WorldWideScience

Sample records for code ifa-432 aecl

  1. New capabilities of the lattice code WIMS-AECL

    International Nuclear Information System (INIS)

    Altiparmakov, Dimitar

    2008-01-01

    The lattice code WIMS-AECL has been restructured and rewritten in Fortran 95 in order to increase the accuracy of its responses and extend its capabilities. Significant changes of computing algorithms have been made in the following two areas: geometric calculations and resonance self-shielding. Among various geometry enhancements, the code is no longer restricted to deal with single lattice cell problems. The multi-cell capability allows modelling of various lattice structures such as checkerboard lattices, a de-fuelled channel, and core-reflector interface problems. The new resonance method performs distributed resonance self-shielding including the skin effect. This paper describes the main code changes and presents selected code verification results. (authors)

  2. Sensitivity analysis on various parameters for lattice analysis of DUPIC fuel with WIMS-AECL code

    Energy Technology Data Exchange (ETDEWEB)

    Roh, Gyu Hong; Choi, Hang Bok; Park, Jee Won [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1997-12-31

    The code WIMS-AECL has been used for the lattice analysis of DUPIC fuel. The lattice parameters calculated by the code is sensitive to the choice of number of parameters, such as the number of tracking lines, number of condensed groups, mesh spacing in the moderator region, other parameters vital to the calculation of probabilities and burnup analysis. We have studied this sensitivity with respect to these parameters and recommend their proper values which are necessary for carrying out the lattice analysis of DUPIC fuel.

  3. AECL present and future

    International Nuclear Information System (INIS)

    Foster, J.S.

    The history and present activities of the Crown corporation AECL are described. AECL owns limited interests in nuclear power plants and a Manitoba transmission system. AECL is the world's foremost producer of heavy water, and exports CANDU type reactors and radiation processing equipment. AECL backs up the Canadian nuclear power program wherever there is no conflict with private enterprise. (E.C.B.)

  4. AECL's new environmental initiatives

    International Nuclear Information System (INIS)

    McDonnell, F.N.

    1993-01-01

    AECL's research and development expenditures in environmental sciences and waste management technology are about $50 M per year. The main focus of these programs is the Nuclear Fuel Waste Management Program. This research is supplemented by activities in support of laboratory, Environmental Authority and internal waste management requirements, as well as provision of non-nuclear services. AECL intends to become more involved in performing environmental research and development with broader application. The goal is to achieve a relationship with Canadian industry that would involve a substantial portion of AECL's environmental research capabilities. The research directions and priorities of the resulting partnership would be set by the private sector in accordance with their needs and requirements. It is expected that the activities associated with this new environmental initiative will start small and grow in response to perceived needs. AECL is now increasing its non-nuclear research efforts by targeting those markets that appear most attractive. The thrust can be divided into three broad categories: environmental research, environmental services, and environmental products. (Author)

  5. Final report of the AECL/SKB Cigar Lake analog study. AECL research No. AECL-10851

    Energy Technology Data Exchange (ETDEWEB)

    Cramer, J.J.; Smellie, J.A.T. (eds.)

    1994-07-15

    AECL has conducted natural analog studies on the Cigar Lake uranium deposit in northern Saskatchewan since 1984 as part of the Canadian Nuclear Fuel Waste Management Program. This report provides background information and summarizes the results of the study, emphasizing the analog aspects and the implications of modelling activities related to the performance assessment of disposal concepts for nuclear fuel wastes developed in both Canada and Sweden. The study was undertaken to obtain an understanding of the process involved in, and the effects of, steady-state water-rock interaction and trace-element migration in and around the deposit, including paleo-migration processes since the deposit was formed. To achieve these objectives, databases and models were produced to evaluate the equilibrium thermodynamic codes and databases; the role of colloids, organics, and microbes in transport processes for radionuclides; and the stability of UO2 and the influence of radiolysis on UO2 dissolution and radionuclide migration.

  6. The AECL operator companion

    International Nuclear Information System (INIS)

    Lupton, L.R.; Anderson, L.L.; Basso, R.A.J.

    1989-11-01

    As CANDU plants become more complex, and are operated under tighter constraints and for longer periods between outages, plant operations staff will have to absorb more information to correctly and rapidly respond to upsets. A development program is underway at AECL to use expert systems and interactive media tools to assist operations staff of existing and future CANDU plants. The complete system for plant information access and display, on-line advice and diagnosis, and interactive operating procedures is called the Operator Companion. A prototype, consisting of operator consoles, expert systems and simulation modules in a distributed architecture, is currently being developed to demonstrate the concepts of the Operator Companion

  7. AECL annual review 1992 - 1993

    International Nuclear Information System (INIS)

    1993-01-01

    1992/93 was a pivotal year for AECL, with the redirection of its strategic plan, the refocussing of its corporate mission, a change in its structural organization to meet new challenges, the contract with South Korea for Wolsong Units 3 and 4 and the Memorandum of Understanding with Saskatchewan. AECL looks forward to the next 12 months as a time of opportunity, confident in the knowledge that they possess the means to succeed. ills

  8. AECL research programs in chemistry

    International Nuclear Information System (INIS)

    Crocker, I.H.; Eastwood, T.A.; Smith, D.R.; Stewart, R.B.; Tomlinson, M.; Torgerson, D.F.

    1980-09-01

    Fundamental or underlying research in chemistry is being done in AECL laboratories to further the understanding of processes involved in current nuclear energy systems and maintain an awareness of progress at the frontiers of chemical research so that new advances can be turned to advantage in future AECL endeavours. The report introduces the current research topics and describes them briefly under the following headings: radiation chemistry, isotope separation, high temperature solution chemistry, fuel reprocessing chemistry, and analytical chemistry. (auth)

  9. AECL's reliability and maintainability program

    International Nuclear Information System (INIS)

    Wolfe, W.A.; Nieuwhof, G.W.E.

    1976-05-01

    AECL's reliability and maintainability program for nuclear generating stations is described. How the various resources of the company are organized to design and construct stations that operate reliably and safely is shown. Reliability and maintainability includes not only special mathematically oriented techniques, but also the technical skills and organizational abilities of the company. (author)

  10. Hydrogen recombiner development at AECL

    International Nuclear Information System (INIS)

    Dewit, W.A.; Koroll, G.W.; Loesel Sitar, J.; Graham, W.R.C.

    1997-01-01

    Catalytic recombiners have been developed at AECL for the purpose of hydrogen removal in post-accident nuclear containment buildings. The recombiners are based on a particular catalyst designed by AECL which has extraordinary resistance to fouling from water and water vapour and a large thermodynamic range of operation. The catalysts were developed, originally, for the purpose of heavy water manufacturing by way of a catalytic exchange process. Application of these catalyst materials in recombiners for containment applications began in the late 1980's. The first application was a passive recombiner, qualified for use in control of radiolytic hydrogen in the headspace of a pool-type experimental reactor of AECL design in 1988. The passive, or natural convection recombiner concept has continued development to commercial stage for application in power reactor containments. This paper reviews the AECL recombiner development, describes the current model and shows results from tests of full-scale recombiners in the Large Scale Vented Combustion Test Facility at AECL-WL. The AECL recombiner is designed for compactness and ease of engineering into containment. The design is a simple, open-ended rectangular enclosure with catalyst elements arranged inside to promote optimum convective flow driven by heat of recombination at the catalyst surface. Self start, as evidenced by catalyst heating and initiation of flow, is achieved in less than 1% hydrogen, with available oxygen, at room temperature and 100% relative humidity. This low temperature start-up in condensing atmospheres is viewed as the most challenging condition for wet-proofing effectiveness. Cold start-up is a vital performance requirement in containments, such as CANDU, where engineered air-cooling systems are operating and where long-term hydrogen control is required, after containment atmospheres have cooled. Once started, the removal capacity scales linearly with the inlet cross-section area and the partial

  11. Analysis of flow-induced vibration of heat exchanger and steam generator tube bundles using the AECL computer code PIPEAU-2

    International Nuclear Information System (INIS)

    Gorman, D.J.

    1983-12-01

    PIPEAU-2 is a computer code developed at the Chalk River Nuclear Laboratories for the flow-induced vibration analysis of heat exchanger and steam generator tube bundles. It can perform this analysis for straight and 'U' tubes. All the theoretical work underlying the code is analytical rather than numerical in nature. Highly accurate evaluation of the free vibration frequencies and mode shapes is therefore obtained. Using the latest experimentally determined parameters available, the free vibration analysis is followed by a forced vibration analysis. Tube response due to fluid turbulence and vortex shedding is determined, as well as critical fluid velocity associated with fluid-elastic instability

  12. Radioactive waste management at AECL

    International Nuclear Information System (INIS)

    Gadsby, R.D.; Allan, C.J.

    2003-01-01

    AECL has maintained an active program in radioactive waste management since 1945, when the Canadian nuclear program commenced activities at the Chalk River Laboratories (CRL). Waste management activities have included operation of waste management storage and processing facilities at AECL's CRL and Whiteshell Laboratories (WL); operation of the Low Level Radioactive Waste Management Office on behalf of Natural Resources Canada to resolve historic radioactive waste problems (largely associated with radioactive ore recovery, transport and processing operations) that are the responsibility of the Federal Government; development of the concept and related technology for geological disposal of Canada's nuclear fuel waste; development of the Intrusion-Resistant Underground Structure (IRUS) disposal concept for low-level nuclear waste; development of dry storage technology for the interim storage of used fuel; and development and assessment of waste processing technology for application in CANDU nuclear power plants and at CRL and WL. Today these activities are continuing. In addition, AECL is: preparing to decommission the nuclear facilities at WL; carrying out a number of smaller decommissioning projects at CRL; putting in place projects to upgrade the low-level liquid waste processing capabilities of the CRL Waste Treatment Centre, recover and process highly active liquid wastes currently in storage, and recover, condition and improve the storage of selected fuel wastes currently stored in below-ground standpipes in the CRL waste management areas; and assessing options for additional remediation projects to improve the management of other wastes currently in storage and to address environmental contamination from past practices. (author)

  13. Development of advanced ceramics at AECL

    International Nuclear Information System (INIS)

    Palmer, B.J.F.; MacEwen, S.R.; Sawicka, B.D.; Hayward, P.J.; Sridhar, S.

    1986-12-01

    Atomic Energy of Canada Limited (AECL) has a long history of developing ceramics for nuclear fission and fusion applications. AECL is now applying its multidisciplinary materials R and D capabilities, including unique capabilities in ceramic processing and nondestructive evaluation, to develop advanced ceramic materials for commercial and industrial applications. This report provides an overview of the facilities and programs associated with the development of advanced ceramics at AECL

  14. AECL's mixed waste management program

    International Nuclear Information System (INIS)

    Peori, R.; Hulley, V.

    2006-01-01

    Every nuclear facility has it, they wish that they didn't but they have generated and do possess m ixed waste , and until now there has been no permanent disposition option; it has been for the most been simply maintained in interim storage. The nuclear industry has been responsibly developing permanent solutions for solid radioactive waste for over fifty years and for non-radioactive, chemically hazardous waste, for the last twenty years. Mixed waste (radioactive and chemically hazardous waste) however, because of its special, duo-hazard nature, has been a continuing challenge. The Hazardous Waste and Segregation Program (HW and SP) at AECL's CRL has, over the past ten years, been developing solutions to deal with their own in-house mixed waste and, as a result, have developed solutions that they would like to share with other generators within the nuclear industry. The main aim of this paper is to document and describe the early development of the solutions for both aqueous and organic liquid wastes and to advertise to other generators of this waste type how these solutions can be implemented to solve their mixed waste problems. Atomic Energy of Canada Limited (AECL) and in particular, CRL has been satisfactorily disposing of mixed waste for the last seven years. CRL has developed a program that not only disposes of mixed waste, but offers a full service mixed waste management program to customers within Canada (that could eventually include U.S. sites as well) that has developed the experience and expertise to evaluate and optimize current practices, dispose of legacy inventories, and set up an efficient segregation system to reduce and effectively manage, both the volumes and expense of, the ongoing generation of mixed waste for all generators of mixed waste. (author)

  15. The AECL reactor development programme

    International Nuclear Information System (INIS)

    Menelely, D.A.

    1997-01-01

    The modem CANDU-PHWR power reactor is the result of more than 50 years of evolutionary design development in Canada. It is one of only three commercially successful designs in the world to this date. The basis for future development is the CANDU 6 and CANDU 9 models. Four of the first type are operating and four more will go an line before the end of this decade. The CANDU 9 is a modernized single-unit version of the twelve large multi-unit plants operated by Ontario Hydro. All of these plants use proven technology which resulted from research, development, design construction, and operating experience over the past 25 years. Looking forward another 25 years, AECL plans to retain all of the essential features that distinguish today's CANDU reactors (heavy water moderation, on-power fuelling simple bundle design, horizontal fuel channels, etc.). The end product of the planned 25-year development program is more than a specific design - it is a concept which embodies advanced features expected from ongoing R and D programs. To carry out the evolutionary work we have selected seven main areas for development: Safety Technology, Fuel and Fuel Cycles, Fuel Channels, Systems and Components, Heavy Water and Tritium Information Technology, and Construction. There are three strategic measures of success for each of these work areas: improved economics, advanced fuel cycle utilization, and enhanced safety/plant robustness. The paper describes these work programs and the overall goals of each of them. (author)

  16. AECL annual review 1991-1992

    International Nuclear Information System (INIS)

    1992-01-01

    Formed as a Crown Corporation in 1952, AECL consists of two main divisions: AECL CANDU, based in Missisauga and Montreal, responsible for the development, design, marketing and project management of CANDU nuclear power projects; and AECL Research, with its head office in Ottawa and laboratories in Chalk River, Ontario and Pinawa, Manitoba, which supports CANDU and performs the research, development, demonstration and marketing required to apply nuclear sciences and their associated technologies. A strategic plan is under development, which will address the issues of market identification, key partnerships, securing the CANDU technology base, export financing and optimum business structure. In 1991/92 operating income was $16.4 million, up from $7.8 million in 1990/91. Good progress was made on goals to revitalize and upgrade AECL employee's skills and productivity. Key goals for AECL CANDU were: launching the Wolsung 2 reactor project in south Korea; closing the timing and product options for Wolsong 3 and 4; securing new business for Cernavoda 1; and attaining an agreement with either Saskatchewan Power Corp. or the New Brunswick Electric Power Commission regarding the timing of their CANDU 3 projects. Some success was achieved in the first three goals; Saskatchewan has chosen not to proceed with its CANDU 3 plant, but negotiations are continuing in New Brunswick. Key goals for AECL Research were: securing an advanced CANDU research and development program outside the CANDU Owners Group; Disposing of remaining non-nuclear technologies by spin-off, licensing or close-out; rationalizing commercial operations to generate increased revenues; and obtaining the Atomic Energy Control Board's approval of the NRU reactor assessment basis document. Progress was made on all goals

  17. Validation of WIMS-AECL/(MULTICELL)/RFSP system by the results of phase-B test at Wolsung-II unit

    Energy Technology Data Exchange (ETDEWEB)

    Hong, In Seob; Min, Byung Joo; Suk, Ho Chun [Korea Atomic Energy Research Institute, Taejon (Korea)

    1999-03-01

    The object of this study is the validation of WIMS-AECL lattice code which has been proposed for the substitution of POWDERPUFS-V(PPV) code. For the validation of this code, WIMS-AECL/(MULTICELL)/RFSP (lattice calculation/(incremental cross section calculation)/core calculation) code system has been used for the Post-Simulation of Phase-B physics Test at Wolsung-II unit. This code system had been used for the Wolsong-I and Point Lepraeu reactors, but after a few modifications of WIMS-AECL input values for Wolsong-II, the results of WIMS-AECL/RFSP code calculations are much improved to those of the old ones. Most of the results show good estimation except moderator temperature coefficient test. And the verification of this result must be done, which is one of the further work. 6 figs., 15 tabs. (Author)

  18. AECL annual report 1996-1997

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-07-01

    The 1996/1997 Annual Report of Atomic Energy of Canada Ltd. (AECL) is published and submitted to the Honourable member of parliament, Minister of Natural Resources. Included in this report are messages from marketing, commercial operations, product development, CANDU research, waste management, environmental management, financial review and copies of financial statements.

  19. Thermalhydraulic analyses of AECL's spent fuel dry storage systems

    International Nuclear Information System (INIS)

    Moffett, R.; Sabourin, G.

    1995-01-01

    This paper presents the validation of one- and three-dimensional thermalhydraulic models to be used to evaluate the thermal performance of AECL's MACSTOR and CANSTOR spent fuel dry storage modules. For this purpose, we compared analytical results to results of experiments conducted at AECL's Whiteshell Laboratories where mockups of the MACSTOR module and of a CANDU fuel storage basket were tested. The paper shows improvements to a simple one-dimensional model of the MACSTOR mock-up used previously. The replacement of constant heat transfer coefficients by free convection correlations, the addition of a storage cylinder model, and the addition of a radiation heat transfer model improved the predictions of concrete and storage cylinder temperatures. The paper also presents a new three-dimensional model for flow and heat transfer in the MACSTOR mock-up developed using CFDS-FLOW3D and -RAD3D computer programs. CFDS-FLOW3D code can estimate loss coefficients in complex geometry to an accuracy better than standard engineering correlations. The flow and temperature fields predicted using CFDS-FLOW3D are consistent with the measurements made during MACSTOR mock-up experiments (author). 5 refs., 4 tabs., 9 figs

  20. AECL's waste management and decommissioning program

    International Nuclear Information System (INIS)

    Kupferschmidt, W.C.H.

    2006-01-01

    Full text: Canada has developed significant expertise in radioactive waste management since the mid 1940s, when the Canadian nuclear program commenced activities at Chalk River Laboratories (CRL). Atomic Energy of Canada Limited (AECL), created as a Federal Crown Corporation in 1952, continues to manage wastes from these early days, as well as other radioactive wastes produced by Canadian hospitals, universities, industry, and operational wastes from AECL's current programs. AECL is also carrying out decommissioning of nuclear facilities and installations in Canada, predominantly at its own sites in Ontario (CRL, and the Douglas Point and Nuclear Power Demonstration prototype reactors), Manitoba (Whiteshell Laboratories) and Quebec (Gentilly-1 prototype reactor). At the CRL site, several major waste management enabling facilities are being developed to facilitate both the near- and long-term management of radioactive wastes. For example, the Liquid Waste Transfer and Storage Project is underway to recover and process highly radioactive liquid wastes, currently stored in underground tanks that, in some cases, date back to the initial operations of the site. This project will stabilize the wastes and place them in modern, monitored storage for subsequent solidification and disposal. Another initiative, the Fuel Packaging and Storage Project, has been initiated to recover and condition degraded used fuel that is currently stored in below-ground standpipes. The fuel will be then be stored in new facilities based on an adaptation of AECL's proven MACSTOR TM * dry storage system, originally designed for intermediate-term above-ground storage of used CANDU fuel bundles. Other commercial-based development work is underway to improve the storage density of the MACSTOR TM design, and to extend its application to interim storage of used LWR fuels as well as to the storage of intermediate-level radioactive waste arising from upcoming reactor refurbishment activities in Canada

  1. AECL's strategy for decommissioning Canadian nuclear facilities

    International Nuclear Information System (INIS)

    Joubert, W.M.; Pare, F.E.; Pratapagiri, G.

    1992-01-01

    The Canadian policy on decommissioning of nuclear facilities as defined in the Atomic Energy Control Act and Regulations is administered by the Atomic Energy Control Board (AECB), a Federal Government agency. It requires that these facilities be decommissioned according to approved plans which are to be developed by the owner of the nuclear facility during its early stages of design and to be refined during its operating life. In this regulatory environment, Atomic Energy of Canada (AECL) has developed a decommissioning strategy for power stations which consists of three distinctive phases. After presenting AECL's decommissioning philosophy, its foundations are explained and it is described how it has and soon will be applied to various facilities. A brief summary is provided of the experience gained up to date on the implementation of this strategy. (author) 3 figs.; 1 tab

  2. AECL's support to operating plants world wide

    International Nuclear Information System (INIS)

    Azeez, S.; Kakaria, B.K.; Hinchley, E.M.

    1998-01-01

    Through their operating records, CANDU reactors have established themselves as a successful and cost-effective source of electricity in Canada and abroad. They have proven to be safe, reliable and economical. A variety of factors have contributed to the enviable CANDU record, such as a sound design based on proven principles supported by effective development programs, along with dedicated plant owners committed to excellence in safely maintaining and operating their plants. Atomic Energy of Canada Limited (AECL), the CANDU designer, has continuously maintained a close relationship with owners/operators of the plants in Canada, Argentina, Romania and South Korea. AECL and the plant operators have all benefited from this strengthening relationship by sharing experience and information. CANDU plant operators have been required to respond decisively to the economic realities of downward cost pressures and deregulation. Operating, Maintenance and Administration (OM and A) costs are being given a new focus as plant owners review each cost element to improve the economic returns from their investments. Amongst the three main OM and A constituents, plant maintenance costs are the most variable and have the largest influence on effective plant operations. The correlation between effective plant maintenance and high capacity factors shows clearly the importance of proactive maintenance planning to reduce the frequency and duration of forced plant outages and their negative impacts on plant economics. This paper describes the management processes and organizational structures m AECL that support plant operations and maintenance in operating CANDU plants with cost effective products and services. (author)

  3. An overview of the INTERA simulators, SWIFT-AECL/PTC and SWIFT-AECL/SSP, for waste injection, flow and transport

    International Nuclear Information System (INIS)

    1982-07-01

    Two state-of-the-art computer codes are presented. SWIFT-AECL/PTC permits a coupled, three-dimensional analysis of four transient processes: fluid flow, heat transport, brine migration, and the migration of radionuclide chains. The other code, SWIFT-AECL/SSP, has been simplified in order to most efficiently solve problems of steady-state flow and transient-state radionuclide transport. It, too, is based on a three-dimensional finite-difference implementation. The mathematical formulations of the two models are emphasized. Transport equations, auxiliary equations, and six submodels are presented as a means of introducing the two models. These equations may be applied to fractured media using both single- and dual-porosity conceptualizations. Furthermore, because of the generality of these equations, the two SWIFT codes have been applied in a variety of areas, including evaluation of concepts for nuclear waste disposal (in bedded and domed salt, basalt, and crystalline rock), industrial waste injection, solution mining, land-fill contaminant migration, and hydrogeological well-test interpretation

  4. Modelling of CANDU reactivity devices with WIMS-AECL/MULTICELL and superhomogenization

    International Nuclear Information System (INIS)

    Donnelly, J.V.; Min, B.J.; Tsang, K.

    1996-01-01

    A method for the calculation of the three-dimensional neutron flux distribution in and around CANDU reactor fuel channels and reactivity control devices has been developed. The method is based on one- and two-dimensional transport calculations with the WIMS-AECL lattice cell code, SPH homogenization, and three-dimensional flux calculations with finite-difference diffusion theory using the MULTICELL code. Numerical verification tests have shown good agreement with more rigorous calculations, and validation tests indicate good agreement with measured device properties. (author)

  5. A bibliography of AECL publications on environmental research

    International Nuclear Information System (INIS)

    Hawley, N.J.

    1978-12-01

    Publications in the open literature on environmental research performed by AECL personnel are listed chronologically with the first entry dated 1951. It is intended that the bibliography should be brought up to date yearly. (author)

  6. AECL IMPELA electron beam industrial irradiators

    International Nuclear Information System (INIS)

    Labrie, J.P.; Drewell, N.H.; Ebrahim, N.A.; Lawrence, C.B.; Mason, V.A.; Ungrin, J.; White, B.F.

    1989-01-01

    A family of industrial irradiators is being developed by AECL to cover an electron-beam energy range from 5 to 18 MeV at beam powers between 20 and 250 kW. The IMPELA family of irradiators is designed for push button, reliable operation. The major irradiator components are modular, allowing for later upgrades to meet increased demands in either electron or X-ray mode. Interface between the control system, irradiator availability and dose quality assurance is in conformance with the most demanding specifications. The IMPELA irradiators use a klystron-driven, standing-wave, L-band accelerator structure with direct injection from a rugged, triode electron gun. Direct control of the accelerating field during the beam pulse ensures constant output beam energy, independent of beam power. The first member of the family, the IMPELA 10/50 (10 MeV, 50 kW), is in the final stages of assembly at Chalk River Nuclear Laboratories. The IMPELA 10/50 is constructed around a 3.25 m long, high-power-capacity accelerator structure operated at a duty factor of 5%. Beam loading exceeds 60%. The rf power is provided by a 2 MW/150 kW modulated-anode klystron protected from load mismatches by a circulator. This prototype will be used to demonstrate the reliability and dose uniformity targets of the IMPELA family. Full beam operation of the IMPELA 10/50 is scheduled for early 1989. (orig.)

  7. The AECL study for an intense neutron - generator (technical details)

    International Nuclear Information System (INIS)

    Bartholomew, G.A.; Tunnicliffe, P.R.

    1966-01-01

    The AECL study for an intense neutron-generator has been in progress for two years. Recently the scientific and technical details and the conceptual designs were compiled in a report supporting proposals addressed to AECL's Board of Directors for further work. The compilation is being issued in this form to permit further discussion of the technical aspects. However readers are asked to appreciate that it was written primarily for an AECL audience, and specifically that those chapters giving tentative information about costs, the rate of investment and similar items have been omitted or modified, many references have been made to interim internal reports in order to complete the local documentation, but these references do not imply that the reports themselves can be made generally available. (author)

  8. The AECL study for an intense neutron - generator (technical details)

    Energy Technology Data Exchange (ETDEWEB)

    Bartholomew, G.A.; Tunnicliffe, P.R

    1966-07-01

    The AECL study for an intense neutron-generator has been in progress for two years. Recently the scientific and technical details and the conceptual designs were compiled in a report supporting proposals addressed to AECL's Board of Directors for further work. The compilation is being issued in this form to permit further discussion of the technical aspects. However readers are asked to appreciate that it was written primarily for an AECL audience, and specifically that those chapters giving tentative information about costs, the rate of investment and similar items have been omitted or modified, many references have been made to interim internal reports in order to complete the local documentation, but these references do not imply that the reports themselves can be made generally available. (author)

  9. Expert panel on hydrogeology; report to AECL Research (1992)

    International Nuclear Information System (INIS)

    Domenico, P.A.; Grisak, G.E.; Schwartz, F.W.

    1995-02-01

    In 1992 AECL Research convened a panel of external hydrogeological experts consisting of P.A. Domenico, G.E. Grisak, and F.W. Schwartz, to review AECL's proposed approach to siting a geological repository in the rocks of the Canadian Shield for the safe disposal of Canada's nuclear fuel wastes. In particular the panel was asked to provide its opinion on 1) the soundness of the technical approach developed to characterize the groundwater flow systems for the purpose of selecting a location for a disposal vault, 2) the validity and effectiveness of the geological case study used to demonstrate the performance assessment methodology based on the hydrogeological conditions observed at the Whiteshell Research Area, and 3) the adequacy of the hydrogeological information that AECL proposes to use in its Environmental Impact Statement (EIS) of the disposal concept. This report presents the findings, conclusions and recommendations of the hydrogeology review panel. The report was submitted to AECL Research in 1992 December. (author). 24 refs., 2 tabs., 4 figs

  10. The year 2000 (Y2k) Programme at AECL

    International Nuclear Information System (INIS)

    Pauksens, J.; Jung, D.

    1998-01-01

    In the nuclear industry we make, in total, very extensive use of digital computers and equipment. While use of dates in our application may not be quite so extensive as in other businesses such as banking or insurance, dates are nonetheless employed, and are important in a variety of applications. Furthermore, date-related problems can sometimes propagate into overall system failures or computer crashes. Digital system or digital infrastructure failure can have serious potential consequences in a power plant, utility, or engineering design office. This in turn can have potential impact on public safety or the reliability of power production and delivery of electrical power to the public. A concerted effort is needed, and is underway by nuclear design organizations, and the nuclear utilities in order to identify and fix or avoid the problems in the short time that remains between now and the Year 2000. AECL have a substantial Year 2000 programme underway, addressing both the infrastructure systems at AECL, and AECL's products and services. High priority is placed, in the programme, on assisting AECL's customers with the Year 2000 issue. The programme, and some of the lesson learned to date, are described in this paper. The relationship to equipment vendors' and customers' Year 2000 programs is explained, and the importance of Year 2000 programmes conducted by the customers, to address systems and equipment which are under their control, is highlighted. (authors)

  11. Controlled drill ampersand blast excavation at AECL's Underground Research Laboratory

    International Nuclear Information System (INIS)

    Kuzyk, G.W.; Onagi, D.P.; Thompson, P.M.

    1996-01-01

    A controlled drill and blast method has been developed and used to excavate the Underground Research Laboratory, a geotechnical facility constructed by Atomic Energy of Canada Limited (AECL) in crystalline rock. It has been demonstrated that the method can effectively reduce the excavation disturbed zone (EDZ) and is suitable for the construction of a used fuel disposal vault in the plutonic rock of the Canadian Shield

  12. The Atomic Energy of Canada Limited (AECL) employee health study

    International Nuclear Information System (INIS)

    Myers, D.K.; Werner, M.M.

    1985-01-01

    A preliminary examination of records relating to past Chalk River employees provides some reassurance that large numbers of cancer deaths that might be related to occupational radiation exposure do not exist in the groups of employees studied to the end of 1982. The lack of reliable information on deaths of ex-employees who left AECL for other employment prevented the inclusion of this group in this preliminary study. This information will presumably be obtained during the course of the more comprehensive Atomic Energy of Canada Ltd. employee health study. 6 refs

  13. AECL's research and development program in environmental science and technology

    International Nuclear Information System (INIS)

    Cornett, R.J.

    1998-07-01

    AECL's radiological research and development (R and D) program encompasses work on sources of radiation exposure, radionuclide transport through the environment and potential impacts on biota and on human health. The application of the radiation protection knowledge and technology developed in this program provides cradle-to-grave management for CANDU and related nuclear technologies. This document provides an overview of the Environmental Science and Technology (ES and T) program which is one of the technical areas of R and D within the radiological R and D program. The ES and T program uses science from three main areas: radiochemistry, mathematical modelling and environmental assessment. In addition to providing an overview of the program, this summary also gives specific examples of recent technical work in each of the three areas. These technical examples illustrate the applied nature of the ES and T program and the close coupling of the program to CANDU customer requirements. (author)

  14. Some highlights of research and development at AECL

    International Nuclear Information System (INIS)

    Langford, W.J.; Rae, H.K.

    1980-06-01

    The research and development programs of AECL have as their goal the strengthening of the knowledge and ability necessary to achieve national objectives in the field of nuclear energy. These objectives include a nuclear reactor system appropriate to Canada's industrial capabilities, now realized, and the extension of that system, through scientific and technological development, to serve the nation's needs for the forseeable future. The Company's programs are carefully integrated and focused to use the available funding to maximum advantage. The research facilities on which the program depends are among the best in the world, and support a full spectrum of research from fundamental nuclear physics to full-scale power reactor component irradiation and testing. In this report it has only been possible to high-light some important facets of the programs in each of the principal areas currently employing our energies. (auth)

  15. A study of the mortality of AECL employees. V

    International Nuclear Information System (INIS)

    Gribbin, M.A.; Howe, G.R.; Weeks, J.L.

    1992-09-01

    A study has been underway since 1980 on the mortality of past and present AECL employees. The study population consists of 13,491 persons, 9997 males and 3494 females, for a total of 262,403.5 person-years at risk. During the period 1950-1985, 1299 deaths occurred in this population. The number of female deaths (121) is too few for detailed analysis, but the 1178 deaths in the male population represent a useful basis for this study. The present report examines mortality patterns in the AECL cohort between 1950 and 1985 by comparing the observed mortality with that expected in the general population for three groups of workers: those with no exposure, those with up to 50 mSv, and those with more than 50 mSv. Comparisons among the three groups of employees are discussed. The number of deaths is fewer than would be expected on the basis of general population statistics for both males who were exposed to ionizing radiation and those who were not exposed. The findings were similar for the 'all cancer' and 'all other deaths' groupings. In the group of exposed males, elevated Standardized Mortality Ratios (SMRs) are seen for non-Hodgkin's lymphoma and for buccal cavity, rectum and rectosigmoid junction, and prostate cancers. There are elevated SMRs for lymphatic and myeloid leukemias and for large intestine, prostate, brain and biliary system cancers in the 'unexposed' male group. The number of cases identified in all of these cancers is small and the confidence intervals are wide, such that none of the elevated SMRs is statistically significant. The report compares the findings of this study with those of similar studies published in the past decade. (Author) (28 tabs., 33 refs., 2 figs.)

  16. Rationalization and future planning for AECL's research reactor capability

    International Nuclear Information System (INIS)

    Slater, J.B.

    1990-01-01

    AECL's research reactor capability has played a crucial role in the development of Canada's nuclear program. All essential concepts for the CANDU reactors were developed and tested in the NRX and NRU reactors, and in parallel, important contributions to basic physics were made. The technical feasibility of advanced fuel cycles and of the organic-cooled option for CANDU reactors were also demonstrated in the two reactors and the WR-1 reactor. In addition, an important and growing radio-isotope production industry was established and marketed on a world-wide basis. In 1984, however, it was recognized that a review and rationalization of the research reactor capability was required. The commercial success of the CANDU reactor system had reduced the scope and size of the required development program. Limited research and development funding and competition from other research facilities and programs, required that the scope be reduced to a support basis essential to maintain strategic capability. Currently, AECL, is part-way through this rationalization program and completion should be attained during 1992/93 when the MAPLE reactor is operational and decisions on NRX decommissioning will be made. A companion paper describes some of the unique operational and maintenance problems which have resulted from this program and the solutions which have been developed. Future planning must recognize the age of the NRU reactor (currently 32 years) and the need to plan for eventual replacement. Strategy is being developed and supporting studies include a full technical assessment of the NRU reactor and the required age-related upgrading program, evaluation of the performance characteristics and costs of potential future replacement reactors, particularly the advanced MAPLE concept, and opportunities for international co-operation in developing mutually supportive research programs

  17. AECL experience with low-level radioactive waste technologies

    International Nuclear Information System (INIS)

    Buckley, L.P.; Charlesworth, D.H.

    1988-08-01

    Atomic Energy of Canada Limited (AECL), as the Canadian government agency responsible for research and development of peaceful uses of nuclear energy, has had experience in handling a wide variety of radioactive wastes for over 40 years. Low-level radioactive waste (LLRW) is generated in Canada from nuclear fuel manufacturers and nuclear power facilities, from medical and industrial uses of radioisotopes and from research facilities. The technologies with which AECL has strength lie in the areas of processing, storage, disposal and safety assessment of LLRW. While compaction and incineration are the predominant methods practised for solid wastes, purification techniques and volume reduction methods are used for liquid wastes. The methods for processing continue to be developed to improve and increase the efficiency of operation and to accommodate the transition from storage of the waste to disposal. Site-specific studies and planning for a LLRW disposal repository to replace current storage facilities are well underway with in-service operation to begin in 1991. The waste will be disposed of in an intrusion-resistant underground structure designed to have a service life of over 500 years. Beyond this period of time the radioactivity in the waste will have decayed to innocuous levels. Safety assessments of LLRW disposal are performed with the aid of a series of interconnected mathematical models developed at Chalk River specifically to predict the movement of radionuclides through and away from the repository after its closure and the subsequent health effects of the released radionuclides on the public. The various technologies for dealing with radioactive wastes from their creation to disposal will be discussed. 14 refs

  18. AECL's underground research laboratory: technical achievements and lessons learned

    International Nuclear Information System (INIS)

    Ohta, M.M.; Chandler, N.A.

    1997-03-01

    During the development of the research program for the Canadian Nuclear Fuel Waste Management Program in the 1970's, the need for an underground facility was recognized. AECL constructed an Underground Research Laboratory (URL) for large-scale testing and in situ engineering and performance-assessment-related experiments on key aspects of deep geological disposal in a representative geological environment. Ale URL is a unique geotechnical research and development facility because it was constructed in a previously undisturbed portion of a granitic pluton that was well characterized before construction began, and because most of the shaft and experimental areas are below the water table. The specific areas of research, development and demonstration include surface and underground characterization; groundwater and solute transport; in situ rock stress conditions; temperature and time-dependent deformation and failure characteristics of rock; excavation techniques to minimize damage to surrounding rock and to ensure safe working conditions; and the performance of seals and backfills. This report traces the evolution of the URL and summarizes the technical achievements and lessons learned during its siting, design and construction, and operating phases over the last 18 years. (author)

  19. AECL's participation in the commissioning of Point Lepreau generating station unit 1

    International Nuclear Information System (INIS)

    Chawla, S.; Singh, K.; Yerramilli, S.

    1983-05-01

    Support from Atomic Energy of Canada Ltd. (AECL) to Point Lepreau during the commissioning program has been in the form of: seconded staff for commissioning program management, preparation of commissioning procedures, and hands-on commissioning of several systems; analysis of test results; engineering service for problem solving and modifications; design engineering for changes and additions; procurement of urgently-needed parts and materials; technological advice; review of operational limits; interpretation of design manuals and assistance with and preparation of submissions to regulatory authorities; and development of equipment and procedures for inspection and repairs. This, together with AECL's experience in the commissioning of other 600 MWe stations, Douglas Point and Ontario Hydro stations, provides AECL with a wide range of expertise for providing operating station support services for CANDU stations

  20. AECL's concept for the disposal of nuclear fuel waste and the importance of its implementation

    International Nuclear Information System (INIS)

    Allan, C.J.

