WorldWideScience

Sample records for code explains conservative

  1. Building Standards and Codes for Energy Conservation

    Science.gov (United States)

    Gross, James G.; Pierlert, James H.

    1977-01-01

    Current activity intended to lead to energy conservation measures in building codes and standards is reviewed by members of the Office of Building Standards and Codes Services of the National Bureau of Standards. For journal availability see HE 508 931. (LBH)

  2. Conservation of concrete structures according to fib Model Code 2010

    NARCIS (Netherlands)

    Matthews, S.; Bigaj-Van Vliet, A.; Ueda, T.

    2013-01-01

    Conservation of concrete structures forms an essential part of the fib Model Code for Concrete Structures 2010 (fib Model Code 2010). In particular, Chapter 9 of fib Model Code 2010 addresses issues concerning conservation strategies and tactics, conservation management, condition surveys, condition

  3. A Very Fast and Angular Momentum Conserving Tree Code

    International Nuclear Information System (INIS)

    Marcello, Dominic C.

    2017-01-01

    There are many methods used to compute the classical gravitational field in astrophysical simulation codes. With the exception of the typically impractical method of direct computation, none ensure conservation of angular momentum to machine precision. Under uniform time-stepping, the Cartesian fast multipole method of Dehnen (also known as the very fast tree code) conserves linear momentum to machine precision. We show that it is possible to modify this method in a way that conserves both angular and linear momenta.

  4. A Very Fast and Angular Momentum Conserving Tree Code

    Energy Technology Data Exchange (ETDEWEB)

    Marcello, Dominic C., E-mail: dmarce504@gmail.com [Department of Physics and Astronomy, and Center for Computation and Technology Louisiana State University, Baton Rouge, LA 70803 (United States)

    2017-09-01

    There are many methods used to compute the classical gravitational field in astrophysical simulation codes. With the exception of the typically impractical method of direct computation, none ensure conservation of angular momentum to machine precision. Under uniform time-stepping, the Cartesian fast multipole method of Dehnen (also known as the very fast tree code) conserves linear momentum to machine precision. We show that it is possible to modify this method in a way that conserves both angular and linear momenta.

  5. Code Red: Explaining Average Age of Death in the City of Hamilton

    Directory of Open Access Journals (Sweden)

    Patrick F. DeLuca

    2015-11-01

    Full Text Available The aim of this study is to identify the underlying factors that explain the average age of death in the City of Hamilton, Ontario, Canada, as identified in the Code Red Series of articles that were published in the city's local newspaper in 2010. Using a combination of data from the Canadian Census, the Government of Ontario and the Canadian Institute for Health Information, factor analysis was performed yielding three factors relating to poverty, working class, and health and aging. In a regression analysis these factors account for 42% of the total variability in the average ages of death observed at the census tract level of geography within the city.

  6. Efficient coding explains the universal law of generalization in human perception.

    Science.gov (United States)

    Sims, Chris R

    2018-05-11

    Perceptual generalization and discrimination are fundamental cognitive abilities. For example, if a bird eats a poisonous butterfly, it will learn to avoid preying on that species again by generalizing its past experience to new perceptual stimuli. In cognitive science, the "universal law of generalization" seeks to explain this ability and states that generalization between stimuli will follow an exponential function of their distance in "psychological space." Here, I challenge existing theoretical explanations for the universal law and offer an alternative account based on the principle of efficient coding. I show that the universal law emerges inevitably from any information processing system (whether biological or artificial) that minimizes the cost of perceptual error subject to constraints on the ability to process or transmit information. Copyright © 2018 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  7. Genome-wide identification of coding and non-coding conserved sequence tags in human and mouse genomes

    Directory of Open Access Journals (Sweden)

    Maggi Giorgio P

    2008-06-01

    Full Text Available Abstract Background The accurate detection of genes and the identification of functional regions is still an open issue in the annotation of genomic sequences. This problem affects new genomes but also those of very well studied organisms such as human and mouse where, despite the great efforts, the inventory of genes and regulatory regions is far from complete. Comparative genomics is an effective approach to address this problem. Unfortunately it is limited by the computational requirements needed to perform genome-wide comparisons and by the problem of discriminating between conserved coding and non-coding sequences. This discrimination is often based (thus dependent on the availability of annotated proteins. Results In this paper we present the results of a comprehensive comparison of human and mouse genomes performed with a new high throughput grid-based system which allows the rapid detection of conserved sequences and accurate assessment of their coding potential. By detecting clusters of coding conserved sequences the system is also suitable to accurately identify potential gene loci. Following this analysis we created a collection of human-mouse conserved sequence tags and carefully compared our results to reliable annotations in order to benchmark the reliability of our classifications. Strikingly we were able to detect several potential gene loci supported by EST sequences but not corresponding to as yet annotated genes. Conclusion Here we present a new system which allows comprehensive comparison of genomes to detect conserved coding and non-coding sequences and the identification of potential gene loci. Our system does not require the availability of any annotated sequence thus is suitable for the analysis of new or poorly annotated genomes.

  8. Non-coding RNAs enter mitosis: functions, conservation and implications

    OpenAIRE

    Pek, Jun Wei; Kai, Toshie

    2011-01-01

    Abstract Nuage (or commonly known as chromatoid body in mammals) is a conserved germline-specific organelle that has been linked to the Piwi-interacting RNA (piRNA) pathway. piRNAs are a class of gonadal-specific RNAs that are ~23-29 nucleotides in length and protect genome stability by repressing the expression of deleterious retrotransposons. More recent studies in Drosophila have implicated the piRNA pathway in other functions including canalization of embryonic development, regulation of ...

  9. Training program for energy conservation in new building construction. Volume III. Energy conservation technology for plan examiners and code administrators. Energy Conservation Technology Series 200

    Energy Technology Data Exchange (ETDEWEB)

    None

    1977-12-01

    Under the sponsorship of the United States Department of Energy, a Model Code for Energy Conservation in New Building Construction has been developed by those national organizations primarily concerned with the development and promulgation of model codes. The technical provisions are based on ASHRAE Standard 90-75 and are intended for use by state and local officials. The subject of regulation of new building construction to assure energy conservation is recognized as one in which code officials have not had previous exposure. It was also determined that application of the model code would be made at varying levels by officials with both a specific requirement for knowledge and a differing degree of prior training in the state-of-the-art. Therefore, a training program and instructional materials were developed for code officials to assist them in the implementation and enforcement of energy efficient standards and codes. The training program for Energy Conservation Tehnology for Plan Examiners and Code Administrators (ECT Series 200) is presented.

  10. Guide to the Changes between the 2009 and 2012 International Energy Conservation Code

    Energy Technology Data Exchange (ETDEWEB)

    Mapes, Terry S.; Conover, David R.

    2012-05-31

    The International Code Council (ICC) published the 2012 International Energy Conservation Code{reg_sign} (IECC) in early 2012. The 2012 IECC is based on revisions, additions, and deletions to the 2009 IECC that were considered during the ICC code development process conducted in 2011. Solid vertical lines, arrows, or asterisks printed in the 2012 IECC indicate where revisions, deletions, or relocations of text respectively were made to 2009 IECC. Although these marginal markings indicate where changes have been made to the code, they do not provide any further guidance, leaving the reader to consult and compare the 2009 and 2012 IECC for more detail.

  11. Non-coding RNAs enter mitosis: functions, conservation and implications

    Directory of Open Access Journals (Sweden)

    Kai Toshie

    2011-02-01

    Full Text Available Abstract Nuage (or commonly known as chromatoid body in mammals is a conserved germline-specific organelle that has been linked to the Piwi-interacting RNA (piRNA pathway. piRNAs are a class of gonadal-specific RNAs that are ~23-29 nucleotides in length and protect genome stability by repressing the expression of deleterious retrotransposons. More recent studies in Drosophila have implicated the piRNA pathway in other functions including canalization of embryonic development, regulation of maternal gene expression and telomere protection. We have recently shown that Vasa (known as Mouse Vasa Homolog in mouse, a nuage component, plays a mitotic role in promoting chromosome condensation and segregation by facilitating robust chromosomal localization of condensin I in the Drosophila germline. Vasa functions together with Aubergine (a PIWI family protein and Spindle-E/mouse TDRD-9, two other nuage components that are involved in the piRNA pathway, therefore providing a link between the piRNA pathway and mitotic chromosome condensation. Here, we propose and discuss possible models for the role of Vasa and the piRNA pathway during mitosis. We also highlight relevant studies implicating mitotic roles for RNAs and/or nuage in other model systems and their implications for cancer development.

  12. Explaining diversity in the worldwide diffusion of codes of good governance

    NARCIS (Netherlands)

    Haxhi, Ilir; van Ees, Hans

    Extending earlier literature on diffusion of codes of good governance (CGGs) by integrating the effect of national culture, this study offers a novel perspective on cross-national diversity in the worldwide diffusion of corporate governance best practices. We argue that particular cultural

  13. Explaining diversity in the worldwide diffusion of codes of good governance

    NARCIS (Netherlands)

    Haxhi, I.; van Ees, H.

    2010-01-01

    Extending earlier literature on diffusion of codes of good governance (CGGs) by integrating the effect of national culture, this study offers a novel perspective on cross-national diversity in the worldwide diffusion of corporate governance best practices. We argue that particular cultural

  14. A mixture of sparse coding models explaining properties of face neurons related to holistic and parts-based processing.

    Directory of Open Access Journals (Sweden)

    Haruo Hosoya

    2017-07-01

    Full Text Available Experimental studies have revealed evidence of both parts-based and holistic representations of objects and faces in the primate visual system. However, it is still a mystery how such seemingly contradictory types of processing can coexist within a single system. Here, we propose a novel theory called mixture of sparse coding models, inspired by the formation of category-specific subregions in the inferotemporal (IT cortex. We developed a hierarchical network that constructed a mixture of two sparse coding submodels on top of a simple Gabor analysis. The submodels were each trained with face or non-face object images, which resulted in separate representations of facial parts and object parts. Importantly, evoked neural activities were modeled by Bayesian inference, which had a top-down explaining-away effect that enabled recognition of an individual part to depend strongly on the category of the whole input. We show that this explaining-away effect was indeed crucial for the units in the face submodel to exhibit significant selectivity to face images over object images in a similar way to actual face-selective neurons in the macaque IT cortex. Furthermore, the model explained, qualitatively and quantitatively, several tuning properties to facial features found in the middle patch of face processing in IT as documented by Freiwald, Tsao, and Livingstone (2009. These included, in particular, tuning to only a small number of facial features that were often related to geometrically large parts like face outline and hair, preference and anti-preference of extreme facial features (e.g., very large/small inter-eye distance, and reduction of the gain of feature tuning for partial face stimuli compared to whole face stimuli. Thus, we hypothesize that the coding principle of facial features in the middle patch of face processing in the macaque IT cortex may be closely related to mixture of sparse coding models.

  15. Highly conserved non-coding sequences are associated with vertebrate development.

    Directory of Open Access Journals (Sweden)

    Adam Woolfe

    2005-01-01

    Full Text Available In addition to protein coding sequence, the human genome contains a significant amount of regulatory DNA, the identification of which is proving somewhat recalcitrant to both in silico and functional methods. An approach that has been used with some success is comparative sequence analysis, whereby equivalent genomic regions from different organisms are compared in order to identify both similarities and differences. In general, similarities in sequence between highly divergent organisms imply functional constraint. We have used a whole-genome comparison between humans and the pufferfish, Fugu rubripes, to identify nearly 1,400 highly conserved non-coding sequences. Given the evolutionary divergence between these species, it is likely that these sequences are found in, and furthermore are essential to, all vertebrates. Most, and possibly all, of these sequences are located in and around genes that act as developmental regulators. Some of these sequences are over 90% identical across more than 500 bases, being more highly conserved than coding sequence between these two species. Despite this, we cannot find any similar sequences in invertebrate genomes. In order to begin to functionally test this set of sequences, we have used a rapid in vivo assay system using zebrafish embryos that allows tissue-specific enhancer activity to be identified. Functional data is presented for highly conserved non-coding sequences associated with four unrelated developmental regulators (SOX21, PAX6, HLXB9, and SHH, in order to demonstrate the suitability of this screen to a wide range of genes and expression patterns. Of 25 sequence elements tested around these four genes, 23 show significant enhancer activity in one or more tissues. We have identified a set of non-coding sequences that are highly conserved throughout vertebrates. They are found in clusters across the human genome, principally around genes that are implicated in the regulation of development

  16. Applicability evaluation on the conservative metal-water reaction(MWR) model implemented into the SPACE code

    International Nuclear Information System (INIS)

    Lee, Suk Ho; You, Sung Chang; Kim, Han Gon

    2011-01-01

    The SBLOCA (Small Break Loss-of-Coolant Accident) evaluation methodology for the APR1400 (Advanced Power Reactor 1400) is under development using the SPACE code. The goal of the development of this methodology is to set up a conservative evaluation methodology in accordance with Appendix K of 10CFR50 by the end of 2012. In order to develop the Appendix K version of the SPACE code, the code modification is considered through implementation of the code on the required evaluation models. For the conservative models required in the SPACE code, the metal-water reaction (MWR) model, the critical flow model, the Critical Heat Flux (CHF) model and the post-CHF model must be implemented in the code. At present, the integration of the model to generate the Appendix K version of SPACE is in its preliminary stage. Among them, the conservative MWR model and its code applicability are introduced in this paper

  17. Properties of Sequence Conservation in Upstream Regulatory and Protein Coding Sequences among Paralogs in Arabidopsis thaliana

    Science.gov (United States)

    Richardson, Dale N.; Wiehe, Thomas

    Whole genome duplication (WGD) has catalyzed the formation of new species, genes with novel functions, altered expression patterns, complexified signaling pathways and has provided organisms a level of genetic robustness. We studied the long-term evolution and interrelationships of 5’ upstream regulatory sequences (URSs), protein coding sequences (CDSs) and expression correlations (EC) of duplicated gene pairs in Arabidopsis. Three distinct methods revealed significant evolutionary conservation between paralogous URSs and were highly correlated with microarray-based expression correlation of the respective gene pairs. Positional information on exact matches between sequences unveiled the contribution of micro-chromosomal rearrangements on expression divergence. A three-way rank analysis of URS similarity, CDS divergence and EC uncovered specific gene functional biases. Transcription factor activity was associated with gene pairs exhibiting conserved URSs and divergent CDSs, whereas a broad array of metabolic enzymes was found to be associated with gene pairs showing diverged URSs but conserved CDSs.

  18. Identification of evolutionarily conserved non-AUG-initiated N-terminal extensions in human coding sequences.

    LENUS (Irish Health Repository)

    Ivanov, Ivaylo P

    2011-05-01

    In eukaryotes, it is generally assumed that translation initiation occurs at the AUG codon closest to the messenger RNA 5\\' cap. However, in certain cases, initiation can occur at codons differing from AUG by a single nucleotide, especially the codons CUG, UUG, GUG, ACG, AUA and AUU. While non-AUG initiation has been experimentally verified for a handful of human genes, the full extent to which this phenomenon is utilized--both for increased coding capacity and potentially also for novel regulatory mechanisms--remains unclear. To address this issue, and hence to improve the quality of existing coding sequence annotations, we developed a methodology based on phylogenetic analysis of predicted 5\\' untranslated regions from orthologous genes. We use evolutionary signatures of protein-coding sequences as an indicator of translation initiation upstream of annotated coding sequences. Our search identified novel conserved potential non-AUG-initiated N-terminal extensions in 42 human genes including VANGL2, FGFR1, KCNN4, TRPV6, HDGF, CITED2, EIF4G3 and NTF3, and also affirmed the conservation of known non-AUG-initiated extensions in 17 other genes. In several instances, we have been able to obtain independent experimental evidence of the expression of non-AUG-initiated products from the previously published literature and ribosome profiling data.

  19. Dual Coding Theory Explains Biphasic Collective Computation in Neural Decision-Making

    Directory of Open Access Journals (Sweden)

    Bryan C. Daniels

    2017-06-01

    Full Text Available A central question in cognitive neuroscience is how unitary, coherent decisions at the whole organism level can arise from the distributed behavior of a large population of neurons with only partially overlapping information. We address this issue by studying neural spiking behavior recorded from a multielectrode array with 169 channels during a visual motion direction discrimination task. It is well known that in this task there are two distinct phases in neural spiking behavior. Here we show Phase I is a distributed or incompressible phase in which uncertainty about the decision is substantially reduced by pooling information from many cells. Phase II is a redundant or compressible phase in which numerous single cells contain all the information present at the population level in Phase I, such that the firing behavior of a single cell is enough to predict the subject's decision. Using an empirically grounded dynamical modeling framework, we show that in Phase I large cell populations with low redundancy produce a slow timescale of information aggregation through critical slowing down near a symmetry-breaking transition. Our model indicates that increasing collective amplification in Phase II leads naturally to a faster timescale of information pooling and consensus formation. Based on our results and others in the literature, we propose that a general feature of collective computation is a “coding duality” in which there are accumulation and consensus formation processes distinguished by different timescales.

  20. Dual Coding Theory Explains Biphasic Collective Computation in Neural Decision-Making.

    Science.gov (United States)

    Daniels, Bryan C; Flack, Jessica C; Krakauer, David C

    2017-01-01

    A central question in cognitive neuroscience is how unitary, coherent decisions at the whole organism level can arise from the distributed behavior of a large population of neurons with only partially overlapping information. We address this issue by studying neural spiking behavior recorded from a multielectrode array with 169 channels during a visual motion direction discrimination task. It is well known that in this task there are two distinct phases in neural spiking behavior. Here we show Phase I is a distributed or incompressible phase in which uncertainty about the decision is substantially reduced by pooling information from many cells. Phase II is a redundant or compressible phase in which numerous single cells contain all the information present at the population level in Phase I, such that the firing behavior of a single cell is enough to predict the subject's decision. Using an empirically grounded dynamical modeling framework, we show that in Phase I large cell populations with low redundancy produce a slow timescale of information aggregation through critical slowing down near a symmetry-breaking transition. Our model indicates that increasing collective amplification in Phase II leads naturally to a faster timescale of information pooling and consensus formation. Based on our results and others in the literature, we propose that a general feature of collective computation is a "coding duality" in which there are accumulation and consensus formation processes distinguished by different timescales.

  1. Normalized value coding explains dynamic adaptation in the human valuation process.

    Science.gov (United States)

    Khaw, Mel W; Glimcher, Paul W; Louie, Kenway

    2017-11-28

    The notion of subjective value is central to choice theories in ecology, economics, and psychology, serving as an integrated decision variable by which options are compared. Subjective value is often assumed to be an absolute quantity, determined in a static manner by the properties of an individual option. Recent neurobiological studies, however, have shown that neural value coding dynamically adapts to the statistics of the recent reward environment, introducing an intrinsic temporal context dependence into the neural representation of value. Whether valuation exhibits this kind of dynamic adaptation at the behavioral level is unknown. Here, we show that the valuation process in human subjects adapts to the history of previous values, with current valuations varying inversely with the average value of recently observed items. The dynamics of this adaptive valuation are captured by divisive normalization, linking these temporal context effects to spatial context effects in decision making as well as spatial and temporal context effects in perception. These findings suggest that adaptation is a universal feature of neural information processing and offer a unifying explanation for contextual phenomena in fields ranging from visual psychophysics to economic choice.

  2. Conservation and losses of non-coding RNAs in avian genomes.

    Directory of Open Access Journals (Sweden)

    Paul P Gardner

    Full Text Available Here we present the results of a large-scale bioinformatics annotation of non-coding RNA loci in 48 avian genomes. Our approach uses probabilistic models of hand-curated families from the Rfam database to infer conserved RNA families within each avian genome. We supplement these annotations with predictions from the tRNA annotation tool, tRNAscan-SE and microRNAs from miRBase. We identify 34 lncRNA-associated loci that are conserved between birds and mammals and validate 12 of these in chicken. We report several intriguing cases where a reported mammalian lncRNA, but not its function, is conserved. We also demonstrate extensive conservation of classical ncRNAs (e.g., tRNAs and more recently discovered ncRNAs (e.g., snoRNAs and miRNAs in birds. Furthermore, we describe numerous "losses" of several RNA families, and attribute these to either genuine loss, divergence or missing data. In particular, we show that many of these losses are due to the challenges associated with assembling avian microchromosomes. These combined results illustrate the utility of applying homology-based methods for annotating novel vertebrate genomes.

  3. An evolutionary model for protein-coding regions with conserved RNA structure

    DEFF Research Database (Denmark)

    Pedersen, Jakob Skou; Forsberg, Roald; Meyer, Irmtraud Margret

    2004-01-01

    in the RNA structure. The overlap of these fundamental dependencies is sufficient to cause "contagious" context dependencies which cascade across many nucleotide sites. Such large-scale dependencies challenge the use of traditional phylogenetic models in evolutionary inference because they explicitly assume...... components of traditional phylogenetic models. We applied this to a data set of full-genome sequences from the hepatitis C virus where five RNA structures are mapped within the coding region. This allowed us to partition the effects of selection on different structural elements and to test various hypotheses......Here we present a model of nucleotide substitution in protein-coding regions that also encode the formation of conserved RNA structures. In such regions, apparent evolutionary context dependencies exist, both between nucleotides occupying the same codon and between nucleotides forming a base pair...

  4. Energy conservation: policy issues and end-use scenarios of savings potential. Part V. Energy efficient buildings: the causes of litigation against energy conservation building codes

    Energy Technology Data Exchange (ETDEWEB)

    Benenson, P.; Codina, R.; Cornwall, B.

    1978-09-01

    The guidelines laid out for the five subjects investigated in this series are to take a holistic view of energy conservation policies by describing the overall system in which they are implemented; provide analytical tools and sufficiently disagregated data bases that can be adapted to answer a variety of questions by the users; identify and discuss some of the important issues behind successful energy conservation policy; and develop an energy conservation policy in depth. Three specific cases reviewed are: the California nonresidential code (1976); the California residential code (1978); and the Farmers Home Administration code (1978). Although these three suits were brought by the building industry, this report also discusses considerations relevant to architects, bankers, and building inspectors. These cases are discussed from three perspectives: (1) objections to the codes explicitly stated in court, (2) industry conditions and practices behind objections stated in court, and (3) general beliefs not stated in court. This discussion focuses on suits intended to limit those building codes which the building industry sees as too strong. However, some energy conservation industries may sue to strengthen codes which they consider too weak. An example of such a case is Polarized Corporation's current suit against the Lighting section of ASHRAE 90-75 (Los Angeles Federal District Court, see Murnane, 1978). (MCW)

  5. Conservative performance analysis of a PWR nuclear fuel rod using the FRAPCON code

    Energy Technology Data Exchange (ETDEWEB)

    Oliveira, Fabio Branco Vaz de; Sabundjian, Gaiane, E-mail: fabio@ipen.br, E-mail: gdjian@ipen.br [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil)

    2015-07-01

    In this paper, some of the preliminary results of the sensitivity and conservative analysis of a hypothetical pressurized water reactor fuel rod are presented, using the FRAPCON code as a basic and preparation tool for the future transient analysis, which will be carried out by the FRAPTRAN code. Emphasis is given to the evaluation of the cladding behavior, since it is one of the critical containment barriers of the fission products, generated during fuel irradiation. Sensitivity analyses were performed by the variation of the values of some parameters, which were mainly related with thermal cycle conditions, and taking into account an intermediate value between the realistic and conservative conditions for the linear heat generation rate parameter, given in literature. Time lengths were taken from typical nuclear power plant operational cycle, adjusted to the obtention of a chosen burnup. Curves of fuel and cladding temperatures, and also for their mechanical and oxidation behavior, as a function of the reactor operation's time, are presented for each one of the nodes considered, over the nuclear fuel rod. Analyzing the curves, it was possible to observe the influence of the thermal cycle on the fuel rod performance, in this preliminary step for the accident/transient analysis. (author)

  6. CONDOR: a database resource of developmentally associated conserved non-coding elements

    Directory of Open Access Journals (Sweden)

    Smith Sarah

    2007-08-01

    Full Text Available Abstract Background Comparative genomics is currently one of the most popular approaches to study the regulatory architecture of vertebrate genomes. Fish-mammal genomic comparisons have proved powerful in identifying conserved non-coding elements likely to be distal cis-regulatory modules such as enhancers, silencers or insulators that control the expression of genes involved in the regulation of early development. The scientific community is showing increasing interest in characterizing the function, evolution and language of these sequences. Despite this, there remains little in the way of user-friendly access to a large dataset of such elements in conjunction with the analysis and the visualization tools needed to study them. Description Here we present CONDOR (COnserved Non-coDing Orthologous Regions available at: http://condor.fugu.biology.qmul.ac.uk. In an interactive and intuitive way the website displays data on > 6800 non-coding elements associated with over 120 early developmental genes and conserved across vertebrates. The database regularly incorporates results of ongoing in vivo zebrafish enhancer assays of the CNEs carried out in-house, which currently number ~100. Included and highlighted within this set are elements derived from duplication events both at the origin of vertebrates and more recently in the teleost lineage, thus providing valuable data for studying the divergence of regulatory roles between paralogs. CONDOR therefore provides a number of tools and facilities to allow scientists to progress in their own studies on the function and evolution of developmental cis-regulation. Conclusion By providing access to data with an approachable graphics interface, the CONDOR database presents a rich resource for further studies into the regulation and evolution of genes involved in early development.

  7. Building Energy Efficiency in India: Compliance Evaluation of Energy Conservation Building Code

    Energy Technology Data Exchange (ETDEWEB)

    Yu, Sha; Evans, Meredydd; Delgado, Alison

    2014-03-26

    India is experiencing unprecedented construction boom. The country doubled its floorspace between 2001 and 2005 and is expected to add 35 billion m2 of new buildings by 2050. Buildings account for 35% of total final energy consumption in India today, and building energy use is growing at 8% annually. Studies have shown that carbon policies will have little effect on reducing building energy demand. Chaturvedi et al. predicted that, if there is no specific sectoral policies to curb building energy use, final energy demand of the Indian building sector will grow over five times by the end of this century, driven by rapid income and population growth. The growing energy demand in buildings is accompanied by a transition from traditional biomass to commercial fuels, particularly an increase in electricity use. This also leads to a rapid increase in carbon emissions and aggravates power shortage in India. Growth in building energy use poses challenges to the Indian government. To curb energy consumption in buildings, the Indian government issued the Energy Conservation Building Code (ECBC) in 2007, which applies to commercial buildings with a connected load of 100 kW or 120kVA. It is predicted that the implementation of ECBC can help save 25-40% of energy, compared to reference buildings without energy-efficiency measures. However, the impact of ECBC depends on the effectiveness of its enforcement and compliance. Currently, the majority of buildings in India are not ECBC-compliant. The United Nations Development Programme projected that code compliance in India would reach 35% by 2015 and 64% by 2017. Whether the projected targets can be achieved depends on how the code enforcement system is designed and implemented. Although the development of ECBC lies in the hands of the national government – the Bureau of Energy Efficiency under the Ministry of Power, the adoption and implementation of ECBC largely relies on state and local governments. Six years after ECBC

  8. Measuring and explaining the willingness to pay for forest conservation: evidence from a survey experiment in Brazil

    Science.gov (United States)

    Bakaki, Zorzeta; Bernauer, Thomas

    2016-11-01

    Recent research suggests that there is substantial public support (including willingness to pay) for forest conservation. Based on a nationwide survey experiment in Brazil (N = 2500) the largest and richest of the world’s tropical developing countries, we shed new light on this issue. To what extent does the public in fact support forest conservation and what factors are influencing support levels? Unlike previous studies, our results show that the willingness to pay for tropical forest conservation in Brazil is rather low. Moreover, framing forest conservation in terms of biodiversity protection, which tends to create more local benefits, does not induce more support than framing conservation in terms of mitigating global climate change. The results also show that low levels of trust in public institutions have a strong negative impact on the public’s willingness to pay for forest conservation, individually and/or via government spending. What could other (richer) countries do, in this context, to encourage forest conservation in Brazil and other tropical developing countries? One key issue is whether prospects of foreign funding for forest conservation are likely to crowd out or, conversely, enhance the motivation for domestic level conservation efforts. We find that prospects of foreign funding have no significant effect on willingness to pay for forest conservation. These findings have at least three policy implications, namely, that the Brazilian public’s willingness to pay for forest conservation is very limited, that large-scale international funding is probably needed, and that such funding is unlikely to encourage more domestic effort, but is also unlikely to crowd out domestic efforts. Restoring public trust in the Brazilian government is key to increasing public support for forest conservation in Brazil.

  9. Trust, Personal Moral Codes, and the Resource-Advantage Theory of Competition: Explaining Productivity, Economic Growth, and Wealth Creation

    Directory of Open Access Journals (Sweden)

    Shelby D. Hunt

    2012-06-01

    Full Text Available Scholars agree that societal-level moral codes that promote social trust also promote wealth creation.  However, what specific kinds of societal-level moral codes promote social trust?  Also, by what specific kind of competitive process does social trust promote wealth creation?  Because societal-level moral codes are composed of or formed from peoples’ personal moral codes, this article explores a theory of ethics, known as the “Hunt-Vitell” theory of ethics, that illuminates the concept of personal moral codes and uses the theory to discuss which types of personal moral codes foster trust and distrust in society.  This article then uses resource-advantage (R-A theory, one of the most completely articulated dynamic theories of competition, to show the process by which trust-promoting, societal-level moral codes promote productivity and economic growth.  That is, they promote wealth creation.

  10. Translation Initiation from Conserved Non-AUG Codons Provides Additional Layers of Regulation and Coding Capacity

    Directory of Open Access Journals (Sweden)

    Ivaylo P. Ivanov

    2017-06-01

    Full Text Available Neurospora crassa cpc-1 and Saccharomyces cerevisiae GCN4 are homologs specifying transcription activators that drive the transcriptional response to amino acid limitation. The cpc-1 mRNA contains two upstream open reading frames (uORFs in its >700-nucleotide (nt 5′ leader, and its expression is controlled at the level of translation in response to amino acid starvation. We used N. crassa cell extracts and obtained data indicating that cpc-1 uORF1 and uORF2 are functionally analogous to GCN4 uORF1 and uORF4, respectively, in controlling translation. We also found that the 5′ region upstream of the main coding sequence of the cpc-1 mRNA extends for more than 700 nucleotides without any in-frame stop codon. For 100 cpc-1 homologs from Pezizomycotina and from selected Basidiomycota, 5′ conserved extensions of the CPC1 reading frame are also observed. Multiple non-AUG near-cognate codons (NCCs in the CPC1 reading frame upstream of uORF2, some deeply conserved, could potentially initiate translation. At least four NCCs initiated translation in vitro. In vivo data were consistent with initiation at NCCs to produce N-terminally extended N. crassa CPC1 isoforms. The pivotal role played by CPC1, combined with its translational regulation by uORFs and NCC utilization, underscores the emerging significance of noncanonical initiation events in controlling gene expression.

  11. Redefining Secondary Forests in the Mexican Forest Code: Implications for Management, Restoration, and Conservation

    Directory of Open Access Journals (Sweden)

    Francisco J. Román-Dañobeytia

    2014-05-01

    Full Text Available The Mexican Forest Code establishes structural reference values to differentiate between secondary and old-growth forests and requires a management plan when secondary forests become old-growth and potentially harvestable forests. The implications of this regulation for forest management, restoration, and conservation were assessed in the context of the Calakmul Biosphere Reserve, which is located in the Yucatan Peninsula. The basal area and stem density thresholds currently used by the legislation to differentiate old-growth from secondary forests are 4 m2/ha and 15 trees/ha (trees with a diameter at breast height of >25 cm; however, our research indicates that these values should be increased to 20 m2/ha and 100 trees/ha, respectively. Given that a management plan is required when secondary forests become old-growth forests, many landowners avoid forest-stand development by engaging slash-and-burn agriculture or cattle grazing. We present evidence that deforestation and land degradation may prevent the natural regeneration of late-successional tree species of high ecological and economic importance. Moreover, we discuss the results of this study in the light of an ongoing debate in the Yucatan Peninsula between policy makers, non-governmental organizations (NGOs, landowners and researchers, regarding the modification of this regulation to redefine the concept of acahual (secondary forest and to facilitate forest management and restoration with valuable timber tree species.

  12. Conserved syntenic clusters of protein coding genes are missing in birds.

    Science.gov (United States)

    Lovell, Peter V; Wirthlin, Morgan; Wilhelm, Larry; Minx, Patrick; Lazar, Nathan H; Carbone, Lucia; Warren, Wesley C; Mello, Claudio V

    2014-01-01

    Birds are one of the most highly successful and diverse groups of vertebrates, having evolved a number of distinct characteristics, including feathers and wings, a sturdy lightweight skeleton and unique respiratory and urinary/excretion systems. However, the genetic basis of these traits is poorly understood. Using comparative genomics based on extensive searches of 60 avian genomes, we have found that birds lack approximately 274 protein coding genes that are present in the genomes of most vertebrate lineages and are for the most part organized in conserved syntenic clusters in non-avian sauropsids and in humans. These genes are located in regions associated with chromosomal rearrangements, and are largely present in crocodiles, suggesting that their loss occurred subsequent to the split of dinosaurs/birds from crocodilians. Many of these genes are associated with lethality in rodents, human genetic disorders, or biological functions targeting various tissues. Functional enrichment analysis combined with orthogroup analysis and paralog searches revealed enrichments that were shared by non-avian species, present only in birds, or shared between all species. Together these results provide a clearer definition of the genetic background of extant birds, extend the findings of previous studies on missing avian genes, and provide clues about molecular events that shaped avian evolution. They also have implications for fields that largely benefit from avian studies, including development, immune system, oncogenesis, and brain function and cognition. With regards to the missing genes, birds can be considered ‘natural knockouts’ that may become invaluable model organisms for several human diseases.

  13. Effects of using coding potential, sequence conservation and mRNA structure conservation for predicting pyrroly-sine containing genes

    DEFF Research Database (Denmark)

    Have, Christian Theil; Zambach, Sine; Christiansen, Henning

    2013-01-01

    for prediction of pyrrolysine incorporating genes in genomes of bacteria and archaea leading to insights about the factors driving pyrrolysine translation and identification of new gene candidates. The method predicts known conserved genes with high recall and predicts several other promising candidates...... for experimental verification. The method is implemented as a computational pipeline which is available on request....

  14. Comprehensive analysis of coding-lncRNA gene co-expression network uncovers conserved functional lncRNAs in zebrafish.

    Science.gov (United States)

    Chen, Wen; Zhang, Xuan; Li, Jing; Huang, Shulan; Xiang, Shuanglin; Hu, Xiang; Liu, Changning

    2018-05-09

    Zebrafish is a full-developed model system for studying development processes and human disease. Recent studies of deep sequencing had discovered a large number of long non-coding RNAs (lncRNAs) in zebrafish. However, only few of them had been functionally characterized. Therefore, how to take advantage of the mature zebrafish system to deeply investigate the lncRNAs' function and conservation is really intriguing. We systematically collected and analyzed a series of zebrafish RNA-seq data, then combined them with resources from known database and literatures. As a result, we obtained by far the most complete dataset of zebrafish lncRNAs, containing 13,604 lncRNA genes (21,128 transcripts) in total. Based on that, a co-expression network upon zebrafish coding and lncRNA genes was constructed and analyzed, and used to predict the Gene Ontology (GO) and the KEGG annotation of lncRNA. Meanwhile, we made a conservation analysis on zebrafish lncRNA, identifying 1828 conserved zebrafish lncRNA genes (1890 transcripts) that have their putative mammalian orthologs. We also found that zebrafish lncRNAs play important roles in regulation of the development and function of nervous system; these conserved lncRNAs present a significant sequential and functional conservation, with their mammalian counterparts. By integrative data analysis and construction of coding-lncRNA gene co-expression network, we gained the most comprehensive dataset of zebrafish lncRNAs up to present, as well as their systematic annotations and comprehensive analyses on function and conservation. Our study provides a reliable zebrafish-based platform to deeply explore lncRNA function and mechanism, as well as the lncRNA commonality between zebrafish and human.

  15. Conservation

    NARCIS (Netherlands)

    Noteboom, H.P.

    1985-01-01

    The IUCN/WWF Plants Conservation Programme 1984 — 1985. World Wildlife Fund chose plants to be the subject of their fund-raising campaign in the period 1984 — 1985. The objectives were to: 1. Use information techniques to achieve the conservation objectives of the Plants Programme – to save plants;

  16. Conservation.

    Science.gov (United States)

    National Audubon Society, New York, NY.

    This set of teaching aids consists of seven Audubon Nature Bulletins, providing the teacher and student with informational reading on various topics in conservation. The bulletins have these titles: Plants as Makers of Soil, Water Pollution Control, The Ground Water Table, Conservation--To Keep This Earth Habitable, Our Threatened Air Supply,…

  17. Comparison of energy conservation building codes of Iran, Turkey, Germany, China, ISO 9164 and EN 832

    International Nuclear Information System (INIS)

    Fayaz, Rima; Kari, Behrouz M.

    2009-01-01

    To improve the energy efficiency of buildings via compliance to regulation in Iran, Code No. 19 was devised in 1991. The code lacks high level aims and objectives, addressing the characteristics of Iranian buildings. As a consequence, the code has been revised and is not completely implemented in practice, and still remains inefficient. As with any energy coding system, this code has to identify the right balance between the different energy variables for the Iranian climate and way of life. In order to assist improvements to high level objectives of Code 19, this code is compared with ISO 9164, EN 832, German regulation, TS 825 of Turkey and China's GB 50189 to understand how these have adapted international standards to national features. In order to test the appropriateness of Code 19, five case study buildings in Iran are assessed against Code 19 as well as Turkish standard TS 825 and the results are compared. The results demonstrate that Code 19 is efficient in calculations of building envelope, but it needs improvements in the areas of ventilation, gains from internal and solar sources. The paper concludes by offering suggestions for improving the code.

  18. Long non-coding RNA discovery across the genus anopheles reveals conserved secondary structures within and beyond the Gambiae complex.

    Science.gov (United States)

    Jenkins, Adam M; Waterhouse, Robert M; Muskavitch, Marc A T

    2015-04-23

    Long non-coding RNAs (lncRNAs) have been defined as mRNA-like transcripts longer than 200 nucleotides that lack significant protein-coding potential, and many of them constitute scaffolds for ribonucleoprotein complexes with critical roles in epigenetic regulation. Various lncRNAs have been implicated in the modulation of chromatin structure, transcriptional and post-transcriptional gene regulation, and regulation of genomic stability in mammals, Caenorhabditis elegans, and Drosophila melanogaster. The purpose of this study is to identify the lncRNA landscape in the malaria vector An. gambiae and assess the evolutionary conservation of lncRNAs and their secondary structures across the Anopheles genus. Using deep RNA sequencing of multiple Anopheles gambiae life stages, we have identified 2,949 lncRNAs and more than 300 previously unannotated putative protein-coding genes. The lncRNAs exhibit differential expression profiles across life stages and adult genders. We find that across the genus Anopheles, lncRNAs display much lower sequence conservation than protein-coding genes. Additionally, we find that lncRNA secondary structure is highly conserved within the Gambiae complex, but diverges rapidly across the rest of the genus Anopheles. This study offers one of the first lncRNA secondary structure analyses in vector insects. Our description of lncRNAs in An. gambiae offers the most comprehensive genome-wide insights to date into lncRNAs in this vector mosquito, and defines a set of potential targets for the development of vector-based interventions that may further curb the human malaria burden in disease-endemic countries.

  19. Development of a locally mass flux conservative computer code for calculating 3-D viscous flow in turbomachines

    Science.gov (United States)

    Walitt, L.

    1982-01-01

    The VANS successive approximation numerical method was extended to the computation of three dimensional, viscous, transonic flows in turbomachines. A cross-sectional computer code, which conserves mass flux at each point of the cross-sectional surface of computation was developed. In the VANS numerical method, the cross-sectional computation follows a blade-to-blade calculation. Numerical calculations were made for an axial annular turbine cascade and a transonic, centrifugal impeller with splitter vanes. The subsonic turbine cascade computation was generated in blade-to-blade surface to evaluate the accuracy of the blade-to-blade mode of marching. Calculated blade pressures at the hub, mid, and tip radii of the cascade agreed with corresponding measurements. The transonic impeller computation was conducted to test the newly developed locally mass flux conservative cross-sectional computer code. Both blade-to-blade and cross sectional modes of calculation were implemented for this problem. A triplet point shock structure was computed in the inducer region of the impeller. In addition, time-averaged shroud static pressures generally agreed with measured shroud pressures. It is concluded that the blade-to-blade computation produces a useful engineering flow field in regions of subsonic relative flow; and cross-sectional computation, with a locally mass flux conservative continuity equation, is required to compute the shock waves in regions of supersonic relative flow.

