WorldWideScience

Sample records for code strength values

  1. Estimates of margins in ASME Code strength values for stainless steel nuclear piping

    International Nuclear Information System (INIS)

    Ware, A.G.

    1995-01-01

    The margins in the ASME Code stainless steel allowable stress values that can be attributed to the variations in material strength are evaluated for nuclear piping steels. Best-fit curves were calculated for the material test data that were used to determine allowable stress values for stainless steels in the ASME Code, supplemented by more recent data, to estimate the mean stresses. The mean yield stresses (on which the stainless steel S m values are based) from the test data are about 15 to 20% greater than the ASME Code yield stress values. The ASME Code yield stress values are estimated to approximately coincide with the 97% confidence limit from the test data. The mean and 97% confidence limit values can be used in the probabilistic risk assessments of nuclear piping

  2. Strength evaluation code STEP for brittle materials

    International Nuclear Information System (INIS)

    Ishihara, Masahiro; Futakawa, Masatoshi.

    1997-12-01

    In a structural design using brittle materials such as graphite and/or ceramics it is necessary to evaluate the strength of component under complex stress condition. The strength of ceramic materials is said to be influenced by the stress distribution. However, in the structural design criteria simplified stress limits had been adopted without taking account of the strength change with the stress distribution. It is, therefore, important to evaluate the strength of component on the basis of the fracture model for brittle material. Consequently, the strength evaluation program, STEP, on a brittle fracture of ceramic materials based on the competing risk theory had been developed. Two different brittle fracture modes, a surface layer fracture mode dominated by surface flaws and an internal fracture mode by internal flaws, are treated in the STEP code in order to evaluate the strength of brittle fracture. The STEP code uses stress calculation results including complex shape of structures analyzed by the generalized FEM stress analysis code, ABAQUS, so as to be possible to evaluate the strength of brittle fracture for the structures having complicate shapes. This code is, therefore, useful to evaluate the structural integrity of arbitrary shapes of components such as core graphite components in the HTTR, heat exchanger components made of ceramics materials etc. This paper describes the basic equations applying to the STEP code, code system with a combination of the STEP and the ABAQUS codes and the result of the verification analysis. (author)

  3. Reference Values of Grip Strength, Prevalence of Low Grip Strength, and Factors Affecting Grip Strength Values in Chinese Adults.

    Science.gov (United States)

    Yu, Ruby; Ong, Sherlin; Cheung, Osbert; Leung, Jason; Woo, Jean

    2017-06-01

    The objectives of this study were to update the reference values of grip strength, to estimate the prevalence of low grip strength, and to examine the impact of different aspects of measurement protocol on grip strength values in Chinese adults. A cross-sectional survey of Chinese men (n = 714) and women (n = 4014) aged 18-102 years was undertaken in different community settings in Hong Kong. Grip strength was measured with a digital dynamometer (TKK 5401 Grip-D; Takei, Niigata, Japan). Low grip strength was defined as grip strength 2 standard deviations or more below the mean for young adults. The effects of measurement protocol on grip strength values were examined in a subsample of 45 men and women with repeated measures of grip strength taken with a hydraulic dynamometer (Baseline; Fabrication Enterprises Inc, Irvington, NY), using pair t-tests, intraclass correlation coefficient, and Bland and Altman plots. Grip strength was greater among men than among women (P values than the Baseline hydraulic dynamometer (P values were also observed when the measurement was performed with the elbow extended in a standing position, compared with that with the elbow flexed at 90° in a sitting position, using the same dynamometer (P values of grip strength and estimated the prevalence of low grip strength among Chinese adults spanning a wide age range. These findings might be useful for risk estimation and evaluation of interventions. However, grip strength measurements should be interpreted with caution, as grip strength values can be affected by type of dynamometer used, assessment posture, and elbow position. Copyright © 2017 AMDA – The Society for Post-Acute and Long-Term Care Medicine. Published by Elsevier Inc. All rights reserved.

  4. Generating material strength standards of aluminum alloys for research reactors. Pt. 1. Yield strength values Sy and tensile strength values Su

    International Nuclear Information System (INIS)

    Tsuji, H.; Miya, K.

    1995-01-01

    Aluminum alloys are frequently used as structural materials for research reactors. The material strength standards, however, such as the yield strength values (S y ), the tensile strength values (S u ) and the design fatigue curve -which are needed to use aluminum alloys as structural materials in ''design by analysis'' - for those materials have not been determined yet. Hence, a series of material tests was performed and the results were statistically analyzed with the aim of generating these material strength standards. This paper, the first in a series on material strength standards of aluminum alloys, describes the aspects of the tensile properties of the standards. The draft standards were compared with MITI no. 501 as well as with the ASME codes, and the trend of the available data also was examined. It was revealed that the draft proposal could be adopted as the material strength standards, and that the values of the draft standards at and above 150 C for A6061-T6 and A6063-T6 could be applied only to the reactor operating conditions III and IV. Also the draft standards have already been adopted in the Science and Technology Agency regulatory guide (standards for structural design of nuclear research plants). (orig.)

  5. Ritual as Indicative as of code as Values Ritual as Indicative as of code as Values

    Directory of Open Access Journals (Sweden)

    Cristina Maria Teixeira

    2008-04-01

    Full Text Available Undoubtedly, the ritualistic connotation of Hemingway's work, and particularly of his short stories in IN OUR TIME, is very strong and worth analysing. Hemingway has even been criticized for his use of an unvarying code, his action almost always circling about ordeals, with triumphs and defeats in the bullring, the battlefield, the trout stream or other male proving grounds, where great value is placed on raw physical courage. Undoubtedly, the ritualistic connotation of Hemingway's work, and particularly of his short stories in IN OUR TIME, is very strong and worth analysing. Hemingway has even been criticized for his use of an unvarying code, his action almost always circling about ordeals, with triumphs and defeats in the bullring, the battlefield, the trout stream or other male proving grounds, where great value is placed on raw physical courage.

  6. Normative values of eccentric hip abduction strength in novice runners

    DEFF Research Database (Denmark)

    Ramskov, D; Pedersen, M B; Kastrup, K

    2014-01-01

    normative values of maximal eccentric hip abduction strength in novice runners. METHODS: Novice healthy runners (n = 831) were recruited through advertisements at a hospital and a university. Maximal eccentric hip abduction strength was measured with a hand-held dynamometer. The demographic variables...... was found, p values were identified using a regression equation adjusting for age and gender. Based on this, the equation to calculate normative values for relative eccentric hip abduction strength became: (1.600 + (age * -0.005) + (gender (1 = male / 0 = female) * 0.215) ± 1 or 2 * 0......PURPOSE: Low eccentric strength of the hip abductors, might increase the risk of patellofemoral pain syndrome and iliotibial band syndrome in runners. No normative values for maximal eccentric hip abduction strength have been established. Therefore the purpose of this study was to establish...

  7. Normative values of eccentric hip abduction strength in novice runners

    DEFF Research Database (Denmark)

    Jørgensen, Daniel Ramskov; Pedersen, Mette Broen; Kastrup, Kristrian

    2014-01-01

    .354) Nm/kg. CONCLUSION: Normative values for maximal eccentric hip abduction strength in novice runners can be calculated by taking into account the differences in strength across genders and the decline in strength that occurs with increasing age. Age and gender were associated with maximal eccentric hip...... associated with maximal eccentric hip abduction strength from a univariate analysis were included in a multivariate linear regression model. Based on the results from the regression model, a regression equation for normative hip abduction strength is presented. RESULTS: A SIGNIFICANT DIFFERENCE IN MAXIMAL...... was found, p gender. Based on this, the equation to calculate normative values for relative eccentric hip abduction strength became: (1.600 + (age * -0.005) + (gender (1 = male / 0 = female) * 0.215) ± 1 or 2 * 0...