    1993-07-01

    Since 1978, Canada has been investigating a concept for permanently dealing with the nuclear fuel waste from Canadian CANDU (Canada Deuterium Uranium) nuclear generating stations. The concept is based on disposing of the waste in a vault excavated 500 to 1000 m deep in intrusive igneous rock of the Canadian Shield. AECL Research will soon be submitting an environmental impact statement (EIS) on the concept for review by a Panel through the federal environmental assessment and review process (EARP). In accordance with AECL Research's mandate and in keeping with the detailed requirements of the review Panel, AECL Research has conducted extensive studies on a wide variety of technical and socio-economic issues associated with the concept. If the concept is accepted, we can and should continue our responsible approach and take the next steps towards constructing a disposal facility for Canada's used nuclear fuel waste

  1. Dosimetry results for AECL personnel involved in maintenance activities at off-shore CANDU stations

    International Nuclear Information System (INIS)

    Khaloo, R.

    1997-01-01

    Atomic Energy of Canada Limited (AECL) is intermittently involved in maintenance work on domestic and off-shore CANDU nuclear power plants. Maintenance activities, such as fuel-channel replacement (FCR), small-scale spacer location and relocation (SLARETTE) and primary-side steam-generator tube cleaning, require work in high-radiation fields. This may lead to appreciable radiation doses. AECL staff experience has been that these radiation doses accrue mostly from external gamma fields, with a minor internal dose component from the uptake of tritiated waste vapour. There are no significant uptakes of other radionuclides. AECL practice for SLARETTE and FCR work at off-shore CANDU stations has been to equip AECL personnel with 1 set of thermoluminescent dosimeters (TLDs) and 1 direct-reading personal alarming dosimeter (PAD). These TLDs are read at the Chalk River Laboratories of AECL. In addition, off-shore site radiation protection personnel issue AECL personnel with a TLD. This TLD is subsequently read at the off-shore site. Consequently, there are often three independent measurements of dose from external fields for AECL personnel. Internal dose assessments rely on off-shore radiation protection personnel. All off-shore CANDU stations use urine bioassay methods for tritiated water uptakes. Most off-shore CANDU sites also have lung or whole-body gamma spectrometry capabilities or both, which, if necessary, can be used to assess doses from uptakes of gamma-emitting airborne contaminants (e.g., from 60 Co, 95 Zr, 95 Nb, etc.). This paper discusses some internal and external dosimetry data for AECL personnel involved in recent FCR and SLARETTE work at off-shore CANDU stations. The data show that the whole-body dose contribution from uptake of tritiated heavy water is small. The data also show that three independent external dosimetry systems give dose results that are in relatively close agreement. Such information is invaluable in promoting confidence in the various

  2. Co-operative projects with AECL in the fields of hydrogeology and geochemistry

    International Nuclear Information System (INIS)

    1985-01-01

    The report covers collaborative study with Atomic Energy of Canada Limited on geological aspects of waste disposal in crystalline rocks. A field test of the sinusoidal hydraulic pressure pulse method was carried out at the URL site to try to define hydraulic properties of major horizontal fractures. The trials were generally successful and observable sine and square wave signals were transmitted. Owing to the limited scale of the programme, and some equipment problems, the results proved difficult to interpret, although the speed and flexibility of the method was demonstrated. A second aspect of collaboration was to be the field comparison of the AECL and NERC/BGS borehole geochemical probes. In the event, the AECL probe development programme was curtailed and a Swedish design selected for purchase. Effort thus switched to technical comparison of the SGAB probe with the NERC/BGS design. Since both are still at various development points the collaboration was limited to technical exchange. The results are presented. (author)

  3. AECL hot-cell facilities and post-irradiation examination services

    International Nuclear Information System (INIS)

    Schankula, M.H.; Plaice, E.L.; Woodworth, L.G.

    1998-04-01

    This paper presents an overview of the post-irradiation examination (PIE) services available at AECL's hot-cell facilities (HCF). The HCFs are used primarily to provide PIE support for operating CANDU power reactors in Canada and abroad, and for the examination of experimental fuel bundles and core components irradiated in research reactors at the Chalk River Laboratories (CRL) and off-shore. A variety of examinations and analyses are performed ranging from non-destructive visual and dimensional inspections to detailed optical and scanning electron microscopic examinations. Several hot cells are dedicated to mechanical property testing of structural materials and to determine the fitness-for-service of reactor core components. Facility upgrades and the development of innovative examination techniques continue to improve AECL's PIE capabilities. (author)

  4. AECL hot-cell facilities and post-irradiation examination services

    International Nuclear Information System (INIS)

    Schankula, M.H.; Plaice, E.L.; Woodworth, L.G.

    1995-01-01

    This paper presents an overview of the post-irradiation examination (PIE) services available at AECL's hot-cell facilities (HCF). The HCFs are used primarily to provide PIE support for operating CANDU power reactors in Canada and abroad, and for the examination of experimental fuel bundles and core components irradiated in research reactors at the Chalk River Laboratories (CRL) and off-shore. A variety of examinations and analysis are performed ranging from non-destructive visual and dimensional inspections to detailed optical and scanning electron microscopic examinations. Several hot cells are dedicated to mechanical property testing of structural materials and to determine the fitness-for-service of reactor core components. Facility upgrades and the development of innovative examination techniques continue to improve AECL's PIE capabilities. (author)

  5. Microbial analysis of the buffer/container experiment at AECL's underground research laboratory

    International Nuclear Information System (INIS)

    Stroes-Gascoyne, S.

    1996-07-01

    The Buffer/Container Experiment (BCE) was carried out at AECL's Underground Research Laboratory (URL) for 2.5 years to examine the in situ performance of compacted buffer material in a single emplacement borehole under vault-relevant conditions. During decommissioning of this experiment, numerous samples were taken for microbial analysis to determine if the naturally present microbial population in buffer material survived the conditions (i.e., compaction, heat and desiccation) in the BCE and to determine which group(s) of microorganisms would be dominant in such a simulated vault environment. Such knowledge will be very useful in assessing the potential effects of microbial activity on the concept for deep disposal of Canada's nuclear fuel waste, proposed by AECL. 46 refs., 31 tabs., 35 figs

  6. PEAR code review

    International Nuclear Information System (INIS)

    De Wit, R.; Jamieson, T.; Lord, M.; Lafortune, J.F.

    1997-07-01

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  7. Antibiotics from bacillus subtilis AECL90 - effect of trace elements and carbohydrates on antibiotic production

    International Nuclear Information System (INIS)

    Malik, M.A.; Shaukat, G.A.; Ahmed, M.S.

    1990-01-01

    Three types of antibiotics S, X and F characteristically bioactive against staphylococcic, xanthomonas and fungi are elaborated by Bacillus Subtilis AECL 69 when grown in molasses peptone malt extract sucrose. No antibiotic production was observed when molasses was omitted from the growth medium. A mineral salt mixture was devised that could replace molasses and restore the production of antibiotics. Influence of various carbohydrates on the production of antibiotics was also studied. Mannose and mannitol had inhibitory effect on the antibiotic production. (author)

  8. The use of HANDIDET{reg_sign} non-electric detonator assemblies to reduce blast-induced overpressure at AECL`s Underground Research Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Onagi, D.P.; Keith, S.G.; Kuzyk, G.W. [AECL, Pinawa, Manitoba (Canada). Underground Research Lab.; Proudfoot, D.F. [ICI Explosives Canada, North Delta, British Columbia (Canada)

    1996-12-01

    A number of aspects of the Canadian concept for nuclear fuel waste disposal are being assessed by Atomic Energy of Canada Limited (AECL) in a series of experiments at its Underground Research Laboratory (URL) near Lac du Bonnet, Manitoba, Canada. One of the major objectives of the work being carried out at the URL is to develop and evaluate the methods and technology to ensure safe, permanent disposal of Canada`s nuclear fuel waste. In 1994, AECL excavated access tunnels and a laboratory room for the Quarried Block Fracture Migration Experiment (QBFME) at the 240 Level of the URL. This facility will be used to study the transport of radionuclides in natural fractures in quarried blocks of granite under in-situ groundwater conditions. The experiment is being carried out under a cooperative agreement with the Japan Atomic Energy Research Institute. The excavation of the QBFME access tunnels and laboratory was carried out using controlled blasting techniques that minimized blast-induced overpressure which could have damaged or interrupted other ongoing experiments in the vicinity. The majority of the blasts used conventional long delay non-electric detonators but a number of blasts were carried out using HANDIDET 250/6000 non-electric long delay detonator assemblies and HTD{reg_sign} non-electric short delay trunkline detonator assemblies. The tunnel and laboratory excavation was monitored to determine the levels of blast-induced overpressure. This paper describes the blasting and monitoring results of the blasts using HANDIDET non-electric detonator assemblies and the effectiveness of these detonators in reducing blast-induced overpressure.

  9. Implementing the AECL decommissioning quality assurance program at the Chalk River and Whiteshell Laboratories

    International Nuclear Information System (INIS)

    Colotelo, C.A.; Attas, E.M.; Stephens, M.E.

    2006-01-01

    This paper describes the approach and progress in developing, implementing and maintaining a quality assurance (QA) program for decommissioning at the nuclear facilities managed by Atomic Energy of Canada Limited (AECL). Decommissioning activities conducted by AECL are varied in nature, so the QA program must provide adequate flexibility, while maintaining consistency with accepted quality standards. Well-written documentation adhering to the applicable decommissioning standards is a key factor. Manager commitment and input during the writing of the documentation are also important to ensure relevance of the QA program and effectiveness of implementation. Training in the use of the quality assurance plan and procedures is vital to the understanding of the QA program. Beyond the training aspect there is a need for the quality assurance program to be supported by a QA subject expert who is able to advise the group in implementing the Quality Program with consistency over the range of decommissioning work activities and to provide continual assessment of the quality assurance program for efficiency and effectiveness, with a concomitant continuous improvement process. (author)

  10. Decommissioning information management in decommissioning planning and operations at AECL (Ref 5054)

    International Nuclear Information System (INIS)

    Lemire, D.S.

    2006-01-01

    As the AECL Decommissioning program has grown over the past few years, particularly with regard to long-term planning, so has its need to manage the records and information required to support the program. The program encompasses a diverse variety of facilities, including prototype and research reactors, fuel processing facilities, research laboratories, waste processing facilities, buildings, structures, lands and waste storage areas, many of which have changed over time. The decommissioning program involves planning, assessing, monitoring and executing projects to decommission the facilities. The efficient and effective decommissioning planning, assessment, monitoring and execution for the facilities and projects are dependent on a sound information base, upon which decisions can be made. A vital part of this Information Base is the ongoing management of historical facility records, including decommissioning records, throughout the full life cycle of the facilities. This paper describes AECL's and particularly DP and O's approach to: 1) Establishing a decommissioning records and information framework, which identifies what records and information are relevant to decommissioning, prioritizing the decommissioning facilities, identifying sources of relevant information and providing a user-friendly, electronic, search and retrieval tool for facility information accessible to staff. 2) Systematically, gathering, assessing, archiving and identifying important information and making that information available to staff to support their ongoing decommissioning work. 3) Continually managing and enhancing the records and information base and its support infrastructure to ensure its long-term availability. 4) Executing special information enhancement projects, which transform historic records into information for analysis. (author)

  11. Distributed fuel-management computation using RFSP, WIMS-AECL and PVM

    International Nuclear Information System (INIS)

    Laughton, P.J; Jenkins, D.A.

    1996-01-01

    The Parallel Virtual Machine (PVM) software package was used to build an interface between RFSP and WIMS-AECL to enable history-based, local-parameter reactor fuel-management simulations in which batches of lattice-cell transport and burnup calculations can be made in parallel. The interface is based on the master/slave crowd-computation model. For slave computers numbering from one to twenty, the overhead spent by the one master preparing input for the slaves and processing their outputs was observed to be small in comparison with the computing time spent by the slaves themselves. Anticipating the availability of a much larger network of slaves in the future, two potential computational bottlenecks that might arise are described, and possible remedies for them are outlined. (author)

  12. Final report of the AECL/SKB Cigar Lake analog study

    International Nuclear Information System (INIS)

    Cramer, J.J.

    1994-07-01

    The Cigar Lake uranium deposit is located in northern Saskatchewan, Canada. The 1.3-billion-year-old deposit is located at a depth of about 450 m below surface in a water-saturated sandstone at the unconformity contact with the high-grade metamorphic rocks of the Canadian Shield. The uranium mineralization, consisting primarily of uraninite (UO 2 ), is surrounded by a clay-rich halo in both sandstone and basement rocks, and remains extremely well preserved and intact. The average grade of the mineralization is ∼ 8 wt.% U; locally grades are as high as ∼ 55 wt.%U. The Cigar lake deposit has many features that parallel those being considered within the Canadian concept for disposal of nuclear fuel waste. Specifically, the deposit provides analog information relevant to the stability of UO 2 fuel waste, the performance of clay-based barriers, radionuclide migration, colloid formation, radiolysis, fission-product geochemistry and general aspects of water-rock interaction. The main geochemical studies on this deposit focus on the evolution of groundwater compositions in the deposit and on their redox chemistry with respect to the uranium, iron and sulphide systems. Since 1984, through cooperation from the owners of the Cigar lake deposit, analog studies have been conducted. AECL, with support from Ontario Hydro under the auspices of the CANDU Owners Group, initiated international participation in 1989 through collaboration with the Swedish Nuclear Fuel and Waste Management Company (SKB) and, more recently, with the Los Alamos National Laboratory (LANL). This report gives the results of the various studies carried out during the 3-year collaboration between AECL and SKB, as well as a summary of the LANL study. It provides detailed information on the generated databases and models, and integrates this information into conclusions for use in safety assessment of the Canadian, Swedish and United States disposal concepts. 15 refs., 25 figs., 55 tabs

  13. Final report of the AECL/SKB Cigar Lake analog study

    International Nuclear Information System (INIS)

    Cramer, J.

    1994-05-01

    The Cigar Lake uranium deposit is located in northern Saskatchewan, Canada. The 1.3-billion-year-old deposit is located at a depth of about 450 m below surface in a water-saturated sandstone at the unconformity contact with the high-grade metamorphic rocks of the Canadian Shield. The Cigar Lake deposit has many features that parallel those being considered within the Canadian concept for disposal of nuclear fuel waste. The study of these natural structures and processes provides valuable insight toward the eventual design and site selection of a nuclear fuel waste repository. The main feature of this analog is the absence of any indication on the surface of the rich uranium ore 450 m below. This indicates that the combination of natural barriers has been effective in isolating the uranium ore from the surface environment. More specifically, the deposit provides analog information relevant to the stability of UO 2 fuel waste, the performance of clay-based barriers, radionuclide migration, colloid formation, radiolysis, fission-product geochemistry and general aspects of water-rock interaction. The main geochemical studies on this deposit focus on the evolution of groundwater compositions in the deposit and on their redox chemistry with respect to the uranium, iron and sulphide systems. Since 1984, through cooperation from the owners of the Cigar Lake deposit, analog studies have been conducted. AECL, with support from Ontario Hydro under the auspices of the CANDU Owners Group, initiated international participation in 1989 through collaboration with the Swedish Nuclear Fuel and Waste Management Company (SKB) and, more recently, with the Los Alamos National Laboratory (LANL). This report gives the results of the various studies carried out during the 3-year collaboration between AECL and SKB, as well as a summery of the LANL study. It provides detailed information on the generated databases and models, and integrates this information into conclusions for use in safety

  14. Retrofit of AECL CAN6 seals into the Pickering shutdown cooling pumps

    International Nuclear Information System (INIS)

    Rhodes, D.; Metcalfe, R.; Brown, G.

    1997-01-01

    The existing mechanical seals in the shutdown cooling (SDC) pumps at the eight-unit Pickering Nuclear Generating Station have caused as least seven forced outages in the last fifteen years. The SDC pumps were originally intended to run only during shutdowns, mostly at low pressure, except for short periods during routine testing of SDC isolation valves while the plant is operating at full pressure to verify that the emergency core injection system is available. Unfortunately, in practice, some SDC pumps must be run much more frequently than this to prevent overheating or freezing of components in the system while the plant is at power. This more severe service has decreased seal lifetime from about 8000 running hours to about 3000 running hours. Rather than tackling the difficult task of eliminating on-power running of the pumps, Pickering decided to install a more robust seal design that could withstand this. Through the process of competitive tender, AECL's CAN6 seal was chosen. This seal has a successful history in similarly demanding conditions in boiling water reactors in the USA. To supplement this and demonstrate there would be no 'surprises,' a 2000-hour test program was conducted. Testing consisted of simulating all the expected conditions, plus some special tests under abnormal conditions. This has given assurance that the seal will operate reliably in the Pickering shutdown cooling pumps. (author)

  15. The contribution of AECL CommercialProducts to nuclear medicine and radiation processing

    International Nuclear Information System (INIS)

    Beddoes, J.M.

    1980-02-01

    A review is given of the technology of the uses of radiation equipment and radioisotopes, in which field Canada has long been a world leader. AECL CommercialProducts has pioneered many of the most important applications. The development and sale of Co-60 radiation teletherapy units for cancer treatment is a familiar example of such an application, and CommercialProducts dominates the world market. Another such example is the marketing of Mo-99, which is produced in the reactors at Chalk River, and from which the short-lived daughter Tc-99 is eluted as required for use in in-vivo diagnosis. New products coming into use for this purpose include Tl-201, I-123, Ga-67 and In-111, all produced in the TRIUMF cyclotron in Vancouver, while I-125 continues to be in demand for in-vitro radioimmunoassays. Radioisotopes continue to play an important part in manufacturing, where their well-known uses include controlling thickness, contents, etc., in production, and industrial radiography. The application of large industrial irradiators for the sterilization of medical products is now a major world industry for which Commercial Products is the main manufacturer. Isotopes are also used in products such as smoke detectors. Isotopes continue to find extensive use as tracers, both in industrial applications and in animal and plant biology studies. Some more recent uses include pest control by the 'sterile male' technique and neutron activation and delayed neutron counting in uranium assay. (auth)

  16. Retrofit of AECL CAN6 seals into the Pickering shutdown cooling pumps

    International Nuclear Information System (INIS)

    Rhodes, D.; Metcalfe, R.; Brown, G.; Kiameh, P.; Burchett, P.

    1997-01-01

    The existing mechanical seals in the shutdown cooling (SDC) pumps at the eight-unit Pickering Nuclear Generating Station have caused at least seven forced outages in the last fifteen years. The SDC pumps were originally intended to run only during shutdowns, mostly at low pressure, except for short periods during routine testing of SDC isolation valves while the plant is operating at full pressure to verify that the emergency core injection system is available. Unfortunately, in practice, some SDC pumps must be run much more frequently than this to prevent overheating or freezing of components in the system while the plant is at power. This more severe service has decreased seal lifetime from about 8000 running hours to about 3000 running hours. Rather than tackling the difficult task of eliminating on-power running of the pumps, Pickering decided to install a more robust seal design that could withstand this. Through the process of competitive tender, AECL's CAN6 seal was chosen. This seal has a successful history in similarly demanding conditions in boiling water reactors in the USA. To supplement this and demonstrate there would be no 'surprises,' a 2000-hour test program was conducted. Testing consisted of simulating all the expected conditions, plus some special tests under abnormal conditions. This has given assurance that the seal will operate reliably in the Pickering shutdown cooling pumps. (author)

  17. Maintenance based design and equipment reliability for AECL's advanced CANDU reactor

    International Nuclear Information System (INIS)

    Meraw, D.

    2008-01-01

    This paper will describe how the elements of AECL's Maintenance Based Design will enable the Advanced CANDU Reactor to sustain high equipment reliability and capacity factors over the 60-year design life of the plant. The elements of Maintenance Based Design are; 1-Design Reliable Systems,Structures and Components (SSCs); 2-Select and Procure Reliable Components; 3-Incorporate Monitoring Capabilities and Facilities for SSCs; 4-Develop Maintenance Strategies and Programs for SSCs; 5-Apply Lessons Learned From Previous Plants; 6-Incorporate Maintainability and Event Free Features in the Design; 7-Provide Enhanced Maintenance Management Information and Tools to the Customer; 8-Optimize Chemistry and Materials in the Design. All these elements will be discussed with a detailed focus on the following; Design Reliable SSCs Using the techniques outlined in INPO AP-913, Equipment Reliability Process Description, each CANDU system that has caused any station past unavailability is analyzed as part of the ACR design in order to identify the critical components and any Single Points of Vulnerability (SPVs). All SPVs are then analyzed further in order to determine if they can be practically designed out or otherwise mitigated by the design. Developing Maintenance Strategies and Programs for SSCs Equipment degradation begins as soon as a component is manufactured and accelerates during initial commissioning and eventual operation. In order to sustain high levels of equipment reliability a maintenance strategy must be developed during the design phase and be ready for implementation before the start of commissioning. This maintenance strategy is developed for all critical components using the techniques of INPO AP-913 and other best industry practices. The strategy can be expanded and customized in conjunction with a future owner. Specific examples from the current ACR-1000 design will be used to show how these elements are being implemented.

  18. Determination of the dose rate to the center of the irradiation chamber of the Gamma cell 220 AECL; Determinacion de la razon de dosis al centro de la camara de irradiacion del Gammacell 220 AECL

    Energy Technology Data Exchange (ETDEWEB)

    Zuazua G, M.P

    1991-11-15

    To determine the dose rate at the center of the irradiation chamber of the Gamma cell 220 AECL, two different spectrophotometers for to measure the absorbency of the irradiated dosemeters were used. In the first one dosimetry, the absorbency of the irradiated Fricke solution was read in the Varian-UV-visible spectrophotometer Series 634 of the Applied Research Management. For the second dosimetry it was used the Shimadzu UV-visible spectrophotometer belonging to the Special Projects Department. The obtained results in this study are presented. (Author)

  19. AECL strategy for surface-based investigations of potential disposal sites and the development of a geosphere model for a site

    International Nuclear Information System (INIS)

    Whitaker, S.H.; Brown, A.; Davison, C.C.; Gascoyne, M.; Lodha, G.S.; Stevenson, D.R.; Thorne, G.A.; Tomsons, D.

    1994-05-01

    The objective of this report is to summarize AECL's strategy for surface-based geotechnical site investigations used in screening and evaluating candidate areas and candidate sites for a nuclear fuel waste repository and for the development of geosphere models of sites. The report is one of several prepared by national nuclear fuel waste management programs for the Swedish Nuclear Fuel and Waste Management Co. (SKB) to provide international background on site investigations for SKB's R and D programme on siting.The scope of the report is limited to surface-based investigations of the geosphere, those done at surface or in boreholes drilled from surface. The report discusses AECL's investigation strategy and the methods proposed for use in surface-based reconnaissance and detailed site investigations at potential repository sites. Site investigations done for AECL's Underground Research Laboratory are used to illustrate the approach. The report also discusses AECL's strategy for developing conceptual and mathematical models of geological conditions at sites and the use of these models in developing a model (Geosphere Model) for use in assessing the performance of the disposal system after a repository is closed. Models based on the site data obtained at the URL are used to illustrate the approach. Finally, the report summarizes the lessons learned from AECL's R and D program on site investigations and mentions some recent developments in the R and D program. 120 refs, 33 figs, 7 tabs

  20. Antibiotics from bacillus subtilis AECL69 8. isolation and purification of a complex of antibacterial antibiotics x

    International Nuclear Information System (INIS)

    Ahmad, M.S.; Malik, M.A.; Shaukat, G.A.

    1996-01-01

    A bacterial strain bacillus subtilis AECL69 produces two anti bacterial antibiotics in a specified complex or synthetic medium. One of the antibiotics is characteristically active against Xanthomonas citri. Procedures have been described to isolate and purify a complex of xanthmonas antibiotics from the fermented complex broths, and from the fermented synthetic medium as well. Paper chromatography coupled with bioautography has shown that the complex of xanthomonas antibiotics has at least three components. The three components were indicated irrespective of the fact whether it was isolated from the fermented complex or synthetic broth. (author)

  1. Determination of the dose rate to the center of the irradiation chamber of the Gamma cell 220 AECL

    International Nuclear Information System (INIS)

    Zuazua G, M.P.

    1991-11-01

    To determine the dose rate at the center of the irradiation chamber of the Gamma cell 220 AECL, two different spectrophotometers for to measure the absorbency of the irradiated dosemeters were used. In the first one dosimetry, the absorbency of the irradiated Fricke solution was read in the Varian-UV-visible spectrophotometer Series 634 of the Applied Research Management. For the second dosimetry it was used the Shimadzu UV-visible spectrophotometer belonging to the Special Projects Department. The obtained results in this study are presented. (Author)

  2. Thermal-hydraulic interfacing code modules for CANDU reactors

    Energy Technology Data Exchange (ETDEWEB)

    Liu, W.S.; Gold, M.; Sills, H. [Ontario Hydro Nuclear, Toronto (Canada)] [and others

    1997-07-01

    The approach for CANDU reactor safety analysis in Ontario Hydro Nuclear (OHN) and Atomic Energy of Canada Limited (AECL) is presented. Reflecting the unique characteristics of CANDU reactors, the procedure of coupling the thermal-hydraulics, reactor physics and fuel channel/element codes in the safety analysis is described. The experience generated in the Canadian nuclear industry may be useful to other types of reactors in the areas of reactor safety analysis.

  3. Analysis of the results for the AECL cohort in the IARC study on the radiogenic cancer risk among nuclear industry workers in fifteen countries

    Energy Technology Data Exchange (ETDEWEB)

    Ashmore, J.P. [Ponsonby and Associates, Manotick, Ontario (Canada); Gentner, N.E. [Consultant, Petawawa, Ontario (Canada); Osborne, R.V. [Ranasara Consultants Inc., Deep River, Ontario (Canada)

    2007-03-31

    Over the last two decades there have been attempts to estimate the risks from occupational exposure in the nuclear industry by epidemiological assessments on cohorts of workers. However, generally low doses and relatively small worker populations have limited the precision of such studies. In 1995 the International Agency for Research on Cancer (IARC) completed a study that involved workers from facilities in the USA, UK and AECL. In 2005, IARC completed a further study involving nuclear workers from 15 countries including Canada. Surprisingly, the risk ascribed to the Canadian cohort for all cancers excluding leukaemia, driven by the AECL component, was significantly higher than the cohort as a whole. The work described in this report is an attempt to unravel what might have accounted for the divergence between the results for the AECL cohort and the others.

  4. Analysis of the results for the AECL cohort in the IARC study on the radiogenic cancer risk among nuclear industry workers in fifteen countries

    International Nuclear Information System (INIS)

    Ashmore, J.P.; Gentner, N.E.; Osborne, R.V.

    2007-01-01

    Over the last two decades there have been attempts to estimate the risks from occupational exposure in the nuclear industry by epidemiological assessments on cohorts of workers. However, generally low doses and relatively small worker populations have limited the precision of such studies. In 1995 the International Agency for Research on Cancer (IARC) completed a study that involved workers from facilities in the USA, UK and AECL. In 2005, IARC completed a further study involving nuclear workers from 15 countries including Canada. Surprisingly, the risk ascribed to the Canadian cohort for all cancers excluding leukaemia, driven by the AECL component, was significantly higher than the cohort as a whole. The work described in this report is an attempt to unravel what might have accounted for the divergence between the results for the AECL cohort and the others

  5. Verification of the thermal module in the ELESIM code and the associated uncertainty analysis

    Energy Technology Data Exchange (ETDEWEB)

    Arimescu, V.I.; Williams, A.F.; Klein, M.E.; Richmond, W.R.; Couture, M. [Atomic Energy of Canada Limited, Chalk River, Ontario (Canada)

    1997-07-01

    Temperature is a critical parameter in fuel modelling because most of the physical processes that occur in fuel elements during irradiation are thermally activated. The focus of this paper is the temperature distribution calculation used in the computer code ELESIM, developed at AECL to model the steady state behaviour of CANDU fuel. A validation procedure for fuel codes is described and applied to ELESIM's thermal calculation.

  6. Validation of the ORIGEN-S code for predicting radionuclide inventories in used CANDU Fuel

    International Nuclear Information System (INIS)

    Tait, J.C.; Gauld, I.; Kerr, A.H.

    1994-10-01

    The safety assessment being conducted by AECL Research for the concept of deep geological disposal of used CANDU UO 2 fuel requires the calculation of radionuclide inventories in the fuel to provide source terms for radionuclide release. This report discusses the validation of selected actinide and fission-product inventories calculated using the ORIGEN-S code coupled with the WIMS-AECL lattice code, using data from analytical measurements of radioisotope inventories in Pickering CANDU reactor fuel. The recent processing of new ENDF/B-VI cross-section data has allowed the ORIGEN-S calculations to be performed using the most up-to-date nuclear data available. The results indicate that the code is reliably predicting actinide and the majority of fission-product inventories to within the analytical uncertainty. 38 refs., 4 figs., 5 tabs

  7. Research on radionuclide migration under subsurface geochemical conditions. JAERI/AECL Phase II Collaborative Program Year 1 (joint research)

    International Nuclear Information System (INIS)

    1998-11-01

    A radionuclide migration experiment program for fractured rocks was performed under the JAERI/AECL Phase-II Collaborative Program on research and development in radioactive waste management. The program started in the fiscal year 1993, as a five-year program consists of Quarried block radionuclide migration program, Speciation of long-lived radionuclides in groundwater, Isotopic hydrogeology and Groundwater flow model development. During the first year of the program (Program Year 1: March 18, 1994 - September 30, 1994), a plan was developed to take out granite blocks containing part of natural water-bearing fracture from the wall of the experimental gallery at the depth of 240 m, and literature reviews were done in the area of the speciation of long-lived radionuclides in groundwater, isotopic hydrogeology and the groundwater flow model development to proceed further work for the Program Year 2. (author)

  8. Validation of the COBRA code for dry out power calculation in CANDU type advanced fuels

    International Nuclear Information System (INIS)

    Daverio, Hernando J.

    2003-01-01

    Stern Laboratories perform a full scale CHF testing of the CANFLEX bundle under AECL request. This experiment is modeled with the COBRA IV HW code to verify it's capacity for the dry out power calculation . Good results were obtained: errors below 10 % with respect to all data measured and 1 % for standard operating conditions in CANDU reactors range . This calculations were repeated for the CNEA advanced fuel CARA obtaining the same performance as the CANFLEX fuel. (author)

  9. Assessment of CANDU physics codes using experimental data - II: CANDU core physics measurements

    International Nuclear Information System (INIS)

    Roh, Gyu Hong; Jeong, Chang Joon; Choi, Hang Bok

    2001-11-01

    Benchmark calculations of the advanced CANDU reactor analysis tools (WIMS-AECL, SHETAN and RFSP) and the Monte Carlo code MCNP-4B have been performed using Wolsong Units 2 and 3 Phase-B measurement data. In this study, the benchmark calculations have been done for the criticality, boron worth, reactivity device worth, reactivity coefficient, and flux scan. For the validation of the WIMS-AECL/SHETANRFSP code system, the lattice parameters of the fuel channel were generated by the WIMS-AECL code, and incremental cross sections of reactivity devices and structural material were generated by the SHETAN code. The results have shown that the criticality is under-predicted by -4 mk. The reactivity device worths are generally consistent with the measured data except for the strong absorbers such as shutoff rod and mechanical control absorber. The heat transport system temperature coefficient and flux distributions are in good agreement with the measured data. However, the moderator temperature coefficient has shown a relatively large error, which could be caused by the incremental cross-section generation methodology for the reactivity device. For the MCNP-4B benchmark calculation, cross section libraries were newly generated from ENDF/B-VI release 3 through the NJOY97.114 data processing system and a three-dimensional full core model was developed. The simulation results have shown that the criticality is estimated within 4 mk and the estimated reactivity worth of the control devices are generally consistent with the measurement data, which implies that the MCNP code is valid for CANDU core analysis. In the future, therefore, the MCNP code could be used as a reference tool to benchmark design and analysis codes for the advanced fuels for which experimental data are not available

  10. AECL present and future

    International Nuclear Information System (INIS)

    Foster, J.S.

    1975-08-01

    This is a history of Atomic Energy of Canada Limited with forecasts of its role in enabling Canada to meet a rapidly increasing share of her energy requirements from nuclear power. Its main activities will be research and development in support of contemporary and advanced CANDU (Canada Deuterium Uranium) nuclear power systems; research into other ways to provide energy and fissile materials; and investigation into applications for nuclear energy beyond the generation of electrical power. (Author)

  11. AECL - a new organization

    International Nuclear Information System (INIS)

    Donnelly, James

    1979-01-01

    Atomic Energy of Canada Ltd. was reorganized in August 1978. Four new divisions were created: the Research Company, the Engineering Company, the Chemical Company, and the Radiochemical Company. A management philosopy based on planning, performance measurement, and a sound corporate structure is being implemented, with the goal of making as many of the operating companies as possible profitable. (LL)

  12. Verification of the thermal module in the ELESIM code and the associated uncertainty analysis

    Energy Technology Data Exchange (ETDEWEB)

    Arimescu, V.I.; Williams, A.F.; Klein, M.E.; Richmond, W.R.; Couture, M

    1997-09-01

    Temperature is a critical parameter in fuel modelling because most of the physical processes that occur in fuel elements during irradiation are thermally activated. The focus of this paper is the temperature distribution calculation used in the computer code ELESIM, developed at AECL to model the steady-state behaviour of CANDU fuel. A validation procedure for fuel codes is described and applied to ELESIM's thermal calculation.The effects of uncertainties in model parameters, like Uranium Dioxide thermal conductivity, and input variables, such as fuel element linear power, are accounted for through an uncertainty analysis using Response Surface and Monte Carlo techniques.

  13. Particle-tracking code (track3d) for convective solute transport modelling in the geosphere: Description and user`s manual; Programme de reperage de particules (track3d) pour la modelisation du transport par convection des solutes dans la geosphere: description et manuel de l`utilisateur

    Energy Technology Data Exchange (ETDEWEB)

    Nakka, B.W.; Chan, T.

    1994-12-01

    A deterministic particle-tracking code (TRACK3D) has been developed to compute convective flow paths of conservative (nonreactive) contaminants through porous geological media. TRACK3D requires the groundwater velocity distribution, which, in our applications, results from flow simulations using AECL`s MOTIF code. The MOTIF finite-element code solves the transient and steady-state coupled equations of groundwater flow, solute transport and heat transport in fractured/porous media. With few modifications, TRACK3D can be used to analyse the velocity distributions calculated by other finite-element or finite-difference flow codes. This report describes the assumptions, limitations, organization, operation and applications of the TRACK3D code, and provides a comprehensive user`s manual.

  14. On the structure of Lattice code WIMSD-5B

    International Nuclear Information System (INIS)

    Kim, Won Young; Min, Byung Joo

    2004-03-01

    The WIMS-D code is a freely available thermal reactor physics lattice code used widely for thermal research and power reactor calculation. Now the code WIMS-AECL, developed on the basis of WIMS-D, has been used as one of lattice codes for the cell calculation in Canada and also, in 1998, the latest version WIMSD-5B is released for OECD/NEA Data Bank. While WIMS-KAERI was developed and has been used, originated from WIMS-D, in Korea, it was adjusted for the cell calculation of research reactor HANARO and so it has no confirmaty to CANDU reactor. Therefore, the code development applicable to cell calculation of CANDU reactor is necessary not only for technological independence and but also for the establishment of CANDU safety analysis system. A lattice code WIMSD-5B was analyzed in order to set the system of reactor physics computer codes, to be used in the assessment of void reactivity effect. In order to improve and validate WIMSD-5B code, the analysis of the structure of WIMSD-5B lattice code was made and so its structure, algorithm and the subroutines of WIMSD-5B were presented for the cluster type and the pij method modelling the CANDU-6 fuel

  15. The use of HANDIDET reg-sign non-electric detonator assemblies to reduce blast-induced overpressure at AECL's Underground Research Laboratory

    International Nuclear Information System (INIS)

    Onagi, D.P.; Keith, S.G.; Kuzyk, G.W.

    1996-01-01

    A number of aspects of the Canadian concept for nuclear fuel waste disposal are being assessed by Atomic Energy of Canada Limited (AECL) in a series of experiments at its Underground Research Laboratory (URL) near Lac du Bonnet, Manitoba, Canada. One of the major objectives of the work being carried out at the URL is to develop and evaluate the methods and technology to ensure safe, permanent disposal of Canada's nuclear fuel waste. In 1994, AECL excavated access tunnels and a laboratory room for the Quarried Block Fracture Migration Experiment (QBFME) at the 240 Level of the URL. This facility will be used to study the transport of radionuclides in natural fractures in quarried blocks of granite under in-situ groundwater conditions. The experiment is being carried out under a cooperative agreement with the Japan Atomic Energy Research Institute. The excavation of the QBFME access tunnels and laboratory was carried out using controlled blasting techniques that minimized blast-induced overpressure which could have damaged or interrupted other ongoing experiments in the vicinity. The majority of the blasts used conventional long delay non-electric detonators but a number of blasts were carried out using HANDIDET 250/6000 non-electric long delay detonator assemblies and HTD reg-sign non-electric short delay trunkline detonator assemblies. The tunnel and laboratory excavation was monitored to determine the levels of blast-induced overpressure. This paper describes the blasting and monitoring results of the blasts using HANDIDET non-electric detonator assemblies and the effectiveness of these detonators in reducing blast-induced overpressure

  16. Past and future fracturing in AECL Research areas in the superior province of the Canadian Precambrian Shield, with emphasis on the Lac du Bonnet Batholith

    International Nuclear Information System (INIS)

    Brown, A.; Everitt, R.A.; Martin, C.D.; Davison, C.C.