  20. The Rosslyn Code: Can Physics Explain a 500-Year Old Melody Etched in the Walls of a Scottish Chapel?

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Chris [State Magazine

    2011-10-19

    For centuries, historians have puzzled over a series of 213 symbols carved into the stone of Scotland’s Rosslyn Chapel. (Disclaimer: You may recognize this chapel from The Da Vinci Code, but this is real and unrelated!) Several years ago, a composer and science enthusiast noticed that the symbols bore a striking similarity to Chladni patterns, the elegant images that form on a two- dimensional surface when it vibrates at certain frequencies. This man’s theory: A 500-year-old melody was inscribed in the chapel using the language of physics. But not everyone is convinced. Slate senior editor Chris Wilson travelled to Scotland to investigate the claims and listen to this mysterious melody, whatever it is. Come find out what he discovered, including images of the patterns and audio of the music they inspired.

  1. Enforcing dust mass conservation in 3D simulations of tightly coupled grains with the PHANTOM SPH code

    Science.gov (United States)

    Ballabio, G.; Dipierro, G.; Veronesi, B.; Lodato, G.; Hutchison, M.; Laibe, G.; Price, D. J.

    2018-06-01

    We describe a new implementation of the one-fluid method in the SPH code PHANTOM to simulate the dynamics of dust grains in gas protoplanetary discs. We revise and extend previously developed algorithms by computing the evolution of a new fluid quantity that produces a more accurate and numerically controlled evolution of the dust dynamics. Moreover, by limiting the stopping time of uncoupled grains that violate the assumptions of the terminal velocity approximation, we avoid fatal numerical errors in mass conservation. We test and validate our new algorithm by running 3D SPH simulations of a large range of disc models with tightly and marginally coupled grains.

  2. Phylum-Level Conservation of Regulatory Information in Nematodes despite Extensive Non-coding Sequence Divergence

    Science.gov (United States)

    Gordon, Kacy L.; Arthur, Robert K.; Ruvinsky, Ilya

    2015-01-01

    Gene regulatory information guides development and shapes the course of evolution. To test conservation of gene regulation within the phylum Nematoda, we compared the functions of putative cis-regulatory sequences of four sets of orthologs (unc-47, unc-25, mec-3 and elt-2) from distantly-related nematode species. These species, Caenorhabditis elegans, its congeneric C. briggsae, and three parasitic species Meloidogyne hapla, Brugia malayi, and Trichinella spiralis, represent four of the five major clades in the phylum Nematoda. Despite the great phylogenetic distances sampled and the extensive sequence divergence of nematode genomes, all but one of the regulatory elements we tested are able to drive at least a subset of the expected gene expression patterns. We show that functionally conserved cis-regulatory elements have no more extended sequence similarity to their C. elegans orthologs than would be expected by chance, but they do harbor motifs that are important for proper expression of the C. elegans genes. These motifs are too short to be distinguished from the background level of sequence similarity, and while identical in sequence they are not conserved in orientation or position. Functional tests reveal that some of these motifs contribute to proper expression. Our results suggest that conserved regulatory circuitry can persist despite considerable turnover within cis elements. PMID:26020930

  3. Phylum-Level Conservation of Regulatory Information in Nematodes despite Extensive Non-coding Sequence Divergence.

    Directory of Open Access Journals (Sweden)

    Kacy L Gordon

    2015-05-01

    Full Text Available Gene regulatory information guides development and shapes the course of evolution. To test conservation of gene regulation within the phylum Nematoda, we compared the functions of putative cis-regulatory sequences of four sets of orthologs (unc-47, unc-25, mec-3 and elt-2 from distantly-related nematode species. These species, Caenorhabditis elegans, its congeneric C. briggsae, and three parasitic species Meloidogyne hapla, Brugia malayi, and Trichinella spiralis, represent four of the five major clades in the phylum Nematoda. Despite the great phylogenetic distances sampled and the extensive sequence divergence of nematode genomes, all but one of the regulatory elements we tested are able to drive at least a subset of the expected gene expression patterns. We show that functionally conserved cis-regulatory elements have no more extended sequence similarity to their C. elegans orthologs than would be expected by chance, but they do harbor motifs that are important for proper expression of the C. elegans genes. These motifs are too short to be distinguished from the background level of sequence similarity, and while identical in sequence they are not conserved in orientation or position. Functional tests reveal that some of these motifs contribute to proper expression. Our results suggest that conserved regulatory circuitry can persist despite considerable turnover within cis elements.

  4. Numerical solution of conservation equations in the transient model for the system thermal - hydraulics in the Korsar computer code

    International Nuclear Information System (INIS)

    Yudov, Y.V.

    2001-01-01

    The functional part of the KORSAR computer code is based on the computational unit for the reactor system thermal-hydraulics and other thermal power systems with water cooling. The two-phase flow dynamics of the thermal-hydraulic network is modelled by KORSAR in one-dimensional two-fluid (non-equilibrium and nonhomogeneous) approximation with the same pressure of both phases. Each phase is characterized by parameters averaged over the channel sections, and described by the conservation equations for mass, energy and momentum. The KORSAR computer code relies upon a novel approach to mathematical modelling of two-phase dispersed-annular flows. This approach allows a two-fluid model to differentiate the effects of the liquid film and droplets in the gas core on the flow characteristics. A semi-implicit numerical scheme has been chosen for deriving discrete analogs the conservation equations in KORSAR. In the semi-implicit numerical scheme, solution of finite-difference equations is reduced to the problem of determining the pressure field at a new time level. For the one-channel case, the pressure field is found from the solution of a system of linear algebraic equations by using the tri-diagonal matrix method. In the branched network calculation, the matrix of coefficients in the equations describing the pressure field is no longer tri-diagonal but has a sparseness structure. In this case, the system of linear equations for the pressure field can be solved with any of the known classical methods. Such an approach is implemented in the existing best-estimate thermal-hydraulic computer codes (TRAC, RELAP5, etc.) For the KORSAR computer code, we have developed a new non-iterative method for calculating the pressure field in the network of any topology. This method is based on the tri-diagonal matrix method and performs well when solving the thermal-hydraulic network problems. (author)

  5. The negative influences of the new brazilian forest code on the conservation of riparian forests

    Directory of Open Access Journals (Sweden)

    Silva Normandes Matos da

    2017-12-01

    Full Text Available More than one million hectares of riparian forests were degraded or altered in Mato Grosso State (Brazil up to 2009. The aim of the research is to set a comparative scenario to show differences in the quantification of environmental liabilities in riparian forest areas resulting from the change in native vegetation protection rules due to the transition between Laws 4771/65 and 12651/2012. Data collection took place in a marginal stretch of Vermelho River in Rondonópolis County, Mato Grosso State. The following data set was taken into consideration: aerial images derived from unmanned aerial vehicle, Rapid Eye satellite images and orbital images hosted at Google Earth. The spatial resolution of those images was compared. The aerial photos composed a mosaic that was photo-interpreted to generate land use and occupation classes. The riparian forest areas of a rural property were used as parameter, and their environmental situation was compared in 05 meter and 100 meter strips. Thus, by taking into consideration the current rules, 23,501 m2 of area ceased to be an environmental liability within the riparian forest and became a consolidated rural area. According to the previous Forest Code, in a different scenario, that is, in a set of rural properties, the public authority would receive USD 68,600.00 in fines. The new Brazilian Forestry Code of 2012, which replaces the previous one made in 1965, exempts those responsible for rural property from regenerating previously deforested native vegetation - an obligation established by older Forest Code. We have shown that the new Forest Code has diminished the legal responsibility of the rural owners in relation to the maintenance of forest fragments in their properties.

  6. Energy Conservation Tests of a Coupled Kinetic-kinetic Plasma-neutral Transport Code

    Energy Technology Data Exchange (ETDEWEB)

    Stotler, D. P.; Chang, C. S.; Ku, S. H.; Lang, J.; Park, G.

    2012-08-29

    A Monte Carlo neutral transport routine, based on DEGAS2, has been coupled to the guiding center ion-electron-neutral neoclassical PIC code XGC0 to provide a realistic treatment of neutral atoms and molecules in the tokamak edge plasma. The DEGAS2 routine allows detailed atomic physics and plasma-material interaction processes to be incorporated into these simulations. The spatial pro le of the neutral particle source used in the DEGAS2 routine is determined from the uxes of XGC0 ions to the material surfaces. The kinetic-kinetic plasma-neutral transport capability is demonstrated with example pedestal fueling simulations.

  7. Divergent evolutionary rates in vertebrate and mammalian specific conserved non-coding elements (CNEs) in echolocating mammals.

    Science.gov (United States)

    Davies, Kalina T J; Tsagkogeorga, Georgia; Rossiter, Stephen J

    2014-12-19

    The majority of DNA contained within vertebrate genomes is non-coding, with a certain proportion of this thought to play regulatory roles during development. Conserved Non-coding Elements (CNEs) are an abundant group of putative regulatory sequences that are highly conserved across divergent groups and thus assumed to be under strong selective constraint. Many CNEs may contain regulatory factor binding sites, and their frequent spatial association with key developmental genes - such as those regulating sensory system development - suggests crucial roles in regulating gene expression and cellular patterning. Yet surprisingly little is known about the molecular evolution of CNEs across diverse mammalian taxa or their role in specific phenotypic adaptations. We examined 3,110 vertebrate-specific and ~82,000 mammalian-specific CNEs across 19 and 9 mammalian orders respectively, and tested for changes in the rate of evolution of CNEs located in the proximity of genes underlying the development or functioning of auditory systems. As we focused on CNEs putatively associated with genes underlying the development/functioning of auditory systems, we incorporated echolocating taxa in our dataset because of their highly specialised and derived auditory systems. Phylogenetic reconstructions of concatenated CNEs broadly recovered accepted mammal relationships despite high levels of sequence conservation. We found that CNE substitution rates were highest in rodents and lowest in primates, consistent with previous findings. Comparisons of CNE substitution rates from several genomic regions containing genes linked to auditory system development and hearing revealed differences between echolocating and non-echolocating taxa. Wider taxonomic sampling of four CNEs associated with the homeobox genes Hmx2 and Hmx3 - which are required for inner ear development - revealed family-wise variation across diverse bat species. Specifically within one family of echolocating bats that utilise

  8. The Number, Organization, and Size of Polymorphic Membrane Protein Coding Sequences as well as the Most Conserved Pmp Protein Differ within and across Chlamydia Species.

    Science.gov (United States)

    Van Lent, Sarah; Creasy, Heather Huot; Myers, Garry S A; Vanrompay, Daisy

    2016-01-01

    Variation is a central trait of the polymorphic membrane protein (Pmp) family. The number of pmp coding sequences differs between Chlamydia species, but it is unknown whether the number of pmp coding sequences is constant within a Chlamydia species. The level of conservation of the Pmp proteins has previously only been determined for Chlamydia trachomatis. As different Pmp proteins might be indispensible for the pathogenesis of different Chlamydia species, this study investigated the conservation of Pmp proteins both within and across C. trachomatis,C. pneumoniae,C. abortus, and C. psittaci. The pmp coding sequences were annotated in 16 C. trachomatis, 6 C. pneumoniae, 2 C. abortus, and 16 C. psittaci genomes. The number and organization of polymorphic membrane coding sequences differed within and across the analyzed Chlamydia species. The length of coding sequences of pmpA,pmpB, and pmpH was conserved among all analyzed genomes, while the length of pmpE/F and pmpG, and remarkably also of the subtype pmpD, differed among the analyzed genomes. PmpD, PmpA, PmpH, and PmpA were the most conserved Pmp in C. trachomatis,C. pneumoniae,C. abortus, and C. psittaci, respectively. PmpB was the most conserved Pmp across the 4 analyzed Chlamydia species. © 2016 S. Karger AG, Basel.

  9. Structure-aided prediction of mammalian transcription factor complexes in conserved non-coding elements

    KAUST Repository

    Guturu, H.

    2013-11-11

    Mapping the DNA-binding preferences of transcription factor (TF) complexes is critical for deciphering the functions of cis-regulatory elements. Here, we developed a computational method that compares co-occurring motif spacings in conserved versus unconserved regions of the human genome to detect evolutionarily constrained binding sites of rigid TF complexes. Structural data were used to estimate TF complex physical plausibility, explore overlapping motif arrangements seldom tackled by non-structure-aware methods, and generate and analyse three-dimensional models of the predicted complexes bound to DNA. Using this approach, we predicted 422 physically realistic TF complex motifs at 18% false discovery rate, the majority of which (326, 77%) contain some sequence overlap between binding sites. The set of mostly novel complexes is enriched in known composite motifs, predictive of binding site configurations in TF-TF-DNA crystal structures, and supported by ChIP-seq datasets. Structural modelling revealed three cooperativity mechanisms: direct protein-protein interactions, potentially indirect interactions and \\'through-DNA\\' interactions. Indeed, 38% of the predicted complexes were found to contain four or more bases in which TF pairs appear to synergize through overlapping binding to the same DNA base pairs in opposite grooves or strands. Our TF complex and associated binding site predictions are available as a web resource at http://bejerano.stanford.edu/complex.

  10. Structure-aided prediction of mammalian transcription factor complexes in conserved non-coding elements

    KAUST Repository

    Guturu, H.; Doxey, A. C.; Wenger, A. M.; Bejerano, G.

    2013-01-01

    Mapping the DNA-binding preferences of transcription factor (TF) complexes is critical for deciphering the functions of cis-regulatory elements. Here, we developed a computational method that compares co-occurring motif spacings in conserved versus unconserved regions of the human genome to detect evolutionarily constrained binding sites of rigid TF complexes. Structural data were used to estimate TF complex physical plausibility, explore overlapping motif arrangements seldom tackled by non-structure-aware methods, and generate and analyse three-dimensional models of the predicted complexes bound to DNA. Using this approach, we predicted 422 physically realistic TF complex motifs at 18% false discovery rate, the majority of which (326, 77%) contain some sequence overlap between binding sites. The set of mostly novel complexes is enriched in known composite motifs, predictive of binding site configurations in TF-TF-DNA crystal structures, and supported by ChIP-seq datasets. Structural modelling revealed three cooperativity mechanisms: direct protein-protein interactions, potentially indirect interactions and 'through-DNA' interactions. Indeed, 38% of the predicted complexes were found to contain four or more bases in which TF pairs appear to synergize through overlapping binding to the same DNA base pairs in opposite grooves or strands. Our TF complex and associated binding site predictions are available as a web resource at http://bejerano.stanford.edu/complex.

  11. Predicting Motivation: Computational Models of PFC Can Explain Neural Coding of Motivation and Effort-based Decision-making in Health and Disease.

    Science.gov (United States)

    Vassena, Eliana; Deraeve, James; Alexander, William H

    2017-10-01

    Human behavior is strongly driven by the pursuit of rewards. In daily life, however, benefits mostly come at a cost, often requiring that effort be exerted to obtain potential benefits. Medial PFC (MPFC) and dorsolateral PFC (DLPFC) are frequently implicated in the expectation of effortful control, showing increased activity as a function of predicted task difficulty. Such activity partially overlaps with expectation of reward and has been observed both during decision-making and during task preparation. Recently, novel computational frameworks have been developed to explain activity in these regions during cognitive control, based on the principle of prediction and prediction error (predicted response-outcome [PRO] model [Alexander, W. H., & Brown, J. W. Medial prefrontal cortex as an action-outcome predictor. Nature Neuroscience, 14, 1338-1344, 2011], hierarchical error representation [HER] model [Alexander, W. H., & Brown, J. W. Hierarchical error representation: A computational model of anterior cingulate and dorsolateral prefrontal cortex. Neural Computation, 27, 2354-2410, 2015]). Despite the broad explanatory power of these models, it is not clear whether they can also accommodate effects related to the expectation of effort observed in MPFC and DLPFC. Here, we propose a translation of these computational frameworks to the domain of effort-based behavior. First, we discuss how the PRO model, based on prediction error, can explain effort-related activity in MPFC, by reframing effort-based behavior in a predictive context. We propose that MPFC activity reflects monitoring of motivationally relevant variables (such as effort and reward), by coding expectations and discrepancies from such expectations. Moreover, we derive behavioral and neural model-based predictions for healthy controls and clinical populations with impairments of motivation. Second, we illustrate the possible translation to effort-based behavior of the HER model, an extended version of PRO

  12. Ontario emissions trading code : emission reduction credit creation, recording and transfer rules, rules for renewable energy projects and conservation projects, and rules for the operation of the Ontario Emissions Trading Registry

    International Nuclear Information System (INIS)

    2001-12-01

    Emissions trading has been an integral part of Ontario's air quality strategy since December 31, 2001. Ontario has adopted the 'cap, credit and trade' type of emissions trading system, a hybrid that takes the best features of pure 'cap-and-trade' and 'baseline-and-credit' type systems. It covers nitric oxide and sulphur dioxide. The Ontario Emissions Trading Code supplements Ontario Regulation 397/01 and sets out rules for renewable energy projects and conservation projects for which applications for emission allowances can be made. This Code describes the rules for the creation and transfer of emission reduction credits (ERCs). It also explains the rules for the operation of the registry that has been established to provide information to the public about the emissions trading program and records decisions about credit creation and credit and allowance retirement. 3 tabs

  13. 78 FR 18321 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2013-03-26

    ... Energy Conservation Code. International Existing Building Code. International Fire Code. International... Code. International Property Maintenance Code. International Residential Code. International Swimming Pool and Spa Code International Wildland-Urban Interface Code. International Zoning Code. ICC Standards...

  14. Critical review of conservation equations for two-phase flow in the U.S. NRC TRACE code

    International Nuclear Information System (INIS)

    Wulff, Wolfgang

    2011-01-01

    Research highlights: → Field equations as implemented in TRACE are incorrect. → Boundary conditions needed for cooling of nuclear fuel elements are wrong. → The two-fluid model in TRACE is not closed. → Three-dimensional flow modeling in TRACE has no basis. - Abstract: The field equations for two-phase flow in the computer code TRAC/RELAP Advanced Computational Engine or TRACE are examined to determine their validity, their capabilities and limitations in resolving nuclear reactor safety issues. TRACE was developed for the NRC to predict thermohydraulic phenomena in nuclear power plants during operational transients and postulated accidents. TRACE is based on the rigorously derived and well-established two-fluid field equations for 1-D and 3-D two-phase flow. It is shown that: (1)The two-fluid field equations for mass conservation as implemented in TRACE are wrong because local mass balances in TRACE are in conflict with mass conservation for the whole reactor system, as shown in Section . (2)Wrong equations of motion are used in TRACE in place of momentum balances, compromising at branch points the prediction of momentum transfer between, and the coupling of, loops in hydraulic networks by impedance (form loss and wall shear) and by inertia and thereby the simulation of reactor component interactions. (3)Most seriously, TRACE calculation of heat transfer from fuel elements is incorrect for single and two-phase flows, because Eq. of the TRACE Manual is wrong (see Section ). (4)Boundary conditions for momentum and energy balances in TRACE are restricted to flow regimes with single-phase wall contact because TRACE lacks constitutive relations for solid-fluid exchange of momentum and heat in prevailing flow regimes. Without a quantified assessment of consequences from (3) to (4), predictions of phasic fluid velocities, fuel temperatures and important safety parameters, e.g., peak clad temperature, are questionable. Moreover, TRACE cannot predict 3-D single- or

  15. WAP explained

    International Nuclear Information System (INIS)

    Kaiser, M.J.; Pulsipher, A.G.

    2004-01-01

    The Weatherization Assistance Program (WAP) is a federal block grant program administered by all 50 states and the District of Columbia through community action agencies, state energy offices, local government, and other nonprofit organizations to provide weatherization services to eligible households. The WAP was established in 1976 to increase the energy efficiency, reduce the energy expenditures, and improve the health and safety of low-income households, especially those households that are particularly vulnerable such as families with children, persons with disabilities, and the elderly. The manner in which WAP funds have been allocated to states, however, has been a contentious issue since the inception of the program. Southern states have argued that too much of the federal funding goes to cold-climate and rural states. Northern states disagree. In 1990, Congress amended the Energy Conservation and Production Act and required the Department of Energy to develop a new funding formula. The Department of Energy currently uses a three-factor formula developed in 1995 in conjunction with a two-factor formula developed in 1977 and a hold-harmless provision to allocate WAP funding. The purpose of this paper is to explain the WAP allocation mechanism and the assumptions associated with the 1977 and the 1995 funding formula. The factors that compose each funding formula are critically assessed and various implementation issues are reviewed, including the selection of the trigger point and program capacity levels. It is not possible to define the need for weatherization assistance objectively and in a unique manner, and this ambiguity is the main reason why the WAP allocation mechanism is expected to remain a lively topic of debate and contention

  16. Complexity explained

    CERN Document Server

    Erdi, Peter

    2008-01-01

    This book explains why complex systems research is important in understanding the structure, function and dynamics of complex natural and social phenomena. Readers will learn the basic concepts and methods of complex system research.

  17. Energy conservation according to the building codes of the National Board of Housing, Building and Planning; Energihushaallning enligt Boverkets byggregler

    Energy Technology Data Exchange (ETDEWEB)

    2009-10-15

    To comply with international and national targets for energy use, the National Board has adopted rules setting the levels to be met in order to conserve energy in buildings. The rules for buildings are shown in Boverkets building regulations (BBR). The BBR lists comprehensive requirements in order to ensure that a building must not use more than a certain number of kilowatt hours per square meter and year. There are more detailed requirements for thermal insulation, heating, cooling and air conditioning installations, efficient use of electricity and installation of metering systems for monitoring of building energy. The latest version of the BBR came into force on February 1, 2009 and has more stringent requirements for the buildings heated by electricity or comfort cooling powered by electricity. This handbook presents comments and answers to questions about the new rules for energy conservation. It replaces our previous handbook 'Thermal calculations'

  18. 75 FR 19944 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2010-04-16

    ... documents from ICC's Chicago District Office: International Code Council, 4051 W Flossmoor Road, Country... Energy Conservation Code. International Existing Building Code. International Fire Code. International...

  19. Highly conserved non-coding elements on either side of SOX9 associated with Pierre Robin sequence.

    Science.gov (United States)

    Benko, Sabina; Fantes, Judy A; Amiel, Jeanne; Kleinjan, Dirk-Jan; Thomas, Sophie; Ramsay, Jacqueline; Jamshidi, Negar; Essafi, Abdelkader; Heaney, Simon; Gordon, Christopher T; McBride, David; Golzio, Christelle; Fisher, Malcolm; Perry, Paul; Abadie, Véronique; Ayuso, Carmen; Holder-Espinasse, Muriel; Kilpatrick, Nicky; Lees, Melissa M; Picard, Arnaud; Temple, I Karen; Thomas, Paul; Vazquez, Marie-Paule; Vekemans, Michel; Roest Crollius, Hugues; Hastie, Nicholas D; Munnich, Arnold; Etchevers, Heather C; Pelet, Anna; Farlie, Peter G; Fitzpatrick, David R; Lyonnet, Stanislas

    2009-03-01

    Pierre Robin sequence (PRS) is an important subgroup of cleft palate. We report several lines of evidence for the existence of a 17q24 locus underlying PRS, including linkage analysis results, a clustering of translocation breakpoints 1.06-1.23 Mb upstream of SOX9, and microdeletions both approximately 1.5 Mb centromeric and approximately 1.5 Mb telomeric of SOX9. We have also identified a heterozygous point mutation in an evolutionarily conserved region of DNA with in vitro and in vivo features of a developmental enhancer. This enhancer is centromeric to the breakpoint cluster and maps within one of the microdeletion regions. The mutation abrogates the in vitro enhancer function and alters binding of the transcription factor MSX1 as compared to the wild-type sequence. In the developing mouse mandible, the 3-Mb region bounded by the microdeletions shows a regionally specific chromatin decompaction in cells expressing Sox9. Some cases of PRS may thus result from developmental misexpression of SOX9 due to disruption of very-long-range cis-regulatory elements.

  20. SPSS explained

    CERN Document Server

    Hinton, Perry R; Brownlow, Charlotte

    2014-01-01

    SPSS Explained provides the student with all that they need to undertake statistical analysis using SPSS. It combines a step-by-step approach to each procedure with easy to follow screenshots at each stage of the process. A number of other helpful features are provided: regular advice boxes with tips specific to each test explanations divided into 'essential' and 'advanced' sections to suit readers at different levels frequently asked questions at the end of each chapter. The first edition of this popular book has been fully updated for IBM SPSS version 21 and also includes: chapters that expl

  1. Genome-wide conserved non-coding microsatellite (CNMS) marker-based integrative genetical genomics for quantitative dissection of seed weight in chickpea.

    Science.gov (United States)

    Bajaj, Deepak; Saxena, Maneesha S; Kujur, Alice; Das, Shouvik; Badoni, Saurabh; Tripathi, Shailesh; Upadhyaya, Hari D; Gowda, C L L; Sharma, Shivali; Singh, Sube; Tyagi, Akhilesh K; Parida, Swarup K

    2015-03-01

    Phylogenetic footprinting identified 666 genome-wide paralogous and orthologous CNMS (conserved non-coding microsatellite) markers from 5'-untranslated and regulatory regions (URRs) of 603 protein-coding chickpea genes. The (CT)n and (GA)n CNMS carrying CTRMCAMV35S and GAGA8BKN3 regulatory elements, respectively, are abundant in the chickpea genome. The mapped genic CNMS markers with robust amplification efficiencies (94.7%) detected higher intraspecific polymorphic potential (37.6%) among genotypes, implying their immense utility in chickpea breeding and genetic analyses. Seventeen differentially expressed CNMS marker-associated genes showing strong preferential and seed tissue/developmental stage-specific expression in contrasting genotypes were selected to narrow down the gene targets underlying seed weight quantitative trait loci (QTLs)/eQTLs (expression QTLs) through integrative genetical genomics. The integration of transcript profiling with seed weight QTL/eQTL mapping, molecular haplotyping, and association analyses identified potential molecular tags (GAGA8BKN3 and RAV1AAT regulatory elements and alleles/haplotypes) in the LOB-domain-containing protein- and KANADI protein-encoding transcription factor genes controlling the cis-regulated expression for seed weight in the chickpea. This emphasizes the potential of CNMS marker-based integrative genetical genomics for the quantitative genetic dissection of complex seed weight in chickpea. © The Author 2014. Published by Oxford University Press on behalf of the Society for Experimental Biology.

  2. A Common histone modification code on C4 genes in maize and its conservation in Sorghum and Setaria italica.

    Science.gov (United States)

    Heimann, Louisa; Horst, Ina; Perduns, Renke; Dreesen, Björn; Offermann, Sascha; Peterhansel, Christoph

    2013-05-01

    C4 photosynthesis evolved more than 60 times independently in different plant lineages. Each time, multiple genes were recruited into C4 metabolism. The corresponding promoters acquired new regulatory features such as high expression, light induction, or cell type-specific expression in mesophyll or bundle sheath cells. We have previously shown that histone modifications contribute to the regulation of the model C4 phosphoenolpyruvate carboxylase (C4-Pepc) promoter in maize (Zea mays). We here tested the light- and cell type-specific responses of three selected histone acetylations and two histone methylations on five additional C4 genes (C4-Ca, C4-Ppdk, C4-Me, C4-Pepck, and C4-RbcS2) in maize. Histone acetylation and nucleosome occupancy assays indicated extended promoter regions with regulatory upstream regions more than 1,000 bp from the transcription initiation site for most of these genes. Despite any detectable homology of the promoters on the primary sequence level, histone modification patterns were highly coregulated. Specifically, H3K9ac was regulated by illumination, whereas H3K4me3 was regulated in a cell type-specific manner. We further compared histone modifications on the C4-Pepc and C4-Me genes from maize and the homologous genes from sorghum (Sorghum bicolor) and Setaria italica. Whereas sorghum and maize share a common C4 origin, C4 metabolism evolved independently in S. italica. The distribution of histone modifications over the promoters differed between the species, but differential regulation of light-induced histone acetylation and cell type-specific histone methylation were evident in all three species. We propose that a preexisting histone code was recruited into C4 promoter control during the evolution of C4 metabolism.

  3. Conservation of σ28-Dependent Non-Coding RNA Paralogs and Predicted σ54-Dependent Targets in Thermophilic Campylobacter Species.

    Directory of Open Access Journals (Sweden)

    My Thanh Le

    Full Text Available Assembly of flagella requires strict hierarchical and temporal control via flagellar sigma and anti-sigma factors, regulatory proteins and the assembly complex itself, but to date non-coding RNAs (ncRNAs have not been described to regulate genes directly involved in flagellar assembly. In this study we have investigated the possible role of two ncRNA paralogs (CjNC1, CjNC4 in flagellar assembly and gene regulation of the diarrhoeal pathogen Campylobacter jejuni. CjNC1 and CjNC4 are 37/44 nt identical and predicted to target the 5' untranslated region (5' UTR of genes transcribed from the flagellar sigma factor σ54. Orthologs of the σ54-dependent 5' UTRs and ncRNAs are present in the genomes of other thermophilic Campylobacter species, and transcription of CjNC1 and CNC4 is dependent on the flagellar sigma factor σ28. Surprisingly, inactivation and overexpression of CjNC1 and CjNC4 did not affect growth, motility or flagella-associated phenotypes such as autoagglutination. However, CjNC1 and CjNC4 were able to mediate sequence-dependent, but Hfq-independent, partial repression of fluorescence of predicted target 5' UTRs in an Escherichia coli-based GFP reporter gene system. This hints towards a subtle role for the CjNC1 and CjNC4 ncRNAs in post-transcriptional gene regulation in thermophilic Campylobacter species, and suggests that the currently used phenotypic methodologies are insufficiently sensitive to detect such subtle phenotypes. The lack of a role of Hfq in the E. coli GFP-based system indicates that the CjNC1 and CjNC4 ncRNAs may mediate post-transcriptional gene regulation in ways that do not conform to the paradigms obtained from the Enterobacteriaceae.

  4. Conservation of σ28-Dependent Non-Coding RNA Paralogs and Predicted σ54-Dependent Targets in Thermophilic Campylobacter Species

    Science.gov (United States)

    Le, My Thanh; van Veldhuizen, Mart; Porcelli, Ida; Bongaerts, Roy J.; Gaskin, Duncan J. H.; Pearson, Bruce M.; van Vliet, Arnoud H. M.

    2015-01-01

    Assembly of flagella requires strict hierarchical and temporal control via flagellar sigma and anti-sigma factors, regulatory proteins and the assembly complex itself, but to date non-coding RNAs (ncRNAs) have not been described to regulate genes directly involved in flagellar assembly. In this study we have investigated the possible role of two ncRNA paralogs (CjNC1, CjNC4) in flagellar assembly and gene regulation of the diarrhoeal pathogen Campylobacter jejuni. CjNC1 and CjNC4 are 37/44 nt identical and predicted to target the 5' untranslated region (5' UTR) of genes transcribed from the flagellar sigma factor σ54. Orthologs of the σ54-dependent 5' UTRs and ncRNAs are present in the genomes of other thermophilic Campylobacter species, and transcription of CjNC1 and CNC4 is dependent on the flagellar sigma factor σ28. Surprisingly, inactivation and overexpression of CjNC1 and CjNC4 did not affect growth, motility or flagella-associated phenotypes such as autoagglutination. However, CjNC1 and CjNC4 were able to mediate sequence-dependent, but Hfq-independent, partial repression of fluorescence of predicted target 5' UTRs in an Escherichia coli-based GFP reporter gene system. This hints towards a subtle role for the CjNC1 and CjNC4 ncRNAs in post-transcriptional gene regulation in thermophilic Campylobacter species, and suggests that the currently used phenotypic methodologies are insufficiently sensitive to detect such subtle phenotypes. The lack of a role of Hfq in the E. coli GFP-based system indicates that the CjNC1 and CjNC4 ncRNAs may mediate post-transcriptional gene regulation in ways that do not conform to the paradigms obtained from the Enterobacteriaceae. PMID:26512728

  5. Astronomy Explained

    Science.gov (United States)

    North, Gerald

    Every year large numbers of people take up the study of astronomy, mostly at amateur level. There are plenty of elementary books on the market, full of colourful photographs, but lacking in proper explanations of how and why things are as they are. Many people eventually wish to go beyond the 'coffee-table book' stage and study this fascinating subject in greater depth. This book is written for them. In addition, many people sit for public examinations in this subject each year and this book is also intended to be of use to them. All the topics from the GCSE syllabus are covered here, with sample questions at the end of each chapter. Astronomy Explained provides a comprehensive treatment of the subject in more depth than is usually found in elementary works, and will be of interest to both amateur astronomers and students of astronomy.

  6. Purifying selection acts on coding and non-coding sequences of paralogous genes in Arabidopsis thaliana.

    Science.gov (United States)

    Hoffmann, Robert D; Palmgren, Michael

    2016-06-13

    Whole-genome duplications in the ancestors of many diverse species provided the genetic material for evolutionary novelty. Several models explain the retention of paralogous genes. However, how these models are reflected in the evolution of coding and non-coding sequences of paralogous genes is unknown. Here, we analyzed the coding and non-coding sequences of paralogous genes in Arabidopsis thaliana and compared these sequences with those of orthologous genes in Arabidopsis lyrata. Paralogs with lower expression than their duplicate had more nonsynonymous substitutions, were more likely to fractionate, and exhibited less similar expression patterns with their orthologs in the other species. Also, lower-expressed genes had greater tissue specificity. Orthologous conserved non-coding sequences in the promoters, introns, and 3' untranslated regions were less abundant at lower-expressed genes compared to their higher-expressed paralogs. A gene ontology (GO) term enrichment analysis showed that paralogs with similar expression levels were enriched in GO terms related to ribosomes, whereas paralogs with different expression levels were enriched in terms associated with stress responses. Loss of conserved non-coding sequences in one gene of a paralogous gene pair correlates with reduced expression levels that are more tissue specific. Together with increased mutation rates in the coding sequences, this suggests that similar forces of purifying selection act on coding and non-coding sequences. We propose that coding and non-coding sequences evolve concurrently following gene duplication.

  7. Modification of the FEM3 model to ensure mass conservation

    International Nuclear Information System (INIS)

    Gresho, P.M.

    1987-01-01

    The problem of global mass conservation (lack thereof) in the current anelastic equations solved by FEM3 is described and its cause explained. The additional equations necessary to solve the problem are presented and methods for their incorporation into the current code are suggested. 14 refs

  8. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  9. Primary structure and promoter analysis of leghemoglobin genes of the stem-nodulated tropical legume Sesbania rostrata: conserved coding sequences, cis-elements and trans-acting factors

    DEFF Research Database (Denmark)

    Metz, B A; Welters, P; Hoffmann, H J

    1988-01-01

    The primary structure of a leghemoglobin (lb) gene from the stem-nodulated, tropical legume Sesbania rostrata and two lb gene promoter regions was analysed. The S. rostrata lb gene structure and Lb amino acid composition were found to be highly conserved with previously described lb genes and Lb ...

  10. Explaining Away Intuitions

    Directory of Open Access Journals (Sweden)

    Jonathan Ichikawa

    2009-12-01

    Full Text Available What is it to explain away an intuition? Philosophers regularly attempt to explain intuitions away, but it is often unclear what the success conditions for their project consist in. I attempt to articulate some of these conditions, taking philosophical case studies as guides, and arguing that many attempts to explain away intuitions underestimate the challenge the project of explaining away involves. I will conclude, therefore, that explaining away intuitions is a more difficult task than has sometimes been appreciated; I also suggest, however, that the importance of explaining away intuitions has often been exaggerated.

  11. THE END OF TRANSGENIC FOOD LABELING AND THE RIGHT TO INFORMATION CONSERVED BY THE CONSUMER DEFENSE CODE IN THE LIGHT OF THE FEDERAL CONSTITUTION OF 1988

    Directory of Open Access Journals (Sweden)

    Ingrid Lima Barbosa

    2018-03-01

    Full Text Available Bill No. 4.148/08 intends to eliminate the requirement for the “T” symbol in the packaging of products containing more than one percent of GMOs in its composition, due to the alleged negative charge that it presents, going against what is advocated by the Biosafety Law, the Consumer Defense Code, as well as the Federal Constitution. Thus, the objective is to analyze the consequences to consumers, in case the bill is eventually sanctioned, as well as if there is an affront to the fundamental precepts listed in the Magna Carta and other legal diplomas, through the inductive method of research supported by the bibliographic collection available. It was concluded that, in addition to confronting the provisions of the Consumer Defense Code, there is also a violation of the Cartagena Protocol on Biosafety, as well as the material unconstitutionality of Bill No. 4.148/08, resulting from the affront to articles 5, XIV and XXXII, and 170, V of the Constitution.

  12. Code Cactus; Code Cactus

    Energy Technology Data Exchange (ETDEWEB)

    Fajeau, M; Nguyen, L T; Saunier, J [Commissariat a l' Energie Atomique, Centre d' Etudes Nucleaires de Saclay, 91 - Gif-sur-Yvette (France)

    1966-09-01

    This code handles the following problems: -1) Analysis of thermal experiments on a water loop at high or low pressure; steady state or transient behavior; -2) Analysis of thermal and hydrodynamic behavior of water-cooled and moderated reactors, at either high or low pressure, with boiling permitted; fuel elements are assumed to be flat plates: - Flowrate in parallel channels coupled or not by conduction across plates, with conditions of pressure drops or flowrate, variable or not with respect to time is given; the power can be coupled to reactor kinetics calculation or supplied by the code user. The code, containing a schematic representation of safety rod behavior, is a one dimensional, multi-channel code, and has as its complement (FLID), a one-channel, two-dimensional code. (authors) [French] Ce code permet de traiter les problemes ci-dessous: 1. Depouillement d'essais thermiques sur boucle a eau, haute ou basse pression, en regime permanent ou transitoire; 2. Etudes thermiques et hydrauliques de reacteurs a eau, a plaques, a haute ou basse pression, ebullition permise: - repartition entre canaux paralleles, couples on non par conduction a travers plaques, pour des conditions de debit ou de pertes de charge imposees, variables ou non dans le temps; - la puissance peut etre couplee a la neutronique et une representation schematique des actions de securite est prevue. Ce code (Cactus) a une dimension d'espace et plusieurs canaux, a pour complement Flid qui traite l'etude d'un seul canal a deux dimensions. (auteurs)

  13. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  14. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    This thesis consists of six chapters. The first chapter, contains a short introduction to coding theory in which we explain the coding theory concepts we use. In the second chapter, we present the required theory for evaluation codes and also give an example of some fundamental codes in coding...... theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four...

  15. A Common Histone Modification Code on C4 Genes in Maize and Its Conservation in Sorghum and Setaria italica1[W][OA

    Science.gov (United States)

    Heimann, Louisa; Horst, Ina; Perduns, Renke; Dreesen, Björn; Offermann, Sascha; Peterhansel, Christoph

    2013-01-01

    C4 photosynthesis evolved more than 60 times independently in different plant lineages. Each time, multiple genes were recruited into C4 metabolism. The corresponding promoters acquired new regulatory features such as high expression, light induction, or cell type-specific expression in mesophyll or bundle sheath cells. We have previously shown that histone modifications contribute to the regulation of the model C4 phosphoenolpyruvate carboxylase (C4-Pepc) promoter in maize (Zea mays). We here tested the light- and cell type-specific responses of three selected histone acetylations and two histone methylations on five additional C4 genes (C4-Ca, C4-Ppdk, C4-Me, C4-Pepck, and C4-RbcS2) in maize. Histone acetylation and nucleosome occupancy assays indicated extended promoter regions with regulatory upstream regions more than 1,000 bp from the transcription initiation site for most of these genes. Despite any detectable homology of the promoters on the primary sequence level, histone modification patterns were highly coregulated. Specifically, H3K9ac was regulated by illumination, whereas H3K4me3 was regulated in a cell type-specific manner. We further compared histone modifications on the C4-Pepc and C4-Me genes from maize and the homologous genes from sorghum (Sorghum bicolor) and Setaria italica. Whereas sorghum and maize share a common C4 origin, C4 metabolism evolved independently in S. italica. The distribution of histone modifications over the promoters differed between the species, but differential regulation of light-induced histone acetylation and cell type-specific histone methylation were evident in all three species. We propose that a preexisting histone code was recruited into C4 promoter control during the evolution of C4 metabolism. PMID:23564230

  16. Plagiarism explainer for students

    OpenAIRE

    Barba, Lorena A.

