to various genetically diversified PRRSV strains, and a platform for further development of PRRSV as a gene

  16. Coded Calculation for Floating Point Values in Safety I and C - Implementation and Experiences

    Energy Technology Data Exchange (ETDEWEB)

    Arndt, Lindner; Christian, Gerst; Andreas, Molleken [TUV Rheinland ISTec-GmbH, Boltzmannstr (Germany)

    2014-08-15

    The paper describes a methodology to detect erroneous floating point calculations in digital safety I and C during run time. The methodology has the potential to detect processor failures as well as memory failures. It is based on the extension of the normally used algebra to the complex number plain. In the complex number plain a set of sub-algebras is defined. The sub-algebras are characterized by a subset of valid numbers, the decision criteria for validity of a number and appropriate modified operations (addition, subtraction, multiplication, division). In case of a failure of the processor or the memory, the calculation in any of the sub-algebras will result in complex numbers that are not element of the set of elements of the sub-algebra. This is detected by the given criteria. The theoretical background of the methodology was already presented at the NPIC and HMIT conference in San Diego in 2012. The paper presents the extension of the methodology to logical functions and the implementation in a real I and C platform. The results of practical tests are given. This includes tests of calculation overhead and detection of typical failures. Additionally experiences regarding floating point precision are provided.

  17. Varian 2100C/D Clinac 18 MV photon phase space file characterization and modeling by using MCNP Code

    Science.gov (United States)

    Ezzati, Ahad Ollah

    2015-07-01

    Multiple points and a spatial mesh based surface source model (MPSMBSS) was generated for 18MV Varian 2100 C/D Clinac phase space file (PSF) and implemented in MCNP code. The generated source model (SM) was benchmarked against PSF and measurements. PDDs and profiles were calculated using the SM and original PSF for different field sizes from 5 × 5 to 20 × 20 cm2. Agreement was within 2% of the maximum dose at 100cm SSD for beam profiles at the depths of 4cm and 15cm with respect to the original PSF. Differences between measured and calculated points were less than 2% of the maximum dose or 2mm distance to agreement (DTA) at 100 cm SSD. Thus it can be concluded that the modified MCNP code can be used for radiotherapy calculations including multiple source model (MSM) and using the source biasing capability of MPSMBSS can increase the simulation speed up to 3600 for field sizes smaller than 5 × 5 cm2.

  18. Organ and effective dose arising from conventional diagnostic x-ray examinations by monte Carlo simulation (MCNP-4C code)

    International Nuclear Information System (INIS)

    Monte Carlo simulation has been used by many researchers to calculate organ and effective dose of patients arising from conventional X-ray examinations. In this study the radiation transport code, MCNP4C, has been used to perform Monte Carlo simulations to estimate radiation dose delivered to different organs in conventional X-ray examinations. Materials and Methods: In this work we have made use of ORNL mathematical phantoms with few modifications which have been made. The source has been defined as a point source, emitting photons into a solid angle. The X-ray beam was shaped by a collimator to produce a rectangular field at the midline of the phantom. Results: to validate the simulation executed in this study normalized organs doses to unit ESD for hermaphrodite phantom were computed. Our results were compared with corresponding values presented by NRPB. In general organs doses obtained by application of MCNP-4C (present study) and corresponding values presented in NRPB were in good agreement. For further evaluation of our phantom, the values acquired for organ and effective doses by MCNP-4C and ODS-60 were compared. Conclusion: the technique we have developed is capable of estimating organ and effective doses with a better accuracy than dose values obtained by employment of NRPB and ODS-60 technique

  19. Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE

    Directory of Open Access Journals (Sweden)

    Mrs. S. Ramya

    2013-07-01

    Full Text Available Cloud computing techniques are used to share resources. It transfers the application software and databases to the centralized large data centers. Storing important data with cloud storage providers comes with serious security risks. The cloud can leak confidential data, modify the data, or return inconsistent data to different users. So, the cloud data security requires authentication and integrity analysis for the storage data values. An erasure code provides redundancy by breaking objects up into smaller fragments and storing the fragments in different places. The key is that you can recover the data from any combination of a smaller number of those fragments. With threshold proxy re-encryption scheme (PRE , a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval. It meets the requirements that storage servers independently perform encoding and re-encryption and key servers independently perform partial decryption. The system user forwards his data in the storage servers to another user without retrieving the data back. A major feature of the cloud services is that user’s data are usually processed remotely in unknown machines that users do not own or operate. Conditional Proxy Re-Encryption (C-PRE is proposed, whereby user has a fine-grained control over the delegation. As a result, user can flexibly assign her delegate, and decryption capability based on the conditions attached to the messages, using a proxy with no higher trust than in existing PRE schemes

  20. Teseo code validation

    International Nuclear Information System (INIS)

    In this report some validation tests for the TESEO code are described. The TESEO code was developed at ENEA - Clementel Center in the framework of the C2RV code sequence. This code sequence produces multigroup resonance cross sections for fast reactor analysis. It consists of the codes TESEO, MC2-II, GERES, ANISN, MEDIL. The TESEO code processes basic nuclear data in ENDF-B format and produces an ultrafine group (2082 groups) cross section library for the MC2-II code. To validate the TESEO algorithms, the data produced by TESEO code were compared with the data produced by other well-tested codes which use different algorithms. No substantial differences was found between these data and the data produced by TESEO code. TESEO algorithms showed high reliability. A detailed study of TESEO calculation options was carried out. Their use and functions are shown to inform the user of the code

  1. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  2. 3D PiC code simulations for a laboratory experimental investigation of Auroral Kilometric Radiation mechanisms

    Science.gov (United States)

    Gillespie, K. M.; Speirs, D. C.; Ronald, K.; McConville, S. L.; Phelps, A. D. R.; Bingham, R.; Cross, A. W.; Robertson, C. W.; Whyte, C. G.; He, W.; Vorgul, I.; Cairns, R. A.; Kellett, B. J.

    2008-12-01

    Auroral Kilometric Radiation (AKR), occurs naturally in the polar regions of the Earth's magnetosphere where electrons are accelerated by electric fields into the increasing planetary magnetic dipole. Here conservation of the magnetic moment converts axial to rotational momentum forming a horseshoe distribution in velocity phase space. This distribution is unstable to cyclotron emission with radiation emitted in the X-mode. In a scaled laboratory reproduction of this process, a 75-85 keV electron beam of 5-40 A was magnetically compressed by a system of solenoids and emissions were observed for cyclotron frequencies of 4.42 GHz and 11.7 GHz resonating with near cut-off TE0,1 and TE0,3 modes, respectively. Here we compare these measurements with numerical predictions from the 3D PiC code KARAT. The 3D simulations accurately predicted the radiation modes and frequencies produced by the experiment. The predicted conversion efficiency between electron kinetic and wave field energy of around 1% is close to the experimental measurements and broadly consistent with quasi-linear theoretical analysis and geophysical observations.

  3. 3D PiC code simulations for a laboratory experimental investigation of Auroral Kilometric Radiation mechanisms

    Energy Technology Data Exchange (ETDEWEB)

    Gillespie, K M; Speirs, D C; Ronald, K; McConville, S L; Phelps, A D R; Bingham, R; Cross, A W; Robertson, C W; Whyte, C G; He, W [SUPA Department of Physics, John Anderson Building, 107 Rottenrow, University of Strathclyde, Glasgow, G4 0NG (United Kingdom); Vorgul, I; Cairns, R A [School of Mathematics and Statistics, University of St Andrews, St Andrews, KY16 9SS (United Kingdom); Kellett, B J [Space Science and Technology Department, STFC Rutherford Appleton Laboratory, Didcot, OX11 0QX (United Kingdom)], E-mail: karen.gillespie@strath.ac.uk

    2008-12-15

    Auroral Kilometric Radiation (AKR), occurs naturally in the polar regions of the Earth's magnetosphere where electrons are accelerated by electric fields into the increasing planetary magnetic dipole. Here conservation of the magnetic moment converts axial to rotational momentum forming a horseshoe distribution in velocity phase space. This distribution is unstable to cyclotron emission with radiation emitted in the X-mode. In a scaled laboratory reproduction of this process, a 75-85 keV electron beam of 5-40 A was magnetically compressed by a system of solenoids and emissions were observed for cyclotron frequencies of 4.42 GHz and 11.7 GHz resonating with near cut-off TE{sub 0,1} and TE{sub 0,3} modes, respectively. Here we compare these measurements with numerical predictions from the 3D PiC code KARAT. The 3D simulations accurately predicted the radiation modes and frequencies produced by the experiment. The predicted conversion efficiency between electron kinetic and wave field energy of around 1% is close to the experimental measurements and broadly consistent with quasi-linear theoretical analysis and geophysical observations.

  4. 3D PiC code simulations for a laboratory experimental investigation of Auroral Kilometric Radiation mechanisms

    International Nuclear Information System (INIS)

    Auroral Kilometric Radiation (AKR), occurs naturally in the polar regions of the Earth's magnetosphere where electrons are accelerated by electric fields into the increasing planetary magnetic dipole. Here conservation of the magnetic moment converts axial to rotational momentum forming a horseshoe distribution in velocity phase space. This distribution is unstable to cyclotron emission with radiation emitted in the X-mode. In a scaled laboratory reproduction of this process, a 75-85 keV electron beam of 5-40 A was magnetically compressed by a system of solenoids and emissions were observed for cyclotron frequencies of 4.42 GHz and 11.7 GHz resonating with near cut-off TE0,1 and TE0,3 modes, respectively. Here we compare these measurements with numerical predictions from the 3D PiC code KARAT. The 3D simulations accurately predicted the radiation modes and frequencies produced by the experiment. The predicted conversion efficiency between electron kinetic and wave field energy of around 1% is close to the experimental measurements and broadly consistent with quasi-linear theoretical analysis and geophysical observations.

  5. Neutronic analysis for core conversion (HEU–LEU of the low power research reactor using the MCNP4C code

    Directory of Open Access Journals (Sweden)

    Aldawahra Saadou

    2015-06-01

    Full Text Available Comparative studies for conversion of the fuel from HEU to LEU in the miniature neutron source reactor (MNSR have been performed using the MCNP4C code. The HEU fuel (UAl4-Al, 90% enriched with Al clad and LEU (UO2 12.6% enriched with zircaloy-4 alloy clad cores have been analyzed in this study. The existing HEU core of MNSR was analyzed to validate the neutronic model of reactor, while the LEU core was studied to prove the possibility of fuel conversion of the existing HEU core. The proposed LEU core contained the same number of fuel pins as the HEU core. All other structure materials and dimensions of HEU and LEU cores were the same except the increase in the radius of control rod material from 0.195 to 0.205 cm and keeping the outer diameter of the control rod unchanged in the LEU core. The effective multiplication factor (keff, excess reactivity (ρex, control rod worth (CRW, shutdown margin (SDM, safety reactivity factor (SRF, delayed neutron fraction (βeff and the neutron fluxes in the irradiation tubes for the existing and the potential LEU fuel were investigated. The results showed that the safety parameters and the neutron fluxes in the irradiation tubes of the LEU fuels were in good agreements with the HEU results. Therefore, the LEU fuel was validated to be a suitable choice for fuel conversion of the MNSR in the future.

  6. An evaluation of TRAC-PF1/MOD1 computer code performance during posttest simulations of Semiscale MOD-2C feedwater line break transients

    International Nuclear Information System (INIS)

    This report documents an evaluation of the TRAC-PF1/MOD1 reactor safety analysis computer code during computer simulations of feedwater line break transients. The experimental data base for the evaluation included the results of three bottom feedwater line break tests performed in the Semiscale Mod-2C test facility. The tests modeled 14.3% (S-FS-7), 50% (S-FS-11), and 100% (S-FS-6B) breaks. The test facility and the TRAC-PF1/MOD1 model used in the calculations are described. Evaluations of the accuracy of the calculations are presented in the form of comparisons of measured and calculated histories of selected parameters associated with the primary and secondary systems. In addition to evaluating the accuracy of the code calculations, the computational performance of the code during the simulations was assessed. A conclusion was reached that the code is capable of making feedwater line break transient calculations efficiently, but there is room for significant improvements in the simulations that were performed. Recommendations are made for follow-on investigations to determine how to improve future feedwater line break calculations and for code improvements to make the code easier to use

  7. The capsid-coding region hairpin element (cHP) is a critical determinant of dengue virus and West Nile virus RNA synthesis

    OpenAIRE

    Clyde, Karen; Barrera, Julio; Harris, Eva

    2008-01-01

    Dengue virus (DENV) and West Nile virus (WNV) are members of the Flavivirus genus of positive-strand RNA viruses. RNA sequences and structures, primarily in the untranslated regions, have been shown to modulate flaviviral gene expression and genome replication. Previously, we demonstrated that a structure in the DENV coding region (cHP) enhances translation start codon selection and is required for viral replication. Here we further characterize the role of the cHP in the DENV life cycle. We ...

  8. Hamevol1.0: a C++ code for differential equations based on Runge-Kutta algorithm. An application to matter enhanced neutrino oscillation

    CERN Document Server

    Aliani, P; Picariello, M; Torrente-Lujan, E; Torrente-Lujan, Emilio

    2003-01-01

    We present a C++ implementation of a fifth order semi-implicit Runge-Kutta algorithm for solving Ordinary Differential Equations. This algorithm can be used for studying many different problems and in particular it can be applied for computing the evolution of any system whose Hamiltonian is known. We consider in particular the problem of calculating the neutrino oscillation probabilities in presence of matter interactions. The time performance and the accuracy of this implementation is competitive with respect to the other analytical and numerical techniques used in literature. The algorithm design and the salient features of the code are presented and discussed and some explicit examples of code application are given.

  9. Conceptual Design of Object Oriented Program (OOP) for Pilot Code of Two-Fluid, Three-field Model with C++ 6.0

    International Nuclear Information System (INIS)

    Engineering software for design purpose in nuclear industries have been developed since early 1970s, and well established in 1980s. The most popular and common language for the software development has been FORTRAN series, until the more sophisticated GUI and software coupling is needed. The advanced computer language, such as C++, C has been developed to help the programming for the easy GUI need and reuse of well developed routines, with adopting the objective oriented program. A recent trend of programming becomes objective-oriented since the results are often more intuitive and easier to maintain than procedure program. The main motivation of this work is to capture objective oriented concepts for conventional safety analysis programs which consist of many functions and procedure oriented structures. In this work, the new objective programming with C++ 6.0 language has been tried for the PILOT code written in FORTRAN language, and conceptual OOP design of the system safety analysis code has been done

  10. Clinical coding. Code breakers.

    Science.gov (United States)

    Mathieson, Steve

    2005-02-24

    --The advent of payment by results has seen the role of the clinical coder pushed to the fore in England. --Examinations for a clinical coding qualification began in 1999. In 2004, approximately 200 people took the qualification. --Trusts are attracting people to the role by offering training from scratch or through modern apprenticeships. PMID:15768716

  11. Line-Shape Code Comparison through Modeling and Fitting of Experimental Spectra of the C ii 723-nm Line Emitted by the Ablation Cloud of a Carbon Pellet

    Directory of Open Access Journals (Sweden)

    Mohammed Koubiti

    2014-07-01

    Full Text Available Various codes of line-shape modeling are compared to each other through the profile of the C ii 723-nm line for typical plasma conditions encountered in the ablation clouds of carbon pellets, injected in magnetic fusion devices. Calculations were performed for a single electron density of 1017 cm−3 and two plasma temperatures (T = 2 and 4 eV. Ion and electron temperatures were assumed to be equal (Te = Ti = T. The magnetic field, B, was set equal to either to zero or 4 T. Comparisons between the line-shape modeling codes and two experimental spectra of the C ii 723-nm line, measured perpendicularly to the B-field in the Large Helical Device (LHD using linear polarizers, are also discussed.

  12. Permutation codes

    OpenAIRE

    Ericson, Thomas

    1993-01-01

    Slepians permutation codes are investigated in detail. In particular we optimize the initial vector and derive all dominating codes in dimension n 2 6. With the exception of the simplex and biorthogonal codes - which are always included as special cases of permutation codes - there are probably no further good codes in higher dimensions.

  13. Analysis of the variation of the attenuation curve in function of the radiation field size for k Vp X-ray beams using the MCNP-5C code

    Energy Technology Data Exchange (ETDEWEB)

    Fernandes, Marco A.R., E-mail: marco@cetea.com.b, E-mail: marfernandes@fmb.unesp.b [Universidade Estadual Paulista Julio de Mesquita Filho (FMB/UNESP), Botucatu, SP (Brazil). Fac. de Medicina; Ribeiro, Victor A.B. [Universidade Estadual Paulista Julio de Mesquita Filho (IBB/UNESP), Botucatu, SP (Brazil). Inst. de Biociencias; Viana, Rodrigo S.S.; Coelho, Talita S. [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil)

    2011-07-01

    The paper illustrates the use of the Monte Carlo method, MCNP-5C code, to analyze the attenuation curve behavior of the 50 kVp radiation beam from superficial radiotherapy equipment as Dermopan2 model. The simulations seek to verify the MCNP-5C code performance to study the variation of the attenuation curve - percentage depth dose (PDD) curve - in function of the radiation field dimension used at radiotherapy of skin tumors with 50 kVp X-ray beams. The PDD curve was calculated for six different radiation field sizes with circular geometry of 1.0, 2.0, 3.0, 4.0, 5.0 and 6.0 cm in diameter. The radiation source was modeled considering a tungsten target with inclination 30 deg, focal point of 6.5 mm in diameter and energy beam of 50 kVp; the X-ray spectrum was calculated with the MCNP-5C code adopting total filtration (beryllium window of 1 mm and aluminum additional filter of 1 mm). The PDD showed decreasing behavior with the attenuation depth similar what is presented on the literature. There was not significant variation at the PDD values for the radiation field between 1.0 and 4.0 cm in diameter. The differences increased for fields of 5.0 and 6.0 cm and at attenuation depth higher than 1.0 cm. When it is compared the PDD values for fields of 3.0 and 6.0 cm in diameter, it verifies the greater difference (12.6 %) at depth of 5.7 cm, proving the scattered radiation effect. The MCNP-5C code showed as an appropriate procedure to analyze the attenuation curves of the superficial radiotherapy beams. (author)

  14. Long non-coding RNA-GAS5 acts as a tumor suppressor in bladder transitional cell carcinoma via regulation of chemokine (C-C motif) ligand 1 expression

    OpenAIRE

    CAO, QIFENG; Wang, Ning; QI, JUAN; GU, ZHENGQIN; SHEN, HAIBO

    2015-01-01

    Long non-coding RNAs (lncRNAs) have important roles in diverse biological processes, including transcriptional regulation, cell growth and tumorigenesis. The present study aimed to investigate whether lncRNA-growth arrest-specific (GAS)5 regulated bladder cancer progression via regulation of chemokine (C-C) ligand (CCL)1 expression. The viability of BLX bladder cancer cells was detected using a Cell Counting kit-8 assay, and cell apoptosis was assessed by annexin V-propidium iodide double-sta...

  15. Coding elements in exons 2 and 3 target c-myc mRNA downregulation during myogenic differentiation.

    OpenAIRE

    Yeilding, N M; W.M. Lee

    1997-01-01

    Downregulation in expression of the c-myc proto-oncogene is an early molecular event in differentiation of murine C2C12 myoblasts into multinucleated myotubes. During differentiation, levels of c-myc mRNA decrease 3- to 10-fold despite a lack of change in its transcription rate. To identify cis-acting elements that target c-myc mRNA for downregulation during myogenesis, we stably transfected C2C12 cells with mutant myc genes or chimeric genes in which various myc sequences were fused to the h...

  16. The long non-coding RNA PARROT is an upstream regulator of c-Myc and affects proliferation and translation

    OpenAIRE

    Vucicevic, D.; Gehre, M; Dhamija, S.; Friis-Hansen, L.; Meierhofer, D; Sauer, S; Orom, U.A.

    2016-01-01

    Long non-coding RNAs are important regulators of gene expression and signaling pathways. The expression of long ncRNAs is dysregulated in cancer and other diseases. The identification and characterization of long ncRNAs is often challenging due to their low expression level and localization to chromatin. Here, we identify a functional long ncRNA, PARROT (Proliferation Associated RNA and Regulator Of Translation) transcribed by RNA polymerase II and expressed at a relatively high level in a nu...

  17. Proposals for an effective application of the continuous improvement at the ININ according to the IAEA 50-C/SG-Q new code

    International Nuclear Information System (INIS)

    This work contains the requirements of continuous improvement contained in the IAEA new code Quality assurance for safety in nuclear power plants and other nuclear installations, code 50-C/SG-Q. Assuming that it was the base for to elaborate the review No. 5 of the Quality assurance plan at ININ, it was done an analysis to give proposals for the application of continuous improvement in effective way. The relevant points which must be taken in account at the continuous improvement process are: Direction responsibility, involucring of all personnel, process planning, education and training, elaboration of improvement projects, investigation of processes which can be improved, continuation of the improvement process and its evaluation. With the implantation of an effective continuous improvement system it will be obtained to get a better quality and a more efficient safety. (Author)

  18. ABCXYZ: vector potential (A) and magnetic field (B) code (C) for Cartesian (XYZ) geometry using general current elements

    International Nuclear Information System (INIS)

    ABCXYZ is a computer code for obtaining the Cartesian components of the vector potential and the magnetic field on an observed grid from an arrangement of current-carrying wires. Arbitrary combinations of straight line segments, arcs, and loops are allowed in the specification of the currents. Arbitrary positions and orientations of the current-carrying elements are also allowed. Specification of the wire diameter permits the computation of well-defined fields, even in the interiors of the conductors. An optical feature generates magnetic field lines. Extensive graphical and printed output is available to the user including contour, grid-line, and field-line plots. 12 figures, 1 table

  19. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Property testing was initially studied from various motivations in 1990’s. A code C  GF (r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector’s coordinates. The problem of testing codes was firstly studied by Blum, Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs). How to characterize locally testable codes is a complex and challenge problem. The local tests have been studied for Reed-Solomon (RS), Reed-Muller (RM), cyclic, dual of BCH and the trace subcode of algebraicgeometric codes. In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions). We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  20. Time-Dependent Distribution Functions in C-Mod Calculated with the CQL3D-Hybrid-FOW, AORSA Full-Wave, and DC Lorentz Codes

    Science.gov (United States)

    Harvey, R. W. (Bob); Petrov, Yu. V.; Jaeger, E. F.; Berry, L. A.; Bonoli, P. T.; Bader, A.

    2015-11-01

    A time-dependent simulation of C-Mod pulsed ICRF power is made calculating minority hydrogen ion distribution functions with the CQL3D-Hybrid-FOW finite-orbit-width Fokker-Planck code. ICRF fields are calculated with the AORSA full wave code, and RF diffusion coefficients are obtained from these fields using the DC Lorentz gyro-orbit code. Prior results with a zero-banana-width simulation using the CQL3D/AORSA/DC time-cycles showed a pronounced enhancement of the H distribution in the perpendicular velocity direction compared to results obtained from Stix's quasilinear theory, in general agreement with experiment. The present study compares the new FOW results, including relevant gyro-radius effects, to determine the importance of these effects on the the NPA synthetic diagnostic time-dependence. The new NPA results give increased agreement with experiment, particularly in the ramp-down time after the ICRF pulse. Funded, through subcontract with Massachusetts Institute of Technology, by USDOE sponsored SciDAC Center for Simulation of Wave-Plasma Interactions.

  1. Human DNA contains sequences homologous to the 5'-non-coding region of hepatitis C virus: characterization with restriction endonucleases reveals individual varieties

    Institute of Scientific and Technical Information of China (English)

    Reinhard H Dennin; Jianer Wo

    2003-01-01

    Objective To investigate a 272 base pair section of the 5'-non-coding region of genomic DNA from the peripheral blood monounuclear cells of healthy hepatitis virus C (HCV)-negative human subjects (not patients). Results The suspected HCV-specific sequence was found in the DNA of each subject tested. The pre-PCR digestion assay reveals individual differences in their pattern of methylation, which may be due to possible epigenetic phenomena.Conclusions The results provide formal proof that these HCV-specific sequences are contained in the genomic or extra chromosomal target DNA, and probably belong to a new class of endogenous sequences.

  2. From Skew-Cyclic Codes to Asymmetric Quantum Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Sole, Patrick; Yemen, Olfa

    2010-01-01

    We introduce an additive but not $\\F_{4}$-linear map $S$ from $\\F_{4}^{n}$ to $\\F_{4}^{2n}$ and exhibit some of its interesting structural properties. If $C$ is a linear $[n,k,d]_4$-code, then $S(C)$ is an additive $(2n,2^{2k},2d)_4$-code. If $C$ is an additive cyclic code then $S(C)$ is an additive quasi-cyclic code of index $2$. Moreover, if $C$ is a module $\\theta$-cyclic code, a recently introduced type of code which will be explained below, then $S(C)$ is equivalent to an additive cyclic code if $n$ is odd and to an additive quasi-cyclic code of index $2$ if $n$ is even. Given any $(n,M,d)_4$-code $C$, the code $S(C)$ is self-orthogonal under the trace Hermitian inner product. Since the mapping $S$ preserves nestedness, it can be used as a tool in constructing additive asymmetric quantum codes.

  3. Speech coding

    Science.gov (United States)

    Gersho, Allen

    1990-05-01

    Recent advances in algorithms and techniques for speech coding now permit high quality voice reproduction at remarkably low bit rates. The advent of powerful single-ship signal processors has made it cost effective to implement these new and sophisticated speech coding algorithms for many important applications in voice communication and storage. Some of the main ideas underlying the algorithms of major interest today are reviewed. The concept of removing redundancy by linear prediction is reviewed, first in the context of predictive quantization or DPCM. Then linear predictive coding, adaptive predictive coding, and vector quantization are discussed. The concepts of excitation coding via analysis-by-synthesis, vector sum excitation codebooks, and adaptive postfiltering are explained. The main idea of vector excitation coding (VXC) or code excited linear prediction (CELP) are presented. Finally low-delay VXC coding and phonetic segmentation for VXC are described.

  4. MuSiC: a Multibunch and multiparticle Simulation Code with an alternative approach to wakefield effects

    CERN Document Server

    Migliorati, M

    2015-01-01

    The simulation of beam dynamics in presence of collective effects requires a strong computational effort to take into account, in a self consistent way, the wakefield acting on a given charge and produced by all the others. Generally this is done by means of a convolution integral or sum. Moreover, if the electromagnetic fields consist of resonant modes with high quality factors, responsible, for example, of coupled bunch instabilities, a charge is also affected by itself in previous turns, and a very long record of wakefield must be properly taken into account. In this paper we present a new simulation code for the longitudinal beam dynamics in a circular accelerator, which exploits an alternative approach to the currently used convolution sum, reducing the computing time and avoiding the issues related to the length of wakefield for coupled bunch instabilities. With this approach it is possible to simulate, without the need of a large computing power, simultaneously, the single and multi-bunch beam dynamics...

  5. 基于XML的C代码抄袭检测算法%Plagiarism detection algorithm based on XML for C code.

    Institute of Scientific and Technical Information of China (English)

    钟美; 张丽萍; 刘东升

    2011-01-01

    This paper mainly studies a plagiarism detection algorithm based on XML for C code. It generates a XML text from C source code, extracts the structure information of XML text lines, calculates the XML text lines similarity and obtains the similarity of two programs. Plagiarism detection algorithm is implemented to classification test, specific categories are described as follows:the means of 12 kinds' plagiarism,complex semantics and complex data structures. Test results verify the effectiveness of plagiarism detection algorithm.%主要研究一种基于XML文本的C代码抄袭检测算法.将C程序源代码转化为XML文本,提取XML文本各行标记的属性,计算XML文本行的相似值,得到程序对的相似度.并对抄袭检测算法实行分类测试:按十二种抄袭手段分类;按复杂语义和复杂数据结构分类.测试结果对比验证了抄袭检测算法的有效性.

  6. Characterization of Co-60 sources to the treatment of the ophthalmic tumors using the MCNP-4C code

    International Nuclear Information System (INIS)

    Ophthalmic sources used in the treatment of ophthalmic tumors needed to be periodically controlled in order to have assurance of the administrated dose in the treatment. For this purpose, an human eye was simulated with all structures and composition was simulated by MCNP-4C with an ophthalmic source of Co-60 (model CKA-4 of Amersham). With this simulator, it was possible to determine the dose in the center-eye dephness and also the doses in the structures as retina, coroide, lenses, etc. To check the doses from MCNP-4C, it was realized measurements with radiological films type X-OMAT V of Kodak, with a Co-60 CKA-4 source and an acrylic simulator. The measurement allow the construction of the optical density versus the source distance. This curve will serve as a test data for the calculated dose values of MCNP-4C. (author)

  7. Dosimetry analysis of distributions radials dose profiles of 90Sr + 90Y beta therapy applicators using the MCNP-4C code and radio chromium films

    International Nuclear Information System (INIS)

    Although they are no longer manufactured, the applicators of 90Sr + 90Y acquired in the decades of 1990 are still in use, by having half-life of 28.5 years. These applicators have calibration certificate given by their manufacturers, where few have been re calibrated. Thus it becomes necessary to accomplish thorough dosimetry of these applicators. This paper presents a dosimetric analysis distribution radial dose profiles for emitted by an 90Sr + 90Y beta therapy applicator, using the MCNP-4C code to simulate the distribution radial dose profiles and radio chromium films to get them experimentally . The results with the simulated values were compared with the results of experimental measurements, where both curves show similar behavior, which may validate the use of MCNP-4C and radio chromium films for this type of dosimetry. (author)

  8. Dosimetry analysis of distribution radial dose profiles of 90Sr + 90Y beta therapy applicators using the MCNP-4C code and radio chromium films

    International Nuclear Information System (INIS)

    Although they are no longer manufactured, the applicators of 90Sr +90Y acquired in the decades of 1990 are still in use, by having half-life of 28.5 years. These applicators have calibration certificate given by their manufacturers, where few have been recalibrated. Thus it becomes necessary to accomplish thorough dosimetry of these applicators. This paper presents a dosimetric analysis distribution radial dose profiles for emitted by an 90Sr+90Y beta therapy applicator, using the MCNP-4C code to simulate the distribution radial dose profiles and radiochromium films to get them experimentally . The results with the simulated values were compared with the results of experimental measurements, where both curves show similar behavior, which may validate the use of MCNP-4C and radiochromium films for this type of dosimetry. (author)

  9. code {poems}

    Directory of Open Access Journals (Sweden)

    Ishac Bertran

    2012-08-01

    Full Text Available "Exploring the potential of code to communicate at the level of poetry," the code­ {poems} project solicited submissions from code­writers in response to the notion of a poem, written in a software language which is semantically valid. These selections reveal the inner workings, constitutive elements, and styles of both a particular software and its authors.

  10. [open quotes]Cryptic[close quotes] repeating triplets of purines and pyrimidines (cRRY(i)) are frequent and polymorphic: Analysis of coding cRRY(i) in the proopiomelanocortin (POMC) and TATA-binding protein (TBP) genes

    Energy Technology Data Exchange (ETDEWEB)

    Gostout, B.; Qiang Liu; Sommer, S.S. (Mayo Clinic/Foundation, Rochester, MN (United States))

    1993-06-01

    Triplets of the form of purine, purine, pyrimidine (RRY(i)) are enhanced in frequency in the genomes of primates, rodents, and bacteria. Some RRY(i) are [open quotes]cryptic[close quotes] repeats (cRRY(i)) in which no one tandem run of a trinucleotide predominates. A search of human GenBank sequence revealed that the sequences of cRRY(i) are highly nonrandom. Three randomly chosen human cRRY(i) were sequenced in search of polymorphic alleles. Multiple polymorphic alleles were found in cRRY(i) in the coding regions of the genes for proopiomelanocortin (POMC) and TATA-binding protein (TBP). The highly polymorphic TBP cRRY(i) was characterized in detail. Direct sequencing of 157 unrelated human alleles demonstrated the presence of 20 different alleles which resulted in 29--40 consecutive glutamines in the amino-terminal region of TBP. These alleles are differently distributed among the races. PCR was used to screen 1,846 additional alleles in order to characterize more fully the range of variation in the population. Three additional alleles were discovered, but there was no example of a substantial sequence amplification as is seen in the repeat sequences associated with X-linked spinal and bulbar muscular atrophy, myotonic dystrophy, or the fragile-X syndrome. The structure of the TBP cRRY(i) is conserved in the five monkey species examined. In the chimpanzee, examination of four individuals revealed that the cRRY(i) was highly polymorphic, but the pattern of polymorphism differed from that in humans. The TBP cRRY(i) displays both similarities with and differences from the previously described RRY(i) in the coding sequence of the androgen receptor. The data suggest how simple tandem repeats could evolve from cryptic repeats. 18 refs., 3 figs., 6 tabs.

  11. Code-Pointer Integrity

    OpenAIRE

    Volodymyr Kuznetsov; Laszlo Szekeres; Mathias Payer; George Candea; Sekar, R.; Dawn Song

    2014-01-01

    Systems code is often written in low-level languages like C/C++, which offer many benefits but also delegate memory management to programmers. This invites memory safety bugs that attackers can exploit to divert control flow and compromise the system. Deployed defense mechanisms (e.g., ASLR, DEP) are incomplete, and stronger defense mechanisms (e.g., CFI) often have high overhead and limited guarantees [19, 15, 9]. We introduce code-pointer integrity (CPI), a new design point that guarantees...