    1995-10-01

    The likelihood that future fracturing, arising from geologic causes, could occur in the vicinity of a nuclear fuel waste repository in plutonic rock of the Canadian Precambrian Shield, is examined. The report discusses the possible causes of fracturing (both past and future) in Shield rocks. The report then examines case histories of fracture formation in Precambrian plutonic rocks in AECL's Research Areas, especially the history of the Lac du Bonnet Batholith, in the Whiteshell Area, Manitoba. Initially, fractures can be introduced into intrusive plutonic rocks during crystallization and cooling of an intrusive magma. These fractures are found at all size scales; as late residual magma dyking, hydraulic fracturing by retrograde boiling off of hydrothermal fluids, and, in some cases, through local differential cooling. Subsequent fracturing is largely caused by changes in environmental temperature and stress field, rather than by alteration of the material behaviour of the rock. Pluton emplacement during orogeny is commonly accompanied by uplift and erosional exhumation, altering both the tectonic and the lithostatic stresses, the rock temperature gradient and the pore fluid characteristics

  17. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  18. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Sammenfatning af de mest væsentlige pointer fra hovedrapporten: Dokumentation og evaluering af Coding Class......Sammenfatning af de mest væsentlige pointer fra hovedrapporten: Dokumentation og evaluering af Coding Class...

  19. Verification of WIMS-ANL to be used as supporting code for WIMS-CANDU development

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Dai Hai; Kim, Won Young; Park, Joo Hwan

    2007-08-15

    The lattice code WIMS-ANL has been tested in order to assess it for the qualification to be used as a supporting code to aide the WIMS-CANDU development. A series of calculations have been performed to determine lattice physics parameters such as multiplication factors, isotopic number densities and coolant void reactivity. The WIMS-ANL results are compared with the predictions of WIMS-AECL/D4/D5 and PPV (POWDERPUFS-V), and the comparisons indicate that WIMS-ANL can be used not only as a supporting code to aide the WIMS-CANDU development, but also as a starting source for the study of developing detailed model that could delineate the realistic situations as it might occur during LOCA such as the asymmetric flux distribution across lattice cell.

  20. Development of Off-take Model, Subcooled Boiling Model, and Radiation Heat Transfer Input Model into the MARS Code for a Regulatory Auditing of CANDU Reactors

    International Nuclear Information System (INIS)

    Yoon, C.; Rhee, B. W.; Chung, B. D.; Ahn, S. H.; Kim, M. W.

    2009-01-01

    Korea currently has four operating units of the CANDU-6 type reactor in Wolsong. However, the safety assessment system for CANDU reactors has not been fully established due to a lack of self-reliance technology. Although the CATHENA code had been introduced from AECL, it is undesirable to use a vendor's code for a regulatory auditing analysis. In Korea, the MARS code has been developed for decades and is being considered by KINS as a thermal hydraulic regulatory auditing tool for nuclear power plants. Before this decision, KINS (Korea Institute of Nuclear Safety) had developed the RELAP5/MOD3/CANDU code for CANDU safety analyses by modifying the model of the existing PWR auditing tool, RELAP5/MOD3. The main purpose of this study is to transplant the CANDU models of the RELAP5/MOD3/CANDU code to the MARS code including a quality assurance of the developed models

  1. AECL's use of FMEA and OPEX for field service tooling and process development, implementation and improvement: a model for the future

    International Nuclear Information System (INIS)

    Cox, E.; Dam, R.F.; Wilson, E.

    2008-01-01

    Failure Modes and Effects Analysis (FMEA) is a systematic and rigorous process applied to new or complex systems to predict system failures and assist with the development of mitigating strategies. The process is especially beneficial when applied to higher-risk applications such as nuclear systems. FMEA may be used for design verification and maintenance program development. For field service tooling, FMEA is complimented well by operating experience (OPEX) and continuous improvement initiatives. FMEA is generally conducted while developing systems and processes to ensure safe and successful implementation, while OPEX is fed back into the system design and operation to improve those systems and processes for subsequent field applications. This paper will explore these techniques as they have been applied to AECL's CANDUclean system. The portable CANDUclean system is employed to mechanically clean the inside of steam generator (SG) tubes in CANDU nuclear power plants. During normal plant operation, the steam generator tubes in the heat transport system develop a build-up of magnetite on their internal diameter, which decreases heat transfer efficiency, impedes SG maintenance activities and increases the radiation fields in and around the boilers. As part of a regular plant aging management routine, the CANDUclean system is used to remove the magnetite layers. The nature of this work includes risks to personnel safety, however by continually applying FMEA and other improvement initiatives, safety and system effectiveness are maximized. This paper will provide an overview of the integrated continuous improvement approach applied to the CANDUclean system and consider the value of strategies when applied to field service tooling and CANDU systems. (author)

  2. Network Coding

    Indian Academy of Sciences (India)

    message symbols downstream, network coding achieves vast performance gains by permitting intermediate nodes to carry out algebraic oper- ations on the incoming data. In this article we present a tutorial introduction to network coding as well as an application to the e±cient operation of distributed data-storage networks.

  3. Results of a survey on accident and safety analysis codes, benchmarks, verification and validation methods

    International Nuclear Information System (INIS)

    Lee, A.G.; Wilkin, G.B.

    1996-03-01

    During the 'Workshop on R and D needs' at the 3rd Meeting of the International Group on Research Reactors (IGORR-III), the participants agreed that it would be useful to compile a survey of the computer codes and nuclear data libraries used in accident and safety analyses for research reactors and the methods various organizations use to verify and validate their codes and libraries. Five organizations, Atomic Energy of Canada Limited (AECL, Canada), China Institute of Atomic Energy (CIAE, People's Republic of China), Japan Atomic Energy Research Institute (JAERI, Japan), Oak Ridge National Laboratories (ORNL, USA), and Siemens (Germany) responded to the survey. The results of the survey are compiled in this report. (author) 36 refs., 3 tabs

  4. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017....... Coding Class projektet er et pilotprojekt, hvor en række skoler i København og Vejle kommuner har igangsat undervisningsaktiviteter med fokus på kodning og programmering i skolen. Evalueringen og dokumentationen af projektet omfatter kvalitative nedslag i udvalgte undervisningsinterventioner i efteråret...

  5. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  6. MOX fuel fabrication at AECL

    International Nuclear Information System (INIS)

    Dimayuga, F.C.; Jeffs, A.T.

    1995-01-01

    Atomic Energy of Canada Limited's mixed-oxide (MOX) fuel fabrication activities are conducted in the Recycle Fuel Fabrication Laboratories (RFFL) at the Chalk River Laboratories. The RFFL facility is designed to produce experimental quantities of CANDU MOX fuel for reactor physics tests or demonstration irradiations. From 1979 to 1987, several MOX fuel fabrication campaigns were run in the RFFL, producing various quantities of fuel with different compositions. About 150 bundles, containing over three tonnes of MOX, were fabricated in the RFFL before operations in the facility were suspended. In late 1987, the RFFL was placed in a state of active standby, a condition where no fuel fabrication activities are conducted, but the monitoring and ventilation systems in the facility are maintained. Currently, a project to rehabilitate the RFFL and resume MOX fuel fabrication is nearing completion. This project is funded by the CANDU Owners' Group (COG). The initial fabrication campaign will consist of the production of thirty-eight 37-element (U,Pu)O 2 bundles containing 0.2 wt% Pu in Heavy Element (H.E.) destined for physics tests in the zero-power ZED-2 reactor. An overview of the Rehabilitation Project will be given. (author)

  7. A SciCode web site: building bridges between owners and users

    International Nuclear Information System (INIS)

    Gaver, C.

    2000-01-01

    Web technology is a tool that is gaining in popularity. Properly used, it is a powerful tool that has tremendous potential for providing better communication. It can also be effective as a training tool, an information-sharing tool, and as a means of simplifying work load, and facilitating compliance with Company procedures. The issue is one of communication. The challenge facing many large or geographically-distributed companies is how to communicate information to their staff and to their customers. Procedures overseeing quality-assurance programs and commitment to ensuring the quality of products need to be communicated to customers. Equally important is customer feedback. This information from users becomes the kernel for future product development. The issue is even more important when speaking of scientific analysis computer programs (SciCodes). Regular ongoing communication between Primary Holders and End Users is essential in the development and use of SciCodes. Without this communication, quality assurance is at risk. Quality assurance processes are an integral part in developing any SciCode. End Users also have a role to play. Primary Holders keep End Users informed of improvements or new releases. End Users must ensure they act on this information. Equally important, End Users must communicate problems or suggestions to the Primary Holder to remedy or incorporate in new releases. In other words, quality assurance processes become most effective when both Primary Holder and End Users are involved. This requires communication. Web technology offers AECL a means of providing regular, ongoing communication between its scientific-code (SciCode) Primary Holders-Owner Branches and the End Users of these codes within and outside the Company. Using the experience we have gained by developing the Y2K SciCode Web sites, setting up online documentation systems, and incorporating lessons learned from the Y2K project we have developed a model that is geared to

  8. Rock stability considerations for siting and constructing a KBS-3 repository. Based on experiences from Aespoe HRL, AECL's URL, tunnelling and mining

    International Nuclear Information System (INIS)

    Martin, C.D.; Christiansson, Rolf; Soederhaell, J.

    2001-12-01

    Over the past 25 years the international nuclear community has carried out extensive research into the deep geological disposal of nuclear waste in hard rocks. In two cases this research has resulted in the construction of dedicated underground research facilities: SKB's Aespoe Hard Rock Laboratory, Sweden and AECL's Underground Research Laboratory, Canada. Both laboratories are located in hard rocks considered representative of the Fennoscandian and Canadian Shields, respectively. This report is intended to synthesize the important rock mechanics findings from these research programs. In particular the application of these finding to assessing the stability of underground openings. As such the report draws heavily on the published results from the SKB's ZEDEX Experiment in Sweden and AECL's Mine- by Experiment in Canada. The objectives of this report are to: 1. Describe, using the current state of knowledge, the role rock engineering can play in siting and constructing a KBS-3 repository. 2. Define the key rock mechanics parameters that should be determined in order to facilitate repository siting and construction. 3. Discuss possible construction issues, linked to rock stability, that may arise during the excavation of the underground openings of a KBS-3 repository. 4. Form a reference document for the rock stability analysis that has to be carried out as a part of the design works parallel to the site investigations. While there is no unique or single rock mechanics property or condition that would render the performance of a nuclear waste repository unacceptable, certain conditions can be treated as negative factors. Outlined below are major rock mechanics issues that should be addressed during the siting, construction and closure of a nuclear waste repository in Sweden in hard crystalline rock. During the site investigations phase, rock mechanics information will be predominately gathered from examination and testing of the rock core and mapping of the

  9. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  10. NSURE code

    International Nuclear Information System (INIS)

    Rattan, D.S.

    1993-11-01

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  11. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and softwa...... expression in the public realm. The book’s line of argument defends language against its invasion by economics, arguing that speech continues to underscore the human condition, however paradoxical this may seem in an era of pervasive computing....

  12. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  13. ANIMAL code

    Energy Technology Data Exchange (ETDEWEB)

    Lindemuth, I.R.

    1979-02-28

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables.

  14. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  15. ANIMAL code

    International Nuclear Information System (INIS)

    Lindemuth, I.R.

    1979-01-01

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  16. Expander Codes

    Indian Academy of Sciences (India)

    Codes and Channels. A noisy communication channel is illustrated in Fig- ... nication channel. Suppose we want to transmit a message over the unreliable communication channel so that even if the channel corrupts some of the bits we are able to recover ..... is d-regular, meaning thereby that every vertex has de- gree d.

  17. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  18. Network Coding

    Indian Academy of Sciences (India)

    Network coding is a technique to increase the amount of information °ow in a network by mak- ing the key observation that information °ow is fundamentally different from commodity °ow. Whereas, under traditional methods of opera- tion of data networks, intermediate nodes are restricted to simply forwarding their incoming.

  19. Panda code

    International Nuclear Information System (INIS)

    Altomare, S.; Minton, G.

    1975-02-01

    PANDA is a new two-group one-dimensional (slab/cylinder) neutron diffusion code designed to replace and extend the FAB series. PANDA allows for the nonlinear effects of xenon, enthalpy and Doppler. Fuel depletion is allowed. PANDA has a completely general search facility which will seek criticality, maximize reactivity, or minimize peaking. Any single parameter may be varied in a search. PANDA is written in FORTRAN IV, and as such is nearly machine independent. However, PANDA has been written with the present limitations of the Westinghouse CDC-6600 system in mind. Most computation loops are very short, and the code is less than half the useful 6600 memory size so that two jobs can reside in the core at once. (auth)

  20. Development of best estimate auditing code for CANDU thermal hydraulic safety analysis

    Energy Technology Data Exchange (ETDEWEB)

    Chung, B. D.; Lee, W. J.; Lim, H. S. [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2000-03-15

    The main purpose of this study is to develop a thermal hydraulic auditing code for the CANDU reactor, modifying the model if existing PWR auditing tool, i.e. RELAP5/MOD3. This scope of project is a third step of the whole project, and expand the RELAP5/MOD3/CANDU version for implementation of LOCA analysis. There are three main area of model development, i.e. moody critical flow model, flow regime model of horizontal CANDU bundle, and fuel element heatup model when the stratification occurs. Newly developed version, namely RELAP5/MOD3/CANDU+ is applicable to CANDU plant analysis with keeping the function of light water reactor analysis. The limited validations of model installation were performed. Assessment of CHF model using AECL separated effect test and calculation for Wolsong 2 plant were performed also for the applicability test of the developed version.

  1. Development of a best estimate auditing code for CANDU thermal hydraulic safety analysis

    Energy Technology Data Exchange (ETDEWEB)

    Chung, B.D.; Lee, W.J.; Lim, H.S. [Korea Atomic Energy Research Institute, Taejeon (Korea)

    2000-03-01

    The main purpose of this study is to develop a thermal hydraulic auditing code for the CANDU reactor, modifying the model of existing PWR auditing tool , i.e. RELAP5/MOD3. This scope of project is a third step of the whole project, and expand the RELAP5/MOD3/CANDU version for implementation of LOCA Analysis. There are three main area of model development, i.e. Moody critical flow model, flow regime model of horizontal CANDU bundle, and fuel element heatup model when the stratification occurs. Newly developed version, namely RELAP5/MOD3/CANDU+ is applicable to CANDU plant analysis with keeping the function of light water reactor analysis. The limited validations of model installation were performed. Assessment of CHF model using AECL separated effect test and calculation for Wolsong 2 plant were performed also for the applicability test of the developed version. 15 refs., 37 figs., 8 tabs. (Author)

  2. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  3. Automatic coding method of the ACR Code

    International Nuclear Information System (INIS)

    Park, Kwi Ae; Ihm, Jong Sool; Ahn, Woo Hyun; Baik, Seung Kook; Choi, Han Yong; Kim, Bong Gi

    1993-01-01

    The authors developed a computer program for automatic coding of ACR(American College of Radiology) code. The automatic coding of the ACR code is essential for computerization of the data in the department of radiology. This program was written in foxbase language and has been used for automatic coding of diagnosis in the Department of Radiology, Wallace Memorial Baptist since May 1992. The ACR dictionary files consisted of 11 files, one for the organ code and the others for the pathology code. The organ code was obtained by typing organ name or code number itself among the upper and lower level codes of the selected one that were simultaneous displayed on the screen. According to the first number of the selected organ code, the corresponding pathology code file was chosen automatically. By the similar fashion of organ code selection, the proper pathologic dode was obtained. An example of obtained ACR code is '131.3661'. This procedure was reproducible regardless of the number of fields of data. Because this program was written in 'User's Defined Function' from, decoding of the stored ACR code was achieved by this same program and incorporation of this program into program in to another data processing was possible. This program had merits of simple operation, accurate and detail coding, and easy adjustment for another program. Therefore, this program can be used for automation of routine work in the department of radiology

  4. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  5. CATHENA Code Assessment for Pressure Tube and Calandria Tube Contact Phenomena

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Hyoung Kyoun; Choi, Chul Jin; Choi, Jong Ho [KEPCO-EnC, Daejeon (Korea, Republic of)

    2015-05-15

    Canadian Algorithm for THErmalhydraulic Network Analysis (CATHENA), has been validated against full-scale Contact Boiling Experiments conducted using specific channel power, pressure, and moderator subcooling as pre-test conditions. The pressure tube (PT) and calandria tube (CT) temperatures, the extent of dryout and failures of the pressure tube or the calandria tube (if any) are the outcome of these experiments. Recently, an IAEA International Collaborative Standard Problem (ICSP) to provide contact boiling experimental data to participants for assessing the subcooling requirements for a heated pressure tube, plastically deforming into contact with the calandria tube during a postulated large break LOCA condition has been performed. The CATHENA code assessment results against the experimental data distributed for the ICSP are provided in this paper. The CATHENA code is used to simulate the experiment on pressure tube ballooning conducted at the AECL. The overall code's predictions show good agreements with the experimental data. The contact timing by the pressure tube ballooning is predicted accurately, however, it is found that the code largely underpredict the peak temperature at the pressure tube and the calandria tube. This discrepancy seems to be induced from multi-dimensional flow effects in the water tank. For more accurate calculations, detailed modeling of the water tank is required.

  6. Intercomparison and validation of computer codes for thermalhydraulic safety analysis of heavy water reactors

    International Nuclear Information System (INIS)

    2004-08-01

    Activities within the frame of the IAEA's Technical Working Group on Advanced Technologies for HWRs (TWG-HWR) are conducted in a project within the IAEA's subprogramme on nuclear power reactor technology development. The objective of the activities on HWRs is to foster, within the frame of the TWG-HWR, information exchange and co-operative research on technology development for current and future HWRs, with an emphasis on safety, economics and fuel resource sustainability. One of the activities recommended by the TWG-HWR was an international standard problem exercise entitled: Intercomparison and validation of computer codes for thermalhydraulics safety analyses. Intercomparison and validation of computer codes used in different countries for thermalhydraulics safety analyses will enhance the confidence in the predictions made by these codes. However, the intercomparison and validation exercise needs a set of reliable experimental data. The RD-14M Large-Loss Of Coolant Accident (LOCA) test B9401 simulating HWR LOCA behaviour that was conducted by Atomic Energy of Canada Ltd (AECL) was selected for this validation project. This report provides a comparison of the results obtained from six participating countries, utilizing four different computer codes. General conclusions are reached and recommendations made

  7. Comparison of Heavy Water Reactor Thermalhydraulic Code Predictions with Small Break LOCA Experimental Data

    International Nuclear Information System (INIS)

    2012-08-01

    Activities within the frame of the IAEA's Technical Working Group on Advanced Technologies for HWRs (TWG-HWR) are conducted in a project within the IAEA's subprogramme on nuclear power reactor technology development. The objective of the activities on HWRs is to foster, within the frame of the TWG-HWR, information exchange and cooperative research on technology development for current and future HWRs, with an emphasis on safety, economics and fuel resource sustainability. One of the activities recommended by the TWG-HWR was an international standard problem exercise entitled Intercomparison and Validation of Computer Codes for Thermalhydraulics Safety Analyses. Intercomparison and validation of computer codes used in different countries for thermalhydraulics safety analyses will enhance the confidence in the predictions made by these codes. However, the intercomparison and validation exercise needs a set of reliable experimental data. Two RD-14M small break loss of coolant accident (SBLOCA) tests, simulating HWR LOCA behaviour, conducted by Atomic Energy of Canada Ltd (AECL), were selected for this validation project. This report provides a comparison of the results obtained from eight participating organizations from six countries (Argentina, Canada, China, India, Republic of Korea, and Romania), utilizing four different computer codes (ATMIKA, CATHENA, MARS-KS, and RELAP5). General conclusions are reached and recommendations made.

  8. N286.7-99, A Canadian standard specifying software quality management system requirements for analytical, scientific, and design computer programs and its implementation at AECL

    International Nuclear Information System (INIS)

    Abel, R.

    2000-01-01

    Analytical, scientific, and design computer programs (referred to in this paper as 'scientific computer programs') are developed for use in a large number of ways by the user-engineer to support and prove engineering calculations and assumptions. These computer programs are subject to frequent modifications inherent in their application and are often used for critical calculations and analysis relative to safety and functionality of equipment and systems. N286.7-99(4) was developed to establish appropriate quality management system requirements to deal with the development, modification, and application of scientific computer programs. N286.7-99 provides particular guidance regarding the treatment of legacy codes

  9. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  10. Affine Grassmann codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant

    2010-01-01

    We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes.We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show that af...

  11. Source-term model for the SYVAC3-NSURE performance assessment code

    International Nuclear Information System (INIS)

    Rowat, J.H.; Rattan, D.S.; Dolinar, G.M.

    1996-11-01

    Radionuclide contaminants in wastes emplaced in disposal facilities will not remain in those facilities indefinitely. Engineered barriers will eventually degrade, allowing radioactivity to escape from the vault. The radionuclide release rate from a low-level radioactive waste (LLRW) disposal facility, the source term, is a key component in the performance assessment of the disposal system. This report describes the source-term model that has been implemented in Ver. 1.03 of the SYVAC3-NSURE (Systems Variability Analysis Code generation 3-Near Surface Repository) code. NSURE is a performance assessment code that evaluates the impact of near-surface disposal of LLRW through the groundwater pathway. The source-term model described here was developed for the Intrusion Resistant Underground Structure (IRUS) disposal facility, which is a vault that is to be located in the unsaturated overburden at AECL's Chalk River Laboratories. The processes included in the vault model are roof and waste package performance, and diffusion, advection and sorption of radionuclides in the vault backfill. The model presented here was developed for the IRUS vault; however, it is applicable to other near-surface disposal facilities. (author). 40 refs., 6 figs

  12. Computation of a Canadian SCWR unit cell with deterministic and Monte Carlo codes

    International Nuclear Information System (INIS)

    Harrisson, G.; Marleau, G.

    2012-01-01

    The Canadian SCWR has the potential to achieve the goals that the generation IV nuclear reactors must meet. As part of the optimization process for this design concept, lattice cell calculations are routinely performed using deterministic codes. In this study, the first step (self-shielding treatment) of the computation scheme developed with the deterministic code DRAGON for the Canadian SCWR has been validated. Some options available in the module responsible for the resonance self-shielding calculation in DRAGON 3.06 and different microscopic cross section libraries based on the ENDF/B-VII.0 evaluated nuclear data file have been tested and compared to a reference calculation performed with the Monte Carlo code SERPENT under the same conditions. Compared to SERPENT, DRAGON underestimates the infinite multiplication factor in all cases. In general, the original Stammler model with the Livolant-Jeanpierre approximations are the most appropriate self-shielding options to use in this case of study. In addition, the 89 groups WIMS-AECL library for slight enriched uranium and the 172 groups WLUP library for a mixture of plutonium and thorium give the most consistent results with those of SERPENT. (authors)

  13. Generalized concatenated quantum codes

    International Nuclear Information System (INIS)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng Bei

    2009-01-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  14. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  15. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  16. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  17. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  18. Error Correcting Codes

    Indian Academy of Sciences (India)

    sound quality is, in essence, obtained by accurate waveform coding and decoding of the audio signals. In addition, the coded audio information is protected against disc errors by the use of a Cross Interleaved Reed-Solomon Code (CIRC). Reed-. Solomon codes were discovered by Irving Reed and Gus Solomon in 1960.

  19. Network Coding Taxonomy

    OpenAIRE

    Adamson , Brian; Adjih , Cédric; Bilbao , Josu; Firoiu , Victor; Fitzek , Frank; Samah , Ghanem ,; Lochin , Emmanuel; Masucci , Antonia; Montpetit , Marie-Jose; Pedersen , Morten V.; Peralta , Goiuri; Roca , Vincent; Paresh , Saxena; Sivakumar , Senthil

    2017-01-01

    Internet Research Task Force - Working document of the Network Coding Research Group (NWCRG), draft-irtf-nwcrg-network-coding-taxonomy-05 (work in progress), https://datatracker.ietf.org/doc/draft-irtf-nwcrg-network-coding-taxonomy/; This document summarizes a recommended terminology for Network Coding concepts and constructs. It provides a comprehensive set of terms with unique names in order to avoid ambiguities in future Network Coding IRTF and IETF documents. This document is intended to ...

  20. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  1. Efficient Coding of Information: Huffman Coding -RE ...

    Indian Academy of Sciences (India)

    1. Introduction. Shannon's landmark paper 'A Mathematical Theory of. Communication' [1] laid the foundation for communica- ... coding theory, codes over graphs and iterative techniques, and informa- tion theory. .... An important consequence of independence is that if. {Xb X2 , . Xn} are independent random variables, each.

  2. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  3. Implementation of Wolsong Pump Model, Pressure Tube Deformation Model and Off-take Model into MARS Code for Regulatory Auditing of CANDU Reactors

    International Nuclear Information System (INIS)

    Yoon, C.; Rhee, B. W.; Chung, B. D.; Cho, Y. J.; Kim, M. W.

    2008-01-01

    Korea currently has four operating units of the CANDU-6 type reactor in Wolsong. However, the safety assessment system for CANDU reactors has not been fully established due to lack of self-reliance technology. Although the CATHENA code had been introduced from AECL, it is undesirable to use vendor's code for regulatory auditing analysis. In Korea, the MARS code has been developed for decades and is being considered by KINS as a thermal hydraulic regulatory auditing tool for nuclear power plants. Before this decision, KINS (Korea Institute of Nuclear Safety) had developed RELAP5/MOD3/CANDU code for CANDU safety analyses by modifying the model of existing PWR auditing tool, RELAP5/MOD3. The main purpose of this study is to transplant the CANDU models of RELAP5/MOD3/CANDU code to MARS code including quality assurance of the developed models. This first part of the research series presents the implementation and verification of the Wolsong pump model, the pressure tube deformation model, and the off-take model for arbitrary-angled branch pipes

  4. ASSERT-PV 3.2: Advanced subchannel thermalhydraulics code for CANDU fuel bundles

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Y.F., E-mail: raoy@aecl.ca; Cheng, Z., E-mail: chengz@aecl.ca; Waddington, G.M., E-mail: waddingg@aecl.ca; Nava-Dominguez, A., E-mail: navadoma@aecl.ca

    2014-08-15

    Highlights: • Introduction to a new version of the Canadian subchannel code, ASSERT-PV 3.2. • Enhanced models for flow-distribution, CHF and post-dryout heat transfer prediction. • Model changes focused on unique features of horizontal CANDU bundles. • Detailed description of model changes for all major thermalhydraulics models. • Discussion on rationale and limitation of the model changes. - Abstract: Atomic Energy of Canada Limited (AECL) has developed the subchannel thermalhydraulics code ASSERT-PV for the Canadian nuclear industry. The most recent release version, ASSERT-PV 3.2 has enhanced phenomenon models for improved predictions of flow distribution, dryout power and CHF location, and post-dryout (PDO) sheath temperature in horizontal CANDU fuel bundles. The focus of the improvements is mainly on modeling considerations for the unique features of CANDU bundles such as horizontal flows, small pitch to diameter ratios, high mass fluxes, and mixed and irregular subchannel geometries, compared to PWR/BWR fuel assemblies. This paper provides a general introduction to ASSERT-PV 3.2, and describes the model changes or additions in the new version to improve predictions of flow distribution, dryout power and CHF location, and PDO sheath temperatures in CANDU fuel bundles.

  5. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    Sacramento, A.M. do.

    1989-01-01

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  6. Model and code development

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    Progress in model and code development for reactor physics calculations is summarized. The codes included CINDER-10, PHROG, RAFFLE GAPP, DCFMR, RELAP/4, PARET, and KENO. Kinetics models for the PBF were developed

  7. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  8. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  9. Stylize Aesthetic QR Code

    OpenAIRE

    Xu, Mingliang; Su, Hao; Li, Yafei; Li, Xi; Liao, Jing; Niu, Jianwei; Lv, Pei; Zhou, Bing

    2018-01-01

    With the continued proliferation of smart mobile devices, Quick Response (QR) code has become one of the most-used types of two-dimensional code in the world. Aiming at beautifying the appearance of QR codes, existing works have developed a series of techniques to make the QR code more visual-pleasant. However, these works still leave much to be desired, such as visual diversity, aesthetic quality, flexibility, universal property, and robustness. To address these issues, in this paper, we pro...

  10. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a distributed...

  11. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of ROC...

  12. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  13. Error Correcting Codes -34 ...

    Indian Academy of Sciences (India)

    the reading of data from memory the receiving process. Protecting data in computer memories was one of the earliest applications of Hamming codes. We now describe the clever scheme invented by Hamming in 1948. To keep things simple, we describe the binary length 7 Hamming code. Encoding in the Hamming Code.

  14. Morse Code Activity Packet.

    Science.gov (United States)

    Clinton, Janeen S.

    This activity packet offers simple directions for setting up a Morse Code system appropriate to interfacing with any of several personal computer systems. Worksheets are also included to facilitate teaching Morse Code to persons with visual or other disabilities including blindness, as it is argued that the code is best learned auditorily. (PB)

  15. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  16. The network code

    International Nuclear Information System (INIS)

    1997-01-01

    The Network Code defines the rights and responsibilities of all users of the natural gas transportation system in the liberalised gas industry in the United Kingdom. This report describes the operation of the Code, what it means, how it works and its implications for the various participants in the industry. The topics covered are: development of the competitive gas market in the UK; key points in the Code; gas transportation charging; impact of the Code on producers upstream; impact on shippers; gas storage; supply point administration; impact of the Code on end users; the future. (20 tables; 33 figures) (UK)

  17. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  18. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  19. XSOR codes users manual

    International Nuclear Information System (INIS)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  20. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  1. AECL research programs in life sciences

    International Nuclear Information System (INIS)

    Marko, A.M.

    1981-04-01

    The present report summarizes the current research activities in life sciences in the Atomic Energy of Canada Limited-Research Company. The research is carried out at its two main research sites: the Chalk River Nuclear Laboratories and the Whiteshell Nuclear Research Establishment. The summaries cover the following areas of research: radiation biology, medical biophysics, epidemiology, environmental research and dosimetry. (author)

  2. AECL programs in basic physics research

    International Nuclear Information System (INIS)

    Bartholomew, G.A.; Dolling, G.; Harvey, M.; Milton, J.C.D.

    1982-02-01

    This report describes the CRNL program of research into the basic properties of atomic nuclei and condensed matter (liquids and solids). Brief descriptions are given of some of the current experimental programs done principally at the NRU reactor and MP tandem accelerator, the associated theoretical studies, and some highlights of past achievements

  3. Materials research in AECL, Spring 1970

    International Nuclear Information System (INIS)

    1970-05-01

    This report gives a summary of materials research at Atomic Energy of Canada Limited. The topics covered in this report include engineering design with brittle materials, texture and mechanical properties of zirconium alloy tubing, structural damage by ion bombardment, research on silicon carbide, shallow phosphorus diffusion in p-type silicon and scanning electron microscopy. CRNL facilities for the examination of irradiated materials is also discussed

  4. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  5. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  6. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow t...... the transversal implementation of a universal set of gates by gauge fixing, while error-dectecting measurements involve only four or six qubits....

  7. Doubled Color Codes

    Science.gov (United States)

    Bravyi, Sergey

    Combining protection from noise and computational universality is one of the biggest challenges in the fault-tolerant quantum computing. Topological stabilizer codes such as the 2D surface code can tolerate a high level of noise but implementing logical gates, especially non-Clifford ones, requires a prohibitively large overhead due to the need of state distillation. In this talk I will describe a new family of 2D quantum error correcting codes that enable a transversal implementation of all logical gates required for the universal quantum computing. Transversal logical gates (TLG) are encoded operations that can be realized by applying some single-qubit rotation to each physical qubit. TLG are highly desirable since they introduce no overhead and do not spread errors. It has been known before that a quantum code can have only a finite number of TLGs which rules out computational universality. Our scheme circumvents this no-go result by combining TLGs of two different quantum codes using the gauge-fixing method pioneered by Paetznick and Reichardt. The first code, closely related to the 2D color code, enables a transversal implementation of all single-qubit Clifford gates such as the Hadamard gate and the π / 2 phase shift. The second code that we call a doubled color code provides a transversal T-gate, where T is the π / 4 phase shift. The Clifford+T gate set is known to be computationally universal. The two codes can be laid out on the honeycomb lattice with two qubits per site such that the code conversion requires parity measurements for six-qubit Pauli operators supported on faces of the lattice. I will also describe numerical simulations of logical Clifford+T circuits encoded by the distance-3 doubled color code. Based on a joint work with Andrew Cross.

  8. Phonological coding during reading

    Science.gov (United States)

    Leinenger, Mallorie

    2014-01-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early (pre-lexical) or that phonological codes come online late (post-lexical)) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eyetracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model (Van Order, 1987), dual-route model (e.g., Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001), parallel distributed processing model (Seidenberg & McClelland, 1989)) are discussed. PMID:25150679

  9. MORSE Monte Carlo code

    Energy Technology Data Exchange (ETDEWEB)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described.

  10. Bar Code Labels

    Science.gov (United States)

    1988-01-01

    American Bar Codes, Inc. developed special bar code labels for inventory control of space shuttle parts and other space system components. ABC labels are made in a company-developed anodizing aluminum process and consecutively marketed with bar code symbology and human readable numbers. They offer extreme abrasion resistance and indefinite resistance to ultraviolet radiation, capable of withstanding 700 degree temperatures without deterioration and up to 1400 degrees with special designs. They offer high resistance to salt spray, cleaning fluids and mild acids. ABC is now producing these bar code labels commercially or industrial customers who also need labels to resist harsh environments.

  11. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  12. MORSE Monte Carlo code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described

  13. Tokamak Systems Code

    International Nuclear Information System (INIS)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  14. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  15. On {\\sigma}-LCD codes

    OpenAIRE

    Carlet, Claude; Mesnager, Sihem; Tang, Chunming; Qi, Yanfeng

    2017-01-01

    Linear complementary pairs (LCP) of codes play an important role in armoring implementations against side-channel attacks and fault injection attacks. One of the most common ways to construct LCP of codes is to use Euclidean linear complementary dual (LCD) codes. In this paper, we first introduce the concept of linear codes with $\\sigma$ complementary dual ($\\sigma$-LCD), which includes known Euclidean LCD codes, Hermitian LCD codes, and Galois LCD codes. As Euclidean LCD codes, $\\sigma$-LCD ...

  16. Accuracy and Uncertainty Analysis of PSBT Benchmark Exercises Using a Subchannel Code MATRA

    Directory of Open Access Journals (Sweden)

    Dae-Hyun Hwang

    2012-01-01

    Full Text Available In the framework of the OECD/NRC PSBT benchmark, the subchannel grade void distribution data and DNB data were assessed by a subchannel code, MATRA. The prediction accuracy and uncertainty of the zone-averaged void fraction at the central region of the 5 × 5 test bundle were evaluated for the steady-state and transient benchmark data. Optimum values of the turbulent mixing parameter were evaluated for the subchannel exit temperature distribution benchmark. The influence of the mixing vanes on the subchannel flow distribution was investigated through a CFD analysis. In addition, a regionwise turbulent mixing model was examined to account for the nonhomogeneous mixing characteristics caused by the vane effect. The steady-state DNB benchmark data with uniform and nonuniform axial power shapes were evaluated by employing various DNB prediction models: EPRI bundle CHF correlation, AECL-IPPE 1995 CHF lookup table, and representative mechanistic DNB models such as a sublayer dryout model and a bubble crowding model. The DNBR prediction uncertainties for various DNB models were evaluated from a Monte-Carlo simulation for a selected steady-state condition.

  17. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when...

  18. Error Correcting Codes -34 ...

    Indian Academy of Sciences (India)

    Science, Bangalore. Her interests are in. Theoretical Computer. Science. SERIES I ARTICLE. Error Correcting Codes. 2. The Hamming Codes. Priti Shankar. In the first article of this series we showed how redundancy introduced into a message transmitted over a noisy channel could improve the reliability of transmission. In.

  19. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    set up a well defined goal - that of achieving a per- formance bound set by the noisy channel coding theo- rem, proved in the paper. Whereas the goal appeared elusive twenty five years ago, today, there are practi- cal codes and decoding algorithms that come close to achieving it. It is interesting to note that all known.

  20. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March 1997 pp 33-47. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/002/03/0033-0047 ...

  1. Insurance billing and coding.

    Science.gov (United States)

    Napier, Rebecca H; Bruelheide, Lori S; Demann, Eric T K; Haug, Richard H

    2008-07-01

    The purpose of this article is to highlight the importance of understanding various numeric and alpha-numeric codes for accurately billing dental and medically related services to private pay or third-party insurance carriers. In the United States, common dental terminology (CDT) codes are most commonly used by dentists to submit claims, whereas current procedural terminology (CPT) and International Classification of Diseases, Ninth Revision, Clinical Modification (ICD.9.CM) codes are more commonly used by physicians to bill for their services. The CPT and ICD.9.CM coding systems complement each other in that CPT codes provide the procedure and service information and ICD.9.CM codes provide the reason or rationale for a particular procedure or service. These codes are more commonly used for "medical necessity" determinations, and general dentists and specialists who routinely perform care, including trauma-related care, biopsies, and dental treatment as a result of or in anticipation of a cancer-related treatment, are likely to use these codes. Claim submissions for care provided can be completed electronically or by means of paper forms.

  2. Codes of Conduct

    Science.gov (United States)

    Million, June

    2004-01-01

    Most schools have a code of conduct, pledge, or behavioral standards, set by the district or school board with the school community. In this article, the author features some schools that created a new vision of instilling code of conducts to students based on work quality, respect, safety and courtesy. She suggests that communicating the code…

  3. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Department of Computer. Science 'and Automation,. lISe. Their research addresses ... The fifty five year old history of error correcting codes began with Claude Shannon's path-breaking paper en- titled 'A ... given the limited computing power available then, Gal- lager's codes were not considered practical. A landmark.