    2016-01-01

    A slide deck to serve as an explainer of plagiarism in academic settings, with a personal viewpoint. For my students.Also on SpeakerDeck:https://speakerdeck.com/labarba/plagiarism-explainer-for-students(The slide viewer on SpeakerDeck is much nicer.)

  17. Majorana fermion codes

    International Nuclear Information System (INIS)

    Bravyi, Sergey; Terhal, Barbara M; Leemhuis, Bernhard

    2010-01-01

    We initiate the study of Majorana fermion codes (MFCs). These codes can be viewed as extensions of Kitaev's one-dimensional (1D) model of unpaired Majorana fermions in quantum wires to higher spatial dimensions and interacting fermions. The purpose of MFCs is to protect quantum information against low-weight fermionic errors, that is, operators acting on sufficiently small subsets of fermionic modes. We examine to what extent MFCs can surpass qubit stabilizer codes in terms of their stability properties. A general construction of 2D MFCs is proposed that combines topological protection based on a macroscopic code distance with protection based on fermionic parity conservation. Finally, we use MFCs to show how to transform any qubit stabilizer code to a weakly self-dual CSS code.

  18. Computer jargon explained

    CERN Document Server

    Enticknap, Nicholas

    2014-01-01

    Computer Jargon Explained is a feature in Computer Weekly publications that discusses 68 of the most commonly used technical computing terms. The book explains what the terms mean and why the terms are important to computer professionals. The text also discusses how the terms relate to the trends and developments that are driving the information technology industry. Computer jargon irritates non-computer people and in turn causes problems for computer people. The technology and the industry are changing so rapidly; it is very hard even for professionals to keep updated. Computer people do not

  19. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  20. Self-explaining roads

    NARCIS (Netherlands)

    Horst, A.R.A. van der; Kaptein, N.

    1999-01-01

    As a means to a sustainable safe traffic environment the concept of Self-Explaining Roads (SER) has been developed. The SER concept advocates a traffic environment that elicits safe driving behaviour simply by its design. In order to support safe driving behaviour and appropriate speed choice,

  1. Explaining autism spectrum disorders: central coherence vs. predictive coding theories.

    Science.gov (United States)

    Chan, Jason S; Naumer, Marcus J

    2014-12-01

    In this article, we review a recent paper by Stevenson et al. (J Neurosci 34: 691-697, 2014). This paper illustrates the need to present different forms of stimuli in order to characterize the perceptual abilities of people with autism spectrum disorder (ASD). Furthermore, we will discuss their behavioral results and offer an opposing viewpoint to the suggested neuronal drivers of ASD. Copyright © 2014 the American Physiological Society.

  2. MAGMADIM: Young Explainers Program

    International Nuclear Information System (INIS)

    Paltiel, Z.

    2005-01-01

    Full Text:Physics teachers and educators constantly face the problem of inspiring their students to major in physics. On the other hand, science museums are designed to provide a pleasant environment which will stimulate and encourage a science associated experience to the general public. Typically, there is no intention to teach science as such in science museums. One may, however, use the science museum to teach and inspire certain groups of students in a much deeper sense. In fact they may actually enthusiastically learn much of the school physics curriculum at the museum. This report discusses the Magmadim program through which 10th graders are trained to be young explainers at the Weizmann Institutes Clore Garden of Science. To this end they study the physics underlying its exhibits in an after-school course. The ultimate goal is for the 'magmadim' to become the best possible explainers and be able to face all sorts of museum visitors. Along with learning how to instruct visitors, they must learn the physics behind the exhibits to give a full explanation of the exhibit and be able to answer any question that may arise. Our 5 year experience with the program shows that its self-selected participants not only study a lot of science, but also like it and learn how to explain the content to other people. This program, along with similar programs at the Bloomfield Science Museum and the Madatzim (young physics tutors) program of Ort, help in promoting the interest in science in general and physics in particular among school students. Various ways to expand the programs will also be discussed

  3. Linear Algebra Thoroughly Explained

    CERN Document Server

    Vujičić, Milan

    2008-01-01

    Linear Algebra Thoroughly Explained provides a comprehensive introduction to the subject suitable for adoption as a self-contained text for courses at undergraduate and postgraduate level. The clear and comprehensive presentation of the basic theory is illustrated throughout with an abundance of worked examples. The book is written for teachers and students of linear algebra at all levels and across mathematics and the applied sciences, particularly physics and engineering. It will also be an invaluable addition to research libraries as a comprehensive resource book for the subject.

  4. Conservation Value

    OpenAIRE

    Tisdell, Clement A.

    2010-01-01

    This paper outlines the significance of the concept of conservation value and discusses ways in which it is determined paying attention to views stemming from utilitarian ethics and from deontological ethics. The importance of user costs in relation to economic decisions about the conservation and use of natural resources is emphasised. Particular attention is given to competing views about the importance of conserving natural resources in order to achieve economic sustainability. This then l...

  5. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  6. Matlab for engineers explained

    CERN Document Server

    Gustafsson, Fredrik

    2003-01-01

    This book is written for students at bachelor and master programs and has four different purposes, which split the book into four parts: 1. To teach first or early year undergraduate engineering students basic knowledge in technical computations and programming using MATLAB. The first part starts from first principles and is therefore well suited both for readers with prior exposure to MATLAB but lacking a solid foundational knowledge of the capabilities of the system and readers not having any previous experience with MATLAB. The foundational knowledge gained from these interactive guided tours of the system will hopefully be sufficient for an effective utilization of MATLAB in the engineering profession, in education and in research. 2. To explain the foundations of more advanced use of MATLAB using the facilities added the last couple of years, such as extended data structures, object orientation and advanced graphics. 3. To give an introduction to the use of MATLAB in typical undergraduate courses in elec...

  7. Models and Correlations of Interfacial and Wall Frictions for the SPACE code

    International Nuclear Information System (INIS)

    Kim, Soo Hyung; Hwang, Moon Kyu; Chung, Bub Dong

    2010-04-01

    This report describes models and correlations for the interfacial and wall frictions implemented in the SPACE code which has the capability to predict thermal-hydraulic behavior of nuclear power plants. The interfacial and wall frictions are essential to solve the momentum conservation equations of gas, continuous liquid and droplet. The interfacial and wall frictions are dealt in the Chapter 2 and 3, respectively. In Chapter 4, selection criteria for models and correlations are explained. In Chapter 5, the origins of the selected models and correlations used in this code are examined to check whether they are in confliction with intellectual proprietary rights

  8. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  9. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  10. Dictionary of applied energy conservation

    Energy Technology Data Exchange (ETDEWEB)

    Kut, D

    1982-01-01

    The escalating cost of energy is drawing an ever increasing number of people into the planning and execution of energy conservation measures and programs and confronts them with the specialist terminology of the conservationist. The object of this illustrated dictionary is to list the generality of terms employed in energy conservation practice and to explain, with the aid of appropriate illustrations, the basic definitions and underlying techniques.

  11. Hydrodynamics in full general relativity with conservative adaptive mesh refinement

    Science.gov (United States)

    East, William E.; Pretorius, Frans; Stephens, Branson C.

    2012-06-01

    There is great interest in numerical relativity simulations involving matter due to the likelihood that binary compact objects involving neutron stars will be detected by gravitational wave observatories in the coming years, as well as to the possibility that binary compact object mergers could explain short-duration gamma-ray bursts. We present a code designed for simulations of hydrodynamics coupled to the Einstein field equations targeted toward such applications. This code has recently been used to study eccentric mergers of black hole-neutron star binaries. We evolve the fluid conservatively using high-resolution shock-capturing methods, while the field equations are solved in the generalized-harmonic formulation with finite differences. In order to resolve the various scales that may arise, we use adaptive mesh refinement (AMR) with grid hierarchies based on truncation error estimates. A noteworthy feature of this code is the implementation of the flux correction algorithm of Berger and Colella to ensure that the conservative nature of fluid advection is respected across AMR boundaries. We present various tests to compare the performance of different limiters and flux calculation methods, as well as to demonstrate the utility of AMR flux corrections.

  12. Conservation endocrinology

    Science.gov (United States)

    McCormick, Stephen; Romero, L. Michael

    2017-01-01

    Endocrinologists can make significant contributions to conservation biology by helping to understand the mechanisms by which organisms cope with changing environments. Field endocrine techniques have advanced rapidly in recent years and can provide substantial information on the growth, stress, and reproductive status of individual animals, thereby providing insight into current and future responses of populations to changes in the environment. Environmental stressors and reproductive status can be detected nonlethally by measuring a number of endocrine-related endpoints, including steroids in plasma, living and nonliving tissue, urine, and feces. Information on the environmental or endocrine requirements of individual species for normal growth, development, and reproduction will provide critical information for species and ecosystem conservation. For many taxa, basic information on endocrinology is lacking, and advances in conservation endocrinology will require approaches that are both “basic” and “applied” and include integration of laboratory and field approaches.

  13. TASS/SMR Code Topical Report for SMART Plant, Vol. I: Code Structure, System Models, and Solution Methods

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Young Jong; Kim, Soo Hyoung; Kim, See Darl (and others)

    2008-10-15

    The TASS/SMR code has been developed with domestic technologies for the safety analysis of the SMART plant which is an integral type pressurized water reactor. It can be applied to the analysis of design basis accidents including non-LOCA (loss of coolant accident) and LOCA of the SMART plant. The TASS/SMR code can be applied to any plant regardless of the structural characteristics of a reactor since the code solves the same governing equations for both the primary and secondary system. The code has been developed to meet the requirements of the safety analysis code. This report describes the overall structure of the TASS/SMR, input processing, and the processes of a steady state and transient calculations. In addition, basic differential equations, finite difference equations, state relationships, and constitutive models are described in the report. First, the conservation equations, a discretization process for numerical analysis, search method for state relationship are described. Then, a core power model, heat transfer models, physical models for various components, and control and trip models are explained.

  14. 17 CFR 229.406 - (Item 406) Code of ethics.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 406) Code of ethics. 229... 406) Code of ethics. (a) Disclose whether the registrant has adopted a code of ethics that applies to... code of ethics, explain why it has not done so. (b) For purposes of this Item 406, the term code of...

  15. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  16. [Conservation Units.

    Science.gov (United States)

    Texas Education Agency, Austin.

    Each of the six instructional units deals with one aspect of conservation: forests, water, rangeland, minerals (petroleum), and soil. The area of the elementary school curriculum with which each correlates is indicated. Lists of general and specific objectives are followed by suggested teaching procedures, including ideas for introducing the…

  17. Creative conservation

    NARCIS (Netherlands)

    Bentham, Roelof J.

    1968-01-01

    The increasing exploitation of our natural resources, the unlimited occupation of ever more new areas, and the intensification of land-use, make it necessary for us to expand the concept of conservation. But we also need to reconsider that concept itself. For the changing conditions in the

  18. Reshaping conservation

    DEFF Research Database (Denmark)

    Funder, Mikkel; Danielsen, Finn; Ngaga, Yonika

    2013-01-01

    members strengthen the monitoring practices to their advantage, and to some extent move them beyond the reach of government agencies and conservation and development practitioners. This has led to outcomes that are of greater social and strategic value to communities than the original 'planned' benefits...

  19. Conservation of Charge and Conservation of Current

    OpenAIRE

    Eisenberg, Bob

    2016-01-01

    Conservation of current and conservation of charge are nearly the same thing: when enough is known about charge movement, conservation of current can be derived from conservation of charge, in ideal dielectrics, for example. Conservation of current is enforced implicitly in ideal dielectrics by theories that conserve charge. But charge movement in real materials like semiconductors or ionic solutions is never ideal. We present an apparently universal derivation of conservation of current and ...

  20. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  1. Explaining Physics – What Skills does a good Explainer Need?

    CERN Multimedia

    CERN. Geneva; Bartels, Hauke

    2018-01-01

    Explaining physics in a way that it is both scientifically correct and comprehensible is a highly demanding practice. But are explanations an effective way to teach physics? Under which circumstances should a physics teacher explain – and is there such a thing as a guideline for effective instructional explanations? Of course, explaining is more than just presenting content knowledge in clear language – but what more? In our talk, we want to discuss empirical studies on instructional explanations from science education and psychology to address these questions. Among other things, we will refer to results from a large study aiming to research whether teacher education contributes to the development of explaining skills. Besides, we will give insights into a project that seeks to measure explaining skills with an interactive online test instrument.

  2. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  3. Firm Performance and Comply or Explain Disclosure in Corporate Governance

    DEFF Research Database (Denmark)

    Rose, Caspar

    2016-01-01

    This study investigates the degree of Danish firm adherence to the Danish Code of Corporate Governance and analyzes if a higher degree of comply or explain disclosure is related to firm performance. This article formulates a methodology for quantifying the degree of comply or explain disclosure...... there is no impact on performance when increasing compliance with the recommendations on risk management and internal controls. This article demonstrates that these three areas are the ones where Danish firms show the lowest degree of comply or explain disclosure, although the overall adherence to the Danish code...... that soft law may be an efficient way of increasing the quality of corporate governance among listed firms. However, in order to strengthen investor confidence, national code authorities/committees should be more active in penalizing poor explanations as well as cases where firms wrongfully state...

  4. Aztheca Code

    International Nuclear Information System (INIS)

    Quezada G, S.; Espinosa P, G.; Centeno P, J.; Sanchez M, H.

    2017-09-01

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  5. Vocable Code

    DEFF Research Database (Denmark)

    Soon, Winnie; Cox, Geoff

    2018-01-01

    a computational and poetic composition for two screens: on one of these, texts and voices are repeated and disrupted by mathematical chaos, together exploring the performativity of code and language; on the other, is a mix of a computer programming syntax and human language. In this sense queer code can...... be understood as both an object and subject of study that intervenes in the world’s ‘becoming' and how material bodies are produced via human and nonhuman practices. Through mixing the natural and computer language, this article presents a script in six parts from a performative lecture for two persons...

  6. NSURE code

    International Nuclear Information System (INIS)

    Rattan, D.S.

    1993-11-01

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  7. Challenge: Code of environmental law; Herausforderung Umweltgesetzbuch

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-15

    Within the meeting ''Challenge: Code of environmental law'' at 16th February, 2007, in Berlin (Federal Republic of Germany) and organized by the Federal Ministry for the Environment, Nature Conservation and Nuclear Safety (Berlin, Federal Republic of Germany), the following lectures were held: (a) the new code of environmental law as a contribution to more modernness and efficiency in the environmental politics (Sigmar Gabriel); (b) The code of environmental law from the view of the economy (Martin Wansleben); (c) Significance of the code of environmental law from the view of jurisprudence (Michael Kloepfer); (d) Targets, content and utility of the code of environmental law: Summary of the panel discussion (Tanja Goenner, Klaus Mittelbach, Juergen Resch, Hans-Joachim Koch, Alfred Wirtz, Andreas Troge (moderator)); (e) Considerations to the coding of water law in the code of environmental law (Helge Wendenburg); (f) Considerations to the coding of water law: Summary of te discussion; (g) Considerations to the coding of nature conservation law (Jochen Flasbarth); (h) Considerations to the coding of nature conservation law: Summary of the discussion.

  8. Detecting non-coding selective pressure in coding regions

    Directory of Open Access Journals (Sweden)

    Blanchette Mathieu

    2007-02-01

    Full Text Available Abstract Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements.

  9. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    Science.gov (United States)

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  10. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  11. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening...... Coding Pirates2. Rapporten er forfattet af Docent i digitale læringsressourcer og forskningskoordinator for forsknings- og udviklingsmiljøet Digitalisering i Skolen (DiS), Mikala Hansbøl, fra Institut for Skole og Læring ved Professionshøjskolen Metropol; og Lektor i læringsteknologi, interaktionsdesign......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017...

  12. Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the objectives, meeting goals and overall NASA goals for the NASA Data Standards Working Group. The presentation includes information on the technical progress surrounding the objective, short LDPC codes, and the general results on the Pu-Pw tradeoff.

  13. ANIMAL code

    International Nuclear Information System (INIS)

    Lindemuth, I.R.

    1979-01-01

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  14. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  15. MCNP code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  16. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  17. 77 FR 74456 - Notice of Proposed Changes to the National Handbook of Conservation Practices for the Natural...

    Science.gov (United States)

    2012-12-14

    ..., National Agricultural Engineer, Conservation Engineering Division, Department of Agriculture, Natural... may be directed to Wayne Bogovich, National Agricultural Engineer, Conservation Engineering Division...: Amendments for the Treatment of Agricultural Waste (Code 591), Building Envelope Improvement (Code 672...

  18. What Froze the Genetic Code?

    Directory of Open Access Journals (Sweden)

    Lluís Ribas de Pouplana

    2017-04-01

    Full Text Available The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  19. What Froze the Genetic Code?

    Science.gov (United States)

    Ribas de Pouplana, Lluís; Torres, Adrian Gabriel; Rafels-Ybern, Àlbert

    2017-04-05

    The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  20. Radioactive action code

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    A new coding system, 'Hazrad', for buildings and transportation containers for alerting emergency services personnel to the presence of radioactive materials has been developed in the United Kingdom. The hazards of materials in the buildings or transport container, together with the recommended emergency action, are represented by a number of codes which are marked on the building or container and interpreted from a chart carried as a pocket-size guide. Buildings would be marked with the familiar yellow 'radioactive' trefoil, the written information 'Radioactive materials' and a list of isotopes. Under this the 'Hazrad' code would be written - three symbols to denote the relative radioactive risk (low, medium or high), the biological risk (also low, medium or high) and the third showing the type of radiation emitted, alpha, beta or gamma. The response cards indicate appropriate measures to take, eg for a high biological risk, Bio3, the wearing of a gas-tight protection suit is advised. The code and its uses are explained. (U.K.)

  1. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  2. Your Radiologist Explains Nuclear Medicine

    Medline Plus

    Full Text Available ... Disorders Video: The Basketball Game: An MRI Story Radiology and You Sponsored by Image/Video Gallery Your Radiologist Explains Nuclear Medicine Transcript Welcome to Radiology Info dot org Hello! I’m Dr. Ramji ...

  3. Your Radiologist Explains Nuclear Medicine

    Medline Plus

    Full Text Available ... by Image/Video Gallery Your Radiologist Explains Nuclear Medicine Transcript Welcome to Radiology Info dot org Hello! ... d like to talk to you about nuclear medicine. Nuclear medicine offers the potential to identify disease ...

  4. Your Radiologist Explains Nuclear Medicine

    Medline Plus

    Full Text Available ... An MRI Story Radiology and You Sponsored by Image/Video Gallery Your Radiologist Explains Nuclear Medicine Transcript ... by a special camera and computer to create images of the inside of your body. If you’ ...

  5. Your Radiologist Explains Nuclear Medicine

    Medline Plus

    Full Text Available ... Sponsored by Image/Video Gallery Your Radiologist Explains Nuclear Medicine Transcript Welcome to Radiology Info dot org ... I’d like to talk to you about nuclear medicine. Nuclear medicine offers the potential to identify ...

  6. Explaining variation in nascent entrepreneurship

    NARCIS (Netherlands)

    A.J. van Stel (André); A.R.M. Wennekers (Sander); P. Reynolds (Paul); A.R. Thurik (Roy)

    2004-01-01

    textabstractThis paper aims at explaining cross-country variation in nascent entrepreneurship. Regression analysis is applied using various explanatory variables derived from three different approaches. We make use of the Global Entrepreneurship Monitor database, including nascent entrepreneurship

  7. Explaining nascent entrepreneurship across countries

    NARCIS (Netherlands)

    A.R. Thurik (Roy); A.J. van Stel (André); A.R.M. Wennekers (Sander); P. Reynolds (Paul)

    2003-01-01

    textabstractThis paper aims at explaining cross-country variation in nascent entrepreneurship. Regression analysis is applied using various explanatory variables derived from three different approaches. We make use of the Global Entrepreneurship Monitor database, including nascent entrepreneurship

  8. Panda code

    International Nuclear Information System (INIS)

    Altomare, S.; Minton, G.

    1975-02-01

    PANDA is a new two-group one-dimensional (slab/cylinder) neutron diffusion code designed to replace and extend the FAB series. PANDA allows for the nonlinear effects of xenon, enthalpy and Doppler. Fuel depletion is allowed. PANDA has a completely general search facility which will seek criticality, maximize reactivity, or minimize peaking. Any single parameter may be varied in a search. PANDA is written in FORTRAN IV, and as such is nearly machine independent. However, PANDA has been written with the present limitations of the Westinghouse CDC-6600 system in mind. Most computation loops are very short, and the code is less than half the useful 6600 memory size so that two jobs can reside in the core at once. (auth)

  9. CANAL code

    International Nuclear Information System (INIS)

    Gara, P.; Martin, E.

    1983-01-01

    The CANAL code presented here optimizes a realistic iron free extraction channel which has to provide a given transversal magnetic field law in the median plane: the current bars may be curved, have finite lengths and cooling ducts and move in a restricted transversal area; terminal connectors may be added, images of the bars in pole pieces may be included. A special option optimizes a real set of circular coils [fr

  10. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  11. UNSPEC: revisited (semaphore code)

    International Nuclear Information System (INIS)

    Neifert, R.D.

    1981-01-01

    The UNSPEC code is used to solve the problem of unfolding an observed x-ray spectrum given the response matrix of the measuring system and the measured signal values. UNSPEC uses an iterative technique to solve the unfold problem. Due to experimental errors in the measured signal values and/or computer round-off errors, discontinuities and oscillatory behavior may occur in the iterated spectrum. These can be suppressed by smoothing the results after each iteration. Input/output options and control cards are explained; sample input and output are provided

  12. Tri-Coding of Information.

    Science.gov (United States)

    Simpson, Timothy J.

    Paivio's Dual Coding Theory has received widespread recognition for its connection between visual and aural channels of internal information processing. The use of only two channels, however, cannot satisfactorily explain the effects witnessed every day. This paper presents a study suggesting the presence a third, kinesthetic channel, currently…

  13. The generation of recombinant influenza A viruses expressing a PB2 fusion protein requires the conservation of a packaging signal overlapping the coding and noncoding regions at the 5' end of the PB2 segment

    International Nuclear Information System (INIS)

    Dos Santos Afonso, Emmanuel; Escriou, Nicolas; Leclercq, India; Werf, Sylvie van der; Naffakh, Nadia

    2005-01-01

    We generated recombinant A/WSN/33 influenza A viruses expressing a PB2 protein fused to a Flag epitope at the N- (Flag-PB2) or C-terminus (PB2-Flag), which replicated efficiently and proved to be stable upon serial passage in vitro on MDCK cells. Rescue of PB2-Flag viruses required that the 5' end of the PB2 segment was kept identical to the wild-type beyond the 34 noncoding terminal nucleotides. This feature was achieved by a duplication of the 109 last nucleotides encoding PB2 between the Flag sequence and the 5'NCR. In PB2 minigenomes rescue experiments, both the 5' and 3' coding ends of the PB2 segment were found to promote the incorporation of minigenomes into virions. However, the presence of the Flag sequence at the junction between the 3'NCR and the coding sequence did not prevent the rescue of Flag-PB2 viruses. Our observations define requirements that may be useful for the purpose of engineering influenza RNAs

  14. The last line effect explained

    NARCIS (Netherlands)

    Beller, M. (Moritz); Zaidman, A. (Andy); Karpov, A. (Andrey); R.A. Zwaan (Rolf)

    2017-01-01

    textabstractMicro-clones are tiny duplicated pieces of code; they typically comprise only few statements or lines. In this paper, we study the “Last Line Effect,” the phenomenon that the last line or statement in a micro-clone is much more likely to contain an error than the previous lines or

  15. The last line effect explained

    NARCIS (Netherlands)

    Beller, M.M.; Zaidman, A.E.; Karpov, Andrey; Zwaan, Rolf A.

    Micro-clones are tiny duplicated pieces of code; they typically comprise only few statements or lines. In this paper, we study the “Last Line Effect,” the phenomenon that the last line or statement in a micro-clone is much more likely to contain an error than the previous lines or statements. We do

  16. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  17. Conservation genetics of Iberian raptors

    Directory of Open Access Journals (Sweden)

    Martinez–Cruz, B.

    2011-12-01

    Full Text Available In this paper I provide an overview of conservation genetics and describe the management actions in the wild that can benefit from conservation genetic studies. I describe the genetic factors of risk for the survival of wild species, the consequences of loss of genetic diversity, inbreeding and outbreeding depression, and the use of genetic tools to delimitate units of conservation. Then I introduce the most common applications of conservation genetics in the management of wild populations. In a second part of the paper I review the conservation genetic studies carried on the Iberian raptors. I introduce several studies on the Spanish imperial eagle, the bearded vulture, the black vulture and the red kite that were carried out using autosomal microsatellite markers and mitochondrial DNA (mtDNA sequencing. I describe studies on the lesser kestrel and Egyptian vulture that additionally applied major histocompatibility complex (MHC markers, with the purpose of incorporating the study of non–neutral variation. For every species I explain how these studies can be and/or are applied in the strategy of conservation in the wild.

  18. Journalism and Explaining News Content

    NARCIS (Netherlands)

    Albæk, E.; Skovsgaard, M.; de Vreese, C.H.; Nussbaum, J.F.

    Three models are presented to explain variation in news content. In the first model the explanation is based on the individual journalist, in the second model on the professional journalist, and in the third model on the organized journalist. The individual journalist model focuses on how the

  19. Can Marxism Explain America's Racism?

    Science.gov (United States)

    Willhelm, Sidney M.

    1980-01-01

    The Marxist interpretation of the Black experience in America has always had difficulty explaining various noneconomic aspects of racism. A perspective is needed that can blend racism as a variable in relationship with economic variables. To reach this perspective, the labor process within capitalism must be more fully understood. (Author/GC)

  20. Does market competition explain fairness?

    Science.gov (United States)

    Descioli, Peter

    2013-02-01

    The target article by Baumard et al. uses their previous model of bargaining with outside options to explain fairness and other features of human sociality. This theory implies that fairness judgments are determined by supply and demand but humans often perceive prices (divisions of surplus) in competitive markets to be unfair.

  1. Energy conservation in SIMMER

    International Nuclear Information System (INIS)

    Arnold, L.A.; Knowles, J.B.

    1983-11-01

    The SIMMER code contains models of the many interacting thermo-hydraulic processes that occur during a hypothetical core disruptive accident (HCDA), to provide an overall picture from accident initiation to containment loading. In calculations of roof loadings following the HCDA, errors in computing the overall energy balance were found to be up to ten times the kinetic energy of the sodium slug which creates the loading. On this account, the results were considered to be seriously compromised. This report describes a systematic investigation into the effect, nature and origin of the energy discrepancies. Its main conclusion are that, the errors stem from a systematic rather than a random source, energy errors for individual cells can be two decades larger than the mean value provided by the code, and cellular mass and energy errors are strongly correlated and they can actually increase when the mesh is refined. A likely cause of the conservation errors is identified as the solution of the liquid phase mass and energy equations at effectively different time instants during each timestep. (author)

  2. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  3. Explaining Disparities in Unemployment Dynamics

    OpenAIRE

    Karanassou, Marika; Snower, Dennis J.

    1993-01-01

    This paper attempts to explain disparities among the unemployment experiences of different OECD countries in terms of the `fragility' of the short-run unemployment equilibrium (the impact of labour market shocks on the short-run unemployment rate) and the lag structure of the employment determination, wage setting, and labour force participation decisions. The effects of this lag structure on unemployment dynamics are captured through two general measures of `unemployment persistence' (occurr...

  4. Explaining the Gender Wealth Gap

    Science.gov (United States)

    Ruel, Erin; Hauser, Robert M.

    2013-01-01

    To assess and explain the United States’ gender wealth gap, we use the Wisconsin Longitudinal Study to examine wealth accumulated by a single cohort over 50 years by gender, by marital status, and limited to the respondents who are their family’s best financial reporters. We find large gender wealth gaps between currently married men and women, and never-married men and women. The never-married accumulate less wealth than the currently married, and there is a marital disruption cost to wealth accumulation. The status-attainment model shows the most power in explaining gender wealth gaps between these groups explaining about one-third to one-half of the gap, followed by the human-capital explanation. In other words, a lifetime of lower earnings for women translates into greatly reduced wealth accumulation. A gender wealth gap remains between married men and women after controlling for the full model that we speculate may be related to gender differences in investment strategies and selection effects. PMID:23264038

  5. Automatic coding method of the ACR Code

    International Nuclear Information System (INIS)

    Park, Kwi Ae; Ihm, Jong Sool; Ahn, Woo Hyun; Baik, Seung Kook; Choi, Han Yong; Kim, Bong Gi

    1993-01-01

    The authors developed a computer program for automatic coding of ACR(American College of Radiology) code. The automatic coding of the ACR code is essential for computerization of the data in the department of radiology. This program was written in foxbase language and has been used for automatic coding of diagnosis in the Department of Radiology, Wallace Memorial Baptist since May 1992. The ACR dictionary files consisted of 11 files, one for the organ code and the others for the pathology code. The organ code was obtained by typing organ name or code number itself among the upper and lower level codes of the selected one that were simultaneous displayed on the screen. According to the first number of the selected organ code, the corresponding pathology code file was chosen automatically. By the similar fashion of organ code selection, the proper pathologic dode was obtained. An example of obtained ACR code is '131.3661'. This procedure was reproducible regardless of the number of fields of data. Because this program was written in 'User's Defined Function' from, decoding of the stored ACR code was achieved by this same program and incorporation of this program into program in to another data processing was possible. This program had merits of simple operation, accurate and detail coding, and easy adjustment for another program. Therefore, this program can be used for automation of routine work in the department of radiology

  6. Error-correction coding

    Science.gov (United States)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  7. Dynamic Shannon Coding

    OpenAIRE

    Gagie, Travis

    2005-01-01

    We present a new algorithm for dynamic prefix-free coding, based on Shannon coding. We give a simple analysis and prove a better upper bound on the length of the encoding produced than the corresponding bound for dynamic Huffman coding. We show how our algorithm can be modified for efficient length-restricted coding, alphabetic coding and coding with unequal letter costs.

  8. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  9. Codes Over Hyperfields

    Directory of Open Access Journals (Sweden)

    Atamewoue Surdive

    2017-12-01

    Full Text Available In this paper, we define linear codes and cyclic codes over a finite Krasner hyperfield and we characterize these codes by their generator matrices and parity check matrices. We also demonstrate that codes over finite Krasner hyperfields are more interesting for code theory than codes over classical finite fields.

  10. Explaining the Evolution of Poverty

    DEFF Research Database (Denmark)

    Arndt, Channing; Hussain, Azhar; Jones, Edward Samuel

    2012-01-01

    We provide a comprehensive approach for analyzing the evolution of poverty using Mozambique as a case study. Bringing together data from disparate sources, we develop a novel “back-casting” framework that links a dynamic computable general equilibrium model to a micro-simulation poverty module....... This framework provides a new approach to explaining and decomposing the evolution of poverty, as well as to examining rigorously the coherence between poverty, economic growth, and inequality outcomes. Finally, various simple but useful and rarely-applied approaches to considering regional changes in poverty...

  11. Computation of the bounce-average code

    International Nuclear Information System (INIS)

    Cutler, T.A.; Pearlstein, L.D.; Rensink, M.E.

    1977-01-01

    The bounce-average computer code simulates the two-dimensional velocity transport of ions in a mirror machine. The code evaluates and bounce-averages the collision operator and sources along the field line. A self-consistent equilibrium magnetic field is also computed using the long-thin approximation. Optionally included are terms that maintain μ, J invariance as the magnetic field changes in time. The assumptions and analysis that form the foundation of the bounce-average code are described. When references can be cited, the required results are merely stated and explained briefly. A listing of the code is appended

  12. Reflections Around the Conservation of Sacred Thangkas

    Directory of Open Access Journals (Sweden)

    Sabine Cotte

    2013-10-01

    Full Text Available Tibetan thangkas (Buddhist scroll paintings are created as religious ritual objects. The fact that they are mainly considered as artworks in the Western world impacts on the decisions made for their display and conservation. This article explores the current approach to thangkas in Australian public collections and compares it with the views of contemporary Tibetan Buddhism practitioners. It underlines a few misconceptions at the source of conservation decision-making, and discusses practical outcomes of integrating the sacred dimension into professional practice against the backdrop of conservation’s Codes of Ethics. Conserving living religious heritage requires that professional ethical standards are adaptable to the needs of users. Existing frameworks for the conservation of sacred objects of pre-colonised, indigenous cultures provide useful models for the conservation of thangkas. This article argues that engaging with contemporary cultural groups to conserve religious significance is part of the mission of conservators. This is viewed as an expansion of conservation practice into the social realm, in a search for purposeful conservation that establishes the social relevance of our profession.

  13. Code-Mixing and Code Switchingin The Process of Learning

    Directory of Open Access Journals (Sweden)

    Diyah Atiek Mustikawati

    2016-09-01

    Full Text Available This study aimed to describe a form of code switching and code mixing specific form found in the teaching and learning activities in the classroom as well as determining factors influencing events stand out that form of code switching and code mixing in question.Form of this research is descriptive qualitative case study which took place in Al Mawaddah Boarding School Ponorogo. Based on the analysis and discussion that has been stated in the previous chapter that the form of code mixing and code switching learning activities in Al Mawaddah Boarding School is in between the use of either language Java language, Arabic, English and Indonesian, on the use of insertion of words, phrases, idioms, use of nouns, adjectives, clauses, and sentences. Code mixing deciding factor in the learning process include: Identification of the role, the desire to explain and interpret, sourced from the original language and its variations, is sourced from a foreign language. While deciding factor in the learning process of code, includes: speakers (O1, partners speakers (O2, the presence of a third person (O3, the topic of conversation, evoke a sense of humour, and just prestige. The significance of this study is to allow readers to see the use of language in a multilingual society, especially in AL Mawaddah boarding school about the rules and characteristics variation in the language of teaching and learning activities in the classroom. Furthermore, the results of this research will provide input to the ustadz / ustadzah and students in developing oral communication skills and the effectiveness of teaching and learning strategies in boarding schools.

  14. TASS/SMR Code Topical Report for SMART Plant, Vol II: User's Guide and Input Requirement

    International Nuclear Information System (INIS)

    Kim, See Darl; Kim, Soo Hyoung; Kim, Hyung Rae

    2008-10-01

    The TASS/SMR code has been developed with domestic technologies for the safety analysis of the SMART plant which is an integral type pressurized water reactor. It can be applied to the analysis of design basis accidents including non-LOCA (loss of coolant accident) and LOCA of the SMART plant. The TASS/SMR code can be applied to any plant regardless of the structural characteristics of a reactor since the code solves the same governing equations for both the primary and secondary system. The code has been developed to meet the requirements of the safety analysis code. This report describes the overall structure of the TASS/SMR, input processing, and the processes of a steady state and transient calculations. In addition, basic differential equations, finite difference equations, state relationships, and constitutive models are described in the report. First, the conservation equations, a discretization process for numerical analysis, search method for state relationship are described. Then, a core power model, heat transfer models, physical models for various components, and control and trip models are explained

  15. Explaining the harmonic sequence paradox.

    Science.gov (United States)

    Schmidt, Ulrich; Zimper, Alexander

    2012-05-01

    According to the harmonic sequence paradox, an expected utility decision maker's willingness to pay for a gamble whose expected payoffs evolve according to the harmonic series is finite if and only if his marginal utility of additional income becomes zero for rather low payoff levels. Since the assumption of zero marginal utility is implausible for finite payoff levels, expected utility theory - as well as its standard generalizations such as cumulative prospect theory - are apparently unable to explain a finite willingness to pay. This paper presents first an experimental study of the harmonic sequence paradox. Additionally, it demonstrates that the theoretical argument of the harmonic sequence paradox only applies to time-patient decision makers, whereas the paradox is easily avoided if time-impatience is introduced. ©2011 The British Psychological Society.

  16. Error-correction coding and decoding bounds, codes, decoders, analysis and applications

    CERN Document Server

    Tomlinson, Martin; Ambroze, Marcel A; Ahmed, Mohammed; Jibril, Mubarak

    2017-01-01

    This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the book presents the authors’ twenty-five years of research organized into five parts: Part I is concerned with the theoretical performance attainable by using error correcting codes to achieve communications efficiency in digital communications systems. Part II explores the construction of error-correcting codes and explains the different families of codes and how they are designed. Techniques are described for producing the very best codes. Part III addresses the analysis of low-density parity-check (LDPC) codes, primarily to calculate their stopping sets and low-weight codeword spectrum which determines the performance of these codes. Part IV deals with decoders desi...

  17. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  18. The Coding Process and Its Challenges

    Directory of Open Access Journals (Sweden)

    Judith A. Holton, Ph.D.

    2010-02-01

    Full Text Available Coding is the core process in classic grounded theory methodology. It is through coding that the conceptual abstraction of data and its reintegration as theory takes place. There are two types of coding in a classic grounded theory study: substantive coding, which includes both open and selective coding procedures, and theoretical coding. In substantive coding, the researcher works with the data directly, fracturing and analysing it, initially through open coding for the emergence of a core category and related concepts and then subsequently through theoretical sampling and selective coding of data to theoretically saturate the core and related concepts. Theoretical saturation is achieved through constant comparison of incidents (indicators in the data to elicit the properties and dimensions of each category (code. This constant comparing of incidents continues until the process yields the interchangeability of indicators, meaning that no new properties or dimensions are emerging from continued coding and comparison. At this point, the concepts have achieved theoretical saturation and the theorist shifts attention to exploring the emergent fit of potential theoretical codes that enable the conceptual integration of the core and related concepts to produce hypotheses that account for relationships between the concepts thereby explaining the latent pattern of social behaviour that forms the basis of the emergent theory. The coding of data in grounded theory occurs in conjunction with analysis through a process of conceptual memoing, capturing the theorist’s ideation of the emerging theory. Memoing occurs initially at the substantive coding level and proceeds to higher levels of conceptual abstraction as coding proceeds to theoretical saturation and the theorist begins to explore conceptual reintegration through theoretical coding.

  19. Homological stabilizer codes

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  20. Why not energy conservation?

    International Nuclear Information System (INIS)

    Carlson, Shawn

    2016-01-01

    Energy conservation is a deep principle that is obeyed by all of the fundamental forces of nature. It puts stringent constraints on all systems, particularly systems that are ‘isolated,’ meaning that no energy can enter or escape. Notwithstanding the success of the principle of stationary action, it is fair to wonder to what extent physics can be formulated from the principle of stationary energy. We show that if one interprets mechanical energy as a state function, then its stationarity leads to a novel formulation of classical mechanics. However, unlike Lagrangian and Hamiltonian mechanics, which deliver their state functions via algebraic proscriptions (i.e., the Lagrangian is always the difference between a system’s kinetic and potential energies), this new formalism identifies its state functions as the solutions to a differential equation. This is an important difference because differential equations can generate more general solutions than algebraic recipes. When applied to Newtonian systems for which the energy function is separable, these state functions are always the mechanical energy. However, while the stationary state function for a charged particle moving in an electromagnetic field proves not to be energy, the function nevertheless correctly encodes the dynamics of the system. Moreover, the stationary state function for a free relativistic particle proves not to be the energy either. Rather, our differential equation yields the relativistic free-particle Lagrangian (plus a non-dynamical constant) in its correct dynamical context. To explain how this new formalism can consistently deliver stationary state functions that give the correct dynamics but that are not always the mechanical energy, we propose that energy conservation is a specific realization of a deeper principle of stationarity that governs both relativistic and non-relativistic mechanics. (paper)

  1. Conservation potential of agricultural water conservation subsidies

    Science.gov (United States)

    Huffaker, Ray

    2008-07-01

    A current policy subsidizes farmers to invest in improved on-farm irrigation efficiency, expecting water to be conserved off farm. Contrary to expectation, water has been increasingly depleted in some regions after such improvements. This paper investigates the policy's failure to conserve water consistently by (1) formulating an economic model of irrigated crop production to determine a profit-maximizing irrigator's range of responses to a subsidy and (2) embedding these responses into hypothetical streamflow diagrams to ascertain their potential to conserve water under various hydrologic regimes. Testable hypotheses are developed to predict the conservation potential of a subsidy in real-world application.

  2. Diagnostic Coding for Epilepsy.

    Science.gov (United States)

    Williams, Korwyn; Nuwer, Marc R; Buchhalter, Jeffrey R

    2016-02-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  3. Coding of Neuroinfectious Diseases.

    Science.gov (United States)

    Barkley, Gregory L

    2015-12-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  4. [Abortion explained by a nurse].