  12. Non-coding RNA LINC00473 mediates decidualization of human endometrial stromal cells in response to cAMP signaling.

    Science.gov (United States)

    Liang, Xiao-Huan; Deng, Wen-Bo; Liu, Yue-Fang; Liang, Yu-Xiang; Fan, Zong-Min; Gu, Xiao-Wei; Liu, Ji-Long; Sha, Ai-Guo; Diao, Hong-Lu; Yang, Zeng-Ming

    2016-01-01

    Decidualization is an essential step in the establishment of pregnancy. However, the functional contributions of long intergenic noncoding RNAs (LincRNAs) to decidualization have not been explored. To explore the regulation and role of LincRNAs during human decidualization, human endometrial stromal cells (HESCs) are induced to undergo in vitro decidualization by treating with estradiol-17β, db-cAMP and medroxyprogesterone acetate. LINC00473 (LINC473) expression is highly induced in HESCs after decidual stimulus. We found that cAMP-PKA pathway regulates the expression of LINC473 through IL-11-mediated STAT3 phosphorylation. RNA interference-mediated down-regulation of LINC473 inhibits in vitro decidualization. These results suggested that LINC473 might be functionally required for human decidualization. This is the first report demonstrating the presence of LincRNA during human decidualization. PMID:26947914

  13. Non-coding RNA LINC00473 mediates decidualization of human endometrial stromal cells in response to cAMP signaling

    Science.gov (United States)

    Liang, Xiao-Huan; Deng, Wen-Bo; Liu, Yue-Fang; Liang, Yu-Xiang; Fan, Zong-Min; Gu, Xiao-Wei; Liu, Ji-Long; Sha, Ai-Guo; Diao, Hong-Lu; Yang, Zeng-Ming

    2016-01-01

    Decidualization is an essential step in the establishment of pregnancy. However, the functional contributions of long intergenic noncoding RNAs (LincRNAs) to decidualization have not been explored. To explore the regulation and role of LincRNAs during human decidualization, human endometrial stromal cells (HESCs) are induced to undergo in vitro decidualization by treating with estradiol-17β, db-cAMP and medroxyprogesterone acetate. LINC00473 (LINC473) expression is highly induced in HESCs after decidual stimulus. We found that cAMP-PKA pathway regulates the expression of LINC473 through IL-11-mediated STAT3 phosphorylation. RNA interference-mediated down-regulation of LINC473 inhibits in vitro decidualization. These results suggested that LINC473 might be functionally required for human decidualization. This is the first report demonstrating the presence of LincRNA during human decidualization. PMID:26947914

  14. McMPI – a managed-code message passing interface library for high performance communication in C#

    OpenAIRE

    Holmes, Daniel John

    2012-01-01

    This work endeavours to achieve technology transfer between established best-practice in academic high-performance computing and current techniques in commercial high-productivity computing. It shows that a credible high-performance message-passing communication library, with semantics and syntax following the Message-Passing Interface (MPI) Standard, can be built in pure C# (one of the .Net suite of computer languages). Message-passing has been the dominant paradigm in high-pe...

  15. Cloning and expression of a cDNA coding for the human platelet-derived growth factor receptor: Evidence for more than one receptor class

    International Nuclear Information System (INIS)

    The complete nucleotide sequence of a cDNA encoding the human platelet-derived growth factor (PDGF) receptor is presented. The cDNA contains an open reading frame that codes for a protein of 1106 amino acids. Comparison to the mouse PDGF receptor reveals an overall amino acid sequence identity of 86%. This sequence identity rises to 98% in the cytoplasmic split tyrosine kinase domain. RNA blot hybridization analysis of poly(A)+ RNA from human dermal fibroblasts detects a major and a minor transcript using the cDNA as a probe. Baby hamster kidney cells, transfected with an expression vector containing the receptor cDNA, express an ∼ 190-kDa cell surface protein that is recognized by an anti-human PDGF receptor antibody. The recombinant PDGF receptor is functional in the transfected baby hamster kidney cells as demonstrated by ligand-induced phosphorylation of the receptor. Binding properties of the recombinant PDGF receptor were also assessed with pure preparations of BB and AB isoforms of PDGF. Unlike human dermal fibroblasts, which bind both isoforms with high affinity, the transfected baby hamster kidney cells bind only the BB isoform of PDGF with high affinity. This observation is consistent with the existence of more than one PDGF receptor class

  16. Isolation of a full-length mouse cDNA clone coding for an immunologically distinct p53 molecule.

    OpenAIRE

    Wolf, D; Harris, N; Goldfinger, N; Rotter, V

    1985-01-01

    Transfection of a cloned p53 gene into a p53 nonproducer Abelson murine leukemia virus-transformed cell line, L12, reconstituted p53 expression. The protein expressed in these cells was indistinguishable from that naturally expressed in p53 producer tumor cells. Conversely, p53 protein expressed in L12-derived clones that were established by transfection with a full-length p53 cDNA clone (pM8) exhibited a discrete immunological form. Immunoprecipitation of p53 with a panel of monoclonal anti-...

  17. Minimizing MTR reactor uranium load with the use of MOX fuel by employing ORIGEN-S and MCNP4C codes

    International Nuclear Information System (INIS)

    Highlights: • Recycling of the ETRR-2 by MOX fuel elements. • Calculation of the neutronic parameters of the ETRR-2 after recycling by MOX fuel elements. • MCNP5-beta code is coupled with ORIGEN-S by a set of interface programs. - Abstract: A computational study was performed for MTR reactors using ORIGEN-S and MCNP4C codes to replace some of the fuel elements (FEs) with MOX FEs. The results show that the replacement of the MTR-22 MW power research reactor Fes with MOX FEs leads to the reduction in the enrichment with 235U and the amount of loaded 235U in the core up to more than 20%. The amount of loaded uranium 235U FEs decreased considerably by increasing the number of MOX FEs. Re-evaluated neutronic parameters of the reactor showed that the replacement of the FEs by MOX FEs does not affect negatively the safe operational conditions of the reactor with practically no harmful effect on the safety of the reactor

  18. Investigation Into The Impact Of Detector Parameters On Its Efficiency For The HPGe Detector Using The MCNP4C2 Code

    International Nuclear Information System (INIS)

    In the process of operation and exploitation of the gamma ray spectrometry using the HPGe GC1518 at Center for Nuclear Techniques in HoChiMinh City, its qualification tends to be bad. The experimental results indicate that the absolute efficiency decrease following the live time. This efficiency decreasing can be caused by the change of some physical parameters in relation to the detector. To more efficiently exploit it is very important to know the nature of this change. In this paper, the MCNP4C2 code is used to investigate the impact of geometrical parameters to the detector efficiency based on the detector specifications of the manufacture and on change by user. It was found that the thickness of the inactive germanium layer cause to this change. (author)

  19. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 4.2 Affine variety codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 4.3 Some Gr¨obner basis theoretical tools . . . . . . . . . . . . . . . . . . . . . . . 155 4.4 A bound on the minimum distance of C(I,L) . . . . . . . . . . . . . . . . . . 157 4.5 The Feng-Rao bound for...

  20. Study the effects of different reflector types on the neutronic parameters of the 10 MW MTR reactor using the MCNP4C code

    International Nuclear Information System (INIS)

    Highlights: • A 3-D neutronic model for the 10 MW MTR has been conducted using the MCNP4C code. • Studying the effect of different reflectors on the neutronics parameters of the reactor. • Beryllium reflector was found to be the most efficient reflector among the studied reflectors. • The graphite reflector gave the highest maximum thermal neutron flux in the water trap. - Abstract: A 3-D neutronic model for the 10 MW MTR research reactor has been conducted for the HEU (93%), MEU (45%) and LEU (20%) fuels using the MCNP4C code. This model has been used to study the effect of different types of reflector materials on the reactor multiplication factor and neutron flux distribution in the reactor. It was found that the beryllium reflector was the most efficient reflector among the studied reflector groups (beryllium, heavy water, graphite and light water) since it gave the highest reactor multiplication factor, 1.21441. It followed by heavy water, graphite and light water with the following reactor multiplication factors: 1.19458, 1.19287 and 1.16867 respectively. The graphite reflector gave the highest maximum thermal neutron flux in the water trap, 2.576E14 n cm−2 s−1. It followed by heavy water, light water, and beryllium with the following results: 2.533E14, 2.526E14 and 2.525E14 n cm−2 s−1 respectively. Considerable gains in reactivity were not appreciably influenced by changing the fuel enrichment

  1. Developmental methylation of the coding region of c-fos occurs perinatally, stepwise and sequentially in the liver of laboratory mouse.

    Science.gov (United States)

    Sachan, Manisha; Raman, Rajiva

    2008-06-15

    We have studied the dynamics of de novo DNA methylation of 16 contiguous CpGs in the non-CpG island-coding region of the proto-oncogene c-fos during mouse development by Na-bisulfite sequencing. Methylation commences from 16.5 dpc and occurs in stepwise-manner. In liver 7 sites are methylated between 16.5 dpc and day 5 after birth, but all the sites are completely methylated on 20 dpp and remain so in the adult liver. The present study provides evidence that (1) pattern of methylation of c-fos is distinct from those DNA sequences which methylate pre- and post-implantation, both in terms of the timing and spreading, and (2) spacing of CpGs is an important factor in determining the course of methylation. We suggest that there could be other isoforms of Dnmtases for the c-fos like embryonic genes, not only because they methylate later in development but also because of the difference in kinetics of the reaction, and that the nucleation of certain methylated sites facilitate methylation of neighbouring sites and their maintenance in subsequent cell generations. PMID:18442886

  2. Nucleotide sequence 5′ of the chicken c-myc coding region: Localization of a noncoding exon that is absent from myc transcripts in most avian leukosis virus-induced lymphomas

    OpenAIRE

    1984-01-01

    We have determined the nucleotide sequence of the 2.2-kilobase-pair region upstream of the chicken c-myc coding exons. Using RNA blot analysis, we have localized a noncoding exon to a region that is separated from the c-myc coding sequences by an intron of 700-800 base pairs. In most avian leukosis virus-induced lymphomas proviral integration has occurred within, or downstream of, the first exon, thus presumably displacing the regulatory sequences that normally control c-myc expression. More ...

  3. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  4. Code Cactus

    International Nuclear Information System (INIS)

    This code handles the following problems: -1) Analysis of thermal experiments on a water loop at high or low pressure; steady state or transient behavior; -2) Analysis of thermal and hydrodynamic behavior of water-cooled and moderated reactors, at either high or low pressure, with boiling permitted; fuel elements are assumed to be flat plates: - Flowrate in parallel channels coupled or not by conduction across plates, with conditions of pressure drops or flowrate, variable or not with respect to time is given; the power can be coupled to reactor kinetics calculation or supplied by the code user. The code, containing a schematic representation of safety rod behavior, is a one dimensional, multi-channel code, and has as its complement (FLID), a one-channel, two-dimensional code. (authors)

  5. Calculation of the power distribution in the fuel rods of the low power research reactor using the MCNP4C code

    International Nuclear Information System (INIS)

    The Monte Carlo method, using the MCNP4C code, was used in this paper to calculate the power distribution in 3-D geometry in the fuel rods of the Syrian Miniature Neutron Source Reactor (MNSR). To normalize the MCNP4C result to the steady state nominal thermal power, the appropriate scaling factor was defined to calculate the power distribution precisely. The maximum power of the individual rod was found in the fuel ring number 2 and was found to be 105 W. The minimum power was found in the fuel ring number 9 and was 79.9 W. The total power in the total fuel rods was 30.9 k W. This result agrees very well with nominal power reported in the reactor safety analysis report which equals 30 k W. Finally, the peak power factors, which are defined as the ratios between the maximum to the average and the maximum to the minimum powers were calculated to be 1.18 and 1.31 respectively. (author)

  6. Investigation of plant control strategies for the supercritical C02Brayton cycle for a sodium-cooled fast reactor using the plant dynamics code

    International Nuclear Information System (INIS)

    The development of a control strategy for the supercritical CO2 (S-CO2) Brayton cycle has been extended to the investigation of alternate control strategies for a Sodium-Cooled Fast Reactor (SFR) nuclear power plant incorporating a S-CO2 Brayton cycle power converter. The SFR assumed is the 400 MWe (1000 MWt) ABR-1000 preconceptual design incorporating metallic fuel. Three alternative idealized schemes for controlling the reactor side of the plant in combination with the existing automatic control strategy for the S-CO2 Brayton cycle are explored using the ANL Plant Dynamics Code together with the SAS4A/SASSYS-1 Liquid Metal Reactor (LMR) Analysis Code System coupled together using the iterative coupling formulation previously developed and implemented into the Plant Dynamics Code. The first option assumes that the reactor side can be ideally controlled through movement of control rods and changing the speeds of both the primary and intermediate coolant system sodium pumps such that the intermediate sodium flow rate and inlet temperature to the sodium-to-CO2 heat exchanger (RHX) remain unvarying while the intermediate sodium outlet temperature changes as the load demand from the electric grid changes and the S-CO2 cycle conditions adjust according to the S-CO2 cycle control strategy. For this option, the reactor plant follows an assumed change in load demand from 100 to 0 % nominal at 5 % reduction per minute in a suitable fashion. The second option allows the reactor core power and primary and intermediate coolant system sodium pump flow rates to change autonomously in response to the strong reactivity feedbacks of the metallic fueled core and assumed constant pump torques representing unchanging output from the pump electric motors. The plant behavior to the assumed load demand reduction is surprising close to that calculated for the first option. The only negative result observed is a slight increase in the intermediate inlet sodium temperatures by about 10 C

  7. Evidence for linkage between the loci coding for the binding protein for the fourth component of human complement (C4BP) and for the C3b/C4b receptor.

    OpenAIRE

    Rodriguez de Cordoba, S; Dykman, T R; Ginsberg-Fellner, F; Ercilla, G; Aqua, M; Atkinson, J P; Rubinstein, P

    1984-01-01

    Three pedigrees informative for the segregation of genetic variants of the binding protein for the fourth component of complement (C4BP) and C3b/C4b receptor (C3bR) have been identified. There were 10 informative meioses with no recombinants, indicating a close linkage between the loci encoding C4BP and C3bR, C4BP and C3bR [maximum lod (logarithm of odds of linkage) score: 2.4 at recombinant fraction = 0.0]. In addition, in the four unrelated individuals who were doubly heterozygous (C4BP*1, ...

  8. Vectorization, parallelization and implementation of nuclear codes [MVP/GMVP, QMDRELP, EQMD, HSABC, CURBAL, STREAM V3.1, TOSCA, EDDYCAL, RELAP5/MOD2/C36-05, RELAP5/MOD3] on the VPP500 computer system. Progress report 1995 fiscal year

    International Nuclear Information System (INIS)

    At Center for Promotion of Computational Science and Engineering, time consuming eight nuclear codes suggested by users have been vectorized, parallelized on the VPP500 computer system. In addition, two nuclear codes used on the VP2600 computer system were implemented on the VPP500 computer system. Neutron and photon transport calculation code MVP/GMVP and relativistic quantum molecular dynamics code QMDRELP have been parallelized. Extended quantum molecular dynamics code EQMD and adiabatic base calculation code HSABC have been parallelized and vectorized. Ballooning turbulence simulation code CURBAL, 3-D non-stationary compressible fluid dynamics code STREAM V3.1, operating plasma analysis code TOSCA and eddy current analysis code EDDYCAL have been vectorized. Reactor safety analysis code RELAP5/MOD2/C36-05 and RELAP5/MOD3 were implemented on the VPP500 computer system. (author)

  9. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  10. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  11. List Decoding of Matrix-Product Codes from nested codes: an application to Quasi-Cyclic codes

    DEFF Research Database (Denmark)

    Hernando, Fernando; Høholdt, Tom; Ruano, Diego

    2012-01-01

    A list decoding algorithm for matrix-product codes is provided when $C_1,..., C_s$ are nested linear codes and $A$ is a non-singular by columns matrix. We estimate the probability of getting more than one codeword as output when the constituent codes are Reed-Solomon codes. We extend this list...... decoding algorithm for matrix-product codes with polynomial units, which are quasi-cyclic codes. Furthermore, it allows us to consider unique decoding for matrix-product codes with polynomial units....

  12. A contribution to the analysis of the activity distribution of a radioactive source trapped inside a cylindrical volume, using the M.C.N.P.X. code

    International Nuclear Information System (INIS)

    Orphan sources, activated materials or contaminated materials with natural or artificial radionuclides have been detected in scrap metal products destined to recycling. The consequences of the melting of a source during the process could result in economical, environmental and social impacts. From the point of view of the radioactive waste management, a scenario of 100 ton of contaminated steel in one piece is a major problem. So, it is of great importance to develop a methodology that would allow us to predict the activity distribution inside a volume of steel. In previous work we were able to distinguish between the cases where the source is disseminated all over the entire cylinder and the cases where it is concentrated in different volumes. Now the main goal is to distinguish between different radiuses of spherical source geometries trapped inside the cylinder. For this, a methodology was proposed based on the ratio of the counts of two regions of the gamma spectrum, obtained with a sodium iodide detector, using the M.C.N.P.X. Monte Carlo simulation code. These calculated ratios allow us to determine a function r = aR2 + bR + c, where R is the ratio between the counts of the two regions of the gamma spectrum and r is the radius of the source. For simulation purposes six 60Co sources were used (a point source, four spheres of 5 cm, 10 cm, 15 cm and 20 cm radius and the overall contaminated cylinder) trapped inside two types of matrix, concrete and stainless steel. The methodology applied has shown to predict and distinguish accurately the distribution of a source inside a material roughly independently of the matrix and density considered. (authors)

  13. SystemC-based Simulation Code Generation for AADL Software Component%基于SystemC的AADL软构件仿真代码转换技术

    Institute of Scientific and Technical Information of China (English)

    马春燕; 董云卫; 陆伟; 朱晓燕

    2011-01-01

    Currently, AADL in mission-critical and safety critical embedded field has a good application. In the design phase,how to simulate AADL model is urgent Model simulation can iteratively construct and refine design model for early detection of problems,assuring the quality of the design model,thereby reducing the cost of system development SystemC is a system description language of hardware and software co-simulation. The paper proposed conversion technology and implemented conversion tool for AADL software component to SystemC simulation code. At last, the paper used cruise control system as an example to explain the conversion technology and SystemC-based thread scheduling simulation. Through the research results, users can obtain SystemC-based simulation of AADL software components including the interaction,execution time and sequence between software components, and the thread scheduling simulation, and can implement software and hardware co-simulation through combining AADL hardware component simulation platform.%目前,AADL在任务关键和安全关键嵌入式领域有着良好的应用.如何在设计阶段对AADL模型进行仿真,并根据仿真结果迭代构造和精化设计模型,以尽早发现设计模型中存在的问题,保障设计模型的质量,进而减少系统开发的代价,是目前急需解决的技术挑战.SystemC是一种软硬件协同仿真的系统描述语言,由此提出了AADL软构件到SystemC仿真代码的转换技术上,设计和实现了转换工具,并以航行控制系统为例,阐释了转换技术和基于SystemC的线程调度仿真.通过本研究成果,用户可以实现基于SystemC的AADL软构件的仿真,包括软构件之间交互、执行时间和线程调度的仿真等,用户也可以将研究成果与基于SystemC的AADL执行平台构件仿真相结合,对软硬件进行协同仿真.

  14. NSURE code

    International Nuclear Information System (INIS)

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  15. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  16. Beyond Stabilizer Codes II: Clifford Codes

    OpenAIRE

    Klappenecker, Andreas; Roetteler, Martin

    2000-01-01

    Knill introduced a generalization of stabilizer codes, in this note called Clifford codes. It remained unclear whether or not Clifford codes can be superior to stabilizer codes. We show that Clifford codes are stabilizer codes provided that the abstract error group has an abelian index group. In particular, if the errors are modelled by tensor products of Pauli matrices, then the associated Clifford codes are necessarily stabilizer codes.

  17. MCNP code

    International Nuclear Information System (INIS)

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  18. ANIMAL code

    International Nuclear Information System (INIS)

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  19. Code Pointer Masking: Hardening applications against code injection attacks

    OpenAIRE

    Philippaerts, Pieter; Younan, Yves; Muylle, Stijn; Piessens, Frank; Lachmund, Sven; Walter, Thomas

    2011-01-01

    In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. By enforcing the correct semantics of code pointers, we thwart attacks that modify code pointers to divert the application's control flow. We have implemented a prototype of our solution in a C-compiler for Linux. The evaluatio...

  20. A Mobile Application Prototype using Network Coding

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank;

    2010-01-01

    This paper looks into implementation details of network coding for a mobile application running on commercial mobile phones. We describe the necessary coding operations and algorithms that implements them. The coding algorithms forms the basis for a implementation in C++ and Symbian C++. We report...

  1. CANAL code

    International Nuclear Information System (INIS)

    The CANAL code presented here optimizes a realistic iron free extraction channel which has to provide a given transversal magnetic field law in the median plane: the current bars may be curved, have finite lengths and cooling ducts and move in a restricted transversal area; terminal connectors may be added, images of the bars in pole pieces may be included. A special option optimizes a real set of circular coils

  2. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  3. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  4. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  5. Evolution of naturally occurring 5'non-coding region variants of Hepatitis C virus in human populations of the South American region

    Directory of Open Access Journals (Sweden)

    García-Aguirre Laura

    2007-08-01

    Full Text Available Abstract Background Hepatitis C virus (HCV has been the subject of intense research and clinical investigation as its major role in human disease has emerged. Previous and recent studies have suggested a diversification of type 1 HCV in the South American region. The degree of genetic variation among HCV strains circulating in Bolivia and Colombia is currently unknown. In order to get insight into these matters, we performed a phylogenetic analysis of HCV 5' non-coding region (5'NCR sequences from strains isolated in Bolivia, Colombia and Uruguay, as well as available comparable sequences of HCV strains isolated in South America. Methods Phylogenetic tree analysis was performed using the neighbor-joining method under a matrix of genetic distances established under the Kimura-two parameter model. Signature pattern analysis, which identifies particular sites in nucleic acid alignments of variable sequences that are distinctly representative relative to a background set, was performed using the method of Korber & Myers, as implemented in the VESPA program. Prediction of RNA secondary structures was done by the method of Zuker & Turner, as implemented in the mfold program. Results Phylogenetic tree analysis of HCV strains isolated in the South American region revealed the presence of a distinct genetic lineage inside genotype 1. Signature pattern analysis revealed that the presence of this lineage is consistent with the presence of a sequence signature in the 5'NCR of HCV strains isolated in South America. Comparisons of these results with the ones found for Europe or North America revealed that this sequence signature is characteristic of the South American region. Conclusion Phylogentic analysis revealed the presence of a sequence signature in the 5'NCR of type 1 HCV strains isolated in South America. This signature is frequent enough in type 1 HCV populations circulating South America to be detected in a phylogenetic tree analysis as a distinct

  6. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing in...

  7. Concatenated codes with convolutional inner codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Zyablov, Viktor

    1988-01-01

    The minimum distance of concatenated codes with Reed-Solomon outer codes and convolutional inner codes is studied. For suitable combinations of parameters the minimum distance can be lower-bounded by the product of the minimum distances of the inner and outer codes. For a randomized ensemble of...... concatenated codes a lower bound of the Gilbert-Varshamov type is proved...

  8. A Mobile Application Prototype using Network Coding

    OpenAIRE

    Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank; Larsen, Torben

    2010-01-01

    This paper looks into implementation details of network coding for a mobile application running on commercial mobile phones. We describe the necessary coding operations and algorithms that implements them. The coding algorithms forms the basis for a implementation in C++ and Symbian C++. We report on practical measurement results of coding throughput and energy consumption for a single-source multiple-sinks network, with and without recoding at the sinks. These results confirm that network cod...

  9. On the intersection of additive perfect codes

    OpenAIRE

    Rifà, Authors J.; Solov'eva, F.; Villanueva, M.

    2006-01-01

    The intersection problem for additive (extended and non-extended) perfect codes, i.e. which are the possibilities for the number of codewords in the intersection of two additive codes C1 and C2 of the same length, is investigated. Lower and upper bounds for the intersection number are computed and, for any value between these bounds, codes which have this given intersection value are constructed. For all these codes the abelian group structure of the intersection is characterized. The paramet...

  10. Identification of Intermediate-Size Non-Coding RNAs Involved in the UV-Induced DNA Damage Response in C. elegans

    OpenAIRE

    Li, Aqian; Wei, Guifeng; Wang, Yunfei; Zhou, Ying; Zhang, Xian-En; Bi, Lijun; Chen, Runsheng

    2012-01-01

    Background A network of DNA damage response (DDR) mechanisms functions coordinately to maintain genome integrity and prevent disease. The Nucleotide Excision Repair (NER) pathway is known to function in the response to UV-induced DNA damage. Although numbers of coding genes and miRNAs have been identified and reported to participate in UV-induced DNA damage response (UV-DDR), the precise role of non-coding RNAs (ncRNAs) in UV-DDR remains largely unknown. Methodology/Principal Findings We used...

  11. Quantum Cyclic Code

    CERN Document Server

    Dutta, Sagarmoy

    2010-01-01

    In this paper, we define and study \\emph{quantum cyclic codes}, a generalisation of cyclic codes to the quantum setting. Previously studied examples of quantum cyclic codes were all quantum codes obtained from classical cyclic codes via the CSS construction. However, the codes that we study are much more general. In particular, we construct cyclic stabiliser codes with parameters $[[5,1,3

  12. Controlando a atividade policial: uma análise comparada dos códigos de conduta no Brasil e Canadá Monitoring police activity: a comparative analysis of codes of ethics in Brazil and Canada

    Directory of Open Access Journals (Sweden)

    Arthur Trindade

    2011-08-01

    Full Text Available Neste texto discutimos os códigos de deontologia policial em uso em duas instituições policiais: a Polícia Militar do Distrito Federal (Brasil e o Ottawa Police Service (Canadá. Inicialmente, analisamos e comparamos os conteúdos destes documentos. A seguir, verificamos como cada uma destas duas instituições policiais articula seus sistemas de treinamento e avaliação com seus respectivos códigos de deontologia. Por fim, concluímos que a simples existência de códigos de deontologia, sem normas administrativas, não assegura o controle adequado das atividades policiais. Também constatamos a necessidade de assimilação destes códigos e nor-mas administrativas pelos sistemas de treinamento e avaliação das polícias.In this paper we discuss police deontology and codes of ethics used in two police institutions: the Military Police of the Federal District (Brazil and the Ottawa Police Service (Canada. First, we analyse and compare contents of these documents. Following, we examine how each of those police institutions coordinates its training and evaluation systems with its own deontological code. Finally, we find that the existence of deontolgy codes in itself, without administrative regulation, does not guarantee the appropriate control of police activities. Furthermore, we identified a need for assimilation of such codes and administrative regulations by the police training and evaluation systems.

  13. Molecular cloning and characterization of the cDNA coding for the biotin-containing subunit of 3-methylcrotonoyl-CoA carboxylase: identification of the biotin carboxylase and biotin-carrier domains.

    OpenAIRE

    Song, J.; Wurtele, E S; Nikolau, B J

    1994-01-01

    Soybean genomic clones were isolated based on hybridization to probes that code for the conserved biotinylation domain of biotin-containing enzymes. The corresponding cDNA was isolated and expressed in Escherichia coli through fusion to the bacterial trpE gene. The resulting chimeric protein was biotinylated in E. coli. Antibodies raised against the chimeric protein reacted specifically with an 85-kDa biotin-containing polypeptide from soybean and inhibited 3-methylcrotonoyl-CoA carboxylase (...

  14. Quantum Convolutional BCH Codes

    CERN Document Server

    Aly, S A; Klappenecker, A; Roetteler, M; Sarvepalli, P K; Aly, Salah A.; Grassl, Markus; Klappenecker, Andreas; Roetteler, Martin; Sarvepalli, Pradeep Kiran

    2007-01-01

    Quantum convolutional codes can be used to protect a sequence of qubits of arbitrary length against decoherence. We introduce two new families of quantum convolutional codes. Our construction is based on an algebraic method which allows to construct classical convolutional codes from block codes, in particular convolutional BCH codes. These codes have the property that they contain their Euclidean, respectively Hermitian, dual codes. Hence, they can be used to define quantum convolutional codes by the stabilizer code construction. We compute BCH-like bounds on the free distances which can be controlled as in the case of block codes, and establish that the codes have non-catastrophic encoders.

  15. Concatenated Conjugate Codes

    CERN Document Server

    Hamada, M

    2006-01-01

    A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is known that conjugate code pairs are applicable to (quantum) cryptography. We give a construction method for efficiently decodable conjugate code pairs.

  16. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  17. ABCXYZ: vector potential (A) and magnetic field (B) code (C) for Cartesian (XYZ) geometry using general current elements. [In LRL TRAN for CDC > 600 computer

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, D.V.; Breazeal, J.; Finan, C.H.; Johnston, B.M.

    1976-09-14

    ABCXYZ is a computer code for obtaining the Cartesian components of the vector potential and the magnetic field on an observed grid from an arrangement of current-carrying wires. Arbitrary combinations of straight line segments, arcs, and loops are allowed in the specification of the currents. Arbitrary positions and orientations of the current-carrying elements are also allowed. Specification of the wire diameter permits the computation of well-defined fields, even in the interiors of the conductors. An optical feature generates magnetic field lines. Extensive graphical and printed output is available to the user including contour, grid-line, and field-line plots. 12 figures, 1 table.

  18. Combinatorial Batch Codes with Redundancy

    OpenAIRE

    Jung, Jiyoon; Mummert, Carl; Niese, Elizabeth; Schroeder, Michael w.

    2015-01-01

    A combinatorial batch code with redundancy $r$ and parameters $(n,k,m,t)$ can be represented as a system $C$ of $m$ (not necessarily distinct) subsets of an underlying $n$-element set $F$, so that each $k$-subset of $F$ can be covered by every $(m-r)$-subset $K$ of $C$ while taking no more than $t$ elements of $F$ with each set in $K$. The sum of the cardinalities of the sets in $C$ is the weight of the code. We focus on the case $t =1$, and determine the minimal weight for several ranges of ...

  19. The Coronary Artery Disease-associated Coding Variant in Zinc Finger C3HC-type Containing 1 (ZC3HC1) Affects Cell Cycle Regulation.

    Science.gov (United States)

    Jones, Peter D; Kaiser, Michael A; Ghaderi Najafabadi, Maryam; McVey, David G; Beveridge, Allan J; Schofield, Christine L; Samani, Nilesh J; Webb, Tom R

    2016-07-29

    Genome-wide association studies have to date identified multiple coronary artery disease (CAD)-associated loci; however, for most of these loci the mechanism by which they affect CAD risk is unclear. The CAD-associated locus 7q32.2 is unusual in that the lead variant, rs11556924, is not in strong linkage disequilibrium with any other variant and introduces a coding change in ZC3HC1, which encodes NIPA. In this study, we show that rs11556924 polymorphism is associated with lower regulatory phosphorylation of NIPA in the risk variant, resulting in NIPA with higher activity. Using a genome-editing approach we show that this causes an effective decrease in cyclin-B1 stability in the nucleus, thereby slowing its nuclear accumulation. By perturbing the rate of nuclear cyclin-B1 accumulation, rs11556924 alters the regulation of mitotic progression resulting in an extended mitosis. This study shows that the CAD-associated coding polymorphism in ZC3HC1 alters the dynamics of cell-cycle regulation by NIPA. PMID:27226629

  20. The moving mesh code Shadowfax

    OpenAIRE

    Vandenbroucke, Bert; De Rijcke, Sven

    2016-01-01

    We introduce the moving mesh code Shadowfax, which can be used to evolve a mixture of gas, subject to the laws of hydrodynamics and gravity, and any collisionless fluid only subject to gravity, such as cold dark matter or stars. The code is written in C++ and its source code is made available to the scientific community under the GNU Affero General Public License. We outline the algorithm and the design of our implementation, and demonstrate its validity through the results of a set of basic ...

  1. Differential measurements and transport codes

    International Nuclear Information System (INIS)

    A lot of projects involving particle beams of intermediate energy are calculated by using computerized simulation. TIERCE code system is dedicated to particle transport and is made up of 2 main codes HETC and MCNP, linked to their specialized nuclear data libraries. Here we present some results from TIERCE and we compare them with measured values. The quality of such simulation greatly depends on the nuclear reaction models used in the codes, so an important effort is made to improve these models. (A.C.)

  2. Twisted Permutation Codes

    OpenAIRE

    Gillespie, Neil I.; Praeger, Cheryl E.; Spiga, Pablo

    2014-01-01

    We introduce twisted permutation codes, which are frequency permutation arrays analogous to repetition permutation codes, namely, codes obtained from the repetition construction applied to a permutation code. In particular, we show that a lower bound for the minimum distance of a twisted permutation code is the minimum distance of a repetition permutation code. We give examples where this bound is tight, but more importantly, we give examples of twisted permutation codes with minimum distance...

  3. Transitive nonpropelinear perfect codes

    OpenAIRE

    Mogilnykh, I. Yu.; Solov'eva, F. I.

    2014-01-01

    A code is called transitive if its automorphism group (the isometry group) of the code acts transitively on its codewords. If there is a subgroup of the automorphism group acting regularly on the code, the code is called propelinear. Using Magma software package we establish that among 201 equivalence classes of transitive perfect codes of length 15 from \\cite{ost} there is a unique nonpropelinear code. We solve the existence problem for transitive nonpropelinear perfect codes for any admissi...