  8. Adaptable Value-Set Analysis for Low-Level Code

    OpenAIRE

    Brauer, Jörg; Hansen, René Rydhof; Kowalewski, Stefan; Larsen, Kim G.; Olesen, Mads Chr.

    2012-01-01

    This paper presents a framework for binary code analysis that uses only SAT-based algorithms. Within the framework, incremental SAT solving is used to perform a form of weakly relational value-set analysis in a novel way, connecting the expressiveness of the value sets to computational complexity. Another key feature of our framework is that it translates the semantics of binary code into an intermediate representation. This allows for a straightforward translation of the program semantics in...

  9. Diagnostic value of high strength MRCP in the obstructive jaundice

    International Nuclear Information System (INIS)

    Yang Yang; Dong Yuhai; Yin Jie; Lv Guoyi

    2007-01-01

    Objective: To evaluate the diagnostic value of high strength MRCP in patients with obstructive jaundice. Methods: Routine MRI and MRCP examination on 161 patients with obstructive jaundice were carded out with 1.5T Siemens super-conductive magnetic resonance machine. Of them, 103 cases were benign lesions and 58 were malignant after surgical and ERCP pathological confirmation. Results: The diagnostic accuracy of MRCP was 100%, with the qualitative diagnostic accuracy at 90.2%. Conclusion: MRCP was the best method in diagnosing patients with obstructive jaundice, the concerned performances of MRCP could provide the dependable basis for surgical operation project. (authors)

  10. Sensory coding of nest-site value in honeybee swarms.

    Science.gov (United States)

    Seeley, Thomas D; Visscher, P Kirk

    2008-12-01

    This study investigates the first stage of the decision-making process of a honeybee swarm as it chooses a nest site: how a scout bee codes the value of a potential nest site in the waggle dances she produces to represent this site. We presented honeybee swarms with a two-alternative choice between a high-value site and a medium-value site and recorded the behavior of individually identifiable scout bees as they reported on these two alternatives. We found that bees performed equally lengthy inspections at the two sites, but that, on the swarm cluster, they performed more dance circuits per bee for the high-value site. We also found that there was much individual-level noise in the coding of site value, but that there were clear population-level differences in total dance circuits produced for the two sites. The first bee to find a site had a high probability of reporting the site with a waggle dance, regardless of its value. This discoverer-should-dance phenomenon may help ensure that a swarm gives attention to all discovered sites. There was rapid decay in the dance response; the number of dance circuits produced by a bee after visiting a site decreased linearly over sequential visits, and eventually each bee ceased visiting her site. This decay, or ;leakage', in the accumulation of bees at a site improves a swarm's decision-making ability by helping a swarm avoid making fast-decision errors.

  11. Do the Microshear Test Variables Affect the Bond Strength Values?

    Directory of Open Access Journals (Sweden)

    Andrea M. Andrade

    2012-01-01

    Full Text Available Little is known about the effect of specimen preparation and testing protocols on the micro-shear bond strength (μSBS results. To evaluate whether variations in polyethylene rod use affect (μSBS. Human dentin disks were randomly distributed into six groups (: polyethylene tube (3 levels and adhesive system (2 levels. In Group 1, polyethylene tubes filled with polymerized composite were placed on adhesive covered surfaces. Tubes were removed 24 h after water storage, leaving the rods only. In Group 2, the same procedure was performed; however, tubes were kept in place during testing. In Group 3, composite rods without tubes were placed on adhesive covered dentin. In all groups, adhesives were photoactivated after positioning filled tubes/rods on adhesive covered surfaces. Specimens were tested under shear mode and the data subjected to a two-way ANOVA and Tukey’s tests. Groups 1 and 2 resulted in statistically similar mean μSBS (; however, a greater number of pretest failures were observed for Group 1. Higher μSBS values were detected for Group 3, irrespective of adhesive system used (. Removing the polyethylene tube before composite rod is placed on dentin affects μSBS values.

  12. The added value of measuring thumb and finger strength when comparing strength measurements in hypoplastic thumb patients.

    Science.gov (United States)

    Molenaar, H M Ties; Selles, Ruud W; de Kraker, Marjolein; Stam, Henk J; Hovius, Steven E R

    2013-10-01

    When interventions to the hand are aimed at improving function of specific fingers or the thumb, the RIHM (Rotterdam Intrinsic Hand Myometer) is a validated tool and offers more detailed information to assess strength of the involved joints besides grip and pinch measurements. In this study, strength was measured in 65 thumbs in 40 patients diagnosed with thumb hypoplasia. These 65 thumbs were classified according to Blauth. Longitudinal radial deficiencies were also classified. The strength measurements comprised of grip, tip, tripod and key pinch. Furthermore palmar abduction and opposition of the thumb as well as abduction of the index and little finger were measured with the RIHM. For all longitudinal radial deficiency patients, grip and pinch strength as well as palmar abduction and thumb opposition were significantly lower than reference values (P<0.001). However, strength in the index finger abduction and the little finger abduction was maintained or decreased to a lesser extent according to the degree of longitudinal radial deficiency. All strength values decreased with increasing Blauth-type. Blauth-type II hands (n=15) with flexor digitorum superficialis 4 opposition transfer including stabilization of the metacarpophalangeal joint showed a trend toward a higher opposition strength without reaching statistical significance (P=0.094),however compared to non-operated Blauth-type II hands (n=6) they showed a lower grip strength (P=0.019). The RIHM is comparable in accuracy to other strength dynamometers. Using the RIHM, we were able to illustrate strength patterns on finger-specific level, showing added value when evaluating outcome in patients with hand related problems. © 2013.

  13. The Nursing Code of Ethics: Its Value, Its History.

    Science.gov (United States)

    Epstein, Beth; Turner, Martha

    2015-05-31

    To practice competently and with integrity, today's nurses must have in place several key elements that guide the profession, such as an accreditation process for education, a rigorous system for licensure and certification, and a relevant code of ethics. The American Nurses Association has guided and supported nursing practice through creation and implementation of a nationally accepted Code of Ethics for Nurses with Interpretive Statements. This article will discuss ethics in society, professions, and nursing and illustrate how a professional code of ethics can guide nursing practice in a variety of settings. We also offer a brief history of the Code of Ethics, discuss the modern Code of Ethics, and describe the importance of periodic revision, including the inclusive and thorough process used to develop the 2015 Code and a summary of recent changes. Finally, the article provides implications for practicing nurses to assure that this document is a dynamic, useful resource in a variety of healthcare settings.

  14. Optical image encryption based on real-valued coding and subtracting with the help of QR code

    Science.gov (United States)

    Deng, Xiaopeng

    2015-08-01

    A novel optical image encryption based on real-valued coding and subtracting is proposed with the help of quick response (QR) code. In the encryption process, the original image to be encoded is firstly transformed into the corresponding QR code, and then the corresponding QR code is encoded into two phase-only masks (POMs) by using basic vector operations. Finally, the absolute values of the real or imaginary parts of the two POMs are chosen as the ciphertexts. In decryption process, the QR code can be approximately restored by recording the intensity of the subtraction between the ciphertexts, and hence the original image can be retrieved without any quality loss by scanning the restored QR code with a smartphone. Simulation results and actual smartphone collected results show that the method is feasible and has strong tolerance to noise, phase difference and ratio between intensities of the two decryption light beams.