    Science.gov (United States)

    Bastit i Costa, M A

    1983-01-01

    Abortion is the termination of pregnancy prior to the 180th day, during which time the fetus is not yet viable outside the womb. Spontaneous abortion is the body's expulsion of a fetus during the 1st months of pregnancy. It is usually not very painful, does not involve much bleeding, and is rarely complicated by infection. Spontaneous abortion is much more frequent at the outset of pregnancy and may occur unnoticed. Its causes are unknown in over half of cases. The most important causes are developmental problems in the products of conception. Causes of spontaneous abortions of maternal etiology are most frequently uterine malposition or malformation. Serious illness in the mother is a less common cause of spontaneous abortion than once believed. Induced abortion is caused by the destruction of a normally implanted and healthy embryo. Its complications are related to the amount of bleeding or the introduction of germs from outside which can spread rapidly. Placental retention is a danger of all induced abortions. Induced abortion is common and in some countries it even creates demographic problems. Abortion is legal in many countries as an expression of the right to choose, but in others it is only legal on therapeutic grounds. Defenders and detractors of abortion have written extensively about it, with some works being sincere and some only tactical. The great majority of moralists are opposed to abortion, while biologists and scientists are divided on the question. The Spanish penal code punishes all persons who cause the death of a fetus or impede the process of gestation. The Catholic Church has considered abortion a homicide and against divine and natural laws. Legal or illegal, it is certain that the number of abortions increases each day. In the face of this reality, the need is for measures to avoid abortion whenever possible. Sex education in schools, full information on contraceptive methods and creation of family planning centers are some means of

  5. Code of Ethics for Electrical Engineers

    Science.gov (United States)

    Matsuki, Junya

    The Institute of Electrical Engineers of Japan (IEEJ) has established the rules of practice for its members recently, based on its code of ethics enacted in 1998. In this paper, first, the characteristics of the IEEJ 1998 ethical code are explained in detail compared to the other ethical codes for other fields of engineering. Secondly, the contents which shall be included in the modern code of ethics for electrical engineers are discussed. Thirdly, the newly-established rules of practice and the modified code of ethics are presented. Finally, results of questionnaires on the new ethical code and rules which were answered on May 23, 2007, by 51 electrical and electronic students of the University of Fukui are shown.

  6. Training program for energy conservation in new-building construction. Volume II. Energy conservation technology: for the building inspector

    Energy Technology Data Exchange (ETDEWEB)

    None

    1977-12-01

    A Model Code for Energy Conservation in New Building Construction has been developed by those national organizations primarily concerned with the development and promulgation of model codes. The technical provisions are based on ASHRAE Standard 90-75 and are intended for use by state and local officials. This training manual contains the basic information necessary to acquaint the field building inspector with the concepts of energy conservation in buildings and instructs him in the basic techniques of field inspection of energy compliance.

  7. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  8. Entropy Coding in HEVC

    OpenAIRE

    Sze, Vivienne; Marpe, Detlev

    2014-01-01

    Context-Based Adaptive Binary Arithmetic Coding (CABAC) is a method of entropy coding first introduced in H.264/AVC and now used in the latest High Efficiency Video Coding (HEVC) standard. While it provides high coding efficiency, the data dependencies in H.264/AVC CABAC make it challenging to parallelize and thus limit its throughput. Accordingly, during the standardization of entropy coding for HEVC, both aspects of coding efficiency and throughput were considered. This chapter describes th...

  9. Generalized concatenated quantum codes

    International Nuclear Information System (INIS)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng Bei

    2009-01-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  10. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  11. Large break LOCA uncertainty evaluation and comparison with conservative calculation

    International Nuclear Information System (INIS)

    Glaeser, H.G.

    2004-01-01

    The first formulation of the USA Code of Federal Regulations (CFR) 10CFR50 with applicable sections specific to NPP licensing requirements was released 1976. Over a decade later 10CFR 50.46 allowed the use of BE codes instead of conservative code models but uncertainties have to be identified and quantified. Guidelines were released that described interpretations developed over the intervening years that are applicable. Other countries established similar conservative procedures and acceptance criteria. Because conservative methods were used to calculate the peak values of key parameters, such as peak clad temperature (PCT), it was always acknowledged that a large margin, between the 'conservative' calculated value and the 'true' value, existed. Beside USA, regulation in other countries, like Germany, for example, allowed that the state of science and technology is applied in licensing. I.e. the increase of experimental evidence and progress in code development during time could be used. There was no requirement to apply a pure evaluation methodology with licensed assumptions and frozen codes. The thermal-hydraulic system codes became more and more best-estimate codes based on comprehensive validation. This development was and is possible because the rules and guidelines provide the necessary latitude to consider further development of safety technology. Best estimate codes are allowed to be used in licensing in combination with conservative initial and boundary conditions. However, uncertainty quantification is not required. Since some of the initial and boundary conditions are more conservative compared with those internationally used (e.g. 106% reactor power instead 102%, a single failure plus a non-availability due to preventive maintenance is assumed, etc.) it is claimed that the uncertainties of code models are covered. Since many utilities apply for power increase, calculation results come closer to some licensing criteria. The situation in German licensing

  12. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  13. Turbo coding, turbo equalisation and space-time coding for transmission over fading channels

    CERN Document Server

    Hanzo, L; Yeap, B

    2002-01-01

    Against the backdrop of the emerging 3G wireless personal communications standards and broadband access network standard proposals, this volume covers a range of coding and transmission aspects for transmission over fading wireless channels. It presents the most important classic channel coding issues and also the exciting advances of the last decade, such as turbo coding, turbo equalisation and space-time coding. It endeavours to be the first book with explicit emphasis on channel coding for transmission over wireless channels. Divided into 4 parts: Part 1 - explains the necessary background for novices. It aims to be both an easy reading text book and a deep research monograph. Part 2 - provides detailed coverage of turbo conventional and turbo block coding considering the known decoding algorithms and their performance over Gaussian as well as narrowband and wideband fading channels. Part 3 - comprehensively discusses both space-time block and space-time trellis coding for the first time in literature. Par...

  14. Conservation and the botanist effect

    DEFF Research Database (Denmark)

    Ahrends, Antje; Rahbek, Carsten; Bulling, Mark T.

    2011-01-01

    and reliability of inventories. We tested this hypothesis with tropical tree records (n = 24,024) collected from the Eastern Arc Mountains, Tanzania, between 1980 and 2007 by 13 botanists, whose collections represent 80% of the total plant records for this region. Our results show that botanists with practical...... training in tropical plant identification record both more species and more species of conservation concern (20 more species, two more endemic and one more threatened species per 250 specimens) than untrained botanists. Training and the number of person-days in the field explained 96% of the variation...

  15. User's guide for Reactor Incident Root Cause Coding Tree

    International Nuclear Information System (INIS)

    Busch, D.A.; Paradies, M.W.

    1986-01-01

    The Reactor Incident (RI) Cause Coding Tree is designed to allow identification of root causes of RI's, thereby leading to trending of useful information and developing of corrective actions to prevent recurrence. This guide explains the terminology of the RI Cause Coding Tree and how to use the tree. Using this guide for cause coding is stressed to allow consistency of coding among all RI investigators. 8 figs

  16. Motivated creativity: A conservation of energy approach

    NARCIS (Netherlands)

    Roskes, M.

    2013-01-01

    This dissertation developed a novel conservation of energy principle to explain how approach and avoidance motivation influence performance. On the one hand, we showed that avoidance motivated people can excel when they are sufficiently stimulated to invest their energy and cognitive resources. This

  17. [Student nurses and the code of ethics].

    Science.gov (United States)

    Trolliet, Julie

    2017-09-01

    Student nurses, just like all practising professionals, are expected to be aware of and to respect the code of ethics governing their profession. Since the publication of this code, actions to raise awareness of it and explain it to all the relevant players have been put in place. The French National Federation of Student Nurses decided to survey future professionals regarding this new text. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  18. Discussion on LDPC Codes and Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  19. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  20. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Shannon limit of the channel. Among the earliest discovered codes that approach the. Shannon limit were the low density parity check (LDPC) codes. The term low density arises from the property of the parity check matrix defining the code. We will now define this matrix and the role that it plays in decoding. 2. Linear Codes.

  1. Manually operated coded switch

    International Nuclear Information System (INIS)

    Barnette, J.H.

    1978-01-01

    The disclosure related to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made

  2. Coding in Muscle Disease.

    Science.gov (United States)

    Jones, Lyell K; Ney, John P

    2016-12-01

    Accurate coding is critically important for clinical practice and research. Ongoing changes to diagnostic and billing codes require the clinician to stay abreast of coding updates. Payment for health care services, data sets for health services research, and reporting for medical quality improvement all require accurate administrative coding. This article provides an overview of administrative coding for patients with muscle disease and includes a case-based review of diagnostic and Evaluation and Management (E/M) coding principles in patients with myopathy. Procedural coding for electrodiagnostic studies and neuromuscular ultrasound is also reviewed.

  3. Linkage disequilibrium of evolutionarily conserved regions in the human genome

    Directory of Open Access Journals (Sweden)

    Johnson Todd A

    2006-12-01

    Full Text Available Abstract Background The strong linkage disequilibrium (LD recently found in genic or exonic regions of the human genome demonstrated that LD can be increased by evolutionary mechanisms that select for functionally important loci. This suggests that LD might be stronger in regions conserved among species than in non-conserved regions, since regions exposed to natural selection tend to be conserved. To assess this hypothesis, we used genome-wide polymorphism data from the HapMap project and investigated LD within DNA sequences conserved between the human and mouse genomes. Results Unexpectedly, we observed that LD was significantly weaker in conserved regions than in non-conserved regions. To investigate why, we examined sequence features that may distort the relationship between LD and conserved regions. We found that interspersed repeats, and not other sequence features, were associated with the weak LD tendency in conserved regions. To appropriately understand the relationship between LD and conserved regions, we removed the effect of repetitive elements and found that the high degree of sequence conservation was strongly associated with strong LD in coding regions but not with that in non-coding regions. Conclusion Our work demonstrates that the degree of sequence conservation does not simply increase LD as predicted by the hypothesis. Rather, it implies that purifying selection changes the polymorphic patterns of coding sequences but has little influence on the patterns of functional units such as regulatory elements present in non-coding regions, since the former are generally restricted by the constraint of maintaining a functional protein product across multiple exons while the latter may exist more as individually isolated units.

  4. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  5. The Trade Off Between Central Bank Independence and Conservativeness

    NARCIS (Netherlands)

    Eijffinger, S.C.W.; Hoeberichts, M.M.

    1996-01-01

    This paper introduces a parameter for central bank independence in a monetary policy game with a conservative central banker.It tries to explain the optimal degree of central bank independence and conservativeness by four economic and political determinants, both theoretically and empirically.There

  6. Energy conservation in molecular dynamics simulations of classical systems

    DEFF Research Database (Denmark)

    Toxværd, Søren; Heilmann, Ole; Dyre, J. C.

    2012-01-01

    Classical Newtonian dynamics is analytic and the energy of an isolated system is conserved. The energy of such a system, obtained by the discrete “Verlet” algorithm commonly used in molecular dynamics simulations, fluctuates but is conserved in the mean. This is explained by the existence...

  7. Conservation: Toward firmer ground

    Science.gov (United States)

    1975-01-01

    The following aspects of energy conservation were reviewed in order to place the problems in proper perspective: history and goals, conservation accounting-criteria, and a method to overcome obstacles. The effect of changing prices and available supplies of energy sources and their causes on consumption levels during the last few decades were described. Some examples of attainable conservation goals were listed and justified. A number of specific criteria applicable to conservation accounting were given. Finally, a discussion was presented to relate together the following aspects of energy conservation: widespread impact, involvement of government, industry, politics, moral and ethical aspects, urgency and time element.

  8. Predictive Bias and Sensitivity in NRC Fuel Performance Codes

    Energy Technology Data Exchange (ETDEWEB)

    Geelhood, Kenneth J.; Luscher, Walter G.; Senor, David J.; Cunningham, Mitchel E.; Lanning, Donald D.; Adkins, Harold E.

    2009-10-01

    The latest versions of the fuel performance codes, FRAPCON-3 and FRAPTRAN were examined to determine if the codes are intrinsically conservative. Each individual model and type of code prediction was examined and compared to the data that was used to develop the model. In addition, a brief literature search was performed to determine if more recent data have become available since the original model development for model comparison.

  9. Coded aperture tomography revisited

    International Nuclear Information System (INIS)

    Bizais, Y.; Rowe, R.W.; Zubal, I.G.; Bennett, G.W.; Brill, A.B.

    1983-01-01

    Coded aperture (CA) Tomography never achieved wide spread use in Nuclear Medicine, except for the degenerate case of Seven Pinhole tomagraphy (7PHT). However it enjoys several attractive features (high sensitivity and tomographic ability with a statis detector). On the other hand, resolution is usually poor especially along the depth axis and the reconstructed volume is rather limited. Arguments are presented justifying the position that CA tomography can be useful for imaging time-varying 3D structures, if its major drawbacks (poor longitudinal resolution and difficulty in quantification) are overcome. Poor results obtained with 7PHT can be explained by both a very limited angular range sampled and a crude modelling of the image formation process. Therefore improvements can be expected by the use of a dual-detector system, along with a better understanding of its sampling properties and the use of more powerful reconstruction algorithms. Non overlapping multipinhole plates, because they do not involve a decoding procedure, should be considered first for practical applications. Use of real CA should be considered for cases in which non overlapping multipinhole plates do not lead to satisfactory solutions. We have been and currently are carrying out theoretical and experimental works, in order to define the factors which limit CA imaging and to propose satisfactory solutions for Dynamic Emission Tomography

  10. Predictive coding in Agency Detection

    DEFF Research Database (Denmark)

    Andersen, Marc Malmdorf

    2017-01-01

    Agency detection is a central concept in the cognitive science of religion (CSR). Experimental studies, however, have so far failed to lend support to some of the most common predictions that follow from current theories on agency detection. In this article, I argue that predictive coding, a highly...... promising new framework for understanding perception and action, may solve pending theoretical inconsistencies in agency detection research, account for the puzzling experimental findings mentioned above, and provide hypotheses for future experimental testing. Predictive coding explains how the brain......, unbeknownst to consciousness, engages in sophisticated Bayesian statistics in an effort to constantly predict the hidden causes of sensory input. My fundamental argument is that most false positives in agency detection can be seen as the result of top-down interference in a Bayesian system generating high...

  11. Codes and curves

    CERN Document Server

    Walker, Judy L

    2000-01-01

    When information is transmitted, errors are likely to occur. Coding theory examines efficient ways of packaging data so that these errors can be detected, or even corrected. The traditional tools of coding theory have come from combinatorics and group theory. Lately, however, coding theorists have added techniques from algebraic geometry to their toolboxes. In particular, by re-interpreting the Reed-Solomon codes, one can see how to define new codes based on divisors on algebraic curves. For instance, using modular curves over finite fields, Tsfasman, Vladut, and Zink showed that one can define a sequence of codes with asymptotically better parameters than any previously known codes. This monograph is based on a series of lectures the author gave as part of the IAS/PCMI program on arithmetic algebraic geometry. Here, the reader is introduced to the exciting field of algebraic geometric coding theory. Presenting the material in the same conversational tone of the lectures, the author covers linear codes, inclu...

  12. proposed considera tionsfor revision of ebcs-8: 1995for conservative ...

    African Journals Online (AJOL)

    Gouin's work served as a basis for the seismic zoning adopted by ... human life. Further, destructive .... for as explained in the previous section, in balance, however, even with .... Canadian code NBCC-95 [16] which takes the total accidental ...

  13. Ethics of conservation triage

    Directory of Open Access Journals (Sweden)

    Kerrie A Wilson

    2016-09-01

    Full Text Available Conservation triage seems to be at a stalemate between those who accept triage based on utilitarian rationalization, and those that reject it based on a number of ethical principles. We argue that without considered attention to the ethics of conservation triage we risk further polarization in the field of conservation. We draw lessons from the medical sector, where triage is more intuitive and acceptable, and also from disaster planning, to help navigate the challenges that triage entails for conservation science, practice, and policy. We clarify the consequentialist, deontological, and virtue ethical stances that influence the level of acceptance of triage. We emphasize the ethical dimensions of conservation triage in principle and in practice, particularly in the context of stakeholder diversity, a wide range of possible objectives and actions, broader institutions, and significant uncertainties. A focus on a more diverse set of ethics, more considered choice of triage as a conservation tool, open communication of triage objectives and protocols, greater consideration of risk preferences, and regular review and adaptation of triage protocols is required for conservation triage to become more acceptable among diverse conservation practitioners, institutions, and the general public. Accepting conservation triage as fundamentally an ethical problem would foster more open dialogue and constructive debate about the role of conservation triage in a wider system of care.

  14. Coding training for medical students: How good is diagnoses coding with ICD-10 by novices?

    Directory of Open Access Journals (Sweden)

    Stausberg, Jürgen

    2005-04-01

    Full Text Available Teaching of knowledge and competence in documentation and coding is an essential part of medical education. Therefore, coding training had been placed within the course of epidemiology, medical biometry, and medical informatics. From this, we can draw conclusions about the quality of coding by novices. One hundred and eighteen students coded diagnoses from 15 nephrological cases in homework. In addition to interrater reliability, validity was calculated by comparison with a reference coding. On the level of terminal codes, 59.3% of the students' results were correct. The completeness was calculated as 58.0%. The results on the chapter level increased up to 91.5% and 87.7% respectively. For the calculation of reliability a new, simple measure was developed that leads to values of 0.46 on the level of terminal codes and 0.87 on the chapter level for interrater reliability. The figures of concordance with the reference coding are quite similar. In contrary, routine data show considerably lower results with 0.34 and 0.63 respectively. Interrater reliability and validity of coding by novices is as good as coding by experts. The missing advantage of experts could be explained by the workload of documentation and a negative attitude to coding on the one hand. On the other hand, coding in a DRG-system is handicapped by a large number of detailed coding rules, which do not end in uniform results but rather lead to wrong and random codes. Anyway, students left the course well prepared for coding.

  15. TASS/SMR Code Topical Report for SMART Plant, Vol II: User's Guide and Input Requirement

    Energy Technology Data Exchange (ETDEWEB)

    Kim, See Darl; Kim, Soo Hyoung; Kim, Hyung Rae (and others)

    2008-10-15

    The TASS/SMR code has been developed with domestic technologies for the safety analysis of the SMART plant which is an integral type pressurized water reactor. It can be applied to the analysis of design basis accidents including non-LOCA (loss of coolant accident) and LOCA of the SMART plant. The TASS/SMR code can be applied to any plant regardless of the structural characteristics of a reactor since the code solves the same governing equations for both the primary and secondary system. The code has been developed to meet the requirements of the safety analysis code. This report describes the overall structure of the TASS/SMR, input processing, and the processes of a steady state and transient calculations. In addition, basic differential equations, finite difference equations, state relationships, and constitutive models are described in the report. First, the conservation equations, a discretization process for numerical analysis, search method for state relationship are described. Then, a core power model, heat transfer models, physical models for various components, and control and trip models are explained.

  16. Conservation: Toward firmer ground

    Science.gov (United States)

    1975-01-01

    The following aspects of energy conservation were discussed: conservation history and goals, conservation modes, conservation accounting-criteria, and a method to overcome obstacles. The conservation modes tested fall into one of the following categories: reduced energy consumption, increased efficiency of energy utilization, or substitution of one or more forms of energy for another which is in shorter supply or in some sense thought to be of more value. The conservation accounting criteria include net energy reduction, economic, and technical criteria. A method to overcome obstacles includes (approaches such as: direct personal impact (life style, income, security, aspiration), an element of crisis, large scale involvement of environmental, safety, and health issues, connections to big government, big business, big politics, involvement of known and speculative science and technology, appeal to moral and ethical standards, the transient nature of opportunities to correct the system.

  17. Econometric modelling of conservation

    International Nuclear Information System (INIS)

    Parker, J.C.; Seal, D.J.

    1990-01-01

    The issue of energy conservation in general, and conservation in the natural gas markets in particular, has recently had a much lower profile than in the past, when energy prices were significantly higher and energy costs composed a much larger proportion of industrial operating costs than today. The recent downward trend in energy prices has diverted attention away from this issue. In the face of expected significant real price increases, increasing pressure from environmental groups, and directives on the part of regulator authorities, conservation is once again becoming a topic of consideration in the energy industry. From the point of view of gas demand forecasting, conservation has received too little attention. The intentions of this paper are to establish the need for forecasting conservation in the natural gas utility sector, and to construct a model of industrial demand which incorporates conservation and is appropriate for use as a forecasting tool

  18. Handbook on energy conservation

    International Nuclear Information System (INIS)

    1989-12-01

    This book shows energy situation in recent years, which includes reserves of energy resource in the world, crude oil production records in OPEC and non OPEC, supply and demand of energy in important developed countries, prospect of supply and demand of energy and current situation of energy conservation in developed countries. It also deals with energy situation in Korea reporting natural resources status, energy conservation policy, measurement for alternative energy, energy management of Korea, investment in equipment and public education for energy conservation.

  19. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    This essay studies the source code of an artwork from a software studies perspective. By examining code that come close to the approach of critical code studies (Marino, 2006), I trace the network artwork, Pupufu (Lin, 2009) to understand various real-time approaches to social media platforms (MSN......, Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  20. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  1. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    Sacramento, A.M. do.

    1989-01-01

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  2. Synthesizing Certified Code

    OpenAIRE

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach for formally demonstrating software quality. Its basic idea is to require code producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates that can be checked independently. Since code certification uses the same underlying technology as program verification, it requires detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding annotations to th...

  3. FERRET data analysis code

    International Nuclear Information System (INIS)

    Schmittroth, F.

    1979-09-01

    A documentation of the FERRET data analysis code is given. The code provides a way to combine related measurements and calculations in a consistent evaluation. Basically a very general least-squares code, it is oriented towards problems frequently encountered in nuclear data and reactor physics. A strong emphasis is on the proper treatment of uncertainties and correlations and in providing quantitative uncertainty estimates. Documentation includes a review of the method, structure of the code, input formats, and examples

  4. Stylize Aesthetic QR Code

    OpenAIRE

    Xu, Mingliang; Su, Hao; Li, Yafei; Li, Xi; Liao, Jing; Niu, Jianwei; Lv, Pei; Zhou, Bing

    2018-01-01

    With the continued proliferation of smart mobile devices, Quick Response (QR) code has become one of the most-used types of two-dimensional code in the world. Aiming at beautifying the appearance of QR codes, existing works have developed a series of techniques to make the QR code more visual-pleasant. However, these works still leave much to be desired, such as visual diversity, aesthetic quality, flexibility, universal property, and robustness. To address these issues, in this paper, we pro...

  5. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  6. Mass, matter, materialization, mattergenesis and conservation of charge

    International Nuclear Information System (INIS)

    Tsan, Ung Chan

    2013-01-01

    model. Assumption of a novel interaction MC conserving (A–L) but violating simultaneously A and L (not trivial case of conservation) would allow energy to be transformed into a pair of baryon lepton or into a pair of antibaryon antilepton of opposite charges. This model could explain the asymmetric but nevertheless electrically neutral Universe but could not account for the numerical value of the tiny excess of matter over antimatter. The concept of anti-Universe would be superfluous. Observation of matter nonconservation processes would be of great interest to falsify this speculation. (author)

  7. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded...

  8. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  9. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  10. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  11. Biodiversity Conservation and Conservation Biotechnology Tools

    Science.gov (United States)

    This special issue is dedicated to the in vitro tools and methods used to conserve the genetic diversity of rare and threatened species from around the world. Species that are on the brink of extinction, due to the rapid loss of genetic diversity and habitat, come mainly from resource poor areas the...

  12. Paradigms for parasite conservation.

    Science.gov (United States)

    Dougherty, Eric R; Carlson, Colin J; Bueno, Veronica M; Burgio, Kevin R; Cizauskas, Carrie A; Clements, Christopher F; Seidel, Dana P; Harris, Nyeema C

    2016-08-01

    Parasitic species, which depend directly on host species for their survival, represent a major regulatory force in ecosystems and a significant component of Earth's biodiversity. Yet the negative impacts of parasites observed at the host level have motivated a conservation paradigm of eradication, moving us farther from attainment of taxonomically unbiased conservation goals. Despite a growing body of literature highlighting the importance of parasite-inclusive conservation, most parasite species remain understudied, underfunded, and underappreciated. We argue the protection of parasitic biodiversity requires a paradigm shift in the perception and valuation of their role as consumer species, similar to that of apex predators in the mid-20th century. Beyond recognizing parasites as vital trophic regulators, existing tools available to conservation practitioners should explicitly account for the unique threats facing dependent species. We built upon concepts from epidemiology and economics (e.g., host-density threshold and cost-benefit analysis) to devise novel metrics of margin of error and minimum investment for parasite conservation. We define margin of error as the risk of accidental host extinction from misestimating equilibrium population sizes and predicted oscillations, while minimum investment represents the cost associated with conserving the additional hosts required to maintain viable parasite populations. This framework will aid in the identification of readily conserved parasites that present minimal health risks. To establish parasite conservation, we propose an extension of population viability analysis for host-parasite assemblages to assess extinction risk. In the direst cases, ex situ breeding programs for parasites should be evaluated to maximize success without undermining host protection. Though parasitic species pose a considerable conservation challenge, adaptations to conservation tools will help protect parasite biodiversity in the face of

  13. Distinct timescales of population coding across cortex.

    Science.gov (United States)

    Runyan, Caroline A; Piasini, Eugenio; Panzeri, Stefano; Harvey, Christopher D

    2017-08-03

    The cortex represents information across widely varying timescales. For instance, sensory cortex encodes stimuli that fluctuate over few tens of milliseconds, whereas in association cortex behavioural choices can require the maintenance of information over seconds. However, it remains poorly understood whether diverse timescales result mostly from features intrinsic to individual neurons or from neuronal population activity. This question remains unanswered, because the timescales of coding in populations of neurons have not been studied extensively, and population codes have not been compared systematically across cortical regions. Here we show that population codes can be essential to achieve long coding timescales. Furthermore, we find that the properties of population codes differ between sensory and association cortices. We compared coding for sensory stimuli and behavioural choices in auditory cortex and posterior parietal cortex as mice performed a sound localization task. Auditory stimulus information was stronger in auditory cortex than in posterior parietal cortex, and both regions contained choice information. Although auditory cortex and posterior parietal cortex coded information by tiling in time neurons that were transiently informative for approximately 200 milliseconds, the areas had major differences in functional coupling between neurons, measured as activity correlations that could not be explained by task events. Coupling among posterior parietal cortex neurons was strong and extended over long time lags, whereas coupling among auditory cortex neurons was weak and short-lived. Stronger coupling in posterior parietal cortex led to a population code with long timescales and a representation of choice that remained consistent for approximately 1 second. In contrast, auditory cortex had a code with rapid fluctuations in stimulus and choice information over hundreds of milliseconds. Our results reveal that population codes differ across cortex

  14. Significance of Perceived Social Expectation and Implications to Conservation Education: Turtle Conservation as a Case Study

    Science.gov (United States)

    Lo, Alex Y.; Chow, Alex T.; Cheung, Sze Man

    2012-11-01

    The likelihood of participating in wildlife conservation programs is dependent on social influences and circumstances. This view is validated by a case study of behavioral intention to support conservation of Asian turtles. A total of 776 college students in China completed a questionnaire survey designed to identify factors associated with their intention to support conservation. A regression model explained 48 % of variance in the level of intention. Perceived social expectation was the strongest predictor, followed by attitudes toward turtle protection and perceived behavioral control, altogether explaining 44 %. Strong ethics and socio-economic variables had some statistical significant impacts and accounted for 3 % of the variance. The effects of general environmental awareness, trust and responsibility ascription were modest. Knowledge about turtles was a weak predictor. We conclude that perceived social expectation is a limiting factor of conservation behavior. Sustained interest and commitment to conservation can be created by enhancing positive social influences. Conservation educators should explore the potential of professionally supported, group-based actions that can nurture a sense of collective achievement as part of an educational campaign.

  15. The network code

    International Nuclear Information System (INIS)

    1997-01-01

    The Network Code defines the rights and responsibilities of all users of the natural gas transportation system in the liberalised gas industry in the United Kingdom. This report describes the operation of the Code, what it means, how it works and its implications for the various participants in the industry. The topics covered are: development of the competitive gas market in the UK; key points in the Code; gas transportation charging; impact of the Code on producers upstream; impact on shippers; gas storage; supply point administration; impact of the Code on end users; the future. (20 tables; 33 figures) (UK)

  16. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  17. 18 CFR 410.1 - Basin regulations-Water Code and Administrative Manual-Part III Water Quality Regulations.

    Science.gov (United States)

    2010-04-01

    ... Code and Administrative Manual-Part III Water Quality Regulations. 410.1 Section 410.1 Conservation of... CODE AND ADMINISTRATIVE MANUAL-PART III WATER QUALITY REGULATIONS § 410.1 Basin regulations—Water Code and Administrative Manual—Part III Water Quality Regulations. (a) The Water Code of the Delaware River...

  18. Introducing Conservation of Momentum

    Science.gov (United States)

    Brunt, Marjorie; Brunt, Geoff

    2013-01-01

    The teaching of the principle of conservation of linear momentum is considered (ages 15 + ). From the principle, the momenta of two masses in an isolated system are considered. Sketch graphs of the momenta make Newton's laws appear obvious. Examples using different collision conditions are considered. Conservation of momentum is considered…

  19. Water Conservation Resource List.

    Science.gov (United States)

    NJEA Review, 1981

    1981-01-01

    Alarmed by the growing water shortage, the New Jersey State Office of Dissemination has prepared this annotated list of free or inexpensive instructional materials for teaching about water conservation, K-l2. A tipsheet for home water conservation is appended. (Editor/SJL)

  20. Controllability of conservative behaviours

    NARCIS (Netherlands)

    Rao, Shodhan

    2012-01-01

    In this article, we first define the class of J-conservative behaviours with observable storage functions, where J is a symmetric two-variable polynomial matrix. We then provide two main results. The first result states that if J(-xi,xi) is nonsingular, the input cardinality of a J-conservative

  1. Conservation Science Fair Projects.

    Science.gov (United States)

    Soil Conservation Society of America, Ankeny, IA.

    Included are ideas, suggestions, and examples for selecting and designing conservation science projects. Over 70 possible conservation subject areas are presented with suggested projects. References are cited with each of these subject areas, and a separate list of annotated references is included. The references pertain to general subject…

  2. Fixism and conservation science.

    Science.gov (United States)

    Robert, Alexandre; Fontaine, Colin; Veron, Simon; Monnet, Anne-Christine; Legrand, Marine; Clavel, Joanne; Chantepie, Stéphane; Couvet, Denis; Ducarme, Frédéric; Fontaine, Benoît; Jiguet, Frédéric; le Viol, Isabelle; Rolland, Jonathan; Sarrazin, François; Teplitsky, Céline; Mouchet, Maud

    2017-08-01

    The field of biodiversity conservation has recently been criticized as relying on a fixist view of the living world in which existing species constitute at the same time targets of conservation efforts and static states of reference, which is in apparent disagreement with evolutionary dynamics. We reviewed the prominent role of species as conservation units and the common benchmark approach to conservation that aims to use past biodiversity as a reference to conserve current biodiversity. We found that the species approach is justified by the discrepancy between the time scales of macroevolution and human influence and that biodiversity benchmarks are based on reference processes rather than fixed reference states. Overall, we argue that the ethical and theoretical frameworks underlying conservation research are based on macroevolutionary processes, such as extinction dynamics. Current species, phylogenetic, community, and functional conservation approaches constitute short-term responses to short-term human effects on these reference processes, and these approaches are consistent with evolutionary principles. © 2016 Society for Conservation Biology.

  3. Setting conservation priorities.

    Science.gov (United States)

    Wilson, Kerrie A; Carwardine, Josie; Possingham, Hugh P

    2009-04-01

    A generic framework for setting conservation priorities based on the principles of classic decision theory is provided. This framework encapsulates the key elements of any problem, including the objective, the constraints, and knowledge of the system. Within the context of this framework the broad array of approaches for setting conservation priorities are reviewed. While some approaches prioritize assets or locations for conservation investment, it is concluded here that prioritization is incomplete without consideration of the conservation actions required to conserve the assets at particular locations. The challenges associated with prioritizing investments through time in the face of threats (and also spatially and temporally heterogeneous costs) can be aided by proper problem definition. Using the authors' general framework for setting conservation priorities, multiple criteria can be rationally integrated and where, how, and when to invest conservation resources can be scheduled. Trade-offs are unavoidable in priority setting when there are multiple considerations, and budgets are almost always finite. The authors discuss how trade-offs, risks, uncertainty, feedbacks, and learning can be explicitly evaluated within their generic framework for setting conservation priorities. Finally, they suggest ways that current priority-setting approaches may be improved.

  4. Madagascar Conservation & Development

    African Journals Online (AJOL)

    Madagascar Conservation & Development welcomes the results of original research, field surveys, advances in field and laboratory techniques, book reviews, and informal status reports from research, conservation, development and management programs and in-field projects in Madagascar. In addition, notes on changes ...

  5. Resource Conservation Glossary.

    Science.gov (United States)

    Soil Conservation Society of America, Ankeny, IA.

    This glossary is a composite of terms selected from 13 technologies, and is the expanded revision of the original 1952 edition of "The Soil and Water Conservation Glossary." The terms were selected from these areas: agronomy, biology, conservation, ecology, economics, engineering, forestry, geology, hydrology, range, recreation, soils, and…

  6. Creative Soil Conservation

    Science.gov (United States)

    Smith, Martha

    2010-01-01

    Take plant lessons outdoors with this engaging and inquiry-based activity in which third-grade students learn how to apply soil conservation methods to growing plants. They also collect data and draw conclusions about the effectiveness of their method of soil conservation. An added benefit to this activity is that the third-grade students played…

  7. Training program for energy conservation in new-building construction. Volume IV. Energy conservation technology: advanced course for plan examiners

    Energy Technology Data Exchange (ETDEWEB)

    None

    1977-12-01

    A Model Code for Energy Conservation in New Building Construction has been developed by those national organizations primarily concerned with the development and promulgation of model codes. The technical provisions are based on ASHRAE Standard 90-75 and are intended for use by state and local officials. This manual contains a more in-depth training in the review techniques and concepts required by the plan examiners and code officials in administering the code for conventional (buildings of 3 stories or less) construction.

  8. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  9. XSOR codes users manual

    International Nuclear Information System (INIS)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  10. Estimating energy conservation patterns of Greek households

    International Nuclear Information System (INIS)

    Sardianou, Eleni

    2007-01-01

    This paper develops an empirical model to investigate the main determinants of household energy conservation patterns in Greece employing cross-section data. In the empirical analysis, household energy-conserving choices models are employed, using a discrete and a latent trait variable respectively as a dependent variable. The results show that socio-economic variables such as consumers' income and family size are suitable to explain differences towards energy conservation preferences. In addition, the results suggest that electricity expenditures and age of the respondent are negatively associated with the number of energy-conserving actions that a consumer is willing to adopt. Finally, other variables such as environmental information feedback and consciousness of energy problems are characteristics of the energy-saver consumer. By evaluating consumer's decision-making process with regards to energy conservation measures, we are able to formulate and propose an effective energy conservation framework for Greece. An energy policy framework is among the main prerequisites not only to achieve sustainable development but also to maintain consumers' quality of life

  11. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    1999-01-01

    The present lecture has a main goal to show how the transport lattice calculations are realised in a standard computer code. This is illustrated on the example of the WIMSD code, belonging to the most popular tools for reactor calculations. Most of the approaches discussed here can be easily modified to any other lattice code. The description of the code assumes the basic knowledge of reactor lattice, on the level given in the lecture on 'Reactor lattice transport calculations'. For more advanced explanation of the WIMSD code the reader is directed to the detailed descriptions of the code cited in References. The discussion of the methods and models included in the code is followed by the generally used homogenisation procedure and several numerical examples of discrepancies in calculated multiplication factors based on different sources of library data. (author)

  12. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  13. Japan's energy conservation policy

    International Nuclear Information System (INIS)

    Yoda, Kenichi

    1990-01-01

    This article reviews developments in Japanese energy conservation since the 1970s. The industrial sector has achieved the greatest success, due to industrial restructuring as well as improvements in energy efficiency. In the residential/commercial sector, the efficiency of appliances has been much improved. Although improvements have been made in the fuel efficiency of passenger cars, energy consumption in the transportation sector has risen slightly owing to increased transport of passengers and freight. The overall responsibility for energy conservation policy rests with the Ministry of International Trade and Industry. MITI is also responsible for implementing specific conservation policies in regard to the industrial and commercial sectors. In the residential sector, MITI works with the Ministry of Construction and in the transportation sector with the Ministry of Transport. To realize the goals of energy conservation policy through general research, dissemination of public information and other activities, MITI works with the Energy Conservation Center (ECC). (author). 2 figs, 3 tabs

  14. Tests of conservation laws

    International Nuclear Information System (INIS)

    Goldhaber, M.

    1988-01-01

    For quite a while it has been realized that some discrete quantum numbers are conserved in some interactions but not in others. The most conspicuous cases are parity P, charge conjugation C, and the product CP which are conserved in strong and electromagnetic interactions but not in weak interactions. The question arises whether for some of the other conserved quantities, which are conserved in strong, electromagnetic and weak interactions, there is an interaction intermediate in strength between weak and gravitational which violates these quantum numbers, e.g., baryon number B and lepton number L. The possibility exists that these conservation laws, if they are broken at all, are only broken by the gravitational force which would make the mass of an intermediate boson which induces the break-down equal to the Planck mass. (orig.)

  15. Understanding Farmers: Explaining Soil and Water Conservation in Konso, Wolaita and Wello, Ethiopia

    NARCIS (Netherlands)

    Beshah, T.

    2003-01-01

    Soil erosion by water is an old problem in Ethiopia. The prevalence of mountainous and undulating landscapes, coupled with the expansion of arable farming on steep areas due to population pressure have aggravated the soil erosion problem in the country. Prompted by one of the great famines in the

  16. Evaluation of the present genetic conservation efforts in Pinus sylvestris, Picea abies, Quercus spp., Fagus sylvatica, and Pinus pinaster

    NARCIS (Netherlands)

    Kramer, K.

    2015-01-01

    Information on genetic diversity and gene conservation activities were combined with climatic data to evaluate the present genetic conservation efforts in Pinus sylvestris, Picea abies, Quercus spp., Fagus sylvatica, and Pinus pinaster. Combinations of climatic variables explained much of the

  17. Integrated code development for studying laser driven plasmas

    Energy Technology Data Exchange (ETDEWEB)

    Takabe, Hideaki; Nagatomo, Hideo; Sunahara, Atsusi; Ohnishi, Naofumi; Naruo, Syuji; Mima, Kunioki [Osaka Univ., Suita (Japan). Inst. of Laser Engineering

    1998-03-01

    Present status and plan for developing an integrated implosion code are briefly explained by focusing on motivation, numerical scheme and issues to be developed more. Highly nonlinear stage of Rayleigh-Taylor instability of ablation front by laser irradiation has been simulated so as to be compared with model experiments. Improvement in transport and rezoning/remapping algorithms in ILESTA code is described. (author)

  18. Peripheral Codes in ASTRA for the TJ-II

    International Nuclear Information System (INIS)

    Lopez-Bruna, D.; Reynolds, J. M.; Cappa, A.; Martinell, J.; Garcia, J.; Gutierrez-Tapia, C.

    2010-01-01

    The study of data from the TJ-II device is often done with transport calculations based on the ASTRA transport system. However, complicated independent codes are used to obtain fundamental ingredients in these calculations, such as the particle and/or energy sources. These codes are accessible from ASTRA through the procedures explained in this report. (Author) 37 refs.

  19. The computer code SEURBNUK-2

    International Nuclear Information System (INIS)

    Yerkess, A.