  4. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  5. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 9. Decoding Codes on Graphs - Low Density Parity Check Codes. A S Madhu Aditya Nori. General Article Volume 8 Issue 9 September 2003 pp 49-59. Fulltext. Click here to view fulltext PDF. Permanent link:

  6. READING A NEURAL CODE

    NARCIS (Netherlands)

    BIALEK, W; RIEKE, F; VANSTEVENINCK, RRD; WARLAND, D

    1991-01-01

    Traditional approaches to neural coding characterize the encoding of known stimuli in average neural responses. Organisms face nearly the opposite task - extracting information about an unknown time-dependent stimulus from short segments of a spike train. Here the neural code was characterized from

  7. Fracture flow code

    International Nuclear Information System (INIS)

    Dershowitz, W; Herbert, A.; Long, J.

    1989-03-01

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  8. Validation of thermalhydraulic codes

    International Nuclear Information System (INIS)

    Wilkie, D.

    1992-01-01

    Thermalhydraulic codes require to be validated against experimental data collected over a wide range of situations if they are to be relied upon. A good example is provided by the nuclear industry where codes are used for safety studies and for determining operating conditions. Errors in the codes could lead to financial penalties, to the incorrect estimation of the consequences of accidents and even to the accidents themselves. Comparison between prediction and experiment is often described qualitatively or in approximate terms, e.g. ''agreement is within 10%''. A quantitative method is preferable, especially when several competing codes are available. The codes can then be ranked in order of merit. Such a method is described. (Author)

  9. Report number codes

    International Nuclear Information System (INIS)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  10. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  11. Laser propagation code study

    OpenAIRE

    Rockower, Edward B.

    1985-01-01

    A number of laser propagation codes have been assessed as to their suitability for modeling Army High Energy Laser (HEL) weapons used in an anti- sensor mode. We identify a number of areas in which systems analysis HEL codes are deficient. Most notably, available HEL scaling law codes model the laser aperture as circular, possibly with a fixed (e.g. 10%) obscuration. However, most HELs have rectangular apertures with up to 30% obscuration. We present a beam-quality/aperture shape scaling rela...

  12. Transport theory and codes

    International Nuclear Information System (INIS)

    Clancy, B.E.

    1986-01-01

    This chapter begins with a neutron transport equation which includes the one dimensional plane geometry problems, the one dimensional spherical geometry problems, and numerical solutions. The section on the ANISN code and its look-alikes covers problems which can be solved; eigenvalue problems; outer iteration loop; inner iteration loop; and finite difference solution procedures. The input and output data for ANISN is also discussed. Two dimensional problems such as the DOT code are given. Finally, an overview of the Monte-Carlo methods and codes are elaborated on

  13. Gravity inversion code

    International Nuclear Information System (INIS)

    Burkhard, N.R.

    1979-01-01

    The gravity inversion code applies stabilized linear inverse theory to determine the topography of a subsurface density anomaly from Bouguer gravity data. The gravity inversion program consists of four source codes: SEARCH, TREND, INVERT, and AVERAGE. TREND and INVERT are used iteratively to converge on a solution. SEARCH forms the input gravity data files for Nevada Test Site data. AVERAGE performs a covariance analysis on the solution. This document describes the necessary input files and the proper operation of the code. 2 figures, 2 tables

  14. Decoding the productivity code

    DEFF Research Database (Denmark)

    Hansen, David

    , that is, the productivity code of the 21st century, is dissolved. Today, organizations are pressured for operational efficiency, often in terms of productivity, due to increased global competition, demographical changes, and use of natural resources. Taylor’s principles for rationalization founded...... that swing between rationalization and employee development. The productivity code is the lack of alternatives to this ineffective approach. This thesis decodes the productivity code based on the results from a 3-year action research study at a medium-sized manufacturing facility. During the project period...

  15. CALIPSOS code report

    International Nuclear Information System (INIS)

    Fanselau, R.W.; Thakkar, J.G.; Hiestand, J.W.; Cassell, D.S.

    1980-04-01

    CALIPSOS is a steady-state three-dimensional flow distribution code which predicts the fluid dynamics and heat transfer interactions of the secondary two-phase flow in a steam generator. The mathematical formulation is sufficiently general to accommodate two fluid models described by separate gas and liquid momentum equations. However, if the user selects the homogeneous flow option, the code automatically equates the gas and liquid phase velocities (thereby reducing the number of momentum equations solved to three) and utilizes a homogeneous density mixture. This report presents the basic features of the CALIPSOS code and includes assumptions, equations solved, the finite-difference grid, and highlights of the solution procedure

  16. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  17. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  18. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  19. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  20. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered...... as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access......, in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded...

  1. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  2. Induction technology optimization code

    International Nuclear Information System (INIS)

    Caporaso, G.J.; Brooks, A.L.; Kirbie, H.C.

    1992-01-01

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  3. Code de conduite

    International Development Research Centre (IDRC) Digital Library (Canada)

    irocca

    le respect de telles normes. Ce faisant, nous contribuons à la bonne réputation et à l'intégrité du Centre et allons dans le sens du Code de valeurs et d'éthique du secteur public du gouvernement du Canada. Je vous invite à prendre connaissance de cette nouvelle mouture du Code de conduite et à appliquer ses principes ...

  4. Towards advanced code simulators

    International Nuclear Information System (INIS)

    Scriven, A.H.

    1990-01-01

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  5. Aphasia for Morse code.

    Science.gov (United States)

    Wyler, A R; Ray, M W

    1986-03-01

    The ability to communicate by Morse code at high speed has, to our knowledge, not been localized within the cerebral cortex, but might be suspected as residing within the left (dominant) hemisphere. We report a case of a 54-year-old male who suffered a left temporal tip intracerebral hematoma and who temporarily lost his ability to communicate in Morse code, but who was minimally aphasic.

  6. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  7. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... that are subcodes of the binary Reed-Muller codes and can be very simply instrumented, 3) a new class of constacyclic codes that are subcodes of thep-ary "Reed-Muller codes," 4) two new classes of binary convolutional codes with large "free distance" derived from known binary cyclic codes, 5) two new classes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm....

  8. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  9. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  10. Parametric studies of radiolytic oxidation of iodide solutions with and without paint: comparison with code calculations

    Energy Technology Data Exchange (ETDEWEB)

    Poletiko, C.; Hueber, C. [Inst. de Protection et de Surete Nucleaire, C.E. Cadarache, St. Paul-lez-Durance (France); Fabre, B. [CISI, C.E. Cadarache, St. Paul-lez-Durance (France)

    1996-12-01

    In case of severe nuclear accident, radioactive material may be released into the environment. Among the fission products involved, are the very volatile iodine isotopes. However, the chemical forms are not well known due to the presence of different species in the containment with which iodine may rapidly react to form aerosols, molecular iodine, hydroiodic acid and iodo-organics. Tentative explanations of different mechanisms were performed through benchscale tests. A series of tests has been performed at AEA Harwell (GB) to study parameters such as pH, dose rate, concentration, gas flow rate, temperature in relation to molecular iodine production, under dynamic conditions. Another set of tests has been performed in AECL Whiteshell (CA) to study the behaviour of painted coupons, standing in gas phase or liquid phase or both, with iodine compounds under radiation. The purpose of our paper is to synthesize the data and compare the results to the IODE code calculation. Some parameters of the code were studied to fit the experimental result the best. A law, concerning the reverse reaction of iodide radiolytic oxidation, has been proposed versus: pH, concentrations and gas flow-rate. This law does not apply for dose rate variations. For the study of painted coupons, it has been pointed out that molecular iodine tends to be adsorbed or chemically absorbed on the surface in gas phase, but the mechanism should be more sophisticated in the aqueous phase. The iodo-organics present in liquid phase tend to be partly or totally destroyed by oxidation under radiation (depending upon the dose delivered). These points are discussed. (author) 18 figs., 3 tabs., 15 refs.

  11. ACE - Manufacturer Identification Code (MID)

    Data.gov (United States)

    Department of Homeland Security — The ACE Manufacturer Identification Code (MID) application is used to track and control identifications codes for manufacturers. A manufacturer is identified on an...

  12. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  13. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  14. Canada, Atomic Energy of Canada Limited (AECL), Chalk River Labs: Reuse and Licence Termination of a Number of Facilities at the Chalk River Labs to Allow for Refurbishment of the Site. Annex A. I-1

    International Nuclear Information System (INIS)

    2011-01-01

    Chalk River Labs is located along the Ottawa River in Ontario, Canada, approximately 200 km north-west of Ottawa. The site began construction in 1944 following the expropriation of approximately 1 500 ha of land. A number of research reactors were constructed at the site along with numerous nuclear labs, hot cells and administrative facilities in support of the research and development work planned for the site. The principal occupants of the Chalk River site are AECL employees with a strong presence from National Resources Canada (NRC) and other small research groups. The site is undergoing substantial changes with an emphasis on minimizing the impact of increasing the builtup area footprint in conjunction with site upgrades and new build projects. To accomplish this task, a number of refurbishment and decommissioning projects were planned. Decommissioning projects were initiated to make room for new development through a number of initiatives. The decommissioning mandate includes the removal of a select group of original deteriorating facilities to make room for new construction and to decommission other facilities to facilitate redevelopment and reuse of the available space. In Canada, the Canadian Nuclear Safety Commission (CNSC) issues nuclear licences. The licensees must demonstrate that it is safe to continue operations of the nuclear site and request a renewal of their licence. CNSC will issue a new operating licence for a specific period of time at which the licensee must demonstrate that it is safe to proceed with a licence renewal. A request to terminate a licensable activity must be submitted to the CNSC. Upon approval to proceed, it must be demonstrated that the licensable activities have ceased and the facility has been appropriately decommissioned. Licence termination requires a demonstration that the land or previous activities presents a low risk and that the process can be used to support redevelopment because it results in a scrutinized

  15. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  16. Spatially coded backscatter radiography

    International Nuclear Information System (INIS)

    Thangavelu, S.; Hussein, E.M.A.

    2007-01-01

    Conventional radiography requires access to two opposite sides of an object, which makes it unsuitable for the inspection of extended and/or thick structures (airframes, bridges, floors etc.). Backscatter imaging can overcome this problem, but the indications obtained are difficult to interpret. This paper applies the coded aperture technique to gamma-ray backscatter-radiography in order to enhance the detectability of flaws. This spatial coding method involves the positioning of a mask with closed and open holes to selectively permit or block the passage of radiation. The obtained coded-aperture indications are then mathematically decoded to detect the presence of anomalies. Indications obtained from Monte Carlo calculations were utilized in this work to simulate radiation scattering measurements. These simulated measurements were used to investigate the applicability of this technique to the detection of flaws by backscatter radiography

  17. Aztheca Code; Codigo Aztheca

    Energy Technology Data Exchange (ETDEWEB)

    Quezada G, S.; Espinosa P, G. [Universidad Autonoma Metropolitana, Unidad Iztapalapa, San Rafael Atlixco No. 186, Col. Vicentina, 09340 Ciudad de Mexico (Mexico); Centeno P, J.; Sanchez M, H., E-mail: sequga@gmail.com [UNAM, Facultad de Ingenieria, Ciudad Universitaria, Circuito Exterior s/n, 04510 Ciudad de Mexico (Mexico)

    2017-09-15

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  18. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  19. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  20. Revised SRAC code system

    International Nuclear Information System (INIS)

    Tsuchihashi, Keichiro; Ishiguro, Yukio; Kaneko, Kunio; Ido, Masaru.

    1986-09-01

    Since the publication of JAERI-1285 in 1983 for the preliminary version of the SRAC code system, a number of additions and modifications to the functions have been made to establish an overall neutronics code system. Major points are (1) addition of JENDL-2 version of data library, (2) a direct treatment of doubly heterogeneous effect on resonance absorption, (3) a generalized Dancoff factor, (4) a cell calculation based on the fixed boundary source problem, (5) the corresponding edit required for experimental analysis and reactor design, (6) a perturbation theory calculation for reactivity change, (7) an auxiliary code for core burnup and fuel management, etc. This report is a revision of the users manual which consists of the general description, input data requirements and their explanation, detailed information on usage, mathematics, contents of libraries and sample I/O. (author)

  1. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes...

  2. Visualizing code and coverage changes for code review

    NARCIS (Netherlands)

    Oosterwaal, Sebastiaan; van Deursen, A.; De Souza Coelho, R.; Sawant, A.A.; Bacchelli, A.

    2016-01-01

    One of the tasks of reviewers is to verify that code modifications are well tested. However, current tools offer little support in understanding precisely how changes to the code relate to changes to the tests. In particular, it is hard to see whether (modified) test code covers the changed code.

  3. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  4. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    A classic way to choose a supplier is through a bidding process where tenders from competing companies are evaluated in relation to the customer’s requirements. If the customer wants to hire an agile software developing team instead of buying a software product, a new approach for comparing tenders...... is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  5. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed

    2018-04-08

    Convolutional Sparse Coding (CSC) is a well-established image representation model especially suited for image restoration tasks. In this work, we extend the applicability of this model by proposing a supervised approach to convolutional sparse coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements to be discriminative. Experimental results show that using supervised convolutional learning results in two key advantages. First, we learn more semantically relevant filters in the dictionary and second, we achieve improved image reconstruction on unseen data.

  6. CONCEPT computer code

    International Nuclear Information System (INIS)

    Delene, J.

    1984-01-01

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  7. Microbial analysis of the buffer/container experiment at AECL`s Underground Research Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Stroes-Gascoyne, S.; Hamon, C.J.; Haveman, S.A.; Delaney, T.L. [Atomic Energy of Canada Ltd., Pinawa, MB (Canada). Whiteshell Labs; Pedersen, K.; Ekendahl, S.; Jahromi, N.; Arlinger, J.; Hallbeck, L. [Univ. of Goeteborg, (Sweden). Dept. of General and Marine Microbiology; Daumas, S.; Dekeyser, K. [Guiges Recherche Appliquee en Microbiologie, Aix-en-Provence, (France)

    1996-05-01

    The Buffer/Container experiment was carried out for 2.5 years to examine the in-situ performance of compacted buffer material in a single emplacement borehole under vault-relevant conditions. During decommissioning of this experiment, numerous samples were taken for microbial analysis to determine if the naturally present microbial population in buffer material survived to conditions and to determine which groups of microorganisms would be dominant in such a simulated vault environment. Microbial analyses were initiated within 24 hour of sampling for all types of samples taken. The culture results showed an almost universal disappearance of viable microorganisms in the samples taken from near the heater surface. The microbial activity measurements confirmed the lack of viable organisms with very weak or no activity measured in most of these samples. Generally, aerobic heterotrophic culture conditions gave the highest mean colony-forming units (CFU) values at both 25 and 50 C. Under anaerobic conditions, and especially at 50 C, lower mean CFU values were obtained. In all samples analyzed, numbers of sulfate reducing bacteria were less than 1000 CFU/g dry material. Methanogens were either not present or were found in very low numbers. Anaerobic sulfur oxidizing bacteria were found in higher numbers in most sample types with sufficient moisture. The statistical evaluation of the culture data demonstrated clearly that the water content was the variable limiting the viability of the bacteria present, and not the temperature. 68 refs, 35 figs, 37 tabs.

  8. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    lowing function is maximized,. This kind of decoding strategy is called the maximum a posteriori probability (MAP) decoding strategy as it attempts to estimate each symbol of the codeword that ..... gate the effects of packet loss over digital networks. Un- doubtedly other applications will use these codes in the years to come.

  9. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  10. CERN Code of Conduct

    CERN Document Server

    Department, HR

    2010-01-01

    The Code is intended as a guide in helping us, as CERN contributors, to understand how to conduct ourselves, treat others and expect to be treated. It is based around the five core values of the Organization. We should all become familiar with it and try to incorporate it into our daily life at CERN.

  11. Error Correcting Codes

    Indian Academy of Sciences (India)

    focused pictures of Triton, Neptune's largest moon. This great feat was in no small measure due to the fact that the sophisticated communication system on Voyager had an elaborate error correcting scheme built into it. At Jupiter and Saturn, a convolutional code was used to enhance the reliability of transmission, and at ...

  12. Nuclear safety code study

    Energy Technology Data Exchange (ETDEWEB)

    Hu, H.H.; Ford, D.; Le, H.; Park, S.; Cooke, K.L.; Bleakney, T.; Spanier, J.; Wilburn, N.P.; O' Reilly, B.; Carmichael, B.

    1981-01-01

    The objective is to analyze an overpower accident in an LMFBR. A simplified model of the primary coolant loop was developed in order to understand the instabilities encountered with the MELT III and SAS codes. The computer programs were translated for switching to the IBM 4331. Numerical methods were investigated for solving the neutron kinetics equations; the Adams and Gear methods were compared. (DLC)

  13. Student Dress Codes.

    Science.gov (United States)

    Uerling, Donald F.

    School officials see a need for regulations that prohibit disruptive and inappropriate forms of expression and attire; students see these regulations as unwanted restrictions on their freedom. This paper reviews court litigation involving constitutional limitations on school authority, dress and hair codes, state law constraints, and school…

  14. Differential pulse code modulation

    Science.gov (United States)

    Herman, C. F. (Inventor)

    1976-01-01

    A differential pulse code modulation (DPCM) encoding and decoding method is described along with an apparatus which is capable of transmission with minimum bandwidth. The apparatus is not affected by data transition density, requires no direct current (DC) response of the transmission link, and suffers from minimal ambiguity in resolution of the digital data.

  15. Error Correcting Codes

    Indian Academy of Sciences (India)

    syndrome is an indicator of underlying disease. Here too, a non zero syndrome is an indication that something has gone wrong during transmission. SERIES I ARTICLE. The first matrix on the left hand side is called the parity check matrix H. Thus every codeword c satisfies the equation o o. HcT = o o. Therefore the code can ...

  16. Focusing Automatic Code Inspections

    NARCIS (Netherlands)

    Boogerd, C.J.

    2010-01-01

    Automatic Code Inspection tools help developers in early detection of defects in software. A well-known drawback of many automatic inspection approaches is that they yield too many warnings and require a clearer focus. In this thesis, we provide such focus by proposing two methods to prioritize

  17. Reliability and code level

    NARCIS (Netherlands)

    Kasperski, M.; Geurts, C.P.W.

    2005-01-01

    The paper describes the work of the IAWE Working Group WBG - Reliability and Code Level, one of the International Codification Working Groups set up at ICWE10 in Copenhagen. The following topics are covered: sources of uncertainties in the design wind load, appropriate design target values for the

  18. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives...

  19. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  20. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  1. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  2. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  3. Ptolemy Coding Style

    Science.gov (United States)

    2014-09-05

    because this would combine Ptolemy II with the GPL’d code and thus encumber Ptolemy II with the GPL. Another GNU license is the GNU Library General...permission on the source.eecs.berkeley.edu repositories, then use your local repository. bash-3.2$ svn co svn+ ssh ://source.eecs.berkeley.edu/chess

  4. Accumulate Repeat Accumulate Coded Modulation

    Science.gov (United States)

    Abbasfar, Aliazam; Divsalar, Dariush; Yao, Kung

    2004-01-01

    In this paper we propose an innovative coded modulation scheme called 'Accumulate Repeat Accumulate Coded Modulation' (ARA coded modulation). This class of codes can be viewed as serial turbo-like codes, or as a subclass of Low Density Parity Check (LDPC) codes that are combined with high level modulation. Thus at the decoder belief propagation can be used for iterative decoding of ARA coded modulation on a graph, provided a demapper transforms the received in-phase and quadrature samples to reliability of the bits.

  5. Causation, constructors and codes.

    Science.gov (United States)

    Hofmeyr, Jan-Hendrik S

    2018-02-01

    Relational biology relies heavily on the enriched understanding of causal entailment that Robert Rosen's formalisation of Aristotle's four causes has made possible, although to date efficient causes and the rehabilitation of final cause have been its main focus. Formal cause has been paid rather scant attention, but, as this paper demonstrates, is crucial to our understanding of many types of processes, not necessarily biological. The graph-theoretic relational diagram of a mapping has played a key role in relational biology, and the first part of the paper is devoted to developing an explicit representation of formal cause in the diagram and how it acts in combination with efficient cause to form a mapping. I then use these representations to show how Von Neumann's universal constructor can be cast into a relational diagram in a way that avoids the logical paradox that Rosen detected in his own representation of the constructor in terms of sets and mappings. One aspect that was absent from both Von Neumann's and Rosen's treatments was the necessity of a code to translate the description (the formal cause) of the automaton to be constructed into the construction process itself. A formal definition of codes in general, and organic codes in particular, allows the relational diagram to be extended so as to capture this translation of formal cause into process. The extended relational diagram is used to exemplify causal entailment in a diverse range of processes, such as enzyme action, construction of automata, communication through the Morse code, and ribosomal polypeptide synthesis through the genetic code. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. Entanglement-assisted quantum MDS codes constructed from negacyclic codes

    Science.gov (United States)

    Chen, Jianzhang; Huang, Yuanyuan; Feng, Chunhui; Chen, Riqing

    2017-12-01

    Recently, entanglement-assisted quantum codes have been constructed from cyclic codes by some scholars. However, how to determine the number of shared pairs required to construct entanglement-assisted quantum codes is not an easy work. In this paper, we propose a decomposition of the defining set of negacyclic codes. Based on this method, four families of entanglement-assisted quantum codes constructed in this paper satisfy the entanglement-assisted quantum Singleton bound, where the minimum distance satisfies q+1 ≤ d≤ n+2/2. Furthermore, we construct two families of entanglement-assisted quantum codes with maximal entanglement.

  7. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well...... as conceptions of good governance from other international organizations. While values converge, they are balanced and communicated differently, and seem to some extent to be translated into the national cultures. The set of global public values derived from this analysis include public interest, regime dignity...

  8. Coding isotropic images

    Science.gov (United States)

    Oneal, J. B., Jr.; Natarajan, T. R.

    1976-01-01

    Rate distortion functions for two-dimensional homogeneous isotropic images are compared with the performance of 5 source encoders designed for such images. Both unweighted and frequency weighted mean square error distortion measures are considered. The coders considered are differential PCM (DPCM) using six previous samples in the prediction, herein called 6 pel (picutre element) DPCM; simple DPCM using single sample prediction; 6 pel DPCM followed by entropy coding; 8 x 8 discrete cosine transform coder, and 4 x 4 Hadamard transform coder. Other transform coders were studied and found to have about the same performance as the two transform coders above. With the mean square error distortion measure DPCM with entropy coding performed best. The relative performance of the coders changes slightly when the distortion measure is frequency weighted mean square error. The performance of all the coders was separated by only about 4 dB.

  9. Efficient convolutional sparse coding

    Energy Technology Data Exchange (ETDEWEB)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  10. Computer code FIT

    International Nuclear Information System (INIS)

    Rohmann, D.; Koehler, T.

    1987-02-01

    This is a description of the computer code FIT, written in FORTRAN-77 for a PDP 11/34. FIT is an interactive program to decude position, width and intensity of lines of X-ray spectra (max. length of 4K channels). The lines (max. 30 lines per fit) may have Gauss- or Voigt-profile, as well as exponential tails. Spectrum and fit can be displayed on a Tektronix terminal. (orig.) [de

  11. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  12. Cracking the Gender Codes

    DEFF Research Database (Denmark)

    Rennison, Betina Wolfgang

    2016-01-01

    Why do men continue to fill most of the senior executive positions and seats in the board of directors in Western corporations? Almost everyone agrees that diversity is good, many women are coming down the pipeline, and companies, states and international organizations and institutions have done...... in leadership management, we must become more aware and take advantage of this complexity. We must crack the codes in order to crack the curve....

  13. Hydra Code Release

    OpenAIRE

    Couchman, H. M. P.; Pearce, F. R.; Thomas, P. A.

    1996-01-01

    Comment: A new version of the AP3M-SPH code, Hydra, is now available as a tar file from the following sites; http://coho.astro.uwo.ca/pub/hydra/hydra.html , http://star-www.maps.susx.ac.uk/~pat/hydra/hydra.html . The release now also contains a cosmological initial conditions generator, documentation, an installation guide and installation tests. A LaTex version of the documentation is included here

  14. Tokamak simulation code manual

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs.

  15. Tokamak simulation code manual

    International Nuclear Information System (INIS)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs

  16. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  17. Bar coded retroreflective target

    Science.gov (United States)

    Vann, Charles S.

    2000-01-01

    This small, inexpensive, non-contact laser sensor can detect the location of a retroreflective target in a relatively large volume and up to six degrees of position. The tracker's laser beam is formed into a plane of light which is swept across the space of interest. When the beam illuminates the retroreflector, some of the light returns to the tracker. The intensity, angle, and time of the return beam is measured to calculate the three dimensional location of the target. With three retroreflectors on the target, the locations of three points on the target are measured, enabling the calculation of all six degrees of target position. Until now, devices for three-dimensional tracking of objects in a large volume have been heavy, large, and very expensive. Because of the simplicity and unique characteristics of this tracker, it is capable of three-dimensional tracking of one to several objects in a large volume, yet it is compact, light-weight, and relatively inexpensive. Alternatively, a tracker produces a diverging laser beam which is directed towards a fixed position, and senses when a retroreflective target enters the fixed field of view. An optically bar coded target can be read by the tracker to provide information about the target. The target can be formed of a ball lens with a bar code on one end. As the target moves through the field, the ball lens causes the laser beam to scan across the bar code.

  18. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L.; Hodge, S.A.; Hyman, C.R.; Sanders, R.L.

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  19. Development of PARASOL code

    Energy Technology Data Exchange (ETDEWEB)

    Hosokawa, Masanari [Research Organization for Information Science and Technology, Tokai, Ibaraki (Japan); Takizuka, Tomonori [Japan Atomic Energy Research Inst., Naka, Ibaraki (Japan). Naka Fusion Research Establishment

    2000-05-01

    The divertor is expected to play key roles in tokamak reactors, such as ITER, for the heat removal, ash exhaust, and impurity shielding. Its performance is being predicted by using comprehensive simulation codes with the fluid model. In the fluid model for scrape-off layer (SOL) and divertor plasmas, various physics models are introduced. Kinetic approach is required to examine the validity of such physics models. One of the most powerful kinetic models is the particle simulation. Therefore a particle code PARASOL has been developed, and is being used for the simulation study of SOL and divertor plasmas. The PARASOL code treats the plasma bounded by two divertor plates, in which motions of ions and electrons are traced by using a electrostatic PIC method. Effects of Coulomb collisions are simulated by using a Monte-Carlo=method binary collision model. Motions of neutral particles are traced simultaneously with charged particles. In this report, we describe the physics model of PARASOL, the numerical methods, the configuration of the program, input parameters, output formats, samples of simulation results, the parallel computing method. The efficiency of the parallel computing with Paragon XP/S15-256 is demonstrated. (author)

  20. Code Modernization of VPIC

    Science.gov (United States)

    Bird, Robert; Nystrom, David; Albright, Brian

    2017-10-01

    The ability of scientific simulations to effectively deliver performant computation is increasingly being challenged by successive generations of high-performance computing architectures. Code development to support efficient computation on these modern architectures is both expensive, and highly complex; if it is approached without due care, it may also not be directly transferable between subsequent hardware generations. Previous works have discussed techniques to support the process of adapting a legacy code for modern hardware generations, but despite the breakthroughs in the areas of mini-app development, portable-performance, and cache oblivious algorithms the problem still remains largely unsolved. In this work we demonstrate how a focus on platform agnostic modern code-development can be applied to Particle-in-Cell (PIC) simulations to facilitate effective scientific delivery. This work builds directly on our previous work optimizing VPIC, in which we replaced intrinsic based vectorisation with compile generated auto-vectorization to improve the performance and portability of VPIC. In this work we present the use of a specialized SIMD queue for processing some particle operations, and also preview a GPU capable OpenMP variant of VPIC. Finally we include a lessons learnt. Work performed under the auspices of the U.S. Dept. of Energy by the Los Alamos National Security, LLC Los Alamos National Laboratory under contract DE-AC52-06NA25396 and supported by the LANL LDRD program.

  1. Quality Improvement of MARS Code and Establishment of Code Coupling

    International Nuclear Information System (INIS)

    Chung, Bub Dong; Jeong, Jae Jun; Kim, Kyung Doo

    2010-04-01

    The improvement of MARS code quality and coupling with regulatory auditing code have been accomplished for the establishment of self-reliable technology based regulatory auditing system. The unified auditing system code was realized also by implementing the CANDU specific models and correlations. As a part of the quality assurance activities, the various QA reports were published through the code assessments. The code manuals were updated and published a new manual which describe the new models and correlations. The code coupling methods were verified though the exercise of plant application. The education-training seminar and technology transfer were performed for the code users. The developed MARS-KS is utilized as reliable auditing tool for the resolving the safety issue and other regulatory calculations. The code can be utilized as a base technology for GEN IV reactor applications

  2. On Some Ternary LCD Codes

    OpenAIRE

    Darkunde, Nitin S.; Patil, Arunkumar R.

    2018-01-01

    The main aim of this paper is to study $LCD$ codes. Linear code with complementary dual($LCD$) are those codes which have their intersection with their dual code as $\\{0\\}$. In this paper we will give rather alternative proof of Massey's theorem\\cite{8}, which is one of the most important characterization of $LCD$ codes. Let $LCD[n,k]_3$ denote the maximum of possible values of $d$ among $[n,k,d]$ ternary $LCD$ codes. In \\cite{4}, authors have given upper bound on $LCD[n,k]_2$ and extended th...

  3. Design of convolutional tornado code

    Science.gov (United States)

    Zhou, Hui; Yang, Yao; Gao, Hongmin; Tan, Lu

    2017-09-01

    As a linear block code, the traditional tornado (tTN) code is inefficient in burst-erasure environment and its multi-level structure may lead to high encoding/decoding complexity. This paper presents a convolutional tornado (cTN) code which is able to improve the burst-erasure protection capability by applying the convolution property to the tTN code, and reduce computational complexity by abrogating the multi-level structure. The simulation results show that cTN code can provide a better packet loss protection performance with lower computation complexity than tTN code.

  4. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  5. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    Chin, Yu-Shan; Mathew, P.M.; Glowa, Glenn; Dickson, Ray; Liang, Zhe; Leitch, Brian; Barber, Duncan; Vasic, Aleks; Bentaib, Ahmed; Journeau, Christophe; Malet, Jeanne; Studer, Etienne; Meynet, Nicolas; Piluso, Pascal; Gelain, Thomas; Michielsen, Nathalie; Peillon, Samuel; Porcheron, Emmanuel; Albiol, Thierry; Clement, Bernard; Sonnenkalb, Martin; Klein-Hessling, Walter; Arndt, Siegfried; Weber, Gunter; Yanez, Jorge; Kotchourko, Alexei; Kuznetsov, Mike; Sangiorgi, Marco; Fontanet, Joan; Herranz, Luis; Garcia De La Rua, Carmen; Santiago, Aleza Enciso; Andreani, Michele; Paladino, Domenico; Dreier, Joerg; Lee, Richard; Amri, Abdallah

    2014-01-01

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  6. Construction of new quantum MDS codes derived from constacyclic codes

    Science.gov (United States)

    Taneja, Divya; Gupta, Manish; Narula, Rajesh; Bhullar, Jaskaran

    Obtaining quantum maximum distance separable (MDS) codes from dual containing classical constacyclic codes using Hermitian construction have paved a path to undertake the challenges related to such constructions. Using the same technique, some new parameters of quantum MDS codes have been constructed here. One set of parameters obtained in this paper has achieved much larger distance than work done earlier. The remaining constructed parameters of quantum MDS codes have large minimum distance and were not explored yet.

  7. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  8. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  9. low bit rate video coding low bit rate video coding

    African Journals Online (AJOL)

    eobe

    Variable length bit rate (VLBR) ariable length bit rate (VLBR) ariable length bit rate (VLBR) broadly encompasses video coding which broadly encompasses video coding which broadly encompasses video coding which mandates a temporal frequency of 10 mandates a temporal frequency of 10 frames per frames per ...

  10. Code Flows : Visualizing Structural Evolution of Source Code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual

  11. The Tap code - a code similar to Morse code for communication by tapping

    OpenAIRE

    Rafler, Stephan

    2013-01-01

    A code is presented for fast, easy and efficient communication over channels that allow only two signal types: a single sound (e.g. a knock), or no sound (i.e. silence). This is a true binary code while Morse code is a ternary code and does not work in such situations. Thus the presented code is more universal than Morse and can be used in much more situations. Additionally it is very tolerant to variations in signal strength or duration. The paper contains various ways in which the code can ...

  12. Quick response codes in Orthodontics

    Directory of Open Access Journals (Sweden)

    Moidin Shakil

    2015-01-01

    Full Text Available Quick response (QR code codes are two-dimensional barcodes, which encodes for a large amount of information. QR codes in Orthodontics are an innovative approach in which patient details, radiographic interpretation, and treatment plan can be encoded. Implementing QR code in Orthodontics will save time, reduces paperwork, and minimizes manual efforts in storage and retrieval of patient information during subsequent stages of treatment.

  13. Bar codes for nuclear safeguards

    International Nuclear Information System (INIS)

    Keswani, A.N.; Bieber, A.M. Jr.

    1983-01-01

    Bar codes similar to those used in supermarkets can be used to reduce the effort and cost of collecting nuclear materials accountability data. A wide range of equipment is now commercially available for printing and reading bar-coded information. Several examples of each of the major types of commercially available equipment are given, and considerations are discussed both for planning systems using bar codes and for choosing suitable bar code equipment

  14. The CORSYS neutronics code system

    International Nuclear Information System (INIS)

    Caner, M.; Krumbein, A.D.; Saphier, D.; Shapira, M.

    1994-01-01

    The purpose of this work is to assemble a code package for LWR core physics including coupled neutronics, burnup and thermal hydraulics. The CORSYS system is built around the cell code WIMS (for group microscopic cross section calculations) and 3-dimension diffusion code CITATION (for burnup and fuel management). We are implementing such a system on an IBM RS-6000 workstation. The code was rested with a simplified model of the Zion Unit 2 PWR. (authors). 6 refs., 8 figs., 1 tabs

  15. The path of code linting

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  16. The FLIC conversion codes

    International Nuclear Information System (INIS)

    Basher, J.C.

    1965-05-01

    This report describes the FORTRAN programmes, FLIC 1 and FLIC 2. These programmes convert programmes coded in one dialect of FORTRAN to another dialect of the same language. FLIC 1 is a general pattern recognition and replacement programme whereas FLIC 2 contains extensions directed towards the conversion of FORTRAN II and S2 programmes to EGTRAN 1 - the dialect now in use on the Winfrith KDF9. FII or S2 statements are replaced where possible by their E1 equivalents; other statements which may need changing are flagged. (author)

  17. Physical Layer Network Coding

    OpenAIRE

    Shengli, Zhang; Liew, Soung-Chang; Lam, Patrick P. K.

    2007-01-01

    A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). This paper shows that the concept of network coding can be applied at the physical layer to turn the b...

  18. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  19. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  20. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...... machinery of algebraic geometry....

  1. Network Coding Over The 232

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Heide, Janus; Vingelmann, Peter

    2013-01-01

    Creating efficient finite field implementations has been an active research topic for several decades. Many appli- cations in areas such as cryptography, signal processing, erasure coding and now also network coding depend on this research to deliver satisfactory performance. In this paper we...... will be useful in many network coding applications where large field sizes are required....

  2. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  3. Strongly-MDS convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Rosenthal, J; Smarandache, R

    Maximum-distance separable (MDS) convolutional codes have the property that their free distance is maximal among all codes of the same rate and the same degree. In this paper, a class of MDS convolutional codes is introduced whose column distances reach the generalized Singleton bound at the

  4. Geochemical computer codes. A review

    International Nuclear Information System (INIS)

    Andersson, K.

    1987-01-01

    In this report a review of available codes is performed and some code intercomparisons are also discussed. The number of codes treating natural waters (groundwater, lake water, sea water) is large. Most geochemical computer codes treat equilibrium conditions, although some codes with kinetic capability are available. A geochemical equilibrium model consists of a computer code, solving a set of equations by some numerical method and a data base, consisting of thermodynamic data required for the calculations. There are some codes which treat coupled geochemical and transport modeling. Some of these codes solve the equilibrium and transport equations simultaneously while other solve the equations separately from each other. The coupled codes require a large computer capacity and have thus as yet limited use. Three code intercomparisons have been found in literature. It may be concluded that there are many codes available for geochemical calculations but most of them require a user that us quite familiar with the code. The user also has to know the geochemical system in order to judge the reliability of the results. A high quality data base is necessary to obtain a reliable result. The best results may be expected for the major species of natural waters. For more complicated problems, including trace elements, precipitation/dissolution, adsorption, etc., the results seem to be less reliable. (With 44 refs.) (author)

  5. Authorship Attribution of Source Code

    Science.gov (United States)

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  6. Separate Turbo Code and Single Turbo Code Adaptive OFDM Transmissions

    Directory of Open Access Journals (Sweden)

    Burr Alister

    2009-01-01

    Full Text Available Abstract This paper discusses the application of adaptive modulation and adaptive rate turbo coding to orthogonal frequency-division multiplexing (OFDM, to increase throughput on the time and frequency selective channel. The adaptive turbo code scheme is based on a subband adaptive method, and compares two adaptive systems: a conventional approach where a separate turbo code is used for each subband, and a single turbo code adaptive system which uses a single turbo code over all subbands. Five modulation schemes (BPSK, QPSK, 8AMPM, 16QAM, and 64QAM are employed and turbo code rates considered are and . The performances of both systems with high ( and low ( BER targets are compared. Simulation results for throughput and BER show that the single turbo code adaptive system provides a significant improvement.