  4. Cloning and expression of a cDNA covering the complete coding region of the P32 subunit of human pre-mRNA splicing factor SF2

    DEFF Research Database (Denmark)

    Honoré, B; Madsen, Peder; Rasmussen, H H;

    1993-01-01

    We have cloned and expressed a cDNA encoding the 32-kDa subunit (P32) of the human pre-mRNA splicing factor, SF2. This cDNA extends beyond the 5'-end of a previously reported cDNA [Krainer et al., Cell 66 (1991) 383-394]. Importantly, our fragment includes an ATG start codon which was absent from...

  5. Homological stabilizer codes

    International Nuclear Information System (INIS)

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev’s toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev’s toric code or to the topological color codes. - Highlights: ► We show that Kitaev’s toric codes are equivalent to homological stabilizer codes on 4-valent graphs. ► We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. ► We find and classify all 2D homological stabilizer codes. ► We find optimal codes among the homological stabilizer codes.

  6. A decoding method of an n length binary BCH code through (n + 1n length binary cyclic code

    Directory of Open Access Journals (Sweden)

    TARIQ SHAH

    2013-09-01

    Full Text Available For a given binary BCH code Cn of length n = 2 s - 1 generated by a polynomial of degree r there is no binary BCH code of length (n + 1n generated by a generalized polynomial of degree 2r. However, it does exist a binary cyclic code C (n+1n of length (n + 1n such that the binary BCH code Cn is embedded in C (n+1n . Accordingly a high code rate is attained through a binary cyclic code C (n+1n for a binary BCH code Cn . Furthermore, an algorithm proposed facilitates in a decoding of a binary BCH code Cn through the decoding of a binary cyclic code C (n+1n , while the codes Cn and C (n+1n have the same minimum hamming distance.

  7. Code Samples Used for Complexity and Control

    Science.gov (United States)

    Ivancevic, Vladimir G.; Reid, Darryn J.

    2015-11-01

    The following sections are included: * MathematicaⓇ Code * Generic Chaotic Simulator * Vector Differential Operators * NLS Explorer * 2C++ Code * C++ Lambda Functions for Real Calculus * Accelerometer Data Processor * Simple Predictor-Corrector Integrator * Solving the BVP with the Shooting Method * Linear Hyperbolic PDE Solver * Linear Elliptic PDE Solver * Method of Lines for a Set of the NLS Equations * C# Code * Iterative Equation Solver * Simulated Annealing: A Function Minimum * Simple Nonlinear Dynamics * Nonlinear Pendulum Simulator * Lagrangian Dynamics Simulator * Complex-Valued Crowd Attractor Dynamics * Freeform Fortran Code * Lorenz Attractor Simulator * Complex Lorenz Attractor * Simple SGE Soliton * Complex Signal Presentation * Gaussian Wave Packet * Hermitian Matrices * Euclidean L2-Norm * Vector/Matrix Operations * Plain C-Code: Levenberg-Marquardt Optimizer * Free Basic Code: 2D Crowd Dynamics with 3000 Agents

  8. 26 CFR 1.9003-1 - Election to have the provisions of section 613(c) (2) and (4) of the 1954 Code, as amended, apply...

    Science.gov (United States)

    2010-04-01

    ... Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES General Actuarial Valuations § 1.9003-1 Election to have the provisions of section 613(c) (2... Depletion. * * * (c) Definition of gross income from property. For purposes of this section: (2) Mining....

  9. Downregulation of miR-320a/383-sponge-like long non-coding RNA NLC1-C (narcolepsy candidate-region 1 genes) is associated with male infertility and promotes testicular embryonal carcinoma cell proliferation.

    Science.gov (United States)

    Lü, M; Tian, H; Cao, Y-X; He, X; Chen, L; Song, X; Ping, P; Huang, H; Sun, F

    2015-01-01

    Long non-coding RNAs (lncRNAs), which are extensively transcribed from the genome, have been proposed to be key regulators of diverse biological processes. However, little is known about the role of lncRNAs in regulating spermatogenesis in human males. Here, using microarray technology, we show altered expression of lncRNAs in the testes of infertile men with maturation arrest (MA) or hypospermatogenesis (Hypo), with 757 and 2370 differentially down-regulated and 475 and 163 up-regulated lncRNAs in MA and Hypo, respectively. These findings were confirmed by quantitative real-time PCR (qRT-PCR) assays on select lncRNAs, including HOTTIP, imsrna320, imsrna292 and NLC1-C (narcolepsy candidate-region 1 genes). Interestingly, NLC1-C, also known as long intergenic non-protein-coding RNA162 (LINC00162), was down-regulated in the cytoplasm and accumulated in the nucleus of spermatogonia and primary spermatocytes in the testes of infertile men with mixed patterns of MA compared with normal control. The accumulation of NLC1-C in the nucleus repressed miR-320a and miR-383 transcript and promoted testicular embryonal carcinoma cell proliferation by binding to Nucleolin. Here, we define a novel mechanism by which lncRNAs modulate miRNA expression at the transcriptional level by binding to RNA-binding proteins to regulate human spermatogenesis. PMID:26539909

  10. Time-dependent distribution functions and resulting synthetic NPA spectra in C-Mod calculated with the CQL3D-Hybrid-FOW, AORSA full-wave, and DC Lorentz codes

    Science.gov (United States)

    Harvey, R. W.; Petrov, Yu.; Jaeger, E. F.; Berry, L. A.; Bonoli, P. T.; Bader, A.

    2015-12-01

    A time-dependent simulation of C-Mod pulsed TCRF power is made obtaining minority hydrogen ion distributions with the CQL3D-Hybrid-FOW finite-orbit-width Fokker-Planck code. Cyclotron-resonant TCRF fields are calculated with the AORSA full wave code. The RF diffusion coefficients used in CQL3D are obtained with the DC Lorentz gyro-orbit code for perturbed particle trajectories in the combined equilibrium and TCRF electromagnetic fields. Prior results with a zero-banana-width simulation using the CQL3D/AORSA/DC time-cycles showed a pronounced enhancement of the H distribution in the perpendicular velocity direction compared to results obtained from Stix's quasilinear theory, and this substantially increased the rampup rate of the observed vertically-viewed neutral particle analyzer (NPA) flux, in general agreement with experiment. However, ramp down of the NPA flux after the pulse, remained long compared to the experiment. The present study compares the new FOW results, including relevant gyro-radius effects, to determine the importance of these new effects on the the NPA time-dependence.

  11. Genetic Immunization of BALB/c mice with a Plasmid Bearing the Gene Coding for a Hybrid Merozoite Surface Protein 1-Hepatitis B Virus Surface Protein Fusion Protects Mice against Lethal Plasmodium chabaudi chabaudi PC1 Infection

    OpenAIRE

    Wunderlich, Gerhard; Moura, Ivan C.; del Portillo, Hernando A

    2000-01-01

    The genetic immunization of rodents with a plasmid coding for a Plasmodium chabaudi merozoite surface protein 1 (C terminus)-hepatitis B virus surface fusion protein (pPcMSP119-HBs) provided protection of mice against subsequent lethal challenge with P. chabaudi chabaudi PC1-infected red blood cells. The percentage of survivor mice was higher in DNA-immunized mice than in animals immunized with a recombinant rPcMSP119– glutathione S-transferase fusion protein administered in Freund adjuvant. ...

  12. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  13. Z2Z4-linear codes: generator matrices and duality

    CERN Document Server

    Borges, J; Pujol, J; Rifa, J; Villanueva, M

    2007-01-01

    A code ${\\cal C}$ is $\\Z_2\\Z_4$-additive if the set of coordinates can be partitioned into two subsets $X$ and $Y$ such that the punctured code of ${\\cal C}$ by deleting the coordinates outside $X$ (respectively, $Y$) is a binary linear code (respectively, a quaternary linear code). In this paper $\\Z_2\\Z_4$-additive codes are studied. Their corresponding binary images, via the Gray map, are $\\Z_2\\Z_4$-linear codes, which seem to be a very distinguished class of binary group codes. As for binary and quaternary linear codes, for these codes the fundamental parameters are found and standard forms for generator and parity check matrices are given. For this, the appropriate inner product is deduced and the concept of duality for $\\Z_2\\Z_4$-additive codes is defined. Moreover, the parameters of the dual codes are computed. Finally, some conditions for self-duality of $\\Z_2\\Z_4$-additive codes are given.

  14. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...... including an outer BCH code correcting a few bit errors....

  15. On symmetry group of Mollard code

    OpenAIRE

    Mogilnykh, I. Yu.; Soloveva, F. I.

    2014-01-01

    For a pair of given binary perfect codes C and D of lengths t and m respectively, the Mollard construction outputs a perfect code M(C,D) of length tm + t + m, having subcodes C1 and D2, that are obtained from codewords of C and D respectively by adding appropriate number of zeros. In this work we generalize of a result for symmetry groups of Vasilev codes [2] and find the group Stab_{D2}Sym(M(C,D)). The result is preceded by and partially based on a discussion of linearity of coordinate posit...

  16. Correct Code Containing Containers

    OpenAIRE

    Dross, Claire; Filliâtre, Jean-Christophe; Moy, Yannick

    2011-01-01

    For critical software development, containers such as lists, vectors, sets or maps are an attractive alternative to ad-hoc data structures based on pointers. As standards like DO-178C put formal verification and testing on an equal footing, it is important to give users the ability to apply both to the verification of code using containers. In this paper, we present a definition of containers whose aim is to facilitate their use in certified software, using modern proof technology and novel s...

  17. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  18. Affine Grassmann codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant

    2010-01-01

    We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes.We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show that...... affine Grassmann codes have a large automorphism group and determine the number of minimum weight codewords....

  19. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both the...... coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  20. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  1. Polyphase alternating codes

    Directory of Open Access Journals (Sweden)

    M. Markkanen

    2008-08-01

    Full Text Available We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We handle a few specific examples in detail. The new codes offer an enlarged collection of code lengths for radar experiments.

  2. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  3. The moving mesh code Shadowfax

    CERN Document Server

    Vandenbroucke, Bert

    2016-01-01

    We introduce the moving mesh code Shadowfax, which can be used to evolve a mixture of gas, subject to the laws of hydrodynamics and gravity, and any collisionless fluid only subject to gravity, such as cold dark matter or stars. The code is written in C++ and its source code is made available to the scientific community under the GNU Affero General Public License. We outline the algorithm and the design of our implementation, and demonstrate its validity through the results of a set of basic test problems, which are also part of the public version. We also compare Shadowfax with a number of other publicly available codes using different hydrodynamical integration schemes, illustrating the advantages and disadvantages of the moving mesh technique.

  4. Coupling CFD code with system code and neutron kinetic code

    Energy Technology Data Exchange (ETDEWEB)

    Vyskocil, Ladislav, E-mail: Ladislav.Vyskocil@ujv.cz; Macek, Jiri

    2014-11-15

    Highlights: • Coupling interface between CFD code Fluent and system code Athlet was created. • Athlet code is internally coupled with neutron kinetic code Dyn3D. • Explicit coupling of overlapped computational domains was used. • A coupled system of Athlet/Dyn3D+Fluent codes was successfully tested on a real case. - Abstract: The aim of this work was to develop the coupling interface between CFD code Fluent and system code Athlet internally coupled with neutron kinetic code Dyn3D. The coupling interface is intended for simulation of complex transients such as Main Steam Line Break scenarios, which cannot be modeled separately first by system and neutron kinetic code and then by CFD code, because of the feedback between the codes. In the first part of this article, the coupling method is described. Explicit coupling of overlapped computational domains is used in this work. The second part of the article presents a demonstration simulation performed by the coupled system of Athlet/Dyn3D and Fluent. The “Opening a Steam Dump to the Atmosphere” test carried out at the Temelin NPP (VVER-1000) was simulated by the coupled system. In this simulation, the primary and secondary circuits were modeled by Athlet, mixing in downcomer and lower plenum was simulated by Fluent and heat generation in the core was calculated by Dyn3D. The results of the simulation with Athlet/Dyn3D+Fluent were compared with the experimental data and the results from a calculation performed with Athlet/Dyn3D without Fluent.

  5. Coupling CFD code with system code and neutron kinetic code

    International Nuclear Information System (INIS)

    Highlights: • Coupling interface between CFD code Fluent and system code Athlet was created. • Athlet code is internally coupled with neutron kinetic code Dyn3D. • Explicit coupling of overlapped computational domains was used. • A coupled system of Athlet/Dyn3D+Fluent codes was successfully tested on a real case. - Abstract: The aim of this work was to develop the coupling interface between CFD code Fluent and system code Athlet internally coupled with neutron kinetic code Dyn3D. The coupling interface is intended for simulation of complex transients such as Main Steam Line Break scenarios, which cannot be modeled separately first by system and neutron kinetic code and then by CFD code, because of the feedback between the codes. In the first part of this article, the coupling method is described. Explicit coupling of overlapped computational domains is used in this work. The second part of the article presents a demonstration simulation performed by the coupled system of Athlet/Dyn3D and Fluent. The “Opening a Steam Dump to the Atmosphere” test carried out at the Temelin NPP (VVER-1000) was simulated by the coupled system. In this simulation, the primary and secondary circuits were modeled by Athlet, mixing in downcomer and lower plenum was simulated by Fluent and heat generation in the core was calculated by Dyn3D. The results of the simulation with Athlet/Dyn3D+Fluent were compared with the experimental data and the results from a calculation performed with Athlet/Dyn3D without Fluent

  6. Advanced C and C++ compiling

    CERN Document Server

    Stevanovic, Milan

    2014-01-01

    Learning how to write C/C++ code is only the first step. To be a serious programmer, you need to understand the structure and purpose of the binary files produced by the compiler: object files, static libraries, shared libraries, and, of course, executables.Advanced C and C++ Compiling explains the build process in detail and shows how to integrate code from other developers in the form of deployed libraries as well as how to resolve issues and potential mismatches between your own and external code trees.With the proliferation of open source, understanding these issues is increasingly the res

  7. Automated determination of the stable carbon isotopic composition (δ13C) of total dissolved inorganic carbon (DIC) and total nonpurgeable dissolved organic carbon (DOC) in aqueous samples: RSIL lab codes 1851 and 1852

    Science.gov (United States)

    Révész, Kinga M.; Doctor, Daniel H.

    2014-01-01

    The purposes of the Reston Stable Isotope Laboratory (RSIL) lab codes 1851 and 1852 are to determine the total carbon mass and the ratio of the stable isotopes of carbon (δ13C) for total dissolved inorganic carbon (DIC, lab code 1851) and total nonpurgeable dissolved organic carbon (DOC, lab code 1852) in aqueous samples. The analysis procedure is automated according to a method that utilizes a total carbon analyzer as a peripheral sample preparation device for analysis of carbon dioxide (CO2) gas by a continuous-flow isotope ratio mass spectrometer (CF-IRMS). The carbon analyzer produces CO2 and determines the carbon mass in parts per million (ppm) of DIC and DOC in each sample separately, and the CF-IRMS determines the carbon isotope ratio of the produced CO2. This configuration provides a fully automated analysis of total carbon mass and δ13C with no operator intervention, additional sample preparation, or other manual analysis. To determine the DIC, the carbon analyzer transfers a specified sample volume to a heated (70 °C) reaction vessel with a preprogrammed volume of 10% phosphoric acid (H3PO4), which allows the carbonate and bicarbonate species in the sample to dissociate to CO2. The CO2 from the reacted sample is subsequently purged with a flow of helium gas that sweeps the CO2 through an infrared CO2 detector and quantifies the CO2. The CO2 is then carried through a high-temperature (650 °C) scrubber reactor, a series of water traps, and ultimately to the inlet of the mass spectrometer. For the analysis of total dissolved organic carbon, the carbon analyzer performs a second step on the sample in the heated reaction vessel during which a preprogrammed volume of sodium persulfate (Na2S2O8) is added, and the hydroxyl radicals oxidize the organics to CO2. Samples containing 2 ppm to 30,000 ppm of carbon are analyzed. The precision of the carbon isotope analysis is within 0.3 per mill for DIC, and within 0.5 per mill for DOC.

  8. Locally Orderless Registration Code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  9. Decentralized Network Coding

    OpenAIRE

    Fragouli, C.; Soljanin, E.

    2004-01-01

    This paper proposes deterministic algorithms for decentralized network coding. Decentralized coding allows to locally specify the coding operations at network nodes without knowledge of the overall network topology, and to accommodate future changes in the network such as addition of receivers. To the best of our knowledge, these are the first deterministic decentralized algorithms proposed for network coding.

  10. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... discusses code as the artist’s material and, further, formulates a critique of Cramer. The seductive magic in computer-generated art does not lie in the magical expression, but nor does it lie in the code/material/text itself. It lies in the nature of code to do something – as if it was magic: in the...

  11. Platinum resistance thermometer calibration on the international practical temperature scale of 1968. [-182. 962 to +630. 74/sup 0/C; PRT68 code

    Energy Technology Data Exchange (ETDEWEB)

    Drake, S.R.

    1977-07-01

    A method using the defined equations of the International Practical Temperature Scale of 1968 (IPTS-68) for calibrating platinum resistance thermometers in the range from -182.962 to +630.74/sup 0/C is described. Incorporating the specified IPTS-68 procedure, the method also provides for the accommodation of additional data points in both the negative and positive scale regions at any desired temperature level. The PRT68 computer program, also described and illustrated, was written in FORTRAN language for the CDC-6600 computer to implement this method.

  12. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  13. Polyphase alternating codes

    CERN Document Server

    Markkanen, Markku

    2007-01-01

    This work introduces a method for constructing polyphase alternating codes in which the length of a code transmission cycle can be $p^m$ or $p-1$, where $p$ is a prime number and $m$ is a positive integer. The relevant properties leading to the construction alternating codes and the algorithm for generating alternating codes is described. Examples of all practical and some not that practical polyphase code lengths are given.

  14. Constructing quantum codes

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Quantum error correcting codes are indispensable for quantum information processing and quantum computation.In 1995 and 1996,Shor and Steane gave first several examples of quantum codes from classical error correcting codes.The construction of efficient quantum codes is now an active multi-discipline research field.In this paper we review the known several constructions of quantum codes and present some examples.

  15. Fibrillin binds calcium and is coded by cDNAs that reveal a multidomain structure and alternatively spliced exons at the 5[prime] end

    Energy Technology Data Exchange (ETDEWEB)

    Corson, G.M.; Chalberg, S.C.; Charbonneau, N.L.; Sakai, L.Y. (Oregon Health Sciences Univ., Portland (United States)); Dietz, H.C. (Johns Hopkins Univ. School of Medicine, Baltimore, MD (United States))

    1993-08-01

    Fibrillin is an important structural protein of the extracellular matrix. It is a large cysteine-rich glycoprotein with extensive intrachain disulfide bonds, likely contributed by multiple EGF-like repeats. The authors have previously published 6.9 kb of FBN1 cDNA sequence. FBN1 cDNA clones that extend the sequence 3089 bp in the 5[prime] direction are described in this report. The deduced primary structure suggests that fibrillin in composed of multiple domains. The most predominant features the presence of 43 calcium binding EGF-like repeats. They demonstrate here that fibrillin molecules bind calcium. In addition, three alternatively spliced exons at the 5[prime] end are described. Analysis of 5.8 kb of surrounding genomic sequence revealed a 1.8-kb CpG island spanning the alternatively spliced exons and the next downstream exon. Since FBN1 is the gene responsible for Marfan syndrome, the information presented here will be useful in identifying new mutations and in understanding the function of fibrillin in the pathogenesis of the disease. 42 refs., 7 figs.

  16. Construction and decoding of matrix-product codes from nested codes

    DEFF Research Database (Denmark)

    Hernando, Fernando; Lally, Kristine; Ruano, Diego

    2009-01-01

    We consider matrix-product codes [C1 ... Cs] · A, where C1, ..., Cs  are nested linear codes and matrix A has full rank. We compute their minimum distance and provide a decoding algorithm when A is a non-singular by columns matrix. The decoding algorithm decodes up to half of the minimum distance....

  17. On kernels and nuclei of rank metric codes

    OpenAIRE

    Lunardon, Guglielmo; Trombetti, Rocco; Zhou, Yue

    2016-01-01

    For each rank metric code $\\mathcal{C}\\subseteq \\mathbb{K}^{m\\times n}$, we associate a translation structure, the kernel of which is showed to be invariant with respect to the equivalence on rank metric codes. When $\\mathbb{K}$ is a finite field $\\mathbb{F}_q$ and $\\mathcal{C}$ is a maximum rank distance code with minimum distance $d

  18. Thermodynamics of calcium silicate hydrates, development of a database to model concrete dissolution at 25°C using the EQ3/6 geochemical modeling code

    Energy Technology Data Exchange (ETDEWEB)

    Clodic, L; Meike, A

    1997-08-18

    Examination of the ability to model aqueous systems of interest to the repository proposed by the Yucca Mountain Project has revealed an historical deficit in the ability to model complex waterÐmaterial systems that contain ordinary Portland cement (OPC) at elevated temperature (e.g., Bruton et al., 1994; Meike et al., 1994). One of the reasons is that cement chemistry typically concentrates on two issues of importance to the concrete industry: the hydration of cement powder, which contains reactive phases that do not persist in the cured concrete, and the causes of mechanical degradation at earth surface temperatures such as delayed ettringite formation and alkali silica reaction. Such modeling capability is not available in the open literature, even from applications that might have developed high temperature approaches, such as deep drilling for oil and geothermal resource recovery. The ability to simulate the interaction between concrete, as it evolves over time, and water has become more critical as repository designers begin to consider the incorporation of OPC materials in the emplacement drifts. The Yucca Mountain Project is unique among the high-level radioactive waste repository projects in the world in terms of the need to understand and predict processes in excess of 100°C (see, e.g., Meike, 1997). Our aim has been to develop this capability in the area of aqueous chemistry.

  19. Polyphase alternating codes

    OpenAIRE

    M. Markkanen; Vierinen, J.; Markkanen, J.

    2007-01-01

    We present a new class of alternating codes. Instead of the customary binary phase codes, the new codes utilize either p or p–1 phases, where p is a prime number. The first class of codes has code length pm, where m is a positive integer, the second class has code length p–1. We give an actual construction algorithm, and explain the principles behind it. We ...

  20. Professional C++

    CERN Document Server

    Gregoire, Marc; Kleper, Scott J

    2011-01-01

    Essential reading for experienced developers who are determined to master the latest release of C++ Although C++ is often the language of choice from game programming to major commercial software applications, it is also one of the most difficult to master. With this no-nonsense book, you will learn to conquer the latest release of C++. The author deciphers little-known features of C++, shares detailed code examples that you can then plug into your own code, and reveals the significant changes to C++ that accompany the latest release. You'll discover how to design and build applications that

  1. Proposals for an effective application of the continuous improvement at the ININ according to the IAEA 50-C/SG-Q new code; Propuestas para una aplicacion efectiva del proceso de mejora continua en el ININ, de acuerdo al nuevo codigo 50-C/SG-Q del OIEA

    Energy Technology Data Exchange (ETDEWEB)

    Cardenas A, B.M.; Olivares O, L.A. [Instituto Nacional de Investigaciones Nucleares, A.P. 18-1027, 11801 Mexico D.F. (Mexico)

    1997-07-01

    This work contains the requirements of continuous improvement contained in the IAEA new code {sup Q}uality assurance for safety in nuclear power plants and other nuclear installations, code 50-C/SG-Q. Assuming that it was the base for to elaborate the review No. 5 of the Quality assurance plan at ININ, it was done an analysis to give proposals for the application of continuous improvement in effective way. The relevant points which must be taken in account at the continuous improvement process are: Direction responsibility, involucring of all personnel, process planning, education and training, elaboration of improvement projects, investigation of processes which can be improved, continuation of the improvement process and its evaluation. With the implantation of an effective continuous improvement system it will be obtained to get a better quality and a more efficient safety. (Author)

  2. Implatation of MC2 computer code

    International Nuclear Information System (INIS)

    The implantation of MC2 computer code in the CDC system is presented. The MC2 computer code calculates multigroup cross sections for tipical compositions of fast reactors. The multigroup constants are calculated using solutions of PI or BI approximations for determined buckling value as weighting function. (M.C.K.)

  3. 29 CFR 510.21 - SIC codes.

    Science.gov (United States)

    2010-07-01

    ... reference was approved by the Director of the Federal Register in accordance with 5 U.S.C. 552(a) and 1 CFR... 29 Labor 3 2010-07-01 2010-07-01 false SIC codes. 510.21 Section 510.21 Labor Regulations Relating... Classification of Industries § 510.21 SIC codes. (a) The Conference Report specifically cites Puerto...

  4. On the dimension of twisted centralizer codes

    OpenAIRE

    Glasby, S. P.; Praeger, Cheryl E.; Alahmadi, Adel

    2016-01-01

    Given a field $F$, a scalar $\\lambda\\in F$ and a matrix $A\\in F^{n\\times n}$, the twisted centralizer code $C_F(A,\\lambda):=\\{B\\in F^{n\\times n}\\mid AB-\\lambda BA=0\\}$ is a linear code of length $n^2$. When $A$ is cyclic and $\\lambda\

  5. Obfuscated Malicious Code Detection with Path Condition Analysis

    OpenAIRE

    Wenqing Fan; Xue Lei; Jing An

    2014-01-01

    Code obfuscation is one of the main methods to hide malicious code. This paper proposes a new dynamic method which can effectively detect obfuscated malicious code. This method uses ISR to conduct dynamic debugging. The constraint solving during debugging process can detect deeply hidden malicious code by covering different execution paths. Besides, for malicious code that reads external resources, usually the detection of abnormal behaviors can only be detected by taking the resources into c...

  6. Construction of Codes for Network Coding

    CERN Document Server

    Elsenhans, Andreas-Stephan; Wassermann, Alfred

    2010-01-01

    Based on ideas of K\\"otter and Kschischang we use constant dimension subspaces as codewords in a network. We show a connection to the theory of q-analogues of a combinatorial designs, which has been studied in Braun, Kerber and Laue as a purely combinatorial object. For the construction of network codes we successfully modified methods (construction with prescribed automorphisms) originally developed for the q-analogues of a combinatorial designs. We then give a special case of that method which allows the construction of network codes with a very large ambient space and we also show how to decode such codes with a very small number of operations.

  7. TIPONLINE Code Table

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Coded items are entered in the tiponline data entry program. The codes and their explanations are necessary in order to use the data

  8. Balanced Permutation Codes

    OpenAIRE

    Gabrys, Ryan; Milenkovic, Olgica

    2016-01-01

    Motivated by charge balancing constraints for rank modulation schemes, we introduce the notion of balanced permutations and derive the capacity of balanced permutation codes. We also describe simple interleaving methods for permutation code constructions and show that they approach capacity

  9. Unfolding the color code

    OpenAIRE

    Kubica, Aleksander; Yoshida, Beni; Pastawski, Fernando

    2015-01-01

    The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the ...

  10. Numerical Recipes in C++: The Art of Scientific Computing (2nd edn). Numerical Recipes Example Book (C++) (2nd edn). Numerical Recipes Multi-Language Code CD ROM with LINUX or UNIX Single-Screen License Revised Version

    International Nuclear Information System (INIS)

    The two Numerical Recipes books are marvellous. The principal book, The Art of Scientific Computing, contains program listings for almost every conceivable requirement, and it also contains a well written discussion of the algorithms and the numerical methods involved. The Example Book provides a complete driving program, with helpful notes, for nearly all the routines in the principal book. The first edition of Numerical Recipes: The Art of Scientific Computing was published in 1986 in two versions, one with programs in Fortran, the other with programs in Pascal. There were subsequent versions with programs in BASIC and in C. The second, enlarged edition was published in 1992, again in two versions, one with programs in Fortran (NR(F)), the other with programs in C (NR(C)). In 1996 the authors produced Numerical Recipes in Fortran 90: The Art of Parallel Scientific Computing as a supplement, called Volume 2, with the original (Fortran) version referred to as Volume 1. Numerical Recipes in C++ (NR(C++)) is another version of the 1992 edition. The numerical recipes are also available on a CD ROM: if you want to use any of the recipes, I would strongly advise you to buy the CD ROM. The CD ROM contains the programs in all the languages. When the first edition was published I bought it, and have also bought copies of the other editions as they have appeared. Anyone involved in scientific computing ought to have a copy of at least one version of Numerical Recipes, and there also ought to be copies in every library. If you already have NR(F), should you buy the NR(C++) and, if not, which version should you buy? In the preface to Volume 2 of NR(F), the authors say 'C and C++ programmers have not been far from our minds as we have written this volume, and we think that you will find that time spent in absorbing its principal lessons will be amply repaid in the future as C and C++ eventually develop standard parallel extensions'. In the preface and introduction to NR(C

  11. Short collusion-secure fingerprint codes against three pirates

    CERN Document Server

    Nuida, Koji

    2010-01-01

    In this article, we propose a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates and give a theoretical security evaluation. Our pirate tracing algorithm combines a scoring method analogous to Tardos codes (J. ACM, 2008) with an extension of parent search techniques of some preceding 2-secure codes. Numerical examples show that our code lengths are significantly shorter than (about 30% to 40% of) the shortest known c-secure codes by Nuida et al. (Des. Codes Cryptogr., 2009) with c = 3. Some preliminary proposal for improving efficiency of our tracing algorithm is also given.

  12. Informal control code logic

    OpenAIRE

    Bergstra, J. A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  13. Informal Control code logic

    OpenAIRE

    Bergstra, Jan A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  14. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow the...

  15. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a...

  16. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of...

  17. The Procions` code; Le code Procions

    Energy Technology Data Exchange (ETDEWEB)

    Deck, D.; Samba, G.

    1994-12-19

    This paper presents a new code to simulate plasmas generated by inertial confinement. This multi-kinds kinetic code is done with no angular approximation concerning ions and will work in plan and spherical geometry. First, the physical model is presented, using Fokker-Plank. Then, the numerical model is introduced in order to solve the Fokker-Plank operator under the Rosenbluth form. At the end, several numerical tests are proposed. (TEC). 17 refs., 27 figs.

  18. Los códigos de buen gobierno corporativo en las entidades sin ánimo de lucro: en especial en las fundaciones (Codes of good corporate governance in non-profit organizations: especially in foundations

    Directory of Open Access Journals (Sweden)

    Belén García Álvarez

    2012-06-01

    Full Text Available Non-Profit Organizations must deal too with corporate governance problems. Therefore, it can be convenient that these types of Organizations have Codes of Good Corporate Governance in order to achieve an optimum attainment of their purposes of general interest and a higher responsibility and efficiency in the administration of the organization. This necessity makes clear especially in Organizations with partnership public-private. In a Code of Good Corporate Governance must deal several aspects, as transparency, accountability, duties and rights of donors and beneficiaries of the foundation, duties fiduciaries of the board members and directors, and enforcement (including options of private enforcement. A las entidades sin ánimo de lucro como, señaladamente las fundaciones, también se debe extender la noción de gobierno corporativo. En este sentido, resulta conveniente que las propias entidades se doten de instrumentos internos como puede ser un código de buen gobierno en aras de lograr una óptima consecución de los fines de interés general y una mayor responsabilidad y eficiencia en la administración de la entidad. Esta necesidad se acrecienta en las fundaciones por medio de las cuales se plasma la colaboración público-privada. En un código de esta naturaleza deben tratarse diversos aspectos, entre los que cabe destacar los mecanismos para lograr un mayor transparencia informativa y un mayor control de la fundación, así como la posición jurídica de los colaboradores, beneficiarios y donantes de la fundación. Igualmente, deben abordarse con rigor y profundidad los deberes de los miembros del Patronato, así como de los órganos directivos de la fundación. Asimismo, deben establecerse medidas para conseguir un adecuado cumplimiento de las disposiciones del código de buen gobierno. DOWNLOAD THIS PAPER FROM SSRN: http://ssrn.com/abstract=2043112

  19. Performance Evaluation of Space-Time Turbo Code Concatenated With Block Code MC-CDMA Systems

    OpenAIRE

    Lokesh Kumar Bansal; Aditya Trivedi

    2011-01-01

    In this paper, performance of a space-time turbo code (STTuC) in concatenation with space-time block code (STBC) in multi-carrier code-division multiple-access (MCCDMA) system with multi-path fading channel is considered. The performance in terms of bit error rate (BER) is evaluated through simulations. The corresponding BER of the concatenated STTuC-STBC-MC-CDMA system is compared with STTuC-MC-CDMA system and STBC-MC-CDMA system. The simulation results show that the STTuC-MCCDMA system perf...

  20. Universal Rateless Codes From Coupled LT Codes

    CERN Document Server

    Aref, Vahid

    2011-01-01

    It was recently shown that spatial coupling of individual low-density parity-check codes improves the belief-propagation threshold of the coupled ensemble essentially to the maximum a posteriori threshold of the underlying ensemble. We study the performance of spatially coupled low-density generator-matrix ensembles when used for transmission over binary-input memoryless output-symmetric channels. We show by means of density evolution that the threshold saturation phenomenon also takes place in this setting. Our motivation for studying low-density generator-matrix codes is that they can easily be converted into rateless codes. Although there are already several classes of excellent rateless codes known to date, rateless codes constructed via spatial coupling might offer some additional advantages. In particular, by the very nature of the threshold phenomenon one expects that codes constructed on this principle can be made to be universal, i.e., a single construction can uniformly approach capacity over the cl...