    1984-01-01

    SEURBNUK-2 has been designed to model the hydrodynamic development in time of a hypothetical core disrupture accident in a fast breeder reactor. SEURBNUK-2 is a two-dimensional, axisymmetric, eulerian, finite difference containment code. The numerical procedure adopted in SEURBNUK to solve the hydrodynamic equations is based on the semi-implicit ICE method. SEURBNUK has a full thin shell treatment for tanks of arbitrary shape and includes the effects of the compressibility of the fluid. Fluid flow through porous media and porous structures can also be accommodated. An important feature of SEURBNUK is that the thin shell equations are solved quite separately from those of the fluid, and the time step for the fluid flow calculation can be an integer multiple of that for calculating the shell motion. The interaction of the shell with the fluid is then considered as a modification to the coefficients in the implicit pressure equations, the modifications naturally depending on the behaviour of the thin shell section within the fluid cell. The code is limited to dealing with a single fluid, the coolant, whereas the bubble and the cover gas are treated as cavities of uniform pressure calculated via appropriate pressure-volume-energy relationships. This manual describes the input data specifications needed for the execution of SEURBNUK-2 calculations and nine sample problems of varying degrees of complexity highlight the code capabilities. After explaining the output facilities information is included to aid those unfamiliar with SEURBNUK-2 to avoid the common pit-falls experienced by novices

  20. Module description of TOKAMAK equilibrium code MEUDAS

    Energy Technology Data Exchange (ETDEWEB)

    Suzuki, Masaei; Hayashi, Nobuhiko; Matsumoto, Taro; Ozeki, Takahisa [Japan Atomic Energy Research Inst., Naka, Ibaraki (Japan). Naka Fusion Research Establishment

    2002-01-01

    The analysis of an axisymmetric MHD equilibrium serves as a foundation of TOKAMAK researches, such as a design of devices and theoretical research, the analysis of experiment result. For this reason, also in JAERI, an efficient MHD analysis code has been developed from start of TOKAMAK research. The free boundary equilibrium code ''MEUDAS'' which uses both the DCR method (Double-Cyclic-Reduction Method) and a Green's function can specify the pressure and the current distribution arbitrarily, and has been applied to the analysis of a broad physical subject as a code having rapidity and high precision. Also the MHD convergence calculation technique in ''MEUDAS'' has been built into various newly developed codes. This report explains in detail each module in ''MEUDAS'' for performing convergence calculation in solving the MHD equilibrium. (author)

  1. Module description of TOKAMAK equilibrium code MEUDAS

    International Nuclear Information System (INIS)

    Suzuki, Masaei; Hayashi, Nobuhiko; Matsumoto, Taro; Ozeki, Takahisa

    2002-01-01

    The analysis of an axisymmetric MHD equilibrium serves as a foundation of TOKAMAK researches, such as a design of devices and theoretical research, the analysis of experiment result. For this reason, also in JAERI, an efficient MHD analysis code has been developed from start of TOKAMAK research. The free boundary equilibrium code ''MEUDAS'' which uses both the DCR method (Double-Cyclic-Reduction Method) and a Green's function can specify the pressure and the current distribution arbitrarily, and has been applied to the analysis of a broad physical subject as a code having rapidity and high precision. Also the MHD convergence calculation technique in ''MEUDAS'' has been built into various newly developed codes. This report explains in detail each module in ''MEUDAS'' for performing convergence calculation in solving the MHD equilibrium. (author)

  2. ZERBERUS - the code for reliability analysis of crack containing structures

    International Nuclear Information System (INIS)

    Cizelj, L.; Riesch-Oppermann, H.

    1992-04-01

    Brief description of the First- and Second Order Reliability Methods, being the theoretical background of the code, is given. The code structure is described in detail, with special emphasis to the new application fields. The numerical example investigates failure probability of steam generator tubing affected by stress corrosion cracking. The changes necessary to accommodate this analysis within the ZERBERUS code are explained. Analysis results are compared to different Monte Carlo techniques. (orig./HP) [de

  3. Polar Coding for the Large Hadron Collider: Challenges in Code Concatenation

    CERN Document Server

    AUTHOR|(CDS)2238544; Podzorny, Tomasz; Uythoven, Jan

    2018-01-01

    In this work, we present a concatenated repetition-polar coding scheme that is aimed at applications requiring highly unbalanced unequal bit-error protection, such as the Beam Interlock System of the Large Hadron Collider at CERN. Even though this concatenation scheme is simple, it reveals significant challenges that may be encountered when designing a concatenated scheme that uses a polar code as an inner code, such as error correlation and unusual decision log-likelihood ratio distributions. We explain and analyze these challenges and we propose two ways to overcome them.

  4. 3-D rod ejection analysis using a conservative methodology

    Energy Technology Data Exchange (ETDEWEB)

    Park, Min Ho; Park, Jin Woo; Park, Guen Tae; Um, Kil Sup; Ryu, Seok Hee; Lee, Jae Il; Choi, Tong Soo [KEPCO, Daejeon (Korea, Republic of)

    2016-05-15

    The point kinetics model which simplifies the core phenomena and physical specifications is used for the conventional rod ejection accident analysis. The point kinetics model is convenient to assume conservative core parameters but this simplification loses large amount of safety margin. The CHASER system couples the three-dimensional core neutron kinetics code ASTRA, the sub-channel analysis code THALES and the fuel performance analysis code FROST. The validation study for the CHASER system is addressed using the NEACRP three-dimensional PWR core transient benchmark problem. A series of conservative rod ejection analyses for the APR1400 type plant is performed for both hot full power (HFP) and hot zero power (HZP) conditions to determine the most limiting cases. The conservative rod ejection analysis methodology is designed to properly consider important phenomena and physical parameters.

  5. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  6. Code red: an economist explains how to revive the healthcare system without destroying it

    National Research Council Canada - National Science Library

    Dranove, David

    2008-01-01

    ... during their final days and weeks without enduring financial hardship. I hope that I am able, through this book, to help all Americans be so fortunate. I would also like to acknowledge the research sup...

  7. Examining the linguistic coding differences hypothesis to explain individual differences in foreign language learning.

    Science.gov (United States)

    Sparks, R L

    1995-01-01

    In this paper, it is suggested that foreign language learning problems result from difficulties with native language learning and hypothesized that difficulties with phonological processing may be the locus of foreign language learning difficulties for some poor foreign language learners. Evidence is described that supports these positions. It is argued that conceptualizing foreign language learning problems as alanguage problem allows researchers to more clearly specify deficits related to the learning of a foreign language. Research evidence which shows that good and poor foreign language learners exhibit significantly different levels of native language skill and phonological processing is summarized. Finally, potential challenges to my hypotheses as an explanation for foreign language learning problems are reviewed.

  8. Conservative orientation as a determinant of hopelessness.

    Science.gov (United States)

    Cheung, C K; Kwok, S T

    1996-06-01

    Conservative orientation is identified with reference to authoritarianism, work ethic belief, just world belief, and endorsement of individualistic causes of social problems. This over-arching orientation is hypothesized to affect hopelessness and to be affected by self-esteem with reference to ego development theory and learned helplessness theory. Causal modeling of data obtained from 1st-year college students (N = 556) in Hong Kong supports the hypotheses, showing that a student's hopelessness relates to his or her conservative orientation, even when self-esteem is controlled. This relationship can be interpreted by ego development and learned helplessness theories and cannot be explained as a spurious effect. Through the theories, hopelessness is interpreted as a result of maladaptive development and fatalistic, alienated, and helpless outlooks. This maladaptive development and the outlooks in turn result from students' conservative and individualistic orientation.

  9. Debarring from succession – Comparing the regulations of the former civil code and the New Civil Code from 2009

    Directory of Open Access Journals (Sweden)

    Ioana NICOLAE

    2012-01-01

    Full Text Available This paper presents the changes in the legal framework regarding succession issue. These changes have been examined in light of three hypotheses arising from the former Civil Code. The distinction between judiciary debarring and lawful debarring introduced by the New Civil Code from 2009 is also presented. The conditions for cancelling the effects of debarring from succession stipulated by the New Civil Code are explained. Finally, several legal circumstances for declaring a person unworthy of succession are comparatively presented.

  10. An Optimal Linear Coding for Index Coding Problem

    OpenAIRE

    Pezeshkpour, Pouya

    2015-01-01

    An optimal linear coding solution for index coding problem is established. Instead of network coding approach by focus on graph theoric and algebraic methods a linear coding program for solving both unicast and groupcast index coding problem is presented. The coding is proved to be the optimal solution from the linear perspective and can be easily utilize for any number of messages. The importance of this work is lying mostly on the usage of the presented coding in the groupcast index coding ...

  11. Explaining ecological clusters of maternal depression in South Western Sydney.

    Science.gov (United States)

    Eastwood ED, John; Kemp, Lynn; Jalaludin, Bin

    2014-01-24

    The aim of the qualitative study reported here was to: 1) explain the observed clustering of postnatal depressive symptoms in South Western Sydney; and 2) identify group-level mechanisms that would add to our understanding of the social determinants of maternal depression. Critical realism provided the methodological underpinning for the study. The setting was four local government areas in South Western Sydney, Australia. Child and Family practitioners and mothers in naturally occurring mothers groups were interviewed. Using an open coding approach to maximise emergence of patterns and relationships we have identified seven theoretical concepts that might explain the observed spatial clustering of maternal depression. The theoretical concepts identified were: Community-level social networks; Social Capital and Social Cohesion; "Depressed community"; Access to services at the group level; Ethnic segregation and diversity; Supportive social policy; and Big business. We postulate that these regional structural, economic, social and cultural mechanisms partially explain the pattern of maternal depression observed in families and communities within South Western Sydney. We further observe that powerful global economic and political forces are having an impact on the local situation. The challenge for policy and practice is to support mothers and their families within this adverse regional and global-economic context.

  12. Explaining ecological clusters of maternal depression in South Western Sydney

    Science.gov (United States)

    2014-01-01

    Background The aim of the qualitative study reported here was to: 1) explain the observed clustering of postnatal depressive symptoms in South Western Sydney; and 2) identify group-level mechanisms that would add to our understanding of the social determinants of maternal depression. Methods Critical realism provided the methodological underpinning for the study. The setting was four local government areas in South Western Sydney, Australia. Child and Family practitioners and mothers in naturally occurring mothers groups were interviewed. Results Using an open coding approach to maximise emergence of patterns and relationships we have identified seven theoretical concepts that might explain the observed spatial clustering of maternal depression. The theoretical concepts identified were: Community-level social networks; Social Capital and Social Cohesion; "Depressed community"; Access to services at the group level; Ethnic segregation and diversity; Supportive social policy; and Big business. Conclusions We postulate that these regional structural, economic, social and cultural mechanisms partially explain the pattern of maternal depression observed in families and communities within South Western Sydney. We further observe that powerful global economic and political forces are having an impact on the local situation. The challenge for policy and practice is to support mothers and their families within this adverse regional and global-economic context. PMID:24460690

  13. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  14. Theory of epigenetic coding.

    Science.gov (United States)

    Elder, D

    1984-06-07

    The logic of genetic control of development may be based on a binary epigenetic code. This paper revises the author's previous scheme dealing with the numerology of annelid metamerism in these terms. Certain features of the code had been deduced to be combinatorial, others not. This paradoxical contrast is resolved here by the interpretation that these features relate to different operations of the code; the combinatiorial to coding identity of units, the non-combinatorial to coding production of units. Consideration of a second paradox in the theory of epigenetic coding leads to a new solution which further provides a basis for epimorphic regeneration, and may in particular throw light on the "regeneration-duplication" phenomenon. A possible test of the model is also put forward.

  15. DISP1 code

    International Nuclear Information System (INIS)

    Vokac, P.

    1999-12-01

    DISP1 code is a simple tool for assessment of the dispersion of the fission product cloud escaping from a nuclear power plant after an accident. The code makes it possible to tentatively check the feasibility of calculations by more complex PSA3 codes and/or codes for real-time dispersion calculations. The number of input parameters is reasonably low and the user interface is simple enough to allow a rapid processing of sensitivity analyses. All input data entered through the user interface are stored in the text format. Implementation of dispersion model corrections taken from the ARCON96 code enables the DISP1 code to be employed for assessment of the radiation hazard within the NPP area, in the control room for instance. (P.A.)

  16. NALAP: an LMFBR system transient code

    International Nuclear Information System (INIS)

    Martin, B.A.; Agrawal, A.K.; Albright, D.C.; Epel, L.G.; Maise, G.

    1975-07-01

    NALAP is a LMFBR system transient code. This code, adapted from the light water reactor transient code RELAP 3B, simulates thermal-hydraulic response of sodium cooled fast breeder reactors when subjected to postulated accidents such as a massive pipe break as well as a variety of other upset conditions that do not disrupt the system geometry. Various components of the plant are represented by control volumes. These control volumes are connected by junctions some of which may be leak or fill junctions. The fluid flow equations are modeled as compressible, single-stream flow with momentum flux in one dimension. The transient response is computed by integrating the thermal-hydraulic conservation equations from user-initialized operating conditions by an implicit numerical scheme. Point kinetics approximation is used to represent the time dependent heat generation in the reactor core

  17. Phonological coding during reading.

    Science.gov (United States)

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  18. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  19. MORSE Monte Carlo code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described

  20. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  1. Tokamak Systems Code

    International Nuclear Information System (INIS)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  2. Topology Explains Why Automobile Sunshades Fold Oddly

    Science.gov (United States)

    Feist, Curtis; Naimi, Ramin

    2009-01-01

    Automobile sunshades always fold into an "odd" number of loops. The explanation why involves elementary topology (braid theory and linking number, both explained in detail here with definitions and examples), and an elementary fact from algebra about symmetric group.

  3. Your Radiologist Explains Magnetic Resonance Angiography (MRA)

    Medline Plus

    Full Text Available ... Disorders Video: The Basketball Game: An MRI Story Radiology and You Sponsored by Image/Video Gallery Your ... Explains Magnetic Resonance Angiography (MRA) Transcript Welcome to Radiology Info dot org Hello, I’m Dr. Elliot ...

  4. Explorers Presentation: Explaining the Tides to Children

    OpenAIRE

    Institute, Marine

    2015-01-01

    Explaining the tides to children Presentation includes information about: Orbits of the Earth, Moon and Sun; Moon phases and the lunar cycle; Gravity; Gravity and the tide; Types of tides; The tides and me!; Tide tables; Extra insight

  5. Your Radiologist Explains Magnetic Resonance Angiography (MRA)

    Medline Plus

    Full Text Available ... An MRI Story Radiology and You Sponsored by Image/Video Gallery Your Radiologist Explains Magnetic Resonance Angiography ( ... posted: How to Obtain and Share Your Medical Images Movement Disorders Video: The Basketball Game: An MRI ...

  6. A model to explain human voice production

    Science.gov (United States)

    Vilas Bôas, C. S. N.; Gobara, S. T.

    2018-05-01

    This article presents a device constructed with low-cost material to demonstrate and explain voice production. It also provides a contextualized, interdisciplinary approach to introduce the study of sound waves.

  7. Using Expectancy Theory to Explain Performance Appraisal ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... appraisal conducting style, the relation between the performance appraisal system and task ... the article first explains the theory model which is based expectancy theory. II. ... which in return lead to rewards. According to [12],.

  8. A Resource Conservation Unit.

    Science.gov (United States)

    Porter, Philip D.

    1979-01-01

    Describes a variety of learning activities for teaching elementary and junior high students about air, water, and energy conservation techniques. Suggests community resources, social studies objectives, language skills, and 20 activities. (CK)

  9. Hearing Conservation Team

    Data.gov (United States)

    Federal Laboratory Consortium — The Hearing Conservation Team focuses on ways to identify the early stages of noise-induced damage to the human ear.Our current research involves the evaluation of...

  10. Madagascar Conservation & Development

    African Journals Online (AJOL)

    Madagascar Conservation & Development. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 9, No 1 (2014) >. Log in or Register to get access to full text downloads.

  11. Metro Conservation Corridors

    Data.gov (United States)

    Minnesota Department of Natural Resources — The Metro Conservation Corridors (MeCC) grow out of the natural resource analysis work done by the DNR in the late '90's, documented in the Metro Greenprint...

  12. Madagascar Conservation & Development

    African Journals Online (AJOL)

    www.journalmcd.com

    2012-02-19

    Feb 19, 2012 ... MADAGASCAR CONSERVATION & DEVELOPMENT. VOLUME 7 ... die within a short period of time (e.g., infanticide) (Erhart and. Overdorff 1998 .... been as deep or may have healed by the time of examination. Falls during ...

  13. Birds of Conservation Concern

    Data.gov (United States)

    Department of the Interior — The 1988 amendment to the Fish and Wildlife Conservation Act mandates the U.S. Fish and Wildlife Service (USFWS) to “identify species, subspecies, and populations of...

  14. Efficient Coding of Information: Huffman Coding -RE ...

    Indian Academy of Sciences (India)

    to a stream of equally-likely symbols so as to recover the original stream in the event of errors. The for- ... The source-coding problem is one of finding a mapping from U to a ... probability that the random variable X takes the value x written as ...

  15. NR-code: Nonlinear reconstruction code

    Science.gov (United States)

    Yu, Yu; Pen, Ue-Li; Zhu, Hong-Ming

    2018-04-01

    NR-code applies nonlinear reconstruction to the dark matter density field in redshift space and solves for the nonlinear mapping from the initial Lagrangian positions to the final redshift space positions; this reverses the large-scale bulk flows and improves the precision measurement of the baryon acoustic oscillations (BAO) scale.

  16. Mesocycles in conserving plastics

    DEFF Research Database (Denmark)

    Shashoua, Yvonne

    2016-01-01

    driven by the need to balance the requirements for reversibility in conservation practices with the artist’s intent and significance. Developments within each of the three mesocycles from the 1990s to date are discussed in this article. Environmental science and toxicology of waste plastics offer a novel...... source of information about real time degradation in terrestrial and marine microenvironments that seems likely to contribute to the conservation of similar materials in contemporary artworks....

  17. Soil conservation measures: exercises

    OpenAIRE

    Figueiredo, Tomás de; Fonseca, Felícia

    2009-01-01

    Exercises proposed under the topic of Soil Conservation Measures addresses to the design of structural measure, namely waterways in the context of a soil conservation plan. However, to get a better insight on the actual meaning of soil loss as a resource loss, a prior exercise is proposed to students. It concerns calculations of soil loss due to sheet (interrill) erosion and to gully erosion, and allows the perception through realistic number of the impact of these mechanism...

  18. Strange history: the fall of Rome explained in Hereditas.

    Science.gov (United States)

    Bengtsson, Bengt O

    2014-12-01

    In 1921 Hereditas published an article on the fall of Rome written by the famous classical scholar Martin P:son Nilsson. Why was a paper on this unexpected topic printed in the newly founded journal? To Nilsson, the demise of the Roman Empire was explained by the "bastardization" occurring between "races" from different parts of the realm. Offspring from mixed couples were of a less stable "type" than their parents, due to the breaking up by recombination of the original hereditary dispositions, which led to a general loss of competence to rule and govern. Thus, the "hardness" of human genes, together with their recombination, was - according to Nilsson - the main cause of the fall of Rome. Nilsson's argument is not particularly convincingly presented. Human "races" are taken to have the same genetic structure as inbred crop strains, and Nilsson believes in a metaphysical unity between the individual and the race to which it belongs. However, in my view, Martin P:son Nilsson and his friend Herman Nilsson-Ehle had wider aims with the article than to explain a historical event. The article can be read as indicating strong support from the classical human sciences to the ambitious new science of genetics. Support is also transferred from genetics to the conservative worldview, where the immutability and inflexibility of the Mendelian genes are used to strengthen the wish for greater stability in politics and life. The strange article in Hereditas can, thus, be read as an early instance in the - still ongoing - tug-of-war between the conservative and the liberal ideological poles over how genetic results best are socially interpreted. © 2015 The Authors.

  19. Annotating non-coding regions of the genome.

    Science.gov (United States)

    Alexander, Roger P; Fang, Gang; Rozowsky, Joel; Snyder, Michael; Gerstein, Mark B

    2010-08-01

    Most of the human genome consists of non-protein-coding DNA. Recently, progress has been made in annotating these non-coding regions through the interpretation of functional genomics experiments and comparative sequence analysis. One can conceptualize functional genomics analysis as involving a sequence of steps: turning the output of an experiment into a 'signal' at each base pair of the genome; smoothing this signal and segmenting it into small blocks of initial annotation; and then clustering these small blocks into larger derived annotations and networks. Finally, one can relate functional genomics annotations to conserved units and measures of conservation derived from comparative sequence analysis.

  20. Synthesizing Certified Code

    Science.gov (United States)

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach to demonstrate software quality on a formal level. Its basic idea is to require producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates which can be checked independently. Since code certification uses the same underlying technology as program verification, it also requires many detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding theses annotations to the code is time-consuming and error-prone. We address this problem by combining code certification with automatic program synthesis. We propose an approach to generate simultaneously, from a high-level specification, code and all annotations required to certify generated code. Here, we describe a certification extension of AUTOBAYES, a synthesis tool which automatically generates complex data analysis programs from compact specifications. AUTOBAYES contains sufficient high-level domain knowledge to generate detailed annotations. This allows us to use a general-purpose verification condition generator to produce a set of proof obligations in first-order logic. The obligations are then discharged using the automated theorem E-SETHEO. We demonstrate our approach by certifying operator safety for a generated iterative data classification program without manual annotation of the code.

  1. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  2. Interleaved Product LDPC Codes

    OpenAIRE

    Baldi, Marco; Cancellieri, Giovanni; Chiaraluce, Franco

    2011-01-01

    Product LDPC codes take advantage of LDPC decoding algorithms and the high minimum distance of product codes. We propose to add suitable interleavers to improve the waterfall performance of LDPC decoding. Interleaving also reduces the number of low weight codewords, that gives a further advantage in the error floor region.

  3. Insurance billing and coding.

    Science.gov (United States)

    Napier, Rebecca H; Bruelheide, Lori S; Demann, Eric T K; Haug, Richard H

    2008-07-01

    The purpose of this article is to highlight the importance of understanding various numeric and alpha-numeric codes for accurately billing dental and medically related services to private pay or third-party insurance carriers. In the United States, common dental terminology (CDT) codes are most commonly used by dentists to submit claims, whereas current procedural terminology (CPT) and International Classification of Diseases, Ninth Revision, Clinical Modification (ICD.9.CM) codes are more commonly used by physicians to bill for their services. The CPT and ICD.9.CM coding systems complement each other in that CPT codes provide the procedure and service information and ICD.9.CM codes provide the reason or rationale for a particular procedure or service. These codes are more commonly used for "medical necessity" determinations, and general dentists and specialists who routinely perform care, including trauma-related care, biopsies, and dental treatment as a result of or in anticipation of a cancer-related treatment, are likely to use these codes. Claim submissions for care provided can be completed electronically or by means of paper forms.

  4. Error Correcting Codes

    Indian Academy of Sciences (India)

    Science and Automation at ... the Reed-Solomon code contained 223 bytes of data, (a byte ... then you have a data storage system with error correction, that ..... practical codes, storing such a table is infeasible, as it is generally too large.

  5. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Lene; Pries-Heje, Jan; Dalgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  6. RFQ simulation code

    International Nuclear Information System (INIS)

    Lysenko, W.P.

    1984-04-01

    We have developed the RFQLIB simulation system to provide a means to systematically generate the new versions of radio-frequency quadrupole (RFQ) linac simulation codes that are required by the constantly changing needs of a research environment. This integrated system simplifies keeping track of the various versions of the simulation code and makes it practical to maintain complete and up-to-date documentation. In this scheme, there is a certain standard version of the simulation code that forms a library upon which new versions are built. To generate a new version of the simulation code, the routines to be modified or added are appended to a standard command file, which contains the commands to compile the new routines and link them to the routines in the library. The library itself is rarely changed. Whenever the library is modified, however, this modification is seen by all versions of the simulation code, which actually exist as different versions of the command file. All code is written according to the rules of structured programming. Modularity is enforced by not using COMMON statements, simplifying the relation of the data flow to a hierarchy diagram. Simulation results are similar to those of the PARMTEQ code, as expected, because of the similar physical model. Different capabilities, such as those for generating beams matched in detail to the structure, are available in the new code for help in testing new ideas in designing RFQ linacs

  7. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  8. Validation of thermalhydraulic codes

    International Nuclear Information System (INIS)

    Wilkie, D.

    1992-01-01

    Thermalhydraulic codes require to be validated against experimental data collected over a wide range of situations if they are to be relied upon. A good example is provided by the nuclear industry where codes are used for safety studies and for determining operating conditions. Errors in the codes could lead to financial penalties, to the incorrect estimation of the consequences of accidents and even to the accidents themselves. Comparison between prediction and experiment is often described qualitatively or in approximate terms, e.g. ''agreement is within 10%''. A quantitative method is preferable, especially when several competing codes are available. The codes can then be ranked in order of merit. Such a method is described. (Author)

  9. Fracture flow code

    International Nuclear Information System (INIS)

    Dershowitz, W; Herbert, A.; Long, J.

    1989-03-01

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  10. Code cases for implementing risk-based inservice testing in the ASME OM code

    Energy Technology Data Exchange (ETDEWEB)

    Rowley, C.W.

    1996-12-01

    Historically inservice testing has been reasonably effective, but quite costly. Recent applications of plant PRAs to the scope of the IST program have demonstrated that of the 30 pumps and 500 valves in the typical plant IST program, less than half of the pumps and ten percent of the valves are risk significant. The way the ASME plans to tackle this overly-conservative scope for IST components is to use the PRA and plant expert panels to create a two tier IST component categorization scheme. The PRA provides the quantitative risk information and the plant expert panel blends the quantitative and deterministic information to place the IST component into one of two categories: More Safety Significant Component (MSSC) or Less Safety Significant Component (LSSC). With all the pumps and valves in the IST program placed in MSSC or LSSC categories, two different testing strategies will be applied. The testing strategies will be unique for the type of component, such as centrifugal pump, positive displacement pump, MOV, AOV, SOV, SRV, PORV, HOV, CV, and MV. A series of OM Code Cases are being developed to capture this process for a plant to use. One Code Case will be for Component Importance Ranking. The remaining Code Cases will develop the MSSC and LSSC testing strategy for type of component. These Code Cases are planned for publication in early 1997. Later, after some industry application of the Code Cases, the alternative Code Case requirements will gravitate to the ASME OM Code as appendices.

  11. Code cases for implementing risk-based inservice testing in the ASME OM code

    International Nuclear Information System (INIS)

    Rowley, C.W.

    1996-01-01

    Historically inservice testing has been reasonably effective, but quite costly. Recent applications of plant PRAs to the scope of the IST program have demonstrated that of the 30 pumps and 500 valves in the typical plant IST program, less than half of the pumps and ten percent of the valves are risk significant. The way the ASME plans to tackle this overly-conservative scope for IST components is to use the PRA and plant expert panels to create a two tier IST component categorization scheme. The PRA provides the quantitative risk information and the plant expert panel blends the quantitative and deterministic information to place the IST component into one of two categories: More Safety Significant Component (MSSC) or Less Safety Significant Component (LSSC). With all the pumps and valves in the IST program placed in MSSC or LSSC categories, two different testing strategies will be applied. The testing strategies will be unique for the type of component, such as centrifugal pump, positive displacement pump, MOV, AOV, SOV, SRV, PORV, HOV, CV, and MV. A series of OM Code Cases are being developed to capture this process for a plant to use. One Code Case will be for Component Importance Ranking. The remaining Code Cases will develop the MSSC and LSSC testing strategy for type of component. These Code Cases are planned for publication in early 1997. Later, after some industry application of the Code Cases, the alternative Code Case requirements will gravitate to the ASME OM Code as appendices

  12. S.1305: This Act may be cited as the Conservation and Energy Efficient Investment Act of 1991, introduced in the Senate of the United States, One Hundred Second Congress, First Session, June 17, 1991

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    This bill would amend the Internal Revenue Code of 1986 to encourage consumer participation in energy efficiency, conservation and cost-effective demand-side management by excluding from gross income payments made by utilities to customers for purchasing qualified energy conservation appliances and for taking energy conservation measures. Qualified energy conservation measures are defined in the National Energy Conservation Policy Act

  13. Energy Code Enforcement Training Manual : Covering the Washington State Energy Code and the Ventilation and Indoor Air Quality Code.

    Energy Technology Data Exchange (ETDEWEB)

    Washington State Energy Code Program

    1992-05-01

    This manual is designed to provide building department personnel with specific inspection and plan review skills and information on provisions of the 1991 edition of the Washington State Energy Code (WSEC). It also provides information on provisions of the new stand-alone Ventilation and Indoor Air Quality (VIAQ) Code.The intent of the WSEC is to reduce the amount of energy used by requiring energy-efficient construction. Such conservation reduces energy requirements, and, as a result, reduces the use of finite resources, such as gas or oil. Lowering energy demand helps everyone by keeping electricity costs down. (It is less expensive to use existing electrical capacity efficiently than it is to develop new and additional capacity needed to heat or cool inefficient buildings.) The new VIAQ Code (effective July, 1991) is a natural companion to the energy code. Whether energy-efficient or not, an homes have potential indoor air quality problems. Studies have shown that indoor air is often more polluted than outdoor air. The VIAQ Code provides a means of exchanging stale air for fresh, without compromising energy savings, by setting standards for a controlled ventilation system. It also offers requirements meant to prevent indoor air pollution from building products or radon.

  14. Huffman coding in advanced audio coding standard

    Science.gov (United States)

    Brzuchalski, Grzegorz

    2012-05-01

    This article presents several hardware architectures of Advanced Audio Coding (AAC) Huffman noiseless encoder, its optimisations and working implementation. Much attention has been paid to optimise the demand of hardware resources especially memory size. The aim of design was to get as short binary stream as possible in this standard. The Huffman encoder with whole audio-video system has been implemented in FPGA devices.

  15. Code system for fast reactor neutronics analysis

    International Nuclear Information System (INIS)

    Nakagawa, Masayuki; Abe, Junji; Sato, Wakaei.

    1983-04-01

    A code system for analysis of fast reactor neutronics has been developed for the purpose of handy use and error reduction. The JOINT code produces the input data file to be used in the neutronics calculation code and also prepares the cross section library file with an assigned format. The effective cross sections are saved in the PDS file with an unified format. At the present stage, this code system includes the following codes; SLAROM, ESELEM5, EXPANDA-G for the production of effective cross sections and CITATION-FBR, ANISN-JR, TWOTRAN2, PHENIX, 3DB, MORSE, CIPER and SNPERT. In the course of the development, some utility programs and service programs have been additionaly developed. These are used for access of PDS file, edit of the cross sections and graphic display. Included in this report are a description of input data format of the JOINT and other programs, and of the function of each subroutine and utility programs. The usage of PDS file is also explained. In Appendix A, the input formats are described for the revised version of the CIPER code. (author)

  16. Visual Representation Determines Search Difficulty: Explaining Visual Search Asymmetries

    Directory of Open Access Journals (Sweden)

    Neil eBruce

    2011-07-01

    Full Text Available In visual search experiments there exist a variety of experimental paradigms in which a symmetric set of experimental conditions yields asymmetric corresponding task performance. There are a variety of examples of this that currently lack a satisfactory explanation. In this paper, we demonstrate that distinct classes of asymmetries may be explained by virtue of a few simple conditions that are consistent with current thinking surrounding computational modeling of visual search and coding in the primate brain. This includes a detailed look at the role that stimulus familiarity plays in the determination of search performance. Overall, we demonstrate that all of these asymmetries have a common origin, namely, they are a consequence of the encoding that appears in the visual cortex. The analysis associated with these cases yields insight into the problem of visual search in general and predictions of novel search asymmetries.

  17. Coding conventions and principles for a National Land-Change Modeling Framework

    Science.gov (United States)

    Donato, David I.

    2017-07-14

    This report establishes specific rules for writing computer source code for use with the National Land-Change Modeling Framework (NLCMF). These specific rules consist of conventions and principles for writing code primarily in the C and C++ programming languages. Collectively, these coding conventions and coding principles create an NLCMF programming style. In addition to detailed naming conventions, this report provides general coding conventions and principles intended to facilitate the development of high-performance software implemented with code that is extensible, flexible, and interoperable. Conventions for developing modular code are explained in general terms and also enabled and demonstrated through the appended templates for C++ base source-code and header files. The NLCMF limited-extern approach to module structure, code inclusion, and cross-module access to data is both explained in the text and then illustrated through the module templates. Advice on the use of global variables is provided.

  18. Hydrology and Conservation Ecology

    Science.gov (United States)

    Narayanan, M.

    2006-12-01

    Responses to change in the behavior of ecological systems are largely governed by interactions at different levels. Research is essential and is to be necessarily designed to gain insights into various interactions at the community level. Sustainable resource management is only possible if conservation of biodiversity can be accomplished by properly using the knowledge discovered. It is well known that the United States Department of Agriculture provides technical information, resources, and data necessary to assist the researchers in addressing their conservation needs. Conservation aims to protect, preserve and conserve the earth's natural resources. These include, but not limited to the conservation of soil, water, minerals, air, plants and all living beings. The United States Department of Agriculture also encourages farmers and ranchers to voluntarily address threats to soil and water. Protection of wetlands and wildlife habitat has been on the radar screen of conservation experts for a very long time. The main objective has always been to help farmers and landowners conform and comply with federal and state environmental laws. During the implementation phase, farmers should be encouraged to make beneficial, cost-effective changes to methods of irrigation systems. In some cases, the hydrologic regime of the project area can be thought of as principally an issue of river flow regimes for floodplain forests. In this presentation, the author tries to focus on the impact of hydrology and conservation ecology on global warming. He also discusses the impact of hydrology and conservation ecology global air concerns such as greenhouse gas concentrations in the atmosphere. References: Chow, V. T, D. R. Maidment, and L. W. Mays. 1988. Applied Hydrology. McGraw-Hill, Inc. U.S. Soil Conservation Service. Technical Release 55: Urban Hydrology for Small Watersheds. USDA (U.S. Department of Agriculture). June 1986. Lehner, B. and P. Döll (2004). Development and validation

  19. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  20. Report number codes

    International Nuclear Information System (INIS)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  1. The CHEASE code for toroidal MHD equilibria

    Energy Technology Data Exchange (ETDEWEB)

    Luetjens, H. [Ecole Polytechnique, 91 - Palaiseau (France). Centre de Physique Theorique; Bondeson, A. [Chalmers Univ. of Technology, Goeteborg (Sweden). Inst. for Electromagnetic Field Theory and Plasma Physics; Sauter, O. [ITER-San Diego, La Jolla, CA (United States)

    1996-03-01

    CHEASE solves the Grad-Shafranov equation for the MHD equilibrium of a Tokamak-like plasma with pressure and current profiles specified by analytic forms or sets of data points. Equilibria marginally stable to ballooning modes or with a prescribed fraction of bootstrap current can be computed. The code provides a mapping to magnetic flux coordinates, suitable for MHD stability calculations or global wave propagation studies. The code computes equilibrium quantities for the stability codes ERATO, MARS, PEST, NOVA-W and XTOR and for the global wave propagation codes LION and PENN. The two-dimensional MHD equilibrium (Grad-Shafranov) equation is solved in variational form. The discretization uses bicubic Hermite finite elements with continuous first order derivates for the poloidal flux function {Psi}. The nonlinearity of the problem is handled by Picard iteration. The mapping to flux coordinates is carried out with a method which conserves the accuracy of the cubic finite elements. The code uses routines from the CRAY libsci.a program library. However, all these routines are included in the CHEASE package itself. If CHEASE computes equilibrium quantities for MARS with fast Fourier transforms, the NAG library is required. CHEASE is written in standard FORTRAN-77, except for the use of the input facility NAMELIST. CHEASE uses variable names with up to 8 characters, and therefore violates the ANSI standard. CHEASE transfers plot quantities through an external disk file to a plot program named PCHEASE using the UNIRAS or the NCAR plot package. (author) figs., tabs., 34 refs.

  2. The CHEASE code for toroidal MHD equilibria

    International Nuclear Information System (INIS)

    Luetjens, H.

    1996-03-01

    CHEASE solves the Grad-Shafranov equation for the MHD equilibrium of a Tokamak-like plasma with pressure and current profiles specified by analytic forms or sets of data points. Equilibria marginally stable to ballooning modes or with a prescribed fraction of bootstrap current can be computed. The code provides a mapping to magnetic flux coordinates, suitable for MHD stability calculations or global wave propagation studies. The code computes equilibrium quantities for the stability codes ERATO, MARS, PEST, NOVA-W and XTOR and for the global wave propagation codes LION and PENN. The two-dimensional MHD equilibrium (Grad-Shafranov) equation is solved in variational form. The discretization uses bicubic Hermite finite elements with continuous first order derivates for the poloidal flux function Ψ. The nonlinearity of the problem is handled by Picard iteration. The mapping to flux coordinates is carried out with a method which conserves the accuracy of the cubic finite elements. The code uses routines from the CRAY libsci.a program library. However, all these routines are included in the CHEASE package itself. If CHEASE computes equilibrium quantities for MARS with fast Fourier transforms, the NAG library is required. CHEASE is written in standard FORTRAN-77, except for the use of the input facility NAMELIST. CHEASE uses variable names with up to 8 characters, and therefore violates the ANSI standard. CHEASE transfers plot quantities through an external disk file to a plot program named PCHEASE using the UNIRAS or the NCAR plot package. (author) figs., tabs., 34 refs

  3. Conservation of resources theory in nurse burnout and patient safety.

    Science.gov (United States)

    Prapanjaroensin, Aoyjai; Patrician, Patricia A; Vance, David E

    2017-11-01

    To examine how the Conservation of Resources theory explains burnout in the nursing profession. Burnout, which is an accumulation of work-related mental stress in people-oriented occupations, has been an issue of concern for decades for healthcare workers, especially nurses. Yet, few studies have examined a unified theory that explains the aetiology, progression and consequences of nurse burnout. This discussion article integrates current knowledge on nurse burnout using Conservation of Resources theory, which focuses on four resources (i.e., objects, conditions, personal characteristics and energy). The databases that were used in this study included CINAHL, PubMed and PsycINFO. All reviewed articles were published between January 2006 - June 2016. The Conservation of Resources theory explains that burnout will occur as a result of perceived or actual loss of these four resources. Furthermore, nurse burnout could affect work performance, leading to lower alertness and overall quality of care. Healthcare organizations and nursing administration should develop strategies to protect nurses from the threat of resource loss to decrease nurse burnout, which may improve nurse and patient safety. The Conservation of Resources theory can guide interventions to decrease burnout and future research that examines the relationship between professional nurse burnout and patient safety. The Conservation of Resources theory explains the aetiology, progression and consequences of nurse burnout. Future studies must explore whether nurse performance is a mediating factor between nurse burnout and patient safety. © 2017 John Wiley & Sons Ltd.

  4. Faith and Ethics, Covenant and Code: The 2015 Revision of the ANA Code of Ethics for Nurses with Interpretive Statements.

    Science.gov (United States)

    Fowler, Marsha D

    How does and should the American Nurses Association Code of Ethics for Nurses with Interpretive Statements, with foundations from the late 1800s, impact today's nursing practice? How can the Code help you? The earlier 2001 Code was revised and became effective January 2015. The nine provisions received modest revision, as did the corresponding interpretive statements. However, Provisions 8 and 9 and their interpretive statements received more substantial revision. This article explains the Code and summarizes the 2015 revisions, considering points of particular interest for nurses of faith.

  5. Tourism and Conservation

    DEFF Research Database (Denmark)

    Budeanu, Adriana

    2017-01-01

    Tourism is promoted by policy makers and international organizations as a tool for advancing conservation agendas, while contributing to poverty alleviation and human development, under the banner of ecotourism or sustainable tourism. However, the indiscriminating use of complex and ambiguous...... concepts such as “poverty” and “sustainability” hide important nuances with regards to the variety of processes and subsequent effects that are triggered when tourism and conservation are being adjoined. Experiences with tourism developments show that destinations that are weak economically find it harder...... to draw benefits from tourism developments or to decline participation in tourism with only little or no losses of sources of income and wealth. If tourism should fulfil sustainability goals related to conservation, poverty, and human development, it needs consistent governmental intervention...

  6. Conservation of Mangifera sylvatica

    DEFF Research Database (Denmark)

    Akhter, Sayma

    and conservation of these valuable species. The present study considers an underutilised and threatened species of Bangladesh, namely wild mango (Mangifera sylvatica Roxb.). Although this wild mango is one of the genetically closest species to the common mango (Mangifera indica L.) research is very limited...... and mostly focused on wood quality and phylogenetic relationships. Therefore, this study investigated the conservation potential of wild mango considering its contribution for food, nutrition and livelihoods. To do so, an assessment was made of the current and future distribution of the species, which...... explored. The study conveyed five key messages: 1. Wild mango may become extinct under future climate change scenarios so it is high time to start thinking about conservation initiatives. 2. Wild mango is a small sized mango with a large kernel in relation to other Mangifera species which provides...

  7. Resource conservation management

    International Nuclear Information System (INIS)

    Miller, W.

    1999-01-01

    Resource conservation management is a management program similar to financial management in that its success requires commitment by all levels of the organization to the process as well as an accounting procedure and auditing of critical components. Resource conservation management provides a framework for all elements of efficient building operations and maintenance. The savings connected with the program are principally connected with changes in the way buildings are operated and maintained. Given the reduction in rebates for the installation of energy-efficient equipment, this approach has considerable promise. This paper discusses the evolution of the resource conservation management service and the savings associated with a two-year pilot effort with seven school districts, as well as the critical components of a successful program

  8. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  9. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  10. Transport theory and codes

    International Nuclear Information System (INIS)

    Clancy, B.E.