  15. Determination of national midwifery ethical values and ethical codes: in Turkey.

    Science.gov (United States)

    Ergin, Ayla; Özcan, Müesser; Acar, Zeynep; Ersoy, Nermin; Karahan, Nazan

    2013-11-01

    It is important to define and practice ethical rules and codes for professionalisation. Several national and international associations have determined midwifery ethical codes. In Turkey, ethical rules and codes that would facilitate midwifery becoming professionalised have not yet been determined. This study was planned to contribute to the professionalisation of midwifery by determining national ethical values and codes. A total of 1067 Turkish midwives completed the survey. The most prevalent values of Turkish midwives were care for mother-child health, responsibility and professional adequacy. The preferred professional codes chosen by Turkish midwives were absence of conflicts of interest, respect for privacy, avoidance of deception, reporting of faulty practices, consideration of mothers and newborns as separate beings and prevention of harm. In conclusion, cultural values, beliefs and expectations of society cannot be underestimated, although the international professional values and codes of ethics contribute significantly to professionalisation of the midwifery profession.

  16. Strength Measurements in Acute Hamstring Injuries: Intertester Reliability and Prognostic Value of Handheld Dynamometry.

    Science.gov (United States)

    Reurink, Gustaaf; Goudswaard, Gert Jan; Moen, Maarten H; Tol, Johannes L; Verhaar, Jan A N; Weir, Adam

    2016-08-01

    Study Design Cohort study, repeated measures. Background Although hamstring strength measurements are used for assessing prognosis and monitoring recovery after hamstring injury, their actual clinical relevance has not been established. Handheld dynamometry (HHD) is a commonly used method of measuring muscle strength. The reliability of HHD has not been determined in athletes with acute hamstring injuries. Objectives To determine the intertester reliability and the prognostic value of hamstring HHD strength measurement in acute hamstring injuries. Methods We measured knee flexion strength with HHD in 75 athletes at 2 visits, at baseline (within 5 days of hamstring injury) and follow-up (5 to 7 days after the baseline measurement). We assessed isometric hamstring strength in 15° and 90° of knee flexion. Reliability analysis testing was performed by 2 testers independently at the follow-up visit. We recorded the time needed to return to play (RTP) up to 6 months following baseline. Results The intraclass correlation coefficients of the strength measurements in injured hamstrings were between 0.75 and 0.83. There was a statistically significant but weak correlation between the time to RTP and the strength deficit at 15° of knee flexion measured at baseline (Spearman r = 0.25, P = .045) and at the follow-up visit (Spearman r = 0.26, P = .034). Up to 7% of the variance in time to RTP is explained by this strength deficit. None of the other strength variables were significantly correlated with time to RTP. Conclusion Hamstring strength can be reliably measured with HHD in athletes with acute hamstring injuries. The prognostic value of strength measurements is limited, as there is only a weak association between the time to RTP and hamstring strength deficit after acute injury. Level of Evidence Prognosis, level 4. J Orthop Sports Phys Ther 2016;46(8):689-696. Epub 12 May 2016. doi:10.2519/jospt.2016.6363.

  17. Coefficient αcc in design value of concrete compressive strength

    Directory of Open Access Journals (Sweden)

    Goleš Danica

    2016-01-01

    Full Text Available Coefficient αcc introduces the effects of rate and duration of loading on compressive strength of concrete. These effects may be partially or completely compensated by the increase in concrete strength over time. Selection of the value of this coefficient, in recommended range between 0.8 and 1.0, is carried out through the National Annexes to Eurocode 2. This paper presents some considerations related to the introduction of this coefficient and its value adopted in some European countries. The article considers the effect of the adoption of conservative value αcc=0.85 on design value of compressive and flexural resistance of rectangular cross-section made of normal and high strength concrete. It analyzes the influence of different values of coefficient αcc on the area of reinforcement required to achieve the desired resistance of cross-section.

  18. Engineering Ethics Education Having Reflected Various Values and a Global Code of Ethics

    Science.gov (United States)

    Kanemitsu, Hidekazu

    At the present day, a movement trying to establish a global code of ethics for science and engineering is in activity. The author overviews the context of this movement, and examines the possibility of engineering ethics education which uses global code of ethics. In this paper, the engineering ethics education which uses code of ethics in general will be considered, and an expected function of global code of ethics will be also. Engineering ethics education in the new century should be aimed to share the values among different countries and cultures. To use global code of ethics as a tool for such education, the code should include various values, especially Asian values which engineering ethics has paid little attention to.

  19. 14 CFR 23.613 - Material strength properties and design values.

    Science.gov (United States)

    2010-01-01

    ... statistical basis. (b) Design values must be chosen to minimize the probability of structural failure due to... must be shown by selecting design values that ensure material strength with the following probability... failure of which would result in loss of structural integrity of the component; 99 percent probability...

  20. Assessment of ECISS draft standard for derivation of high temperature proof strength values

    Energy Technology Data Exchange (ETDEWEB)

    Linde, L.; Sandstroem, R.

    1996-03-01

    New European material standards are under development and modern data evaluation techniques must be able to supply these standards with accurate design values. A draft standard for the derivation of high temperature proof strength values has been proposed. This standard (EDS) has been used to calculate strength values for six steels; one unalloyed steel, one 12 % Cr steel and four austenitic stainless steels. Although large data sets were available, it was not possible to satisfy the requirement in the EDS of 80 % temperature coverage in the proof strength data for several steels. It suggests that temperature coverage specified in the EDS is unrealistically high. Due to the limited number of heats satisfying the temperature coverage requirements for each steel, the statistical error in the derived values exceeds 10-20 % which must be considered as unacceptably high. Instead it is recommended that the full data sets are used irrespective of temperature coverage. The variation of proof strength values represented by the analysed heats did not cover the corresponding variation in the larger data set available. This was the case even for the steel where 16 heats satisfied the temperature coverage requirement. Thus a limited number of heats can not be expected to be a good representation of more complete data sets. This has the consequence that absolute strength values can not be derived without access to a standardised proof strength at room temperature. Two derivation methods investigated in this report are both based on the ISO 2605/III procedure for proof strength assessments at elevated temperature. Method I and II use an essentially temperature independent and temperature dependent reduction term respectively. The methods have been assessed by the same data sets for the six steels. One or both methods gave satisfactory results for most of the investigated steels. Presented results are based on work carried out in ECISS TC22 WG1. 17 refs, 20 figs, 7 tabs.