  1. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important to...... understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  2. Codes from difference sets

    CERN Document Server

    Ding, Cunsheng

    2014-01-01

    This is the first monograph on codebooks and linear codes from difference sets and almost difference sets. It aims at providing a survey of constructions of difference sets and almost difference sets as well as an in-depth treatment of codebooks and linear codes from difference sets and almost difference sets. To be self-contained, this monograph covers necessary mathematical foundations and the basics of coding theory. It also contains tables of best BCH codes and best cyclic codes over GF(2) and GF(3) up to length 125 and 79, respectively. This repository of tables can be used to benchmark

  3. (Sigma-Delta) Codes

    OpenAIRE

    Boulagouaz, M.; Leroy, A

    2013-01-01

    In this paper we introduce the notion of cyclic ($f(t),\\sigma,\\delta$)-codes for $f(t)\\in \\Ore$. These codes generalize the $\\theta$-codes as introduced by D. Boucher, F. Ulmer, W. Geiselmann \\cite{BGU}. We construct generic and control matrices for these codes. As a particular case the ($\\si,\\de$)-$W$-code associated to a Wedderburn polynomial are defined and we show that their control matrices are given by generalized Vandermonde matrices. All the Wedderburn polynomials of $\\mathbb F_q[t;\\t...

  4. XSOR codes users manual

    International Nuclear Information System (INIS)

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  5. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  6. Permutation codes for sources.

    Science.gov (United States)

    Berger, T.; Jelinek, F.; Wolf, J. K.

    1972-01-01

    Source encoding techniques based on permutation codes are investigated. For a broad class of distortion measures it is shown that optimum encoding of a source permutation code is easy to instrument even for very long block lengths. Also, the nonparametric nature of permutation encoding is well suited to situations involving unknown source statistics. For the squared-error distortion measure a procedure for generating good permutation codes of a given rate and block length is described. The performance of such codes for a memoryless Gaussian source is compared both with the rate-distortion function bound and with the performance of various quantization schemes. The comparison reveals that permutation codes are asymptotically ideal for small rates and perform as well as the best entropy-coded quantizers presently known for intermediate rates. They can be made to compare favorably at high rates, too, provided the coding delay associated with extremely long block lengths is tolerable.

  7. Chinese remainder codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Aili; LIU Xiufeng

    2006-01-01

    Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory.The new type of linear codes take the congruence class in the congruence class ring R/I1 ∩ I2 ∩…∩ In for the information bit,embed R/Ji into R/I1 ∩ I2 ∩…∩ In,and assign the cosets of R/Ji as the subring of R/I1 ∩ I2 ∩…∩ In and the cosets of R/Ji in R/I1 ∩ I2 ∩…∩ In as check lines.Many code classes exist in the Chinese remainder codes that have high code rates.Chinese remainder codes are the essential generalization of Sun Zi codes.

  8. Chinese Remainder Codes

    Institute of Scientific and Technical Information of China (English)

    张爱丽; 刘秀峰; 靳蕃

    2004-01-01

    Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I1∩I2∩…∩In for the information bit, embed R/Ji into R/I1∩I2∩…∩In, and asssign the cosets of R/Ji as the subring of R/I1∩I2∩…∩In and the cosets of R/Ji in R/I1∩I2∩…∩In as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes.

  9. Professional C++

    CERN Document Server

    Gregoire, Marc

    2014-01-01

    Master complex C++ programming with this helpful, in-depth resource From game programming to major commercial software applications, C++ is the language of choice. It is also one of the most difficult programming languages to master. While most competing books are geared toward beginners, Professional C++, Third Edition, shows experienced developers how to master the latest release of C++, explaining little known features with detailed code examples users can plug into their own codes. More advanced language features and programming techniques are presented in this newest edition of the book,

  10. Accurate discrimination of conserved coding and non-coding regions through multiple indicators of evolutionary dynamics

    Directory of Open Access Journals (Sweden)

    Pesole Graziano

    2009-09-01

    Full Text Available Abstract Background The conservation of sequences between related genomes has long been recognised as an indication of functional significance and recognition of sequence homology is one of the principal approaches used in the annotation of newly sequenced genomes. In the context of recent findings that the number non-coding transcripts in higher organisms is likely to be much higher than previously imagined, discrimination between conserved coding and non-coding sequences is a topic of considerable interest. Additionally, it should be considered desirable to discriminate between coding and non-coding conserved sequences without recourse to the use of sequence similarity searches of protein databases as such approaches exclude the identification of novel conserved proteins without characterized homologs and may be influenced by the presence in databases of sequences which are erroneously annotated as coding. Results Here we present a machine learning-based approach for the discrimination of conserved coding sequences. Our method calculates various statistics related to the evolutionary dynamics of two aligned sequences. These features are considered by a Support Vector Machine which designates the alignment coding or non-coding with an associated probability score. Conclusion We show that our approach is both sensitive and accurate with respect to comparable methods and illustrate several situations in which it may be applied, including the identification of conserved coding regions in genome sequences and the discrimination of coding from non-coding cDNA sequences.

  11. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  12. Dosimetry analysis of distribution radial dose profiles of {sup 90}Sr + {sup 90}Y beta therapy applicators using the MCNP-4C code and radio chromium films; Analise dosimetrica de perfis de distribuicoes radiais de doses relativas de um aplicador de betaterapia de {sup 90}Sr + {sup 90}Y utilizando o codigo MCNP-4C e filmes radiocromicos

    Energy Technology Data Exchange (ETDEWEB)

    Coelho, T.S.; Yoriyaz, H. [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil); Fernandes, M.A.R. [Universidade Estadual Paulista Julio de Mesquita Filho (UNESP), Botucatu, SP (Brazil). Fac. de Medicina. Servico de Radioterapia; Louzada, M.J.Q. [Universidade Estadual Paulista Julio de Mesquita Filho (UNESP), Aracatuba, SP (Brazil). Curso de Medicina Veterinaria

    2010-07-01

    Although they are no longer manufactured, the applicators of {sup 90}Sr +{sup 90}Y acquired in the decades of 1990 are still in use, by having half-life of 28.5 years. These applicators have calibration certificate given by their manufacturers, where few have been recalibrated. Thus it becomes necessary to accomplish thorough dosimetry of these applicators. This paper presents a dosimetric analysis distribution radial dose profiles for emitted by an {sup 90}Sr+{sup 90}Y beta therapy applicator, using the MCNP-4C code to simulate the distribution radial dose profiles and radiochromium films to get them experimentally . The results with the simulated values were compared with the results of experimental measurements, where both curves show similar behavior, which may validate the use of MCNP-4C and radiochromium films for this type of dosimetry. (author)

  13. Dosimetry analysis of distributions radials dose profiles of {sup 90}Sr + {sup 90}Y beta therapy applicators using the MCNP-4C code and radio chromium films; Analise dosimetrica de perfis de distribuicoes radias de doses relativas de um aplicador de betaterapia de {sup 90}Sr + {sup 90}Y utilizando o codigo MCNP-4C e filmes radiocromicos

    Energy Technology Data Exchange (ETDEWEB)

    Coelho, Talita S.; Yoriyaz, Helio [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil); Fernandes, Marco A.R., E-mail: tasallesc@gmail.co [UNESP, Botucatu, SP (Brazil). Faculdade de Medicina. Servico de Radioterapia; Louzada, Mario J.Q. [UNESP, Aracatuba, SP (Brazil). Curso de Medicina Veterinaria

    2011-07-01

    Although they are no longer manufactured, the applicators of {sup 90}Sr + {sup 90}Y acquired in the decades of 1990 are still in use, by having half-life of 28.5 years. These applicators have calibration certificate given by their manufacturers, where few have been re calibrated. Thus it becomes necessary to accomplish thorough dosimetry of these applicators. This paper presents a dosimetric analysis distribution radial dose profiles for emitted by an {sup 90}Sr + {sup 90}Y beta therapy applicator, using the MCNP-4C code to simulate the distribution radial dose profiles and radio chromium films to get them experimentally . The results with the simulated values were compared with the results of experimental measurements, where both curves show similar behavior, which may validate the use of MCNP-4C and radio chromium films for this type of dosimetry. (author)

  14. Security of QR Codes

    OpenAIRE

    Kapsalis, Ioannis

    2013-01-01

    The 2-dimensional barcodes known as QR (Quick Response) Codesare increasing their popularity as they appear in more places in theurban environment. QR Codes can be considered as physical hyper-linksthat give the ability to users to access, through their mobile devicesthat are able to scan QR Codes, additional information located in aweb-page. Apart from marketing, QR Codes have been also adopted indifferent areas such as the on-line payments. This development alongwith the trend that some of ...

  15. Practices in Code Discoverability

    OpenAIRE

    Teuben, Peter; Allen, Alice; Nemiroff, Robert J.; Shamir, Lior

    2012-01-01

    Much of scientific progress now hinges on the reliability, falsifiability and reproducibility of computer source codes. Astrophysics in particular is a discipline that today leads other sciences in making useful scientific components freely available online, including data, abstracts, preprints, and fully published papers, yet even today many astrophysics source codes remain hidden from public view. We review the importance and history of source codes in astrophysics and previous efforts to d...

  16. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  17. Progressive fractal coding

    OpenAIRE

    Kopilovic, Ivan; Saupe, Dietmar; Hamzaoui, Raouf

    2001-01-01

    Progressive coding is an important feature of compression schemes. Wavelet coders are well suited for this purpose because the wavelet coefficients can be naturally ordered according to decreasing importance. Progressive fractal coding is feasible, but it was proposed only for hybrid fractal-wavelet schemes. We introduce a progressive fractal image coder in the spatial domain. A Lagrange optimization based on rate-distortion performance estimates determines an optimal ordering of the code bit...

  18. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  19. Phonological coding during reading.

    Science.gov (United States)

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. PMID:25150679

  20. Locally Repairable Codes

    OpenAIRE

    Papailiopoulos, Dimitris S.; Dimakis, Alexandros G.

    2012-01-01

    Distributed storage systems for large-scale applications typically use replication for reliability. Recently, erasure codes were used to reduce the large storage overhead, while increasing data reliability. A main limitation of off-the-shelf erasure codes is their high-repair cost during single node failure events. A major open problem in this area has been the design of codes that {\\it i)} are repair efficient and {\\it ii)} achieve arbitrarily high data rates. In this paper, we explore the r...

  1. Deuterons at energies of 10 MeV to 1 TeV: Conversion coefficients for fluence-to-absorbed dose, equivalent dose, effective dose and gray equivalent, calculated using Monte Carlo radiation transport code MCNPX 2.7.C

    International Nuclear Information System (INIS)

    Conversion coefficients were calculated for fluence-to-absorbed dose, fluence-to-equivalent dose, fluence-to-effective dose and fluence-to-gray equivalent for isotropic exposure of an adult female and an adult male to deuterons (2H+) in the energy range 10 MeV-1 TeV (0.01-1000 GeV). Coefficients were calculated using the Monte Carlo transport code MCNPX 2.7.C and BodyBuilderTM 1.3 anthropomorphic phantoms. Phantoms were modified to allow calculation of the effective dose to a Reference Person using tissues and tissue weighting factors from 1990 and 2007 recommendations of the International Commission on Radiological Protection (ICRP) and gray equivalent to selected tissues as recommended by the National Council on Radiation Protection and Measurements. Coefficients for the equivalent and effective dose incorporated a radiation weighting factor of 2. At 15 of 19 energies for which coefficients for the effective dose were calculated, coefficients based on ICRP 1990 and 2007 recommendations differed by < 3 %. The greatest difference, 47 %, occurred at 30 MeV. (authors)

  2. Helions at energies of 10 MeV to 1 TeV: Conversion coefficients for fluence-to-absorbed dose, equivalent dose, effective dose and gray equivalent, calculated using Monte Carlo radiation transport code MCNPX 2.7.C

    International Nuclear Information System (INIS)

    Conversion coefficients were calculated for fluence-to-absorbed dose, fluence-to-equivalent dose, fluence-to-effective dose and fluence-to-gray equivalent, for isotropic exposure of an adult male and an adult female to helions (3He2+) in the energy range of 10 MeV to 1 TeV (0.01-1000 GeV). Calculations were performed using Monte Carlo transport code MCNPX 2.7.C and BodyBuilderTM 1.3 anthropomorphic phantoms modified to allow calculation of effective dose using tissues and tissue weighting factors from either the 1990 or 2007 recommendations of the International Commission on Radiological Protection (ICRP), and gray equivalent to selected tissues as recommended by the National Council on Radiation Protection and Measurements. At 15 of the 19 energies for which coefficients for effective dose were calculated, coefficients based on ICRP 2007 and 1990 recommendations differed by less than 2%. The greatest difference, 62%, occurred at 100 MeV. Published by Oxford Univ. Press on behalf of the U.S. Government 2010. (authors)

  3. Tritons at energies of 10 MeV to 1 TeV: Conversion coefficients for fluence-to-absorbed dose, equivalent dose, effective dose, and gray equivalent, calculated using Monte Carlo radiation transport code MCNPX 2.7.C

    International Nuclear Information System (INIS)

    Conversion coefficients were calculated for fluence-to-absorbed dose, fluence-to-equivalent dose, fluence-to-effective dose and fluence-to-gray equivalent for isotropic exposure of an adult female and an adult male to tritons (3H+) in the energy range of 10 MeV to 1 TeV (0.01-1000 GeV). Coefficients were calculated using Monte Carlo transport code MCNPX 2.7.C and BodyBuilderTM 1.3 anthropomorphic phantoms. Phantoms were modified to allow calculation of effective dose to a Reference Person using tissues and tissue weighting factors from 1990 and 2007 recommendations of the International Commission on Radiological Protection (ICRP) and calculation of gray equivalent to selected tissues as recommended by the National Council on Radiation Protection and Measurements. At 15 of the 19 energies for which coefficients for effective dose were calculated, coefficients based on ICRP 2007 and 1990 recommendations differed by less than 3%. The greatest difference, 43%, occurred at 30 MeV. Published by Oxford Univ. Press on behalf of the US Government 2010. (authors)

  4. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  5. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  6. Tokamak Systems Code

    International Nuclear Information System (INIS)

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  7. Verification of the computer code ATHLET in the framework of the external verification group ATHLET by post test analyses of the PKL III-experiments B4.3 and C6.1. Final report

    International Nuclear Information System (INIS)

    In the framework of the external verification of the thermohydraulic computer code ATHLET, developed by the Gesellschaft fuer Anlagen- und Reaktorsicherheit, post-test analyses of the two experiments B 4.3 and C 6.1 were carried out, which were performed at the PKL III test facility. In both experiments the effects of nitrogen injections into the primary coolant were investigated with respect to plant behaviour and heat transfer in the steam generators at the transition phase to low pressure (10 bar). In experiment B 4.3 nitrogen was injected in 6 single cycles into the primary system at reflux condenser-conditions. For hot- and cold-leg injections with small nitrogen masses the relevant physical phenomena were simulated; the results show a good to sufficient agreement between experiment and calculation considering steam generator hehaviour with respect to water level, fluid temperature and heat transfer. Discrepancies occurred especially in plant behaviour at hot-leg injections with large nitrogen masses, but there was at least a qualitative sufficient agreement with reference to nitrogen- and temperature-distribution in steam generator heating tubes. In experiment C 6.1 a small break LOCA was investigated with nitrogen injection of two accumulators and other aggravated boundary conditions. In total there is a good agreement between experiment and calculation with respect to simulation of integral behaviour and also of single phenomena. Especially the safety-relevant experimental result was verified by the analysis, i.e. a shutdown of the plant and transition to low pressure is even possible in cases of injection of noncondensable gas of two accumulators and other aggravated boundary conditions. (orig.)

  8. A Goppa-like bound on the trellis state complexity of algebraic geometric codes

    OpenAIRE

    Munuera, Carlos; Torres, Fernando

    2002-01-01

    For a linear code $\\cC$ of length $n$ and dimension $k$, Wolf noticed that the trellis state complexity $s(\\cC)$ of $\\cC$ is upper bounded by $w(\\cC):=\\min(k,n-k)$. In this paper we point out some new lower bounds for $s(\\cC)$. In particular, if $\\cC$ is an Algebraic Geometric code, then $s(\\cC)\\geq w(\\cC)-(g-a)$, where $g$ is the genus of the underlying curve and $a$ is the abundance of the code.

  9. Computer code ANISN multiplying media and shielding calculation II. Code description (input/output)

    International Nuclear Information System (INIS)

    The user manual of the ANISN computer code describing input and output subroutines is presented. ANISN code was developed to solve one-dimensional transport equation for neutron or gamma rays in slab, sphere or cylinder geometry with general anisotropic scattering. The solution technique is the discrete ordinate method. (M.C.K.)

  10. ADORAVA - A computer code to sum random variables

    International Nuclear Information System (INIS)

    The ADORAVA computer code was carried out aiming to determine the moments of random variable sum distribution when moments are known. The ADORAVA computer code was developed to be applied in probabilistic safety analysis, more specifically for uncertainty propagation in fault trees. The description of ADORAVA algorithm, input, examples and the output of compiled code are presented. (M.C.K.)

  11. Research on universal combinatorial coding.

    Science.gov (United States)

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value. PMID:24772019

  12. AZIMUT code abstract

    International Nuclear Information System (INIS)

    The brief description of the AZIMUT code for calculation the neutron flux in a cluster cell is presented. Code takes into account 1 and 2 azimuthal harmonics in the one-group P3-approximation and uses the heterogeneous approach. 2 refs

  13. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven...

  14. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alex

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  15. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  16. Computerized mega code recording.

    Science.gov (United States)

    Burt, T W; Bock, H C

    1988-04-01

    A system has been developed to facilitate recording of advanced cardiac life support mega code testing scenarios. By scanning a paper "keyboard" using a bar code wand attached to a portable microcomputer, the person assigned to record the scenario can easily generate an accurate, complete, timed, and typewritten record of the given situations and the obtained responses. PMID:3354937

  17. Codes of Conduct

    Science.gov (United States)

    Million, June

    2004-01-01

    Most schools have a code of conduct, pledge, or behavioral standards, set by the district or school board with the school community. In this article, the author features some schools that created a new vision of instilling code of conducts to students based on work quality, respect, safety and courtesy. She suggests that communicating the code…

  18. Code A1 Revised

    CERN Multimedia

    SC Secretariat

    2004-01-01

    Please note that the revised safety code A1 entitled 'MEDICAL CODE' is available on the web at the following url: https://edms.cern.ch/document/335476/last_released Paper copies can also be obtained from the SC Secretariat, e-mail : sc.secretariat@cern.ch SC Secretariat

  19. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  20. Fracture flow code

    International Nuclear Information System (INIS)

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  1. Transformation invariant sparse coding

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard

    2011-01-01

    Sparse coding is a well established principle for unsupervised learning. Traditionally, features are extracted in sparse coding in specific locations, however, often we would prefer invariant representation. This paper introduces a general transformation invariant sparse coding (TISC) model. The...... model decomposes images into features invariant to location and general transformation by a set of specified operators as well as a sparse coding matrix indicating where and to what degree in the original image these features are present. The TISC model is in general overcomplete and we therefore invoke...... sparse coding to estimate its parameters. We demonstrate how the model can correctly identify components of non-trivial artificial as well as real image data. Thus, the model is capable of reducing feature redundancies in terms of pre-specified transformations improving the component identification....

  2. Code blue: seizures.

    Science.gov (United States)

    Hoerth, Matthew T; Drazkowski, Joseph F; Noe, Katherine H; Sirven, Joseph I

    2011-06-01

    Eyewitnesses frequently perceive seizures as life threatening. If an event occurs on the hospital premises, a "code blue" can be called which consumes considerable resources. The purpose of this study was to determine the frequency and characteristics of code blue calls for seizures and seizure mimickers. A retrospective review of a code blue log from 2001 through 2008 identified 50 seizure-like events, representing 5.3% of all codes. Twenty-eight (54%) occurred in inpatients; the other 22 (44%) events involved visitors or employees on the hospital premises. Eighty-six percent of the events were epileptic seizures. Seizure mimickers, particularly psychogenic nonepileptic seizures, were more common in the nonhospitalized group. Only five (17.9%) inpatients had a known diagnosis of epilepsy, compared with 17 (77.3%) of the nonhospitalized patients. This retrospective survey provides insights into how code blues are called on hospitalized versus nonhospitalized patients for seizure-like events. PMID:21546315

  3. A fuel performance code TRUST VIc and its validation

    International Nuclear Information System (INIS)

    This paper describes a fuel performance code TRUST V1c developed to analyze thermal and mechanical behavior of LWR fuel rod. Submodels in the code include FP gas models depicting gaseous swelling, gas release from pellet and axial gas mixing. The code has FEM-based structure to handle interaction between thermal and mechanical submodels brought by the gas models. The code is validated against irradiation data of fuel centerline temperature, FGR, pellet porosity and cladding deformation. (author). 9 refs, 8 figs

  4. Code generation of RHIC accelerator device objects

    International Nuclear Information System (INIS)

    A RHIC Accelerator Device Object is an abstraction which provides a software view of a collection of collider control points known as parameters. A grammar has been defined which allows these parameters, along with code describing methods for acquiring and modifying them, to be specified efficiently in compact definition files. These definition files are processed to produce C++ source code. This source code is compiled to produce an object file which can be loaded into a front end computer. Each loaded object serves as an Accelerator Device Object class definition. The collider will be controlled by applications which set and get the parameters in instances of these classes using a suite of interface routines. Significant features of the grammar are described with details about the generated C++ code

  5. Computer Security: is your code sane?

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    How many of us write code? Software? Programs? Scripts? How many of us are properly trained in this and how well do we do it? Do we write functional, clean and correct code, without flaws, bugs and vulnerabilities*? In other words: are our codes sane?   Figuring out weaknesses is not that easy (see our quiz in an earlier Bulletin article). Therefore, in order to improve the sanity of your code, prevent common pit-falls, and avoid the bugs and vulnerabilities that can crash your code, or – worse – that can be misused and exploited by attackers, the CERN Computer Security team has reviewed its recommendations for checking the security compliance of your code. “Static Code Analysers” are stand-alone programs that can be run on top of your software stack, regardless of whether it uses Java, C/C++, Perl, PHP, Python, etc. These analysers identify weaknesses and inconsistencies including: employing undeclared variables; expressions resu...

  6. Application of RS Codes in Decoding QR Code

    Institute of Scientific and Technical Information of China (English)

    Zhu Suxia(朱素霞); Ji Zhenzhou; Cao Zhiyan

    2003-01-01

    The QR Code is a 2-dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code's virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm.

  7. Extended calculations of OECD/NEA phase II-C burnup credit criticality benchmark problem for PWR spent fuel transport cask by using MCNP-4B2 code and JENDL-3.2 library

    International Nuclear Information System (INIS)

    The reactivity effect of the asymmetry of axial burnup profile in burnup credit criticality safety is studied for a realistic PWR spent fuel transport cask proposed in the current OECD/NEA Phase II-C benchmark problem. The axial burnup profiles are simulated in 21 material zones based on in-core flux measurements varying from strong asymmetry to more or less no asymmetry. Criticality calculations in a 3-D model have been performed using the continuous energy Monte Carlo code MCNP-4B2 and the nuclear data library JENDL-3.2. Calculation conditions are determined with consideration of the axial fission source convergence. Calculations are carried out not only for cases proposed in the benchmark but also for additional cases assuming symmetric burnup profile. The actinide-only approach supposed for first domestic introduction of burnup credit into criticality evaluation is also considered in addition to the actinide plus fission product approach adopted in the benchmark. The calculated results show that keff and the end effect increase almost linearly with increasing burnup axial offset that is defined as one of typical parameters showing the intensity of axial burnup asymmetry. The end effect is more sensitive to the asymmetry of burnup profile for the higher burnup. For an axially distributed burnup, the axial fission source distribution becomes strongly asymmetric as its peak shifts toward the top end of the fuel's active zone where the local burnup is less than that of the bottom end. The peak of fission source distribution becomes higher with the increase of either the asymmetry of burnup profile or the assembly-averaged burnup. The conservatism of the assumption of uniform axial burnup based on the actinide-only approach is estimated quantitatively in comparison with the keff result calculated with experiment-based strongest asymmetric axial burnup profile with the actinide plus fission product approach. (author)

  8. Long non‑coding RNA‑GAS5 acts as a tumor suppressor in bladder transitional cell carcinoma via regulation of chemokine (C‑C motif) ligand 1 expression.

    Science.gov (United States)

    Cao, Qifeng; Wang, Ning; Qi, Juan; Gu, Zhengqin; Shen, Haibo

    2016-01-01

    Long non‑coding RNAs (lncRNAs) have important roles in diverse biological processes, including transcriptional regulation, cell growth and tumorigenesis. The present study aimed to investigate whether lncRNA‑growth arrest‑specific (GAS)5 regulated bladder cancer progression via regulation of chemokine (C‑C) ligand (CCL)1 expression. The viability of BLX bladder cancer cells was detected using a Cell Counting kit‑8 assay, and cell apoptosis was assessed by annexin V‑propidium iodide double‑staining. The expression levels of specific genes and proteins were analyzed by reverse transcription‑quantitative polymerase chain reaction and western blotting, respectively. In addition, cells were transfected with small interfering (si)RNAs or recombinant GAS5 in order to silence or overexpress GAS5, respectively. The results of the present study demonstrated that knockdown of GAS5 expression promoted bladder cancer cell proliferation, whereas overexpression of GAS5 suppressed cell proliferation. Furthermore, knockdown of GAS5 resulted in an increased percentage of cells in S and G2 phase, and a decreased percentage of cells in G1 phase. In addition, the present study performed a hierarchical cluster analysis of differentially expressed lncRNAs in bladder cancer cells and detected that CCL1 overexpression resulted in an upregulation of GAS5, which may improve the ability of cells to regulate a stress response in vitro. Furthermore, knockdown of GAS5 expression increased the mRNA and protein expression of CCL1 in bladder cancer cells. Gain‑of‑function and loss‑of‑function studies demonstrated that GAS5 was able to inhibit bladder cancer cell proliferation, at least in part, by suppressing the expression of CCL1. The results of the present study demonstrated that GAS5 was able to suppress bladder cancer cell proliferation, at least partially, by suppressing the expression of CCL1. The results of the present study may provide a basis for developing novel

  9. Report number codes

    International Nuclear Information System (INIS)

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  10. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  11. Distributed multiple description coding

    CERN Document Server

    Bai, Huihui; Zhao, Yao

    2011-01-01

    This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC,

  12. Classical Holographic Codes

    CERN Document Server

    Brehm, Enrico M

    2016-01-01

    In this work, we introduce classical holographic codes. These can be understood as concatenated probabilistic codes and can be represented as networks uniformly covering hyperbolic space. In particular, classical holographic codes can be interpreted as maps from bulk degrees of freedom to boundary degrees of freedom. Interestingly, they are shown to exhibit features similar to those expected from the AdS/CFT correspondence. Among these are a version of the Ryu-Takayanagi formula and intriguing properties regarding bulk reconstruction and boundary representations of bulk operations. We discuss the relation of our findings with expectations from AdS/CFT and, in particular, with recent results from quantum error correction.

  13. Speaking In Code

    OpenAIRE

    Croxall, Brian

    2014-01-01

    Brian Croxall Emory University Over the last five years, there have been countless articles written about the digital humanities. It’s been called both the savior and the death knell of scholarship in the twenty-first century. But what do we mean when we say “digital humanities”? How “digital” and how “humanities” need we be? Why is so much faith being placed in code and code words? In this presentation, Brian Croxall argues that digital humanists need to speak in code less frequently and tha...

  14. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  15. Laser propagation code study

    OpenAIRE

    Rockower, Edward B.

    1985-01-01

    A number of laser propagation codes have been assessed as to their suitability for modeling Army High Energy Laser (HEL) weapons used in an anti- sensor mode. We identify a number of areas in which systems analysis HEL codes are deficient. Most notably, available HEL scaling law codes model the laser aperture as circular, possibly with a fixed (e.g. 10%) obscuration. However, most HELs have rectangular apertures with up to 30% obscuration. We present a beam-quality/aperture shape scaling rela...

  16. Enigma fuel performance code

    International Nuclear Information System (INIS)

    The Enigma fuel performance code has been developed jointly by BNFL and the CEGB's Berkeley Nuclear Laboratories. Its development arose from the need for a code capable of analysing all aspects of light water reactor (LWR) fuel behaviour which would also provide a suitable framework for future submodel development. The submodels incorporated into Enigma reflect the significant progress which has been made in recent years in modelling the important physical processes which determine fuel behaviour. The Enigma code has been subjected to an extensive programme of validation which has demonstrated its suitability for LWR performance analysis. (author)

  17. FORIST unfolding code

    International Nuclear Information System (INIS)

    The FERDOR method is widely used to unfold neutron energy spectra from pulse-height distributions measured with NE-213 spectrometers. Two unfolding codes COOLC (developed at ORNL) and FORIST (modified version of COOLC developed at UIUC) implement the FERDOR method and are distributed by RSIC. Each code package contains an NE-213 response matrix, sample input data, and sample output. The smoothing (window) widths which are distributed with COOLC are not the most appropriate for all neutron spectrum measurements. The FORIST code determines an optimum set of window widths according to the desired statistical error in the smoothed spectrum

  18. Modelling of HTR (High Temperature Reactor Pebble-Bed 10 MW to Determine Criticality as A Variations of Enrichment and Radius of the Fuel (Kernel With the Monte Carlo Code MCNP4C

    Directory of Open Access Journals (Sweden)

    Hammam Oktajianto

    2015-01-01

    Full Text Available Gas-cooled nuclear reactor is a Generation IV reactor which has been receiving significant attention due to many desired characteristics such as inherent safety, modularity, relatively low cost, short construction period, and easy financing. High temperature reactor (HTR pebble-bed as one of type of gas-cooled reactor concept is getting attention. In HTR pebble-bed design, radius and enrichment of the fuel kernel are the key parameter that can be chosen freely to determine the desired value of criticality. This paper models HTR pebble-bed 10 MW and determines an effective of enrichment and radius of the fuel (Kernel to get criticality value of reactor. The TRISO particle coated fuel particle which was modelled explicitly and distributed in the fuelled region of the fuel pebbles using a Simple-Cubic (SC lattice. The pebble-bed balls and moderator balls distributed in the core zone using a Body-Centred Cubic lattice with assumption of a fresh fuel by the fuel enrichment was 7-17% at 1% range and the size of the fuel radius was 175-300 µm at 25 µm ranges. The geometrical model of the full reactor is obtained by using lattice and universe facilities provided by MCNP4C. The details of model are discussed with necessary simplifications. Criticality calculations were conducted by Monte Carlo transport code MCNP4C and continuous energy nuclear data library ENDF/B-VI. From calculation results can be concluded that an effective of enrichment and radius of fuel (Kernel to achieve a critical condition was the enrichment of 15-17% at a radius of 200 µm, the enrichment of 13-17% at a radius of 225 µm, the enrichments of 12-15% at radius of 250 µm, the enrichments of 11-14% at a radius of 275 µm and the enrichment of 10-13% at a radius of 300 µm, so that the effective of enrichments and radii of fuel (Kernel can be considered in the HTR 10 MW.

  19. Los códigos de buen gobierno corporativo en las entidades sin ánimo de lucro: en especial en las fundaciones (Codes of good corporate governance in non-profit organizations: especially in foundations)

    OpenAIRE

    Belén García Álvarez

    2012-01-01

    Non-Profit Organizations must deal too with corporate governance problems. Therefore, it can be convenient that these types of Organizations have Codes of Good Corporate Governance in order to achieve an optimum attainment of their purposes of general interest and a higher responsibility and efficiency in the administration of the organization. This necessity makes clear especially in Organizations with partnership public-private. In a Code of Good Corporate Governance must deal several aspec...

  20. Certifying Auto-Generated Flight Code

    Science.gov (United States)

    Denney, Ewen

    2008-01-01

    itself is generic, and parametrized with respect to a library of coding patterns that depend on the safety policies and the code generator. The patterns characterize the notions of definitions and uses that are specific to the given safety property. For example, for initialization safety, definitions correspond to variable initializations while uses are statements which read a variable, whereas for array bounds safety, definitions are the array declarations, while uses are statements which access an array variable. The inferred annotations are thus highly dependent on the actual program and the properties being proven. The annotations, themselves, need not be trusted, but are crucial to obtain the automatic formal verification of the safety properties without requiring access to the internals of the code generator. The approach has been applied to both in-house and commercial code generators, but is independent of the particular generator used. It is currently being adapted to flight code generated using MathWorks Real-Time Workshop, an automatic code generator that translates from Simulink/Stateflow models into embedded C code.

  1. The article 583 bis of the Criminal Code: an illicit committed in the name of religion? - L’article n° 583 bis du Code Pénal : un acte illicite commis au nom de la réligion? - L’articolo 583 bis c.p. un illecito compiuto in nome della religione?

    Directory of Open Access Journals (Sweden)

    Colombo C.

    2009-08-01

    Full Text Available Mutilations of female genital organs are a particularly difficult issue. That is the reason why it occupies historical, anthropological and medico-legal research. So the present article considers the situation in all these aspects together with the provisions introduced by Law n. 7, 9/1/2006 and article 583 bis of the Criminal Code for the Protection of the rights of women being mutilated.Indeed we believe that the mutilations are real and cause personal psychic injury. The custom of mutilation has nothing to do with religious beliefs, but is the product of old social prejudices against women, as an individual.La MGF (mutilation génitale féminine est un sujet de société tristement actuel dont on dit qu'elle est pratiquée au nom des croyances religieuses les plus ancestrales.C’est la raison pour laquelle j’ai voulu avant tout consulter, bien que brièvement, l'analyse anthropologique, historique, médico-légale et juridique effectuée sur cet argument pour me pencher ensuite sur la loi italienne n° 7 du 9/1/2006 et sur l’article n° 583bis du Code Pénal Italien, ayant trait à la sauvegarde des droits inaliénables de la femme qui subit une mutilation.En effet les mutilations sont de véritables lésions physiques et souffrances psychiques qui plus que motivées par des croyances religieuses sont dictées par d'anciens us et coutumes combles de préjugés sociaux envers la femme en tant qu’individu.Le mutilazioni degli organi genitali femminili rappresentano un tema tristemente attuale legato per “comodità” alle credenze religiose più arcaiche.Per questo motivo, l’articolo ha voluto, da subito, volgere uno sguardo, seppur breve, all’analisi antropologica, storica e medico-giuridica dell’argomento per poi considerare la legge n. 7 del 9/1/2006 (che ha attuato i principi della Dichiarazione e del Programma della IV Conferenza mondiale dell’ONU sulle donne - Pechino 1995, nonché le disposizioni degli artt. 2,3,32 della

  2. FORTRAN code-evaluation system

    Science.gov (United States)

    Capps, J. D.; Kleir, R.