    1986-01-01

    This chapter begins with a neutron transport equation which includes the one dimensional plane geometry problems, the one dimensional spherical geometry problems, and numerical solutions. The section on the ANISN code and its look-alikes covers problems which can be solved; eigenvalue problems; outer iteration loop; inner iteration loop; and finite difference solution procedures. The input and output data for ANISN is also discussed. Two dimensional problems such as the DOT code are given. Finally, an overview of the Monte-Carlo methods and codes are elaborated on

  11. Gravity inversion code

    International Nuclear Information System (INIS)

    Burkhard, N.R.

    1979-01-01

    The gravity inversion code applies stabilized linear inverse theory to determine the topography of a subsurface density anomaly from Bouguer gravity data. The gravity inversion program consists of four source codes: SEARCH, TREND, INVERT, and AVERAGE. TREND and INVERT are used iteratively to converge on a solution. SEARCH forms the input gravity data files for Nevada Test Site data. AVERAGE performs a covariance analysis on the solution. This document describes the necessary input files and the proper operation of the code. 2 figures, 2 tables

  12. Can mathematics explain the evolution of human language?

    Science.gov (United States)

    Witzany, Guenther

    2011-09-01

    Investigation into the sequence structure of the genetic code by means of an informatic approach is a real success story. The features of human language are also the object of investigation within the realm of formal language theories. They focus on the common rules of a universal grammar that lies behind all languages and determine generation of syntactic structures. This universal grammar is a depiction of material reality, i.e., the hidden logical order of things and its relations determined by natural laws. Therefore mathematics is viewed not only as an appropriate tool to investigate human language and genetic code structures through computer science-based formal language theory but is itself a depiction of material reality. This confusion between language as a scientific tool to describe observations/experiences within cognitive constructed models and formal language as a direct depiction of material reality occurs not only in current approaches but was the central focus of the philosophy of science debate in the twentieth century, with rather unexpected results. This article recalls these results and their implications for more recent mathematical approaches that also attempt to explain the evolution of human language.

  13. Conservation reaches new heights.

    Science.gov (United States)

    Pepall, J; Khanal, P

    1992-10-01

    The conservation program with the management assistance of the Woodlands Mountain Institute in 2 contiguous parks, the Mount Everest National Park in Nepal and the Qomolangma Nature Reserve in China, in 2 countries is described. The focus is on conservation of the complex ecosystem with sustainable development by showing local people how to benefit from the park without environmental damage. Cultural diversity is as important as biological diversity. The area has been designated by UNESCO as a World Heritage Site with the "last pure ecological seed" of the Himalayas. The regional geography and culture are presented. Population growth has impacted natural resources through overgrazing, cultivation of marginal land, and deforestation; future plans to build a dam and road bordering the nature reserve pose other threats. Proposed management plans for the Makalu-Barun Nature Park (established in November 1991) and Conservation Area include a division of the park into nature reserve areas free of human activity, protected areas which permit traditional land use, and special sites and trail for tourists and religious pilgrims. The conservation area will act as a buffer for the park and provide economic opportunities; further subdivisions include land use for biodiversity protection, community forest and pasture, agroforestry, and agriculture and settlement. Efforts will be made to increase the welfare of women and local people; proposed projects include the introduction of higher milk-producing animals for stall feeding. Also proposed is a cultural and natural history museum. 70% of the project's resources will be directed to local community participation in consultation and park maintenance. The project is a model of how conservation and protection of natural resources can coexist with local economic development and participation; an integration of preservation of biological diversity, mountain wisdom, and the value of local people as resources for conservation.

  14. Energy conservation in industry

    International Nuclear Information System (INIS)

    Pembleton, P.

    1992-01-01

    Energy Conservation in Industry is the first number in the Energy and Environmental Series of the Industrial and Technological Information Bank (INTIB). The Series supersedes the INECA Journal and reflects the broader information programme undertaken by INTIB. The present number of the Series contains contributions from three major international databases and five topic-specific sources, including three United Nations Organizations. The present publication consists of a recent technical report on a current topic: reducing energy loss in four industrial sectors and improving energy conservation through waste-heat recovery, followed by two sections containing abstracts of technical materials

  15. Local instant conservation equations

    International Nuclear Information System (INIS)

    Delaje, Dzh.

    1984-01-01

    Local instant conservation equations for two-phase flow are derived. Derivation of the equation starts from the recording of integral laws of conservation for a fixed reference volume, containing both phases. Transformation of the laws, using the Leibniz rule and Gauss theory permits to obtain the sum of two integrals as to the volume and integral as to the surface. Integrals as to the volume result in local instant differential equations, in particular derivatives for each phase, and integrals as to the surface reflect local instant conditions of a jump on interface surface

  16. Diesel conservation: GSRTC'S experience

    Energy Technology Data Exchange (ETDEWEB)

    Ramesh Kumar, I V

    1980-01-01

    The Gujarat State Road Transport Corporation (GSRTC) in India has a fleet of about 6000 buses. The increasing cost of fuel and lubricants added to uncertainty in supplies, has necessitated the need for conserving High Speed Diesel Oil (HSD). GSRTC had achieved an overall average Kilometre Per Litre (kmpl) of 4.44 in the year 1976-1977 due to a variety of measures. In the year 1978-1979 the average kmpl was 4.52 and it is expected to be 4.60 for 1979-1980. The case study outlined describes the measures taken by GSRTC in conserving high speed diesel oil by various methods.

  17. Information, conservation and retrieval

    Energy Technology Data Exchange (ETDEWEB)

    Eng, T [Swedish Nuclear Fuel and Waste Management Co., Stockholm (Sweden); Norberg, E [National Swedish Archives, Stockholm (Sweden); Torbacke, J [Stockholm Univ. (Sweden). Dept. of History; Jensen, M [Swedish Radiation Protection Inst., Stockholm (Sweden)

    1996-12-01

    The seminar took place on the Swedish ship for transportation of radioactive wastes, M/S Sigyn, which at summer time is used for exhibitions. The seminar treated items related to general information needs in society and questions related to radioactive waste, i.e. how knowledge about a waste repository should be passed on to future generations. Three contributions are contained in the report from the seminar and are indexed separately: `Active preservation - otherwise no achieves`; `The conservation and dissemination of information - A democratic issue`; and, `Conservation and retrieval of information - Elements of a strategy to inform future societies about nuclear waste repositories`.

  18. Information, conservation and retrieval

    International Nuclear Information System (INIS)

    Eng, T.; Norberg, E.; Torbacke, J.

    1996-12-01

    The seminar took place on the Swedish ship for transportation of radioactive wastes, M/S Sigyn, which at summer time is used for exhibitions. The seminar treated items related to general information needs in society and questions related to radioactive waste, i.e. how knowledge about a waste repository should be passed on to future generations. Three contributions are contained in the report from the seminar and are indexed separately: 'Active preservation - otherwise no achieves'; 'The conservation and dissemination of information - A democratic issue'; and, 'Conservation and retrieval of information - Elements of a strategy to inform future societies about nuclear waste repositories'

  19. Conservative Overset Grids for Overflow For The Sonic Wave Atmospheric Propagation Project

    Science.gov (United States)

    Onufer, Jeff T.; Cummings, Russell M.

    1999-01-01

    Methods are presented that can be used to make multiple, overset grids communicate in a conservative manner. The methods are developed for use with the Chimera overset method using the PEGSUS code and the OVERFLOW solver.

  20. What determines the informativeness of firms' explanations for deviations from the Dutch corporate governance code?

    NARCIS (Netherlands)

    Hooghiemstra, R.B.H.

    2012-01-01

    The comply-or-explain principle is a common feature of corporate governance codes. While prior studies investigated compliance with corporate governance codes as well as the effects of compliance on firm behaviour and performance, explanations for deviations from a corporate governance code remain

  1. Do changes in connectivity explain desertification?

    Science.gov (United States)

    Desertification, broad-scale land degradation in drylands, is a major environmental hazard facing inhabitants of the world’s deserts as well as an important component of global change. There is no unifying framework that simply and effectively explains different forms of desertification. Here we arg...

  2. Can the inherence heuristic explain vitalistic reasoning?

    Science.gov (United States)

    Bastian, Brock

    2014-10-01

    Inherence is an important component of psychological essentialism. By drawing on vitalism as a way in which to explain this link, however, the authors appear to conflate causal explanations based on fixed features with those based on general causal forces. The disjuncture between these two types of explanatory principles highlights potential new avenues for the inherence heuristic.

  3. Explaining probalistic risk assessment in common language

    International Nuclear Information System (INIS)

    Wong, J.W.

    1994-01-01

    Probabilistic human health risk assessment is explained in ordinary language using a hypothetical example and the ingestion equation from EPA's Risk Assessment Guidance for Superfund. A section on understanding probabilities and probability distributions used in a Monte Carlo simulation is included as well as an appendix showing the computer run and the technical assumptions behind it

  4. Explaining Violence in Sierra Leone's Civil War

    African Journals Online (AJOL)

    Explaining the violence of civil war is never a simple task for the scholar. In the case of the Sierra Leone, paradoxically, the task has in some ways been rendered more difficult by the sheer variety of compelling scholarship on the question. This paper seeks to identify the most useful of the explanations offered thus far, and ...

  5. Measuring and explaining house price developments

    NARCIS (Netherlands)

    De Vries, P.

    2010-01-01

    This study discusses ways of measuring and explaining the development of house prices. The goal of the research underpinning this dissertation was to develop a methodological framework for studying these developments. This framework relates, first, to correcting for changes in the composition of

  6. Adaptive hatching hypotheses do not explain asynchronous ...

    African Journals Online (AJOL)

    At the core of the suite of adaptive hatching hypotheses advanced to explain asynchronous hatching in birds is the assumption that if food is not limited then all the hatchlings will develop normally to adulthood. In this study Brown-headed Parrot Poicephalus cryptoxanthus chicks were hand fed and weighed on a daily basis.

  7. Explaining convergence of oecd welfare states

    DEFF Research Database (Denmark)

    Schmitt, C.; Starke, Peter

    2011-01-01

    of conditional convergence helps to both better describe and explain the phenomenon. By applying error correction models, we examine conditional convergence of various types of social expenditure in 21 OECD countries between 1980 and 2005. Our empirical findings go beyond the existing literature in two respects...

  8. Explaining the VET Applied Research Developmental Framework

    Science.gov (United States)

    Simon, Linda; Beddie, Francesca M.

    2017-01-01

    This document explains the VET Applied Research Developmental Framework, created as part of a project that explored how the vocational education and training (VET) sector could broaden its engagement in Australia's research and development (R&D) and innovation systems. Achieving this engagement will rely significantly on building the…

  9. Explaining Teachers' Use of Textbooks

    Science.gov (United States)

    Reichenberg, Monica

    2016-01-01

    In educational systems without comprehensive systems for regulating textbooks, teachers can exert considerable influence on the use of textbooks. However, existing research has not yet identified the mechanisms of this use. Accordingly, the aim of this article is to examine and explain teachers' strategic use of textbooks. I administered a…

  10. Your Radiologist Explains Magnetic Resonance Angiography (MRA)

    Medline Plus

    Full Text Available ... Sponsored by Image/Video Gallery Your Radiologist Explains Magnetic Resonance Angiography (MRA) Transcript Welcome to Radiology Info dot ... I’d like to talk with you about magnetic resonance angiography, or as it’s commonly known, MRA. MRA ...

  11. Essentials of Conservation Biotechnology: A mini review

    Science.gov (United States)

    Merlyn Keziah, S.; Subathra Devi, C.

    2017-11-01

    Equilibrium of biodiversity is essential for the maintenance of the ecosystem as they are interdependent on each other. The decline in biodiversity is a global problem and an inevitable threat to the mankind. Major threats include unsustainable exploitation, habitat destruction, fragmentation, transformation, genetic pollution, invasive exotic species and degradation. This review covers the management strategies of biotechnology which include sin situ, ex situ conservation, computerized taxonomic analysis through construction of phylogenetic trees, calculating genetic distance, prioritizing the group for conservation, digital preservation of biodiversities within the coding and decoding keys, molecular approaches to asses biodiversity like polymerase chain reaction, real time, randomly amplified polymorphic DNA, restriction fragment length polymorphism, amplified fragment length polymorphism, single sequence repeats, DNA finger printing, single nucleotide polymorphism, cryopreservation and vitrification.

  12. Development of Multi-Dimensional RELAP5 with Conservative Momentum Flux

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Hyung Wook; Lee, Sang Yong [KINGS, Ulsan (Korea, Republic of)

    2016-10-15

    The non-conservative form of the momentum equations are used in many codes. It tells us that using the non-conservative form in the non-porous or open body problem may not be good. In this paper, two aspects concerning the multi-dimensional codes will be discussed. Once the validity of the modified code is confirmed, it is applied to the analysis of the large break LOCA for APR-1400. One of them is the properness of the type of the momentum equations. The other discussion will be the implementation of the conservative momentum flux term in RELAP5. From the present study and former, it is shown that the RELAP5 Multi-D with conservative convective terms is applicable to LOCA analysis. And the implementation of the conservative convective terms in RELAP5 seems to be successful. Further efforts have to be made on making it more robust.

  13. Implementation of Energy Code Controls Requirements in New Commercial Buildings

    Energy Technology Data Exchange (ETDEWEB)

    Rosenberg, Michael I. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hart, Philip R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hatten, Mike [Solarc Energy Group, LLC, Seattle, WA (United States); Jones, Dennis [Group 14 Engineering, Inc., Denver, CO (United States); Cooper, Matthew [Group 14 Engineering, Inc., Denver, CO (United States)

    2017-03-24

    Most state energy codes in the United States are based on one of two national model codes; ANSI/ASHRAE/IES 90.1 (Standard 90.1) or the International Code Council (ICC) International Energy Conservation Code (IECC). Since 2004, covering the last four cycles of Standard 90.1 updates, about 30% of all new requirements have been related to building controls. These requirements can be difficult to implement and verification is beyond the expertise of most building code officials, yet the assumption in studies that measure the savings from energy codes is that they are implemented and working correctly. The objective of the current research is to evaluate the degree to which high impact controls requirements included in commercial energy codes are properly designed, commissioned and implemented in new buildings. This study also evaluates the degree to which these control requirements are realizing their savings potential. This was done using a three-step process. The first step involved interviewing commissioning agents to get a better understanding of their activities as they relate to energy code required controls measures. The second involved field audits of a sample of commercial buildings to determine whether the code required control measures are being designed, commissioned and correctly implemented and functioning in new buildings. The third step includes compilation and analysis of the information gather during the first two steps. Information gathered during these activities could be valuable to code developers, energy planners, designers, building owners, and building officials.

  14. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  15. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed; Ghanem, Bernard; Wonka, Peter

    2018-01-01

    coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements

  16. SASSYS LMFBR systems code

    International Nuclear Information System (INIS)

    Dunn, F.E.; Prohammer, F.G.; Weber, D.P.

    1983-01-01

    The SASSYS LMFBR systems analysis code is being developed mainly to analyze the behavior of the shut-down heat-removal system and the consequences of failures in the system, although it is also capable of analyzing a wide range of transients, from mild operational transients through more severe transients leading to sodium boiling in the core and possible melting of clad and fuel. The code includes a detailed SAS4A multi-channel core treatment plus a general thermal-hydraulic treatment of the primary and intermediate heat-transport loops and the steam generators. The code can handle any LMFBR design, loop or pool, with an arbitrary arrangement of components. The code is fast running: usually faster than real time

  17. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  18. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  19. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  20. Induction technology optimization code

    International Nuclear Information System (INIS)

    Caporaso, G.J.; Brooks, A.L.; Kirbie, H.C.

    1992-01-01

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  1. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  2. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  3. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    2001-01-01

    The description of reactor lattice codes is carried out on the example of the WIMSD-5B code. The WIMS code in its various version is the most recognised lattice code. It is used in all parts of the world for calculations of research and power reactors. The version WIMSD-5B is distributed free of charge by NEA Data Bank. The description of its main features given in the present lecture follows the aspects defined previously for lattice calculations in the lecture on Reactor Lattice Transport Calculations. The spatial models are described, and the approach to the energy treatment is given. Finally the specific algorithm applied in fuel depletion calculations is outlined. (author)

  4. Critical Care Coding for Neurologists.

    Science.gov (United States)

    Nuwer, Marc R; Vespa, Paul M

    2015-10-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  5. Lattice Index Coding

    OpenAIRE

    Natarajan, Lakshmi; Hong, Yi; Viterbo, Emanuele

    2014-01-01

    The index coding problem involves a sender with K messages to be transmitted across a broadcast channel, and a set of receivers each of which demands a subset of the K messages while having prior knowledge of a different subset as side information. We consider the specific case of noisy index coding where the broadcast channel is Gaussian and every receiver demands all the messages from the source. Instances of this communication problem arise in wireless relay networks, sensor networks, and ...

  6. Towards advanced code simulators

    International Nuclear Information System (INIS)

    Scriven, A.H.

    1990-01-01

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  7. Cracking the Gender Codes

    DEFF Research Database (Denmark)

    Rennison, Betina Wolfgang

    2016-01-01

    extensive work to raise the proportion of women. This has helped slightly, but women remain underrepresented at the corporate top. Why is this so? What can be done to solve it? This article presents five different types of answers relating to five discursive codes: nature, talent, business, exclusion...... in leadership management, we must become more aware and take advantage of this complexity. We must crack the codes in order to crack the curve....

  8. Farmers' Willingness to Adopt Conservation Agriculture: New Evidence from Lebanon.

    Science.gov (United States)

    Chalak, Ali; Irani, Alexandra; Chaaban, Jad; Bashour, Issam; Seyfert, Karin; Smoot, Kaitlyn; Abebe, Gumataw Kifle

    2017-10-01

    With increasing food insecurity and climate change, conservation agriculture has emerged as a sustainable alternative to intensive conventional agriculture as a source of food supply. Yet the adoption rate of conservation agriculture is still low. Our paper analyses the factors affecting farmers' willingness to adopt conservation agriculture in Lebanon. The findings show that household characteristics-years of farming and farm size affect conservation agriculture adoption. However, household characteristics alone were insufficient to explain conservation agriculture adoption. We found that farming experience, information sources, frequency of irrigation, and severity of weed infestation in the past, participation in specific trainings, and farmers' perception about the long-term impact of conservation agriculture, were key determinants of conservation agriculture adoption. Our paper encourages policymakers to invest in conservation agriculture to overcome food insecurity and environmental changes affecting food systems in the Middle East. The paper also informs agribusiness firms to view conservation agriculture as a viable alternative to strengthen their business relationship with farmers in arid and semi-arid regions.

  9. Farmers' Willingness to Adopt Conservation Agriculture: New Evidence from Lebanon

    Science.gov (United States)

    Chalak, Ali; Irani, Alexandra; Chaaban, Jad; Bashour, Issam; Seyfert, Karin; Smoot, Kaitlyn; Abebe, Gumataw Kifle

    2017-10-01

    With increasing food insecurity and climate change, conservation agriculture has emerged as a sustainable alternative to intensive conventional agriculture as a source of food supply. Yet the adoption rate of conservation agriculture is still low. Our paper analyses the factors affecting farmers' willingness to adopt conservation agriculture in Lebanon. The findings show that household characteristics—years of farming and farm size affect conservation agriculture adoption. However, household characteristics alone were insufficient to explain conservation agriculture adoption. We found that farming experience, information sources, frequency of irrigation, and severity of weed infestation in the past, participation in specific trainings, and farmers' perception about the long-term impact of conservation agriculture, were key determinants of conservation agriculture adoption. Our paper encourages policymakers to invest in conservation agriculture to overcome food insecurity and environmental changes affecting food systems in the Middle East. The paper also informs agribusiness firms to view conservation agriculture as a viable alternative to strengthen their business relationship with farmers in arid and semi-arid regions.

  10. Identification of coding and non-coding mutational hotspots in cancer genomes.

    Science.gov (United States)

    Piraino, Scott W; Furney, Simon J

    2017-01-05

    The identification of mutations that play a causal role in tumour development, so called "driver" mutations, is of critical importance for understanding how cancers form and how they might be treated. Several large cancer sequencing projects have identified genes that are recurrently mutated in cancer patients, suggesting a role in tumourigenesis. While the landscape of coding drivers has been extensively studied and many of the most prominent driver genes are well characterised, comparatively less is known about the role of mutations in the non-coding regions of the genome in cancer development. The continuing fall in genome sequencing costs has resulted in a concomitant increase in the number of cancer whole genome sequences being produced, facilitating systematic interrogation of both the coding and non-coding regions of cancer genomes. To examine the mutational landscapes of tumour genomes we have developed a novel method to identify mutational hotspots in tumour genomes using both mutational data and information on evolutionary conservation. We have applied our methodology to over 1300 whole cancer genomes and show that it identifies prominent coding and non-coding regions that are known or highly suspected to play a role in cancer. Importantly, we applied our method to the entire genome, rather than relying on predefined annotations (e.g. promoter regions) and we highlight recurrently mutated regions that may have resulted from increased exposure to mutational processes rather than selection, some of which have been identified previously as targets of selection. Finally, we implicate several pan-cancer and cancer-specific candidate non-coding regions, which could be involved in tumourigenesis. We have developed a framework to identify mutational hotspots in cancer genomes, which is applicable to the entire genome. This framework identifies known and novel coding and non-coding mutional hotspots and can be used to differentiate candidate driver regions from

  11. PEAR code review

    International Nuclear Information System (INIS)

    De Wit, R.; Jamieson, T.; Lord, M.; Lafortune, J.F.

    1997-07-01

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  12. KENO-V code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P 1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  13. Code, standard and specifications

    International Nuclear Information System (INIS)

    Abdul Nassir Ibrahim; Azali Muhammad; Ab. Razak Hamzah; Abd. Aziz Mohamed; Mohamad Pauzi Ismail

    2008-01-01

    Radiography also same as the other technique, it need standard. This standard was used widely and method of used it also regular. With that, radiography testing only practical based on regulations as mentioned and documented. These regulation or guideline documented in code, standard and specifications. In Malaysia, level one and basic radiographer can do radiography work based on instruction give by level two or three radiographer. This instruction was produced based on guideline that mention in document. Level two must follow the specifications mentioned in standard when write the instruction. From this scenario, it makes clearly that this radiography work is a type of work that everything must follow the rule. For the code, the radiography follow the code of American Society for Mechanical Engineer (ASME) and the only code that have in Malaysia for this time is rule that published by Atomic Energy Licensing Board (AELB) known as Practical code for radiation Protection in Industrial radiography. With the existence of this code, all the radiography must follow the rule or standard regulated automatically.

  14. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    OpenAIRE

    Gao, Yuan; Liu, Pengyu; Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content ...

  15. Science Experience Unit: Conservation.

    Science.gov (United States)

    Ferguson-Florissant School District, Ferguson, MO.

    GRADES OR AGES: Intermediate grades. SUBJECT MATTER: Conservation. ORGANIZATION AND PHYSICAL APPEARANCE: The guide is divided into 24 experiments. It is mimeographed and staple-bound with a paper cover. OBJECTIVES AND ACTIVITIES: A specific skill or knowledge objective is stated at the beginning of each experiment. Detailed procedures are listed…

  16. (ICTs) And Environmental Conservation

    African Journals Online (AJOL)

    ICTs have a potential for improving the accessibility of environmental information, and if appropriately applied, they can empower local people to make informed decisions regarding environmental issues, thus enhancing environmental conservation. However, the challenge is on how to define particular roles that ...

  17. Conservative Delta Hedging

    Science.gov (United States)

    1997-09-01

    an exact method for converting such intervals into arbitrage based prices of financial derivatives or industrial or contractual options. We call this...procedure conservative delta hedging . As existing procedures are of an ad hoc nature, the proposed approach will permit an institution’s man agement a greater oversight of its exposure to risk.

  18. [Lateral epicondylitis: conservative - operative].

    Science.gov (United States)

    Altintas, Burak; Greiner, Stefan

    2016-10-01

    Lateral epicondylitis is a common disease of the common extensor origin at the lateral humerus. Despite its common self-limitation it can lead to chronic therapy-resistant pain with remarkable functional disability of the affected arm. Different conservative and operative treatment options of lateral epicondylitis are described and compared regarding benefits and risks. Additionally, recent surgical techniques and their complications are mentioned. Based on the current literature, it is shown which treatment option can be recommended. This review was based on the literature analysis in PubMed regarding "conservative and operative therapy of lateral epicondylitis" as well as the clinical experience of the authors. Conservative treatment is the primary choice for the treatment of lateral epicondylitis if concomitant pathologies such as instability among others can be excluded. It should include strengthening against resistance with eccentric stretching of the extensor group. In persistent cases, operative treatment is warranted. Resection of the pathologic tissue at the extensor origin with debridement and refixation of the healthy tendinous tissue yields good results. Most patients with lateral epicondylitis can be treated conservatively with success. Radiological evaluation should be performed in therapy-resistant cases. In the case of partial or complete rupture of the extensor origin, operative therapy is indicated.

  19. Biological science in conservation

    Science.gov (United States)

    David M. Johns

    2000-01-01

    Large-scale wildlands reserve systems offer one of the best hopes for slowing, if not reversing, the loss of biodiversity and wilderness. Establishing such reserves requires both sound biology and effective advocacy. Attempts by The Wildlands Project and its cooperators to meld science and advocacy in the service of conservation is working, but is not without some...

  20. Speyeria (Lepidoptera: Nymphalidae Conservation

    Directory of Open Access Journals (Sweden)

    Steven R. Sims

    2017-04-01

    Full Text Available Speyeria (Nymphalidae are a conspicuous component of the North American butterfly fauna. There are approximately 16 species and >100 associated subspecies (or geographical variants. Speyeria are univoltine, occupy a wide range of habitats, overwinter as first instar larvae, and feed only on native violets. Speyeria species have become a model group for studies of evolution, speciation, and conservation. Several species and subspecies are threatened or endangered. The reasons for this vary with the taxa involved, but always involve the degradation or loss of quality habitat for larvae and adults. The impacts of climate change must be considered among the causes for habitat degradation and in the establishment of conservation measures. In addition to increasing the available habitat, conservation efforts should consider maintaining habitat in a seral “disturbed” successional stage that selectively favors the growth of violets and preferred adult nectar sources. A major future challenge will be determining the most effective allocation of conservation resources to those species and subspecies that have the greatest potential to respond favorably to these efforts.

  1. Conservation and gene banking

    Science.gov (United States)

    Plant conservation has several objectives the main ones include safeguarding our food supply, preserving crop wild relatives for breeding and selection of new cultivars, providing material for industrial and pharmaceutical uses and preserving the beauty and diversity of our flora for generations to ...

  2. A high-resolution code for large eddy simulation of incompressible turbulent boundary layer flows

    KAUST Repository

    Cheng, Wan; Samtaney, Ravi

    2014-01-01

    examples to establish the fourth-order accuracy and energy conservation property of the code. Furthermore, we implement a recycling method to generate turbulent inflow. We use the stretched spiral vortex subgrid-scale model and virtual wall model

  3. Crowdfunding biodiversity conservation.

    Science.gov (United States)

    Gallo-Cajiao, E; Archibald, C; Friedman, R; Steven, R; Fuller, R A; Game, E T; Morrison, T H; Ritchie, E G

    2018-05-26

    Raising funds is critical for conserving biodiversity and hence so too is scrutinizing emerging financial mechanisms that might help achieve this goal. In this context, anecdotal evidence indicates crowdfunding is being used to support a variety of activities needed for biodiversity conservation, yet its magnitude and allocation remain largely unknown. We conducted a global analysis to help address this knowledge gap, based on empirical data from conservation-focused projects extracted from crowdfunding platforms. For each project, we determined the funds raised, date, country of implementation, proponent characteristics, activity type, biodiversity realm, and target taxa. We identified 72 relevant platforms and 577 conservation-focused projects that have raised US$4 790 634 since 2009. Whilst proponents were based in 38 countries, projects were delivered across 80 countries, indicating a potential mechanism of resource mobilization. Proponents were from non-governmental organizations (35%), universities (30%), or were freelancers (26%). Most projects were for research (40%), persuasion (31%), and on-ground actions (21%). Projects have focused primarily on species (57.7%) and terrestrial ecosystems (20.3%), and less on marine (8.8%) and freshwater ecosystems (3.6%). Projects have focused on 208 species, including a disproportionate number of threatened bird and mammal species. Crowdfunding for biodiversity conservation has now become a global phenomenon and presents signals for potential expansion, despite possible pitfalls. Opportunities arise from its spatial amplifying effect, steady increase over time, inclusion of Cinderella species, adoption by multiple actors, and funding of a range of activities beyond research. Our study paves the way for further research on key questions, such as campaign success rates, effectiveness, and drivers of adoption. Even though the capital input of crowdfunding so far has been modest compared to other conservation finance

  4. [The ICOH International Code of Ethics for Occupational Health Professionals].

    Science.gov (United States)

    Foà, V

    2010-01-01

    In the paper all the steps are described which are followed by ICOH to finalize the International Code of Ethics for Occupational Health Professionals (OHP). The Code is composed by a "Preface" in which is explained why the Occupational Health Professionals need a specific Code different from other Codes built up for general practitioners or other specializations, followed by an "Introduction" where the targets of Occupational Health are underlined and which professionals contribute to achieve the defined target. These two parts are followed by a more substantial description of the tasks and duties of the OHP. In the last part of the Code it is illustrated how to carry out the above mentioned duties. The principles inserted in the ICOH Code of Ethics have been worldwide accepted by the OHP and particularly in Italy where they have been included in the Legislative Decree 81/08.

  5. A Semantic Analysis Method for Scientific and Engineering Code

    Science.gov (United States)

    Stewart, Mark E. M.

    1998-01-01

    This paper develops a procedure to statically analyze aspects of the meaning or semantics of scientific and engineering code. The analysis involves adding semantic declarations to a user's code and parsing this semantic knowledge with the original code using multiple expert parsers. These semantic parsers are designed to recognize formulae in different disciplines including physical and mathematical formulae and geometrical position in a numerical scheme. In practice, a user would submit code with semantic declarations of primitive variables to the analysis procedure, and its semantic parsers would automatically recognize and document some static, semantic concepts and locate some program semantic errors. A prototype implementation of this analysis procedure is demonstrated. Further, the relationship between the fundamental algebraic manipulations of equations and the parsing of expressions is explained. This ability to locate some semantic errors and document semantic concepts in scientific and engineering code should reduce the time, risk, and effort of developing and using these codes.

  6. Renewable Energy and Energy Efficiency Technologies in Residential Building Codes: June 15, 1998 to September 15, 1998

    Energy Technology Data Exchange (ETDEWEB)

    Wortman, D.; Echo-Hawk, L.

    2005-02-01

    This report is an attempt to describe the building code requirements and impediments to the application of EE and RE technologies in residential buildings. Several modern model building codes were reviewed. These are representative of the codes that will be adopted by most locations in the coming years. The codes reviewed for this report include: International Residential Code, First Draft, April 1998; International Energy Conservation Code, 1998; International Mechanical Code, 1998; International Plumbing Code, 1997; International Fuel Gas Code, 1997; National Electrical Code, 1996. These codes were reviewed as to their application to (1) PV systems in buildings and building-integrated PV systems and (2) active solar domestic hot water and space-heating systems. A discussion of general code issues that impact these technologies is also included. Examples of this are solar access and sustainability.

  7. Development of Coolant Radioactivity Interpretation Code

    International Nuclear Information System (INIS)

    Kim, Kiyoung; Jung, Youngsuk; Kim, Kyounghyun; Kim, Jangwook

    2013-01-01

    In Korea, the coolant radioactivity analysis has been performed by using the computer codes of foreign companies such as CADE (Westinghouse), IODYNE and CESIUM (ABB-CE). However, these computer codes are too conservative and have involved considerable errors. Furthermore, since these codes are DOS-based program, their easy operability is not satisfactory. Therefore it is required development of an enhanced analysis algorithm applying an analytical method reflecting the change of operational environments of domestic nuclear power plants and a fuel failure evaluation software considering user' conveniences. We have developed a nuclear fuel failure evaluation code able to estimate the number of failed fuel rods and the burn-up of failed fuels during nuclear power plant operation cycle. A Coolant Radio-activity Interpretation Code (CRIC) for LWR has been developed as the output of the project 'Development of Fuel Reliability Enhanced Technique' organized by Korea Institute of Energy Technology Evaluation and Planning (KETEP). The CRIC is Windows based-software able to evaluate the number of failed fuel rods and the burn-up of failed fuel region by analyzing coolant radioactivity of LWR in operation. The CRIC is based on the model of fission products release commonly known as 'three region model' (pellet region, gap region, and coolant region), and we are verifying the CRIC results based on the cases of domestic fuel failures. CRIC users are able to estimate the number of failed fuel rods, burn-up and regions of failed fuel considered enrichment and power distribution of fuel region by using operational cycle data, coolant activity data, fuel loading pattern, Cs-134/Cs-137 ratio according to burn-up and U-235 enrichment provided in the code. Due to development of the CRIC, it is secured own unique fuel failure evaluation code. And, it is expected to have the following significant meaning. This is that the code reflecting a proprietary technique for quantitatively

  8. SPACE Code Assessment for FLECHT Test

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Hyoung Kyoun; Min, Ji Hong; Park, Chan Eok; Park, Seok Jeong; Kim, Shin Whan [KEPCO E and C, Daejeon (Korea, Republic of)

    2015-10-15

    According to 10 CFR 50 Appendix K, Emergency Core Cooling System (ECCS) performance evaluation model during LBLOCA should be based on the data of FLECHT test. Heat transfer coefficient (HTC) and Carryout Rate Fraction (CRF) during reflood period of LBLOCA should be conservative. To develop Mass and Energy Release (MER) methodology using Safety and Performance Analysis CodE (SPACE), FLECHT test results were compared to the results calculated by SPACE. FLECHT test facility is modeled to compare the reflood HTC and CRF using SPACE. Sensitivity analysis is performed with various options for HTC correlation. Based on this result, it is concluded that the reflood HTC and CRF calculated with COBRA-TF correlation during LBLOCA meet the requirement of 10 CFR 50 Appendix K. In this study, the analysis results using SPACE predicts heat transfer phenomena of FLECHT test reasonably and conservatively. Reflood HTC for the test number of 0690, 3541 and 4225 are conservative in the reference case. In case of 6948 HTC using COBRATF is conservative to calculate film boiling region. All of analysis results for CRF have sufficient conservatism. Based on these results, it is possible to apply with COBRA-TF correlation to develop MER methodology to analyze LBLOCA using SPACE.

  9. Explaining money creation by commercial banks

    DEFF Research Database (Denmark)

    Ravn, Ib

    2015-01-01

    Educators and economists concerned with monetary reform face the extraordinary challenge of explaining to the public and its elected representatives not only what a reformed system would look like, but also how the current system works. Centrally, the point that in a modern economy money is largely...... created by commercial banks, as explained by the Bank of England recently (McLeay, Radia & Thomas, 2014b), is often met with incredulity: “What do you mean, created?” This paper introduces five easy-to-grasp analogies that educators and reformers may use to convey key money-creation concepts to a lay...... audience. The analogies offered include (1) money as patches in an expandable patchwork quilt that covers a nation’s real assets, (2) the money supply as water in a bathtub with a faucet and a drain, (3) money understood as debt in a model economy run by schoolchildren, (4) the misleading concept of a bank...

  10. HIV As Trojan Exosome: Immunological Paradox Explained?

    Science.gov (United States)

    Hildreth, James E K

    2017-01-01

    The HIV pandemic is still a major global challenge, despite the widespread availability of antiretroviral drugs. An effective vaccine would be the ideal approach to bringing the pandemic to an end. However, developing an effective HIV vaccine has proven to be an elusive goal. Three major human HIV vaccine trials revealed a strong trend toward greater risk of infection among vaccine recipients versus controls. A similar observation was made in a macaque SIV vaccine study. The mechanism explaining this phenomenon is not known. Here, a model is presented that may explain the troubling results of vaccine studies and an immunological paradox of HIV pathogenesis: preferential infection of HIV-specific T cells. The central hypothesis of this perspective is that as "Trojan exosomes" HIV particles can directly activate HIV-specific T cells enhancing their susceptibility to infection. Understanding the biology of HIV as an exosome may provide insights that enable novel approaches to vaccine development.

  11. Children's Theories and the Drive to Explain

    Science.gov (United States)

    Schwitzgebel, Eric

    Debate has been growing in developmental psychology over how much the cognitive development of children is like theory change in science. Useful debate on this topic requires a clear understanding of what it would be for a child to have a theory. I argue that existing accounts of theories within philosophy of science and developmental psychology either are less precise than is ideal for the task or cannot capture everyday theorizing of the sort that children, if they theorize, must do. I then propose an account of theories that ties theories and explanation very closely together, treating theories primarily as products of a drive to explain. I clarify some of the positions people have taken regarding the theory theory of development, and I conclude by proposing that psychologists interested in the ''theory theory'' look for patterns of affect and arousal in development that would accompany the existence of a drive to explain.

  12. Explaining the Allocation of Regional Structural Funds

    DEFF Research Database (Denmark)

    Charron, Nicholas

    2016-01-01

    What regional factors can explain the heterogeneity in Structural Funds distribution to European Union regions? Past studies have shown that aside from the level of economic development and rates of unemployment, other political, and economic factors systematically explain why certain European...... Union regions receive greater funding than others, in particular where there is room for bargaining. In this article, a novel theory is posited which argues that the determination of Structural Funds is based on an interaction between a region’s formal institutions (the level of a regional autonomy......) and informal institutions (its level of quality of government). In cases of low regional autonomy, member states and European Union level actors prefer to allocate greater levels of Funds to regions with lower quality of government in order to increase cohesion. Yet in cases of high regional autonomy, risks...

  13. IEE wiring regulations explained and illustrated

    CERN Document Server

    Scaddan, Brian

    2013-01-01

    The IEE Wiring Regulations Explained and Illustrated, Second Edition discusses the recommendations of the IEE Regulations for the Electrical Equipment of Buildings for the safe selection or erection of wiring installations. The book emphasizes earthing, bonding, protection, and circuit design of electrical wirings. The text reviews the fundamental requirements for safety, earthing systems, the earth fault loop impedance, and supplementary bonding. The book also describes the different types of protection, such as protection against mechanical damage, overcurrent, under voltage (which prevents

  14. A More Practical Method for Explaining Equilibrium

    OpenAIRE

    Yi-Jang Yu

    2014-01-01

    The aim of this study is to suggest a more practical method for explaining market equilibrium in a two-dimensional risk-return world. Its main difference from textbook contents is to define, in both qualitative and quantitative ways, the environment or the system factor and treat it as an endogenous variable. Once the two-dimensional framework that is capable of managing uncertainty and environmental relationship can be reasonably established, a greater number of economic issues can be effect...

  15. "Explaining the Gender Wage Gap in Georgia"

    OpenAIRE

    Tamar Khitarishvili

    2009-01-01

    This paper evaluates gender wage differentials in Georgia between 2000 and 2004. Using ordinary least squares, we find that the gender wage gap in Georgia is substantially higher than in other transition countries. Correcting for sample selection bias using the Heckman approach further increases the gender wage gap. The Blinder Oaxaca decomposition results suggest that most of the wage gap remains unexplained. The explained portion of the gap is almost entirely attributed to industrial variab...

  16. Explaining seeing? Disentangling qualia from perceptual organization.

    Science.gov (United States)

    Ibáñez, Agustin; Bekinschtein, Tristan

    2010-09-01

    Abstract Visual perception and integration seem to play an essential role in our conscious phenomenology. Relatively local neural processing of reentrant nature may explain several visual integration processes (feature binding or figure-ground segregation, object recognition, inference, competition), even without attention or cognitive control. Based on the above statements, should the neural signatures of visual integration (via reentrant process) be non-reportable phenomenological qualia? We argue that qualia are not required to understand this perceptual organization.

  17. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  18. Nuclear code abstracts (1975 edition)

    International Nuclear Information System (INIS)

    Akanuma, Makoto; Hirakawa, Takashi

    1976-02-01

    Nuclear Code Abstracts is compiled in the Nuclear Code Committee to exchange information of the nuclear code developments among members of the committee. Enlarging the collection, the present one includes nuclear code abstracts obtained in 1975 through liaison officers of the organizations in Japan participating in the Nuclear Energy Agency's Computer Program Library at Ispra, Italy. The classification of nuclear codes and the format of code abstracts are the same as those in the library. (auth.)