  1. Reference values for muscle strength: a systematic review with a descriptive meta-analysis.

    Science.gov (United States)

    Benfica, Poliana do Amaral; Aguiar, Larissa Tavares; Brito, Sherindan Ayessa Ferreira de; Bernardino, Luane Helena Nunes; Teixeira-Salmela, Luci Fuscaldi; Faria, Christina Danielli Coelho de Morais

    2018-05-03

    Muscle strength is an important component of health. To describe and evaluate the studies which have established the reference values for muscle strength on healthy individuals and to synthesize these values with a descriptive meta-analysis approach. A systematic review was performed in MEDLINE, LILACS, and SciELO databases. Studies that investigated the reference values for muscle strength of two or more appendicular/axial muscle groups of health individuals were included. Methodological quality, including risk of bias was assessed by the QUADAS-2. Data extracted included: country of the study, sample size, population characteristics, equipment/method used, and muscle groups evaluated. Of the 414 studies identified, 46 were included. Most of the studies had adequate methodological quality. Included studies evaluated: appendicular (80.4%) and axial (36.9%) muscles; adults (78.3%), elderly (58.7%), adolescents (43.5%), children (23.9%); isometric (91.3%) and isokinetic (17.4%) strength. Six studies (13%) with similar procedures were synthesized with meta-analysis. Generally, the coefficient of variation values that resulted from the meta-analysis ranged from 20.1% to 30% and were similar to those reported by the original studies. The meta-analysis synthesized the reference values of isometric strength of 14 muscle groups of the dominant/non-dominant sides of the upper/lower limbs of adults/elderly from developed countries, using dynamometers/myometer. Most of the included studies had adequate methodological quality. The meta-analysis provided reference values for the isometric strength of 14 appendicular muscle groups of the dominant/non-dominant sides, measured with dynamometers/myometers, of men/women, of adults/elderly. These data may be used to interpret the results of the evaluations and establish appropriate treatment goals. Copyright © 2018 Associação Brasileira de Pesquisa e Pós-Graduação em Fisioterapia. Publicado por Elsevier Editora Ltda. All rights

  2. Multiple-valued logic-protected coding for an optical non-quantum communication line

    NARCIS (Netherlands)

    Antipov, A. L.; Bykovsky, A. Yu.; Vasiliev, N. A.; Egorov, A. A.

    2006-01-01

    A simple and cheap method of secret coding in an optical line is proposed based on multiple-valued logic. This method is shown to have very high cryptography resources and is designated for bidirectional information exchange in a team of mobile robots, where quantum teleportation coding cannot yet

  3. EVALUATION OF THE RE LATIONSHIP BETWEEN L EG STRENGTH AND VELOCITY VALUES IN AMATEUR FOOTBALL PLAYERS

    Directory of Open Access Journals (Sweden)

    İsmail G Ö K H A N

    2015-08-01

    Full Text Available The purpose of this study is to analyse the relationship between conditional parameters ( leg strength, back strength, velocity 30 Mt, flexibility by measuring some physical (height, body w eight and physiological (systole, diastole, KAH characteristics of male football players of Karakopru Belediyespor and Harran University. According to the results obtained from the measurements, mean age was 23, 46±3,50 /years; as a part of physical cha racteristics ,mean height was 176,20±5,10 (cm and mean body weight was 70,16±5,21 (kg . As a part of physiological characteristics, mean Systolic Blood Pressure was 123,87±14,23 (mmhg , mean Diastolic Blood Pressure was 73,60±16,42 (mmhg and mean Resting Heart Rate was 64,50±10,48 (beats/min . As a part of conditional parameters, mean leg strength was 101,83±40,48 (kg, back strength was 75,83±19,43 (kg, flexibility was 34,16±6,65 (cm and mean velocity in 30 Mt. was 4,15± 0,20 (sec. It was observed that there was a relationship between 30 meters velocity and leg strength parameters (r= - , 407 . There was no relationship between 30 meters velocity and back strength parameters (r=, 429; and between 30 meters velocity and flexibility param eters (r=, 659 . As a result, while the relationship between velocity and back strength values of the amateur football players was not significant (p>0.05 ; the relationship between velocity and leg strength values was found to be significant (p<0.05.

  4. Knowing your customer better: the strengths of a self-regulatory value approach

    NARCIS (Netherlands)

    Förster, J.

    2009-01-01

    Regulatory engagement theory's strength over alternative accounts of consumer attitudes is highlighted. In line with the theory, it is argued that in order to predict behavior, one needs to understand the processes involved in goal pursuit, including the dynamic processes of value creation. The

  5. Normative Quadriceps and Hamstring Muscle Strength Values for Female, Healthy, Elite Handball and Football Players.

    Science.gov (United States)

    Risberg, May A; Steffen, Kathrin; Nilstad, Agnethe; Myklebust, Grethe; Kristianslund, Eirik; Moltubakk, Marie M; Krosshaug, Tron

    2018-05-23

    Risberg, MA, Steffen, K, Nilstad, A, Myklebust, G, Kristianslund, E, Moltubakk, MM, and Krosshaug, T. Normative quadriceps and hamstring muscle strength values for female, healthy, elite handball and football players. J Strength Cond Res XX(X): 000-000, 2018-This study presents normative values for isokinetic knee extension and flexion muscle strength tests in 350 elite, female, handball (n = 150) and football (n = 200) players. Isokinetic concentric muscle strength tests at 60°·sec were recorded bilaterally using a dynamometer. Peak torque (in Newton meter [N·m]), body mass normalized peak torque (N·m·kg), and hamstring to quadriceps ratio (H:Q ratio) for dominant and nondominant legs were recorded. The female elite players were 20.9 ± 4.0 years, started playing at the elite level at the age of 18.2 ± 2.7 years, with a mean of 9.7 ± 2.2 hours of weekly in-season training. Handball players demonstrated greater quadriceps muscle strength compared with football players (11.0%) (p handball players only (p = 0.012).The H:Q ratio was significantly lower for handball players (0.58) compared with football players (0.60) (p handball and football players can be used to set rehabilitation goals for muscle strength after injury and enable comparison with uninjured legs. Significantly greater quadriceps muscle strength was found for handball players compared with football players, also when normalized to body mass.This is an open-access article distributed under the terms of the Creative Commons Attribution-Non Commercial-No Derivatives License 4.0 (CCBY-NC-ND), where it is permissible to download and share the work provided it is properly cited. The work cannot be changed in any way or used commercially without permission from the journal.

  6. Isometric Shoulder Strength Reference Values for Physically Active Collegiate Males and Females

    Science.gov (United States)

    Westrick, Richard B.; Duffey, Michele L.; Cameron, Kenneth L.; Gerber, J. Parry; Owens, Brett D.

    2013-01-01

    Background: It is common clinical practice to assess muscle strength during examination of patients following shoulder injury or surgery. Strength comparisons are often made between the patient’s injured and uninjured shoulders, with the uninjured side used as a reference without regard to upper extremity dominance. Despite the importance of strength measurements, little is known about expected normal baselines of the uninjured shoulder. The purpose of this study was to report normative values for isometric shoulder strength for physically active college-age men and women without history of shoulder injury. Methods: University students—546 males (18.8 ± 1.0 years, 75.3 ± 12.2 kg) and 73 females (18.7 ± 0.9 years, 62.6 ± 7.0 kg)—underwent thorough shoulder evaluations by an orthopaedic surgeon and completed bilateral isometric strength measurements with a handheld dynamometer. Variables measured included internal rotation, external rotation, abduction, supine internal rotation and external rotation at 45°, and lower trapezius in prone flexion. Results: Significant differences were found between the dominant and nondominant shoulder for internal rotation, internal rotation at 45°, abduction, and prone flexion in males and in internal rotation at 45° and prone flexion for females (P ≤ 0.01). PMID:24381696

  7. Characteristic compression strength of a brickwork masonry starting from the strength of its components. Experimental verification of analitycal equations of european codes

    Directory of Open Access Journals (Sweden)

    Rolando, A.