  7. Separate Turbo Code and Single Turbo Code Adaptive OFDM Transmissions

    Directory of Open Access Journals (Sweden)

    Lei Ye

    2009-01-01

    Full Text Available This paper discusses the application of adaptive modulation and adaptive rate turbo coding to orthogonal frequency-division multiplexing (OFDM, to increase throughput on the time and frequency selective channel. The adaptive turbo code scheme is based on a subband adaptive method, and compares two adaptive systems: a conventional approach where a separate turbo code is used for each subband, and a single turbo code adaptive system which uses a single turbo code over all subbands. Five modulation schemes (BPSK, QPSK, 8AMPM, 16QAM, and 64QAM are employed and turbo code rates considered are 1/2 and 1/3. The performances of both systems with high (10−2 and low (10−4 BER targets are compared. Simulation results for throughput and BER show that the single turbo code adaptive system provides a significant improvement.

  8. Quantum Codes From Cyclic Codes Over The Ring R 2

    International Nuclear Information System (INIS)

    Altinel, Alev; Güzeltepe, Murat

    2016-01-01

    Let R 2 denotes the ring F 2 + μF 2 + υ 2 + μυ F 2 + wF 2 + μwF 2 + υwF 2 + μυwF 2 . In this study, we construct quantum codes from cyclic codes over the ring R 2 , for arbitrary length n, with the restrictions μ 2 = 0, υ 2 = 0, w 2 = 0, μυ = υμ, μw = wμ, υw = wυ and μ (υw) = (μυ) w. Also, we give a necessary and sufficient condition for cyclic codes over R 2 that contains its dual. As a final point, we obtain the parameters of quantum error-correcting codes from cyclic codes over R 2 and we give an example of quantum error-correcting codes form cyclic codes over R 2 . (paper)

  9. Genetic code for sine

    Science.gov (United States)

    Abdullah, Alyasa Gan; Wah, Yap Bee

    2015-02-01

    The computation of the approximate values of the trigonometric sines was discovered by Bhaskara I (c. 600-c.680), a seventh century Indian mathematician and is known as the Bjaskara's I's sine approximation formula. The formula is given in his treatise titled Mahabhaskariya. In the 14th century, Madhava of Sangamagrama, a Kerala mathematician astronomer constructed the table of trigonometric sines of various angles. Madhava's table gives the measure of angles in arcminutes, arcseconds and sixtieths of an arcsecond. The search for more accurate formulas led to the discovery of the power series expansion by Madhava of Sangamagrama (c.1350-c. 1425), the founder of the Kerala school of astronomy and mathematics. In 1715, the Taylor series was introduced by Brook Taylor an English mathematician. If the Taylor series is centered at zero, it is called a Maclaurin series, named after the Scottish mathematician Colin Maclaurin. Some of the important Maclaurin series expansions include trigonometric functions. This paper introduces the genetic code of the sine of an angle without using power series expansion. The genetic code using square root approach reveals the pattern in the signs (plus, minus) and sequence of numbers in the sine of an angle. The square root approach complements the Pythagoras method, provides a better understanding of calculating an angle and will be useful for teaching the concepts of angles in trigonometry.

  10. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  11. Continuous Non-malleable Codes

    DEFF Research Database (Denmark)

    Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus

    2014-01-01

    Non-malleable codes are a natural relaxation of error correcting/ detecting codes that have useful applications in the context of tamper resilient cryptography. Informally, a code is non-malleable if an adversary trying to tamper with an encoding of a given message can only leave it unchanged or ...... applications of non-malleable codes in this setting required to perfectly erase the entire memory after each execution and required the adversary to be restricted in memory. We show that continuous non-malleable codes avoid these restrictions....

  12. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  13. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory text to algebraic coding theory. In the first chapter, you'll gain inside knowledge of coding fundamentals, which is essential for a deeper understanding of state-of-the-art coding systems. This book is a quick reference for those who are unfamiliar with this topic, as well as for use with specific applications such as cryptography and communication. Linear error-correcting block codes through elementary principles span eleven chapters of the text. Cyclic codes, some finite field algebra, Goppa codes, algebraic decoding algorithms, and applications in public-key cryptography and secret-key cryptography are discussed, including problems and solutions at the end of each chapter. Three appendices cover the Gilbert bound and some related derivations, a derivation of the Mac- Williams' identities based on the probability of undetected error, and two important tools for algebraic decoding-namely, the finite field Fourier transform and the Euclidean algorithm f...

  14. Introduction of SCIENCE code package

    International Nuclear Information System (INIS)

    Lu Haoliang; Li Jinggang; Zhu Ya'nan; Bai Ning

    2012-01-01

    The SCIENCE code package is a set of neutronics tools based on 2D assembly calculations and 3D core calculations. It is made up of APOLLO2F, SMART and SQUALE and used to perform the nuclear design and loading pattern analysis for the reactors on operation or under construction of China Guangdong Nuclear Power Group. The purpose of paper is to briefly present the physical and numerical models used in each computation codes of the SCIENCE code pack age, including the description of the general structure of the code package, the coupling relationship of APOLLO2-F transport lattice code and SMART core nodal code, and the SQUALE code used for processing the core maps. (authors)

  15. Galois LCD Codes over Finite Fields

    OpenAIRE

    Liu, Xiusheng; Fan, Yun; Liu, Hualu

    2017-01-01

    In this paper, we study the complementary dual codes in more general setting (which are called Galois LCD codes) by a uniform method. A necessary and sufficient condition for linear codes to be Galois LCD codes is determined, and constacyclic codes to be Galois LCD codes are characterized. Some illustrative examples which constacyclic codes are Galois LCD MDS codes are provided as well. In particular, we study Hermitian LCD constacyclic codes. Finally, we present a construction of a class of ...

  16. GOC: General Orbit Code

    International Nuclear Information System (INIS)

    Maddox, L.B.; McNeilly, G.S.

    1979-08-01

    GOC (General Orbit Code) is a versatile program which will perform a variety of calculations relevant to isochronous cyclotron design studies. In addition to the usual calculations of interest (e.g., equilibrium and accelerated orbits, focusing frequencies, field isochronization, etc.), GOC has a number of options to calculate injections with a charge change. GOC provides both printed and plotted output, and will follow groups of particles to allow determination of finite-beam properties. An interactive PDP-10 program called GIP, which prepares input data for GOC, is available. GIP is a very easy and convenient way to prepare complicated input data for GOC. Enclosed with this report are several microfiche containing source listings of GOC and other related routines and the printed output from a multiple-option GOC run

  17. Code des baux 2018

    CERN Document Server

    Vial-Pedroletti, Béatrice; Kendérian, Fabien; Chavance, Emmanuelle; Coutan-Lapalus, Christelle

    2017-01-01

    Le code des baux 2018 vous offre un contenu extrêmement pratique, fiable et à jour au 1er août 2017. Cette 16e édition intègre notamment : le décret du 27 juillet 2017 relatif à l’évolution de certains loyers dans le cadre d’une nouvelle location ou d’un renouvellement de bail, pris en application de l’article 18 de la loi n° 89-462 du 6 juillet 1989 ; la loi du 27 janvier 2017 relative à l’égalité et à la citoyenneté ; la loi du 9 décembre 2016 relative à la transparence, à la lutte contre la corruption et à la modernisation de la vie économique ; la loi du 18 novembre 2016 de modernisation de la justice du xxie siècle

  18. Entanglement-assisted quantum MDS codes from negacyclic codes

    Science.gov (United States)

    Lu, Liangdong; Li, Ruihu; Guo, Luobin; Ma, Yuena; Liu, Yang

    2018-03-01

    The entanglement-assisted formalism generalizes the standard stabilizer formalism, which can transform arbitrary classical linear codes into entanglement-assisted quantum error-correcting codes (EAQECCs) by using pre-shared entanglement between the sender and the receiver. In this work, we construct six classes of q-ary entanglement-assisted quantum MDS (EAQMDS) codes based on classical negacyclic MDS codes by exploiting two or more pre-shared maximally entangled states. We show that two of these six classes q-ary EAQMDS have minimum distance more larger than q+1. Most of these q-ary EAQMDS codes are new in the sense that their parameters are not covered by the codes available in the literature.

  19. Diagonal Eigenvalue Unity (DEU) code for spectral amplitude coding-optical code division multiple access

    Science.gov (United States)

    Ahmed, Hassan Yousif; Nisar, K. S.

    2013-08-01

    Code with ideal in-phase cross correlation (CC) and practical code length to support high number of users are required in spectral amplitude coding-optical code division multiple access (SAC-OCDMA) systems. SAC systems are getting more attractive in the field of OCDMA because of its ability to eliminate the influence of multiple access interference (MAI) and also suppress the effect of phase induced intensity noise (PIIN). In this paper, we have proposed new Diagonal Eigenvalue Unity (DEU) code families with ideal in-phase CC based on Jordan block matrix with simple algebraic ways. Four sets of DEU code families based on the code weight W and number of users N for the combination (even, even), (even, odd), (odd, odd) and (odd, even) are constructed. This combination gives DEU code more flexibility in selection of code weight and number of users. These features made this code a compelling candidate for future optical communication systems. Numerical results show that the proposed DEU system outperforms reported codes. In addition, simulation results taken from a commercial optical systems simulator, Virtual Photonic Instrument (VPI™) shown that, using point to multipoint transmission in passive optical network (PON), DEU has better performance and could support long span with high data rate.

  20. Selection of Code and Interleaver for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1998-01-01

    The selection of component codes for turbo coding has often been based on the performance at high SNR's. However, we will argue that the selection mainly should be based on the performance at low SNR's, i.e. the convergence properties. Further, we will present a way to construct interleavers...... that significantly improve the performance of the turbo coding scheme at high SNR's, i.e. lowers the error floor...

  1. Stochastic Decoding of Turbo Codes

    OpenAIRE

    Dong , Q. T.; ARZEL , Matthieu; Jego , Christophe; Gross , W. J.

    2010-01-01

    International audience; Stochastic computation is a technique in which operations on probabilities are performed on random bit streams. Stochastic decoding of forward error-correction (FEC) codes is inspired by this technique. This paper extends the application of the stochastic decoding approach to the families of convolutional codes and turbo codes. It demonstrates that stochastic computation is a promising solution to improve the data throughput of turbo decoders with very simple implement...

  2. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four...... are optimal or best known for their parameters. In chapter five we study some graph codes with Reed–Solomon component codes. The underlying graph is well known and widely used for its good characteristics. This helps us to compute the dimension of the graph codes. We also introduce a combinatorial concept...... related to the iterative encoding of graph codes with MDS component code. The last chapter deals with affine Grassmann codes and Grassmann codes. We begin with some previously known codes and prove that they are also Tanner codes of the incidence graph of the point–line partial geometry...

  3. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  4. Ultrasound imaging using coded signals

    DEFF Research Database (Denmark)

    Misaridis, Athanasios

    coded excitation can be used for increasing the frame rate. The work includes both simulated results using Field II, and experimental results based on measurements on phantoms as well as clinical images. Initially a mathematical foundation of signal modulation is given. Pulse compression based...... is described. Application of coded excitation in array imaging is evaluated through simulations in Field II. The low degree of the orthogonality among coded signals for ultrasound systems is first discussed, and the effect of mismatched filtering in the cross-correlation properties of the signals is evaluated...... emissions. Finally, a novel coding technique which uses pulse train excitation is presented....

  5. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions...... with a maximal number of -rational points for a given spanning dimension. We study the case and give a conjecture for general . We also define Schubert union codes in general, and study the parameters and support weights of these codes....

  6. High Order Modulation Protograph Codes

    Science.gov (United States)

    Nguyen, Thuy V. (Inventor); Nosratinia, Aria (Inventor); Divsalar, Dariush (Inventor)

    2014-01-01

    Digital communication coding methods for designing protograph-based bit-interleaved code modulation that is general and applies to any modulation. The general coding framework can support not only multiple rates but also adaptive modulation. The method is a two stage lifting approach. In the first stage, an original protograph is lifted to a slightly larger intermediate protograph. The intermediate protograph is then lifted via a circulant matrix to the expected codeword length to form a protograph-based low-density parity-check code.

  7. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  8. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  9. Coded aperture tomography revisited

    International Nuclear Information System (INIS)

    Bizais, Y.; Rowe, R.W.; Zubal, I.G.; Bennett, G.W.; Brill, A.B.

    1983-01-01

    Coded aperture (CA) Tomography never achieved wide spread use in Nuclear Medicine, except for the degenerate case of Seven Pinhole tomagraphy (7PHT). However it enjoys several attractive features (high sensitivity and tomographic ability with a statis detector). On the other hand, resolution is usually poor especially along the depth axis and the reconstructed volume is rather limited. Arguments are presented justifying the position that CA tomography can be useful for imaging time-varying 3D structures, if its major drawbacks (poor longitudinal resolution and difficulty in quantification) are overcome. Poor results obtained with 7PHT can be explained by both a very limited angular range sampled and a crude modelling of the image formation process. Therefore improvements can be expected by the use of a dual-detector system, along with a better understanding of its sampling properties and the use of more powerful reconstruction algorithms. Non overlapping multipinhole plates, because they do not involve a decoding procedure, should be considered first for practical applications. Use of real CA should be considered for cases in which non overlapping multipinhole plates do not lead to satisfactory solutions. We have been and currently are carrying out theoretical and experimental works, in order to define the factors which limit CA imaging and to propose satisfactory solutions for Dynamic Emission Tomography

  10. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-04-11

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaickingand 4D light field view synthesis.

  11. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-12-01

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high-dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaicing and 4D light field view synthesis.

  12. Computer code abstract: NESTLE

    International Nuclear Information System (INIS)

    Turinsky, P.J.; Al-Chalabi, R.M.K.; Engrand, P.; Sarsour, H.N.; Faure, F.X.; Guo, W.

    1995-01-01

    NESTLE is a few-group neutron diffusion equation solver utilizing the nodal expansion method (NEM) for eigenvalue, adjoint, and fixed-source steady-state and transient problems. The NESTLE code solve the eigenvalue (criticality), eigenvalue adjoint, external fixed-source steady-state, and external fixed-source or eigenvalue initiated transient problems. The eigenvalue problem allows criticality searches to be completed, and the external fixed-source steady-state problem can search to achieve a specified power level. Transient problems model delayed neutrons via precursor groups. Several core properties can be input as time dependent. Two- or four-energy groups can be utilized, with all energy groups being thermal groups (i.e., upscatter exits) is desired. Core geometries modeled include Cartesian and hexagonal. Three-, two-, and one-dimensional models can be utilized with various symmetries. The thermal conditions predicted by the thermal-hydraulic model of the core are used to correct cross sections for temperature and density effects. Cross sections for temperature and density effects. Cross sections are parameterized by color, control rod state (i.e., in or out), and burnup, allowing fuel depletion to be modeled. Either a macroscopic or microscopic model may be employed

  13. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    In 1948, C. Shannon developed fundamental limits on the efficiency of communication over noisy channels. However it is only in 1993 (about half a century later) that Berrou, Glavieux and Thitimajshima developed turbo codes and demonstrated performance close to that limit. Overnight, much of the algebraic coding ...

  14. Allele coding in genomic evaluation

    Directory of Open Access Journals (Sweden)

    Christensen Ole F

    2011-06-01

    Full Text Available Abstract Background Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. Results Theoretical derivations showed that parameter estimates and estimated marker effects in marker-based models are the same irrespective of the allele coding, provided that the model has a fixed general mean. For the equivalent models, the same results hold, even though different allele coding methods lead to different genomic relationship matrices. Calculated genomic breeding values are independent of allele coding when the estimate of the general mean is included into the values. Reliabilities of estimated genomic breeding values calculated using elements of the inverse of the coefficient matrix depend on the allele coding because different allele coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being

  15. MARS Code in Linux Environment

    International Nuclear Information System (INIS)

    Hwang, Moon Kyu; Bae, Sung Won; Jung, Jae Joon; Chung, Bub Dong

    2005-01-01

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  16. Civil Code, 11 December 1987.

    Science.gov (United States)

    1988-01-01

    Article 162 of this Mexican Code provides, among other things, that "Every person has the right freely, responsibly, and in an informed fashion to determine the number and spacing of his or her children." When a marriage is involved, this right is to be observed by the spouses "in agreement with each other." The civil codes of the following states contain the same provisions: 1) Baja California (Art. 159 of the Civil Code of 28 April 1972 as revised in Decree No. 167 of 31 January 1974); 2) Morelos (Art. 255 of the Civil Code of 26 September 1949 as revised in Decree No. 135 of 29 December 1981); 3) Queretaro (Art. 162 of the Civil Code of 29 December 1950 as revised in the Act of 9 January 1981); 4) San Luis Potosi (Art. 147 of the Civil Code of 24 March 1946 as revised in 13 June 1978); Sinaloa (Art. 162 of the Civil Code of 18 June 1940 as revised in Decree No. 28 of 14 October 1975); 5) Tamaulipas (Art. 146 of the Civil Code of 21 November 1960 as revised in Decree No. 20 of 30 April 1975); 6) Veracruz-Llave (Art. 98 of the Civil Code of 1 September 1932 as revised in the Act of 30 December 1975); and 7) Zacatecas (Art. 253 of the Civil Code of 9 February 1965 as revised in Decree No. 104 of 13 August 1975). The Civil Codes of Puebla and Tlaxcala provide for this right only in the context of marriage with the spouses in agreement. See Art. 317 of the Civil Code of Puebla of 15 April 1985 and Article 52 of the Civil Code of Tlaxcala of 31 August 1976 as revised in Decree No. 23 of 2 April 1984. The Family Code of Hidalgo requires as a formality of marriage a certification that the spouses are aware of methods of controlling fertility, responsible parenthood, and family planning. In addition, Article 22 the Civil Code of the Federal District provides that the legal capacity of natural persons is acquired at birth and lost at death; however, from the moment of conception the individual comes under the protection of the law, which is valid with respect to the

  17. MARS Code in Linux Environment

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, Moon Kyu; Bae, Sung Won; Jung, Jae Joon; Chung, Bub Dong [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2005-07-01

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  18. Coding in pigeons: Multiple-coding versus single-code/default strategies.

    Science.gov (United States)

    Pinto, Carlos; Machado, Armando

    2015-05-01

    To investigate the coding strategies that pigeons may use in a temporal discrimination tasks, pigeons were trained on a matching-to-sample procedure with three sample durations (2s, 6s and 18s) and two comparisons (red and green hues). One comparison was correct following 2-s samples and the other was correct following both 6-s and 18-s samples. Tests were then run to contrast the predictions of two hypotheses concerning the pigeons' coding strategies, the multiple-coding and the single-code/default. According to the multiple-coding hypothesis, three response rules are acquired, one for each sample. According to the single-code/default hypothesis, only two response rules are acquired, one for the 2-s sample and a "default" rule for any other duration. In retention interval tests, pigeons preferred the "default" key, a result predicted by the single-code/default hypothesis. In no-sample tests, pigeons preferred the key associated with the 2-s sample, a result predicted by multiple-coding. Finally, in generalization tests, when the sample duration equaled 3.5s, the geometric mean of 2s and 6s, pigeons preferred the key associated with the 6-s and 18-s samples, a result predicted by the single-code/default hypothesis. The pattern of results suggests the need for models that take into account multiple sources of stimulus control. © Society for the Experimental Analysis of Behavior.

  19. Cyclic codes of length 2

    Indian Academy of Sciences (India)

    Springer Verlag Heidelberg #4 2048 1996 Dec 15 10:16:45

    [X]/〈X2m. − 1〉 are given. Cyclic codes of length 2m over the finite field Fq, of odd characteristic, are defined in terms of their generator polynomials. The exact minimum distance and the dimension of the codes are obtained. Keywords.

  20. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  1. NETWORK CODING BY BEAM FORMING

    DEFF Research Database (Denmark)

    2013-01-01

    Network coding by beam forming in networks, for example, in single frequency networks, can provide aid in increasing spectral efficiency. When network coding by beam forming and user cooperation are combined, spectral efficiency gains may be achieved. According to certain embodiments, a method...

  2. On Network Coded Filesystem Shim

    DEFF Research Database (Denmark)

    Sørensen, Chres Wiant; Roetter, Daniel Enrique Lucani; Médard, Muriel

    2017-01-01

    benefits to any application in a computer. However, incorporating new protocols to the Internet is a challenging and slow process. Second, deploying coding at the application layer, which forces each application to implement network coding. This paper proposes an alternative approach through the use...

  3. LFSC - Linac Feedback Simulation Code

    Energy Technology Data Exchange (ETDEWEB)

    Ivanov, Valentin; /Fermilab

    2008-05-01

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  4. The reactor dynamic code RETRANS

    International Nuclear Information System (INIS)

    Kamelander, G.; Woloch, F.; Sdouz, G.; Koinig, H.

    1984-08-01

    This report gives a general view on the reactor dynamic code RETRANS. The subroutines and common-blocks are described in detail to facilitate code-modifications and improvements of physical models or numerical methods. Furthermore the report contains an users guide. Finally some test examples are given. The physical meaning of the results is discussed. (Author) [de

  5. Flow Analysis of Code Customizations

    DEFF Research Database (Denmark)

    Hessellund, Anders; Sestoft, Peter

    2008-01-01

    Inconsistency between metadata and code customizations is a major concern in modern, configurable enterprise systems. The increasing reliance on metadata, in the form of XML files, and code customizations, in the form of Java files, has led to a hybrid development platform. The expected consistency...

  6. Survey of coded aperture imaging

    International Nuclear Information System (INIS)

    Barrett, H.H.

    1975-01-01

    The basic principle and limitations of coded aperture imaging for x-ray and gamma cameras are discussed. Current trends include (1) use of time varying apertures, (2) use of ''dilute'' apertures with transmission much less than 50%, and (3) attempts to derive transverse tomographic sections, unblurred by other planes, from coded images

  7. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...

  8. Recommendations for ECG diagnostic coding

    NARCIS (Netherlands)

    Bonner, R.E.; Caceres, C.A.; Cuddy, T.E.; Meijler, F.L.; Milliken, J.A.; Rautaharju, P.M.; Robles de Medina, E.O.; Willems, J.L.; Wolf, H.K.; Working Group 'Diagnostic Codes'

    1978-01-01

    The Oxford dictionary defines code as "a body of laws so related to each other as to avoid inconsistency and overlapping". It is obvious that natural language with its high degree of ambiguity does not qualify as a code in the sense of this definition. Everyday experiences provide ample evidence

  9. Error correcting coding for OTN

    DEFF Research Database (Denmark)

    Justesen, Jørn; Larsen, Knud J.; Pedersen, Lars A.

    2010-01-01

    Forward error correction codes for 100 Gb/s optical transmission are currently receiving much attention from transport network operators and technology providers. We discuss the performance of hard decision decoding using product type codes that cover a single OTN frame or a small number...

  10. Accelerator Physics Code Web Repository

    CERN Document Server

    Zimmermann, Frank; Bellodi, G; Benedetto, E; Dorda, U; Giovannozzi, Massimo; Papaphilippou, Y; Pieloni, T; Ruggiero, F; Rumolo, G; Schmidt, F; Todesco, E; Zotter, Bruno W; Payet, J; Bartolini, R; Farvacque, L; Sen, T; Chin, Y H; Ohmi, K; Oide, K; Furman, M; Qiang, J; Sabbi, G L; Seidl, P A; Vay, J L; Friedman, A; Grote, D P; Cousineau, S M; Danilov, V; Holmes, J A; Shishlo, A; Kim, E S; Cai, Y; Pivi, M; Kaltchev, D I; Abell, D T; Katsouleas, Thomas C; Boine-Frankenheim, O; Franchetti, G; Hofmann, I; Machida, S; Wei, J

    2006-01-01

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic acceleratorphysics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  11. Distributed space-time coding

    CERN Document Server

    Jing, Yindi

    2014-01-01

    Distributed Space-Time Coding (DSTC) is a cooperative relaying scheme that enables high reliability in wireless networks. This brief presents the basic concept of DSTC, its achievable performance, generalizations, code design, and differential use. Recent results on training design and channel estimation for DSTC and the performance of training-based DSTC are also discussed.

  12. What Froze the Genetic Code?

    Science.gov (United States)

    Ribas de Pouplana, Lluís; Torres, Adrian Gabriel; Rafels-Ybern, Àlbert

    2017-04-05

    The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  13. What Froze the Genetic Code?

    Directory of Open Access Journals (Sweden)

    Lluís Ribas de Pouplana

    2017-04-01

    Full Text Available The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  14. Non-Protein Coding RNAs

    CERN Document Server

    Walter, Nils G; Batey, Robert T

    2009-01-01

    This book assembles chapters from experts in the Biophysics of RNA to provide a broadly accessible snapshot of the current status of this rapidly expanding field. The 2006 Nobel Prize in Physiology or Medicine was awarded to the discoverers of RNA interference, highlighting just one example of a large number of non-protein coding RNAs. Because non-protein coding RNAs outnumber protein coding genes in mammals and other higher eukaryotes, it is now thought that the complexity of organisms is correlated with the fraction of their genome that encodes non-protein coding RNAs. Essential biological processes as diverse as cell differentiation, suppression of infecting viruses and parasitic transposons, higher-level organization of eukaryotic chromosomes, and gene expression itself are found to largely be directed by non-protein coding RNAs. The biophysical study of these RNAs employs X-ray crystallography, NMR, ensemble and single molecule fluorescence spectroscopy, optical tweezers, cryo-electron microscopy, and ot...

  15. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  16. Detecting non-coding selective pressure in coding regions

    Directory of Open Access Journals (Sweden)

    Blanchette Mathieu

    2007-02-01

    Full Text Available Abstract Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements.

  17. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... results on DVC show that the LDPCA perfomance implies a loss compared to the conditional entropy, but also that the proposed scheme reduces the DVC bit rate up to 3.9% and improves the rate-distortion (RD) performance of a Transform Domain Wyner-Ziv (TDWZ) video codec....

  18. ESCADRE and ICARE code systems

    International Nuclear Information System (INIS)

    Reocreux, M.; Gauvain, J.

    1992-01-01

    The French sever accident code development program is following two parallel approaches: the first one is dealing with ''integral codes'' which are designed for giving immediate engineer answers, the second one is following a more mechanistic way in order to have the capability of detailed analysis of experiments, in order to get a better understanding of the scaling problem and reach a better confidence in plant calculations. In the first approach a complete system has been developed and is being used for practical cases: this is the ESCADRE system. In the second approach, a set of codes dealing first with primary circuit is being developed: a mechanistic core degradation code, ICARE, has been issued and is being coupled with the advanced thermalhydraulic code CATHARE. Fission product codes have been also coupled to CATHARE. The ''integral'' ESCADRE system and the mechanistic ICARE and associated codes are described. Their main characteristics are reviewed and the status of their development and assessment given. Future studies are finally discussed. 36 refs, 4 figs, 1 tab

  19. LFSC - Linac Feedback Simulation Code

    International Nuclear Information System (INIS)

    Ivanov, Valentin; Fermilab

    2008-01-01

    The computer program LFSC ( ) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output

  20. The Flutter Shutter Code Calculator

    Directory of Open Access Journals (Sweden)

    Yohann Tendero

    2015-08-01

    Full Text Available The goal of the flutter shutter is to make uniform motion blur invertible, by a"fluttering" shutter that opens and closes on a sequence of well chosen sub-intervals of the exposure time interval. In other words, the photon flux is modulated according to a well chosen sequence calledflutter shutter code. This article provides a numerical method that computes optimal flutter shutter codes in terms of mean square error (MSE. We assume that the observed objects follow a known (or learned random velocity distribution. In this paper, Gaussian and uniform velocity distributions are considered. Snapshots are also optimized taking the velocity distribution into account. For each velocity distribution, the gain of the optimal flutter shutter code with respectto the optimal snapshot in terms of MSE is computed. This symmetric optimization of theflutter shutter and of the snapshot allows to compare on an equal footing both solutions, i.e. camera designs. Optimal flutter shutter codes are demonstrated to improve substantially the MSE compared to classic (patented or not codes. A numerical method that permits to perform a reverse engineering of any existing (patented or not flutter shutter codes is also describedand an implementation is given. In this case we give the underlying velocity distribution fromwhich a given optimal flutter shutter code comes from. The combination of these two numerical methods furnishes a comprehensive study of the optimization of a flutter shutter that includes a forward and a backward numerical solution.

  1. The ZPIC educational code suite

    Science.gov (United States)

    Calado, R.; Pardal, M.; Ninhos, P.; Helm, A.; Mori, W. B.; Decyk, V. K.; Vieira, J.; Silva, L. O.; Fonseca, R. A.

    2017-10-01

    Particle-in-Cell (PIC) codes are used in almost all areas of plasma physics, such as fusion energy research, plasma accelerators, space physics, ion propulsion, and plasma processing, and many other areas. In this work, we present the ZPIC educational code suite, a new initiative to foster training in plasma physics using computer simulations. Leveraging on our expertise and experience from the development and use of the OSIRIS PIC code, we have developed a suite of 1D/2D fully relativistic electromagnetic PIC codes, as well as 1D electrostatic. These codes are self-contained and require only a standard laptop/desktop computer with a C compiler to be run. The output files are written in a new file format called ZDF that can be easily read using the supplied routines in a number of languages, such as Python, and IDL. The code suite also includes a number of example problems that can be used to illustrate several textbook and advanced plasma mechanisms, including instructions for parameter space exploration. We also invite contributions to this repository of test problems that will be made freely available to the community provided the input files comply with the format defined by the ZPIC team. The code suite is freely available and hosted on GitHub at https://github.com/zambzamb/zpic. Work partially supported by PICKSC.

  2. Continuous-variable topological codes

    Science.gov (United States)

    Morimae, Tomoyuki

    2013-10-01

    Topological code is a stabilizer quantum error correcting code whose generators are local but logical operators are topologically nontrivial and nonlocal. It offers interesting features such as the homological deformations of string operators and anyonic excitations on it. Topological codes are also closely related to the “topological order,” which has been an important concept in condensed-matter physics. In this paper, we consider continuous-variable versions of topological codes, including the toric code by Kitaev [A. Y. Kitaev, Ann. Phys.APNYA60003-491610.1016/S0003-4916(02)00018-0 303, 2 (2003)] with a single type of stabilizer on the checkerboard lattice, and the color code by Bombin and Martin-Delgado [H. Bombin and M. A. Martin-Delgado, Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.97.180501 97, 180501 (2006)]. We show that it is possible to consider continuous-variable analog of these topological codes.

  3. Coded communications with nonideal interleaving

    Science.gov (United States)

    Laufer, Shaul

    1991-02-01

    Burst error channels - a type of block interference channels - feature increasing capacity but decreasing cutoff rate as the memory rate increases. Despite the large capacity, there is degradation in the performance of practical coding schemes when the memory length is excessive. A short-coding error parameter (SCEP) was introduced, which expresses a bound on the average decoding-error probability for codes shorter than the block interference length. The performance of a coded slow frequency-hopping communication channel is analyzed for worst-case partial band jamming and nonideal interleaving, by deriving expressions for the capacity and cutoff rate. The capacity and cutoff rate, respectively, are shown to approach and depart from those of a memoryless channel corresponding to the transmission of a single code letter per hop. For multiaccess communications over a slot-synchronized collision channel without feedback, the channel was considered as a block interference channel with memory length equal to the number of letters transmitted in each slot. The effects of an asymmetrical background noise and a reduced collision error rate were studied, as aspects of real communications. The performance of specific convolutional and Reed-Solomon codes was examined for slow frequency-hopping systems with nonideal interleaving. An upper bound is presented for the performance of a Viterbi decoder for a convolutional code with nonideal interleaving, and a soft decision diversity combining technique is introduced.

  4. GAMERA - The New Magnetospheric Code

    Science.gov (United States)

    Lyon, J.; Sorathia, K.; Zhang, B.; Merkin, V. G.; Wiltberger, M. J.; Daldorff, L. K. S.

    2017-12-01

    The Lyon-Fedder-Mobarry (LFM) code has been a main-line magnetospheric simulation code for 30 years. The code base, designed in the age of memory to memory vector ma- chines,is still in wide use for science production but needs upgrading to ensure the long term sustainability. In this presentation, we will discuss our recent efforts to update and improve that code base and also highlight some recent results. The new project GAM- ERA, Grid Agnostic MHD for Extended Research Applications, has kept the original design characteristics of the LFM and made significant improvements. The original de- sign included high order numerical differencing with very aggressive limiting, the ability to use arbitrary, but logically rectangular, grids, and maintenance of div B = 0 through the use of the Yee grid. Significant improvements include high-order upwinding and a non-clipping limiter. One other improvement with wider applicability is an im- proved averaging technique for the singularities in polar and spherical grids. The new code adopts a hybrid structure - multi-threaded OpenMP with an overarching MPI layer for large scale and coupled applications. The MPI layer uses a combination of standard MPI and the Global Array Toolkit from PNL to provide a lightweight mechanism for coupling codes together concurrently. The single processor code is highly efficient and can run magnetospheric simulations at the default CCMC resolution faster than real time on a MacBook pro. We have run the new code through the Athena suite of tests, and the results compare favorably with the codes available to the astrophysics community. LFM/GAMERA has been applied to many different situations ranging from the inner and outer heliosphere and magnetospheres of Venus, the Earth, Jupiter and Saturn. We present example results the Earth's magnetosphere including a coupled ring current (RCM), the magnetospheres of Jupiter and Saturn, and the inner heliosphere.

  5. SCALE Code System

    Energy Technology Data Exchange (ETDEWEB)

    Jessee, Matthew Anderson [ORNL

    2016-04-01

    The SCALE Code System is a widely-used modeling and simulation suite for nuclear safety analysis and design that is developed, maintained, tested, and managed by the Reactor and Nuclear Systems Division (RNSD) of Oak Ridge National Laboratory (ORNL). SCALE provides a comprehensive, verified and validated, user-friendly tool set for criticality safety, reactor and lattice physics, radiation shielding, spent fuel and radioactive source term characterization, and sensitivity and uncertainty analysis. Since 1980, regulators, licensees, and research institutions around the world have used SCALE for safety analysis and design. SCALE provides an integrated framework with dozens of computational modules including three deterministic and three Monte Carlo radiation transport solvers that are selected based on the desired solution strategy. SCALE includes current nuclear data libraries and problem-dependent processing tools for continuous-energy (CE) and multigroup (MG) neutronics and coupled neutron-gamma calculations, as well as activation, depletion, and decay calculations. SCALE includes unique capabilities for automated variance reduction for shielding calculations, as well as sensitivity and uncertainty analysis. SCALE’s graphical user interfaces assist with accurate system modeling, visualization of nuclear data, and convenient access to desired results.SCALE 6.2 provides many new capabilities and significant improvements of existing features.New capabilities include:• ENDF/B-VII.1 nuclear data libraries CE and MG with enhanced group structures,• Neutron covariance data based on ENDF/B-VII.1 and supplemented with ORNL data,• Covariance data for fission product yields and decay constants,• Stochastic uncertainty and correlation quantification for any SCALE sequence with Sampler,• Parallel calculations with KENO,• Problem-dependent temperature corrections for CE calculations,• CE shielding and criticality accident alarm system analysis with MAVRIC,• CE

  6. Code-Mixing and Code Switchingin The Process of Learning

    Directory of Open Access Journals (Sweden)

    Diyah Atiek Mustikawati

    2016-09-01

    Full Text Available This study aimed to describe a form of code switching and code mixing specific form found in the teaching and learning activities in the classroom as well as determining factors influencing events stand out that form of code switching and code mixing in question.Form of this research is descriptive qualitative case study which took place in Al Mawaddah Boarding School Ponorogo. Based on the analysis and discussion that has been stated in the previous chapter that the form of code mixing and code switching learning activities in Al Mawaddah Boarding School is in between the use of either language Java language, Arabic, English and Indonesian, on the use of insertion of words, phrases, idioms, use of nouns, adjectives, clauses, and sentences. Code mixing deciding factor in the learning process include: Identification of the role, the desire to explain and interpret, sourced from the original language and its variations, is sourced from a foreign language. While deciding factor in the learning process of code, includes: speakers (O1, partners speakers (O2, the presence of a third person (O3, the topic of conversation, evoke a sense of humour, and just prestige. The significance of this study is to allow readers to see the use of language in a multilingual society, especially in AL Mawaddah boarding school about the rules and characteristics variation in the language of teaching and learning activities in the classroom. Furthermore, the results of this research will provide input to the ustadz / ustadzah and students in developing oral communication skills and the effectiveness of teaching and learning strategies in boarding schools.

  7. Validating accident consequence assessment codes

    International Nuclear Information System (INIS)

    Viktorsson, C.; Kelly, G.N.; Nixon, W.

    1993-01-01

    The main objective of the study was to compare the predictions of participating codes for a range of postulated accidental releases and to assess the significance of any differences observed. Seven codes from various countries participated in the exercise: ARANO (Finland), CONDOR (UK), COSYMA (CEC), LENA (Sweden), MACCS (USA), MECA2 (Spain) and OSCAAR (Japan). They calculated a wide range of consequences, for example: collective doses, early and late health effects, economic costs and the effect of countermeasures on people and agriculture. In each case, the probability distributions predicted by the codes were compared. (author)

  8. State building energy codes status

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-09-01

    This document contains the State Building Energy Codes Status prepared by Pacific Northwest National Laboratory for the U.S. Department of Energy under Contract DE-AC06-76RL01830 and dated September 1996. The U.S. Department of Energy`s Office of Codes and Standards has developed this document to provide an information resource for individuals interested in energy efficiency of buildings and the relevant building energy codes in each state and U.S. territory. This is considered to be an evolving document and will be updated twice a year. In addition, special state updates will be issued as warranted.