    1977-01-01

    Automated code evaluation system can be used to detect coding errors and unsound coding practices in any ANSI FORTRAN IV source code before they can cause execution-time malfunctions. System concentrates on acceptable FORTRAN code features which are likely to produce undesirable results.

  3. No More Perfect Codes: Classification of Perfect Quantum Codes

    OpenAIRE

    Li, Zhuo; Xing, Lijuan

    2009-01-01

    We solve the problem of the classification of perfect quantum codes. We prove that the only nontrivial perfect quantum codes are those with the parameters . There exist no other nontrivial perfect quantum codes.

  4. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  5. Importance of Building Code

    Directory of Open Access Journals (Sweden)

    Reshmi Banerjee

    2015-06-01

    Full Text Available A building code, or building control, is a set of rules that specify the minimum standards for constructed objects such as buildings and non building structures. The main purpose of building codes are to protect public health, safety and general welfare as they relate to the construction and occupancy of buildings and structures. The building code becomes law of a particular jurisdiction when formally enacted by the appropriate governmental or private authority. Building codes are generally intended to be applied by architects, engineers, constructors and regulators but are also used for various purposes by safety inspectors, environmental scientists, real estate developers, subcontractors, manufacturers of building products and materials, insurance companies, facility managers, tenants and others.

  6. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  7. Induction technology optimization code

    International Nuclear Information System (INIS)

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  8. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  9. Der Code der Transparenz

    OpenAIRE

    Alloa, Emmanuel

    2015-01-01

    In allen Bereichen der Gesellschaft werden gegenwärtig Forderungen nach mehr Transparenz laut. Was steht hinter diesem Wort? Für Emmanuel Alloa wohnt der Transparenzforderung die Paradoxie inne, ein "codefreier Code" sein zu wollen.

  10. The moment code BEDLAM

    Energy Technology Data Exchange (ETDEWEB)

    Channell, P.J.; Healy, L.M.; Lysenko, W.P.

    1985-10-01

    This paper describes the status of BEDLAM and presents the results of some tests. We simulated a section of radio-frequency quadrupole (RFQ) linac, neglecting space charge, to test the new code. Agreement with a Particle-In-Cell (PIC) simulation was excellent. We also verified that the fourth-order solution is more accurate than the second-order solution, which indicates the convergence of the method. We believe these results justify the continued development of moment simulation codes.

  11. Towards advanced code simulators

    International Nuclear Information System (INIS)

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  12. Secure Fractal Image Coding

    OpenAIRE

    Lian, Shiguo

    2007-01-01

    In recent work, various fractal image coding methods are reported, which adopt the self-similarity of images to compress the size of images. However, till now, no solutions for the security of fractal encoded images have been provided. In this paper, a secure fractal image coding scheme is proposed and evaluated, which encrypts some of the fractal parameters during fractal encoding, and thus, produces the encrypted and encoded image. The encrypted image can only be recovered by the correct ke...

  13. Coding of auditory space

    OpenAIRE

    Konishi­, Masakazu

    2003-01-01

    Behavioral, anatomical, and physiological approaches can be integrated in the study of sound localization in barn owls. Space representation in owls provides a useful example for discussion of place and ensemble coding. Selectivity for space is broad and ambiguous in low-order neurons. Parallel pathways for binaural cues and for different frequency bands converge on high-order space-specific neurons, which encode space more precisely. An ensemble of broadly tuned place-coding neurons may conv...

  14. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  15. PEAR code review

    International Nuclear Information System (INIS)

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  16. On Expanded Cyclic Codes

    CERN Document Server

    Wu, Yingquan

    2008-01-01

    The paper has a threefold purpose. The first purpose is to present an explicit description of expanded cyclic codes defined in $\\GF(q^m)$. The proposed explicit construction of expanded generator matrix and expanded parity check matrix maintains the symbol-wise algebraic structure and thus keeps many important original characteristics. The second purpose of this paper is to identify a class of constant-weight cyclic codes. Specifically, we show that a well-known class of $q$-ary BCH codes excluding the all-zero codeword are constant-weight cyclic codes. Moreover, we show this class of codes achieve the Plotkin bound. The last purpose of the paper is to characterize expanded cyclic codes utilizing the proposed expanded generator matrix and parity check matrix. We analyze the properties of component codewords of a codeword and particularly establish the precise conditions under which a codeword can be represented by a subbasis. With the new insights, we present an improved lower bound on the minimum distance of...

  17. KENO-V code

    International Nuclear Information System (INIS)

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  18. Code Formal Verification of Operation System

    Directory of Open Access Journals (Sweden)

    Yu Zhang

    2010-12-01

    Full Text Available with the increasing pressure on non-function attributes (security, safety and reliability requirements of an operation system, high–confidence operation system is becoming more important. Formal verification is the only known way to guarantee that a system is free of programming errors. We research on formal verification of operation system kernel in system code level and take theorem proving and model checking as the main technical methods to resolve the key techniques of verifying operation system kernel in C code level. We present a case study to the verification of real-world C systems code derived from an implementation of μC/OS – II in the end.

  19. Computer aided power flow software engineering and code generation

    Energy Technology Data Exchange (ETDEWEB)

    Bacher, R. [Swiss Federal Inst. of Tech., Zuerich (Switzerland)

    1995-12-31

    In this paper a software engineering concept is described which permits the automatic solution of a non-linear set of network equations. The power flow equation set can be seen as a defined subset of a network equation set. The automated solution process is the numerical Newton-Raphson solution process of the power flow equations where the key code parts are the numeric mismatch and the numeric Jacobian term computation. It is shown that both the Jacobian and the mismatch term source code can be automatically generated in a conventional language such as Fortran or C. Thereby one starts from a high level, symbolic language with automatic differentiation and code generation facilities. As a result of this software engineering process an efficient, very high quality Newton-Raphson solution code is generated which allows easier implementation of network equation model enhancements and easier code maintenance as compared to hand-coded Fortran or C code.

  20. Computer aided power flow software engineering and code generation

    Energy Technology Data Exchange (ETDEWEB)

    Bacher, R. [Swiss Federal Inst. of Tech., Zuerich (Switzerland)

    1996-02-01

    In this paper a software engineering concept is described which permits the automatic solution of a non-linear set of network equations. The power flow equation set can be seen as a defined subset of a network equation set. The automated solution process is the numerical Newton-Raphson solution process of the power flow equations where the key code parts are the numeric mismatch and the numeric Jacobian term computation. It is shown that both the Jacobian and the mismatch term source code can be automatically generated in a conventional language such as Fortran or C. Thereby one starts from a high level, symbolic language with automatic differentiation and code generation facilities. As a result of this software engineering process an efficient, very high quality newton-Raphson solution code is generated which allows easier implementation of network equation model enhancements and easier code maintenance as compared to hand-coded Fortran or C code.

  1. Accumulative Landings System Code Tables

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Code Tables Used In Landings System. These tables assign meanings to the codes that appear in the data tables. Code tables exist for species, gear, state, county,...

  2. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes.......Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  3. Mixed Burst Error Correcting Codes

    OpenAIRE

    Sethi, Amita

    2015-01-01

    In this paper, we construct codes which are an improvement on the previously known block wise burst error correcting codes in terms of their error correcting capabilities. Along with different bursts in different sub-blocks, the given codes also correct overlapping bursts of a given length in two consecutive sub-blocks of a code word. Such codes are called mixed burst correcting (mbc) codes.

  4. Nuclear code abstracts (1975 edition)

    International Nuclear Information System (INIS)

    Nuclear Code Abstracts is compiled in the Nuclear Code Committee to exchange information of the nuclear code developments among members of the committee. Enlarging the collection, the present one includes nuclear code abstracts obtained in 1975 through liaison officers of the organizations in Japan participating in the Nuclear Energy Agency's Computer Program Library at Ispra, Italy. The classification of nuclear codes and the format of code abstracts are the same as those in the library. (auth.)

  5. Algebraic geometric codes with applications

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2007-01-01

    The theory of linear error-correcting codes from algebraic geomet-ric curves (algebraic geometric (AG) codes or geometric Goppa codes) has been well-developed since the work of Goppa and Tsfasman, Vladut, and Zink in 1981-1982. In this paper we introduce to readers some recent progress in algebraic geometric codes and their applications in quantum error-correcting codes, secure multi-party computation and the construction of good binary codes.

  6. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  7. Radionuclide daughter inventory generator code: DIG

    International Nuclear Information System (INIS)

    The Daughter Inventory Generator (DIG) code accepts a tabulation of radionuclide initially present in a waste stream, specified as amounts present either by mass or by activity, and produces a tabulation of radionuclides present after a user-specified elapsed time. This resultant radionuclide inventory characterizes wastes that have undergone daughter ingrowth during subsequent processes, such as leaching and transport, and includes daughter radionuclides that should be considered in these subsequent processes or for inclusion in a pollutant source term. Output of the DIG code also summarizes radionuclide decay constants. The DIG code was developed specifically to assist the user of the PRESTO-II methodology and code in preparing data sets and accounting for possible daughter ingrowth in wastes buried in shallow-land disposal areas. The DIG code is also useful in preparing data sets for the PRESTO-EPA code. Daughter ingrowth in buried radionuclides and in radionuclides that have been leached from the wastes and are undergoing hydrologic transport are considered, and the quantities of daughter radionuclide are calculated. Radionuclide decay constants generated by DIG and included in the DIG output are required in the PRESTO-II code input data set. The DIG accesses some subroutines written for use with the CRRIS system and accesses files containing radionuclide data compiled by D.C. Kocher. 11 refs

  8. Classifying Coding DNA with Nucleotide Statistics

    Directory of Open Access Journals (Sweden)

    Nicolas Carels

    2009-10-01

    Full Text Available In this report, we compared the success rate of classification of coding sequences (CDS vs. introns by Codon Structure Factor (CSF and by a method that we called Universal Feature Method (UFM. UFM is based on the scoring of purine bias (Rrr and stop codon frequency. We show that the success rate of CDS/intron classification by UFM is higher than by CSF. UFM classifies ORFs as coding or non-coding through a score based on (i the stop codon distribution, (ii the product of purine probabilities in the three positions of nucleotide triplets, (iii the product of Cytosine (C, Guanine (G, and Adenine (A probabilities in the 1st, 2nd, and 3rd positions of triplets, respectively, (iv the probabilities of G in 1st and 2nd position of triplets and (v the distance of their GC3 vs. GC2 levels to the regression line of the universal correlation. More than 80% of CDSs (true positives of Homo sapiens (>250 bp, Drosophila melanogaster (>250 bp and Arabidopsis thaliana (>200 bp are successfully classified with a false positive rate lower or equal to 5%. The method releases coding sequences in their coding strand and coding frame, which allows their automatic translation into protein sequences with 95% confidence. The method is a natural consequence of the compositional bias of nucleotides in coding sequences.

  9. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  10. Verification of the computer code ATHLET in the framework of the external verification group ATHLET (tests BETHSY 6.2TC, BETHSY 7.2c, BETHSY 4.1a, phase 2). Final report

    International Nuclear Information System (INIS)

    In the framework of the external verification of the fluiddynamic computer code ATHLET developed by GRS post-test analyses of three BETHSY experiments (integral tests at the facility BETHSY in Grenoble) were performed. In test BETHSY 6.2TC (medium break in the cold leg without high pressure injection) the most relevant physical phenomena: depression of the collapsed liquid level in the core, loop seal clearing, flashing of a two-phase mixture during accumulator injection were well simulated. Remaining discrepancies can be explained by an inaccurate modelling of the break mass flow at the transition liquid - vapor flow at stratified flow conditions in the break pipe. The analyses of test BETHSY 7.2c (reflux-condenser mode in the presence of noncondensable gases, e.g. nitrogen, in the primary system) were impaired by extremely high computer time requirements, which prohibited a calculation using a more detailed modelling of the U-tube groups (6-tube model). Using a simplified model for the U-tubes (1-tube model) the space distribution of nitrogen in the U-tubes and in the region of outlet plenum/cold leg could not be simulated with sufficient accuracy having the effect that the overall heat transfer in the steam generator in the presence of nitrogen was overestimated. As a further result of the analysis it could be shown, that the pressure dependence of the drift-flux model for the core is not well accounted for in ATHLET. For test BETHSY 4.1a, Phase 2 (two phase natural circulation in the primary system, low liquid level in the steam generator, reflux-condenser mode) an in-depth analysis was performed using the most recent version ot ATHLET, because discrepancies between measured and calculated data which occured in the later phase of an earlier calculation (project 1500962) had to be clarified. An important finding relates to the extremely 'sensitive behavior' of the calculation during two phase flow with respect to the modelling of slip flow and heat transfer

  11. Analysis on Application of Turbo Product Code in UAV TT&C System%Turbo乘积码在无人机测控技术中的应用分析

    Institute of Scientific and Technical Information of China (English)

    周侃; 金松坡

    2012-01-01

    Turbo乘积码是一种易于硬件实现的分组码,具有延时短和纠错性能好等优越性。通过对Turbo乘积码Chase软输出改进算法的分析和仿真,得出了不同码率和测试序列个数等参数对Turbo乘积码译码性能的影响。结合无人机常用的BPSK测控信号进行了仿真实验,对仿真结果进行了性能分析,验证了Turbo乘积码在无人机测控系统中应用的可行性,并给出了Turbo乘积码在无人机测控领域应用的建议参数。%Turbo product code,as a block code easy to be implemented in hardware,has the advantages of short delay and good error correction performance.By an analysis and simulation of the improved Chase soft-output algorithm for Turbo product code,the effects of parameters such as bit rate and number of test sequences on the performance of Turbo product code decoding are obtained.Simulation experiments are conducted with the BPSK signal typically used by UAV.The analysis of the simulation results verifies the feasibility of applying the Turbo product code in UAV TTC system.Parameters are also proposed for the application of Turbo product code in UAV TTC system.

  12. The Aster code

    International Nuclear Information System (INIS)

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  13. Physical Layer Network Coding

    CERN Document Server

    Shengli, Zhang; Lam, Patrick P K

    2007-01-01

    A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to straightforward network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM) waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increase...

  14. Error coding simulations

    Science.gov (United States)

    Noble, Viveca K.

    1993-01-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  15. Coded source neutron imaging

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; Santos-Villalobos, Hector J [ORNL

    2011-01-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100 m) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100um and 10um aperture hole diameters show resolutions matching the hole diameters.

  16. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes and...

  17. Phase-coded pulse aperiodic transmitter coding

    Directory of Open Access Journals (Sweden)

    I. I. Virtanen

    2009-07-01

    Full Text Available Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC, whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF. When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers – about seven milliseconds – whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  18. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi;

    2015-01-01

    The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered as...... waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access......, in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of...

  19. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  20. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  1. Decoding the productivity code

    DEFF Research Database (Denmark)

    Hansen, David

    , that is, the productivity code of the 21st century, is dissolved. Today, organizations are pressured for operational efficiency, often in terms of productivity, due to increased global competition, demographical changes, and use of natural resources. Taylor’s principles for rationalization founded...... that swing between rationalization and employee development. The productivity code is the lack of alternatives to this ineffective approach. This thesis decodes the productivity code based on the results from a 3-year action research study at a medium-sized manufacturing facility. During the project period....... The improvement system consists of five elements: The improvement process, participants, management, organization, and technology. The improvement system is not an organizational structure but rather a capability and readiness to organize the right improvement activities for a given challenge, i...

  2. A modular code supervisor

    International Nuclear Information System (INIS)

    Large industrial computer CEA codes in the field of scientific computing, mechanics, thermohydraulics, and neutronics, are decomposed in sets of separate modules. Each module performs a well-defined task and all information exchanged by the modules are contained in data structures, taken as input or given as output. The advantage of this structure is the great flexibility offered to experienced user to solve a large number of different problems, but to choose, order, monitor large sequences of modules and understand what each module requires as input and output is out of the interest of the common user. The aim is to conserve entirely this flexibility in dealing with knowledge relevant from scientific or technical fields and not from the code itself. The first part of this paper describes the three main steps of the software: specification phase, generating algorithm, translation in code command language. The second part describes how the authors obtain explanations from the modelization of operators and from a particular representation of the internal structure of the generated particular representation of the internal structure of the generated plan (triangular table) that lead to a generalization allowing synthesis of sequences of operators or the transformations of the total order of the generated plan in a partial one. The software is the first part of the modular codes supervisor. It was applied to CRONOS, neutronic reactor core code, which has the command language GIBIANE. It will be extended to the reactor calculations supervisor, SAGA, using the ensemble of the codes developed by CEA/DMT/SERMA

  3. Comparação do código de ética médica do Brasil e de 11 países Comparison of the code of medical ethics of Brazil with those of eleven countries

    Directory of Open Access Journals (Sweden)

    Jayme Augusto Rocha Vianna

    2006-12-01

    Full Text Available OBJETIVO: Comparar o Código de Ética Médica do Conselho Federal de Medicina do Brasil com códigos de diferentes países com o objetivo de melhorar a compreensão da sua estrutura, contribuindo para o cumprimento de seus objetivos. MÉTODOS: Foram estudados 11 países dos cinco continentes: Argentina, Chile, Canadá, Estados Unidos, Portugal, Reino Unido, África do Sul, Egito, China, Índia e Austrália. As informações foram obtidas na internet, pelo acesso a sites de agências reguladoras e associações médicas. Os códigos foram descritos e comparados segundo informações sobre sua organização elaboradora, abrangência espacial, obrigatoriedade, data de elaboração, organização das orientações, e documentos auxiliares. RESULTADOS: Os códigos de ética médica estudados eram: 59% elaborados pela agência reguladora da medicina de seu país, 92% com abrangência nacional, 67% obrigatórios para todos os médicos e 73% tiveram sua última reelaboração após o ano 2000. Foi observada relação entre a organização elaboradora e a obrigatoriedade e abrangência espacial dos códigos. Foi evidenciada a necessidade de atualização sistemática dos códigos, o que freqüentemente é realizado por meio de documentos auxiliares, entretanto, pode haver dificuldade de conhecimento desse conteúdo. Foi observada a possibilidade de organizar as orientações por tópicos, na forma de pequenos textos para cada tema. CONCLUSÃO: Este estudo apresentou sugestões quanto ao Código de Ética Médica do Brasil: realizar uma revisão e atualização do código; organizar suas orientações de modo a incluir explicações e justificativas; e separar as resoluções de caráter ético, melhorando sua divulgação.OBJECTIVE: Compare the Code of Medical Ethics of the Federal Council of Medicine of Brazil with codes from 11 different countries, with the purpose of improving the comprehension of their structure and contribute to the achievement of

  4. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  5. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  6. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well as...

  7. CONCEPT computer code

    International Nuclear Information System (INIS)

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  8. Aeroacoustic Prediction Codes

    Science.gov (United States)

    Gliebe, P; Mani, R.; Shin, H.; Mitchell, B.; Ashford, G.; Salamah, S.; Connell, S.; Huff, Dennis (Technical Monitor)

    2000-01-01

    This report describes work performed on Contract NAS3-27720AoI 13 as part of the NASA Advanced Subsonic Transport (AST) Noise Reduction Technology effort. Computer codes were developed to provide quantitative prediction, design, and analysis capability for several aircraft engine noise sources. The objective was to provide improved, physics-based tools for exploration of noise-reduction concepts and understanding of experimental results. Methods and codes focused on fan broadband and 'buzz saw' noise and on low-emissions combustor noise and compliment work done by other contractors under the NASA AST program to develop methods and codes for fan harmonic tone noise and jet noise. The methods and codes developed and reported herein employ a wide range of approaches, from the strictly empirical to the completely computational, with some being semiempirical analytical, and/or analytical/computational. Emphasis was on capturing the essential physics while still considering method or code utility as a practical design and analysis tool for everyday engineering use. Codes and prediction models were developed for: (1) an improved empirical correlation model for fan rotor exit flow mean and turbulence properties, for use in predicting broadband noise generated by rotor exit flow turbulence interaction with downstream stator vanes: (2) fan broadband noise models for rotor and stator/turbulence interaction sources including 3D effects, noncompact-source effects. directivity modeling, and extensions to the rotor supersonic tip-speed regime; (3) fan multiple-pure-tone in-duct sound pressure prediction methodology based on computational fluid dynamics (CFD) analysis; and (4) low-emissions combustor prediction methodology and computer code based on CFD and actuator disk theory. In addition. the relative importance of dipole and quadrupole source mechanisms was studied using direct CFD source computation for a simple cascadeigust interaction problem, and an empirical combustor

  9. Extended quantum color coding

    International Nuclear Information System (INIS)

    The quantum color coding scheme proposed by Korff and Kempe [e-print quant-ph/0405086] is easily extended so that the color coding quantum system is allowed to be entangled with an extra auxiliary quantum system. It is shown that in the extended scheme we need only ∼2√(N) quantum colors to order N objects in large N limit, whereas ∼N/e quantum colors are required in the original nonextended version. The maximum success probability has asymptotics expressed by the Tracy-Widom distribution of the largest eigenvalue of a random Gaussian unitary ensemble (GUE) matrix

  10. CPM: Masking code pointers to prevent code injection attacks

    OpenAIRE

    Philippaerts, Pieter; Younan, Yves; Muylle, Stijn; Piessens, Frank; Lachmund, Sven; Walter, Thomas

    2013-01-01

    Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. By enforcing the correct semantics of code pointers, CPM thwarts attacks that modify code pointers to divert the application’s control flow. It does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. This paper reports on two prototype implementations on very distinct processor architec...

  11. Z2Z4-linear codes: rank and kernel

    CERN Document Server

    Fernandez-Cordoba, Cristina; Villanueva, Merce

    2008-01-01

    A code C is Z2Z4-additive if the set of coordinates can be partitioned into two subsets X and Y such that the punctured code of C by deleting the coordinates outside X (respectively, Y) is a binary linear code (respectively, a quaternary linear code). In this paper, the rank and dimension of the kernel for Z2Z4-linear codes, which are the corresponding binary codes of Z2Z4-additive codes, are studied. The possible values of these two parameters for Z2Z4-linear codes, giving lower and upper bounds, are established. For each possible rank r between these bounds, the construction of a Z2Z4-linear code with rank r is given. Equivalently, for each possible dimension of the kernel k, the construction of a Z2Z4-linear code with dimension of the kernel k is given. Finally, the bounds on the rank, once the kernel dimension is fixed, are established and the construction of a Z2Z4-additive code for each possible pair (r,k) is given.

  12. New code match strategy for wideband code division multiple access code tree management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%.

  13. Higher-order CIS codes

    OpenAIRE

    Carlet, Claude; Freibert, Finley; Guilley, Sylvain; Kiermaier, Michael; Kim, Jon-Lark; Solé, Patrick

    2014-01-01

    We introduce {\\bf complementary information set codes} of higher-order. A binary linear code of length $tk$ and dimension $k$ is called a complementary information set code of order $t$ ($t$-CIS code for short) if it has $t$ pairwise disjoint information sets. The duals of such codes permit to reduce the cost of masking cryptographic algorithms against side-channel attacks. As in the case of codes for error correction, given the length and the dimension of a $t$-CIS code, we look for the high...

  14. Immature transformed rat islet beta-cells differentially express C-peptides derived from the genes coding for insulin I and II as well as a transfected human insulin gene

    DEFF Research Database (Denmark)

    Blume, N; Petersen, J S; Andersen, L C;

    1992-01-01

    Synthetic peptides representing unique sequences in rat proinsulin C-peptide I and II were used to generate highly specific antisera, which, when applied on sections of normal rat pancreas, confirm a homogeneous coexpression of the two C-peptides in all islet beta-cells. Insulin gene expression is...... insulin-producing cells showed highly differential expression at the cellular level of the three proinsulin C-peptide immunoreactivities, as follows: C-peptide I greater than human C-peptide greater than C-peptide II. The fractions of cells expressing human C-peptide and C-peptide II decreased in time and...... species of proinsulin-C-peptide immunoreactivity but still at high levels. However, rat C-peptide II and human C-peptide were often colocalized, even in later passages. In situ hybridization studies combined with the immunocytochemical data suggest that the differential expression occurs at the level of...

  15. Veronese subspace codes

    OpenAIRE

    Cossidente, Antonio; Pavese, Francesco

    2015-01-01

    Using the correspondence between quadrics of ${\\rm PG}(2,q)$ and points of ${\\rm PG}(5,q)$, a family of $(6,q^3(q^2-1)(q-1)/3+(q^2+1)(q^2+q+1),4;3)_q$ constant dimension subspace codes is constructed.

  16. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  17. ARC Code TI: Growler

    Data.gov (United States)

    National Aeronautics and Space Administration — Growler is a C++-based distributed object and event architecture. It is written in C++, and supports serialization of C++ objects as part of its Remote Method...

  18. Novel overlapping coding sequences in Chlamydia trachomatis

    DEFF Research Database (Denmark)

    Jensen, Klaus Thorleif; Petersen, Lise; Falk, Søren;

    2006-01-01

    Chlamydia trachomatis is the aetiological agent of trachoma and sexually transmitted infections. The C. trachomatis genome sequence revealed an organism adapted to the intracellular habitat with a high coding ratio and a small genome consisting of 1.042-kilobase (kb) with 895 annotated protein...

  19. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...

  20. Lossy Joint Source-Channel Coding Using Raptor Codes

    Directory of Open Access Journals (Sweden)

    H. V. Poor

    2008-09-01

    Full Text Available The straightforward application of Shannon's separation principle may entail a significant suboptimality in practical systems with limited coding delay and complexity. This is particularly evident when the lossy source code is based on entropy-coded quantization. In fact, it is well known that entropy coding is not robust to residual channel errors. In this paper, a joint source-channel coding scheme is advocated that combines the advantages and simplicity of entropy-coded quantization with the robustness of linear codes. The idea is to combine entropy coding and channel coding into a single linear encoding stage. If the channel is symmetric, the scheme can asymptotically achieve the optimal rate-distortion limit. However, its advantages are more clearly evident under finite coding delay and complexity. The sequence of quantization indices is decomposed into bitplanes, and each bitplane is independently mapped onto a sequence of channel coded symbols. The coding rate of each bitplane is chosen according to the bitplane conditional entropy rate. The use of systematic raptor encoders is proposed, in order to obtain a continuum of coding rates with a single basic encoding algorithm. Simulations show that the proposed scheme can outperform the separated baseline scheme for finite coding length and comparable complexity and, as expected, it is much more robust to channel errors in the case of channel capacity mismatch.

  1. The Particle Accelerator Simulation Code PyORBIT

    Energy Technology Data Exchange (ETDEWEB)

    Gorlov, Timofey V [ORNL; Holmes, Jeffrey A [ORNL; Cousineau, Sarah M [ORNL; Shishlo, Andrei P [ORNL

    2015-01-01

    The particle accelerator simulation code PyORBIT is presented. The structure, implementation, history, parallel and simulation capabilities, and future development of the code are discussed. The PyORBIT code is a new implementation and extension of algorithms of the original ORBIT code that was developed for the Spallation Neutron Source accelerator at the Oak Ridge National Laboratory. The PyORBIT code has a two level structure. The upper level uses the Python programming language to control the flow of intensive calculations performed by the lower level code implemented in the C++ language. The parallel capabilities are based on MPI communications. The PyORBIT is an open source code accessible to the public through the Google Open Source Projects Hosting service.

  2. Law of genome evolution direction: Coding information quantity grows

    Institute of Scientific and Technical Information of China (English)

    Liao-fu LUO

    2009-01-01

    The problem of the directionality of genome evolution is studied. Based on the analysis of C-value paradox and the evolution of genome size, we propose that the function-coding information quantity of a genome always grows in the course of evolution through sequence duplication, expansion of code,and gene transfer from outside. The function-coding information quantity of a genome consists of two parts, p-coding information quantity that encodes functional protein and n-coding information quantity that encodes other functional elements. The evidences on the law of the evolutionary directionality are indicated. The needs of function are the motive force for the expansion of coding information quantity,and the information quantity expansion is the way to make functional innovation and extension for a species. Therefore, the increase of coding information quantity of a genome is a measure of the acquired new function, and it determines the directionality of genome evolution.

  3. CALMAR: A New Versatile Code Library for Adjustment from Measurements

    Science.gov (United States)

    Grégoire, G.; Fausser, C.; Destouches, C.; Thiollay, N.

    2016-02-01

    CALMAR, a new library for adjustment has been developed. This code performs simultaneous shape and level adjustment of an initial prior spectrum from measured reactions rates of activation foils. It is written in C++ using the ROOT data analysis framework,with all linear algebra classes. STAYSL code has also been reimplemented in this library. Use of the code is very flexible : stand-alone, inside a C++ code, or driven by scripts. Validation and test cases are under progress. Theses cases will be included in the code package that will be available to the community. Future development are discussed. The code should support the new Generalized Nuclear Data (GND) format. This new format has many advantages compared to ENDF.

  4. Code source sans code: le cas de l'ENIAC.

    OpenAIRE

    De Mol, Liesbeth

    2016-01-01

    Doctoral Qu’est-ce qu’un programme ? Qu’est-ce qu’un code (source) ? Est-ce un « texte » susceptible d’une analyse littéraire ou plutôt quelque chose qui réside dans les circuit électroniques de l’ordinateur ? Est-ce un objet technique ou formel ? D’un certain point de vue, ces questions purement philosophiques ont peu à voir avec une réalité quelle qu’elle soit. Mais en informatique, ces questions sont au cœur de la discipline et les réponses qu’on leur donne déterminent des décisions qui...

  5. Automated Analysis of Source Code Patches using Machine Learning Algorithms

    OpenAIRE

    Castro Lechtaler, Antonio; Liporace, Julio César; Cipriano, Marcelo; García, Edith; Maiorano, Ariel; Malvacio, Eduardo; Tapia, Néstor

    2015-01-01

    An updated version of a tool for automated analysis of source code patches and branch differences is presented. The upgrade involves the use of machine learning techniques on source code, comments, and messages. It aims to help analysts, code reviewers, or auditors perform repetitive tasks continuously. The environment designed encourages collaborative work. It systematizes certain tasks pertaining to reviewing or auditing processes. Currently, the scope of the automated test is limited. C...

  6. Code Club: bringing programming to UK primary schools through Scratch

    OpenAIRE

    Smith, Neil; Sutcliffe, Clare; Sandvik, Linda

    2014-01-01

    Code Club is a network of after-school programming clubs for primary (US: elementary) schoolchildren, run by technically-competent volunteers in conjunction with (generally technically-unskilled) teachers. The main motivation of Code Club is to inspire children with a sense of fun and achievement for programming and digital creativity. This paper reports on the first year of Code Club in 1000 UK schools. The results were extremely positive, but some children had difficulty understanding the c...

  7. Development of an object oriented lattice QCD code "Bridge++"

    Science.gov (United States)

    Ueda, S.; Aoki, S.; Aoyama, T.; Kanaya, K.; Matsufuru, H.; Motoki, S.; Namekawa, Y.; Nemura, H.; Taniguchi, Y.; Ukita, N.

    2014-06-01

    We are developing a new lattice QCD code set "Bridge++" aiming at extensible, readable, and portable workbench for QCD simulations, while keeping a high performance at the same time. Bridge++ covers conventional lattice actions and numerical algorithms. The code set is constructed in C++ with an object oriented programming. In this paper we describe fundamental ingredients of the code and the current status of development.

  8. Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes

    CERN Document Server

    Senger, Christian; Bossert, Martin; Zyablov, Victor

    2008-01-01

    Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one...

  9. CTI Correction Code

    Science.gov (United States)

    Massey, Richard; Stoughton, Chris; Leauthaud, Alexie; Rhodes, Jason; Koekemoer, Anton; Ellis, Richard; Shaghoulian, Edgar

    2013-07-01

    Charge Transfer Inefficiency (CTI) due to radiation damage above the Earth's atmosphere creates spurious trailing in images from Charge-Coupled Device (CCD) imaging detectors. Radiation damage also creates unrelated warm pixels, which can be used to measure CTI. This code provides pixel-based correction for CTI and has proven effective in Hubble Space Telescope Advanced Camera for Surveys raw images, successfully reducing the CTI trails by a factor of ~30 everywhere in the CCD and at all flux levels. The core is written in java for speed, and a front-end user interface is provided in IDL. The code operates on raw data by returning individual electrons to pixels from which they were unintentionally dragged during readout. Correction takes about 25 minutes per ACS exposure, but is trivially parallelisable to multiple processors.

  10. Sinusoidal transform coding

    Science.gov (United States)

    Mcaulay, Robert J.; Quatieri, Thomas F.