    2006-09-01

    Full Text Available In this paper the compression strength of a clay brickwork masonry bound with cement mortar is analyzed. The target is to obtain the characteristic compression strength of unreinforced brickwork masonry. This research try to test the validity of the analytical equations in European codes, comparing the experimental strength with the analytically obtained from the strength of its components (clay brick and cement mortar.En este artículo se analiza la resistencia a compresión de una fábrica de ladrillo cerámico, asentado con mortero de cemento.El objetivo es obtener la resistencia característica a compresión de la fábrica sin armar.La investigación comprueba la fiabilidad de las expresiones analíticas existentes en la normativa europea, comparando la resistencia obtenida experimentalmente con la obtenida analíticamente, a partir de la resistencia de sus componentes (ladrillo cerámico y mortero de cemento.

  8. Reassessment of pH reference values with improved methodology for the evaluation of ionic strength

    International Nuclear Information System (INIS)

    Lito, M.J. Guiomar H.M.; Camoes, M. Filomena G.F.C.

    2005-01-01

    The conflict between pH as empirical number in routine control and the pH value regarded as conveying some information concerning the effective concentration or activity of hydrogen ions, a H , has caused much confusion. There are, however, reasons to conclude that the overwhelming amount of thermodynamic data is not sufficiently accurate--either due to ignorance of metrological concepts or due to insufficiently specified measurement processes of fundamental chemical quantities pH. The commonly used seven reference buffer solutions to which primary pH values have been conventional assigned, represent a selection out of a more extensive list, recommended by NBS (now NIST) in 1962. From then onwards conventions concerning the Debye-Hueckel model of electrolyte solutions and ionic strength have been revised and the pH(S) values reassessed in conformity but only for these seven reference buffer solutions. The others have, so far remained unchanged, locking harmonisation of the conventionally assigned pH(S) values. In this work, ionic strength is calculated through complete equations derived from the acidity constants. Concentrations of the various species involved in the conventional assignment of pH and their corresponding activity coefficients are therefore, more rigorously known. The process proves particularly useful for poliprotic acids with overlapping acidity constants, where the ratio is less than 10 3 . As a consequence, conventionally assigned pH values of reference buffer solutions are recalculated and corrections are introduced as appropriate

  9. Dynamic divisive normalization predicts time-varying value coding in decision-related circuits.

    Science.gov (United States)

    Louie, Kenway; LoFaro, Thomas; Webb, Ryan; Glimcher, Paul W

    2014-11-26

    Normalization is a widespread neural computation, mediating divisive gain control in sensory processing and implementing a context-dependent value code in decision-related frontal and parietal cortices. Although decision-making is a dynamic process with complex temporal characteristics, most models of normalization are time-independent and little is known about the dynamic interaction of normalization and choice. Here, we show that a simple differential equation model of normalization explains the characteristic phasic-sustained pattern of cortical decision activity and predicts specific normalization dynamics: value coding during initial transients, time-varying value modulation, and delayed onset of contextual information. Empirically, we observe these predicted dynamics in saccade-related neurons in monkey lateral intraparietal cortex. Furthermore, such models naturally incorporate a time-weighted average of past activity, implementing an intrinsic reference-dependence in value coding. These results suggest that a single network mechanism can explain both transient and sustained decision activity, emphasizing the importance of a dynamic view of normalization in neural coding. Copyright © 2014 the authors 0270-6474/14/3416046-12$15.00/0.

  10. Hip strength and range of motion: Normal values from a professional football league.

    Science.gov (United States)

    Mosler, Andrea B; Crossley, Kay M; Thorborg, Kristian; Whiteley, Rod J; Weir, Adam; Serner, Andreas; Hölmich, Per

    2017-04-01

    To determine the normal profiles for hip strength and range of motion (ROM) in a professional football league in Qatar, and examine the effect of leg dominance, age, past history of injury, and ethnicity on these profiles. Cross-sectional cohort study. Participants included 394 asymptomatic, male professional football players, aged 18-40 years. Strength was measured using a hand held dynamometer with an eccentric test in side-lying for hip adduction and abduction, and the squeeze test in supine with 45° hip flexion. Range of motion measures included: hip internal and external rotation in 90° flexion, hip IR in prone, bent knee fall out and hip abduction in side-lying. Demographic information was collected and the effect on the profiles was analysed using linear mixed models with repeated measures. Strength values (mean±SD) were: adduction=3.0±0.6Nm/kg, abduction=2.6±0.4Nm/kg, adduction/abduction ratio=1.2±0.2, Squeeze test=3.6±0.8N/kg. Range of motion values: internal rotation in flexion=32±8°, external rotation=38±8°, internal rotation in prone=38±8°, bent knee fall out=13±4.4cm, abduction in side-lying=50±7.3°. Leg dominance had no clinically relevant effect on these profiles. Multivariate analysis demonstrated that age had a minor influence on squeeze strength (-0.03N/kg/year), external rotation (-0.30°/year) and abduction range (-0.19°/year) but past history of injury, and ethnicity did not. Normal values are documented for hip strength and range of motion that can be used as reference profiles in the clinical assessment, screening, and management of professional football players. Leg dominance, recent past injury history and ethnicity do not need to be accounted for when using these profiles for comparison purposes. Copyright © 2016 Sports Medicine Australia. Published by Elsevier Ltd. All rights reserved.

  11. Strengths and limitations of the NATALI code for aerosol typing from multiwavelength Raman lidar observations

    Directory of Open Access Journals (Sweden)

    Nicolae Doina

    2018-01-01

    Full Text Available A Python code was developed to automatically retrieve the aerosol type (and its predominant component in the mixture from EARLINET’s 3 backscatter and 2 extinction data. The typing relies on Artificial Neural Networks which are trained to identify the most probable aerosol type from a set of mean-layer intensive optical parameters. This paper presents the use and limitations of the code with respect to the quality of the inputed lidar profiles, as well as with the assumptions made in the aerosol model.

  12. Calculation of low-cycle fatigue in accordance with the national standard and strength codes

    Science.gov (United States)

    Kontorovich, T. S.; Radin, Yu. A.

    2017-08-01

    Over the most recent 15 years, the Russian power industry has largely relied on imported equipment manufactured in compliance with foreign standards and procedures. This inevitably necessitates their harmonization with the regulatory documents of the Russian Federation, which include calculations of strength, low cycle fatigue, and assessment of the equipment service life. An important regulatory document providing the engineering foundation for cyclic strength and life assessment for high-load components of the boiler and steamline of a water/steam circuit is RD 10-249-98:2000: Standard Method of Strength Estimation in Stationary Boilers and Steam and Water Piping. In January 2015, the National Standard of the Russian Federation 12952-3:2001 was introduced regulating the issues of design and calculation of the pressure parts of water-tube boilers and auxiliary installations. Thus, there appeared to be two documents simultaneously valid in the same energy field and using different methods for calculating the low-cycle fatigue strength, which leads to different results. In this connection, the current situation can lead to incorrect ideas about the cyclic strength and the service life of high-temperature boiler parts. The article shows that the results of calculations performed in accordance with GOST R 55682.3-2013/EN 12952-3: 2001 are less conservative than the results of the standard RD 10-249-98. Since the calculation of the expected service life of boiler parts should use GOST R 55682.3-2013/EN 12952-3: 2001, it becomes necessary to establish the applicability scope of each of the above documents.