  19. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  20. Hydrodynamics in full general relativity with conservative AMR

    OpenAIRE

    East, William E.; Pretorius, Frans; Stephens, Branson C.

    2011-01-01

    There is great interest in numerical relativity simulations involving matter due to the likelihood that binary compact objects involving neutron stars will be detected by gravitational wave observatories in the coming years, as well as to the possibility that binary compact object mergers could explain short-duration gamma-ray bursts. We present a code designed for simulations of hydrodynamics coupled to the Einstein field equations targeted toward such applications. This code has recently be...

  1. Successful conservation of a threatened Maculinea butterfly.

    Science.gov (United States)

    Thomas, J A; Simcox, D J; Clarke, R T

    2009-07-03

    Globally threatened butterflies have prompted research-based approaches to insect conservation. Here, we describe the reversal of the decline of Maculinea arion (Large Blue), a charismatic specialist whose larvae parasitize Myrmica ant societies. M. arion larvae were more specialized than had previously been recognized, being adapted to a single host-ant species that inhabits a narrow niche in grassland. Inconspicuous changes in grazing and vegetation structure caused host ants to be replaced by similar but unsuitable congeners, explaining the extinction of European Maculinea populations. Once this problem was identified, UK ecosystems were perturbed appropriately, validating models predicting the recovery and subsequent dynamics of the butterfly and ants at 78 sites. The successful identification and reversal of the problem provides a paradigm for other insect conservation projects.

  2. Energy conservation indicators. 1982 annual report

    Energy Technology Data Exchange (ETDEWEB)

    Belzer, D.B.

    1982-09-01

    A series of Energy Conservation Indicators were developed for the Department of Energy to assist in the evaluation of current and proposed conservation strategies. As descriptive statistics that signify current conditions and trends related to efficiency of energy use, indicators provide a way of measuring, monitoring, or inferring actual responses by consumers in markets for energy services. Related sets of indicators are presented in some 40 one-page indicator summaries. Indicators are shown graphically, followed by several paragraphs that explain their derivation and highlight key findings. Indicators are classified according to broad end-use sectors: Aggregate (economy), Residential, Commercial, Industrial, Transportation and Electric Utilities. In most cases annual time series information is presented covering the period 1960 through 1981.

  3. Writing robust C++ code for critical applications

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    **C++** is one of the most **complex**, expressive and powerful languages out there. However, its complexity makes it hard to write **robust** code. When using C++ to code **critical** applications, ensuring **reliability** is one of the key topics. Testing, debugging and profiling are all a major part of this kind of work. In the BE department we use C++ to write a big part of the controls system for beam operation, which implies putting a big focus on system stability and ensuring smooth operation. This talk will try to: - Highlight potential problems when writing C++ code, giving guidelines on writing defensive code that could have avoided such issues - Explain how to avoid common pitfalls (both in writing C++ code and at the debugging & profiling phase) - Showcase some tools and tricks useful to C++ development The attendees' proficiency in C++ should not be a concern. Anyone is free to join, even people that do not know C++, if only to learn the pitfalls a language may have. This may benefit f...

  4. Conservation businesses and conservation planning in a biological diversity hotspot.

    Science.gov (United States)

    Di Minin, Enrico; Macmillan, Douglas Craig; Goodman, Peter Styan; Escott, Boyd; Slotow, Rob; Moilanen, Atte

    2013-08-01

    The allocation of land to biological diversity conservation competes with other land uses and the needs of society for development, food, and extraction of natural resources. Trade-offs between biological diversity conservation and alternative land uses are unavoidable, given the realities of limited conservation resources and the competing demands of society. We developed a conservation-planning assessment for the South African province of KwaZulu-Natal, which forms the central component of the Maputaland-Pondoland-Albany biological diversity hotspot. Our objective was to enhance biological diversity protection while promoting sustainable development and providing spatial guidance in the resolution of potential policy conflicts over priority areas for conservation at risk of transformation. The conservation-planning assessment combined spatial-distribution models for 646 conservation features, spatial economic-return models for 28 alternative land uses, and spatial maps for 4 threats. Nature-based tourism businesses were competitive with other land uses and could provide revenues of >US$60 million/year to local stakeholders and simultaneously help meeting conservation goals for almost half the conservation features in the planning region. Accounting for opportunity costs substantially decreased conflicts between biological diversity, agricultural use, commercial forestry, and mining. Accounting for economic benefits arising from conservation and reducing potential policy conflicts with alternative plans for development can provide opportunities for successful strategies that combine conservation and sustainable development and facilitate conservation action. © 2013 Society for Conservation Biology.

  5. Methods of equipment conservation of a carboelectric

    International Nuclear Information System (INIS)

    Hurtado Higuera, Julio Cesar

    2001-01-01

    Several conservation methods are mentioned like they are those of conservation in dry, in humid, conservation of bombs of water conservation, of turbines, of generators, of transformers, of electric motors and conservation of coal piles

  6. ACE - Manufacturer Identification Code (MID)

    Data.gov (United States)

    Department of Homeland Security — The ACE Manufacturer Identification Code (MID) application is used to track and control identifications codes for manufacturers. A manufacturer is identified on an...

  7. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  8. open-quotes Sonyaclose quotes explains

    International Nuclear Information System (INIS)

    Moss, N.

    1993-01-01

    This article describes observations of Ruth Werner from when she was an agent of the Soviet espionage service (code name open-quotes Sonyaclose quotes) as related in her interview with the author. The main topics covered in the interview include her opinion and relationship with Klaus Fuchs, the German-born British physicist who passed the secrets of the first atomic bomb to the Russians, and her views on German reunification. Ruth focuses her discussion on her dedication to making the world a better place and the disillusionment she has felt as she reminisces about her past

  9. The Aster code

    International Nuclear Information System (INIS)

    Delbecq, J.M.

    1999-01-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  10. Adaptive distributed source coding.

    Science.gov (United States)

    Varodayan, David; Lin, Yao-Chung; Girod, Bernd

    2012-05-01

    We consider distributed source coding in the presence of hidden variables that parameterize the statistical dependence among sources. We derive the Slepian-Wolf bound and devise coding algorithms for a block-candidate model of this problem. The encoder sends, in addition to syndrome bits, a portion of the source to the decoder uncoded as doping bits. The decoder uses the sum-product algorithm to simultaneously recover the source symbols and the hidden statistical dependence variables. We also develop novel techniques based on density evolution (DE) to analyze the coding algorithms. We experimentally confirm that our DE analysis closely approximates practical performance. This result allows us to efficiently optimize parameters of the algorithms. In particular, we show that the system performs close to the Slepian-Wolf bound when an appropriate doping rate is selected. We then apply our coding and analysis techniques to a reduced-reference video quality monitoring system and show a bit rate saving of about 75% compared with fixed-length coding.

  11. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  12. WHITE DWARF MERGERS ON ADAPTIVE MESHES. I. METHODOLOGY AND CODE VERIFICATION

    Energy Technology Data Exchange (ETDEWEB)

    Katz, Max P.; Zingale, Michael; Calder, Alan C.; Swesty, F. Douglas [Department of Physics and Astronomy, Stony Brook University, Stony Brook, NY, 11794-3800 (United States); Almgren, Ann S.; Zhang, Weiqun [Center for Computational Sciences and Engineering, Lawrence Berkeley National Laboratory, Berkeley, CA 94720 (United States)

    2016-03-10

    The Type Ia supernova (SN Ia) progenitor problem is one of the most perplexing and exciting problems in astrophysics, requiring detailed numerical modeling to complement observations of these explosions. One possible progenitor that has merited recent theoretical attention is the white dwarf (WD) merger scenario, which has the potential to naturally explain many of the observed characteristics of SNe Ia. To date there have been relatively few self-consistent simulations of merging WD systems using mesh-based hydrodynamics. This is the first paper in a series describing simulations of these systems using a hydrodynamics code with adaptive mesh refinement. In this paper we describe our numerical methodology and discuss our implementation in the compressible hydrodynamics code CASTRO, which solves the Euler equations, and the Poisson equation for self-gravity, and couples the gravitational and rotation forces to the hydrodynamics. Standard techniques for coupling gravitation and rotation forces to the hydrodynamics do not adequately conserve the total energy of the system for our problem, but recent advances in the literature allow progress and we discuss our implementation here. We present a set of test problems demonstrating the extent to which our software sufficiently models a system where large amounts of mass are advected on the computational domain over long timescales. Future papers in this series will describe our treatment of the initial conditions of these systems and will examine the early phases of the merger to determine its viability for triggering a thermonuclear detonation.

  13. Feedbacks between conservation and social-ecological systems

    Science.gov (United States)

    Miller, Brian W.; Caplow, Susan C.; Leslie, Paul W.

    2012-01-01

    Robust ways to meet objectives of environmental conservation and social and economic development remain elusive. This struggle may in part be related to insufficient understanding of the feedbacks between conservation initiatives and social-ecological systems, specifically, the ways in which conservation initiatives result in social changes that have secondary effects on the environments targeted by conservation. To explore this idea we sampled peer-reviewed articles addressing the social and environmental dimensions of conservation and coded each paper according to its research focus and characterization of these feedbacks. The majority of articles in our sample focused either on the effect of conservation initiatives on people (e.g., relocation, employment) or the effect of people on the environment (e.g., fragmentation, conservation efficacy of traditional management systems). Few studies in our sample empirically addressed both the social dynamics resulting from conservation initiatives and subsequent environmental effects. In many cases, one was measured and the other was discussed anecdotally. Among the studies that describe feedbacks between social and environmental variables, there was more evidence of positive (amplifying) feedbacks between social and environmental outcomes (i.e., undesirable social outcomes yielded undesirable environmental effects, and desirable social outcomes yielded desirable environmental effects). The major themes within the sampled literature include conflict between humans and wild animals, social movements, adaptive comanagement, loss of traditional management systems, traditional ecological knowledge, human displacement and risks to livelihoods, and conservation and development. The narratives associated with each theme can serve as hypotheses for facilitating further discussion about conservation issues and for catalyzing future studies of the feedbacks between conservation and social-ecological systems. PMID:22443128

  14. On momentum conservation

    International Nuclear Information System (INIS)

    Karastoyanov, A.

    1990-01-01

    The relativistic law of momentum transformation shows that the sum of momenta of even isolated particles is not invariable in all inertial reference systems. This is connected with the relativistic change of kinetic energy and mass of a system of particles in result of internal interactions. The paper proposes a short and simple proof on the necessity of potential momentum. The momentum conservation law (for all interactions in the Minkowski world) is expressed in a generalized form. The constancy of the sum of kinetic and potential momentum of closed system of particles is shown. The energy conservation is a necessary condition. The potential momentum is defined as usual (e.g. as in the Berkeley Physics Course). (author). 13 refs

  15. Conservation laws shape dissipation

    Science.gov (United States)

    Rao, Riccardo; Esposito, Massimiliano

    2018-02-01

    Starting from the most general formulation of stochastic thermodynamics—i.e. a thermodynamically consistent nonautonomous stochastic dynamics describing systems in contact with several reservoirs—we define a procedure to identify the conservative and the minimal set of nonconservative contributions in the entropy production. The former is expressed as the difference between changes caused by time-dependent drivings and a generalized potential difference. The latter is a sum over the minimal set of flux-force contributions controlling the dissipative flows across the system. When the system is initially prepared at equilibrium (e.g. by turning off drivings and forces), a finite-time detailed fluctuation theorem holds for the different contributions. Our approach relies on identifying the complete set of conserved quantities and can be viewed as the extension of the theory of generalized Gibbs ensembles to nonequilibrium situations.

  16. Promoting household energy conservation

    International Nuclear Information System (INIS)

    Steg, Linda

    2008-01-01

    It is commonly assumed that households must change their behaviour to reduce the problems caused by increasing levels of fossil energy use. Strategies for behaviour change will be more effective if they target the most important causes of the behaviour in question. Therefore, this paper first discusses the factors influencing household energy use. Three barriers to fossil fuel energy conservation are discussed: insufficient knowledge of effective ways to reduce household energy use, the low priority and high costs of energy savings, and the lack of feasible alternatives. Next, the paper elaborates on the effectiveness and acceptability of strategies aimed to promote household energy savings. Informational strategies aimed at changing individuals' knowledge, perceptions, cognitions, motivations and norms, as well as structural strategies aimed at changing the context in which decisions are made, are discussed. This paper focuses on the psychological literature on household energy conservation, which mostly examined the effects of informational strategies. Finally, this paper lists important topics for future research

  17. Spatially coded backscatter radiography

    International Nuclear Information System (INIS)

    Thangavelu, S.; Hussein, E.M.A.

    2007-01-01

    Conventional radiography requires access to two opposite sides of an object, which makes it unsuitable for the inspection of extended and/or thick structures (airframes, bridges, floors etc.). Backscatter imaging can overcome this problem, but the indications obtained are difficult to interpret. This paper applies the coded aperture technique to gamma-ray backscatter-radiography in order to enhance the detectability of flaws. This spatial coding method involves the positioning of a mask with closed and open holes to selectively permit or block the passage of radiation. The obtained coded-aperture indications are then mathematically decoded to detect the presence of anomalies. Indications obtained from Monte Carlo calculations were utilized in this work to simulate radiation scattering measurements. These simulated measurements were used to investigate the applicability of this technique to the detection of flaws by backscatter radiography

  18. Aztheca Code; Codigo Aztheca

    Energy Technology Data Exchange (ETDEWEB)

    Quezada G, S.; Espinosa P, G. [Universidad Autonoma Metropolitana, Unidad Iztapalapa, San Rafael Atlixco No. 186, Col. Vicentina, 09340 Ciudad de Mexico (Mexico); Centeno P, J.; Sanchez M, H., E-mail: sequga@gmail.com [UNAM, Facultad de Ingenieria, Ciudad Universitaria, Circuito Exterior s/n, 04510 Ciudad de Mexico (Mexico)

    2017-09-15

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  19. The Coding Question.

    Science.gov (United States)

    Gallistel, C R

    2017-07-01

    Recent electrophysiological results imply that the duration of the stimulus onset asynchrony in eyeblink conditioning is encoded by a mechanism intrinsic to the cerebellar Purkinje cell. This raises the general question - how is quantitative information (durations, distances, rates, probabilities, amounts, etc.) transmitted by spike trains and encoded into engrams? The usual assumption is that information is transmitted by firing rates. However, rate codes are energetically inefficient and computationally awkward. A combinatorial code is more plausible. If the engram consists of altered synaptic conductances (the usual assumption), then we must ask how numbers may be written to synapses. It is much easier to formulate a coding hypothesis if the engram is realized by a cell-intrinsic molecular mechanism. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Revised SRAC code system

    International Nuclear Information System (INIS)

    Tsuchihashi, Keichiro; Ishiguro, Yukio; Kaneko, Kunio; Ido, Masaru.

    1986-09-01

    Since the publication of JAERI-1285 in 1983 for the preliminary version of the SRAC code system, a number of additions and modifications to the functions have been made to establish an overall neutronics code system. Major points are (1) addition of JENDL-2 version of data library, (2) a direct treatment of doubly heterogeneous effect on resonance absorption, (3) a generalized Dancoff factor, (4) a cell calculation based on the fixed boundary source problem, (5) the corresponding edit required for experimental analysis and reactor design, (6) a perturbation theory calculation for reactivity change, (7) an auxiliary code for core burnup and fuel management, etc. This report is a revision of the users manual which consists of the general description, input data requirements and their explanation, detailed information on usage, mathematics, contents of libraries and sample I/O. (author)

  1. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  2. CODE: EB10

    African Journals Online (AJOL)

    Philippe

    the field of education including non-formal education, it sounds a wakeup call .... Specifically, Bantu languages use noun classes which go by pairs marked by .... there is a need for one‟s energy conservation which characterizes humanity in ...

  3. The correspondence between projective codes and 2-weight codes

    NARCIS (Netherlands)

    Brouwer, A.E.; Eupen, van M.J.M.; Tilborg, van H.C.A.; Willems, F.M.J.

    1994-01-01

    The hyperplanes intersecting a 2-weight code in the same number of points obviously form the point set of a projective code. On the other hand, if we have a projective code C, then we can make a 2-weight code by taking the multiset of points E PC with multiplicity "Y(w), where W is the weight of

  4. Visualizing code and coverage changes for code review

    NARCIS (Netherlands)

    Oosterwaal, Sebastiaan; van Deursen, A.; De Souza Coelho, R.; Sawant, A.A.; Bacchelli, A.

    2016-01-01

    One of the tasks of reviewers is to verify that code modifications are well tested. However, current tools offer little support in understanding precisely how changes to the code relate to changes to the tests. In particular, it is hard to see whether (modified) test code covers the changed code.

  5. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    Today, both turbo codes and low-density parity-check codes are largely superior to other code families and are being used in an increasing number of modern communication systems including 3G standards, satellite and deep space communications. However, the two codes have certain distinctive characteristics that ...

  6. 18 CFR Table 1 to Part 301 - Functionalization and Escalation Codes

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Functionalization and Escalation Codes 1 Table 1 to Part 301 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS FOR FEDERAL POWER MARKETING ADMINISTRATIONS AVERAGE SYSTEM COST...

  7. 18 CFR 284.288 - Code of conduct for unbundled sales service.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Code of conduct for unbundled sales service. 284.288 Section 284.288 Conservation of Power and Water Resources FEDERAL ENERGY... information upon which it billed the prices it charged for natural gas it sold pursuant to its market based...

  8. 18 CFR 284.403 - Code of conduct for persons holding blanket marketing certificates.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Code of conduct for persons holding blanket marketing certificates. 284.403 Section 284.403 Conservation of Power and Water... information upon which it billed the prices it charged for the natural gas sold pursuant to its market based...

  9. Code of Medical Ethics

    Directory of Open Access Journals (Sweden)

    . SZD-SZZ

    2017-03-01

    Full Text Available Te Code was approved on December 12, 1992, at the 3rd regular meeting of the General Assembly of the Medical Chamber of Slovenia and revised on April 24, 1997, at the 27th regular meeting of the General Assembly of the Medical Chamber of Slovenia. The Code was updated and harmonized with the Medical Association of Slovenia and approved on October 6, 2016, at the regular meeting of the General Assembly of the Medical Chamber of Slovenia.

  10. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed

    2018-04-08

    Convolutional Sparse Coding (CSC) is a well-established image representation model especially suited for image restoration tasks. In this work, we extend the applicability of this model by proposing a supervised approach to convolutional sparse coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements to be discriminative. Experimental results show that using supervised convolutional learning results in two key advantages. First, we learn more semantically relevant filters in the dictionary and second, we achieve improved image reconstruction on unseen data.

  11. CONCEPT computer code

    International Nuclear Information System (INIS)

    Delene, J.

    1984-01-01

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  12. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  13. Energy conservation from a consumer perspective. Institut fuer marketing der Universitaet Muenster, Arbeitspapiere

    Energy Technology Data Exchange (ETDEWEB)

    Katz, R

    1980-01-01

    A survey of the standard of energy research in the American Literature on consumer behaviour is given. After the discussion of the importance of consumer research for energy conservation the difficulties on determining ''energy conservation behaviour'' are described. Moreover, the study compiles past American Literature that has tried to explain energy conservation behaviour. A further chapter analyzes measures of influencing the consumer energy conservation behaviour carried out so far in the United States and Canada. Finally, still open problems in future American energy conservation research in the field of consumer behaviour are demonstrated.

  14. The Role of Government Policies in the Adoption of Conservation Tillage in China: A Theoretical Model

    Science.gov (United States)

    Ding, Ya

    2018-01-01

    In recent years, many areas of China have been facing increasing problems of soil erosion and land degradation. Conservation tillage, with both economic and ecological benefits, provides a good avenue for Chinese farmers to conserve land as well as secure food production. However, the adoption rate of conservation tillage systems is very low in China. In this paper, the author constructs a theoretical model to explain a farmer’s adoption decision of conservation tillage. The goal is to investigate potential reasons behind the low adoption rate and explores alternative policy tools that can help improve a farmer’s incentive to adopt conservation tillage in China.

  15. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . 171 4.9 Codes form order domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4.10 One-point geometric Goppa codes . . . . . . . . . . . . . . . . . . . . . . . . 176 4.11 Bibliographical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 References...

  16. Explaining variation in Down's syndrome screening uptake

    DEFF Research Database (Denmark)

    Crombag, Neeltje M T H; Vellinga, Ynke E; Kluijfhout, Sandra A

    2014-01-01

    ), in an attempt to explain the observed variation in national uptake rates. METHODS: We used a mixed methods approach with an embedded design: a) documentary analysis and b) expert stakeholder analysis. National central statistical offices and legal documents were studied first to gain insight in demographic....... RESULTS: There were many similarities in the demographics, healthcare systems, government abortion legislation and Down's syndrome screening policy across the studied countries. However, the additional cost for Down's syndrome screening over and above standard antenatal care in the Netherlands...

  17. SOME THEORETICAL MODELS EXPLAINING ADVERTISING EFFECTS

    Directory of Open Access Journals (Sweden)

    Vasilica Magdalena SOMEŞFĂLEAN

    2014-06-01

    Full Text Available Persuade clients is still the main focus of the companies, using a set of methods and techniques designed to influence their behavior, in order to obtain better results (profits over a longer period of time. Since the late nineteenth - early twentieth century, the american E.St.Elmo Lewis, considered a pioneer in advertising and sales, developed the first theory, AIDA model, later used by marketers and advertisers to develop a marketing communications strategy. Later studies have developed other models that are the main subject of this research, which explains how and why persuasive communication works, to understand why some approaches are effective and others are not.

  18. Weaker dental enamel explains dental decay.

    Science.gov (United States)

    Vieira, Alexandre R; Gibson, Carolyn W; Deeley, Kathleen; Xue, Hui; Li, Yong

    2015-01-01

    Dental caries continues to be the most prevalent bacteria-mediated non-contagious disease of humankind. Dental professionals assert the disease can be explained by poor oral hygiene and a diet rich in sugars but this does not account for caries free individuals exposed to the same risk factors. In order to test the hypothesis that amount of amelogenin during enamel development can influence caries susceptibility, we generated multiple strains of mice with varying levels of available amelogenin during dental development. Mechanical tests showed that dental enamel developed with less amelogenin is "weaker" while the dental enamel of animals over-expressing amelogenin appears to be more resistant to acid dissolution.

  19. Magnetohydrodynamics and fluid dynamics action principles and conservation laws

    CERN Document Server

    Webb, Gary

    2018-01-01

    This text focuses on conservation laws in magnetohydrodynamics, gasdynamics and hydrodynamics. A grasp of new conservation laws is essential in fusion and space plasmas, as well as in geophysical fluid dynamics; they can be used to test numerical codes, or to reveal new aspects of the underlying physics, e.g., by identifying the time history of the fluid elements as an important key to understanding fluid vorticity or in investigating the stability of steady flows. The ten Galilean Lie point symmetries of the fundamental action discussed in this book give rise to the conservation of energy, momentum, angular momentum and center of mass conservation laws via Noether’s first theorem. The advected invariants are related to fluid relabeling symmetries – so-called diffeomorphisms associated with the Lagrangian map – and are obtained by applying the Euler-Poincare approach to Noether’s second theorem. The book discusses several variants of helicity including kinetic helicity, cross helicity, magnetic helici...

  20. A theory with consolidation: Linking everything to explain everything

    Science.gov (United States)

    Biraris, Gaurav Shantaram

    The paper reports a theory which gives explicit (ontic) understanding of the abstract (epistemic) mechanisms spanning many branches of physics. It results to most modern physics starting from Newtonian physics by abandoning progress in twentieth century. The theory assumes consolidation of points in 4-balls of specific radius in the universe. Thus the 4-balls are fundamental elements of the universe. Analogue of momentum defined as soul vector is assumed to be induced on the 4-balls at the beginning of the universe. Then with progression of local time, collisions happen leading to different rotations of CNs. For such rotations, the consolidation provides centripetal binding. By using general terminologies of force and work, the mass energy mechanism gets revealed. The theory provides explicit interpretation of intrinsic properties of mass, electric charge, color charge, weak charge, spin etc. It also provides explicit understanding of the wave-particle duality & quantum mechanics. Epistemic study of the universe with the consolidation results to conventional quantum theories. Elementary mechanism of the field interactions is evident due to conservation of the soul vectors, and its epistemic expectation results to the gauge theories. The theory predicts that four types of interaction would exist in the universe along with the acceptable relative strengths; it provides fundamental interpretation of the physical forces. Further, it explains the basic mechanisms which can be identified with dark energy & dark matter. It also results to (or explains) entanglement, chirality, excess of matter, 4-component spinor, real-abstract (ontic-epistemic) correspondence etc. The theory is beyond standard model and results to the standard model, relativity, dark energy & dark matter, starting by simple assumptions.

  1. A theory with consolidation: Linking everything to explain everything

    Directory of Open Access Journals (Sweden)

    Gaurav Shantaram Biraris

    Full Text Available The paper reports a theory which gives explicit (ontic understanding of the abstract (epistemic mechanisms spanning many branches of physics. It results to most modern physics starting from Newtonian physics by abandoning progress in twentieth century. The theory assumes consolidation of points in 4-balls of specific radius in the universe. Thus the 4-balls are fundamental elements of the universe. Analogue of momentum defined as soul vector is assumed to be induced on the 4-balls at the beginning of the universe. Then with progression of local time, collisions happen leading to different rotations of CNs. For such rotations, the consolidation provides centripetal binding. By using general terminologies of force and work, the mass energy mechanism gets revealed. The theory provides explicit interpretation of intrinsic properties of mass, electric charge, color charge, weak charge, spin etc. It also provides explicit understanding of the wave-particle duality & quantum mechanics. Epistemic study of the universe with the consolidation results to conventional quantum theories. Elementary mechanism of the field interactions is evident due to conservation of the soul vectors, and its epistemic expectation results to the gauge theories. The theory predicts that four types of interaction would exist in the universe along with the acceptable relative strengths; it provides fundamental interpretation of the physical forces. Further, it explains the basic mechanisms which can be identified with dark energy & dark matter. It also results to (or explains entanglement, chirality, excess of matter, 4-component spinor, real-abstract (ontic-epistemic correspondence etc. The theory is beyond standard model and results to the standard model, relativity, dark energy & dark matter, starting by simple assumptions. Keywords: Beyond standard model, Phenomenology, Relativity, Dark matter, Realist theory

  2. Comparison of design margin for core shroud in between design and construction code and fitness-for-service code

    International Nuclear Information System (INIS)

    Dozaki, Koji

    2007-01-01

    Structural design methods for core shroud of BWR are specified in JSME Design and Construction Code, like ASME Boiler and Pressure Vessel Code Sec. III, as a part of core support structure. Design margins are defined according to combination of the structural design method selected and service limit considered. Basically, those margins in JSME Code were determined after ASME Sec. III. Designers can select so-called twice-slope method for core shroud design among those design methods. On the other hand, flaw evaluation rules have been established for core shroud in JSME Fitness-for-Service Code. Twice-slope method is also adopted for fracture evaluation in that code even when the core shroud contains a flaw. Design margin was determined as structural factors separately from Design and Construction Code. As a natural consequence, there is a difference in those design margins between the two codes. In this paper, it is shown that the design margin in Fitness-for-Service Code is conservative by experimental evidences. Comparison of design margins between the two codes is discussed. (author)

  3. Collective azimuthal alignment and transverse momentum conservation in relativistic heavy-ion collisions

    International Nuclear Information System (INIS)

    Bock, R.; Gutbrod, H.H.; Siemiarczuk, T.

    1987-08-01

    It is shown that transverse momentum conservation in the three-source Fai and Randrup statistical model does not explain the collective azimuthal alignment as observed in heavy-ion collisions at Bevelac energies. (orig.)

  4. Water Well Locations - Conservation Wells

    Data.gov (United States)

    NSGIC Education | GIS Inventory — The conservation well layer identifies the permitted surface location of oil and gas conservation wells that have not been plugged. These include active, regulatory...

  5. EXPLAINING THE ASSOCIATION BETWEEN INCARCERATION AND DIVORCE*

    Science.gov (United States)

    Siennick, Sonja E.; Stewart, Eric A.; Staff, Jeremy

    2014-01-01

    Recent studies have suggested that incarceration dramatically increases the odds of divorce, but we know little about the mechanisms that explain the association. This study uses prospective longitudinal data from a subset of married young adults in the National Longitudinal Study of Adolescent Health (N = 1,919) to examine whether incarceration is associated with divorce indirectly via low marital love, economic strain, relationship violence, and extramarital sex. The findings confirmed that incarcerations occurring during, but not before, a marriage were associated with an increased hazard of divorce. Incarcerations occurring during marriage also were associated with less marital love, more relationship violence, more economic strain, and greater odds of extramarital sex. Above-average levels of economic strain were visible among respondents observed preincarceration, but only respondents observed postincarceration showed less marital love, more relationship violence, and higher odds of extramarital sex than did respondents who were not incarcerated during marriage. These relationship problems explained approximately 40 percent of the association between incarceration and marital dissolution. These findings are consistent with theoretical predictions that a spouse’s incarceration alters the rewards and costs of the marriage and the relative attractiveness of alternative partners. PMID:25598544

  6. Explaining the imperfection of the molecular clock of hominid mitochondria.

    Directory of Open Access Journals (Sweden)

    Eva-Liis Loogväli

    Full Text Available The molecular clock of mitochondrial DNA has been extensively used to date various genetic events. However, its substitution rate among humans appears to be higher than rates inferred from human-chimpanzee comparisons, limiting the potential of interspecies clock calibrations for intraspecific dating. It is not well understood how and why the substitution rate accelerates. We have analyzed a phylogenetic tree of 3057 publicly available human mitochondrial DNA coding region sequences for changes in the ratios of mutations belonging to different functional classes. The proportion of non-synonymous and RNA genes substitutions has reduced over hundreds of thousands of years. The highest mutation ratios corresponding to fast acceleration in the apparent substitution rate of the coding sequence have occurred after the end of the Last Ice Age. We recalibrate the molecular clock of human mtDNA as 7990 years per synonymous mutation over the mitochondrial genome. However, the distribution of substitutions at synonymous sites in human data significantly departs from a model assuming a single rate parameter and implies at least 3 different subclasses of sites. Neutral model with 3 synonymous substitution rates can explain most, if not all, of the apparent molecular clock difference between the intra- and interspecies levels. Our findings imply the sluggishness of purifying selection in removing the slightly deleterious mutations from the human as well as the Neandertal and chimpanzee populations. However, for humans, the weakness of purifying selection has been further exacerbated by the population expansions associated with the out-of Africa migration and the end of the Last Ice Age.

  7. Dual Coding in Children.

    Science.gov (United States)

    Burton, John K.; Wildman, Terry M.

    The purpose of this study was to test the applicability of the dual coding hypothesis to children's recall performance. The hypothesis predicts that visual interference will have a small effect on the recall of visually presented words or pictures, but that acoustic interference will cause a decline in recall of visually presented words and…

  8. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  9. Building Codes and Regulations.

    Science.gov (United States)

    Fisher, John L.

    The hazard of fire is of great concern to libraries due to combustible books and new plastics used in construction and interiors. Building codes and standards can offer architects and planners guidelines to follow but these standards should be closely monitored, updated, and researched for fire prevention. (DS)

  10. Physics of codes

    International Nuclear Information System (INIS)

    Cooper, R.K.; Jones, M.E.

    1989-01-01

    The title given this paper is a bit presumptuous, since one can hardly expect to cover the physics incorporated into all the codes already written and currently being written. The authors focus on those codes which have been found to be particularly useful in the analysis and design of linacs. At that the authors will be a bit parochial and discuss primarily those codes used for the design of radio-frequency (rf) linacs, although the discussions of TRANSPORT and MARYLIE have little to do with the time structures of the beams being analyzed. The plan of this paper is first to describe rather simply the concepts of emittance and brightness, then to describe rather briefly each of the codes TRANSPORT, PARMTEQ, TBCI, MARYLIE, and ISIS, indicating what physics is and is not included in each of them. It is expected that the vast majority of what is covered will apply equally well to protons and electrons (and other particles). This material is intended to be tutorial in nature and can in no way be expected to be exhaustive. 31 references, 4 figures

  11. Reliability and code level

    NARCIS (Netherlands)

    Kasperski, M.; Geurts, C.P.W.

    2005-01-01

    The paper describes the work of the IAWE Working Group WBG - Reliability and Code Level, one of the International Codification Working Groups set up at ICWE10 in Copenhagen. The following topics are covered: sources of uncertainties in the design wind load, appropriate design target values for the

  12. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  13. CERN Code of Conduct

    CERN Document Server

    Department, HR

    2010-01-01

    The Code is intended as a guide in helping us, as CERN contributors, to understand how to conduct ourselves, treat others and expect to be treated. It is based around the five core values of the Organization. We should all become familiar with it and try to incorporate it into our daily life at CERN.

  14. Nuclear safety code study

    Energy Technology Data Exchange (ETDEWEB)

    Hu, H.H.; Ford, D.; Le, H.; Park, S.; Cooke, K.L.; Bleakney, T.; Spanier, J.; Wilburn, N.P.; O' Reilly, B.; Carmichael, B.

    1981-01-01

    The objective is to analyze an overpower accident in an LMFBR. A simplified model of the primary coolant loop was developed in order to understand the instabilities encountered with the MELT III and SAS codes. The computer programs were translated for switching to the IBM 4331. Numerical methods were investigated for solving the neutron kinetics equations; the Adams and Gear methods were compared. (DLC)

  15. Revised C++ coding conventions

    CERN Document Server

    Callot, O

    2001-01-01

    This document replaces the note LHCb 98-049 by Pavel Binko. After a few years of practice, some simplification and clarification of the rules was needed. As many more people have now some experience in writing C++ code, their opinion was also taken into account to get a commonly agreed set of conventions

  16. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  17. Error Correcting Codes -34 ...

    Indian Academy of Sciences (India)

    information and coding theory. A large scale relay computer had failed to deliver the expected results due to a hardware fault. Hamming, one of the active proponents of computer usage, was determined to find an efficient means by which computers could detect and correct their own faults. A mathematician by train-.

  18. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives ...

  19. Software Defined Coded Networking

    DEFF Research Database (Denmark)

    Di Paola, Carla; Roetter, Daniel Enrique Lucani; Palazzo, Sergio

    2017-01-01

    the quality of each link and even across neighbouring links and using simulations to show that an additional reduction of packet transmission in the order of 40% is possible. Second, to advocate for the use of network coding (NC) jointly with software defined networking (SDN) providing an implementation...

  20. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  1. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    having a probability Pi of being equal to a 1. Let us assume ... equal to a 0/1 has no bearing on the probability of the. It is often ... bits (call this set S) whose individual bits add up to zero ... In the context of binary error-correct~ng codes, specifi-.

  2. The Redox Code.

    Science.gov (United States)

    Jones, Dean P; Sies, Helmut

    2015-09-20

    The redox code is a set of principles that defines the positioning of the nicotinamide adenine dinucleotide (NAD, NADP) and thiol/disulfide and other redox systems as well as the thiol redox proteome in space and time in biological systems. The code is richly elaborated in an oxygen-dependent life, where activation/deactivation cycles involving O₂ and H₂O₂ contribute to spatiotemporal organization for differentiation, development, and adaptation to the environment. Disruption of this organizational structure during oxidative stress represents a fundamental mechanism in system failure and disease. Methodology in assessing components of the redox code under physiological conditions has progressed, permitting insight into spatiotemporal organization and allowing for identification of redox partners in redox proteomics and redox metabolomics. Complexity of redox networks and redox regulation is being revealed step by step, yet much still needs to be learned. Detailed knowledge of the molecular patterns generated from the principles of the redox code under defined physiological or pathological conditions in cells and organs will contribute to understanding the redox component in health and disease. Ultimately, there will be a scientific basis to a modern redox medicine.

  3. Code conforming determination of cumulative usage factors for general elastic-plastic finite element analyses

    International Nuclear Information System (INIS)

    Rudolph, Juergen; Goetz, Andreas; Hilpert, Roland

    2012-01-01

    The procedures of fatigue analyses of several relevant nuclear and conventional design codes (ASME, KTA, EN, AD) for power plant components differentiate between an elastic, simplified elastic-plastic and elastic-plastic fatigue check. As a rule, operational load levels will exclude the purely elastic fatigue check. The application of the code procedure of the simplified elastic-plastic fatigue check is common practice. Nevertheless, resulting cumulative usage factors may be overly conservative mainly due to high code based plastification penalty factors Ke. As a consequence, the more complex and still code conforming general elastic-plastic fatigue analysis methodology based on non-linear finite element analysis (FEA) is applied for fatigue design as an alternative. The requirements of the FEA and the material law to be applied have to be clarified in a first step. Current design codes only give rough guidelines on these relevant items. While the procedure for the simplified elastic-plastic fatigue analysis and the associated code passages are based on stress related cycle counting and the determination of pseudo elastic equivalent stress ranges, an adaptation to elastic-plastic strains and strain ranges is required for the elastic-plastic fatigue check. The associated requirements are explained in detail in the paper. If the established and implemented evaluation mechanism (cycle counting according to the peak and valley respectively the rainflow method, calculation of stress ranges from arbitrary load-time histories and determination of cumulative usage factors based on all load events) is to be retained, a conversion of elastic-plastic strains and strain ranges into pseudo elastic stress ranges is required. The algorithm to be applied is described in the paper. It has to be implemented in the sense of an extended post processing operation of FEA e.g. by APDL scripts in ANSYS registered . Variations of principal stress (strain) directions during the loading

  4. Conservation Education: A Position Statement.

    Science.gov (United States)

    Soil Conservation Society of America, Ankeny, IA.

    The Soil Conservation Society of America's (SCSA) aim is to advance the science and art of good land and water use. Conservation education has a significant role in achieving the wise use of these resources. In this report, perspectives are offered on: (1) the requirements for effective conservation education programs; (2) rationale for…

  5. Madagascar Conservation & Development: Editorial Policies

    African Journals Online (AJOL)

    ... of the Madagascar Conservation & Development community. Finally, Madagascar Conservation & Development serves as a conduit for debate and discussion and welcomes contributions on any aspect of the legal or scientific status of any species living in Madagascar, or on conservation and development philosophy.

  6. Z₂-double cyclic codes

    OpenAIRE

    Borges, J.

    2014-01-01

    A binary linear code C is a Z2-double cyclic code if the set of coordinates can be partitioned into two subsets such that any cyclic shift of the coordinates of both subsets leaves invariant the code. These codes can be identified as submodules of the Z2[x]-module Z2[x]/(x^r − 1) × Z2[x]/(x^s − 1). We determine the structure of Z2-double cyclic codes giving the generator polynomials of these codes. The related polynomial representation of Z2-double cyclic codes and its duals, and the relation...

  7. Coding for urologic office procedures.

    Science.gov (United States)

    Dowling, Robert A; Painter, Mark

    2013-11-01

    This article summarizes current best practices for documenting, coding, and billing common office-based urologic procedures. Topics covered include general principles, basic and advanced urologic coding, creation of medical records that support compliant coding practices, bundled codes and unbundling, global periods, modifiers for procedure codes, when to bill for evaluation and management services during the same visit, coding for supplies, and laboratory and radiology procedures pertinent to urology practice. Detailed information is included for the most common urology office procedures, and suggested resources and references are provided. This information is of value to physicians, office managers, and their coding staff. Copyright © 2013 Elsevier Inc. All rights reserved.

  8. The one-dimensional transport codes MAKOKOT. Presentation and directions for use

    International Nuclear Information System (INIS)

    Capes, H.; Mercier, C.; Morera, J.P.

    1986-06-01

    In this note are presented the different one-dimensional evolution codes available to date under the generic name MAKOKOT. They are six principal codes: - TRANS: for ion and electron transport; -NEUTRE: for neutrals; -IMPUR: for impurities; -ECRH: for electron cyclotron resonance; -DENT: for sawtooth modelling and analysis; -BILAN: for global verification of conservation. One supplementary code is added which is an impurity evolution code; it takes in account, in 1-D geometry, the buffer zone generated by the limiter between the hot plasma and the wall. An abundant bibliography is given. A comprehensive manner of using is given which underlines the use versatility of these codes [fr

  9. Integrating conservation costs into sea level rise adaptive conservation prioritization

    Directory of Open Access Journals (Sweden)

    Mingjian Zhu

    2015-07-01

    Full Text Available Biodiversity conservation requires strategic investment as resources for conservation are often limited. As sea level rises, it is important and necessary to consider both sea level rise and costs in conservation decision making. In this study, we consider costs of conservation in an integrated modeling process that incorporates a geomorphological model (SLAMM, species habitat models, and conservation prioritization (Zonation to identify conservation priorities in the face of landscape dynamics due to sea level rise in the Matanzas River basin of northeast Florida. Compared to conservation priorities that do not consider land costs in the analysis process, conservation priorities that consider costs in the planning process change significantly. The comparison demonstrates that some areas with high conservation values might be identified as lower priorities when integrating economic costs in the planning process and some areas with low conservation values might be identified as high priorities when considering costs in the planning process. This research could help coastal resources managers make informed decisions about where and how to allocate conservation resources more wisely to facilitate biodiversity adaptation to sea level rise.