    1988-01-01

    It has been shown that an analysis/synthesis system based on a sinusoidal representation of speech leads to synthetic speech that is essentially perceptually indistinguishable from the original. Strategies for coding the amplitudes, frequencies and phases of the sine waves have been developed that have led to a multirate coder operating at rates from 2400 to 9600 bps. The encoded speech is highly intelligible at all rates with a uniformly improving quality as the data rate is increased. A real-time fixed-point implementation has been developed using two ADSP2100 DSP chips. The methods used for coding and quantizing the sine-wave parameters for operation at the various frame rates are described.

  11. 48 CFR 9.108-2 - Relationship with the Internal Revenue Code and Treasury regulations.

    Science.gov (United States)

    2010-10-01

    ... Internal Revenue Code and Treasury regulations. 9.108-2 Section 9.108-2 Federal Acquisition Regulations... Prospective Contractors 9.108-2 Relationship with the Internal Revenue Code and Treasury regulations. (a....C. 395, but also are similarly covered in the Internal Revenue Code at 26 U.S.C. 7874. A...

  12. The Liege Oscillation Code

    CERN Document Server

    Scuflaire, R; Théado, S; Bourge, P -O; Miglio, A; Godart, M; Thoul, A; Noels, A

    2007-01-01

    The Liege Oscillation code can be used as a stand-alone program or as a library of subroutines that the user calls from a Fortran main program of his own to compute radial and non-radial adiabatic oscillations of stellar models. We describe the variables and the equations used by the program and the methods used to solve them. A brief account is given of the use and the output of the program.

  13. Code of Practice

    International Nuclear Information System (INIS)

    This Code of Practice introduces accepted safety procedures associated with the use of alpha, beta, gamma and X-radiation in secondary schools (pupils aged 12 to 18) in Ireland, and summarises good practice and procedures as they apply to radiation protection. Typical dose rates at various distances from sealed sources are quoted, and simplified equations are used to demonstrate dose and shielding calculations. The regulatory aspects of radiation protection are outlined, and references to statutory documents are given

  14. Computer code FIT

    International Nuclear Information System (INIS)

    This is a description of the computer code FIT, written in FORTRAN-77 for a PDP 11/34. FIT is an interactive program to decude position, width and intensity of lines of X-ray spectra (max. length of 4K channels). The lines (max. 30 lines per fit) may have Gauss- or Voigt-profile, as well as exponential tails. Spectrum and fit can be displayed on a Tektronix terminal. (orig.)

  15. Dynamic Frameproof Codes

    OpenAIRE

    Paterson, Maura

    2006-01-01

    There are many schemes in the literature for protecting digital data from piracy by the use of digital fingerprinting, such as frameproof codes, which prevent traitorous users from colluding to frame an innocent user, and traitor-tracing schemes, which enable the identification of users involved in piracy. The concept of traitor tracing has been applied to a digital broadcast setting in the form of dynamic traitor-tracing schemes and sequential traitor-tracing schemes, wh...

  16. Efficient Block Truncation Coding

    Directory of Open Access Journals (Sweden)

    K.Somasundaram,

    2010-09-01

    Full Text Available Block Truncation Coding (BTC is one of the lossy image compression techniques. The computational complexity involved in this method is very simple. In the proposed method, the feature of inter-pixel correlation is exploited to further reduce the requirement of bits to store a block. The proposed method gives very good performance in terms of bit-rate and PSNR values when compared to the conventional BTC.

  17. Tokamak simulation code manual

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs.

  18. Tokamak simulation code manual

    International Nuclear Information System (INIS)

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs

  19. Romanian seismic design code: benchmarking analyses with reference to international codes and research needs for future development

    OpenAIRE

    Iolanda-Gabriela CRAIFALEANU

    2011-01-01

    The paper presents conclusions from a technical benchmarking study, performed in order to analyze the performance of the provisions concerning seismic design of reinforced concrete frame structures, as specified by the Romanian seismic code (P100-1/2006). The Romanian code is analyzed with respect to the European standard EN 1998-1:2004, including its National Annex, and with the U. S. codes IBC 2009 and ACI 318 08. The benchmarking analyses were performed by designing a standard reinforced c...

  20. The AQUAREJ2.3 computer code

    International Nuclear Information System (INIS)

    The Institute of Protection and Nuclear Safety (I.P.S.N.) in the frame of dosimetric impact estimation of releases from nuclear facilities in usual operation, evaluates the contamination transfer by the continental aquatic medium, then by the food chain up to man. To do it, I.P.S.N. has the AQUAREJ 2.3 computer code for the evaluation of dosimetric consequences of liquid radioactive effluents releases in the rivers. A comparison is made with the PC-CREAM computer code. (N.C.)

  1. Shadowfax: Moving mesh hydrodynamical integration code

    Science.gov (United States)

    Vandenbroucke, Bert

    2016-05-01

    Shadowfax simulates galaxy evolution. Written in object-oriented modular C++, it evolves a mixture of gas, subject to the laws of hydrodynamics and gravity, and any collisionless fluid only subject to gravity, such as cold dark matter or stars. For the hydrodynamical integration, it makes use of a (co-) moving Lagrangian mesh. The code has a 2D and 3D version, contains utility programs to generate initial conditions and visualize simulation snapshots, and its input/output is compatible with a number of other simulation codes, e.g. Gadget2 (ascl:0003.001) and GIZMO (ascl:1410.003).

  2. Orthopedics coding and funding.

    Science.gov (United States)

    Baron, S; Duclos, C; Thoreux, P

    2014-02-01

    The French tarification à l'activité (T2A) prospective payment system is a financial system in which a health-care institution's resources are based on performed activity. Activity is described via the PMSI medical information system (programme de médicalisation du système d'information). The PMSI classifies hospital cases by clinical and economic categories known as diagnosis-related groups (DRG), each with an associated price tag. Coding a hospital case involves giving as realistic a description as possible so as to categorize it in the right DRG and thus ensure appropriate payment. For this, it is essential to understand what determines the pricing of inpatient stay: namely, the code for the surgical procedure, the patient's principal diagnosis (reason for admission), codes for comorbidities (everything that adds to management burden), and the management of the length of inpatient stay. The PMSI is used to analyze the institution's activity and dynamism: change on previous year, relation to target, and comparison with competing institutions based on indicators such as the mean length of stay performance indicator (MLS PI). The T2A system improves overall care efficiency. Quality of care, however, is not presently taken account of in the payment made to the institution, as there are no indicators for this; work needs to be done on this topic. PMID:24461230

  3. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  4. OACoder: Postcode Coding Tool

    Directory of Open Access Journals (Sweden)

    Muhammad Adnan

    2013-10-01

    Full Text Available Geodemographic classifications are small area classifications of social, economic and demographic characteristics. The Output Area Classification (OAC is a free geodemographic classification. It is an Office of National Statistics validated measure that summarises neighbourhood conditions at the Output Area Level across the United Kingdom. Linkage of these valuable statistics has been problematic for users more used to address records that are georeferenced using unit postcodes. OACoder resolves this problem by allowing users to link corresponding OAC codes to each of the postcode addresses. OACoder is an open source software, and it is developed and tested to work on different versions of windows operating systems.  It is stored in Figshare. The source code of the OACoder is stored in SourceForge. As open source software, OACoder has reuse potential across a range of applications. The functionality of OACoder can be extended to work with the new version of OAC (2011 OAC. It is also possible to reuse the source code and extend the functionality to work on different operating systems other than Windows. Different components of the software can be reused for the purpose of reading/writing CSV files and handling large data sets.

  5. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  6. DIANE multiparticle transport code

    International Nuclear Information System (INIS)

    DIANE is a three-dimensional multigroup Monte Carlo code that performs coupled neutron-photon-electron and light charged particle Monte Carlo transport on a fixed geometry and/or an imploding material (for example an Inertial-Confinement- Fusion plasma target). DIANE's multigroup data are provided by the nuclear data code ZADIG. ZADIG groups cross sections from international data libraries in ENDF7 format. In order to better account for resonances, a specific multigroup treatment, called 'mini-group' has been implemented. For photons, photo-atomic interactions are considered as well as photonuclear reactions. Coherent scattering may include anomalous scattering factors. Incoherent scattering include scattering function from EPDL97. We also account for fluorescence X-rays and Auger electrons. For neutrons, all the reaction channels relevant are processed by ZADIG. The ZADIG code integrates the Secondary Source Bremsstrahlung (SSB) model that simulates electron-photon cascade from electron slowing down. For light ions, DIANE solves the Boltzmann-Fokker-Planck equation. The continuous effect of Coulomb interaction with the background plasma can be treated by three Fokker- Planck terms (slowing-down, energy straggling and angular deflection). The effect of electric and magnetic fields through the Lorentz force can also be taken into account

  7. Quality Improvement of MARS Code and Establishment of Code Coupling

    International Nuclear Information System (INIS)

    The improvement of MARS code quality and coupling with regulatory auditing code have been accomplished for the establishment of self-reliable technology based regulatory auditing system. The unified auditing system code was realized also by implementing the CANDU specific models and correlations. As a part of the quality assurance activities, the various QA reports were published through the code assessments. The code manuals were updated and published a new manual which describe the new models and correlations. The code coupling methods were verified though the exercise of plant application. The education-training seminar and technology transfer were performed for the code users. The developed MARS-KS is utilized as reliable auditing tool for the resolving the safety issue and other regulatory calculations. The code can be utilized as a base technology for GEN IV reactor applications

  8. Structural coding versus free-energy predictive coding.

    Science.gov (United States)

    van der Helm, Peter A

    2016-06-01

    Focusing on visual perceptual organization, this article contrasts the free-energy (FE) version of predictive coding (a recent Bayesian approach) to structural coding (a long-standing representational approach). Both use free-energy minimization as metaphor for processing in the brain, but their formal elaborations of this metaphor are fundamentally different. FE predictive coding formalizes it by minimization of prediction errors, whereas structural coding formalizes it by minimization of the descriptive complexity of predictions. Here, both sides are evaluated. A conclusion regarding competence is that FE predictive coding uses a powerful modeling technique, but that structural coding has more explanatory power. A conclusion regarding performance is that FE predictive coding-though more detailed in its account of neurophysiological data-provides a less compelling cognitive architecture than that of structural coding, which, for instance, supplies formal support for the computationally powerful role it attributes to neuronal synchronization. PMID:26407895

  9. Analysis of the optimality of the standard genetic code.

    Science.gov (United States)

    Kumar, Balaji; Saini, Supreet

    2016-07-19

    Many theories have been proposed attempting to explain the origin of the genetic code. While strong reasons remain to believe that the genetic code evolved as a frozen accident, at least for the first few amino acids, other theories remain viable. In this work, we test the optimality of the standard genetic code against approximately 17 million genetic codes, and locate 29 which outperform the standard genetic code at the following three criteria: (a) robustness to point mutation; (b) robustness to frameshift mutation; and (c) ability to encode additional information in the coding region. We use a genetic algorithm to generate and score codes from different parts of the associated landscape, which are, as a result, presumably more representative of the entire landscape. Our results show that while the genetic code is sub-optimal for robustness to frameshift mutation and the ability to encode additional information in the coding region, it is very strongly selected for robustness to point mutation. This coupled with the observation that the different performance indicator scores for a particular genetic code are negatively correlated makes the standard genetic code nearly optimal for the three criteria tested in this work. PMID:27327359

  10. Coding Opportunity Densification Strategies for Instantly Decodable Network Coding

    OpenAIRE

    Sorour, Sameh; Valaee, Shahrokh

    2012-01-01

    In this paper, we aim to identify the strategies that can maximize and monotonically increase the density of the coding opportunities in instantly decodable network coding (IDNC).Using the well-known graph representation of IDNC, first derive an expression for the exact evolution of the edge set size after the transmission of any arbitrary coded packet. From the derived expressions, we show that sending commonly wanted packets for all the receivers can maximize the number of coding opportunit...

  11. TASS code topical report. V.1 TASS code technical manual

    International Nuclear Information System (INIS)

    TASS 1.0 code has been developed at KAERI for the initial and reload non-LOCA safety analysis for the operating PWRs as well as the PWRs under construction in Korea. TASS code will replace various vendor's non-LOCA safety analysis codes currently used for the Westinghouse and ABB-CE type PWRs in Korea. This can be achieved through TASS code input modifications specific to each reactor type. The TASS code can be run interactively through the keyboard operation. A simimodular configuration used in developing the TASS code enables the user easily implement new models. TASS code has been programmed using FORTRAN77 which makes it easy to install and port for different computer environments. The TASS code can be utilized for the steady state simulation as well as the non-LOCA transient simulations such as power excursions, reactor coolant pump trips, load rejections, loss of feedwater, steam line breaks, steam generator tube ruptures, rod withdrawal and drop, and anticipated transients without scram (ATWS). The malfunctions of the control systems, components, operator actions and the transients caused by the malfunctions can be easily simulated using the TASS code. This technical report describes the TASS 1.0 code models including reactor thermal hydraulic, reactor core and control models. This TASS code models including reactor thermal hydraulic, reactor core and control models. This TASS code technical manual has been prepared as a part of the TASS code manual which includes TASS code user's manual and TASS code validation report, and will be submitted to the regulatory body as a TASS code topical report for a licensing non-LOCA safety analysis for the Westinghouse and ABB-CE type PWRs operating and under construction in Korea. (author). 42 refs., 29 tabs., 32 figs

  12. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  13. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  14. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  15. Evaluation of the efficiency and fault density of software generated by code generators

    Science.gov (United States)

    Schreur, Barbara

    1993-01-01

    Flight computers and flight software are used for GN&C (guidance, navigation, and control), engine controllers, and avionics during missions. The software development requires the generation of a considerable amount of code. The engineers who generate the code make mistakes and the generation of a large body of code with high reliability requires considerable time. Computer-aided software engineering (CASE) tools are available which generates code automatically with inputs through graphical interfaces. These tools are referred to as code generators. In theory, code generators could write highly reliable code quickly and inexpensively. The various code generators offer different levels of reliability checking. Some check only the finished product while some allow checking of individual modules and combined sets of modules as well. Considering NASA's requirement for reliability, an in house manually generated code is needed. Furthermore, automatically generated code is reputed to be as efficient as the best manually generated code when executed. In house verification is warranted.

  16. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli. PMID:23724797

  17. A Theoretical Model of Code of Ethics Conceptualized From Companies’ Public Disclosures on Ethics

    OpenAIRE

    Elena Roxana Anghel-Ilcu

    2014-01-01

    Codes of ethics encompass companies’ vision on business conduct and ethics in relation with its stakeholders. Presenting a code of ethics is rather a voluntarily process, therefore a large amount of heterogeneity is found among such codes. A general model of code of ethics would be a necessarily instrument because it would deliver some starting guidance for companies willing to present an ethical code of their own. Therefore, this paper aims to conceptualize a general and synthetic model of c...

  18. Development of Tritium Permeation Analysis Code (TPAC)

    Energy Technology Data Exchange (ETDEWEB)

    Eung S. Kim; Chang H. Oh; Mike Patterson

    2010-10-01

    Idaho National Laboratory developed the Tritium Permeation Analysis Code (TPAC) for tritium permeation in the Very High Temperature Gas Cooled Reactor (VHTR). All the component models in the VHTR were developed and were embedded into the MATHLAB SIMULINK package with a Graphic User Interface. The governing equations of the nuclear ternary reaction and thermal neutron capture reactions from impurities in helium and graphite core, reflector, and control rods were implemented. The TPAC code was verified using analytical solutions for the tritium birth rate from the ternary fission, the birth rate from 3He, and the birth rate from 10B. This paper also provides comparisons of the TPAC with the existing other codes. A VHTR reference design was selected for tritium permeation study from the reference design to the nuclear-assisted hydrogen production plant and some sensitivity study results are presented based on the HTGR outlet temperature of 750 degrees C.

  19. Emerging Views on the CTD Code

    Science.gov (United States)

    Zhang, David W.; Rodríguez-Molina, Juan B.; Tietjen, Joshua R.; Nemec, Corey M.; Ansari, Aseem Z.

    2012-01-01

    The C-terminal domain (CTD) of RNA polymerase II (Pol II) consists of conserved heptapeptide repeats that function as a binding platform for different protein complexes involved in transcription, RNA processing, export, and chromatin remodeling. The CTD repeats are subject to sequential waves of posttranslational modifications during specific stages of the transcription cycle. These patterned modifications have led to the postulation of the “CTD code” hypothesis, where stage-specific patterns define a spatiotemporal code that is recognized by the appropriate interacting partners. Here, we highlight the role of CTD modifications in directing transcription initiation, elongation, and termination. We examine the major readers, writers, and erasers of the CTD code and examine the relevance of describing patterns of posttranslational modifications as a “code.” Finally, we discuss major questions regarding the function of the newly discovered CTD modifications and the fundamental insights into transcription regulation that will necessarily emerge upon addressing those challenges. PMID:22567385

  20. Emerging Views on the CTD Code

    Directory of Open Access Journals (Sweden)

    David W. Zhang

    2012-01-01

    Full Text Available The C-terminal domain (CTD of RNA polymerase II (Pol II consists of conserved heptapeptide repeats that function as a binding platform for different protein complexes involved in transcription, RNA processing, export, and chromatin remodeling. The CTD repeats are subject to sequential waves of posttranslational modifications during specific stages of the transcription cycle. These patterned modifications have led to the postulation of the “CTD code” hypothesis, where stage-specific patterns define a spatiotemporal code that is recognized by the appropriate interacting partners. Here, we highlight the role of CTD modifications in directing transcription initiation, elongation, and termination. We examine the major readers, writers, and erasers of the CTD code and examine the relevance of describing patterns of posttranslational modifications as a “code.” Finally, we discuss major questions regarding the function of the newly discovered CTD modifications and the fundamental insights into transcription regulation that will necessarily emerge upon addressing those challenges.

  1. High Energy Transport Code HETC

    International Nuclear Information System (INIS)

    The physics contained in the High Energy Transport Code (HETC), in particular the collision models, are discussed. An application using HETC as part of the CALOR code system is also given. 19 refs., 5 figs., 3 tabs

  2. Improvements in the BCG code

    International Nuclear Information System (INIS)

    Some improvements introduced in the BCG code with the objective of making the code faster in execution are reported. The impact of these improvements in terms of CPU time saving is discussed for a sample problem. (author)

  3. The Tap code - a code similar to Morse code for communication by tapping

    OpenAIRE

    Rafler, Stephan

    2013-01-01

    A code is presented for fast, easy and efficient communication over channels that allow only two signal types: a single sound (e.g. a knock), or no sound (i.e. silence). This is a true binary code while Morse code is a ternary code and does not work in such situations. Thus the presented code is more universal than Morse and can be used in much more situations. Additionally it is very tolerant to variations in signal strength or duration. The paper contains various ways in which the code can ...

  4. The Source Term Code Package

    International Nuclear Information System (INIS)

    The Source Term Code Package (STCP) is a set of computer codes which allows analyses of nuclear reactor accidents to produce predictions of fission product release to the environment as a function of reactor design and specifications for the assumed accident. The codes are basically those used in the analyses performed for the BMI-2104 report but they have been combined, improved and streamlined for easier use. The objective in preparing this code package was to make the calculations more direct, traceable and user-independent, with documentation for release to the public. It is important to note that the STCP is not intended to be a research tool but a code for general use in making source term predictions that has a sound and definable basis and produces reasonably accurate results in comparison with more detailed codes. The STCP has four major elements. The overall thermal-hydraulics is provided by the MARCH-3 code which combines the previously separate codes MARCH2, CORCON Mod 2 and CORSORM. Release of fission products and aerosols during core/concrete interactions is predicted with the VANESA code. Detailed thermal-hydraulics and fission product transport in the reactor coolant system are provided by the TRAPMELT3 code formed by combining the previously separate TRAPMELT and MERGE codes. Finally, fission product transport in the containment is predicted by the NAUA-4 code as modified to include fission product removal by pressure suppression pools (SPARC code) and within ice compartments (ICEDF code). The fission product and aerosol groups being tracked in the code package are noble gases, iodine, caesium, tellurium, barium, strontium, ruthenium, lanthanum and cerium groups. Additionally, in-vessel-produced aerosols and ex-vessel-produced aerosols are tracked. The code package produces time-dependent locational distributions, physical forms and transport rates for these groups throughout the course of the accident. (author)

  5. Cross-Domain Sparse Coding

    OpenAIRE

    Wang, Jim Jing-Yan

    2013-01-01

    Sparse coding has shown its power as an effective data representation method. However, up to now, all the sparse coding approaches are limited within the single domain learning problem. In this paper, we extend the sparse coding to cross domain learning problem, which tries to learn from a source domain to a target domain with significant different distribution. We impose the Maximum Mean Discrepancy (MMD) criterion to reduce the cross-domain distribution difference of sparse codes, and also ...

  6. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  7. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  8. Getting Kodo: Network Coding for the ns-3 simulator

    DEFF Research Database (Denmark)

    Hernandez, Nestor; Pedersen, Morten Videbæk; Vingelmann, Peter;

    2016-01-01

    Network Coding (NC) has been shown to improve current and upcoming communication systems in terms of throughput, energy consumption and delay reduction. However, today's evaluations on network coding solutions rely on homegrown simulators that might not accurately model realistic systems. In this...... work, we present for the first time the steps to use Kodo, a C++11 network coding library into the ns-3 simulator and show its potential with basic examples. Our purpose is to allow ns-3 users to use a flexible and reliable set of network coding functionalities together with the technologies simulated...

  9. Ethical Codes in the Professions.

    Science.gov (United States)

    Schmeiser, Cynthia B.

    1992-01-01

    Whether the measurement profession should consider developing and adopting a code of professional conduct is explored after a brief review of existing references to standards of conduct and a review of other professional codes. Issues include the need for a code of ethics, its usefulness, and its enforcement. (SLD)

  10. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...... machinery of algebraic geometry....

  11. Fresnel zone plate coded imaging

    International Nuclear Information System (INIS)

    The author introduced the principle of the Fresnel-zone-plate coded imaging, and design a Fresnel zone plate coded image camera with high spatial resolution. A experimental simulation with two-aperture visible light source is made. The result shows that this coded image camera can reveal the source distribution truly

  12. Distributed Video Coding: Iterative Improvements

    DEFF Research Database (Denmark)

    Luong, Huynh Van

    Nowadays, emerging applications such as wireless visual sensor networks and wireless video surveillance are requiring lightweight video encoding with high coding efficiency and error-resilience. Distributed Video Coding (DVC) is a new coding paradigm which exploits the source statistics at the...

  13. Geochemical computer codes. A review

    International Nuclear Information System (INIS)

    In this report a review of available codes is performed and some code intercomparisons are also discussed. The number of codes treating natural waters (groundwater, lake water, sea water) is large. Most geochemical computer codes treat equilibrium conditions, although some codes with kinetic capability are available. A geochemical equilibrium model consists of a computer code, solving a set of equations by some numerical method and a data base, consisting of thermodynamic data required for the calculations. There are some codes which treat coupled geochemical and transport modeling. Some of these codes solve the equilibrium and transport equations simultaneously while other solve the equations separately from each other. The coupled codes require a large computer capacity and have thus as yet limited use. Three code intercomparisons have been found in literature. It may be concluded that there are many codes available for geochemical calculations but most of them require a user that us quite familiar with the code. The user also has to know the geochemical system in order to judge the reliability of the results. A high quality data base is necessary to obtain a reliable result. The best results may be expected for the major species of natural waters. For more complicated problems, including trace elements, precipitation/dissolution, adsorption, etc., the results seem to be less reliable. (With 44 refs.) (author)

  14. Direct construction of code loops

    OpenAIRE

    Nagy, Gabor P.

    2004-01-01

    Code loops were introduced by R. L. Griess. R.L. Griess and T. Hsu gave methods to construct the corresponding code loop from any given doubly even binary code; both these methods used some kind of induction. In this paper, we present a global construction of the loop, where we apply the correspondance between the concepts of Moufang loops and groups with triality.

  15. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  16. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...... the impact of interference from other transmissions. Unlike these conventional studies, in this paper, we apply PLNC to a large-scale cellular network in the presence of intercell interference (ICI). In cellular networks, a terminal and a Base Station (BS) have different transmission power, which causes...

  17. TWEED Code Book

    OpenAIRE

    Engene, Jan Oskar

    2006-01-01

    The TWEED data set contains information on more than 11.000 events related to internal (or domestic) terrorism in 18 West European countries for the 1950 through 2004 period. The code book describes the structure of the data set, the countries covered, and the variables included and functions as a user’s guide to the data set. The data set is available at: http://www.uib.no/people/sspje/tweed.htm The data set Terrorism in Western Europe: Events Data, TWEED, contains information on events r...

  18. ON CLASSICAL BCH CODES AND QUANTUM BCH CODES

    Institute of Scientific and Technical Information of China (English)

    Xu Yajie; Ma Zhi; Zhang Chunyuan

    2009-01-01

    It is a regular way of constructing quantum error-correcting codes via codes with self-orthogonal property, and whether a classical Bose-Chaudhuri-Hocquenghem (BCH) code is self-orthogonal can be determined by its designed distance. In this paper, we give the sufficient and necessary condition for arbitrary classical BCH codes with self-orthogonal property through algorithms. We also give a better upper bound of the designed distance of a classical narrow-sense BCH code which contains its Euclidean dual. Besides these, we also give one algorithm to compute the dimension of these codes. The complexity of all algorithms is analyzed. Then the results can be applied to construct a series of quantum BCH codes via the famous CSS constructions.

  19. Validación de los códigos diagnósticos de cáncer de colon y recto del Conjunto Mínimo Básico de Datos Validation of colorectal cancer diagnostic codes in a hospital administration data set

    Directory of Open Access Journals (Sweden)

    Mirari Márquez Cid

    2006-08-01

    Full Text Available Objetivo: Validar la capacidad del Conjunto Mínimo Básico de Datos (CMBD para detectar casos incidentes de cáncer de colon y recto utilizando como estándar de referencia el Registro de Cáncer de Murcia (RCM y medir la concordancia entre el CMBD y el registro de cáncer en tumores colorrectales. Material y método: Estudio de validación transversal del CMBD del Hospital Virgen de la Arrixaca de Murcia. La población de estudio son los casos incidentes de colon-recto del año 2000 del RCM y los casos del CMBD en el citado hospital para el mismo año con algún código diagnóstico CIE-9 entre 153.0 y 154.1 eliminando reingresos. Durante el proceso se van a realizar 2 análisis: sólo con el diagnóstico principal y con todos los diagnósticos. Se calcula la sensibilidad, la especificidad, el valor predictivo positivo (VPP y negativo (VPN y la concordancia con sus intervalos de confianza (IC del 95%. Resultados: Con sólo el primer diagnóstico, el CMBD detecta el 80% de los casos incidentes de cáncer colorrectal con un VPP del 75%; considerando todos los diagnósticos, detecta el 85% con un VPP del 64%. La concordancia en la codificación es elevada tanto con 3 dígitos (índice kappa del 88% (IC del 95%, 0,79-0,97 en primer diagnóstico, y del 89% (IC del 95%, 0,80-0,97 en todos los diagnósticos como de 4 dígitos (índice kappa del 77% (IC del 95%, 0,68-0,85 en el primer diagnóstico, y del 78% (IC del 95%, 0,70-0,86 en todos diagnósticos en ambos análisis. Conclusiones: El CMBD es una buena fuente para detectar casos incidentes de cáncer al presentar una elevada sensibilidad. La alta concordancia encontrada en las localizaciones tumorales de colon-recto contribuye a consolidar el CMBD como fuente de datos para los registros de cáncer.Objectives: To validate the ability of a hospital administration data set (minimum data set [MDS] to detect incident cases of colorectal cancer using the Murcia Cancer Registry (MCR as the gold standard

  20. Calculation codes in radiation protection, radiation physics and dosimetry

    International Nuclear Information System (INIS)

    These scientific days had for objective to draw up the situation of calculation codes of radiation transport, of sources estimation, of radiation doses managements and to draw the future perspectives. (N.C.)

  1. Codon Distribution in Error-Detecting Circular Codes

    Directory of Open Access Journals (Sweden)

    Elena Fimmel

    2016-03-01

    Full Text Available In 1957, Francis Crick et al. suggested an ingenious explanation for the process of frame maintenance. The idea was based on the notion of comma-free codes. Although Crick’s hypothesis proved to be wrong, in 1996, Arquès and Michel discovered the existence of a weaker version of such codes in eukaryote and prokaryote genomes, namely the so-called circular codes. Since then, circular code theory has invariably evoked great interest and made significant progress. In this article, the codon distributions in maximal comma-free, maximal self-complementary C3 and maximal self-complementary circular codes are discussed, i.e., we investigate in how many of such codes a given codon participates. As the main (and surprising result, it is shown that the codons can be separated into very few classes (three, or five, or six with respect to their frequency. Moreover, the distribution classes can be hierarchically ordered as refinements from maximal comma-free codes via maximal self-complementary C3 codes to maximal self-complementary circular codes.

  2. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  3. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  4. The MCNPX Monte Carlo Radiation Transport Code

    International Nuclear Information System (INIS)

    MCNPX (Monte Carlo N-Particle eXtended) is a general-purpose Monte Carlo radiation transport code with three-dimensional geometry and continuous-energy transport of 34 particles and light ions. It contains flexible source and tally options, interactive graphics, and support for both sequential and multi-processing computer platforms. MCNPX is based on MCNP4c and has been upgraded to most MCNP5 capabilities. MCNP is a highly stable code tracking neutrons, photons and electrons, and using evaluated nuclear data libraries for low-energy interaction probabilities. MCNPX has extended this base to a comprehensive set of particles and light ions, with heavy ion transport in development. Models have been included to calculate interaction probabilities when libraries are not available. Recent additions focus on the time evolution of residual nuclei decay, allowing calculation of transmutation and delayed particle emission. MCNPX is now a code of great dynamic range, and the excellent neutronics capabilities allow new opportunities to simulate devices of interest to experimental particle physics, particularly calorimetry. This paper describes the capabilities of the current MCNPX version 2.6.C, and also discusses ongoing code development

  5. Survey of source term codes

    International Nuclear Information System (INIS)

    The type, scope and role of current source term codes is reviewed. Issues and problems that are generic to most or all such codes are identified. These include numerical problems, fundamental physical and chemical databases, uncertainties in fuel degradation and thermal-hydraulics calculations, how to benchmark systems application codes against mechanistic codes and weaknesses in phenomenological modelling. It is concluded that further code development to address these issues is justified. This should be tightly coupled to experimental work within an internationally agreed framework. (Author)

  6. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  7. Three Paradigms for Mixing Coding and Games: Coding in a Game, Coding as a Game, and Coding for a Game

    OpenAIRE

    Foster, Stephen

    2015-01-01

    Games for teaching coding have been an educational holy grail since at least the early 1980s. Yet for decades, with games more popular than ever and with the need to teach kids coding having been well-recognized, no blockbuster coding games have arisen (see Chapter 2). Over the years, the research community has made various games for teaching computer science: a survey made by shows that most do not teach coding, and of the ones that do teach coding, most are research prototypes (not produc...

  8. On constructing disjoint linear codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Weiguo; CAI Mian; XIAO Guozhen

    2007-01-01

    To produce a highly nonlinear resilient function,the disjoint linear codes were originally proposed by Johansson and Pasalic in IEEE Trans.Inform.Theory,2003,49(2):494-501.In this paper,an effective method for finding a set of such disjoint linear codes is presented.When n≥2k,we can find a set of[n,k] disjoint linear codes with joint linear codes exists with cardinality at least 2.We also describe a result on constructing a set of [n,k] disjoint linear codes with minimum distance at least some fixed positive integer.

  9. On network coding for acyclic networks with delays

    CERN Document Server

    Prasad, K

    2011-01-01

    Problems related to network coding for acyclic, instantaneous networks (where the edges of the acyclic graph representing the network are assumed to have zero-delay) have been extensively dealt with in the recent past. The most prominent of these problems include (a) the existence of network codes that achieve maximum rate of transmission, (b) efficient network code constructions, and (c) field size issues. In practice, however, networks have transmission delays. In network coding theory, such networks with transmission delays are generally abstracted by assuming that their edges have integer delays. Note that using enough memory at the nodes of an acyclic network with integer delays can effectively simulate instantaneous behavior, which is probably why only acyclic instantaneous networks have been primarily focused on thus far. In this work, we elaborate on issues ((a), (b) and (c) above) related to network coding for acyclic networks with integer delays, which have till now been overlooked. We show that the...

  10. Calculation codes in radiation protection, radiation physics and dosimetry; Codes de calcul en radioprotection, radiophysique et dosimetrie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    These scientific days had for objective to draw up the situation of calculation codes of radiation transport, of sources estimation, of radiation doses managements and to draw the future perspectives. (N.C.)

  11. Introduction of SCIENCE code package

    International Nuclear Information System (INIS)

    The SCIENCE code package is a set of neutronics tools based on 2D assembly calculations and 3D core calculations. It is made up of APOLLO2F, SMART and SQUALE and used to perform the nuclear design and loading pattern analysis for the reactors on operation or under construction of China Guangdong Nuclear Power Group. The purpose of paper is to briefly present the physical and numerical models used in each computation codes of the SCIENCE code pack age, including the description of the general structure of the code package, the coupling relationship of APOLLO2-F transport lattice code and SMART core nodal code, and the SQUALE code used for processing the core maps. (authors)

  12. dc-free coset codes

    Science.gov (United States)

    Deng, Robert H.; Herro, Mark A.