  13. Analysis on applicable error-correcting code strength of storage class memory and NAND flash in hybrid storage

    Science.gov (United States)

    Matsui, Chihiro; Kinoshita, Reika; Takeuchi, Ken

    2018-04-01

    A hybrid of storage class memory (SCM) and NAND flash is a promising technology for high performance storage. Error correction is inevitable on SCM and NAND flash because their bit error rate (BER) increases with write/erase (W/E) cycles, data retention, and program/read disturb. In addition, scaling and multi-level cell technologies increase BER. However, error-correcting code (ECC) degrades storage performance because of extra memory reading and encoding/decoding time. Therefore, applicable ECC strength of SCM and NAND flash is evaluated independently by fixing ECC strength of one memory in the hybrid storage. As a result, weak BCH ECC with small correctable bit is recommended for the hybrid storage with large SCM capacity because SCM is accessed frequently. In contrast, strong and long-latency LDPC ECC can be applied to NAND flash in the hybrid storage with large SCM capacity because large-capacity SCM improves the storage performance.

  14. Do Librarians Have a Shared Set of Values? A Comparative Study of 36 Codes of Ethics Based on Gorman's "Enduring Values"

    Science.gov (United States)

    Foster, Catherine; McMenemy, David

    2012-01-01

    Thirty-six ethical codes from national professional associations were studied, the aim to test whether librarians have global shared values or if political and cultural contexts have significantly influenced the codes' content. Gorman's eight core values of stewardship, service, intellectual freedom, rationalism, literacy and learning, equity of…

  15. Probabilistic analysis of strength and thermal-physic WWER fuel rod characteristics using START-3 code

    International Nuclear Information System (INIS)

    Medvedev, A.; Bogatyr, S.; Khramtsov; Sokolov, F.

    2001-01-01

    During the last years probabilistic methods for evaluation of the influence of the fuel geometry and technology parameters on fuel operational reliability are widely used. In the present work the START-3 procedure is used to calculate the thermal physics and strength characteristics of WWER fuel rods behavior. The procedure is based on the Monte-Carlo method with the application of Sobol quasi-random sequences. This technique allows to treat the fuel rod technological and operating parameters as well as its strength and thermal physics characteristics as random variables. The work deals with a series of WWER-1000 fuel rod statistical tests and verification based on the PIE results. Also preliminary calculations are implemented with the aim to determine the design schema parameters. This should ensure the accuracy of the assessment of the parameters of WWER fuel rod characteristics distribution. The probability characteristics of fuel rod strength and thermal physics are assessed via the statistical analysis of the results of probability calculations

  16. Coding for Parallel Links to Maximize the Expected Value of Decodable Messages

    Science.gov (United States)

    Klimesh, Matthew A.; Chang, Christopher S.

    2011-01-01

    When multiple parallel communication links are available, it is useful to consider link-utilization strategies that provide tradeoffs between reliability and throughput. Interesting cases arise when there are three or more available links. Under the model considered, the links have known probabilities of being in working order, and each link has a known capacity. The sender has a number of messages to send to the receiver. Each message has a size and a value (i.e., a worth or priority). Messages may be divided into pieces arbitrarily, and the value of each piece is proportional to its size. The goal is to choose combinations of messages to send on the links so that the expected value of the messages decodable by the receiver is maximized. There are three parts to the innovation: (1) Applying coding to parallel links under the model; (2) Linear programming formulation for finding the optimal combinations of messages to send on the links; and (3) Algorithms for assisting in finding feasible combinations of messages, as support for the linear programming formulation. There are similarities between this innovation and methods developed in the field of network coding. However, network coding has generally been concerned with either maximizing throughput in a fixed network, or robust communication of a fixed volume of data. In contrast, under this model, the throughput is expected to vary depending on the state of the network. Examples of error-correcting codes that are useful under this model but which are not needed under previous models have been found. This model can represent either a one-shot communication attempt, or a stream of communications. Under the one-shot model, message sizes and link capacities are quantities of information (e.g., measured in bits), while under the communications stream model, message sizes and link capacities are information rates (e.g., measured in bits/second). This work has the potential to increase the value of data returned from

  17. Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

    Directory of Open Access Journals (Sweden)

    Xianyi Chen

    2018-01-01

    Full Text Available Compared to the encrypted-image-based reversible data hiding (EIRDH method, the encrypted-signals-based reversible data hiding (ESRDH technique is a novel way to achieve a greater embedding rate and better quality of the decrypted signals. Motivated by ESRDH using signal energy transfer, we propose an improved ESRDH method using code division multiplexing and value expansion. At the beginning, each pixel of the original image is divided into several parts containing a little signal and multiple equal signals. Next, all signals are encrypted by Paillier encryption. And then a large number of secret bits are embedded into the encrypted signals using code division multiplexing and value expansion. Since the sum of elements in any spreading sequence is equal to 0, lossless quality of directly decrypted signals can be achieved using code division multiplexing on the encrypted equal signals. Although the visual quality is reduced, high-capacity data hiding can be accomplished by conducting value expansion on the encrypted little signal. The experimental results show that our method is better than other methods in terms of the embedding rate and average PSNR.

  18. Normative Reference Values for Handgrip Strength in Colombian Schoolchildren: The FUPRECOL Study.

    Science.gov (United States)

    Ramírez-Vélez, Robinson; Morales, Olimpo; Peña-Ibagon, Jhonatan C; Palacios-López, Adalberto; Prieto-Benavides, Daniel H; Vivas, Andrés; Correa-Bautista, Jorge E; Lobelo, Felipe; Alonso-Martínez, Alicia M; Izquierdo, Mikel

    2017-01-01

    Ramírez-Vélez, R, Morales, O, Peña-Ibagon, JC, Palacios-López, A, Prieto-Benavides, DH, Vivas, A, Correa-Bautista, JE, Lobelo, F, Alonso-Martínez, AM, and Izquierdo, M. Normative reference values for handgrip strength in Colombian schoolchildren: the FUPRECOL study. J Strength Cond Res 31(1): 217-226, 2017-The primary aim of this study was to generate normative handgrip (HG) strength data for 10 to 17.9 year olds. The secondary aim was to determine the relative proportion of Colombian children and adolescents that fall into established Health Benefit Zones (HBZ). This cross-sectional study enrolled 7,268 schoolchildren (boys n = 3,129 and girls n = 4,139, age 12.7 [2.4] years). Handgrip was measured using a hand dynamometer with an adjustable grip. Five HBZs (Needs Improvement, Fair, Good, Very Good, and Excellent) have been established that correspond to combined HG. Centile smoothed curves, percentile, and tables for the third, 10th, 25th, 50th, 75th, 90th, and 97th percentile were calculated using Cole's LMS method. Handgrip peaked in the sample at 22.2 (8.9) kg in boys and 18.5 (5.5) kg in girls. The increase in HG was greater for boys than for girls, but the peak HG was lower in girls than in boys. The HBZ data indicated that a higher overall percentage of boys than girls at each age group fell into the "Needs Improvement" zone, with differences particularly pronounced during adolescence. Our results provide, for the first time, sex- and age-specific HG reference standards for Colombian schoolchildren aged 9-17.9 years.