  10. Essential idempotents and simplex codes

    Directory of Open Access Journals (Sweden)

    Gladys Chalom

    2017-01-01

    Full Text Available We define essential idempotents in group algebras and use them to prove that every mininmal abelian non-cyclic code is a repetition code. Also we use them to prove that every minimal abelian code is equivalent to a minimal cyclic code of the same length. Finally, we show that a binary cyclic code is simplex if and only if is of length of the form $n=2^k-1$ and is generated by an essential idempotent.

  11. Stiffness and the automatic selection of ODE codes

    International Nuclear Information System (INIS)

    Shampine, L.F.

    1984-01-01

    The author describes the basic ideas behind the most popular methods for the numerical solution of ordinary differential equations (ODEs). He takes up the qualitative behavior of solutions of ODEs and its relation ot the propagation of numerical error. Codes for ODEs are intended either for stiff problems or for non-stiff problems. The difference is explained. Users of codes do not have the information needed to recognize stiffness. A code, DEASY, which automatically recognizes stiffness and selects a suitable method is described

  12. Development of ASME Code Section 11 visual examination requirements

    International Nuclear Information System (INIS)

    Cook, J.F.

    1990-01-01

    Section XI of the American Society for Mechanical Engineers Boiler and Pressure Vessel Code (ASME Code) defines three types of nondestructive examinations, visual, surface, and volumetric. Visual examination is important since it is the primary examination method for many safety-related components and systems and is also used as a backup examination for the components and systems which receive surface or volumetric examinations. Recent activity in the Section XI Code organization to improve the rules for visual examinations is reviewed and the technical basis for the new rules, which cover illumination, vision acuity, and performance demonstration, is explained

  13. Colors and geometric forms in the work process information coding

    Directory of Open Access Journals (Sweden)

    Čizmić Svetlana

    2006-01-01

    Full Text Available The aim of the research was to establish the meaning of the colors and geometric shapes in transmitting information in the work process. The sample of 100 students connected 50 situations which could be associated with regular tasks in the work process with 12 colors and 4 geometric forms in previously chosen color. Based on chosen color-geometric shape-situation regulation, the idea of the research was to find out regularities in coding of information and to examine if those regularities can provide meaningful data assigned to each individual code and to explain which codes are better and applicable represents of examined situations.

  14. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  15. Hearing Conservation Live #2430

    Energy Technology Data Exchange (ETDEWEB)

    Chochoms, Michael [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-08-09

    Occupational hearing loss is one of the most common work-related illnesses in the United States (US). From 22 to 30 million US workers are exposed to hazardous noise levels at work, and 25% of these workers will develop permanent hearing loss. Hearing loss from noise is slow and painless, and you can have a disability before you notice it. This course presents the hazards associated with workplace noise, the purpose and elements of the Los Alamos National Laboratory (LANL) Hearing Conservation Program (HCP), and controls that are available to reduce your exposure to hazardous levels of noise.

  16. Energy conservation technologies

    Energy Technology Data Exchange (ETDEWEB)

    Courtright, H.A. [Electric Power Research Inst., Palo Alto, CA (United States)

    1993-12-31

    The conservation of energy through the efficiency improvement of existing end-uses and the development of new technologies to replace less efficient systems is an important component of the overall effort to reduce greenhouse gases which may contribute to global climate change. Even though uncertainties exist on the degree and causes of global warming, efficiency improvements in end-use applications remain in the best interest of utilities, their customers and society because efficiency improvements not only reduce environmental exposures but also contribute to industrial productivity, business cost reductions and consumer savings in energy costs.

  17. Integrating Agriculture and Conservation

    Science.gov (United States)

    Vandever, Mark W.

    2010-01-01

    The USGS produces the needed science-based information to guide management actions and policy decisions that support wildlife habitat and other environmental services compatible with USDA conservation goals and farm operations. The Policy Analysis and Science Assistance Branch of the Fort Collins Science Center (FORT) has conducted research involving a national landowner survey and numerous short- and long-term evaluations regarding vegetation responses to land management practices. This research helps land and resource managers to make informed decisions and resolve resource management conflicts.

  18. Explaining the democratic anchorage of governance networks

    DEFF Research Database (Denmark)

    Skelcher, Chris; Klijn, Erik-Hans; Kübler, Daniel

    2011-01-01

    Advances in understanding the democratic anchorage of governance networks require carefully designed and contextually grounded empirical analysis that take into account contextual factors. The article uses a conjectural framework to study the impact of the national democratic milieu...... on the relationship between network governance and representative institutions in four European countries: the United Kingdom, Switzerland, the Netherlands, and Denmark. The article shows that the distinction between majoritarian and consensus democracy as well as the varying strength of voluntary associations...... are important contextual factors that help explain cross-national differences in the relationship between governance networks and representative institutions. We conclude that a context of weak associationalism in majoritarian democracies facilitates the instrumentalization of networks by government actors...

  19. Explaining CMS lepton excesses with supersymmetry

    CERN Multimedia

    CERN. Geneva; Prof. Allanach, Benjamin

    2014-01-01

    1) Kostas Theofilatos will give an introduction to CMS result 2) Ben Allanach: Several CMS analyses involving di-leptons have recently reported small 2.4-2.8 sigma local excesses: nothing to get too excited about, but worth keeping an eye on nonetheless. In particular, a search in the $lljj p_T$(miss) channel, a search for $W_R$ in the $lljj$ channel and a di-leptoquark search in the $lljj$ channel and $ljj p_T$(miss) channel have all yielded small excesses. We interpret the first excess in the MSSM, showing that the interpretation is viable in terms of other constraints, despite only having squark masses of around 1 TeV. We can explain the last three excesses with a single R-parity violating coupling that predicts a non-zero contribution to the neutrinoless double beta decay rate.

  20. Explaining the moral of the story.

    Science.gov (United States)

    Walker, Caren M; Lombrozo, Tania

    2017-10-01

    Although storybooks are often used as pedagogical tools for conveying moral lessons to children, the ability to spontaneously extract "the moral" of a story develops relatively late. Instead, children tend to represent stories at a concrete level - one that highlights surface features and understates more abstract themes. Here we examine the role of explanation in 5- and 6-year-old children's developing ability to learn the moral of a story. Two experiments demonstrate that, relative to a control condition, prompts to explain aspects of a story facilitate children's ability to override salient surface features, abstract the underlying moral, and generalize that moral to novel contexts. In some cases, generating an explanation is more effective than being explicitly told the moral of the story, as in a more traditional pedagogical exchange. These findings have implications for moral comprehension, the role of explanation in learning, and the development of abstract reasoning in early childhood. Copyright © 2016 Elsevier B.V. All rights reserved.

  1. Explaining NDVI trends in northern Burkina Faso

    DEFF Research Database (Denmark)

    Rasmussen, Kjeld; Fensholt, Rasmus; Fog, Bjarne

    2014-01-01

    by a distinct spatial pattern and strongly dominated by negative trends in Normalized Difference Vegetation Index (NDVI). The aim of the paper is to explain this distinct pattern. When studied over the period 2000–2012, using NDVI data from the MODIS sensor the spatial pattern of NDVI trends indicates that non......-climatic factors are involved. By relating NDVI trends to landscape elements and land use change we demonstrate that NDVI trends in the north-western parts of the study area are mostly related to landscape elements, while this is not the case in the south-eastern parts, where rapidly changing land use, including....... expansion of irrigation, plays a major role. It is inferred that a process of increased redistribution of fine soil material, water and vegetation from plateaus and slopes to valleys, possibly related to higher grazing pressure, may provide an explanation of the observed pattern of NDVI trends. Further work...

  2. Can molecular cell biology explain chromosome motions?

    Directory of Open Access Journals (Sweden)

    Gagliardi L

    2011-05-01

    Full Text Available Abstract Background Mitotic chromosome motions have recently been correlated with electrostatic forces, but a lingering "molecular cell biology" paradigm persists, proposing binding and release proteins or molecular geometries for force generation. Results Pole-facing kinetochore plates manifest positive charges and interact with negatively charged microtubule ends providing the motive force for poleward chromosome motions by classical electrostatics. This conceptual scheme explains dynamic tracking/coupling of kinetochores to microtubules and the simultaneous depolymerization of kinetochore microtubules as poleward force is generated. Conclusion We question here why cells would prefer complex molecular mechanisms to move chromosomes when direct electrostatic interactions between known bound charge distributions can accomplish the same task much more simply.

  3. Explaining fast radio bursts through Dicke's superradiance

    Science.gov (United States)

    Houde, Martin; Mathews, Abhilash; Rajabi, Fereshteh

    2018-03-01

    Fast radio bursts (FRBs), characterized by strong bursts of radiation intensity at radio wavelengths lasting on the order of a millisecond, have yet to be firmly associated with a family, or families, of astronomical sources. It follows that despite the large number of proposed models, no well-defined physical process has been identified to explain this phenomenon. In this paper, we demonstrate how Dicke's superradiance, for which evidence has recently been found in the interstellar medium, can account for the characteristics associated with FRBs. Our analysis and modelling of previously detected FRBs suggest they could originate from regions in many ways similar to those known to harbour masers or megamasers, and result from the coherent radiation emanating from populations of molecules associated with large-scale entangled quantum mechanical states. We estimate this entanglement to involve as many as ˜1030 to ˜1032 molecules over distances spanning 100-1000 au.

  4. Explaining mutualism variation: a new evolutionary paradox?

    Science.gov (United States)

    Heath, Katy D; Stinchcombe, John R

    2014-02-01

    The paradox of mutualism is typically framed as the persistence of interspecific cooperation, despite the potential advantages of cheating. Thus, mutualism research has tended to focus on stabilizing mechanisms that prevent the invasion of low-quality partners. These mechanisms alone cannot explain the persistence of variation for partner quality observed in nature, leaving a large gap in our understanding of how mutualisms evolve. Studying partner quality variation is necessary for applying genetically explicit models to predict evolution in natural populations, a necessary step for understanding the origins of mutualisms as well as their ongoing dynamics. An evolutionary genetic approach, which is focused on naturally occurring mutualist variation, can potentially synthesize the currently disconnected fields of mutualism evolution and coevolutionary genetics. We outline explanations for the maintenance of genetic variation for mutualism and suggest approaches necessary to address them. © 2013 The Author(s). Evolution © 2013 The Society for the Study of Evolution.

  5. Explaining excess morbidity amongst homeless shelter users

    DEFF Research Database (Denmark)

    Benjaminsen, Lars; Birkelund, Jesper Fels

    2018-01-01

    AIMS: This article analyses excess morbidity amongst homeless shelter users compared to the general Danish population. The study provides an extensive control for confounding and investigates to what extent excess morbidity is explained by homelessness or other risk factors. METHODS: Data set...... includes administrative micro-data for 4,068,926 Danes who were 23 years or older on 1 January 2007. Nationwide data on shelter use identified 14,730 individuals as shelter users from 2002 to 2006. Somatic diseases were measured from 2007 to 2011 through diagnosis data from hospital discharges. The risk...... of somatic diseases amongst shelter users was analysed through a multivariate model that decomposed the total effect into a direct effect and indirect effects mediated by other risk factors. RESULTS: The excess morbidity associated with shelter use is substantially lower than in studies that did not include...

  6. Autonomy, responsibility and the Italian Code of Deontology for Nurses.

    Science.gov (United States)

    Barazzetti, Gaia; Radaelli, Stefania; Sala, Roberta

    2007-01-01

    This article is a first assessment of the Italian Code of deontology for nurses (revised in 1999) on the basis of data collected from focus groups with nurses taking part in the Ethical Codes in Nursing (ECN) project. We illustrate the professional context in which the Code was introduced and explain why the 1999 revision was necessary in the light of changes affecting the Italian nursing profession. The most remarkable findings concern professional autonomy and responsibility, and how the Code is thought of as a set of guidelines for nursing practice. We discuss these issues, underlining that the 1999 Code represents a valuable instrument for ethical reflection and examination, a stimulus for putting the moral sense of the nursing profession into action, and that it represents a new era for professional nursing practice in Italy. The results of the analysis also deserve further qualitative study and future consideration.

  7. Ombuds’ corner: Code of Conduct and change of behaviour

    CERN Multimedia

    Vincent Vuillemin

    2012-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Is our Code of Conduct actually effective in influencing behaviour? Research studies suggest that codes, while necessary, are insufficient as a means of encouraging respectful behaviour among employees. Codes are only a potential means of influencing employee behaviour. For a Code of Conduct to be effective, several elements must be in place. Firstly, there needs to be communication and effective training using relevant examples to make the code real. It should be embraced by the leaders and accepted by the personnel. Finally, it should be embedded in the CERN culture and not seen as a separate entity, which requires serious discussions to raise awareness. In addition, every c...

  8. Interface requirements to couple thermal-hydraulic codes to severe accident codes: ATHLET-CD

    Energy Technology Data Exchange (ETDEWEB)

    Trambauer, K. [GRS, Garching (Germany)

    1997-07-01

    The system code ATHLET-CD is being developed by GRS in cooperation with IKE and IPSN. Its field of application comprises the whole spectrum of leaks and large breaks, as well as operational and abnormal transients for LWRs and VVERs. At present the analyses cover the in-vessel thermal-hydraulics, the early phases of core degradation, as well as fission products and aerosol release from the core and their transport in the Reactor Coolant System. The aim of the code development is to extend the simulation of core degradation up to failure of the reactor pressure vessel and to cover all physically reasonable accident sequences for western and eastern LWRs including RMBKs. The ATHLET-CD structure is highly modular in order to include a manifold spectrum of models and to offer an optimum basis for further development. The code consists of four general modules to describe the reactor coolant system thermal-hydraulics, the core degradation, the fission product core release, and fission product and aerosol transport. Each general module consists of some basic modules which correspond to the process to be simulated or to its specific purpose. Besides the code structure based on the physical modelling, the code follows four strictly separated steps during the course of a calculation: (1) input of structure, geometrical data, initial and boundary condition, (2) initialization of derived quantities, (3) steady state calculation or input of restart data, and (4) transient calculation. In this paper, the transient solution method is briefly presented and the coupling methods are discussed. Three aspects have to be considered for the coupling of different modules in one code system. First is the conservation of masses and energy in the different subsystems as there are fluid, structures, and fission products and aerosols. Second is the convergence of the numerical solution and stability of the calculation. The third aspect is related to the code performance, and running time.

  9. Strategies for measuring evolutionary conservation of RNA secondary structures

    Directory of Open Access Journals (Sweden)

    Hofacker Ivo L

    2008-02-01

    Full Text Available Abstract Background Evolutionary conservation of RNA secondary structure is a typical feature of many functional non-coding RNAs. Since almost all of the available methods used for prediction and annotation of non-coding RNA genes rely on this evolutionary signature, accurate measures for structural conservation are essential. Results We systematically assessed the ability of various measures to detect conserved RNA structures in multiple sequence alignments. We tested three existing and eight novel strategies that are based on metrics of folding energies, metrics of single optimal structure predictions, and metrics of structure ensembles. We find that the folding energy based SCI score used in the RNAz program and a simple base-pair distance metric are by far the most accurate. The use of more complex metrics like for example tree editing does not improve performance. A variant of the SCI performed particularly well on highly conserved alignments and is thus a viable alternative when only little evolutionary information is available. Surprisingly, ensemble based methods that, in principle, could benefit from the additional information contained in sub-optimal structures, perform particularly poorly. As a general trend, we observed that methods that include a consensus structure prediction outperformed equivalent methods that only consider pairwise comparisons. Conclusion Structural conservation can be measured accurately with relatively simple and intuitive metrics. They have the potential to form the basis of future RNA gene finders, that face new challenges like finding lineage specific structures or detecting mis-aligned sequences.

  10. Japanese standard method for safety evaluation using best estimate code based on uncertainty and scaling analyses with statistical approach

    International Nuclear Information System (INIS)

    Mizokami, Shinya; Hotta, Akitoshi; Kudo, Yoshiro; Yonehara, Tadashi; Watada, Masayuki; Sakaba, Hiroshi

    2009-01-01

    Current licensing practice in Japan consists of using conservative boundary and initial conditions(BIC), assumptions and analytical codes. The safety analyses for licensing purpose are inherently deterministic. Therefore, conservative BIC and assumptions, such as single failure, must be employed for the analyses. However, using conservative analytical codes are not considered essential. The standard committee of Atomic Energy Society of Japan(AESJ) has drawn up the standard for using best estimate codes for safety analyses in 2008 after three-years of discussions reflecting domestic and international recent findings. (author)

  11. Designing with objects object-oriented design patterns explained with stories from Harry Potter

    CERN Document Server

    Kak, Avinash C

    2014-01-01

     All code examples in the book are available for download on a companion site with resources for readers and instructors A refreshing alternative to the rather abstract and dry explanations of the  object-oriented design patterns in much of the existing literature on the subject In 24 chapters, Designing with Objects explains well-known design patterns by relating them to stories from the Harry Potter series

  12. What is a conservation actor?

    Directory of Open Access Journals (Sweden)

    Paul Jepson

    2011-01-01

    Full Text Available As a crisis-oriented discipline, conservation biology needs actions to understand the state of nature and thwart declines in biodiversity. Actors-traditionally individuals, institutions, and collectives-have been central to delivering such goals in practice. However, the definition of actors within the discipline has been narrow and their role in influencing conservation outcomes inadequately conceptualised. In this paper, we examine the question ′What is a conservation actor?′ Who or what creates the capacity to influence conservation values and actions? Drawing from theoretical developments in Actor-Network Theory and collective governance, we argue that the concept of an actor in conservation biology should be broadened to include non-humans, such as species and devices, because they have the agency and ability to influence project goals and outcomes. We illustrate this through four examples: the Asian elephant, International Union for Conservation of Nature red lists, the High Conservation Value approach, and an Integrated Conservation and Development Project. We argue that a broader conceptualisation of actors in conservation biology will produce new forms of understanding that could open up new areas of conservation research, enhance practice and draw attention to spheres of conservation activity that might require stronger oversight and governance.

  13. Entanglement-assisted quantum MDS codes constructed from negacyclic codes

    Science.gov (United States)

    Chen, Jianzhang; Huang, Yuanyuan; Feng, Chunhui; Chen, Riqing

    2017-12-01

    Recently, entanglement-assisted quantum codes have been constructed from cyclic codes by some scholars. However, how to determine the number of shared pairs required to construct entanglement-assisted quantum codes is not an easy work. In this paper, we propose a decomposition of the defining set of negacyclic codes. Based on this method, four families of entanglement-assisted quantum codes constructed in this paper satisfy the entanglement-assisted quantum Singleton bound, where the minimum distance satisfies q+1 ≤ d≤ n+2/2. Furthermore, we construct two families of entanglement-assisted quantum codes with maximal entanglement.

  14. TACO: a finite element heat transfer code

    International Nuclear Information System (INIS)

    Mason, W.E. Jr.

    1980-02-01

    TACO is a two-dimensional implicit finite element code for heat transfer analysis. It can perform both linear and nonlinear analyses and can be used to solve either transient or steady state problems. Either plane or axisymmetric geometries can be analyzed. TACO has the capability to handle time or temperature dependent material properties and materials may be either isotropic or orthotropic. A variety of time and temperature dependent loadings and boundary conditions are available including temperature, flux, convection, and radiation boundary conditions and internal heat generation. Additionally, TACO has some specialized features such as internal surface conditions (e.g., contact resistance), bulk nodes, enclosure radiation with view factor calculations, and chemical reactive kinetics. A user subprogram feature allows for any type of functional representation of any independent variable. A bandwidth and profile minimization option is also available in the code. Graphical representation of data generated by TACO is provided by a companion post-processor named POSTACO. The theory on which TACO is based is outlined, the capabilities of the code are explained, the input data required to perform an analysis with TACO are described. Some simple examples are provided to illustrate the use of the code

  15. Beyond conservation agriculture.

    Science.gov (United States)

    Giller, Ken E; Andersson, Jens A; Corbeels, Marc; Kirkegaard, John; Mortensen, David; Erenstein, Olaf; Vanlauwe, Bernard

    2015-01-01

    Global support for Conservation Agriculture (CA) as a pathway to Sustainable Intensification is strong. CA revolves around three principles: no-till (or minimal soil disturbance), soil cover, and crop rotation. The benefits arising from the ease of crop management, energy/cost/time savings, and soil and water conservation led to widespread adoption of CA, particularly on large farms in the Americas and Australia, where farmers harness the tools of modern science: highly-sophisticated machines, potent agrochemicals, and biotechnology. Over the past 10 years CA has been promoted among smallholder farmers in the (sub-) tropics, often with disappointing results. Growing evidence challenges the claims that CA increases crop yields and builds-up soil carbon although increased stability of crop yields in dry climates is evident. Our analyses suggest pragmatic adoption on larger mechanized farms, and limited uptake of CA by smallholder farmers in developing countries. We propose a rigorous, context-sensitive approach based on Systems Agronomy to analyze and explore sustainable intensification options, including the potential of CA. There is an urgent need to move beyond dogma and prescriptive approaches to provide soil and crop management options for farmers to enable the Sustainable Intensification of agriculture.

  16. Beyond conservation agriculture

    Science.gov (United States)

    Giller, Ken E.; Andersson, Jens A.; Corbeels, Marc; Kirkegaard, John; Mortensen, David; Erenstein, Olaf; Vanlauwe, Bernard

    2015-01-01

    Global support for Conservation Agriculture (CA) as a pathway to Sustainable Intensification is strong. CA revolves around three principles: no-till (or minimal soil disturbance), soil cover, and crop rotation. The benefits arising from the ease of crop management, energy/cost/time savings, and soil and water conservation led to widespread adoption of CA, particularly on large farms in the Americas and Australia, where farmers harness the tools of modern science: highly-sophisticated machines, potent agrochemicals, and biotechnology. Over the past 10 years CA has been promoted among smallholder farmers in the (sub-) tropics, often with disappointing results. Growing evidence challenges the claims that CA increases crop yields and builds-up soil carbon although increased stability of crop yields in dry climates is evident. Our analyses suggest pragmatic adoption on larger mechanized farms, and limited uptake of CA by smallholder farmers in developing countries. We propose a rigorous, context-sensitive approach based on Systems Agronomy to analyze and explore sustainable intensification options, including the potential of CA. There is an urgent need to move beyond dogma and prescriptive approaches to provide soil and crop management options for farmers to enable the Sustainable Intensification of agriculture. PMID:26579139

  17. Beyond Conservation Agriculture

    Directory of Open Access Journals (Sweden)

    Ken E Giller

    2015-10-01

    Full Text Available Global support for Conservation Agriculture (CA as a pathway to Sustainable Intensification is strong. CA revolves around three principles: no-till (or minimal soil disturbance, soil cover, and crop rotation. The benefits arising from the ease of crop management, energy/cost/time savings and soil and water conservation led to widespread adoption of CA, particularly on large farms in the Americas and Australia, where farmers harness the tools of modern science: highly-sophisticated machines, potent agrochemicals and biotechnology. Over the past ten years CA has been promoted among smallholder farmers in the (sub- tropics, often with disappointing results. Growing evidence challenges the claims that CA increases crop yields and builds-up soil carbon although increased stability of crop yields in dry climates is evident. Our analyses suggest pragmatic adoption on larger mechanized farms, and limited uptake of CA by smallholder farmers in developing countries. We propose a rigorous, context-sensitive approach based on Systems Agronomy to analyze and explore sustainable intensification options, including the potential of CA. There is an urgent need to move beyond dogma and prescriptive approaches to provide soil and crop management options for farmers to enable the Sustainable Intensification of agriculture.

  18. Selling energy conservation.

    Science.gov (United States)

    Hinrichsen, D

    1995-01-01

    This article concerns the Organization of the Petroleum Exporting Countries (OPEC) crisis and its impact on energy efficiency measures in the US. In 1985, when the OPEC collapsed, the US government had avoided the need to construct 350 gigawatts of new electric capacity. The most successful efficiency improvements, especially in household appliances and equipment, lighting and tightened energy efficiency standards in new buildings, resulted from the OPEC event. The real innovation of that time was the change in profit rules for utilities. This revolution and the way some US utilities view energy have not caught on elsewhere. Despite the initiative toward improving energy efficiency in homes, offices and industries, the change has been slow. Partly to blame are the big development banks, which pointed out that short-term conservation and efficiency measures could save at least 15% of the total energy demand without the need for major investment. The benefits of energy conservation was shown during the oil shock when per capita energy consumption fell by 5% in the member states of the Organization of Economic Cooperation and Development, while the per capita gross domestic product grew by a third. There has been a decrease in energy expenditure worldwide, and the scope for further energy savings is enormous, but governments need to recognize and seize the opportunity.

  19. Lyme disease and conservation

    Science.gov (United States)

    Ginsberg, H.

    1994-01-01

    Lyme disease is a tick-borne illness that is wide-spread in North America, especially in the northeastern and northcentral United States. This disease could negatively influence efforts to conserve natural populations in two ways: (1) the disease could directly affect wild animal health; and (2) tick control efforts could adversely affect natural populations and communities. Lyme disease affects several domestic animals, but symptoms have been reported in only a few wild species. Direct effects of Lyme disease on wild animal populations have not been reported, but the disease should be considered as a possible cause in cases of unexplained population declines in endemic areas. Methods available to manage ticks and Lyme disease include human self-protection techniques, manipulation of habitats and hosts species populations, biological control, and pesticide applications. The diversity of available techniques allows selection of approaches to minimize environmental effects by (1) emphasizing personal protection techniques, (2) carefully targeting management efforts to maximize efficiency, and (3) integrating environmentally benign techniques to improve management while avoiding broad-scale environmentally destructive approaches. The environmental effects of Lyme disease depend, to a large extent, on the methods chosen to minimize human exposure to infected ticks. Conservation biologists can help design tick management programs that effectively lower the incidence of human Lyme disease while simultaneously minimizing negative effects on natural populations.

  20. Intensity Conserving Spectral Fitting

    Science.gov (United States)

    Klimchuk, J. A.; Patsourakos, S.; Tripathi, D.

    2015-01-01

    The detailed shapes of spectral line profiles provide valuable information about the emitting plasma, especially when the plasma contains an unresolved mixture of velocities, temperatures, and densities. As a result of finite spectral resolution, the intensity measured by a spectrometer is the average intensity across a wavelength bin of non-zero size. It is assigned to the wavelength position at the center of the bin. However, the actual intensity at that discrete position will be different if the profile is curved, as it invariably is. Standard fitting routines (spline, Gaussian, etc.) do not account for this difference, and this can result in significant errors when making sensitive measurements. Detection of asymmetries in solar coronal emission lines is one example. Removal of line blends is another. We have developed an iterative procedure that corrects for this effect. It can be used with any fitting function, but we employ a cubic spline in a new analysis routine called Intensity Conserving Spline Interpolation (ICSI). As the name implies, it conserves the observed intensity within each wavelength bin, which ordinary fits do not. Given the rapid convergence, speed of computation, and ease of use, we suggest that ICSI be made a standard component of the processing pipeline for spectroscopic data.

  1. Efficient convolutional sparse coding

    Science.gov (United States)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  2. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off......-the-shelf hardware is less reliable than the dedicated network elements used in conventional cellular deployments. The typical solution for this problem is to duplicate network functions across geographically distributed hardware in order to ensure diversity. In contrast, this letter proposes to leverage channel...... coding in order to enhance the robustness on NFV to hardware failure. The proposed approach targets the network function of uplink channel decoding, and builds on the algebraic structure of the encoded data frames in order to perform in-network coding on the signals to be processed at different servers...

  3. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  4. 3D code for simulations of fluid flows

    International Nuclear Information System (INIS)

    Skandera, D.

    2004-01-01

    In this paper, a present status in the development of the new numerical code is reported. The code is considered for simulations of fluid flows. The finite volume approach is adopted for solving standard fluid equations. They are treated in a conservative form to ensure a correct conservation of fluid quantities. Thus, a nonlinear hyperbolic system of conservation laws is numerically solved. The code uses the Eulerian description of the fluid and is designed as a high order central numerical scheme. The central approach employs no (approximate) Riemann solver and is less computational expensive. The high order WENO strategy is adopted in the reconstruction step to achieve results comparable with more accurate Riemann solvers. A combination of the central approach with an iterative solving of a local Riemann problem is tested and behaviour of such numerical flux is reported. An extension to three dimensions is implemented using a dimension by dimension approach, hence, no complicated dimensional splitting need to be introduced. The code is fully parallelized with the MPI library. Several standard hydrodynamic tests in one, two and three dimensions were performed and their results are presented. (author)

  5. Oil and gas conservation in Saskatchewan

    International Nuclear Information System (INIS)

    Sereda, M.A.

    1997-01-01

    The Saskatchewan's Oil and Gas Conservation Act provides legislative authority for the Oil and Gas Conservation Regulations, 1985. The main purposes of the Act are to maximize oil and gas recovery, to allow each owner the opportunity of obtaining his share of oil or gas and to protect the environment and prevent waste. The document under review described how this legislative intent is fulfilled through the spacing of wells, the setting of allowables, and approval of waterflood and enhanced recovery projects, while considering equitable drainage of oil and gas. Specific topics dealt with include: vertical well spacing, infill drilling, off-target drilling, horizontal well spacing, and allowables. The concepts of voluntary and statutory pooling as well as voluntary and statutory unitization were explained. Examples of waterflood and enhanced oil recovery projects were provided. The regulation relating to oil and gas conservation were first implemented in 1952 and evolved to their present form through a series of changes and amendments. The most significant changes to the regulations were made in 1991 when horizontal drilling needed to be accommodated. 1 tab

  6. Computer code FIT

    International Nuclear Information System (INIS)

    Rohmann, D.; Koehler, T.

    1987-02-01

    This is a description of the computer code FIT, written in FORTRAN-77 for a PDP 11/34. FIT is an interactive program to decude position, width and intensity of lines of X-ray spectra (max. length of 4K channels). The lines (max. 30 lines per fit) may have Gauss- or Voigt-profile, as well as exponential tails. Spectrum and fit can be displayed on a Tektronix terminal. (orig.) [de

  7. Discrete Sparse Coding.

    Science.gov (United States)

    Exarchakis, Georgios; Lücke, Jörg

    2017-11-01

    Sparse coding algorithms with continuous latent variables have been the subject of a large number of studies. However, discrete latent spaces for sparse coding have been largely ignored. In this work, we study sparse coding with latents described by discrete instead of continuous prior distributions. We consider the general case in which the latents (while being sparse) can take on any value of a finite set of possible values and in which we learn the prior probability of any value from data. This approach can be applied to any data generated by discrete causes, and it can be applied as an approximation of continuous causes. As the prior probabilities are learned, the approach then allows for estimating the prior shape without assuming specific functional forms. To efficiently train the parameters of our probabilistic generative model, we apply a truncated expectation-maximization approach (expectation truncation) that we modify to work with a general discrete prior. We evaluate the performance of the algorithm by applying it to a variety of tasks: (1) we use artificial data to verify that the algorithm can recover the generating parameters from a random initialization, (2) use image patches of natural images and discuss the role of the prior for the extraction of image components, (3) use extracellular recordings of neurons to present a novel method of analysis for spiking neurons that includes an intuitive discretization strategy, and (4) apply the algorithm on the task of encoding audio waveforms of human speech. The diverse set of numerical experiments presented in this letter suggests that discrete sparse coding algorithms can scale efficiently to work with realistic data sets and provide novel statistical quantities to describe the structure of the data.

  8. Code of Practice

    International Nuclear Information System (INIS)

    Doyle, Colin; Hone, Christopher; Nowlan, N.V.

    1984-05-01

    This Code of Practice introduces accepted safety procedures associated with the use of alpha, beta, gamma and X-radiation in secondary schools (pupils aged 12 to 18) in Ireland, and summarises good practice and procedures as they apply to radiation protection. Typical dose rates at various distances from sealed sources are quoted, and simplified equations are used to demonstrate dose and shielding calculations. The regulatory aspects of radiation protection are outlined, and references to statutory documents are given

  9. Tokamak simulation code manual

    International Nuclear Information System (INIS)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs

  10. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  11. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, transparency, neutrality, impartiality, effectiveness, accountability, and legality. The normative context of public administration, as expressed in codes, seems to ignore the New Public Management and Reinventing Government reform movements....

  12. Paradox of Prescribing Late Chemotherapy: Oncologists Explain.

    Science.gov (United States)

    Bluhm, Minnie; Connell, Cathleen M; De Vries, Raymond G; Janz, Nancy K; Bickel, Kathleen E; Silveira, Maria J

    2016-12-01

    The value of chemotherapy for patients with cancer in the last weeks of life warrants examination. Late chemotherapy may not improve survival or quality of life but typically precludes hospice enrollment and may result in additional symptoms, increased use of other aggressive treatments, and worsening quality of life. Few studies have explored oncologists' rationales for administering chemotherapy near death. This study examines the self-reported factors that influence oncologists' decisions about late chemotherapy. In-depth individual interviews were conducted with 17 oncologists through a semistructured interview guide. Interviews were audio recorded and transcribed verbatim. Transcripts were coded and analyzed using conventional content analysis, a qualitative method that allows the detection and analysis of patterns in the data. Clinical factors take priority in determining late chemotherapy decisions when clear treatment choices exist. When clinical factors are ambiguous, emotion becomes a highly salient influence. Oncologists view late chemotherapy to be patient driven and use it to palliate emotional distress and maintain patient hope even when physical benefit is unexpected. Oncologists experience unique and difficult challenges when caring for dying patients, including emotionally draining communication, overwhelming responsibility for life/death, limitations of oncology to heal, and prognostic uncertainty. These challenges are also eased by offering late chemotherapy. The findings reveal a nuanced understanding of why oncologists find it difficult to refuse chemotherapy treatment for patients near death. Optimal end-of-life treatment decisions require supportive interventions and system change, both of which must take into account the challenges oncologists face.

  13. The role of the uncertainty in code development

    Energy Technology Data Exchange (ETDEWEB)

    Barre, F. [CEA-Grenoble (France)

    1997-07-01

    From a general point of view, all the results of a calculation should be given with their uncertainty. It is of most importance in nuclear safety where sizing of the safety systems, therefore protection of the population and the environment essentially depends on the calculation results. Until these last years, the safety analysis was performed with conservative tools. Two types of critics can be made. Firstly, conservative margins can be too large and it may be possible to reduce the cost of the plant or its operation with a best estimate approach. Secondly, some of the conservative hypotheses may not really conservative in the full range of physical events which can occur during an accident. Simpson gives an interesting example: in some cases, the majoration of the residual power during a small break LOCA can lead to an overprediction of the swell level and thus of an overprediction of the core cooling, which is opposite to a conservative prediction. A last question is: does the accumulation of conservative hypotheses for a problem always give a conservative result? The two phase flow physics, mainly dealing with situation of mechanical and thermal non-equilibrium, is too much complicated to answer these questions with a simple engineer judgement. The objective of this paper is to make a review of the quantification of the uncertainties which can be made during code development and validation.

  14. The role of the uncertainty in code development

    International Nuclear Information System (INIS)

    Barre, F.

    1997-01-01

    From a general point of view, all the results of a calculation should be given with their uncertainty. It is of most importance in nuclear safety where sizing of the safety systems, therefore protection of the population and the environment essentially depends on the calculation results. Until these last years, the safety analysis was performed with conservative tools. Two types of critics can be made. Firstly, conservative margins can be too large and it may be possible to reduce the cost of the plant or its operation with a best estimate approach. Secondly, some of the conservative hypotheses may not really conservative in the full range of physical events which can occur during an accident. Simpson gives an interesting example: in some cases, the majoration of the residual power during a small break LOCA can lead to an overprediction of the swell level and thus of an overprediction of the core cooling, which is opposite to a conservative prediction. A last question is: does the accumulation of conservative hypotheses for a problem always give a conservative result? The two phase flow physics, mainly dealing with situation of mechanical and thermal non-equilibrium, is too much complicated to answer these questions with a simple engineer judgement. The objective of this paper is to make a review of the quantification of the uncertainties which can be made during code development and validation

  15. Orthopedics coding and funding.

    Science.gov (United States)

    Baron, S; Duclos, C; Thoreux, P

    2014-02-01

    The French tarification à l'activité (T2A) prospective payment system is a financial system in which a health-care institution's resources are based on performed activity. Activity is described via the PMSI medical information system (programme de médicalisation du système d'information). The PMSI classifies hospital cases by clinical and economic categories known as diagnosis-related groups (DRG), each with an associated price tag. Coding a hospital case involves giving as realistic a description as possible so as to categorize it in the right DRG and thus ensure appropriate payment. For this, it is essential to understand what determines the pricing of inpatient stay: namely, the code for the surgical procedure, the patient's principal diagnosis (reason for admission), codes for comorbidities (everything that adds to management burden), and the management of the length of inpatient stay. The PMSI is used to analyze the institution's activity and dynamism: change on previous year, relation to target, and comparison with competing institutions based on indicators such as the mean length of stay performance indicator (MLS PI). The T2A system improves overall care efficiency. Quality of care, however, is not presently taken account of in the payment made to the institution, as there are no indicators for this; work needs to be done on this topic. Copyright © 2014. Published by Elsevier Masson SAS.

  16. Code Modernization of VPIC

    Science.gov (United States)

    Bird, Robert; Nystrom, David; Albright, Brian

    2017-10-01

    The ability of scientific simulations to effectively deliver performant computation is increasingly being challenged by successive generations of high-performance computing architectures. Code development to support efficient computation on these modern architectures is both expensive, and highly complex; if it is approached without due care, it may also not be directly transferable between subsequent hardware generations. Previous works have discussed techniques to support the process of adapting a legacy code for modern hardware generations, but despite the breakthroughs in the areas of mini-app development, portable-performance, and cache oblivious algorithms the problem still remains largely unsolved. In this work we demonstrate how a focus on platform agnostic modern code-development can be applied to Particle-in-Cell (PIC) simulations to facilitate effective scientific delivery. This work builds directly on our previous work optimizing VPIC, in which we replaced intrinsic based vectorisation with compile generated auto-vectorization to improve the performance and portability of VPIC. In this work we present the use of a specialized SIMD queue for processing some particle operations, and also preview a GPU capable OpenMP variant of VPIC. Finally we include a lessons learnt. Work performed under the auspices of the U.S. Dept. of Energy by the Los Alamos National Security, LLC Los Alamos National Laboratory under contract DE-AC52-06NA25396 and supported by the LANL LDRD program.

  17. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  18. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L.; Hodge, S.A.; Hyman, C.R.; Sanders, R.L.

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  19. MCOR - Monte Carlo depletion code for reference LWR calculations

    Energy Technology Data Exchange (ETDEWEB)

    Puente Espel, Federico, E-mail: fup104@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Tippayakul, Chanatip, E-mail: cut110@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Ivanov, Kostadin, E-mail: kni1@psu.edu [Department of Mechanical and Nuclear Engineering, Pennsylvania State University (United States); Misu, Stefan, E-mail: Stefan.Misu@areva.com [AREVA, AREVA NP GmbH, Erlangen (Germany)

    2011-04-15

    , several interesting studies performed with MCOR are explained; its validation against MONTEBURNS, OCTOPUS and TRIPOLI-PEPIN; sensitivity studies with different voids and cross-section libraries; detailed comparison against measurement. Finally, the MCOR is used as a reference tool for benchmarking deterministic codes on the example of qualification of the spectral codes (APOLLO2-A and CASMO-4).

  20. MCOR - Monte Carlo depletion code for reference LWR calculations

    International Nuclear Information System (INIS)

    Puente Espel, Federico; Tippayakul, Chanatip; Ivanov, Kostadin; Misu, Stefan

    2011-01-01

    . Additionally, several interesting studies performed with MCOR are explained; its validation against MONTEBURNS, OCTOPUS and TRIPOLI-PEPIN; sensitivity studies with different voids and cross-section libraries; detailed comparison against measurement. Finally, the MCOR is used as a reference tool for benchmarking deterministic codes on the example of qualification of the spectral codes (APOLLO2-A and CASMO-4).