    1988-01-01

    A class of block coset codes with disparity and run-length constraints are studied. They are particularly well suited for high-speed optical fiber links and similar channels, where dc-free pulse formats, channel error control, and low-complexity encoder-decoder implementations are required. The codes are derived by partitioning linear block codes. The encoder and decoder structures are the same as those of linear block codes with only slight modifications. A special class of dc-free coset block codes are derived from BCH codes with specified bounds on minimum distance, disparity, and run length. The codes have low disparity levels (a small running digital sum) and good error-correcting capabilities.

  13. Finite-Length Analysis of BATS Codes

    OpenAIRE

    Yang, Shenghao; Ng, Tsz-Ching; Yeung, Raymond W.

    2013-01-01

    BATS codes were proposed for communication through networks with packet loss. A BATS code consists of an outer code and an inner code. The outer code is a matrix generation of a fountain code, which works with the inner code that comprises random linear coding at the intermediate network nodes. In this paper, the performance of finite-length BATS codes is analyzed with respect to both belief propagation (BP) decoding and inactivation decoding. Our results enable us to evaluate efficiently the...

  14. On homogeneous nontransitive binary perfect code

    OpenAIRE

    Mogilnykh, I. Yu.; Solov'eva, F. I.

    2014-01-01

    Studying binary perfect codes we show the existence of homogeneous nontransitive codes. Thus, as far as perfect codes are concerned, the propelinear codes are strictly contained in transitive codes, wheresas homogeneous codes form a strict subclass of transitive codes. In the work we deduce a necessary and sufficient condition for transitivity of perfect binary codes of rank one more than that of Hamming code. The paper is in Russian.

  15. Making your code citable with the Astrophysics Source Code Library

    Science.gov (United States)

    Allen, Alice; DuPrie, Kimberly; Schmidt, Judy; Berriman, G. Bruce; Hanisch, Robert J.; Mink, Jessica D.; Nemiroff, Robert J.; Shamir, Lior; Shortridge, Keith; Taylor, Mark B.; Teuben, Peter J.; Wallin, John F.

    2016-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) is a free online registry of codes used in astronomy research. With nearly 1,200 codes, it is the largest indexed resource for astronomy codes in existence. Established in 1999, it offers software authors a path to citation of their research codes even without publication of a paper describing the software, and offers scientists a way to find codes used in refereed publications, thus improving the transparency of the research. It also provides a method to quantify the impact of source codes in a fashion similar to the science metrics of journal articles. Citations using ASCL IDs are accepted by major astronomy journals and if formatted properly are tracked by ADS and other indexing services. The number of citations to ASCL entries increased sharply from 110 citations in January 2014 to 456 citations in September 2015. The percentage of code entries in ASCL that were cited at least once rose from 7.5% in January 2014 to 17.4% in September 2015. The ASCL's mid-2014 infrastructure upgrade added an easy entry submission form, more flexible browsing, search capabilities, and an RSS feeder for updates. A Changes/Additions form added this past fall lets authors submit links for papers that use their codes for addition to the ASCL entry even if those papers don't formally cite the codes, thus increasing the transparency of that research and capturing the value of their software to the community.

  16. Um estudo empírico sobre a importância do código de ética profissional para o contabilista An empirical study on the importance professional code of ethics for accountants

    Directory of Open Access Journals (Sweden)

    Francisco José dos Santos Alves

    2007-06-01

    Full Text Available Este estudo trata de uma pesquisa empírica e de natureza quantitativa, com o objetivo de investigar a influência do Código de Ética sobre o processo decisório ético do profissional de Contabilidade. O questionário foi aplicado por meio da Internet e respondido por 2262 contadores e técnicos em Contabilidade com registro ativo no Conselho Regional de Contabilidade de 4 Estados brasileiros. Seus resultados, obtidos por meio da regressão logística multivariada, sugerem, entre outros aspectos, a existência de uma contradição: a maioria dos profissionais considera o Código de Ética Profissional do Contabilista importante como guia de conduta, mas apenas uma minoria se predispõe a cumprir algumas ou todas as normas emanadas do Conselho Federal de Contabilidade.This study aims to investigate the influence of the Code of Ethics (CEPC in the ethical decision-making process of Brazilian accountants. It adopts a descriptive research approach and a quantitative method for analysis of data. Questionnaires were conducted via Internet and returned by 2262 accountants and accountant technicians, certified and chartered by the Regional Council of Accounting in the states of Rio de Janeiro, São Paulo, Minas Gerais and Rio Grande do Sul. The results obtained show, among others, a contradiction: approximately 73% of professionals polled totally agree with the statement claiming that the Code is important as a guide of conduct; however, only 44% are willing to comply with the guidelines established by the Federal Council of Accounting.

  17. Measurement of doppler effect up to 2000degC at FCA. 4. Investigation on calculation model for the Doppler effect measurement with a heated foil using MVP code

    International Nuclear Information System (INIS)

    A collision probability code with ultra-fine group structure, PEACO-X, is used to consider precisely the resonance interaction effect between 238U in the foil and resonance nuclides in surrounding regions. The PEACO-X code calculates collision probabilities for one dimensional geometries such as cylinder, sphere and slab. To obtain an appropriate spherical cell model for the PEACO-X calculation in the analysis of the activation Doppler effect, the following items were investigated by the Monte Carlo calculation: 1) Evaluation of the heterogeneity effect of a fuel cell on the Doppler effect calculation. 2) Selection of a spherical cell model for a disk-shaped foil. In the evaluation of the heterogeneity effect, the calculated results of the activation Doppler effect were compared between the heterogeneous and homogeneous cell models. By this comparison, it was found that homogenizing the fuel cell decreased the contribution to the 238U capture reaction rate in the energy region less than 2 keV. The heterogeneity effect on the activation Doppler effect, however, was negligible small. In the selection of the spherical cell model for the disk-shaped foil, parametric survey was carried out being concentrated on the background cross section of 238U in the foil, which is based on the Wigner rational approximation. The energy breakdown of the 238U capture reaction rate in the disk-shaped foil was compared with those in the spherical models with various values of the background cross sections. From these comparisons, the spherical model was selected in which the background cross section for 238U is equal to that of the disk-shaped foil. (J.P.N.)

  18. Les codes correcteurs

    OpenAIRE

    Rigo, Michel

    2009-01-01

    Qu'on le veuille ou non, nous vivons dans un monde où les informations et les moyens de communication sont omniprésents. Les exemples où se mêlent informatique et télécommunications sont nombreux. Que ce soit l'Internet, la musique achetée en ligne ou gravée sur CD, les baladeurs de type iPod et autres appareils portables, les supports mémoire de tout type, la photographie numérique, la présence d'ordinateurs de bord sophistiqués dans nos voitures, etc. Sans code correcteur, le CD (implémenta...

  19. GOC: General Orbit Code

    International Nuclear Information System (INIS)

    GOC (General Orbit Code) is a versatile program which will perform a variety of calculations relevant to isochronous cyclotron design studies. In addition to the usual calculations of interest (e.g., equilibrium and accelerated orbits, focusing frequencies, field isochronization, etc.), GOC has a number of options to calculate injections with a charge change. GOC provides both printed and plotted output, and will follow groups of particles to allow determination of finite-beam properties. An interactive PDP-10 program called GIP, which prepares input data for GOC, is available. GIP is a very easy and convenient way to prepare complicated input data for GOC. Enclosed with this report are several microfiche containing source listings of GOC and other related routines and the printed output from a multiple-option GOC run

  20. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...... be vanishing when the two-way relaying is considered in a broader context of a larger wireless network....

  1. IMP: A performance code

    Science.gov (United States)

    Dauro, Vincent A., Sr.

    IMP (Integrated Mission Program) is a simulation language and code used to model present and future Earth, Moon, or Mars missions. The profile is user controlled through selection from a large menu of events and maneuvers. A Fehlberg 7/13 Runge-Kutta integrator with error and step size control is used to numerically integrate the differential equations of motion (DEQ) of three spacecraft, a main, a target, and an observer. Through selection, the DEQ's include guided thrust, oblate gravity, atmosphere drag, solar pressure, and Moon gravity effects. Guide parameters for thrust events and performance parameters of velocity changes (Delta-V) and propellant usage (maximum of five systems) are developed as needed. Print, plot, summary, and debug files are output.

  2. Homomorphic encryption from codes

    CERN Document Server

    Bogdanov, Andrej

    2011-01-01

    We propose a new homomorphic encryption scheme based on the hardness of decoding under independent random noise from certain affine families of codes. Unlike in previous lattice-based homomorphic encryption schemes, where the message is hidden in the noisy part of the ciphertext, our scheme carries the message in the affine part of the transformation and applies noise only to achieve security. Our scheme can tolerate noise of arbitrary magnitude, as long as the noise vector has sufficiently small hamming weight (and its entries are independent). Our design achieves "proto-homomorphic" properties in an elementary manner: message addition and multiplication are emulated by pointwise addition and multiplication of the ciphertext vectors. Moreover, the extremely simple nature of our decryption makes the scheme easily amenable to bootstrapping. However, some complications are caused by the inherent presence of noticeable encryption error. Our main technical contribution is the development of two new techniques for...

  3. Transionospheric Propagation Code (TIPC)

    Energy Technology Data Exchange (ETDEWEB)

    Roussel-Dupre, R.; Kelley, T.A.

    1990-10-01

    The Transionospheric Propagation Code is a computer program developed at Los Alamos National Lab to perform certain tasks related to the detection of vhf signals following propagation through the ionosphere. The code is written in Fortran 77, runs interactively and was designed to be as machine independent as possible. A menu format in which the user is prompted to supply appropriate parameters for a given task has been adopted for the input while the output is primarily in the form of graphics. The user has the option of selecting from five basic tasks, namely transionospheric propagation, signal filtering, signal processing, DTOA study, and DTOA uncertainty study. For the first task a specified signal is convolved against the impulse response function of the ionosphere to obtain the transionospheric signal. The user is given a choice of four analytic forms for the input pulse or of supplying a tabular form. The option of adding Gaussian-distributed white noise of spectral noise to the input signal is also provided. The deterministic ionosphere is characterized to first order in terms of a total electron content (TEC) along the propagation path. In addition, a scattering model parameterized in terms of a frequency coherence bandwidth is also available. In the second task, detection is simulated by convolving a given filter response against the transionospheric signal. The user is given a choice of a wideband filter or a narrowband Gaussian filter. It is also possible to input a filter response. The third task provides for quadrature detection, envelope detection, and three different techniques for time-tagging the arrival of the transionospheric signal at specified receivers. The latter algorithms can be used to determine a TEC and thus take out the effects of the ionosphere to first order. Task four allows the user to construct a table of delta-times-of-arrival (DTOAs) vs TECs for a specified pair of receivers.

  4. Mutations of C19orf12, coding for a transmembrane glycine zipper containing mitochondrial protein, cause mis-localization of the protein, inability to respond to oxidative stress and increased mitochondrial Ca2+.

    Directory of Open Access Journals (Sweden)

    Paola eVenco

    2015-05-01

    Full Text Available Mutations in C19orf12 have been identified in patients affected by Neurodegeneration with Brain Iron Accumulation (NBIA, a clinical entity characterized by iron accumulation in the basal ganglia. By using western blot analysis with specific antibody and confocal studies, we showed that wild-type C19orf12 protein was not exclusively present in mitochondria, but also in the Endoplasmic Reticulum (ER and MAM (Mitochondria Associated Membrane, while mutant C19orf12 variants presented a different localization. Moreover, after induction of oxidative stress, a GFP-tagged C19orf12 wild-type protein was able to relocate to the cytosol. On the contrary, mutant isoforms were not able to respond to oxidative stress. High mitochondrial calcium concentration and increased H2O2 induced apoptosis were found in fibroblasts derived from one patient as compared to controls.C19orf12 protein is a 17kDa mitochondrial membrane-associated protein whose function is still unknown. Our in silico investigation suggests that, the glycine zipper motifs of C19orf12 form helical regions spanning the membrane. The N- and C-terminal regions with respect to the transmembrane portion, on the contrary, are predicted to rearrange in a structural domain, which is homologues to the N-terminal regulatory domain of the magnesium transporter MgtE, suggesting that C19orf12 may act as a regulatory protein for human MgtE transporters. The mutations here described affect respectively one glycine residue of the glycine zipper motifs, which are involved in dimerization of transmembrane helices and predicted to impair the correct localization of the protein into the membranes, and one residue present in the regulatory domain, which is important for protein-protein interaction.

  5. Diagonal Eigenvalue Unity (DEU) code for spectral amplitude coding-optical code division multiple access

    Science.gov (United States)

    Ahmed, Hassan Yousif; Nisar, K. S.

    2013-08-01

    Code with ideal in-phase cross correlation (CC) and practical code length to support high number of users are required in spectral amplitude coding-optical code division multiple access (SAC-OCDMA) systems. SAC systems are getting more attractive in the field of OCDMA because of its ability to eliminate the influence of multiple access interference (MAI) and also suppress the effect of phase induced intensity noise (PIIN). In this paper, we have proposed new Diagonal Eigenvalue Unity (DEU) code families with ideal in-phase CC based on Jordan block matrix with simple algebraic ways. Four sets of DEU code families based on the code weight W and number of users N for the combination (even, even), (even, odd), (odd, odd) and (odd, even) are constructed. This combination gives DEU code more flexibility in selection of code weight and number of users. These features made this code a compelling candidate for future optical communication systems. Numerical results show that the proposed DEU system outperforms reported codes. In addition, simulation results taken from a commercial optical systems simulator, Virtual Photonic Instrument (VPI™) shown that, using point to multipoint transmission in passive optical network (PON), DEU has better performance and could support long span with high data rate.

  6. Selection of Code and Interleaver for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1998-01-01

    The selection of component codes for turbo coding has often been based on the performance at high SNR's. However, we will argue that the selection mainly should be based on the performance at low SNR's, i.e. the convergence properties. Further, we will present a way to construct interleavers that...... significantly improve the performance of the turbo coding scheme at high SNR's, i.e. lowers the error floor...

  7. MCOR - Monte Carlo depletion code for reference LWR calculations

    International Nuclear Information System (INIS)

    Research highlights: → Introduction of a reference Monte Carlo based depletion code with extended capabilities. → Verification and validation results for MCOR. → Utilization of MCOR for benchmarking deterministic lattice physics (spectral) codes. - Abstract: The MCOR (MCnp-kORigen) code system is a Monte Carlo based depletion system for reference fuel assembly and core calculations. The MCOR code is designed as an interfacing code that provides depletion capability to the LANL Monte Carlo code by coupling two codes: MCNP5 with the AREVA NP depletion code, KORIGEN. The physical quality of both codes is unchanged. The MCOR code system has been maintained and continuously enhanced since it was initially developed and validated. The verification of the coupling was made by evaluating the MCOR code against similar sophisticated code systems like MONTEBURNS, OCTOPUS and TRIPOLI-PEPIN. After its validation, the MCOR code has been further improved with important features. The MCOR code presents several valuable capabilities such as: (a) a predictor-corrector depletion algorithm, (b) utilization of KORIGEN as the depletion module, (c) individual depletion calculation of each burnup zone (no burnup zone grouping is required, which is particularly important for the modeling of gadolinium rings), and (d) on-line burnup cross-section generation by the Monte Carlo calculation for 88 isotopes and usage of the KORIGEN libraries for PWR and BWR typical spectra for the remaining isotopes. Besides the just mentioned capabilities, the MCOR code newest enhancements focus on the possibility of executing the MCNP5 calculation in sequential or parallel mode, a user-friendly automatic re-start capability, a modification of the burnup step size evaluation, and a post-processor and test-matrix, just to name the most important. The article describes the capabilities of the MCOR code system; from its design and development to its latest improvements and further ameliorations

  8. MCOR - Monte Carlo depletion code for reference LWR calculations

    Energy Technology Data Exchange (ETDEWEB)

    Puente Espel, Federico, E-mail: fup104@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Tippayakul, Chanatip, E-mail: cut110@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Ivanov, Kostadin, E-mail: kni1@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Misu, Stefan, E-mail: Stefan.Misu@areva.com [AREVA, AREVA NP GmbH, Erlangen (Germany)

    2011-04-15

    Research highlights: > Introduction of a reference Monte Carlo based depletion code with extended capabilities. > Verification and validation results for MCOR. > Utilization of MCOR for benchmarking deterministic lattice physics (spectral) codes. - Abstract: The MCOR (MCnp-kORigen) code system is a Monte Carlo based depletion system for reference fuel assembly and core calculations. The MCOR code is designed as an interfacing code that provides depletion capability to the LANL Monte Carlo code by coupling two codes: MCNP5 with the AREVA NP depletion code, KORIGEN. The physical quality of both codes is unchanged. The MCOR code system has been maintained and continuously enhanced since it was initially developed and validated. The verification of the coupling was made by evaluating the MCOR code against similar sophisticated code systems like MONTEBURNS, OCTOPUS and TRIPOLI-PEPIN. After its validation, the MCOR code has been further improved with important features. The MCOR code presents several valuable capabilities such as: (a) a predictor-corrector depletion algorithm, (b) utilization of KORIGEN as the depletion module, (c) individual depletion calculation of each burnup zone (no burnup zone grouping is required, which is particularly important for the modeling of gadolinium rings), and (d) on-line burnup cross-section generation by the Monte Carlo calculation for 88 isotopes and usage of the KORIGEN libraries for PWR and BWR typical spectra for the remaining isotopes. Besides the just mentioned capabilities, the MCOR code newest enhancements focus on the possibility of executing the MCNP5 calculation in sequential or parallel mode, a user-friendly automatic re-start capability, a modification of the burnup step size evaluation, and a post-processor and test-matrix, just to name the most important. The article describes the capabilities of the MCOR code system; from its design and development to its latest improvements and further ameliorations. Additionally

  9. Els codis socials de conducta: notes històriques sobre la civilitat i l’educació cívica Social codes of conduct: historical notes on civic-mindedness and civic education En torno a los códigos sociales de conducta. Algunas notas históricas sobre la civilidad y la educación cívica

    Directory of Open Access Journals (Sweden)

    Félix F. Santolaria Sierra

    2011-12-01

    Full Text Available L'article intenta reflexionar el tema de l'educació per a la ciutadania des d'una perspectiva històrica, tot centrant-se en el nucli dels codis socials de conducta, com una part de les virtuts cíviques i del substrat sociocultural i moral previ que sustenta la vida comunitària pròpia. Es presenta l'obra històrica de Norbert Elias, entesa com a part del model historiogràfic de la narrativa de les emocions i de la teoria de la modernització i del procés civilitzador dins de la sociologia històrica. A més, s'aporten estudis per a la discussió crítica d'aquests models i teories des de la dimensió temporal (cronològica, la funcional i la logicoconceptual. _____________________________________________ L’article tente de réfléchir sur le thème de l’éducation à la citoyenneté dans une perspective historique, tout en se centrant sur le noyau des codes de conduite sociaux, comme faisant partie des vertus civiques et du substrat socioculturel et moral préalable qui sustente la vie communautaire. Nous présentons l’oeuvre historique de Norbert Elias, comprise comme partie du modèle historiographique de la narration des émotions, de la théorie de la modernisation et du processus civilisateur au sein de la sociologie historique. En outre, nous apportons des études pour la discussion critique de ces modèles et théories dans la perspective des dimensions temporelle (chronologique, fonctionnelle et logico-conceptuelle.The aim of this paper is to reflect on the topic of citizenship education from a historical perspective. We focus on the central theme of social codes of conduct, as part of the civic virtues and past sociocultural and moral foundations that support the life of the community itself. We present the historical work of Norbert Elias, which is considered to be part of the historiographic model of emotional narrative and the theory of modernization and the civilizing process in historical sociology. In addition, we

  10. Investigating the Simulink Auto-Coding Process

    Science.gov (United States)

    Gualdoni, Matthew J.

    2016-01-01

    Model based program design is the most clear and direct way to develop algorithms and programs for interfacing with hardware. While coding "by hand" results in a more tailored product, the ever-growing size and complexity of modern-day applications can cause the project work load to quickly become unreasonable for one programmer. This has generally been addressed by splitting the product into separate modules to allow multiple developers to work in parallel on the same project, however this introduces new potentials for errors in the process. The fluidity, reliability and robustness of the code relies on the abilities of the programmers to communicate their methods to one another; furthermore, multiple programmers invites multiple potentially differing coding styles into the same product, which can cause a loss of readability or even module incompatibility. Fortunately, Mathworks has implemented an auto-coding feature that allows programmers to design their algorithms through the use of models and diagrams in the graphical programming environment Simulink, allowing the designer to visually determine what the hardware is to do. From here, the auto-coding feature handles converting the project into another programming language. This type of approach allows the designer to clearly see how the software will be directing the hardware without the need to try and interpret large amounts of code. In addition, it speeds up the programming process, minimizing the amount of man-hours spent on a single project, thus reducing the chance of human error as well as project turnover time. One such project that has benefited from the auto-coding procedure is Ramses, a portion of the GNC flight software on-board Orion that has been implemented primarily in Simulink. Currently, however, auto-coding Ramses into C++ requires 5 hours of code generation time. This causes issues if the tool ever needs to be debugged, as this code generation will need to occur with each edit to any part of

  11. Practices in Code Discoverability: Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysical source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL (http://ascl.net) has on average added 19 new codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available ei...

  12. Bit-Interleaved Coded Multiple Beamforming with Perfect Coding

    CERN Document Server

    Li, Boyu

    2010-01-01

    When the channel state information is known by the transmitter as well as the receiver, beamforming techniques that employ Singular Value Decomposition (SVD) are commonly used in Multiple-Input Multiple-Output (MIMO) systems. Without channel coding, when a single symbol is transmitted, these systems achieve the full diversity order. Whereas, this property is lost when multiple symbols are simultaneously transmitted. Full diversity can be restored when channel coding is added, as long as the code rate Rc and the number of employed subchannels S satisfy the condition RcS =< 1. Moreover, by adding a proper constellation precoder, full diversity can be achieved for both uncoded and coded SVD systems, e.g., Fully Precoded Multiple Beamforming (FPMB) and Bit-Interleaved Coded Multiple Beamforming with Full Precoding (BICMB-FP). Perfect Space-Time Block Code (PSTBC) is a full-rate full-diversity space-time code, which achieves maximum coding gain for MIMO systems. Previously, Perfect Coded Multiple Beamforming (P...

  13. Source Code Generator Based on Dynamic Frames

    Directory of Open Access Journals (Sweden)

    Danijel Radošević

    2011-06-01

    Full Text Available Normal 0 21 false false false HR X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Obična tablica"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} This paper presents the model of source code generator based on dynamic frames. The model is named as the SCT model because if its three basic components: Specification (S, which describes the application characteristics, Configuration (C, which describes the rules for building applications, and Templates (T, which refer to application building blocks. The process of code generation dynamically creates XML frames containing all building elements (S, C ant T until final code is produced. This approach is compared to existing XVCL frames based model for source code generating. The SCT model is described by both XML syntax and the appropriate graphical elements. The SCT model is aimed to build complete applications, not just skeletons. The main advantages of the presented model are its textual and graphic description, a fully configurable generator, and the reduced overhead of the generated source code. The presented SCT model is shown on development of web application example in order to demonstrate its features and justify our design choices.

  14. Deterministic list codes for state-constrained arbitrarily varying channels

    CERN Document Server

    Sarwate, Anand D

    2007-01-01

    The capacity for the discrete memoryless arbitrarily varying channel (AVC) with cost constraints on the jammer is studied using deterministic list codes under both the maximal and average probability of error criteria. For a cost function $l(\\cdot)$ on the state set and constraint $\\Lambda$ on the jammer, the achievable rates are upper bounded by the random coding capacity $C_r(\\Lambda)$. For maximal error, the rate $R = C_r(\\Lambda) - \\epsilon$ is achievable using list codes with list size $O(\\epsilon^{-1})$. For average error, an integer $\\lsym(\\Lambda)$, called the \\textit{symmetrizability}, is defined. It is shown that any rate below $C_r(\\Lambda)$ is achievable under average error using list codes of list size $L > \\lsym$. An example is given for a class of discrete additive AVCs.

  15. Cinder creative coding cookbook

    CERN Document Server

    Madeira, Rui

    2013-01-01

    Full of easytofollow recipes and images that will teach powerful techniques and algorithms, building from basic projects to challenging applications. This book is for artists, designers, and programmers who have previous knowledge of C++, but not necessarily of Cinder.

  16. The DIT nuclear fuel assembly physics design code

    International Nuclear Information System (INIS)

    The DIT code is the Combustion Engineering, Inc. (C-E) nuclear fuel assembly design code. It belongs to a class of codes, all similar in structure and strategy, that may be characterized by the spectrum and spatial calculations being performed in two dimensions and in a single job step for the entire assembly. The forerunner of this class of codes is the United Kingdom Atomic Energy Authority WIMS code, the first version of which was completed 25 yr ago. The structure and strategy of assembly spectrum codes have remained remarkably similar to the original concept thus proving its usefulness. As other organizations, including C-E, have developed their own versions of the concept, many important variations have been added that significantly influence the accuracy and performance of the resulting computational tool. Those features, which are unique to the DIT code and which might be of interest to the community of fuel assembly physics design code users and developers, are described and discussed

  17. C style guide

    Science.gov (United States)

    Doland, Jerry; Valett, Jon

    1994-01-01

    This document discusses recommended practices and style for programmers using the C language in the Flight Dynamics Division environment. Guidelines are based on generally recommended software engineering techniques, industry resources, and local convention. The Guide offers preferred solutions to common C programming issues and illustrates through examples of C Code.

  18. Nonlinear, nonbinary cyclic group codes

    Science.gov (United States)

    Solomon, G.

    1992-01-01

    New cyclic group codes of length 2(exp m) - 1 over (m - j)-bit symbols are introduced. These codes can be systematically encoded and decoded algebraically. The code rates are very close to Reed-Solomon (RS) codes and are much better than Bose-Chaudhuri-Hocquenghem (BCH) codes (a former alternative). The binary (m - j)-tuples are identified with a subgroup of the binary m-tuples which represents the field GF(2 exp m). Encoding is systematic and involves a two-stage procedure consisting of the usual linear feedback register (using the division or check polynomial) and a small table lookup. For low rates, a second shift-register encoding operation may be invoked. Decoding uses the RS error-correcting procedures for the m-tuple codes for m = 4, 5, and 6.

  19. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-01-01

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine. PMID:18998785

  20. The multipath and SNR Quality in civil code L2

    Science.gov (United States)

    Polezel, W. G.; Souza, E. M.; Monico, J. F.

    2007-12-01

    The new generation of GPS satellites, with the addition of the new L2C civil code, may provide to the users better positioning capabilities. The new code in the L2 may increase the signal robustness, improve resistance to interference, reduce tracking noise and consequently, improve accuracy and provide better positioning inside buildings and in wooded areas. The second civil frequency code will eliminate the need of using fragile semi- codeless tracking techniques currently used in connection with L2. The L2C has a different structure that allows civil and military share the same code. L2C owns two codes of different length: moderate code (CM) and long code (CL). The CM was chosen to have 10.230 chips repeated to every 20 millisecond. The CL was chosen to have 767250 chips with period of 1.5 second. The main reasons for these choices were due to excellent correlation properties. Furthermore, L2C enhances performance by having no data modulation on CL code, which improves, among others, the threshold tracking performance. Comparing the L2C acquisition with the C/A, the CM code is ten times longer than the C/A and the two components have half the total power. This is an important feature for many low-power applications. Although this signal has several advantages, some investigations about its performance are necessary, mainly about the provided accuracy under some effects, for example, multipath. Thus, this paper aims to analyze the L2C signal, as well as its quality using some parameters, such as Signal to Noise Ratio (SNR) and multipath level (MP). The experiment was realized at Sao Paulo State University UNESP in Presidente Prudente, Brazil. The data were collected by two receivers of different brands, both able to collect the L2C signal, and connected to the same antenna, thought the use of a splitter. The results showed that the MP and SNR values were better for the modernized satellites. Furthermore, the SNR values of the two receivers were similar while the

  1. Two-Level Fingerprinting Codes

    OpenAIRE

    Anthapadmanabhan, N. Prasanth; Barg, Alexander

    2009-01-01

    We introduce the notion of two-level fingerprinting and traceability codes. In this setting, the users are organized in a hierarchical manner by classifying them into various groups; for instance, by dividing the distribution area into several geographic regions, and collecting users from the same region into one group. Two-level fingerprinting and traceability codes have the following property: As in traditional (one-level) codes, when given an illegal copy produced by a coalition of users, ...

  2. ACE spectrum of LDPC codes

    Directory of Open Access Journals (Sweden)

    Vukobratović Dejan

    2006-01-01

    Full Text Available Construction of short-length LDPC codes with good, both waterfall and error-floor, behavior is still an attractive research problem. Recently proposed construction algorithms in this field are based on remarkably simple ideas, but yet, their effectiveness can still be questioned. In this paper we investigate a novel measure of goodness of a given LDPC code namely its ACE spectrum, based on a previously introduced ACE metrics associated with each cycle in LDPC code graph.

  3. More on Combinatorial Batch Codes

    OpenAIRE

    Ruj, Sushmita; Roy, Bimal

    2008-01-01

    Paterson, Stinson and Wei \\cite{PSW} introduced Combinatorial batch codes, which are combinatorial description of Batch code. Batch codes were first presented by Ishai, Kushilevita, Ostrovsky and Sahai \\cite{IKOS} in STOC'04. In this paper we answer some of the questions put forward by Paterson, Stinson and Wei and give some results for the general case $t>1$ which were not studied by the authors.

  4. Generalized PCM coding of Images

    OpenAIRE

    Prades Nebot, José; MORBEE, MARLEEN; DELP, EDWARD

    2012-01-01

    Pulse-code modulation (PCM) with embedded quantization allows the rate of the PCM bitstream to be reduced by simply removing a fixed number of least significant bits from each codeword. Although this source coding technique is extremely simple, it has poor coding efficiency. In this paper, we present a generalized PCM (GPCM) algorithm for images that simply removes bits from each codeword. In contrast to PCM, however, the number and the specific bits that a GPCM encoder removes in each cod...

  5. Rateless codes for AVC models

    OpenAIRE

    Sarwate, Anand D.; Gastpar, Michael

    2007-01-01

    The arbitrarily varying channel (AVC) is a channel model whose state is selected maliciously by an adversary. Fixed-blocklength coding assumes a worst-case bound on the adversary's capabilities, which leads to pessimistic results. This paper defines a variable-length perspective on this problem, for which achievable rates are shown that depend on the realized actions of the adversary. Specifically, rateless codes are constructed which require a limited amount of common randomness. These codes...

  6. Ethical codes in business practice

    OpenAIRE

    Kobrlová, Marie

    2013-01-01

    The diploma thesis discusses the issues of ethics and codes of ethics in business. The theoretical part defines basic concepts of ethics, presents its historical development and the methods and tools of business ethics. It also focuses on ethical codes and the area of law and ethics. The practical part consists of a quantitative survey, which provides views of selected business entities of business ethics and the use of codes of ethics in practice.

  7. Explosive Formulation Code Naming SOP

    Energy Technology Data Exchange (ETDEWEB)

    Martz, H. E. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-09-19

    The purpose of this SOP is to provide a procedure for giving individual HME formulations code names. A code name for an individual HME formulation consists of an explosive family code, given by the classified guide, followed by a dash, -, and a number. If the formulation requires preparation such as packing or aging, these add additional groups of symbols to the X-ray specimen name.

  8. Low complexity hevc intra coding

    OpenAIRE

    Ruiz Coll, José Damián

    2016-01-01

    Over the last few decades, much research has focused on the development and optimization of video codecs for media distribution to end-users via the Internet, broadcasts or mobile networks, but also for videoconferencing and for the recording on optical disks for media distribution. Most of the video coding standards for delivery are characterized by using a high efficiency hybrid schema, based on inter-prediction coding for temporal picture decorrelation, and intra-prediction coding for spat...

  9. Combinatorial aspects of code loops

    OpenAIRE

    Vojtěchovský, Petr

    2007-01-01

    The existence and uniqueness (up to equivalence) of code loops was first established by R. Griess. Nevertheless, the explicit construction of code loops remained open until T. Hsu introduced the notion of symplectic cubic spaces and their Frattini extensions, and pointed out how the construction of code loops followed from the (purely combinatorial) result of O. Chein and E. Goodaire. Within this paper, we focus on their combinatorial construction and prove a more general result using the lan...

  10. The use of beam code in external radiotherapy; Utilisation du code beam en radiotherapie externe

    Energy Technology Data Exchange (ETDEWEB)

    Guillerminet, C.; Gschwind, R.; Makovicka, L. [CREST - UMR 6000 CNRS, 25 - Montbeliard (France)

    2003-07-01

    This code, in constant evolution, has several assets because it allows in one hand to better characterize the beams at the energy and angular level of accelerators at medical use; these data being accessible only by simulation and on the other hand to establish a three dimensional dose calculation fro any phantom. The limit factors are the calculation time, the size of voxels need important dimension tables for the data storage, and the compatibility between the code and the different images formats. (N.C.)