  19. New methods of analysis of materials strength data for the ASME Boiler and Pressure Vessel Code

    International Nuclear Information System (INIS)

    Booker, M.K.; Booker, B.L.P.

    1980-01-01

    Tensile and creep data of the type used to establish allowable stress levels for the ASME Boiler and Pressure Vessel Code have been examined for type 321H stainless steel. Both inhomogeneous, unbalanced data sets and well-planned homogeneous data sets have been examined. Data have been analyzed by implementing standard manual techniques on a modern digital computer. In addition, more sophisticated techniques, practical only through the use of the computer, have been applied. The result clearly demonstrates the efficacy of computerized techniques for these types of analyses

  20. Maximal isometric muscle strength values obtained By hand-held dynamometry in children between 6 and 15 years of age.

    Science.gov (United States)

    Escobar, Raul G; Munoz, Karin T; Dominguez, Angelica; Banados, Pamela; Bravo, Maria J

    2017-01-01

    In this study we aimed to determine the maximal isometric muscle strength of a healthy, normal-weight, pediatric population between 6 and 15 years of age using hand-held dynamometry to establish strength reference values. The secondary objective was determining the relationship between strength and anthropometric parameters. Four hundred normal-weight Chilean children, split into 10 age groups, separated by 1-year intervals, were evaluated. Each age group included between 35 and 55 children. The strength values increased with increasing age and weight, with a correlation of 0.83 for age and 0.82 for weight. The results were similar to those reported in previous studies regarding the relationships among strength, age, and anthropometric parameters, but the reported strength differed. These results provide normal strength parameters for healthy and normal-weight Chilean children between 6 and 15 years of age and highlight the relevance of ethnicity in defining reference values for muscle strength in a pediatric population. Muscle Nerve 55: 16-22, 2017. © 2016 Wiley Periodicals, Inc.

  1. Normalized value coding explains dynamic adaptation in the human valuation process.

    Science.gov (United States)

    Khaw, Mel W; Glimcher, Paul W; Louie, Kenway

    2017-11-28

    The notion of subjective value is central to choice theories in ecology, economics, and psychology, serving as an integrated decision variable by which options are compared. Subjective value is often assumed to be an absolute quantity, determined in a static manner by the properties of an individual option. Recent neurobiological studies, however, have shown that neural value coding dynamically adapts to the statistics of the recent reward environment, introducing an intrinsic temporal context dependence into the neural representation of value. Whether valuation exhibits this kind of dynamic adaptation at the behavioral level is unknown. Here, we show that the valuation process in human subjects adapts to the history of previous values, with current valuations varying inversely with the average value of recently observed items. The dynamics of this adaptive valuation are captured by divisive normalization, linking these temporal context effects to spatial context effects in decision making as well as spatial and temporal context effects in perception. These findings suggest that adaptation is a universal feature of neural information processing and offer a unifying explanation for contextual phenomena in fields ranging from visual psychophysics to economic choice.

  2. The probabilistic method of WWER fuel rod strength estimation using the START-3 code

    International Nuclear Information System (INIS)

    Bibilashvili, Yu.K.; Medvedev, A.V.; Bogatyr, S.M.; Sokolov, F.F.; Khramtsov, M.V.

    2001-01-01

    During the last years probability methods of studying were widely used to determine the influence exerted by the geometry, technology and performance parameters of a fuel rod on the characteristics of its condition. Despite the diversity of probability methods their basis is formed by the simplest schema of the Monte-Carlo method (MC). This schema assumes a great number of the realizations of a random value and the statistical assessment of its characteristics. To generate random values, use is usually made of a pseudo-random number generator. The application of the quasi-random sequence elements in place of the latter substantially reduces the machine time since it promotes a quicker convergence of the method. Probability methods used to study the characteristics of a fuel rod condition can be considered to be an auxiliary means of deterministic calculations that allows the assessment of the conservatism degree of design calculations. (author)

  3. Generating Code with Polymorphic let: A Ballad of Value Restriction, Copying and Sharing

    Directory of Open Access Journals (Sweden)

    Oleg Kiselyov

    2017-02-01

    Full Text Available Getting polymorphism and effects such as mutation to live together in the same language is a tale worth telling, under the recurring refrain of copying vs. sharing. We add new stanzas to the tale, about the ordeal to generate code with polymorphism and effects, and be sure it type-checks. Generating well-typed-by-construction polymorphic let-expressions is impossible in the Hindley-Milner type system: even the author believed that. The polymorphic-let generator turns out to exist. We present its derivation and the application for the lightweight implementation of quotation via a novel and unexpectedly simple source-to-source transformation to code-generating combinators. However, generating let-expressions with polymorphic functions demands more than even the relaxed value restriction can deliver. We need a new deal for let-polymorphism in ML. We conjecture the weaker restriction and implement it in a practically-useful code-generation library. Its formal justification is formulated as the research program.

  4. Eating Disorder Behaviors, Strength of Faith, and Values in Late Adolescents and Emerging Adults: An Exploration of Associations

    Science.gov (United States)

    King, Stephanie L.

    2012-01-01

    Adolescents entering college are often affected by eating disorders and during this transition to emerging adulthood, individuals begin to establish personal values and beliefs, which makes this population interesting when studying Eating Disorders, values, and faith. This research project seeks to examine the association among strength of…

  5. A fast parallel code for calculating energies and oscillator strengths of many-electron atoms at neutron star magnetic field strengths in adiabatic approximation

    Science.gov (United States)

    Engel, D.; Klews, M.; Wunner, G.

    2009-02-01

    We have developed a new method for the fast computation of wavelengths and oscillator strengths for medium-Z atoms and ions, up to iron, at neutron star magnetic field strengths. The method is a parallelized Hartree-Fock approach in adiabatic approximation based on finite-element and B-spline techniques. It turns out that typically 15-20 finite elements are sufficient to calculate energies to within a relative accuracy of 10-5 in 4 or 5 iteration steps using B-splines of 6th order, with parallelization speed-ups of 20 on a 26-processor machine. Results have been obtained for the energies of the ground states and excited levels and for the transition strengths of astrophysically relevant atoms and ions in the range Z=2…26 in different ionization stages. Catalogue identifier: AECC_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AECC_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 3845 No. of bytes in distributed program, including test data, etc.: 27 989 Distribution format: tar.gz Programming language: MPI/Fortran 95 and Python Computer: Cluster of 1-26 HP Compaq dc5750 Operating system: Fedora 7 Has the code been vectorised or parallelized?: Yes RAM: 1 GByte Classification: 2.1 External routines: MPI/GFortran, LAPACK, PyLab/Matplotlib Nature of problem: Calculations of synthetic spectra [1] of strongly magnetized neutron stars are bedevilled by the lack of data for atoms in intense magnetic fields. While the behaviour of hydrogen and helium has been investigated in detail (see, e.g., [2]), complete and reliable data for heavier elements, in particular iron, are still missing. Since neutron stars are formed by the collapse of the iron cores of massive stars, it may be assumed that their atmospheres contain an iron plasma. Our objective is to fill the gap

  6. Eccentric and isometric shoulder rotator cuff strength testing using a hand-held dynamometer: reference values for overhead athletes.