  9. LiveCode mobile development

    CERN Document Server

    Lavieri, Edward D

    2013-01-01

    A practical guide written in a tutorial-style, ""LiveCode Mobile Development Hotshot"" walks you step-by-step through 10 individual projects. Every project is divided into sub tasks to make learning more organized and easy to follow along with explanations, diagrams, screenshots, and downloadable material.This book is great for anyone who wants to develop mobile applications using LiveCode. You should be familiar with LiveCode and have access to a smartphone. You are not expected to know how to create graphics or audio clips.

  10. Studies on DANESS Code Modeling

    International Nuclear Information System (INIS)

    Jeong, Chang Joon

    2009-09-01

    The DANESS code modeling study has been performed. DANESS code is widely used in a dynamic fuel cycle analysis. Korea Atomic Energy Research Institute (KAERI) has used the DANESS code for the Korean national nuclear fuel cycle scenario analysis. In this report, the important models such as Energy-demand scenario model, New Reactor Capacity Decision Model, Reactor and Fuel Cycle Facility History Model, and Fuel Cycle Model are investigated. And, some models in the interface module are refined and inserted for Korean nuclear fuel cycle model. Some application studies have also been performed for GNEP cases and for US fast reactor scenarios with various conversion ratios

  11. Linear network error correction coding

    CERN Document Server

    Guang, Xuan

    2014-01-01

    There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most important contributions following the classic approach, which represents messages by sequences?similar to algebraic coding,?and also briefly discuss the main results following the?other approach,?that uses the theory of rank metric codes for network error correction of representing messages by subspaces. This book starts by establishing the basic linear network error correction (LNEC) model and then characterizes two equivalent descriptions. Distances an

  12. Network Coding Fundamentals and Applications

    CERN Document Server

    Medard, Muriel

    2011-01-01

    Network coding is a field of information and coding theory and is a method of attaining maximum information flow in a network. This book is an ideal introduction for the communications and network engineer, working in research and development, who needs an intuitive introduction to network coding and to the increased performance and reliability it offers in many applications. This book is an ideal introduction for the research and development communications and network engineer who needs an intuitive introduction to the theory and wishes to understand the increased performance and reliabil

  13. Writing the Live Coding Book

    DEFF Research Database (Denmark)

    Blackwell, Alan; Cox, Geoff; Lee, Sang Wong

    2016-01-01

    This paper is a speculation on the relationship between coding and writing, and the ways in which technical innovations and capabilities enable us to rethink each in terms of the other. As a case study, we draw on recent experiences of preparing a book on live coding, which integrates a wide range...... of personal, historical, technical and critical perspectives. This book project has been both experimental and reflective, in a manner that allows us to draw on critical understanding of both code and writing, and point to the potential for new practices in the future....

  14. Iterative nonlinear unfolding code: TWOGO

    International Nuclear Information System (INIS)

    Hajnal, F.

    1981-03-01

    a new iterative unfolding code, TWOGO, was developed to analyze Bonner sphere neutron measurements. The code includes two different unfolding schemes which alternate on successive iterations. The iterative process can be terminated either when the ratio of the coefficient of variations in terms of the measured and calculated responses is unity, or when the percentage difference between the measured and evaluated sphere responses is less than the average measurement error. The code was extensively tested with various known spectra and real multisphere neutron measurements which were performed inside the containments of pressurized water reactors

  15. Beam-dynamics codes used at DARHT

    Energy Technology Data Exchange (ETDEWEB)

    Ekdahl, Jr., Carl August [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-01

    Several beam simulation codes are used to help gain a better understanding of beam dynamics in the DARHT LIAs. The most notable of these fall into the following categories: for beam production – Tricomp Trak orbit tracking code, LSP Particle in cell (PIC) code, for beam transport and acceleration – XTR static envelope and centroid code, LAMDA time-resolved envelope and centroid code, LSP-Slice PIC code, for coasting-beam transport to target – LAMDA time-resolved envelope code, LSP-Slice PIC code. These codes are also being used to inform the design of Scorpius.

  16. Introduction to coding and information theory

    CERN Document Server

    Roman, Steven

    1997-01-01

    This book is intended to introduce coding theory and information theory to undergraduate students of mathematics and computer science. It begins with a review of probablity theory as applied to finite sample spaces and a general introduction to the nature and types of codes. The two subsequent chapters discuss information theory: efficiency of codes, the entropy of information sources, and Shannon's Noiseless Coding Theorem. The remaining three chapters deal with coding theory: communication channels, decoding in the presence of errors, the general theory of linear codes, and such specific codes as Hamming codes, the simplex codes, and many others.

  17. Zip Codes - MDC_WCSZipcode

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — The WCSZipcode polygon feature class was created by Miami-Dade Enterprise Technology Department to be used in the WCS batch jobs to assign the actual zip code of...

  18. Allele coding in genomic evaluation

    DEFF Research Database (Denmark)

    Standen, Ismo; Christensen, Ole Fredslund

    2011-01-01

    Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker...... effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous...... this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. \\paragraph*{Results:} Theoretical derivations showed that parameter...

  19. Description of the COMRADEX code

    International Nuclear Information System (INIS)

    Spangler, G.W.; Boling, M.; Rhoades, W.A.; Willis, C.A.

    1967-01-01

    The COMRADEX Code is discussed briefly and instructions are provided for the use of the code. The subject code was developed for calculating doses from hypothetical power reactor accidents. It permits the user to analyze four successive levels of containment with time-varying leak rates. Filtration, cleanup, fallout and plateout in each containment shell can also be analyzed. The doses calculated include the direct gamma dose from the containment building, the internal doses to as many as 14 organs including the thyroid, bone, lung, etc. from inhaling the contaminated air, and the external gamma doses from the cloud. While further improvements are needed, such as a provision for calculating doses from fallout, rainout and washout, the present code capabilities have a wide range of applicability for reactor accident analysis

  20. Electronic Code of Federal Regulations

    Data.gov (United States)

    National Archives and Records Administration — The Electronic Code of Federal Regulations (e-CFR) is the codification of the general and permanent rules published in the Federal Register by the executive...

  1. The intercomparison of aerosol codes

    International Nuclear Information System (INIS)

    Dunbar, I.H.; Fermandjian, J.; Gauvain, J.

    1988-01-01

    The behavior of aerosols in a reactor containment vessel following a severe accident could be an important determinant of the accident source term to the environment. Various processes result in the deposition of the aerosol onto surfaces within the containment, from where they are much less likely to be released. Some of these processes are very sensitive to particle size, so it is important to model the aerosol growth processes: agglomeration and condensation. A number of computer codes have been written to model growth and deposition processes. They have been tested against each other in a series of code comparison exercises. These exercises have investigated sensitivities to physical and numerical assumptions and have also proved a useful means of quality control for the codes. Various exercises in which code predictions are compared with experimental results are now under way

  2. CRUCIB: an axisymmetric convection code

    International Nuclear Information System (INIS)

    Bertram, L.A.

    1975-03-01

    The CRUCIB code was written in support of an experimental program aimed at measurement of thermal diffusivities of refractory liquids. Precise values of diffusivity are necessary to realistic analysis of reactor safety problems, nuclear waste disposal procedures, and fundamental metal forming processes. The code calculates the axisymmetric transient convective motions produced in a right circular cylindrical crucible, which is surface heated by an annular heat pulse. Emphasis of this report is placed on the input-output options of the CRUCIB code, which are tailored to assess the importance of the convective heat transfer in determining the surface temperature distribution. Use is limited to Prandtl numbers less than unity; larger values can be accommodated by replacement of a single block of the code, if desired. (U.S.)

  3. Allegheny County Zip Code Boundaries

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset demarcates the zip code boundaries that lie within Allegheny County.If viewing this description on the Western Pennsylvania Regional Data Center’s open...

  4. Tracking Code for Microwave Instability

    International Nuclear Information System (INIS)

    Heifets, S.; SLAC

    2006-01-01

    To study microwave instability the tracking code is developed. For bench marking, results are compared with Oide-Yokoya results [1] for broad-band Q = 1 impedance. Results hint to two possible mechanisms determining the threshold of instability

  5. NESTLE: A nodal kinetics code

    International Nuclear Information System (INIS)

    Al-Chalabi, R.M.; Turinsky, P.J.; Faure, F.-X.; Sarsour, H.N.; Engrand, P.R.

    1993-01-01

    The NESTLE nodal kinetics code has been developed for utilization as a stand-alone code for steady-state and transient reactor neutronic analysis and for incorporation into system transient codes, such as TRAC and RELAP. The latter is desirable to increase the simulation fidelity over that obtained from currently employed zero- and one-dimensional neutronic models and now feasible due to advances in computer performance and efficiency of nodal methods. As a stand-alone code, requirements are that it operate on a range of computing platforms from memory-limited personal computers (PCs) to supercomputers with vector processors. This paper summarizes the features of NESTLE that reflect the utilization and requirements just noted

  6. Reliable Physical Layer Network Coding

    OpenAIRE

    Nazer, Bobak; Gastpar, Michael

    2011-01-01

    When two or more users in a wireless network transmit simultaneously, their electromagnetic signals are linearly superimposed on the channel. As a result, a receiver that is interested in one of these signals sees the others as unwanted interference. This property of the wireless medium is typically viewed as a hindrance to reliable communication over a network. However, using a recently developed coding strategy, interference can in fact be harnessed for network coding. In a wired network, (...

  7. Edge equilibrium code for tokamaks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Xujing [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2719, Beijing 100190 (China); Zakharov, Leonid E. [Princeton Plasma Physics Laboratory Princeton, MS-27 P.O. Box 451, New Jersey (United States); Drozdov, Vladimir V. [Euratom/CCFE Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom)

    2014-01-15

    The edge equilibrium code (EEC) described in this paper is developed for simulations of the near edge plasma using the finite element method. It solves the Grad-Shafranov equation in toroidal coordinate and uses adaptive grids aligned with magnetic field lines. Hermite finite elements are chosen for the numerical scheme. A fast Newton scheme which is the same as implemented in the equilibrium and stability code (ESC) is applied here to adjust the grids.

  8. Interleaver Design for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl; Zyablov, Viktor

    1997-01-01

    By a combination of construction and random search based on a careful analysis of the low weight words and the distance properties of the component codes, it is possible to find interleavers for turbo coding with a high minimum distance. We have designed a block interleaver with permutations...... of each row, and found a combination of permutations where a tight upper bound to the minimum distance of the complete turbo scheme is 108....

  9. UNIX code management and distribution

    International Nuclear Information System (INIS)

    Hung, T.; Kunz, P.F.

    1992-09-01

    We describe a code management and distribution system based on tools freely available for the UNIX systems. At the master site, version control is managed with CVS, which is a layer on top of RCS, and distribution is done via NFS mounted file systems. At remote sites, small modifications to CVS provide for interactive transactions with the CVS system at the master site such that remote developers are true peers in the code development process

  10. Parametric Coding of Stereo Audio

    Directory of Open Access Journals (Sweden)

    Erik Schuijers

    2005-06-01

    Full Text Available Parametric-stereo coding is a technique to efficiently code a stereo audio signal as a monaural signal plus a small amount of parametric overhead to describe the stereo image. The stereo properties are analyzed, encoded, and reinstated in a decoder according to spatial psychoacoustical principles. The monaural signal can be encoded using any (conventional audio coder. Experiments show that the parameterized description of spatial properties enables a highly efficient, high-quality stereo audio representation.

  11. Squares of Random Linear Codes

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego

    2015-01-01

    a positive answer, for codes of dimension $k$ and length roughly $\\frac{1}{2}k^2$ or smaller. Moreover, the convergence speed is exponential if the difference $k(k+1)/2-n$ is at least linear in $k$. The proof uses random coding and combinatorial arguments, together with algebraic tools involving the precise...... computation of the number of quadratic forms of a given rank, and the number of their zeros....

  12. Computer-Access-Code Matrices

    Science.gov (United States)

    Collins, Earl R., Jr.

    1990-01-01

    Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.

  13. Verification of ONED90 code

    International Nuclear Information System (INIS)

    Chang, Jong Hwa; Lee, Ki Bog; Zee, Sung Kyun; Lee, Chang Ho

    1993-12-01

    ONED90 developed by KAERI is a 1-dimensional 2-group diffusion theory code. For nuclear design and reactor simulation, the usage of ONED90 encompasses core follow calculation, load follow calculation, plant power control simulation, xenon oscillation simulation and control rod maneuvering, etc. In order to verify the validity of ONED90 code, two well-known benchmark problems are solved by ONED90 shows very similar result to reference solution. (Author) 11 refs., 5 figs., 13 tabs

  14. Training course on code implementation.

    Science.gov (United States)

    Allain, A; De Arango, R

    1992-01-01

    The International Baby Food Action Network (IBFAN) is a coalition of over 40 citizen groups in 70 countries. IBFAN monitors the progress worldwide of the implementation of the International Code of Marketing of Breastmilk Substitutes. The Code is intended to regulate the advertising and promotional techniques used to sell infant formula. The 1991 IBFAN report shows that 75 countries have taken some action to implement the International Code. During 1992, the IBFAN Code Documentation Center in Malaysia conducted 2 training courses to help countries draft legislation to implement and monitor compliance with the International Code. In April, government officials from 19 Asian and African countries attended the first course in Malaysia; the second course was conducted in Spanish in Guatemala and attended by officials from 15 Latin American and Caribbean countries. The resource people included representatives from NGOs in Africa, Asia, Latin America, Europe and North America with experience in Code implementation and monitoring at the national level. The main purpose of each course was to train government officials to use the International Code as a starting point for national legislation to protect breastfeeding. Participants reviewed recent information on lactation management, the advantages of breastfeeding, current trends in breastfeeding and the marketing practices of infant formula manufacturers. The participants studied the terminology contained in the International Code and terminology used by infant formula manufacturers to include breastmilk supplements such as follow-on formulas and cereal-based baby foods. Relevant World Health Assembly resolutions such as the one adopted in 1986 on the need to ban free and low-cost supplies to hospitals were examined. The legal aspects of the current Baby Friendly Hospital Initiative (BFHI) and the progress in the 12 BFHI test countries concerning the elimination of supplies were also examined. International Labor

  15. Fuel performance analysis code 'FAIR'

    International Nuclear Information System (INIS)

    Swami Prasad, P.; Dutta, B.K.; Kushwaha, H.S.; Mahajan, S.C.; Kakodkar, A.

    1994-01-01

    For modelling nuclear reactor fuel rod behaviour of water cooled reactors under severe power maneuvering and high burnups, a mechanistic fuel performance analysis code FAIR has been developed. The code incorporates finite element based thermomechanical module, physically based fission gas release module and relevant models for modelling fuel related phenomena, such as, pellet cracking, densification and swelling, radial flux redistribution across the pellet due to the build up of plutonium near the pellet surface, pellet clad mechanical interaction/stress corrosion cracking (PCMI/SSC) failure of sheath etc. The code follows the established principles of fuel rod analysis programmes, such as coupling of thermal and mechanical solutions along with the fission gas release calculations, analysing different axial segments of fuel rod simultaneously, providing means for performing local analysis such as clad ridging analysis etc. The modular nature of the code offers flexibility in affecting modifications easily to the code for modelling MOX fuels and thorium based fuels. For performing analysis of fuel rods subjected to very long power histories within a reasonable amount of time, the code has been parallelised and is commissioned on the ANUPAM parallel processing system developed at Bhabha Atomic Research Centre (BARC). (author). 37 refs

  16. System Code Models and Capabilities

    International Nuclear Information System (INIS)

    Bestion, D.

    2008-01-01

    System thermalhydraulic codes such as RELAP, TRACE, CATHARE or ATHLET are now commonly used for reactor transient simulations. The whole methodology of code development is described including the derivation of the system of equations, the analysis of experimental data to obtain closure relation and the validation process. The characteristics of the models are briefly presented starting with the basic assumptions, the system of equations and the derivation of closure relationships. An extensive work was devoted during the last three decades to the improvement and validation of these models, which resulted in some homogenisation of the different codes although separately developed. The so called two-fluid model is the common basis of these codes and it is shown how it can describe both thermal and mechanical nonequilibrium. A review of some important physical models allows to illustrate the main capabilities and limitations of system codes. Attention is drawn on the role of flow regime maps, on the various methods for developing closure laws, on the role of interfacial area and turbulence on interfacial and wall transfers. More details are given for interfacial friction laws and their relation with drift flux models. Prediction of chocked flow and CFFL is also addressed. Based on some limitations of the present generation of codes, perspectives for future are drawn.

  17. The Proteomic Code: a molecular recognition code for proteins

    Directory of Open Access Journals (Sweden)

    Biro Jan C

    2007-11-01

    Full Text Available Abstract Background The Proteomic Code is a set of rules by which information in genetic material is transferred into the physico-chemical properties of amino acids. It determines how individual amino acids interact with each other during folding and in specific protein-protein interactions. The Proteomic Code is part of the redundant Genetic Code. Review The 25-year-old history of this concept is reviewed from the first independent suggestions by Biro and Mekler, through the works of Blalock, Root-Bernstein, Siemion, Miller and others, followed by the discovery of a Common Periodic Table of Codons and Nucleic Acids in 2003 and culminating in the recent conceptualization of partial complementary coding of interacting amino acids as well as the theory of the nucleic acid-assisted protein folding. Methods and conclusions A novel cloning method for the design and production of specific, high-affinity-reacting proteins (SHARP is presented. This method is based on the concept of proteomic codes and is suitable for large-scale, industrial production of specifically interacting peptides.

  18. The Proteomic Code: a molecular recognition code for proteins.

    Science.gov (United States)

    Biro, Jan C

    2007-11-13

    The Proteomic Code is a set of rules by which information in genetic material is transferred into the physico-chemical properties of amino acids. It determines how individual amino acids interact with each other during folding and in specific protein-protein interactions. The Proteomic Code is part of the redundant Genetic Code. The 25-year-old history of this concept is reviewed from the first independent suggestions by Biro and Mekler, through the works of Blalock, Root-Bernstein, Siemion, Miller and others, followed by the discovery of a Common Periodic Table of Codons and Nucleic Acids in 2003 and culminating in the recent conceptualization of partial complementary coding of interacting amino acids as well as the theory of the nucleic acid-assisted protein folding. A novel cloning method for the design and production of specific, high-affinity-reacting proteins (SHARP) is presented. This method is based on the concept of proteomic codes and is suitable for large-scale, industrial production of specifically interacting peptides.

  19. Tribal Green Building Administrative Code Example

    Science.gov (United States)

    This Tribal Green Building Administrative Code Example can be used as a template for technical code selection (i.e., building, electrical, plumbing, etc.) to be adopted as a comprehensive building code.

  20. KWIC Index of nuclear codes (1975 edition)

    International Nuclear Information System (INIS)

    Akanuma, Makoto; Hirakawa, Takashi

    1976-01-01

    It is a KWIC Index for 254 nuclear codes in the Nuclear Code Abstracts (1975 edition). The classification of nuclear codes and the form of index are the same as those in the Computer Programme Library at Ispra, Italy. (auth.)

  1. Number of minimum-weight code words in a product code

    Science.gov (United States)

    Miller, R. L.

    1978-01-01

    Consideration is given to the number of minimum-weight code words in a product code. The code is considered as a tensor product of linear codes over a finite field. Complete theorems and proofs are presented.

  2. CITOPP, CITMOD, CITWI, Processing codes for CITATION Code

    International Nuclear Information System (INIS)

    Albarhoum, M.

    2008-01-01

    Description of program or function: CITOPP processes the output file of the CITATION 3-D diffusion code. The program can plot axial, radial and circumferential flux distributions (in cylindrical geometry) in addition to the multiplication factor convergence. The flux distributions can be drawn for each group specified by the program and visualized on the screen. CITMOD processes both the output and the input files of the CITATION 3-D diffusion code. CITMOD can visualize both axial, and radial-angular models of the reactor described by CITATION input/output files. CITWI processes the input file (CIT.INP) of CITATION 3-D diffusion code. CIT.INP is processed to deduce the dimensions of the cell whose cross sections can be representative of the homonym reactor component in section 008 of CIT.INP

  3. On Code Parameters and Coding Vector Representation for Practical RLNC

    DEFF Research Database (Denmark)

    Heide, Janus; Pedersen, Morten Videbæk; Fitzek, Frank

    2011-01-01

    RLNC provides a theoretically efficient method for coding. The drawbacks associated with it are the complexity of the decoding and the overhead resulting from the encoding vector. Increasing the field size and generation size presents a fundamental trade-off between packet-based throughput...... to higher energy consumption. Therefore, the optimal trade-off is system and topology dependent, as it depends on the cost in energy of performing coding operations versus transmitting data. We show that moderate field sizes are the correct choice when trade-offs are considered. The results show that sparse...

  4. Ecoacoustic codes and ecological complexity.

    Science.gov (United States)

    Farina, Almo

    2018-02-01

    Multi-layer communication and sensing network assures the exchange of relevant information between animals and their umwelten, imparting complexity to the ecological systems. Individual soniferous species, the acoustic community, and soundscape are the three main operational levels that comprise this multi-layer network. Acoustic adaptation and acoustic niche are two more important mechanisms that regulate the acoustic performances at the first level while the acoustic community model explains the complexity of the interspecific acoustic network at the second level. Acoustic habitat and ecoacoustic events are two of the most relevant mechanisms that operate at the third level. The exchange of ecoacoustic information on each of these levels is assured by ecoacoustic codes. At the level of individual sonifeorus species, a dyadic intraspecific exchange of information is established between an emitter and a receiver. Ecoacoustic codes discriminate, identify, and label specific signals that pertain to the theme, variation, motif repetition, and intensity of signals. At the acoustic community level, a voluntarily or involuntarily communication is established between networks of interspecific emitters and receivers. Ecoacoustic codes at this level transmit information (e.g., recognition of predators, location of food sources, availability and location of refuges) between one species and the acoustically interacting community and impart cohesion to interspecific assemblages. At the soundscape level, acoustic information is transferred from a mosaic of geophonies, biophonies, and technophonies to different species that discriminate meaningful ecoacoustic events and their temporal dynamics during habitat selection processes. Ecoacoustic codes at this level operate on a limited set of signals from the environmental acoustic dynamic that are heterogeneous in time and space, and these codes are interpreted differently according to the species during habitat selection and the

  5. Requirements of a Better Secure Program Coding

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2012-01-01

    Full Text Available Secure program coding refers to how manage the risks determined by the security breaches because of the program source code. The papers reviews the best practices must be doing during the software development life cycle for secure software assurance, the methods and techniques used for a secure coding assurance, the most known and common vulnerabilities determined by a bad coding process and how the security risks are managed and mitigated. As a tool of the better secure program coding, the code review process is presented, together with objective measures for code review assurance and estimation of the effort for the code improvement.

  6. The WIMS familly of codes

    International Nuclear Information System (INIS)

    Askew, J.

    1981-01-01

    WIMS-D4 is the latest version of the original form of the Winfrith Improved Multigroup Scheme, developed in 1963-5 for lattice calculations on all types of thermal reactor, whether moderated by graphite, heavy or light water. The code, in earlier versions, has been available from the NEA code centre for a number of years in both IBM and CDC dialects of FORTRAN. An important feature of this code was its rapid, accurate deterministic system for treating resonance capture in heavy nuclides, and capable of dealing with both regular pin lattices and with cluster geometries typical of pressure tube and gas cooled reactors. WIMS-E is a compatible code scheme in which each calcultation step is bounded by standard interfaces on disc or tape. The interfaces contain files of information in a standard form, restricted to numbers representing physically meaningful quantities such as cross-sections and fluxes. Restriction of code intercommunication to this channel limits the possible propagation of errors. A module is capable of transforming WIMS-D output into the standard interface form and hence the two schemes can be linked if required. LWR-WIMS was developed in 1970 as a method of calculating LWR reloads for the fuel fabricators BNFL/GUNF. It uses the WIMS-E library and a number of the same module

  7. Comparison of sodium aerosol codes

    International Nuclear Information System (INIS)

    Dunbar, I.H.; Fermandjian, J.; Bunz, H.; L'homme, A.; Lhiaubet, G.; Himeno, Y.; Kirby, C.R.; Mitsutsuka, N.

    1984-01-01

    Although hypothetical fast reactor accidents leading to severe core damage are very low probability events, their consequences are to be assessed. During such accidents, one can envisage the ejection of sodium, mixed with fuel and fission products, from the primary circuit into the secondary containment. Aerosols can be formed either by mechanical dispersion of the molten material or as a result of combustion of the sodium in the mixture. Therefore considerable effort has been devoted to study the different sodium aerosol phenomena. To ensure that the problems of describing the physical behaviour of sodium aerosols were adequately understood, a comparison of the codes being developed to describe their behaviour was undertaken. The comparison consists of two parts. The first is a comparative study of the computer codes used to predict aerosol behaviour during a hypothetical accident. It is a critical review of documentation available. The second part is an exercise in which code users have run their own codes with a pre-arranged input. For the critical comparative review of the computer models, documentation has been made available on the following codes: AEROSIM (UK), MAEROS (USA), HAARM-3 (USA), AEROSOLS/A2 (France), AEROSOLS/B1 (France), and PARDISEKO-IIIb (FRG)

  8. Translation of ARAC computer codes

    International Nuclear Information System (INIS)

    Takahashi, Kunio; Chino, Masamichi; Honma, Toshimitsu; Ishikawa, Hirohiko; Kai, Michiaki; Imai, Kazuhiko; Asai, Kiyoshi

    1982-05-01

    In 1981 we have translated the famous MATHEW, ADPIC and their auxiliary computer codes for CDC 7600 computer version to FACOM M-200's. The codes consist of a part of the Atmospheric Release Advisory Capability (ARAC) system of Lawrence Livermore National Laboratory (LLNL). The MATHEW is a code for three-dimensional wind field analysis. Using observed data, it calculates the mass-consistent wind field of grid cells by a variational method. The ADPIC is a code for three-dimensional concentration prediction of gases and particulates released to the atmosphere. It calculates concentrations in grid cells by the particle-in-cell method. They are written in LLLTRAN, i.e., LLNL Fortran language and are implemented on the CDC 7600 computers of LLNL. In this report, i) the computational methods of the MATHEW/ADPIC and their auxiliary codes, ii) comparisons of the calculated results with our JAERI particle-in-cell, and gaussian plume models, iii) translation procedures from the CDC version to FACOM M-200's, are described. Under the permission of LLNL G-Division, this report is published to keep the track of the translation procedures and to serve our JAERI researchers for comparisons and references of their works. (author)

  9. International assessment of PCA codes

    International Nuclear Information System (INIS)

    Neymotin, L.; Lui, C.; Glynn, J.; Archarya, S.

    1993-11-01

    Over the past three years (1991-1993), an extensive international exercise for intercomparison of a group of six Probabilistic Consequence Assessment (PCA) codes was undertaken. The exercise was jointly sponsored by the Commission of European Communities (CEC) and OECD Nuclear Energy Agency. This exercise was a logical continuation of a similar effort undertaken by OECD/NEA/CSNI in 1979-1981. The PCA codes are currently used by different countries for predicting radiological health and economic consequences of severe accidents at nuclear power plants (and certain types of non-reactor nuclear facilities) resulting in releases of radioactive materials into the atmosphere. The codes participating in the exercise were: ARANO (Finland), CONDOR (UK), COSYMA (CEC), LENA (Sweden), MACCS (USA), and OSCAAR (Japan). In parallel with this inter-code comparison effort, two separate groups performed a similar set of calculations using two of the participating codes, MACCS and COSYMA. Results of the intercode and inter-MACCS comparisons are presented in this paper. The MACCS group included four participants: GREECE: Institute of Nuclear Technology and Radiation Protection, NCSR Demokritos; ITALY: ENEL, ENEA/DISP, and ENEA/NUC-RIN; SPAIN: Universidad Politecnica de Madrid (UPM) and Consejo de Seguridad Nuclear; USA: Brookhaven National Laboratory, US NRC and DOE

  10. A genetic scale of reading frame coding.

    Science.gov (United States)

    Michel, Christian J

    2014-08-21

    The reading frame coding (RFC) of codes (sets) of trinucleotides is a genetic concept which has been largely ignored during the last 50 years. A first objective is the definition of a new and simple statistical parameter PrRFC for analysing the probability (efficiency) of reading frame coding (RFC) of any trinucleotide code. A second objective is to reveal different classes and subclasses of trinucleotide codes involved in reading frame coding: the circular codes of 20 trinucleotides and the bijective genetic codes of 20 trinucleotides coding the 20 amino acids. This approach allows us to propose a genetic scale of reading frame coding which ranges from 1/3 with the random codes (RFC probability identical in the three frames) to 1 with the comma-free circular codes (RFC probability maximal in the reading frame and null in the two shifted frames). This genetic scale shows, in particular, the reading frame coding probabilities of the 12,964,440 circular codes (PrRFC=83.2% in average), the 216 C(3) self-complementary circular codes (PrRFC=84.1% in average) including the code X identified in eukaryotic and prokaryotic genes (PrRFC=81.3%) and the 339,738,624 bijective genetic codes (PrRFC=61.5% in average) including the 52 codes without permuted trinucleotides (PrRFC=66.0% in average). Otherwise, the reading frame coding probabilities of each trinucleotide code coding an amino acid with the universal genetic code are also determined. The four amino acids Gly, Lys, Phe and Pro are coded by codes (not circular) with RFC probabilities equal to 2/3, 1/2, 1/2 and 2/3, respectively. The amino acid Leu is coded by a circular code (not comma-free) with a RFC probability equal to 18/19. The 15 other amino acids are coded by comma-free circular codes, i.e. with RFC probabilities equal to 1. The identification of coding properties in some classes of trinucleotide codes studied here may bring new insights in the origin and evolution of the genetic code. Copyright © 2014 Elsevier

  11. Tree Coding of Bilevel Images

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    1998-01-01

    Presently, sequential tree coders are the best general purpose bilevel image coders and the best coders of halftoned images. The current ISO standard, Joint Bilevel Image Experts Group (JBIG), is a good example. A sequential tree coder encodes the data by feeding estimates of conditional...... probabilities to an arithmetic coder. The conditional probabilities are estimated from co-occurrence statistics of past pixels, the statistics are stored in a tree. By organizing the code length calculations properly, a vast number of possible models (trees) reflecting different pixel orderings can...... is one order of magnitude slower than JBIG, obtains excellent and highly robust compression performance. A multipass free tree coding scheme produces superior compression results for all test images. A multipass free template coding scheme produces significantly better results than JBIG for difficult...

  12. ASME Code Efforts Supporting HTGRs

    Energy Technology Data Exchange (ETDEWEB)

    D.K. Morton

    2010-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  13. ASME Code Efforts Supporting HTGRs

    Energy Technology Data Exchange (ETDEWEB)

    D.K. Morton

    2011-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  14. ASME Code Efforts Supporting HTGRs

    Energy Technology Data Exchange (ETDEWEB)

    D.K. Morton

    2012-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  15. MAGNETOHYDRODYNAMIC EQUATIONS (MHD GENERATION CODE

    Directory of Open Access Journals (Sweden)

    Francisco Frutos Alfaro

    2017-04-01

    Full Text Available A program to generate codes in Fortran and C of the full magnetohydrodynamic equations is shown. The program uses the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the magnetohydrodynamic equations to obtain a code that can be used as a seed for a magnetohydrodynamic code for numerical applications. As an example, we present part of the output of our programs for Cartesian coordinates and how to do the discretization.

  16. FLOWTRAN-TF code benchmarking

    Energy Technology Data Exchange (ETDEWEB)

    Flach, G.P. (ed.)

    1990-12-01

    FLOWTRAN-TF is a two-component (air-water), two-phase thermal-hydraulics code designed for performing accident analyses of SRS reactor fuel assemblies during the Emergency Cooling System (ECS) phase of a Double Ended Guillotine Break (DEGB) Loss Of Coolant Accident (LOCA). A description of the code is given by Flach et al. (1990). This report provides benchmarking results for the version of FLOWTRAN-TF used to compute the Recommended K-Reactor Restart ECS Power Limit (Smith et al., 1990a; 1990b). Individual constitutive relations are benchmarked in Sections 2 through 5 while in Sections 6 and 7 integral code benchmarking results are presented. An overall assessment of FLOWTRAN-TF for its intended use in computing the ECS power limit completes the document.

  17. Stakeholders' Opinions on the use of Code Switching/ Code Mixing ...

    African Journals Online (AJOL)

    English-Kiswahili code switching is employedintensively in the classrooms by both teachers and learners, as a coping strategy toattain meaningful learning. This practice is not permitted officially in Tanzaniaeven though it may be the only possible strategy at the moment to move away fromthe difficulty faced in using English ...

  18. Signal Constellations for Multilevel Coded Modulation with Sparse Graph Codes

    NARCIS (Netherlands)

    Cronie, H.S.

    2005-01-01

    A method to combine error-correction coding and spectral efficient modulation for transmission over channels with Gaussian noise is presented. The method of modulation leads to a signal constellation in which the constellation symbols have a nonuniform distribution. This gives a so-called shape gain

  19. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    over noisy channels. However it is only in 1993 (about half a century later) that Berrou,. Glavieux and Thitimajshima developed turbo codes and demonstrated performance ... However, computational power at that time could not demon- ... wireless communication standards as well as the IEEE 802.3 (10GBASE-T Ethernet).

  20. List Decoding of Matrix-Product Codes from nested codes: an application to Quasi-Cyclic codes

    DEFF Research Database (Denmark)

    Hernando, Fernando; Høholdt, Tom; Ruano, Diego

    2012-01-01

    A list decoding algorithm for matrix-product codes is provided when $C_1,..., C_s$ are nested linear codes and $A$ is a non-singular by columns matrix. We estimate the probability of getting more than one codeword as output when the constituent codes are Reed-Solomon codes. We extend this list de...

  1. Vector calculation of particle code

    International Nuclear Information System (INIS)

    Nishiguchi, A.; Yabe, T.; Orii, S.

    1985-01-01

    The development of vector computer requires the modification of the algorithm into a suitable form for vector calculation. Among many algorithms, the particle code is a typical example which has suffered a damage in the calculation on supercomputer owing to its possibility of recurrent data access in collecting cell-wise quantities from particle's quartities. In this article, we report a new method to liberate the particle code from recurrent calculations. It should be noticed, however, that the method may depend on the architecture of supercomputer, and works well on FACOM VP-100 and VP-200: the indirect data accessing must be vectorized and its speed should be fast. (Mori, K.)

  2. Flow Analysis of Code Customizations

    DEFF Research Database (Denmark)

    Hessellund, Anders; Sestoft, Peter

    2008-01-01

    requirements between metadata and code should be checked but often are not, so current tools offer surprisingly poor development support. In this paper, we adapt classical data flow analyses to detect inconsistencies and provide better static guarantees. We provide a formalization of the consistency...... requirements and a set of adapted analyses for a concrete case study. Our work is implemented in a fast and efficient prototype in the form of an Eclipse plugin. We validate our work by testing this prototype on actual production code; preliminary results show that this approach is worthwhile. We found...

  3. AECL programs for new applications for nuclear energy

    International Nuclear Information System (INIS)

    Robertson, J.A.L.

    1982-05-01

    This document reports the activities of the New Applications Steering Committee (NASC) of Atomic Energy of Canada Ltd. The NASC is intended to develop future RβD programs, and more specifically to promote certain existing ideas that have not yet become part of established programs, stimulate new idaas, identify needs and opportunities for RβD, evaluate proposals for RβD programs, initiate action on new ideas, and provide feedback to a staff who may be expected to generate ideas. Major areas and technologies that have been studied by the NASC and are covered in this report include oil substitution by nuclear heat and by electricity, energy storage and the role of hydrogen, nuclear energy in liquid fuel production, assessment of Canadian energy resources, and computer modelling of energy systems

  4. Processing of LLRW arising from AECL nuclear research centres

    International Nuclear Information System (INIS)

    Buckley, L.P.; Le, V.T.; Beamer, N.V.; Brown, W.P.; Helbrecht, R.A.

    1988-11-01

    Operation of nuclear research reactors and laboratories results in the generation of a wide variety of solid and liquid radioactive wastes. This paper describes practical experience with processing of low-level radioactive wastes at two major nuclear research centres in Canada

  5. AECL--Sulzer amine process for heavy water

    International Nuclear Information System (INIS)

    Wynn, N.P.

    1978-01-01

    A heavy water process based on isotopic exchange between hydrogen and methylamine and methylamine and water has been developed by Sulzer and Atomic Energy of Canada. Deuterium source is the synthesis gas stream of an ammonia plant. Deuterium enrichment is achieved by bithermal amine-hydrogen exchange; however, preliminary enrichment is made to occur in the reformers of the ammonia plant by using the steam reforming process as the decomposition step of a monothermal enrichment stage. This feature, coupled with the high value of the separation factor achievable with hydrogen-amine exchange, allows a high deuterium yield without the use of hydrogen recycle in the extraction stage. Design work has been based on pilot tests of the key process steps using industrial contacting equipment. 8 figures

  6. Radiation applications research and facilities in AECL Research Company

    International Nuclear Information System (INIS)

    Iverson, S.L.