  11. Should you learn to code?

    CERN Document Server

    Team, The Hyperink

    2013-01-01

    On May 15, 2012 Jeff Atwood (co-founder of Stack Overflow) published a blog post titled "Please Don't Learn to Code" in response to Mayor Mike Bloomberg's resolution to learn how to code in 2012. In that post he argues against "learning to code just for the sake of learning how to code," a sentiment that sparked an active online debate. This book is a compilation of several different perspectives on that debate. Should programming be taught to every student as part of their core curriculum, similar to mathematics, reading, and writing? Should every working professional take time to learn a

  12. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  13. User manual of UNF code

    International Nuclear Information System (INIS)

    The UNF code (2001 version) written in FORTRAN-90 is developed for calculating fast neutron reaction data of structure materials with incident energies from about 1 Kev up to 20 Mev. The code consists of the spherical optical model, the unified Hauser-Feshbach and exciton model. The man nal of the UNF code is available for users. The format of the input parameter files and the output files, as well as the functions of flag used in UNF code, are introduced in detail, and the examples of the format of input parameters files are given

  14. The FLUKA Code: An Overview

    Science.gov (United States)

    Ballarini, F.; Battistoni, G.; Campanella, M.; Carboni, M.; Cerutti, F.; Empl, A.; Fasso, A.; Ferrari, A.; Gadioli, E.; Garzelli, M. V.; Lantz, M.; Liotta, M.; Mairani, A.; Mostacci, A.; Muraro, S.; Ottolenghi, A.; Pelliccioni, M.; Pinsky, L.; Ranft, J.; Roesler, S.; Sala, P. R.; Scannicchio, D.; Trovati, S.; Villari, R.; Wilson, T.

    2006-01-01

    FLUKA is a multipurpose Monte Carlo code which can transport a variety of particles over a wide energy range in complex geometries. The code is a joint project of INFN and CERN: part of its development is also supported by the University of Houston and NASA. FLUKA is successfully applied in several fields, including but not only, particle physics, cosmic ray physics, dosimetry, radioprotection, hadron therapy, space radiation, accelerator design and neutronics. The code is the standard tool used at CERN for dosimetry, radioprotection and beam-machine interaction studies. Here we give a glimpse into the code physics models with a particular emphasis to the hadronic and nuclear sector.

  15. Programming Entity Framework Code First

    CERN Document Server

    Lerman, Julia

    2011-01-01

    Take advantage of the Code First data modeling approach in ADO.NET Entity Framework, and learn how to build and configure a model based on existing classes in your business domain. With this concise book, you'll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration. Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you're working with an exis

  16. CH-TRU Waste Content Codes

    Energy Technology Data Exchange (ETDEWEB)

    Washington TRU Solutions LLC

    2008-01-16

    The CH-TRU Waste Content Codes (CH-TRUCON) document describes the inventory of the U.S. Department of Energy (DOE) CH-TRU waste within the transportation parameters specified by the Contact-Handled Transuranic Waste Authorized Methods for Payload Control (CH-TRAMPAC). The CH-TRAMPAC defines the allowable payload for the Transuranic Package Transporter-II (TRUPACT-II) and HalfPACT packagings. This document is a catalog of TRUPACT-II and HalfPACT authorized contents and a description of the methods utilized to demonstrate compliance with the CH-TRAMPAC. A summary of currently approved content codes by site is presented in Table 1. The CH-TRAMPAC describes "shipping categories" that are assigned to each payload container. Multiple shipping categories may be assigned to a single content code. A summary of approved content codes and corresponding shipping categories is provided in Table 2, which consists of Tables 2A, 2B, and 2C. Table 2A provides a summary of approved content codes and corresponding shipping categories for the "General Case," which reflects the assumption of a 60-day shipping period as described in the CH-TRAMPAC and Appendix 3.4 of the CH-TRU Payload Appendices. For shipments to be completed within an approximately 1,000-mile radius, a shorter shipping period of 20 days is applicable as described in the CH-TRAMPAC and Appendix 3.5 of the CH-TRU Payload Appendices. For shipments to WIPP from Los Alamos National Laboratory (LANL), Nevada Test Site, and Rocky Flats Environmental Technology Site, a 20-day shipping period is applicable. Table 2B provides a summary of approved content codes and corresponding shipping categories for "Close-Proximity Shipments" (20-day shipping period). For shipments implementing the controls specified in the CH-TRAMPAC and Appendix 3.6 of the CH-TRU Payload Appendices, a 10-day shipping period is applicable. Table 2C provides a summary of approved content codes and corresponding shipping categories for "Controlled Shipments

  17. Automorphism of order 2p in binary self-dual extremal codes of length a multiple of 24

    OpenAIRE

    Borello, Martino; Willems, Wolfgang

    2012-01-01

    Let C be a binary self-dual code with an automorphism g of order 2p, where p is an odd prime, such that g^p is a fixed point free involution. If C is extremal of length a multiple of 24 all the involutions are fixed point free, except the Golay Code and eventually putative codes of length 120. Connecting module theoretical properties of a self-dual code C with coding theoretical ones of the subcode C(g^p) which consists of the set of fixed points of g^p, we prove that C is a projective F_2-mo...

  18. CHEETAH: A next generation thermochemical code

    Energy Technology Data Exchange (ETDEWEB)

    Fried, L.; Souers, P.

    1994-11-01

    CHEETAH is an effort to bring the TIGER thermochemical code into the 1990s. A wide variety of improvements have been made in Version 1.0. We have improved the robustness and ease of use of TIGER. All of TIGER`s solvers have been replaced by new algorithms. We find that CHEETAH solves a wider variety of problems with no user intervention (e.g. no guesses for the C-J state) than TIGER did. CHEETAH has been made simpler to use than TIGER; typical use of the code occurs with the new standard run command. CHEETAH will make the use of thermochemical codes more attractive to practical explosive formulators. We have also made an extensive effort to improve over the results of TIGER. CHEETAH`s version of the BKW equation of state (BKWC) is able to accurately reproduce energies from cylinder tests; something that other BKW parameter sets have been unable to do. Calculations performed with BKWC execute very quickly; typical run times are under 10 seconds on a workstation. In the future we plan to improve the underlying science in CHEETAH. More accurate equations of state will be used in the gas and the condensed phase. A kinetics capability will be added to the code that will predict reaction zone thickness. Further ease of use features will eventually be added; an automatic formulator that adjusts concentrations to match desired properties is planned.

  19. THE MCNPX MONTE CARLO RADIATION TRANSPORT CODE

    Energy Technology Data Exchange (ETDEWEB)

    WATERS, LAURIE S. [Los Alamos National Laboratory; MCKINNEY, GREGG W. [Los Alamos National Laboratory; DURKEE, JOE W. [Los Alamos National Laboratory; FENSIN, MICHAEL L. [Los Alamos National Laboratory; JAMES, MICHAEL R. [Los Alamos National Laboratory; JOHNS, RUSSELL C. [Los Alamos National Laboratory; PELOWITZ, DENISE B. [Los Alamos National Laboratory

    2007-01-10

    MCNPX (Monte Carlo N-Particle eXtended) is a general-purpose Monte Carlo radiation transport code with three-dimensional geometry and continuous-energy transport of 34 particles and light ions. It contains flexible source and tally options, interactive graphics, and support for both sequential and multi-processing computer platforms. MCNPX is based on MCNP4B, and has been upgraded to most MCNP5 capabilities. MCNP is a highly stable code tracking neutrons, photons and electrons, and using evaluated nuclear data libraries for low-energy interaction probabilities. MCNPX has extended this base to a comprehensive set of particles and light ions, with heavy ion transport in development. Models have been included to calculate interaction probabilities when libraries are not available. Recent additions focus on the time evolution of residual nuclei decay, allowing calculation of transmutation and delayed particle emission. MCNPX is now a code of great dynamic range, and the excellent neutronics capabilities allow new opportunities to simulate devices of interest to experimental particle physics; particularly calorimetry. This paper describes the capabilities of the current MCNPX version 2.6.C, and also discusses ongoing code development.

  20. Construction of wiretap codes from ordinary channel codes

    CERN Document Server

    Hayashi, Masahito

    2010-01-01

    From an arbitrary given channel code over a discrete or Gaussian memoryless channel, we construct a wiretap code with the strong security. Our construction can achieve the wiretap capacity under mild assumptions. The key tool is the new privacy amplification theorem bounding the eavesdropped information in terms of the Gallager function.

  1. Conjugate Codes and Applications to Cryptography

    CERN Document Server

    Hamada, M

    2006-01-01

    A conjugate code pair is defined as a pair of linear codes such that one contains the dual of the other. The conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is argued that conjugate code pairs are applicable to quantum cryptography in order to motivate studies on conjugate code pairs.

  2. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  3. Patched Conic Trajectory Code

    Science.gov (United States)

    Park, Brooke Anderson; Wright, Henry

    2012-01-01

    PatCon code was developed to help mission designers run trade studies on launch and arrival times for any given planet. Initially developed in Fortran, the required inputs included launch date, arrival date, and other orbital parameters of the launch planet and arrival planets at the given dates. These parameters include the position of the planets, the eccentricity, semi-major axes, argument of periapsis, ascending node, and inclination of the planets. With these inputs, a patched conic approximation is used to determine the trajectory. The patched conic approximation divides the planetary mission into three parts: (1) the departure phase, in which the two relevant bodies are Earth and the spacecraft, and where the trajectory is a departure hyperbola with Earth at the focus; (2) the cruise phase, in which the two bodies are the Sun and the spacecraft, and where the trajectory is a transfer ellipse with the Sun at the focus; and (3) the arrival phase, in which the two bodies are the target planet and the spacecraft, where the trajectory is an arrival hyperbola with the planet as the focus.

  4. Computer code abstract: NESTLE

    International Nuclear Information System (INIS)

    NESTLE is a few-group neutron diffusion equation solver utilizing the nodal expansion method (NEM) for eigenvalue, adjoint, and fixed-source steady-state and transient problems. The NESTLE code solve the eigenvalue (criticality), eigenvalue adjoint, external fixed-source steady-state, and external fixed-source or eigenvalue initiated transient problems. The eigenvalue problem allows criticality searches to be completed, and the external fixed-source steady-state problem can search to achieve a specified power level. Transient problems model delayed neutrons via precursor groups. Several core properties can be input as time dependent. Two- or four-energy groups can be utilized, with all energy groups being thermal groups (i.e., upscatter exits) is desired. Core geometries modeled include Cartesian and hexagonal. Three-, two-, and one-dimensional models can be utilized with various symmetries. The thermal conditions predicted by the thermal-hydraulic model of the core are used to correct cross sections for temperature and density effects. Cross sections for temperature and density effects. Cross sections are parameterized by color, control rod state (i.e., in or out), and burnup, allowing fuel depletion to be modeled. Either a macroscopic or microscopic model may be employed

  5. Nuclear science references coding manual

    International Nuclear Information System (INIS)

    This manual is intended as a guide to Nuclear Science References (NSR) compilers. The basic conventions followed at the National Nuclear Data Center (NNDC), which are compatible with the maintenance and updating of and retrieval from the Nuclear Science References (NSR) file, are outlined. In Section H, the structure of the NSR file such as the valid record identifiers, record contents, text fields as well as the major TOPICS for which are prepared are enumerated. Relevant comments regarding a new entry into the NSR file, assignment of , generation of and linkage characteristics are also given in Section II. In Section III, a brief definition of the Keyword abstract is given followed by specific examples; for each TOPIC, the criteria for inclusion of an article as an entry into the NSR file as well as coding procedures are described. Authors preparing Keyword abstracts either to be published in a Journal (e.g., Nucl. Phys. A) or to be sent directly to NNDC (e.g., Phys. Rev. C) should follow the illustrations in Section III. The scope of the literature covered at the NNDC, the categorization into Primary and Secondary sources, etc., is discussed in Section IV. Useful information regarding permitted character sets, recommended abbreviations, etc., is given under Section V as Appendices

  6. Nuclear science references coding manual

    Energy Technology Data Exchange (ETDEWEB)

    Ramavataram, S.; Dunford, C.L.

    1996-08-01

    This manual is intended as a guide to Nuclear Science References (NSR) compilers. The basic conventions followed at the National Nuclear Data Center (NNDC), which are compatible with the maintenance and updating of and retrieval from the Nuclear Science References (NSR) file, are outlined. In Section H, the structure of the NSR file such as the valid record identifiers, record contents, text fields as well as the major TOPICS for which are prepared are enumerated. Relevant comments regarding a new entry into the NSR file, assignment of , generation of and linkage characteristics are also given in Section II. In Section III, a brief definition of the Keyword abstract is given followed by specific examples; for each TOPIC, the criteria for inclusion of an article as an entry into the NSR file as well as coding procedures are described. Authors preparing Keyword abstracts either to be published in a Journal (e.g., Nucl. Phys. A) or to be sent directly to NNDC (e.g., Phys. Rev. C) should follow the illustrations in Section III. The scope of the literature covered at the NNDC, the categorization into Primary and Secondary sources, etc., is discussed in Section IV. Useful information regarding permitted character sets, recommended abbreviations, etc., is given under Section V as Appendices.

  7. Allele coding in genomic evaluation

    Directory of Open Access Journals (Sweden)

    Christensen Ole F

    2011-06-01

    Full Text Available Abstract Background Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. Results Theoretical derivations showed that parameter estimates and estimated marker effects in marker-based models are the same irrespective of the allele coding, provided that the model has a fixed general mean. For the equivalent models, the same results hold, even though different allele coding methods lead to different genomic relationship matrices. Calculated genomic breeding values are independent of allele coding when the estimate of the general mean is included into the values. Reliabilities of estimated genomic breeding values calculated using elements of the inverse of the coefficient matrix depend on the allele coding because different allele coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being

  8. MARS Code in Linux Environment

    International Nuclear Information System (INIS)

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  9. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four are......This thesis consists of six chapters. The first chapter, contains a short introduction to coding theory in which we explain the coding theory concepts we use. In the second chapter, we present the required theory for evaluation codes and also give an example of some fundamental codes in coding...... optimal or best known for their parameters. In chapter five we study some graph codes with Reed–Solomon component codes. The underlying graph is well known and widely used for its good characteristics. This helps us to compute the dimension of the graph codes. We also introduce a combinatorial concept...

  10. C++ for dummies

    CERN Document Server

    Davis, Stephen Randy

    2009-01-01

    Enter the world of computer programming with this step-by-step guide to the C++ language! C++ is a great introduction to object-oriented programming, and this friendly guide covers everything you need to know and nothing you don't. You'll write your first program by the end of Chapter 1. C++ For Dummies, 6th Edition, helps you understand C++ programming from the ground up. It's full of examples to show you how things work, and it even explains "why", so you understand how the pieces fit together. And the bonus CD includes a special code editor, an update GNU compiler, and all source code from

  11. Coding in pigeons: Multiple-coding versus single-code/default strategies.

    Science.gov (United States)

    Pinto, Carlos; Machado, Armando

    2015-05-01

    To investigate the coding strategies that pigeons may use in a temporal discrimination tasks, pigeons were trained on a matching-to-sample procedure with three sample durations (2s, 6s and 18s) and two comparisons (red and green hues). One comparison was correct following 2-s samples and the other was correct following both 6-s and 18-s samples. Tests were then run to contrast the predictions of two hypotheses concerning the pigeons' coding strategies, the multiple-coding and the single-code/default. According to the multiple-coding hypothesis, three response rules are acquired, one for each sample. According to the single-code/default hypothesis, only two response rules are acquired, one for the 2-s sample and a "default" rule for any other duration. In retention interval tests, pigeons preferred the "default" key, a result predicted by the single-code/default hypothesis. In no-sample tests, pigeons preferred the key associated with the 2-s sample, a result predicted by multiple-coding. Finally, in generalization tests, when the sample duration equaled 3.5s, the geometric mean of 2s and 6s, pigeons preferred the key associated with the 6-s and 18-s samples, a result predicted by the single-code/default hypothesis. The pattern of results suggests the need for models that take into account multiple sources of stimulus control. PMID:25894105

  12. Ombuds’ corner: Code of Conduct and change of behaviour

    CERN Multimedia

    Vincent Vuillemin

    2012-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Is our Code of Conduct actually effective in influencing behaviour? Research studies suggest that codes, while necessary, are insufficient as a means of encouraging respectful behaviour among employees. Codes are only a potential means of influencing employee behaviour. For a Code of Conduct to be effective, several elements must be in place. Firstly, there needs to be communication and effective training using relevant examples to make the code real. It should be embraced by the leaders and accepted by the personnel. Finally, it should be embedded in the CERN culture and not seen as a separate entity, which requires serious discussions to raise awareness. In addition, every c...

  13. Lowering the Error Floor of LDPC Codes Using Cyclic Liftings

    CERN Document Server

    Asvadi, Reza; Ahmadian-Attari, Mahmoud

    2010-01-01

    Cyclic liftings are proposed to lower the error floor of low-density parity-check (LDPC) codes. The liftings are designed to eliminate dominant trapping sets of the base code by removing the short cycles which form the trapping sets. We derive a necessary and sufficient condition for the cyclic permutations assigned to the edges of a cycle $c$ of length $\\ell(c)$ in the base graph such that the inverse image of $c$ in the lifted graph consists of only cycles of length strictly larger than $\\ell(c)$. The proposed method is universal in the sense that it can be applied to any LDPC code over any channel and for any iterative decoding algorithm. It also preserves important properties of the base code such as degree distributions, encoder and decoder structure, and in some cases, the code rate. The proposed method is applied to both structured and random codes over the binary symmetric channel (BSC). The error floor improves consistently by increasing the lifting degree, and the results show significant improvemen...

  14. Antisense and sense expression of cDNA coding for CYP73A15, a class II cinnamate 4-hydroxylase, leads to a delayed and reduced production of lignin in tobacco

    Science.gov (United States)

    Blee, K.; Choi, J. W.; O'Connell, A. P.; Jupe, S. C.; Schuch, W.; Lewis, N. G.; Bolwell, G. P.

    2001-01-01

    A number of plant species contain the class II of genes encoding the cytochrome P450, CYP73, the cognate protein of which cinnamic acid 4-hydroxylase, is the second enzyme of the phenylpropanoid pathway. In order to begin to determine possible functionality, tobacco has been transformed with a truncated French bean class II cinnamate hydroxylase (CYP73A15) in the sense and antisense orientations. Signals for C4H protein could be detected in vascular tissue from wild-type plants using heterologous probes. The transformed plants showed a normal phenotype, even though detectable C4H protein was much reduced in tissue prints. Young propagated transformants displayed a range of reduced C4H activities, as well as either reduced or no phloroglucinol-stainable lignin. However, all mature tobacco plants showed the accumulation of lignin, even though its deposition was apparently delayed. This was not due to induction of tyrosine ammonia-lyase activity, which was not detected, but instead it is presumed due to sufficient C4H residual activity. Analysis of the lignin content of the plants showed reductions of up to 30% with a slightly reduced syringyl to guaiacyl ratio as compared to wild type. This reduction level was favourable in comparison with some other targets in the lignification pathway that have been manipulated including that of class I cinnamate 4-hydroxylase. It is proposed that the class II cinnamate 4-hydroxylase might also function in lignification in a number of species including French bean and tobacco, based on these data.

  15. Upgrade of FUMACS code package

    International Nuclear Information System (INIS)

    The FUMACS code package (an acronym of FUel MAnagement Code System) was developed at Rudjer Boskovic Institute in year 1991 with the aim to enable in-core fuel management analysis of the NPP Krsko core for nominal (full power) conditions. The modernization and uprating of the NPP Krsko core from 1876 to 1994 MW (th) performed in year 2000 resulted in the change of operating conditions. The old version of the FUMACS code package would not model properly the NPP Krsko core for the new operating conditions. The upgrade of the FUMACS code package to enable the modeling of the NPP Krsko core for uprated conditions and longer cycles required modifications of master files, libraries and codes. In order to make the code package more user friendly, Windows (95/98/NT) compatible version of the code package, with incorporated graphical user interface has been developed. The new version of the code package has been verified and validated for new operating conditions through modeling and comparison of results with referent design of a number of 12-month and 18-month operating cycles.(author)

  16. Using NAEYC's Code of Ethics.

    Science.gov (United States)

    Young Children, 1995

    1995-01-01

    Considers how to deal with an ethical dilemma concerning a caregiver's dislike for a child. Recognizes that no statement in NAEYC's Code of Ethical Conduct requires that a professional must like each child, and presents some ideals and principles from the code that may guide professionals through similar situations. (BAC)

  17. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions with a...

  18. Squares of Random Linear Codes

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego;

    2015-01-01

    positive answer, for codes of dimension $k$ and length roughly $\\frac{1}{2}k^2$ or smaller. Moreover, the convergence speed is exponential if the difference $k(k+1)/2-n$ is at least linear in $k$. The proof uses random coding and combinatorial arguments, together with algebraic tools involving the precise...

  19. ACCELERATION PHYSICS CODE WEB REPOSITORY.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.

    2006-06-26

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  20. Accident consequence assessment code development

    International Nuclear Information System (INIS)

    This paper describes the new computer code system, OSCAAR developed for off-site consequence assessment of a potential nuclear accident. OSCAAR consists of several modules which have modeling capabilities in atmospheric transport, foodchain transport, dosimetry, emergency response and radiological health effects. The major modules of the consequence assessment code are described, highlighting the validation and verification of the models. (author)

  1. Quantum Convolutional Error Correction Codes

    OpenAIRE

    Chau, H. F.

    1998-01-01

    I report two general methods to construct quantum convolutional codes for quantum registers with internal $N$ states. Using one of these methods, I construct a quantum convolutional code of rate 1/4 which is able to correct one general quantum error for every eight consecutive quantum registers.

  2. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  3. ENSDF ANALYSIS AND UTILITY CODES.

    Energy Technology Data Exchange (ETDEWEB)

    BURROWS, T.

    2005-04-04

    The ENSDF analysis and checking codes are briefly described, along with their uses with various types of ENSDF datasets. For more information on the programs see ''Read Me'' entries and other documentation associated with each code.

  4. Survey of coded aperture imaging

    International Nuclear Information System (INIS)

    The basic principle and limitations of coded aperture imaging for x-ray and gamma cameras are discussed. Current trends include (1) use of time varying apertures, (2) use of ''dilute'' apertures with transmission much less than 50%, and (3) attempts to derive transverse tomographic sections, unblurred by other planes, from coded images

  5. Revised Safety Code A2

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the revised Safety Code A2 (Code A2 rev.) entitled "REPORTING OF ACCIDENTS AND NEAR MISSES" is available on the web at the following url: https://edms.cern.ch/document/335502/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  6. Cyclic Codes of Length 2

    Indian Academy of Sciences (India)

    Manju Pruthi

    2001-11-01

    In this paper explicit expressions of + 1 idempotents in the ring $R = F_q[X]/\\langle X^{2^m}-1\\rangle$ are given. Cyclic codes of length 2 over the finite field , of odd characteristic, are defined in terms of their generator polynomials. The exact minimum distance and the dimension of the codes are obtained.

  7. Mobile Konami Code Source Files

    OpenAIRE

    Boomgaarden, Jacob; Corney, Joshua

    2015-01-01

    An archive file of Android source code projects available for import into Android Studio. These projects were utilized in the research for the following thesis: MOBILE KONAMI CODES: ANALYSIS OF ANDROID MALWARE SERVICES UTILIZING SENSOR AND RESOURCE-BASED STATE CHANGES. This thesis may be found here: http://calhoun.nps.edu/handle/10945/45163

  8. Non-Protein Coding RNAs

    CERN Document Server

    Walter, Nils G; Batey, Robert T

    2009-01-01

    This book assembles chapters from experts in the Biophysics of RNA to provide a broadly accessible snapshot of the current status of this rapidly expanding field. The 2006 Nobel Prize in Physiology or Medicine was awarded to the discoverers of RNA interference, highlighting just one example of a large number of non-protein coding RNAs. Because non-protein coding RNAs outnumber protein coding genes in mammals and other higher eukaryotes, it is now thought that the complexity of organisms is correlated with the fraction of their genome that encodes non-protein coding RNAs. Essential biological processes as diverse as cell differentiation, suppression of infecting viruses and parasitic transposons, higher-level organization of eukaryotic chromosomes, and gene expression itself are found to largely be directed by non-protein coding RNAs. The biophysical study of these RNAs employs X-ray crystallography, NMR, ensemble and single molecule fluorescence spectroscopy, optical tweezers, cryo-electron microscopy, and ot...

  9. Overview of the FLUKA code

    International Nuclear Information System (INIS)

    The FLUKA code is a general purpose Monte Carlo code for the interaction and transport of hadrons, heavy ions, and electromagnetic particles from few keV (or thermal energies for neutrons) to Cosmic Ray energies in arbitrary materials and able to work both in analog and biased mode. The capabilities and physics model implemented inside the FLUKA code are briefly described, with emphasis on hadronic interaction. Examples of the performances of the code are presented including basic (thin target) and complex benchmarks, and radiation detector specific applications. In particular the ability of FLUKA in describing existing calorimeter performances and in predicting those of future ones, as well as the use of the code for neutron and mixed field radiation detectors will be demonstrated with several examples

  10. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani;

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...... in throughput that exceed 10x for TCP traffic while requiring a limited sacrifice in terms of fairness towards other flows on the channel....

  11. The German pressure vessel code

    International Nuclear Information System (INIS)

    The philosophy and the safety aspects of the German pressure vessel code is summarised. Emphasis is laid upon material selection, design, manufacture and inspection. The AD specifications, which are embedded in the German regulation for the prevention of accidents 'Pressure Vessels' are compiled primarily to give a measure of safety to the average plant. The possible types of failure are discussed in connection with design aspects. It is shown in detail how the AD specifications count for inelastic material behaviour. A comparison is also made between the German code and the ASME boiler and pressure vessel code. Comparatively, the allowable stresses due to the German code are higher, leading to thinner walls in many cases. This is compensated for by rigorous inspection and non-destructive testing during manufacture. Regular examinations round up the system of safety. It is concluded that the German code gives a high degree of safety and flexibility to the manufacturer. (author)

  12. Best practices for code release

    Science.gov (United States)

    Berriman, G. Bruce

    2016-01-01

    In this talk, I want to describe what I think are the best practices for releasing code and having it adopted by end users. Make sure your code is licensed, so users will know how the software can be used and modified, and place your code in a public repository that (and make sure that you follow institutional policies in doing this). Yet licensing and releasing code are not enough: the code must be organized and documented so users can understand what it does, what its limitations are, and how to build and use it. I will describe what I think are best practices in developing the content to support release, including tutorials, design documents, specifications of interfaces and so on. Much of what I have learned on based on ten years of experience in supporting releases of the Montage Image Mosaic Engine.

  13. 结球甘蓝ARC1与Exo70A1编码区cDNA的克隆及进化分析%Cloning and Phylogenetic Analysis of cDNA Sequences Coding for ARC1 and Exo70A1 in Brassica oleracesvar.capitata L.

    Institute of Scientific and Technical Information of China (English)

    杨丹; 廉小平; 周燕; 张贺翠; 杜丹; 高启国; 任雪松; 朱利泉

    2016-01-01

    Interaction between ARC1 and Exo70A1 in Brassica is a key point of self-incompatibility(SI)signal transduction. In order to study the evolutionary relationship of ARC1 and Exo70A1 from 10 cultivars of SI head cabbages developed in recent years,we successfully cloned and sequenced cDNAs of ARC1 and Exo70A1. Furthermore,by bioinformatics,we had mutation and evolutionary analysis of those coding region sequences,including interaction region and non-interaction regions of ARC1-Exo70A1 from the 10 cabbages and prior published 83 ARC1 and 73 Exo70A1 sequences. The results revealed that:1)The coding nucleic acid sequences of ARC1 and Exo70A1 from the 10 cabbage materials presented parallel evolutionary relationships,and belonged to the Brassica branch. 2)The evolution rate of coding sequence of ARC1 was faster than Exo70A1. 3)The interaction coding region of ARC1-Exo70A1 was obviously in the progress of co-evolution,while the non-interaction coding area of ARC1-Exo70A1 showed significant differentiation rate in evolution. 4)The evolutionary rate of interaction coding area was faster than non-interaction coding region.%在甘蓝自交不亲和信号传导过程中,ARC1与Exo70A1的相互作用起着承上启下的关键作用。为了研究10种自交不亲和结球甘蓝材料ARC1和Exo70A1的进化关系,对其编码区cDNA进行了克隆和测序;在此基础上采用生物信息学方法,对这10种材料和前人已发表的83条ARC1和73条Exo70A1的相关序列的ARC1-Exo70A1的互作区和非互作区编码序列进行了变异和进化分析。结果发现:(1)所选育的10种结球甘蓝材料的ARC1与Exo70A1的编码区核酸序列存在平行进化关系,且均聚类于芸薹属分支下;(2)ARC1比Exo70A1编码区序列进化速率快;(3)ARC1和Exo70A1互作编码区核酸序列存在明显的协同进化,而ARC1和Exo70A1非互作编码区核酸序列则在进化上呈现明显分异;(4)ARC1和Exo70A1互作编码区cDNA的

  14. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  15. QR Code Image Correction based on Corner Detection and Convex Hull Algorithm

    OpenAIRE

    Suran Kong

    2013-01-01

    Since the angular deviation produced when shooting a QR code image by a camera would cause geometric distortion of the QR code image, the traditional algorithm of QR code image correction would produce distortion. Therefore this paper puts forward the algorithm which combines corner detection with convex hull algorithm. Firstly, binaryzation of the collected QR code image with uneven light is obtained by the methods of local threshold and mathematical morphology. Next, the outline of the QR c...

  16. Raman-based distributed temperature sensor using simplex code and gain controlled EDFA

    Science.gov (United States)

    Bassan, F. R.; Penze, R. S.; Leonardi, A. A.; Fracarolli, J. P. V.; Floridia, C.; Rosolem, J. B.; Fruett, F.

    2015-09-01

    In this work we present a comparison between simplex coded and optical amplified simplex coded Raman based Distributed Temperature Sensing (DTS). An increase in performance is demonstrated using erbium doped fiber amplifier (EDFA) with proper gain control scheme that allows a DTS operates with simplex code. Using 63-bit simplex code and gain controlled EDFA we demonstrated the temperature resolution and dynamic range improvement in 16 °C @ 10 km and 4 dB, respectively.

  17. A Template-Based Java Code Generator for OpenModelica and MetaModelica

    OpenAIRE

    Munisamy, Manokar

    2014-01-01

    The current OpenModelica Complier (OMC) translates Modelica models into executable Ccodethrough several stages. The Code Generator is the final stage of the compiler whichgenerates target C-code from the optimized sorted equations. Recently, the Code Generator inOMC has been rewritten using the OpenModelica text template language. This gives a moreconcise and easier to understand code generator. Modeling and simulation is becomingincreasingly used in several application areas. There is demand...

  18. MEMOPS: data modelling and automatic code generation.

    Science.gov (United States)

    Fogh, Rasmus H; Boucher, Wayne; Ionides, John M C; Vranken, Wim F; Stevens, Tim J; Laue, Ernest D

    2010-01-01

    In recent years the amount of biological data has exploded to the point where much useful information can only be extracted by complex computational analyses. Such analyses are greatly facilitated by metadata standards, both in terms of the ability to compare data originating from different sources, and in terms of exchanging data in standard forms, e.g. when running processes on a distributed computing infrastructure. However, standards thrive on stability whereas science tends to constantly move, with new methods being developed and old ones modified. Therefore maintaining both metadata standards, and all the code that is required to make them useful, is a non-trivial problem. Memops is a framework that uses an abstract definition of the metadata (described in UML) to generate internal data structures and subroutine libraries for data access (application programming interfaces--APIs--currently in Python, C and Java) and data storage (in XML files or databases). For the individual project these libraries obviate the need for writing code for input parsing, validity checking or output. Memops also ensures that the code is always internally consistent, massively reducing the need for code reorganisation. Across a scientific domain a Memops-supported data model makes it easier to support complex standards that can capture all the data produced in a scientific area, share them among all programs in a complex software pipeline, and carry them forward to deposition in an archive. The principles behind the Memops generation code will be presented, along with example applications in Nuclear Magnetic Resonance (NMR) spectroscopy and structural biology. PMID:20375445

  19. Detecting non-coding selective pressure in coding regions

    Directory of Open Access Journals (Sweden)

    Blanchette Mathieu

    2007-02-01

    Full Text Available Abstract Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements.

  20. Obituary: Arthur Dodd Code (1923-2009)

    Science.gov (United States)

    Marché, Jordan D., II

    2009-12-01

    Former AAS president Arthur Dodd Code, age 85, passed away at Meriter Hospital in Madison, Wisconsin on 11 March 2009, from complications involving a long-standing pulmonary condition. Code was born in Brooklyn, New York on 13 August 1923, as the only child of former Canadian businessman Lorne Arthur Code and Jesse (Dodd) Code. An experienced ham radio operator, he entered the University of Chicago in 1940, but then enlisted in the U.S. Navy (1943-45) and was later stationed as an instructor at the Naval Research Laboratory, Washington, D.C. During the war, he gained extensive practical experience with the design and construction of technical equipment that served him well in years ahead. Concurrently, he took physics courses at George Washington University (some under the tutelage of George Gamow). In 1945, he was admitted to the graduate school of the University of Chicago, without having received his formal bachelor's degree. In 1950, he was awarded his Ph.D. for a theoretical study of radiative transfer in O- and B-type stars, directed by Subrahmanyan Chandrasekhar. hired onto the faculty of the Department of Astronomy at the University of Wisconsin-Madison (1951-56). He then accepted a tenured appointment at the California Institute of Technology and the Mount Wilson and Palomar Observatories (1956-58). But following the launch of Sputnik, Code returned to Wisconsin in 1958 as full professor of astronomy, director of the Washburn Observatory, and department chairman so that he could more readily pursue his interest in space astronomy. That same year, he was chosen a member of the Space Science Board of the National Academy of Sciences (created during the International Geophysical Year) and shortly became one of five principal investigators of the original NASA Space Science Working Group. In a cogent 1960 essay, Code argued that astrophysical investigations, when conducted from beyond the Earth's atmosphere, "cannot fail to have a tremendous impact on the