    1988-01-01

    In the 60's and 70's Atomic Energy of Canada had a very active R and D program to discover and develop applications of ionizing radiation. Widespread interest in the use of radiation for food processing and the possibility of developing reliable and competitive machine sources of radiation hold out the promise of a major increase in industrial use of radiation. In March 1985 a new branch, Radiation Applications Research, began operations with the objective of working closely with industry to develop and assist the introduction of new uses of ionizing radiation. The Branch is equipped with appropriate analytical equipment including HPLC (high performance liquid chromatograph) and GC/MS (gas chromatograph/mass spectrometer) as well as a Gammacell 220 and an I-10/1, one kilowatt 10 MeV electron accelerator. The accelerator is located in a specially designed facility equipped for experimental irradiation of the test quantities of packaged products as well as solids, liquids and gases in various configurations. A conveyor system moves the packaged products from the receiving area, through a maze, past the electron beam at a controlled rate and finally to the shipping area. Other necessary capabilities, such as gamma and electron dosimetry and a microbiology laboratory, have also been developed. Initial projects in areas ranging from food through environmental and industrial applications have been assessed and the most promising have been selected for further work. As an example, the use of charcoal absorbent beds to concentrate the components of gas or liquid waste streams requiring treatment is showing promise as a method of significantly reducing the cost of radiation treatment for some effluents. A number of other projects are described. (author)

  7. Reorganization of AECL and the future marketing program

    International Nuclear Information System (INIS)

    Donnelly, James

    Atomic Energy of Canada Ltd. Engineering Co. has been reorganized to support the new emphasis on foreign sales of CANDU reactors. Much has been learned from reactor sales to Argentina, Korea, and Romania, but Canada needs to sell one 600 MWe reactor a year in order to avoid a decline in its nuclear industry. (LL)

  8. Pump Component Model in SPACE Code

    International Nuclear Information System (INIS)

    Kim, Byoung Jae; Kim, Kyoung Doo

    2010-08-01

    This technical report describes the pump component model in SPACE code. A literature survey was made on pump models in existing system codes. The models embedded in SPACE code were examined to check the confliction with intellectual proprietary rights. Design specifications, computer coding implementation, and test results are included in this report

  9. The Minimum Distance of Graph Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2011-01-01

    We study codes constructed from graphs where the code symbols are associated with the edges and the symbols connected to a given vertex are restricted to be codewords in a component code. In particular we treat such codes from bipartite expander graphs coming from Euclidean planes and other...

  10. Channel coding techniques for wireless communications

    CERN Document Server

    Deergha Rao, K

    2015-01-01

    The book discusses modern channel coding techniques for wireless communications such as turbo codes, low-density parity check (LDPC) codes, space–time (ST) coding, RS (or Reed–Solomon) codes and convolutional codes. Many illustrative examples are included in each chapter for easy understanding of the coding techniques. The text is integrated with MATLAB-based programs to enhance the understanding of the subject’s underlying theories. It includes current topics of increasing importance such as turbo codes, LDPC codes, Luby transform (LT) codes, Raptor codes, and ST coding in detail, in addition to the traditional codes such as cyclic codes, BCH (or Bose–Chaudhuri–Hocquenghem) and RS codes and convolutional codes. Multiple-input and multiple-output (MIMO) communications is a multiple antenna technology, which is an effective method for high-speed or high-reliability wireless communications. PC-based MATLAB m-files for the illustrative examples are provided on the book page on Springer.com for free dow...

  11. Spatial resolution enhancement residual coding using hybrid ...

    Indian Academy of Sciences (India)

    Traditional video coding uses classical predictive coding techniques, where a signal is initially approximated by taking advantage of the various redundancies present. Most of the video coding standards, including the latest HEVC, use the well-accepted procedure of applying transform coding on self-contained (intra) and ...

  12. Verified OS Interface Code Synthesis

    Science.gov (United States)

    2016-12-01

    code functionality: potential bugs are invisible at all but the lowest levels of abstraction. To formally model this functionality with sufficient...Isabelle/HOL side, as well as theory alignment work to bridge the gaps and differences in theory libraries between the two theorem-proving systems

  13. Coding and English Language Teaching

    Science.gov (United States)

    Stevens, Vance; Verschoor, Jennifer

    2017-01-01

    According to Dudeney, Hockly, and Pegrum (2013) coding is a deeper skill subsumed under the four main digital literacies of language, connections, information, and (re)design. Coders or programmers are people who write the programmes behind everything we see and do on a computer. Most students spend several hours playing online games, but few know…

  14. Winter School on Coding Theory

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 8. Winter School on Coding Theory. Information and Announcements Volume 8 Issue 8 August 2003 pp 111-111. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/008/08/0111-0111. Resonance ...

  15. Source Code Analysis Laboratory (SCALe)

    Science.gov (United States)

    2012-04-01

    Samba and NFS. The Windows VMs can be remotely accessed from within the CERT network by using Remote Desktop Protocol (RDP) and the Linux VMs by...File Server • Samba • NFS RDP SSH Other VMs CMU/SEI-2012-TN-013 | 10 Source code being analyzed is copied onto the file server, where it is

  16. Changing Postal ZIP Code Boundaries

    Science.gov (United States)

    2006-06-23

    for distribution to a specific delivery post office, identified by the fourth and fifth digits. For example, the ZIP Code for Alturas , the county seat...distribution point for some California post offices such as Alturas , Cedarville (96104), Fort Bidwell (96112), and Likely (96116), distinguished by the

  17. QR Codes: Taking Collections Further

    Science.gov (United States)

    Ahearn, Caitlin

    2014-01-01

    With some thought and direction, QR (quick response) codes are a great tool to use in school libraries to enhance access to information. From March through April 2013, Caitlin Ahearn interned at Sanborn Regional High School (SRHS) under the supervision of Pam Harland. As a result of Harland's un-Deweying of the nonfiction collection at SRHS,…

  18. Surgical navigation with QR codes

    Directory of Open Access Journals (Sweden)

    Katanacho Manuel

    2016-09-01

    Full Text Available The presented work is an alternative to established measurement systems in surgical navigation. The system is based on camera based tracking of QR code markers. The application uses a single video camera, integrated in a surgical lamp, that captures the QR markers attached to surgical instruments and to the patient.

  19. Error Detection in Numeric Codes

    Indian Academy of Sciences (India)

    Admin

    example, entering a wrong ISBN may result in purchase of a different book, entering a wrong debit card number may result in a debit from a wrong bank account. So, it is very important that these errors are detected during data entry so that the codes are rejected and the user cautioned. It is for this purpose that many error ...

  20. Halftone Coding with JBIG2

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    2000-01-01

    The emerging international standard for compression of bilevel images and bi-level documents, JBIG2,provides a mode dedicated for lossy coding of halftones. The encoding procedure involves descreening of the bi-levelimage into gray-scale, encoding of the gray-scale image, and construction...

  1. Reliability-Based Code Calibration

    DEFF Research Database (Denmark)

    Faber, M.H.; Sørensen, John Dalsgaard

    2003-01-01

    . Thereafter the code calibration problem is presented in its principal decision theoretical form and it is discussed how acceptable levels of failure probability (or target reliabilities) may be established. Furthermore suggested values for acceptable annual failure probabilities are given for ultimate...

  2. Authentication codes that permit arbitration

    Energy Technology Data Exchange (ETDEWEB)

    Simmons, G.J.

    1987-01-01

    Objective of authentication is to detect attempted deceptions in a communications channel. Traditionally this has been restricted to providing the authorized receiver with a capability of detecting unauthentic messages. The known codes have all left open the possibility for either the transmitter to disavow a message that he actually sent to the receiver, i.e., an authentic message, or else for the receiver to falsely attribute a message of his own devising to the transmitter. Of course the party being deceived would know that he was the victim of a deception by the other, but would be unable to ''prove'' this to a third party. Ideally, authentication should provide a means to detect attempted deceptions by insiders (the transmitter or receiver) as well as outsiders (the opponent). It has been an open question of whether it was possible to devise authentication codes that would permit a third party, an arbiter, to decide (in probability) whether the transmitter or the receiver was cheating in the event of a dispute. We answer this question in that both permits the receiver to detect outsider deceptions, as well affirmative by first constructing an example of an authentication code as permitting a designated arbiter to detect insider deceptions and then by generalizing this construction to an infinite class of such codes.

  3. Two dimensional plasma simulation code

    International Nuclear Information System (INIS)

    Hazak, G.; Boneh, Y.; Goshen, Sh.; Oreg, J.

    1977-03-01

    An electrostatic two-dimensional particle code for plasma simulation is described. Boundary conditions which take into account the finiteness of the system are presented. An analytic solution for the case of crossed fields plasma acceleration is derived. This solution serves as a check on a computer test run

  4. X-ray image coding

    International Nuclear Information System (INIS)

    1974-01-01

    The invention aims at decreasing the effect of stray radiation in X-ray images. This is achieved by putting a plate between source and object with parallel zones of alternating high and low absorption coefficients for X-radiation. The image is scanned with the help of electronic circuits which decode the signal space coded by the plate, thus removing the stray radiation

  5. Generating Constant Weight Binary Codes

    Science.gov (United States)

    Knight, D.G.

    2008-01-01

    The determination of bounds for A(n, d, w), the maximum possible number of binary vectors of length n, weight w, and pairwise Hamming distance no less than d, is a classic problem in coding theory. Such sets of vectors have many applications. A description is given of how the problem can be used in a first-year undergraduate computational…

  6. Entropy, Coding and Data Compression

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 9. Entropy, Coding and Data Compression. S Natarajan. General Article Volume 6 Issue 9 September 2001 pp 35-45. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/09/0035-0045 ...

  7. Smells in software test code

    NARCIS (Netherlands)

    Garousi, Vahid; Küçük, Barış

    2018-01-01

    As a type of anti-pattern, test smells are defined as poorly designed tests and their presence may negatively affect the quality of test suites and production code. Test smells are the subject of active discussions among practitioners and researchers, and various guidelines to handle smells are

  8. SSI and the Environmental Code

    International Nuclear Information System (INIS)

    Loefgren, T.

    1997-12-01

    Radiation is, to some extent, included in the environmental code being prepared by the government. As a consequence both the Radiation Protection Institute and the proposed Environmental Court may set legal conditions concerning radiation protection for the proponent. Legal and other matters related to this issue are discussed in the report

  9. Static Verification for Code Contracts

    Science.gov (United States)

    Fähndrich, Manuel

    The Code Contracts project [3] at Microsoft Research enables programmers on the .NET platform to author specifications in existing languages such as C# and VisualBasic. To take advantage of these specifications, we provide tools for documentation generation, runtime contract checking, and static contract verification.

  10. Coding as literacy metalithikum IV

    CERN Document Server

    Bühlmann, Vera; Moosavi, Vahid

    2015-01-01

    Recent developments in computer science, particularly "data-driven procedures" have opened a new level of design and engineering. This has also affected architecture. The publication collects contributions on Coding as Literacy by computer scientists, mathematicians, philosophers, cultural theorists, and architects. "Self-Organizing Maps" (SOM) will serve as the concrete reference point for all further discussions.

  11. Emergency department coding and billing.

    Science.gov (United States)

    Edelberg, Caral

    2004-02-01

    ED coding and billing are challenging additions to the responsibilities of emergency physicians. Assurances that each is performed in the most efficient and accurate manner possible is an essential component of today's emergency medicine practice. Minimizing the risk for submitting fraudulent claims is critical, because it assures the efficient and timely billing of all ED services. For the practice to thrive, each is necessary.

  12. CINETHICA - Core accident analysis code

    International Nuclear Information System (INIS)

    Nakata, H.

    1989-10-01

    A computer program for nuclear accident analysis has been developed based on the point-kinetics approximation and one-dimensional heat transfer model for reactivity feedback calculation. Hansen's method/1/ were used for the kinetics equation solution and explicit Euler method were adopted for the thermohidraulic equations. The results were favorably compared to those from the GAPOTKIN Code/2/. (author) [pt

  13. Electron transport code theoretical basis

    International Nuclear Information System (INIS)

    Dubi, A.; Horowitz, Y.S.

    1978-04-01

    This report mainly describes the physical and mathematical considerations involved in the treatment of the multiple collision processes. A brief description is given of the traditional methods used in electron transport via Monte Carlo, and a somewhat more detailed description, of the approach to be used in the presently developed code

  14. Fundamentals of information theory and coding design

    CERN Document Server

    Togneri, Roberto

    2003-01-01

    In a clear, concise, and modular format, this book introduces the fundamental concepts and mathematics of information and coding theory. The authors emphasize how a code is designed and discuss the main properties and characteristics of different coding algorithms along with strategies for selecting the appropriate codes to meet specific requirements. They provide comprehensive coverage of source and channel coding, address arithmetic, BCH, and Reed-Solomon codes and explore some more advanced topics such as PPM compression and turbo codes. Worked examples and sets of basic and advanced exercises in each chapter reinforce the text's clear explanations of all concepts and methodologies.

  15. Development and validation of sodium fire codes

    International Nuclear Information System (INIS)

    Morii, Tadashi; Himeno Yoshiaki; Miyake, Osamu

    1989-01-01

    Development, verification, and validation of the spray fire code, SPRAY-3M, the pool fire codes, SOFIRE-M2 and SPM, the aerosol behavior code, ABC-INTG, and the simultaneous spray and pool fires code, ASSCOPS, are presented. In addition, the state-of-the-art of development of the multi-dimensional natural convection code, SOLFAS, for the analysis of heat-mass transfer during a fire, is presented. (author)

  16. Computer codes for ventilation in nuclear facilities

    International Nuclear Information System (INIS)

    Mulcey, P.

    1987-01-01

    In this paper the authors present some computer codes, developed in the last years, for ventilation and radioprotection. These codes are used for safety analysis in the conception, exploitation and dismantlement of nuclear facilities. The authors present particularly: DACC1 code used for aerosol deposit in sampling circuit of radiation monitors; PIAF code used for modelization of complex ventilation system; CLIMAT 6 code used for optimization of air conditioning system [fr

  17. User's manual for a measurement simulation code

    International Nuclear Information System (INIS)

    Kern, E.A.

    1982-07-01

    The MEASIM code has been developed primarily for modeling process measurements in materials processing facilities associated with the nuclear fuel cycle. In addition, the code computes materials balances and the summation of materials balances along with associated variances. The code has been used primarily in performance assessment of materials' accounting systems. This report provides the necessary information for a potential user to employ the code in these applications. A number of examples that demonstrate most of the capabilities of the code are provided

  18. The chromatin regulatory code: Beyond a histone code

    Science.gov (United States)

    Lesne, A.

    2006-03-01

    In this commentary on the contribution by Arndt Benecke in this issue, I discuss why the notion of “chromatin code” introduced and elaborated in this paper is to be preferred to that of “histone code”. Speaking of a code as regards nucleosome conformation and histone tail post-translational modifications only makes sense within the chromatin fiber, where their physico-chemical features can be translated into regulatory programs at the genome level, by means of a complex, multi-level interplay with the fiber architecture and dynamics settled in the course of Evolution. In particular, this chromatin code presumably exploits allosteric transitions of the chromatin fiber. The chromatin structure dependence of its translation suggests two alternative modes of transcription initiation regulation, also proposed in the paper by A. Benecke in this issue for interpreting strikingly bimodal micro-array data.

  19. Genetic coding and gene expression - new Quadruplet genetic coding model

    Science.gov (United States)

    Shankar Singh, Rama

    2012-07-01

    Successful demonstration of human genome project has opened the door not only for developing personalized medicine and cure for genetic diseases, but it may also answer the complex and difficult question of the origin of life. It may lead to making 21st century, a century of Biological Sciences as well. Based on the central dogma of Biology, genetic codons in conjunction with tRNA play a key role in translating the RNA bases forming sequence of amino acids leading to a synthesized protein. This is the most critical step in synthesizing the right protein needed for personalized medicine and curing genetic diseases. So far, only triplet codons involving three bases of RNA, transcribed from DNA bases, have been used. Since this approach has several inconsistencies and limitations, even the promise of personalized medicine has not been realized. The new Quadruplet genetic coding model proposed and developed here involves all four RNA bases which in conjunction with tRNA will synthesize the right protein. The transcription and translation process used will be the same, but the Quadruplet codons will help overcome most of the inconsistencies and limitations of the triplet codes. Details of this new Quadruplet genetic coding model and its subsequent potential applications including relevance to the origin of life will be presented.

  20. Conception et optimisation de codes AL-FEC : les codes GLDPC-Staircase

    OpenAIRE

    Mattoussi, Ferdaouss

    2014-01-01

    This work is dedicated to the design, analysis and optimization of Application-Level Forward Erasure Correction (AL-FEC) codes. In particular, we explore a class of Gen- eralized LDPC (GLDPC) codes, named GLDPC-Staircase codes, involving the LDPC- Staircase code (base code) as well as Reed-Solomon (RS) codes (outer codes). In the first part of this thesis, we start by showing that RS codes having “quasi” Han- kel matrix-based construction are the most suitable MDS codes to obtain the structur...

  1. PetriCode: A Tool for Template-Based Code Generation from CPN Models

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge

    2014-01-01

    levels of abstraction. The elements of the models are annotated with code generation pragmatics enabling PetriCode to use a template-based approach to generate code while keeping the models uncluttered from implementation artefacts. PetriCode is the realization of our code generation approach which has...

  2. Some Families of Asymmetric Quantum MDS Codes Constructed from Constacyclic Codes

    Science.gov (United States)

    Huang, Yuanyuan; Chen, Jianzhang; Feng, Chunhui; Chen, Riqing

    2018-02-01

    Quantum maximal-distance-separable (MDS) codes that satisfy quantum Singleton bound with different lengths have been constructed by some researchers. In this paper, seven families of asymmetric quantum MDS codes are constructed by using constacyclic codes. We weaken the case of Hermitian-dual containing codes that can be applied to construct asymmetric quantum MDS codes with parameters [[n,k,dz/dx

  3. Hello Ruby adventures in coding

    CERN Document Server

    Liukas, Linda

    2015-01-01

    "Code is the 21st century literacy and the need for people to speak the ABCs of Programming is imminent." --Linda Liukas Meet Ruby--a small girl with a huge imagination. In Ruby's world anything is possible if you put your mind to it. When her dad asks her to find five hidden gems Ruby is determined to solve the puzzle with the help of her new friends, including the Wise Snow Leopard, the Friendly Foxes, and the Messy Robots. As Ruby stomps around her world kids will be introduced to the basic concepts behind coding and programming through storytelling. Learn how to break big problems into small problems, repeat tasks, look for patterns, create step-by-step plans, and think outside the box. With hands-on activities included in every chapter, future coders will be thrilled to put their own imaginations to work.

  4. The development of code benchmarks

    International Nuclear Information System (INIS)

    Glass, R.E.

    1986-01-01

    Sandia National Laboratories has undertaken a code benchmarking effort to define a series of cask-like problems having both numerical solutions and experimental data. The development of the benchmarks includes: (1) model problem definition, (2) code intercomparison, and (3) experimental verification. The first two steps are complete and a series of experiments are planned. The experiments will examine the elastic/plastic behavior of cylinders for both the end and side impacts resulting from a nine meter drop. The cylinders will be made from stainless steel and aluminum to give a range of plastic deformations. This paper presents the results of analyses simulating the model's behavior using materials properties for stainless steel and aluminum

  5. Improvement of the FPAC code

    International Nuclear Information System (INIS)

    Ikeda, H.; Kikuchi, T.; Ono, S.

    2001-01-01

    FPAC (fuel performance analysis code) is a thermal and mechanical design code developed by Nuclear Fuel Industries, Ltd. (NFI). NFI has been utilizing FPAC to design the commercial PWR fuel rods, which are manufactured by NFI, or to analyze fuel rod's irradiation behavior. Japanese PWR utilities are planning to increase the discharged burnup limit of fuel assembly to 55GWd/t. Therefore, NFI has improved FPAC to enable to be used to more accurately estimate fuel rod behavior at high burnup. The integral assessment of improved FPAC has been verified from available data including measured centerline temperatures, PIE data and so on, and they cover burnup up to approximately 90GWd/t. The predicted results obtained from the improved FPAC show good agreement with measured data. (author)

  6. The EGS5 Code System

    Energy Technology Data Exchange (ETDEWEB)

    Hirayama, Hideo; Namito, Yoshihito; /KEK, Tsukuba; Bielajew, Alex F.; Wilderman, Scott J.; U., Michigan; Nelson, Walter R.; /SLAC

    2005-12-20

    In the nineteen years since EGS4 was released, it has been used in a wide variety of applications, particularly in medical physics, radiation measurement studies, and industrial development. Every new user and every new application bring new challenges for Monte Carlo code designers, and code refinements and bug fixes eventually result in a code that becomes difficult to maintain. Several of the code modifications represented significant advances in electron and photon transport physics, and required a more substantial invocation than code patching. Moreover, the arcane MORTRAN3[48] computer language of EGS4, was highest on the complaint list of the users of EGS4. The size of the EGS4 user base is difficult to measure, as there never existed a formal user registration process. However, some idea of the numbers may be gleaned from the number of EGS4 manuals that were produced and distributed at SLAC: almost three thousand. Consequently, the EGS5 project was undertaken. It was decided to employ the FORTRAN 77 compiler, yet include as much as possible, the structural beauty and power of MORTRAN3. This report consists of four chapters and several appendices. Chapter 1 is an introduction to EGS5 and to this report in general. We suggest that you read it. Chapter 2 is a major update of similar chapters in the old EGS4 report[126] (SLAC-265) and the old EGS3 report[61] (SLAC-210), in which all the details of the old physics (i.e., models which were carried over from EGS4) and the new physics are gathered together. The descriptions of the new physics are extensive, and not for the faint of heart. Detailed knowledge of the contents of Chapter 2 is not essential in order to use EGS, but sophisticated users should be aware of its contents. In particular, details of the restrictions on the range of applicability of EGS are dispersed throughout the chapter. First-time users of EGS should skip Chapter 2 and come back to it later if necessary. With the release of the EGS4 version

  7. CBP Phase I Code Integration

    International Nuclear Information System (INIS)

    Smith, F.; Brown, K.; Flach, G.; Sarkar, S.

    2011-01-01

    The goal of the Cementitious Barriers Partnership (CBP) is to develop a reasonable and credible set of software tools to predict the structural, hydraulic, and chemical performance of cement barriers used in nuclear applications over extended time frames (greater than 100 years for operating facilities and greater than 1000 years for waste management). The simulation tools will be used to evaluate and predict the behavior of cementitious barriers used in near surface engineered waste disposal systems including waste forms, containment structures, entombments, and environmental remediation. These cementitious materials are exposed to dynamic environmental conditions that cause changes in material properties via (i) aging, (ii) chloride attack, (iii) sulfate attack, (iv) carbonation, (v) oxidation, and (vi) primary constituent leaching. A set of state-of-the-art software tools has been selected as a starting point to capture these important aging and degradation phenomena. Integration of existing software developed by the CBP partner organizations was determined to be the quickest method of meeting the CBP goal of providing a computational tool that improves the prediction of the long-term behavior of cementitious materials. These partner codes were selected based on their maturity and ability to address the problems outlined above. The GoldSim Monte Carlo simulation program (GTG 2010a, GTG 2010b) was chosen as the code integration platform (Brown and Flach 2009b). GoldSim (current Version 10.5) is a Windows based graphical object-oriented computer program that provides a flexible environment for model development (Brown and Flach 2009b). The linking of GoldSim to external codes has previously been successfully demonstrated (Eary 2007, Mattie et al. 2007). GoldSim is capable of performing deterministic and probabilistic simulations and of modeling radioactive decay and constituent transport. As part of the CBP project, a general Dynamic Link Library (DLL) interface

  8. Do you write secure code?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    At CERN, we are excellent at producing software, such as complex analysis jobs, sophisticated control programs, extensive monitoring tools, interactive web applications, etc. This software is usually highly functional, and fulfils the needs and requirements as defined by its author. However, due to time constraints or unintentional ignorance, security aspects are often neglected. Subsequently, it was even more embarrassing for the author to find out that his code flawed and was used to break into CERN computers, web pages or to steal data…   Thus, if you have the pleasure or task of producing software applications, take some time before and familiarize yourself with good programming practices. They should not only prevent basic security flaws in your code, but also improve its readability, maintainability and efficiency. Basic rules for good programming, as well as essential books on proper software development, can be found in the section for software developers on our security we...

  9. CBP PHASE I CODE INTEGRATION

    Energy Technology Data Exchange (ETDEWEB)

    Smith, F.; Brown, K.; Flach, G.; Sarkar, S.

    2011-09-30

    The goal of the Cementitious Barriers Partnership (CBP) is to develop a reasonable and credible set of software tools to predict the structural, hydraulic, and chemical performance of cement barriers used in nuclear applications over extended time frames (greater than 100 years for operating facilities and greater than 1000 years for waste management). The simulation tools will be used to evaluate and predict the behavior of cementitious barriers used in near surface engineered waste disposal systems including waste forms, containment structures, entombments, and environmental remediation. These cementitious materials are exposed to dynamic environmental conditions that cause changes in material properties via (i) aging, (ii) chloride attack, (iii) sulfate attack, (iv) carbonation, (v) oxidation, and (vi) primary constituent leaching. A set of state-of-the-art software tools has been selected as a starting point to capture these important aging and degradation phenomena. Integration of existing software developed by the CBP partner organizations was determined to be the quickest method of meeting the CBP goal of providing a computational tool that improves the prediction of the long-term behavior of cementitious materials. These partner codes were selected based on their maturity and ability to address the problems outlined above. The GoldSim Monte Carlo simulation program (GTG 2010a, GTG 2010b) was chosen as the code integration platform (Brown & Flach 2009b). GoldSim (current Version 10.5) is a Windows based graphical object-oriented computer program that provides a flexible environment for model development (Brown & Flach 2009b). The linking of GoldSim to external codes has previously been successfully demonstrated (Eary 2007, Mattie et al. 2007). GoldSim is capable of performing deterministic and probabilistic simulations and of modeling radioactive decay and constituent transport. As part of the CBP project, a general Dynamic Link Library (DLL) interface was

  10. Forms and Linear Network Codes

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    We present a general theory to obtain linear network codes utilizing forms and obtain explicit families of equidimensional vector spaces, in which any pair of distinct vector spaces intersect in the same small dimension. The theory is inspired by the methods of the author utilizing the osculating...... spaces of Veronese varieties. Linear network coding transmits information in terms of a basis of a vector space and the information is received as a basis of a possibly altered vector space. Ralf Koetter and Frank R. Kschischang introduced a metric on the set af vector spaces and showed that a minimal...... distance decoder for this metric achieves correct decoding if the dimension of the intersection of the transmitted and received vector space is sufficiently large. The vector spaces in our construction are equidistant in the above metric and the distance between any pair of vector spaces is large making...

  11. Clean Code - Why you should care

    CERN Document Server

    CERN. Geneva

    2015-01-01

    - Martin Fowler Writing code is communication, not solely with the computer that executes it, but also with other developers and with oneself. A developer spends a lot of his working time reading and understanding code that was written by other developers or by himself in the past. The readability of the code plays an important factor for the time to find a bug or add new functionality, which in turn has a big impact on the productivity. Code that is difficult to undestand, hard to maintain and refactor, and offers many spots for bugs to hide is not considered to be "clean code". But what could considered as "clean code" and what are the advantages of a strict application of its guidelines? In this presentation we will take a look on some typical "code smells" and proposed guidelines to improve your coding skills to write cleaner code that is less bug prone and better to maintain.

  12. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding...... complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity....... Coding density tuning can be performed by designing time-dependent coding matrices. In multicast networks, this tuning can be performed within the network by designing time-dependent pre- coding and network coding matrices with mild conditions on the network structure for specific densities. We present...

  13. Implementation of LT codes based on chaos

    International Nuclear Information System (INIS)

    Zhou Qian; Li Liang; Chen Zengqiang; Zhao Jiaxiang

    2008-01-01

    Fountain codes provide an efficient way to transfer information over erasure channels like the Internet. LT codes are the first codes fully realizing the digital fountain concept. They are asymptotically optimal rateless erasure codes with highly efficient encoding and decoding algorithms. In theory, for each encoding symbol of LT codes, its degree is randomly chosen according to a predetermined degree distribution, and its neighbours used to generate that encoding symbol are chosen uniformly at random. Practical implementation of LT codes usually realizes the randomness through pseudo-randomness number generator like linear congruential method. This paper applies the pseudo-randomness of chaotic sequence in the implementation of LT codes. Two Kent chaotic maps are used to determine the degree and neighbour(s) of each encoding symbol. It is shown that the implemented LT codes based on chaos perform better than the LT codes implemented by the traditional pseudo-randomness number generator. (general)

  14. Practical physical layer network coding

    OpenAIRE

    Kramarev, Dmitry

    2017-01-01

    Physical-layer network coding (PNC) is a new technology which has the potential to increase network throughput beyond existing standards based on routing. Despite the fact that PNC has been well investigated from information-theoretic point of view, only a few partial prototypes have been reported in the literature. The implementation of a PNC system is burdened with many challenges such as carrier-phase, symbol and frame asynchrony. In this research, we mainly focus on software-defined radio...

  15. Halftone Coding with JBIG2

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    2000-01-01

    of a halftone pattern dictionary.The decoder first decodes the gray-scale image. Then for each gray-scale pixel looks up the corresponding halftonepattern in the dictionary and places it in the reconstruction bitmap at the position corresponding to the gray-scale pixel. The coding method is inherently lossy....... Besides descreening and construction of the dictionary, we address graceful degradationand artifact removal....

  16. Development of TIME2 code

    International Nuclear Information System (INIS)

    1986-02-01

    The paper reviews the progress on the development of a computer model TIME2, for modelling the long term evolution of shallow burial site environments for low- and intermediate-level radioactive waste disposal. The subject is discussed under the five topic headings: 1) background studies, including geomorphology, climate, human-induced effects, and seismicity, 2) development of the TIME2 code, 3) verification and testing, 4) documentation, and, 5) role of TIME2 in radiological risk assessment. (U.K.)

  17. Predictive coding in Agency Detection

    DEFF Research Database (Denmark)

    Andersen, Marc Malmdorf

    2017-01-01

    Agency detection is a central concept in the cognitive science of religion (CSR). Experimental studies, however, have so far failed to lend support to some of the most common predictions that follow from current theories on agency detection. In this article, I argue that predictive coding, a high...... for the effects of culture on the detection of supernatural agency and a range of other religious and spiritual perceptual phenomena....

  18. The Accurate Particle Tracer Code

    OpenAIRE

    Wang, Yulei; Liu, Jian; Qin, Hong; Yu, Zhi

    2016-01-01

    The Accurate Particle Tracer (APT) code is designed for large-scale particle simulations on dynamical systems. Based on a large variety of advanced geometric algorithms, APT possesses long-term numerical accuracy and stability, which are critical for solving multi-scale and non-linear problems. Under the well-designed integrated and modularized framework, APT serves as a universal platform for researchers from different fields, such as plasma physics, accelerator physics, space science, fusio...

  19. Solutions for Coding Societal Events

    Science.gov (United States)

    2016-12-01

    SOLUTIONS FOR CODING SOCIETAL EVENTS RAYTHEON BBN TECHNOLOGIES CORP. DECEMBER 2016 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE...Unit Manager Deputy Chief, Information Intelligence Systems & Analysis Division Information Directorate This report is...SOCIETAL EVENTS 5a. CONTRACT NUMBER FA8750-15-C-0276 5b. GRANT NUMBER N/A 5c. PROGRAM ELEMENT NUMBER N/A 6. AUTHOR(S) Elizabeth Boschee 5d

  20. Dual-code quantum computation model

    Science.gov (United States)

    Choi, Byung-Soo

    2015-08-01

    In this work, we propose the dual-code quantum computation model—a fault-tolerant quantum computation scheme which alternates between two different quantum error-correction codes. Since the chosen two codes have different sets of transversal gates, we can implement a universal set of gates transversally, thereby reducing the overall cost. We use code teleportation to convert between quantum states in different codes. The overall cost is decreased if code teleportation requires fewer resources than the fault-tolerant implementation of the non-transversal gate in a specific code. To analyze the cost reduction, we investigate two cases with different base codes, namely the Steane and Bacon-Shor codes. For the Steane code, neither the proposed dual-code model nor another variation of it achieves any cost reduction since the conventional approach is simple. For the Bacon-Shor code, the three proposed variations of the dual-code model reduce the overall cost. However, as the encoding level increases, the cost reduction decreases and becomes negative. Therefore, the proposed dual-code model is advantageous only when the encoding level is low and the cost of the non-transversal gate is relatively high.

  1. Special issue on network coding

    Science.gov (United States)

    Monteiro, Francisco A.; Burr, Alister; Chatzigeorgiou, Ioannis; Hollanti, Camilla; Krikidis, Ioannis; Seferoglu, Hulya; Skachek, Vitaly

    2017-12-01

    Future networks are expected to depart from traditional routing schemes in order to embrace network coding (NC)-based schemes. These have created a lot of interest both in academia and industry in recent years. Under the NC paradigm, symbols are transported through the network by combining several information streams originating from the same or different sources. This special issue contains thirteen papers, some dealing with design aspects of NC and related concepts (e.g., fountain codes) and some showcasing the application of NC to new services and technologies, such as data multi-view streaming of video or underwater sensor networks. One can find papers that show how NC turns data transmission more robust to packet losses, faster to decode, and more resilient to network changes, such as dynamic topologies and different user options, and how NC can improve the overall throughput. This issue also includes papers showing that NC principles can be used at different layers of the networks (including the physical layer) and how the same fundamental principles can lead to new distributed storage systems. Some of the papers in this issue have a theoretical nature, including code design, while others describe hardware testbeds and prototypes.

  2. Computer Code for Nanostructure Simulation

    Science.gov (United States)

    Filikhin, Igor; Vlahovic, Branislav

    2009-01-01

    Due to their small size, nanostructures can have stress and thermal gradients that are larger than any macroscopic analogue. These gradients can lead to specific regions that are susceptible to failure via processes such as plastic deformation by dislocation emission, chemical debonding, and interfacial alloying. A program has been developed that rigorously simulates and predicts optoelectronic properties of nanostructures of virtually any geometrical complexity and material composition. It can be used in simulations of energy level structure, wave functions, density of states of spatially configured phonon-coupled electrons, excitons in quantum dots, quantum rings, quantum ring complexes, and more. The code can be used to calculate stress distributions and thermal transport properties for a variety of nanostructures and interfaces, transport and scattering at nanoscale interfaces and surfaces under various stress states, and alloy compositional gradients. The code allows users to perform modeling of charge transport processes through quantum-dot (QD) arrays as functions of inter-dot distance, array order versus disorder, QD orientation, shape, size, and chemical composition for applications in photovoltaics and physical properties of QD-based biochemical sensors. The code can be used to study the hot exciton formation/relation dynamics in arrays of QDs of different shapes and sizes at different temperatures. It also can be used to understand the relation among the deposition parameters and inherent stresses, strain deformation, heat flow, and failure of nanostructures.

  3. The computer code SEURBNUK-2

    International Nuclear Information System (INIS)

    Yerkess, A.

    1984-01-01

    SEURBNUK-2 has been designed to model the hydrodynamic development in time of a hypothetical core disrupture accident in a fast breeder reactor. SEURBNUK-2 is a two-dimensional, axisymmetric, eulerian, finite difference containment code. The numerical procedure adopted in SEURBNUK to solve the hydrodynamic equations is based on the semi-implicit ICE method. SEURBNUK has a full thin shell treatment for tanks of arbitrary shape and includes the effects of the compressibility of the fluid. Fluid flow through porous media and porous structures can also be accommodated. An important feature of SEURBNUK is that the thin shell equations are solved quite separately from those of the fluid, and the time step for the fluid flow calculation can be an integer multiple of that for calculating the shell motion. The interaction of the shell with the fluid is then considered as a modification to the coefficients in the implicit pressure equations, the modifications naturally depending on the behaviour of the thin shell section within the fluid cell. The code is limited to dealing with a single fluid, the coolant, whereas the bubble and the cover gas are treated as cavities of uniform pressure calculated via appropriate pressure-volume-energy relationships. This manual describes the input data specifications needed for the execution of SEURBNUK-2 calculations and nine sample problems of varying degrees of complexity highlight the code capabilities. After explaining the output facilities information is included to aid those unfamiliar with SEURBNUK-2 to avoid the common pit-falls experienced by novices

  4. Fractional baud-length coding

    Directory of Open Access Journals (Sweden)

    J. Vierinen

    2011-06-01

    Full Text Available We present a novel approach for modulating radar transmissions in order to improve target range and Doppler estimation accuracy. This is achieved by using non-uniform baud lengths. With this method it is possible to increase sub-baud range-resolution of phase coded radar measurements while maintaining a narrow transmission bandwidth. We first derive target backscatter amplitude estimation error covariance matrix for arbitrary targets when estimating backscatter in amplitude domain. We define target optimality and discuss different search strategies that can be used to find well performing transmission envelopes. We give several simulated examples of the method showing that fractional baud-length coding results in smaller estimation errors than conventional uniform baud length transmission codes when estimating the target backscatter amplitude at sub-baud range resolution. We also demonstrate the method in practice by analyzing the range resolved power of a low-altitude meteor trail echo that was measured using a fractional baud-length experiment with the EISCAT UHF system.

  5. Impacts of Model Building Energy Codes

    Energy Technology Data Exchange (ETDEWEB)

    Athalye, Rahul A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sivaraman, Deepak [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Elliott, Douglas B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Liu, Bing [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bartlett, Rosemarie [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-10-31

    The U.S. Department of Energy (DOE) Building Energy Codes Program (BECP) periodically evaluates national and state-level impacts associated with energy codes in residential and commercial buildings. Pacific Northwest National Laboratory (PNNL), funded by DOE, conducted an assessment of the prospective impacts of national model building energy codes from 2010 through 2040. A previous PNNL study evaluated the impact of the Building Energy Codes Program; this study looked more broadly at overall code impacts. This report describes the methodology used for the assessment and presents the impacts in terms of energy savings, consumer cost savings, and reduced CO2 emissions at the state level and at aggregated levels. This analysis does not represent all potential savings from energy codes in the U.S. because it excludes several states which have codes which are fundamentally different from the national model energy codes or which do not have state-wide codes. Energy codes follow a three-phase cycle that starts with the development of a new model code, proceeds with the adoption of the new code by states and local jurisdictions, and finishes when buildings comply with the code. The development of new model code editions creates the potential for increased energy savings. After a new model code is adopted, potential savings are realized in the field when new buildings (or additions and alterations) are constructed to comply with the new code. Delayed adoption of a model code and incomplete compliance with the code’s requirements erode potential savings. The contributions of all three phases are crucial to the overall impact of codes, and are considered in this assessment.

  6. Energy information data base: report number codes

    International Nuclear Information System (INIS)

    1979-09-01

    Each report processed by the US DOE Technical Information Center is identified by a unique report number consisting of a code plus a sequential number. In most cases, the code identifies the originating installation. In some cases, it identifies a specific program or a type of publication. Listed in this publication are all codes that have been used by DOE in cataloging reports. This compilation consists of two parts. Part I is an alphabetical listing of report codes identified with the issuing installations that have used the codes. Part II is an alphabetical listing of installations identified with codes each has used

  7. QR CODE IN LIBRARY PRACTICE SOME EXAMPLES

    OpenAIRE

    Ajay Shanker Mishra*, Sachin Kumar Umre, Pavan Kumar Gupta

    2017-01-01

    Quick Response (QR) code is one such technology which can cater to the user demand of providing access to resources through mobile. The main objective of this article to review the concept of Quick Response Code (QR code) and describe the practice of reading and generating QR codes. Research paper attempt to the basic concept, structure, technological pros and cons of the QR code. The literature is filled with potential uses for Quick Response (QR) codes in the library practices like e-resour...

  8. User instructions for the CIDER Dose Code

    Energy Technology Data Exchange (ETDEWEB)

    Eslinger, P.W.; Lessor, K.S.; Ouderkirk, S.J.

    1994-05-01

    This document provides user instructions for the CIDER (Calculation of Individual Doses from Environmental Radionuclides) computer code. The CIDER code computes estimates of annual doses estimated for both reference individuals with a known residence and food consumption history. This document also provides user instructions for four utility codes used to build input data libraries for CIDER. These utility codes are ENVFAC (environmental factors), FOOFAC (food factors), LIFFAC (lifestyle factors), and ORGFAC (organ factors). Finally, this document provides user instructions for the EXPAND utility code. The EXPAND code processes a result file from CIDER and extracts a summary of the dose information for reporting or plotting purposes.

  9. Energy information data base: report number codes

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-09-01

    Each report processed by the US DOE Technical Information Center is identified by a unique report number consisting of a code plus a sequential number. In most cases, the code identifies the originating installation. In some cases, it identifies a specific program or a type of publication. Listed in this publication are all codes that have been used by DOE in cataloging reports. This compilation consists of two parts. Part I is an alphabetical listing of report codes identified with the issuing installations that have used the codes. Part II is an alphabetical listing of installations identified with codes each has used. (RWR)

  10. CodeArmor : Virtualizing the Code Space to Counter Disclosure Attacks

    NARCIS (Netherlands)

    Chen, Xi; Bos, Herbert; Giuffrida, Cristiano

    2017-01-01

    Code diversification is an effective strategy to prevent modern code-reuse exploits. Unfortunately, diversification techniques are inherently vulnerable to information disclosure. Recent diversification-aware ROP exploits have demonstrated that code disclosure attacks are a realistic threat, with an

  11. An implicit Smooth Particle Hydrodynamic code

    Energy Technology Data Exchange (ETDEWEB)

    Knapp, Charles E. [Univ. of New Mexico, Albuquerque, NM (United States)

    2000-05-01

    An implicit version of the Smooth Particle Hydrodynamic (SPH) code SPHINX has been written and is working. In conjunction with the SPHINX code the new implicit code models fluids and solids under a wide range of conditions. SPH codes are Lagrangian, meshless and use particles to model the fluids and solids. The implicit code makes use of the Krylov iterative techniques for solving large linear-systems and a Newton-Raphson method for non-linear corrections. It uses numerical derivatives to construct the Jacobian matrix. It uses sparse techniques to save on memory storage and to reduce the amount of computation. It is believed that this is the first implicit SPH code to use Newton-Krylov techniques, and is also the first implicit SPH code to model solids. A description of SPH and the techniques used in the implicit code are presented. Then, the results of a number of tests cases are discussed, which include a shock tube problem, a Rayleigh-Taylor problem, a breaking dam problem, and a single jet of gas problem. The results are shown to be in very good agreement with analytic solutions, experimental results, and the explicit SPHINX code. In the case of the single jet of gas case it has been demonstrated that the implicit code can do a problem in much shorter time than the explicit code. The problem was, however, very unphysical, but it does demonstrate the potential of the implicit code. It is a first step toward a useful implicit SPH code.

  12. Numerical Electromagnetic Code (NEC)-Reflector Antenna Code: Part II. Code Manual.

    Science.gov (United States)

    1979-09-01

    otr "isin omette u* a0, orsetll na tWotto lthas m nsinmlan y w be ra r ate 40sw~at fatta i oamatm m tllt otsei ri ywysple~ tesi rIs pflfhms seer...The complex argument CODE LISTING FUNCTION BARS (Z) 2 !’’ C!!! THIS ROUTINE IS USED TO GIVE COMPLEX ABSOLUTE VALUES. IT IS 4 L!!! USED RATHER STANDARD

  13. Robust Reed Solomon Coded MPSK Modulation

    Directory of Open Access Journals (Sweden)

    Emir M. Husni

    2014-10-01

    Full Text Available In this paper, construction of partitioned Reed Solomon coded modulation (RSCM, which is robust for the additive white Gaussian noise channel and a Rayleigh fading channel, is investigated. By matching configuration of component codes with the channel characteristics, it is shown that this system is robust for the Gaussian and a Rayleigh fading channel. This approach is compared with non-partitioned RSCM, a Reed Solomon code combined with an MPSK signal set using Gray mapping; and block coded MPSK modulation using binary codes, Reed Muller codes. All codes use hard decision decoding algorithm. Simulation results for these schemes show that RSCM based on set partitioning performs better than those that are not based on set partitioning and Reed Muller Coded Modulation across a wide range of conditions. The novel idea here is that in the receiver, we use a rotated 2^(m+1-PSK detector if the transmitter uses a 2^m-PSK modulator.

  14. Coding Theory, Cryptography and Related Areas

    DEFF Research Database (Denmark)

    Buchmann, Johannes; Stichtenoth, Henning; Tapia-Recillas, Horacio

    Proceedings of anInternational Conference on Coding Theory, Cryptography and Related Areas, held in Guanajuato, Mexico. in april 1998......Proceedings of anInternational Conference on Coding Theory, Cryptography and Related Areas, held in Guanajuato, Mexico. in april 1998...

  15. Monte Carlo code development in Los Alamos

    International Nuclear Information System (INIS)

    Carter, L.L.; Cashwell, E.D.; Everett, C.J.; Forest, C.A.; Schrandt, R.G.; Taylor, W.M.; Thompson, W.L.; Turner, G.D.

    1974-01-01

    The present status of Monte Carlo code development at Los Alamos Scientific Laboratory is discussed. A brief summary is given of several of the most important neutron, photon, and electron transport codes. 17 references. (U.S.)

  16. WPC's Short Range Forecast Coded Bulletin

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Short Range Forecast Coded Bulletin. The Short Range Forecast Coded Bulletin describes the expected locations of high and low pressure centers, surface frontal...

  17. Temporal Coding of Volumetric Imagery

    Science.gov (United States)

    Llull, Patrick Ryan

    'Image volumes' refer to realizations of images in other dimensions such as time, spectrum, and focus. Recent advances in scientific, medical, and consumer applications demand improvements in image volume capture. Though image volume acquisition continues to advance, it maintains the same sampling mechanisms that have been used for decades; every voxel must be scanned and is presumed independent of its neighbors. Under these conditions, improving performance comes at the cost of increased system complexity, data rates, and power consumption. This dissertation explores systems and methods capable of efficiently improving sensitivity and performance for image volume cameras, and specifically proposes several sampling strategies that utilize temporal coding to improve imaging system performance and enhance our awareness for a variety of dynamic applications. Video cameras and camcorders sample the video volume (x,y,t) at fixed intervals to gain understanding of the volume's temporal evolution. Conventionally, one must reduce the spatial resolution to increase the framerate of such cameras. Using temporal coding via physical translation of an optical element known as a coded aperture, the compressive temporal imaging (CACTI) camera emonstrates a method which which to embed the temporal dimension of the video volume into spatial (x,y) measurements, thereby greatly improving temporal resolution with minimal loss of spatial resolution. This technique, which is among a family of compressive sampling strategies developed at Duke University, temporally codes the exposure readout functions at the pixel level. Since video cameras nominally integrate the remaining image volume dimensions (e.g. spectrum and focus) at capture time, spectral (x,y,t,lambda) and focal (x,y,t,z) image volumes are traditionally captured via sequential changes to the spectral and focal state of the system, respectively. The CACTI camera's ability to embed video volumes into images leads to exploration

  18. A Pseudorandom Code Modulated LIDAR

    Science.gov (United States)

    Hunt, K. P.; Eichinger, W. E.; Kruger, A.

    2009-12-01

    Typical Light Detection and Ranging (LIDAR) uses high power pulsed lasers to ensure a detectable return signal. For short ranges, modulated diode lasers offer an attractive alternative, particularly in the areas of size, weight, cost, eye safety and use of energy. Flexible electronic modulation of the laser diode allows the development of pseudorandom code (PRC) LIDAR systems that can overcome the disadvantage of low output power and thus low signal to noise ratios. Different PRCs have been proposed. For example, so called M-sequences can be generated simply, but are unbalanced: they have more ones than zeros, which results in a residual noise component. Other sequences such as the A1 and A2 sequences are balanced, but have two autocorrelation peaks, resulting in undesirable pickup of signals from different ranges. In this work, we investigate a new code, an M-sequence with a zero added at the end. The result is still easily generated and has a single autocorrelation peak, but is now balanced. We loaded these sequences into a commercial arbitrary waveform generator (ARB), an Agilent 33250A, which then modulates the laser diode. This allows sequences to be changed quickly and easily, permitting us to design and investigate a wide range of PRC sequences with desirable properties. The ARB modulates a Melles Griot 56ICS near infrared laser diode at a 10 MHz chip rate. Backscatter is collected and focused by a telescope and the detected signal is sampled and correlated with the known PRC. We have gathered data from this LIDAR system and experimentally assessed the performance of this new class of codes.

  19. Fast code for Monte Carlo simulations

    International Nuclear Information System (INIS)

    Oliveira, P.M.C. de; Penna, T.J.P.

    1988-01-01

    A computer code to generate the dynamic evolution of the Ising model on a square lattice, following the Metropolis algorithm is presented. The computer time consumption is reduced by a factor of 8 when one compares our code with traditional multiple spin codes. The memory allocation size is also reduced by a factor of 4. The code is easily generalizable for other lattices and models. (author) [pt

  20. Recent activities in accelerator code development

    International Nuclear Information System (INIS)

    Copper, R.K.; Ryne, R.D.

    1992-01-01

    In this paper we will review recent activities in the area of code development as it affects the accelerator community. We will first discuss the changing computing environment. We will review how the computing environment has changed in the last 10 years, with emphasis on computing power, operating systems, computer languages, graphics standards, and massively parallel processing. Then we will discuss recent code development activities in the areas of electromagnetics codes and beam dynamics codes

  1. LUCID - an optical design and raytrace code

    International Nuclear Information System (INIS)

    Nicholas, D.J.; Duffey, K.P.

    1980-11-01

    A 2D optical design and ray trace code is described. The code can operate either as a geometric optics propagation code or provide a scalar diffraction treatment. There are numerous non-standard options within the code including design and systems optimisation procedures. A number of illustrative problems relating to the design of optical components in the field of high power lasers is included. (author)

  2. Usage of QR code in tourism industry

    OpenAIRE

    Emek, Mehmet

    2012-01-01

    QR (Quick Response) code scanning allows the user to obtain in-depth information about the scanned item. Apps used for scanning QR codes can be found on nearly all smart phone devices. Travelers who have smart phone, equipped with the correct reader software, can easily access QR coded information (text, photo, video, web page, etc.) when it is available. Travelers can scan QR coded galleries, places, vineyards or monuments when they are visiting and reach the detailed information without usi...

  3. Coding chaotic billiards. Pt. 2

    International Nuclear Information System (INIS)

    Giannoni, M.J.; Ullmo, D.

    1993-01-01

    A method was proposed earlier to derive exact symbolic dynamics for polygonal billiards defined on a negative curvature surface, whose all vertices lie at infinity. This method is now extended to the case of compact billiards tiling the Poincare disk, using elementary tools such as the bounce mapping. An exact coding is derived also in this case. Furthermore, some results are obtained without using the tiling property. They allow to tackle the more complicated case of non-tiling billiards. (authors). 18 refs., 13 figs

  4. Coding repeats and evolutionary "agility".

    Science.gov (United States)

    Caburet, Sandrine; Cocquet, Julie; Vaiman, Daniel; Veitia, Reiner A

    2005-06-01

    The rapid generation of new shapes observed in the living world is the result of genetic variation, especially in "morphological" developmental genes. Many of these genes contain coding tandem repeats. Fondon and Garner have shown that expansions and contractions of these repeats are associated with the great diversity of morphologies observed in the domestic dog, Canis familiaris. In particular, they found that the repeat variations in two genes were significantly associated with changes in limb and skull morphology. These results open the possibility that such a mechanism contributes to the diversity of life.

  5. Neural Elements for Predictive Coding

    Directory of Open Access Journals (Sweden)

    Stewart SHIPP

    2016-11-01

    Full Text Available Predictive coding theories of sensory brain function interpret the hierarchical construction of the cerebral cortex as a Bayesian, generative model capable of predicting the sensory data consistent with any given percept. Predictions are fed backwards in the hierarchy and reciprocated by prediction error in the forward direction, acting to modify the representation of the outside world at increasing levels of abstraction, and so to optimize the nature of perception over a series of iterations. This accounts for many ‘illusory’ instances of perception where what is seen (heard, etc is unduly influenced by what is expected, based on past experience. This simple conception, the hierarchical exchange of prediction and prediction error, confronts a rich cortical microcircuitry that is yet to be fully documented. This article presents the view that, in the current state of theory and practice, it is profitable to begin a two-way exchange: that predictive coding theory can support an understanding of cortical microcircuit function, and prompt particular aspects of future investigation, whilst existing knowledge of microcircuitry can, in return, influence theoretical development. As an example, a neural inference arising from the earliest formulations of predictive coding is that the source populations of forwards and backwards pathways should be completely separate, given their functional distinction; this aspect of circuitry – that neurons with extrinsically bifurcating axons do not project in both directions – has only recently been confirmed. Here, the computational architecture prescribed by a generalized (free-energy formulation of predictive coding is combined with the classic ‘canonical microcircuit’ and the laminar architecture of hierarchical extrinsic connectivity to produce a template schematic, that is further examined in the light of (a updates in the microcircuitry of primate visual cortex, and (b rapid technical advances made

  6. Distributed Video Coding: Iterative Improvements

    DEFF Research Database (Denmark)

    Luong, Huynh Van

    at the decoder side offering such benefits for these applications. Although there have been some advanced improvement techniques, improving the DVC coding efficiency is still challenging. The thesis addresses this challenge by proposing several iterative algorithms at different working levels, e.g. bitplane...... and noise modeling and also learn from the previous decoded Wyner-Ziv (WZ) frames, side information and noise learning (SING) is proposed. The SING scheme introduces an optical flow technique to compensate the weaknesses of the block based SI generation and also utilizes clustering of DCT blocks to capture...

  7. Multichannel Coding of Applause Signals

    OpenAIRE

    Jeroen Breebaart; Steven van de Par; Gerard Hotho

    2007-01-01

    We develop a parametric multichannel audio codec dedicated to coding signals consisting of a dense series of transient-type events. These signals of which applause is a typical example are known to be problematic for such audio codecs. The codec design is based on preservation of both timbre and transient-type event density. It combines a very low complexity and a low parameter bit rate (0.2 kbps). In a formal listening test, we compared the proposed codec to the recently standardised MPEG Su...

  8. Neural Elements for Predictive Coding.

    Science.gov (United States)

    Shipp, Stewart

    2016-01-01

    Predictive coding theories of sensory brain function interpret the hierarchical construction of the cerebral cortex as a Bayesian, generative model capable of predicting the sensory data consistent with any given percept. Predictions are fed backward in the hierarchy and reciprocated by prediction error in the forward direction, acting to modify the representation of the outside world at increasing levels of abstraction, and so to optimize the nature of perception over a series of iterations. This accounts for many 'illusory' instances of perception where what is seen (heard, etc.) is unduly influenced by what is expected, based on past experience. This simple conception, the hierarchical exchange of prediction and prediction error, confronts a rich cortical microcircuitry that is yet to be fully documented. This article presents the view that, in the current state of theory and practice, it is profitable to begin a two-way exchange: that predictive coding theory can support an understanding of cortical microcircuit function, and prompt particular aspects of future investigation, whilst existing knowledge of microcircuitry can, in return, influence theoretical development. As an example, a neural inference arising from the earliest formulations of predictive coding is that the source populations of forward and backward pathways should be completely separate, given their functional distinction; this aspect of circuitry - that neurons with extrinsically bifurcating axons do not project in both directions - has only recently been confirmed. Here, the computational architecture prescribed by a generalized (free-energy) formulation of predictive coding is combined with the classic 'canonical microcircuit' and the laminar architecture of hierarchical extrinsic connectivity to produce a template schematic, that is further examined in the light of (a) updates in the microcircuitry of primate visual cortex, and (b) rapid technical advances made possible by transgenic neural

  9. Regularized robust coding for face recognition.

    Science.gov (United States)

    Yang, Meng; Zhang, Lei; Yang, Jian; Zhang, David

    2013-05-01

    Recently the sparse representation based classification (SRC) has been proposed for robust face recognition (FR). In SRC, the testing image is coded as a sparse linear combination of the training samples, and the representation fidelity is measured by the l2-norm or l1 -norm of the coding residual. Such a sparse coding model assumes that the coding residual follows Gaussian or Laplacian distribution, which may not be effective enough to describe the coding residual in practical FR systems. Meanwhile, the sparsity constraint on the coding coefficients makes the computational cost of SRC very high. In this paper, we propose a new face coding model, namely regularized robust coding (RRC), which could robustly regress a given signal with regularized regression coefficients. By assuming that the coding residual and the coding coefficient are respectively independent and identically distributed, the RRC seeks for a maximum a posterior solution of the coding problem. An iteratively reweighted regularized robust coding (IR(3)C) algorithm is proposed to solve the RRC model efficiently. Extensive experiments on representative face databases demonstrate that the RRC is much more effective and efficient than state-of-the-art sparse representation based methods in dealing with face occlusion, corruption, lighting, and expression changes, etc.

  10. Reactor safety computer code development at INEL

    International Nuclear Information System (INIS)

    Johnsen, G.W.

    1985-01-01

    This report provides a brief overview of the computer code development programs being conducted at EG and G Idaho, Inc. on behalf of US Nuclear Regulatory Commission and the Department of Energy, Idaho Operations Office. Included are descriptions of the codes being developed, their development status as of the date of this report, and resident code development expertise

  11. Development and application of the waste code

    International Nuclear Information System (INIS)

    Morison, I.W.

    1984-01-01

    This paper discusses the objectives and general approach underlying the Australian Code of Practice on the Management of Radioactive Wastes arising from the Mining and Milling of Radioactive Ores 1982. Background to the development of the Code is provided and the guidelines which supplement the Code are considered

  12. A class of Sudan-decodable codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2000-01-01

    In this article, Sudan's algorithm is modified into an efficient method to list-decode a class of codes which can be seen as a generalization of Reed-Solomon codes. The algorithm is specialized into a very efficient method for unique decoding. The code construction can be generalized based...

  13. Qualification of the AUTOBUS Mod. 2 Code

    International Nuclear Information System (INIS)

    Ciarniello, U.; Peroni, P.

    1988-01-01

    The paper presents the qualification of AUTOBUS MOD.2 code. After a brief description of the code itself, all the critical experiments simulated by the code are illustrated to prove the accuracy of criticality calculation and power distribution. An interpretation of the results and a conclusion close this presentation

  14. Code Review For and By Scientists

    OpenAIRE

    Petre, Marian; Wilson, Greg

    2014-01-01

    We describe two pilot studies of code review by and for scientists. Our principal findings are that scientists are enthusiastic, but need to be shown code review in action, and that just-in-time review of small code changes is more likely to succeed than large-scale end-of-work reviews.

  15. Code quality issues in student programs

    NARCIS (Netherlands)

    Keuning, H.W.; Heeren, B.J.; Jeuring, J.T.

    2017-01-01

    Because low quality code can cause serious problems in software systems, students learning to program should pay attention to code quality early. Although many studies have investigated mistakes that students make during programming, we do not know much about the quality of their code. This study

  16. Codes of Ethics and Teachers' Professional Autonomy

    Science.gov (United States)

    Schwimmer, Marina; Maxwell, Bruce

    2017-01-01

    This article considers the value of adopting a code of professional ethics for teachers. After having underlined how a code of ethics stands to benefits a community of educators--namely, by providing a mechanism for regulating autonomy and promoting a shared professional ethic--the article examines the principal arguments against codes of ethics.…

  17. Data processing of imperfectly coded images

    International Nuclear Information System (INIS)

    Hammersley, A.P.; Skinner, G.K.

    1984-01-01

    The theory of mask coding is well established for perfect coding systems, but imperfections in practical situations produce new data processing problems. The Spacelab 2 telescopes are fully coded systems, but some complications arise as parts of the detector are obscured by a strengthening cross. The effects of this sort of obscuration on image quality and ways of handling them will be discussed. (orig.)

  18. The general theory of convolutional codes

    Science.gov (United States)

    Mceliece, R. J.; Stanley, R. P.

    1993-01-01

    This article presents a self-contained introduction to the algebraic theory of convolutional codes. This introduction is partly a tutorial, but at the same time contains a number of new results which will prove useful for designers of advanced telecommunication systems. Among the new concepts introduced here are the Hilbert series for a convolutional code and the class of compact codes.

  19. Expansion of the CHR bone code system

    International Nuclear Information System (INIS)

    Farnham, J.E.; Schlenker, R.A.

    1976-01-01

    This report describes the coding system used in the Center for Human Radiobiology (CHR) to identify individual bones and portions of bones of a complete skeletal system. It includes illustrations of various bones and bone segments with their respective code numbers. Codes are also presented for bone groups and for nonbone materials

  20. Bar code instrumentation for nuclear safeguards

    International Nuclear Information System (INIS)

    Bieber, A.M. Jr.

    1984-01-01

    This paper presents a brief overview of the basic principles of bar codes and the equipment used to make and to read bar code labels, and a summary of some of the more important factors that need to be considered in integrating bar codes into an information system

  1. A Mobile Application Prototype using Network Coding

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank

    2010-01-01

    This paper looks into implementation details of network coding for a mobile application running on commercial mobile phones. We describe the necessary coding operations and algorithms that implements them. The coding algorithms forms the basis for a implementation in C++ and Symbian C++. We repor...

  2. NUSTRA - optimization code for nuclear reactor strategies

    International Nuclear Information System (INIS)

    Tusa, E.; Vira, J.

    1979-02-01

    A computer code is designed to solve the optimal reactor strategy corresponding to a given nuclear power program. As a novel feature the code includes capabilities for explicit uncertainty resolution. After a short description of the calculation methods this report gives the input instructions for the code. (author)

  3. Evolutionary implications of genetic code deviations

    International Nuclear Information System (INIS)

    Chela Flores, J.

    1986-07-01

    By extending the standard genetic code into a temperature dependent regime, we propose a train of molecular events leading to alternative coding. The first few examples of these deviations have already been reported in some ciliated protozoans and Gram positive bacteria. A possible range of further alternative coding, still within the context of universality, is pointed out. (author)

  4. Power feedback effects in the LEM code

    International Nuclear Information System (INIS)

    Kromar, M.

    1999-01-01

    The nodal diffusion code LEM has been extended with the power feedback option. Thermohydraulic and neutronic coupling is covered with the Reactivity Coefficient Method. Presented are results of the code testing. Verification is done on the typical non-uprated NPP Krsko reload cycles. Results show that the code fulfill objectives arising in the process of reactor core analysis.(author)

  5. A New Prime Code for Synchronous Optical Code Division Multiple-Access Networks

    Directory of Open Access Journals (Sweden)

    Huda Saleh Abbas

    2018-01-01

    Full Text Available A new spreading code based on a prime code for synchronous optical code-division multiple-access networks that can be used in monitoring applications has been proposed. The new code is referred to as “extended grouped new modified prime code.” This new code has the ability to support more terminal devices than other prime codes. In addition, it patches subsequences with “0s” leading to lower power consumption. The proposed code has an improved cross-correlation resulting in enhanced BER performance. The code construction and parameters are provided. The operating performance, using incoherent on-off keying modulation and incoherent pulse position modulation systems, has been analyzed. The performance of the code was compared with other prime codes. The results demonstrate an improved performance, and a BER floor of 10−9 was achieved.

  6. Schrödinger's code-script: not a genetic cipher but a code of development.

    Science.gov (United States)

    Walsby, A E; Hodge, M J S

    2017-06-01

    In his book What is Life? Erwin Schrödinger coined the term 'code-script', thought by some to be the first published suggestion of a hereditary code and perhaps a forerunner of the genetic code. The etymology of 'code' suggests three meanings relevant to 'code-script which we distinguish as 'cipher-code', 'word-code' and 'rule-code'. Cipher-codes and word-codes entail translation of one set of characters into another. The genetic code comprises not one but two cipher-codes: the first is the DNA 'base-pairing cipher'; the second is the 'nucleotide-amino-acid cipher', which involves the translation of DNA base sequences into amino-acid sequences. We suggest that Schrödinger's code-script is a form of 'rule-code', a set of rules that, like the 'highway code' or 'penal code', requires no translation of a message. Schrödinger first relates his code-script to chromosomal genes made of protein. Ignorant of its properties, however, he later abandons 'protein' and adopts in its place a hypothetical, isomeric 'aperiodic solid' whose atoms he imagines rearranged in countless different conformations, which together are responsible for the patterns of ontogenetic development. In an attempt to explain the large number of combinations required, Schrödinger referred to the Morse code (a cipher) but in doing so unwittingly misled readers into believing that he intended a cipher-code resembling the genetic code. We argue that the modern equivalent of Schrödinger's code-script is a rule-code of organismal development based largely on the synthesis, folding, properties and interactions of numerous proteins, each performing a specific task. Copyright © 2016. Published by Elsevier Ltd.

  7. The Clawpack Community of Codes

    Science.gov (United States)

    Mandli, K. T.; LeVeque, R. J.; Ketcheson, D.; Ahmadia, A. J.

    2014-12-01

    Clawpack, the Conservation Laws Package, has long been one of the standards for solving hyperbolic conservation laws but over the years has extended well beyond this role. Today a community of open-source codes have been developed that address a multitude of different needs including non-conservative balance laws, high-order accurate methods, and parallelism while remaining extensible and easy to use, largely by the judicious use of Python and the original Fortran codes that it wraps. This talk will present some of the recent developments in projects under the Clawpack umbrella, notably the GeoClaw and PyClaw projects. GeoClaw was originally developed as a tool for simulating tsunamis using adaptive mesh refinement but has since encompassed a large number of other geophysically relevant flows including storm surge and debris-flows. PyClaw originated as a Python version of the original Clawpack algorithms but has since been both a testing ground for new algorithmic advances in the Clawpack framework but also an easily extensible framework for solving hyperbolic balance laws. Some of these extensions include the addition of WENO high-order methods, massively parallel capabilities, and adaptive mesh refinement technologies, made possible largely by the flexibility of the Python language and community libraries such as NumPy and PETSc. Because of the tight integration with Python tecnologies, both packages have benefited also from the focus on reproducibility in the Python community, notably IPython notebooks.

  8. Computer code conversion using HISTORIAN

    International Nuclear Information System (INIS)

    Matsumoto, Kiyoshi; Kumakura, Toshimasa.

    1990-09-01

    When a computer program written for a computer A is converted for a computer B, in general, the A version source program is rewritten for B version. However, in this way of program conversion, the following inconvenient problems arise. 1) The original statements to be rewritten for B version are lost. 2) If the original statements of the A version rewritten for B version would remain as comment lines, the B version source program becomes quite large. 3) When update directives of the program are mailed from the organization which developed the program or when some modifications are needed for the program, it is difficult to point out the part to be updated or modified in the B version source program. To solve these problems, the conversion method using the general-purpose software management aid system, HISTORIAN, has been introduced. This conversion method makes a large computer code a easy-to-use program for use to update, modify or improve after the conversion. This report describes the planning and procedures of the conversion method and the MELPROG-PWR/MOD1 code conversion from the CRAY version to the JAERI FACOM version as an example. This report would provide useful information for those who develop or introduce large programs. (author)

  9. Feature coding for image representation and recognition

    CERN Document Server

    Huang, Yongzhen

    2015-01-01

    This brief presents a comprehensive introduction to feature coding, which serves as a key module for the typical object recognition pipeline. The text offers a rich blend of theory and practice while reflects the recent developments on feature coding, covering the following five aspects: (1) Review the state-of-the-art, analyzing the motivations and mathematical representations of various feature coding methods; (2) Explore how various feature coding algorithms evolve along years; (3) Summarize the main characteristics of typical feature coding algorithms and categorize them accordingly; (4) D

  10. Bar Coding and Tracking in Pathology.

    Science.gov (United States)

    Hanna, Matthew G; Pantanowitz, Liron

    2016-03-01

    Bar coding and specimen tracking are intricately linked to pathology workflow and efficiency. In the pathology laboratory, bar coding facilitates many laboratory practices, including specimen tracking, automation, and quality management. Data obtained from bar coding can be used to identify, locate, standardize, and audit specimens to achieve maximal laboratory efficiency and patient safety. Variables that need to be considered when implementing and maintaining a bar coding and tracking system include assets to be labeled, bar code symbologies, hardware, software, workflow, and laboratory and information technology infrastructure as well as interoperability with the laboratory information system. This article addresses these issues, primarily focusing on surgical pathology. Copyright © 2016 Elsevier Inc. All rights reserved.

  11. Code of ethics: principles for ethical leadership.

    Science.gov (United States)

    Flite, Cathy A; Harman, Laurinda B

    2013-01-01

    The code of ethics for a professional association incorporates values, principles, and professional standards. A review and comparative analysis of a 1934 pledge and codes of ethics from 1957, 1977, 1988, 1998, 2004, and 2011 for a health information management association was conducted. Highlights of some changes in the healthcare delivery system are identified as a general context for the codes of ethics. The codes of ethics are examined in terms of professional values and changes in the language used to express the principles of the various codes.

  12. The octopus burnup and criticality code system

    International Nuclear Information System (INIS)

    Kloosterman, J.L.; Kuijper, J.C.; Leege, P.F.A. de.

    1996-01-01

    The OCTOPUS burnup and criticality code system is described. This system links the spectrum codes from the SCALE4.1, WIMS7 and MCNP4A packages to the ORIGEN-S and FISPACT4.2 fuel depletion and activation codes, which enables us to perform very accurate burnup calculations in complicated three-dimensional geometries. The data used by all codes are consistently based on the JEF2.2 evaluated nuclear data file. Some special features of OCTOPUS not available in other codes are described, as well as the validation of the system. (author)

  13. The OCTOPUS burnup and criticality code system

    International Nuclear Information System (INIS)

    Kloosterman, J.L.; Kuijper, J.C.; Leege, P.F.A. de

    1996-06-01

    The OCTOPUS burnup and criticality code system is described. This system links the spectrum codes from the SCALE4.1, WIMS7 and MCNP4A packages to the ORIGEN-S and FISPACT4.2 fuel depletion and activation codes, which enables us to perform very accurate burnup calculations in complicated three-dimensional goemetries. The data used by all codes are consistently based on the JEF2.2 evaluated nuclear data file. Some special features of OCTOPUS not available in other codes are described, as well as the validation of the system. (orig.)

  14. ENDF utility codes version 6.8

    International Nuclear Information System (INIS)

    McLaughlin, P.K.

    1992-01-01

    Description and operating instructions are given for a package of utility codes operating on evaluated nuclear data files in the formats ENDF-5 and ENDF-6. Included are the data checking codes CHECKER, FIZCON, PSYCHE; the code INTER for retrieving thermal cross-sections and some other data; graphical plotting codes PLOTEF, GRALIB, graphic device interface subroutine library INTLIB; and the file maintenance and retrieval codes LISTEF, SETMDC, GETMAT, STANEF. This program package which is designed for CDC, IBM, DEC and PC computers, can be obtained on magnetic tape or floppy diskette, free of charge, from the IAEA Nuclear Data Section. (author)

  15. Orthogonal spectral coding of entangled photons.

    Science.gov (United States)

    Lukens, Joseph M; Dezfooliyan, Amir; Langrock, Carsten; Fejer, Martin M; Leaird, Daniel E; Weiner, Andrew M

    2014-04-04

    We extend orthogonal optical coding, previously applied to multiuser classical communication networks, to entangled photons. Using a pulse shaper and sum-frequency generation for ultrafast coincidence detection, we demonstrate encoding and decoding of biphoton wave packets. Applying one code to the signal photon spreads the wave packet in time and creates a null at zero delay; filtering the idler with the matched code recovers a narrow correlation peak, whereas applying any other code leaves the wave packet spread. Our results could prove useful in the development of code-based quantum communication networks.

  16. Multiplexed coding in the human basal ganglia

    Science.gov (United States)

    Andres, D. S.; Cerquetti, D.; Merello, M.

    2016-04-01

    A classic controversy in neuroscience is whether information carried by spike trains is encoded by a time averaged measure (e.g. a rate code), or by complex time patterns (i.e. a time code). Here we apply a tool to quantitatively analyze the neural code. We make use of an algorithm based on the calculation of the temporal structure function, which permits to distinguish what scales of a signal are dominated by a complex temporal organization or a randomly generated process. In terms of the neural code, this kind of analysis makes it possible to detect temporal scales at which a time patterns coding scheme or alternatively a rate code are present. Additionally, finding the temporal scale at which the correlation between interspike intervals fades, the length of the basic information unit of the code can be established, and hence the word length of the code can be found. We apply this algorithm to neuronal recordings obtained from the Globus Pallidus pars interna from a human patient with Parkinson’s disease, and show that a time pattern coding and a rate coding scheme co-exist at different temporal scales, offering a new example of multiplexed neuronal coding.

  17. Using Coding Apps to Support Literacy Instruction and Develop Coding Literacy

    Science.gov (United States)

    Hutchison, Amy; Nadolny, Larysa; Estapa, Anne

    2016-01-01

    In this article the authors present the concept of Coding Literacy and describe the ways in which coding apps can support the development of Coding Literacy and disciplinary and digital literacy skills. Through detailed examples, we describe how coding apps can be integrated into literacy instruction to support learning of the Common Core English…

  18. Optical network security using unipolar Walsh code

    Science.gov (United States)

    Sikder, Somali; Sarkar, Madhumita; Ghosh, Shila

    2018-04-01

    Optical code-division multiple-access (OCDMA) is considered as a good technique to provide optical layer security. Many research works have been published to enhance optical network security by using optical signal processing. The paper, demonstrates the design of the AWG (arrayed waveguide grating) router-based optical network for spectral-amplitude-coding (SAC) OCDMA networks with Walsh Code to design a reconfigurable network codec by changing signature codes to against eavesdropping. In this paper we proposed a code reconfiguration scheme to improve the network access confidentiality changing the signature codes by cyclic rotations, for OCDMA system. Each of the OCDMA network users is assigned a unique signature code to transmit the information and at the receiving end each receiver correlates its own signature pattern a(n) with the receiving pattern s(n). The signal arriving at proper destination leads to s(n)=a(n).

  19. Tailored Codes for Small Quantum Memories

    Science.gov (United States)

    Robertson, Alan; Granade, Christopher; Bartlett, Stephen D.; Flammia, Steven T.

    2017-12-01

    We demonstrate that small quantum memories, realized via quantum error correction in multiqubit devices, can benefit substantially by choosing a quantum code that is tailored to the relevant error model of the system. For a biased noise model, with independent bit and phase flips occurring at different rates, we show that a single code greatly outperforms the well-studied Steane code across the full range of parameters of the noise model, including for unbiased noise. In fact, this tailored code performs almost optimally when compared with 10 000 randomly selected stabilizer codes of comparable experimental complexity. Tailored codes can even outperform the Steane code with realistic experimental noise, and without any increase in the experimental complexity, as we demonstrate by comparison in the observed error model in a recent seven-qubit trapped ion experiment.

  20. Modified BTC Algorithm for Audio Signal Coding

    Directory of Open Access Journals (Sweden)

    TOMIC, S.

    2016-11-01

    Full Text Available This paper describes modification of a well-known image coding algorithm, named Block Truncation Coding (BTC and its application in audio signal coding. BTC algorithm was originally designed for black and white image coding. Since black and white images and audio signals have different statistical characteristics, the application of this image coding algorithm to audio signal presents a novelty and a challenge. Several implementation modifications are described in this paper, while the original idea of the algorithm is preserved. The main modifications are performed in the area of signal quantization, by designing more adequate quantizers for audio signal processing. The result is a novel audio coding algorithm, whose performance is presented and analyzed in this research. The performance analysis indicates that this novel algorithm can be successfully applied in audio signal coding.