    Science.gov (United States)

    Cools, Ann M J; Vanderstukken, Fran; Vereecken, Frédéric; Duprez, Mattias; Heyman, Karel; Goethals, Nick; Johansson, Fredrik

    2016-12-01

    In order to provide science-based guidelines for injury prevention or return to play, regular measurement of isometric and eccentric internal (IR) and external (ER) rotator strength is warranted in overhead athletes. However, up to date, no normative database exists regarding these values, when measured with a hand-held dynamometer. Therefore, the purpose of the study was to provide a normative database on isometric and eccentric rotator cuff (RC) strength values in a sample of overhead athletes, and to discuss gender, age and sports differences. A HHD was used to measure RC strength in 201 overhead athletes between 18 and 50 years old from three different sports disciplines: tennis, volleyball and handball. Isometric as well as eccentric strength was measured in different shoulder positions. Outcome variables of interest were isometric ER and IR strength, eccentric ER strength, and intermuscular strength ratios ER/IR. Our results show significant side, gender and sports discipline differences in the isometric and eccentric RC strength. However, when normalized to body weight, gender differences often are absent. In general, strength differences are in favour of the dominant side, the male athletes and handball. Intermuscular ER/IR ratios showed gender, sports, and side differences. This normative database is necessary to help the clinician in the evaluation of RC strength in healthy and injured overhead athletes. In view of the preventive screening and return-to-play decisions in overhead athletes, normalization to body weight and calculating intermuscular ratios are key points in this evaluation. Diagnostic study, Level III.

  7. Solving inverse two-point boundary value problems using collage coding

    Science.gov (United States)

    Kunze, H.; Murdock, S.

    2006-08-01

    The method of collage coding, with its roots in fractal imaging, is the central tool in a recently established rigorous framework for solving inverse initial value problems for ordinary differential equations (Kunze and Vrscay 1999 Inverse Problems 15 745-70). We extend these ideas to solve the following inverse problem: given a function u(x) on [A, B] (which may be the interpolation of data points), determine a two-point boundary value problem on [A, B] which admits u(x) as a solution as closely as desired. The solution of such inverse problems may be useful in parameter estimation or determination of potential functional forms of the underlying differential equation. We discuss ways to improve results, including the development of a partitioning scheme. Several examples are considered.

  8. Comparison of Geant4-DNA simulation of S-values with other Monte Carlo codes

    International Nuclear Information System (INIS)

    André, T.; Morini, F.; Karamitros, M.; Delorme, R.; Le Loirec, C.; Campos, L.; Champion, C.; Groetz, J.-E.; Fromm, M.; Bordage, M.-C.; Perrot, Y.; Barberet, Ph.

    2014-01-01

    Monte Carlo simulations of S-values have been carried out with the Geant4-DNA extension of the Geant4 toolkit. The S-values have been simulated for monoenergetic electrons with energies ranging from 0.1 keV up to 20 keV, in liquid water spheres (for four radii, chosen between 10 nm and 1 μm), and for electrons emitted by five isotopes of iodine (131, 132, 133, 134 and 135), in liquid water spheres of varying radius (from 15 μm up to 250 μm). The results have been compared to those obtained from other Monte Carlo codes and from other published data. The use of the Kolmogorov–Smirnov test has allowed confirming the statistical compatibility of all simulation results

  9. Positive predictive value of peptic ulcer diagnosis codes in the Danish National Patient Registry.

    Science.gov (United States)

    Viborg, Søren; Søgaard, Kirstine Kobberøe; Jepsen, Peter

    2017-01-01

    Diagnoses of peptic ulcer are registered in the Danish National Patient Registry (DNPR) for administrative as well as research purposes, but it is unknown whether the coding validity depends on the location of the ulcer. To validate the International Classification of Diseases, 10 th revision diagnosis codes of peptic ulcer in the DNPR by estimating positive predictive values (PPVs) for gastric and duodenal ulcer diagnoses. We identified all patients registered with a hospital discharge diagnosis of peptic ulcer from Aarhus University Hospital, Denmark, in 1995-2006. Among them, we randomly selected 200 who had an outpatient gastroscopy at the time of ulcer diagnosis. We reviewed the findings from these gastroscopies to confirm the presence of peptic ulcer and its location. We calculated PPVs and corresponding 95% confidence intervals (CIs) of gastric and duodenal ulcer diagnoses, using descriptions from the gastroscopic examinations as standard reference. In total, 182 records (91%) were available for review. The overall PPV of peptic ulcer diagnoses in DNPR was 95.6% (95% CI 91.5-98.1), with PPVs of 90.3% (95% CI 82.4-95.5) for gastric ulcer diagnoses, and 94.4% (95% CI 87.4-98.2) for duodenal ulcer diagnoses. PPVs were constant over time. The PPV of uncomplicated peptic ulcer diagnoses in the DNPR is high, and the location of the ulcers is registered correctly in most cases, indicating that the diagnoses are useful for research purposes.

  10. Prognostic value of long non-coding RNA MALAT1 in cancer patients.

    Science.gov (United States)

    Wu, Yihua; Lu, Wei; Xu, Jinming; Shi, Yu; Zhang, Honghe; Xia, Dajing

    2016-01-01

    Metastasis associated in lung adenocarcinoma transcript 1 (MALAT1) was identified to be the first long non-coding RNA as a biomarker of independent prognostic value for early stage non-small cell lung cancer patient survival. In recent years, the association between upregulated tissue MALAT1 level and incidence of various cancers including bladder cancer, colorectal cancer, and renal cancer has been widely discussed. The aim of our present study was to assess the potential prognostic value of MALAT1 in various human cancers. PubMed, Embase, Ovid, and Cochrane Library databases were systematically searched, and eligible studies evaluating the prognostic value of MALAT1 in various cancers were included. Finally, 11 studies encompassing 1216 participants reporting with sufficient data were enrolled in the current meta-analysis. The pooled hazard ratio (HR) was 2.05 (95 % confidence interval (CI) 1.64-2.55, p < 0.01) for overall survival (OS) and 2.66 (95 % CI 1.86-3.80, p < 0.01) for disease-free survival (DFS). In conclusion, high tissue MALAT1 level was associated with an inferior clinical outcome in various cancers, suggesting that MALAT1 might serve as a potential prognostic biomarker for various cancers.

  11. Value and probability coding in a feedback-based learning task utilizing food rewards.

    Science.gov (United States)

    Tricomi, Elizabeth; Lempert, Karolina M

    2015-01-01

    For the consequences of our actions to guide behavior, the brain must represent different types of outcome-related information. For example, an outcome can be construed as negative because an expected reward was not delivered or because an outcome of low value was delivered. Thus behavioral consequences can differ in terms of the information they provide about outcome probability and value. We investigated the role of the striatum in processing probability-based and value-based negative feedback by training participants to associate cues with food rewards and then employing a selective satiety procedure to devalue one food outcome. Using functional magnetic resonance imaging, we examined brain activity related to receipt of expected rewards, receipt of devalued outcomes, omission of expected rewards, omission of devalued outcomes, and expected omissions of an outcome. Nucleus accumbens activation was greater for rewarding outcomes than devalued outcomes, but activity in this region did not correlate with the probability of reward receipt. Activation of the right caudate and putamen, however, was largest in response to rewarding outcomes relative to expected omissions of reward. The dorsal striatum (caudate and putamen) at the time of feedback also showed a parametric increase correlating with the trialwise probability of reward receipt. Our results suggest that the ventral striatum is sensitive to the motivational relevance, or subjective value, of the outcome, while the dorsal striatum codes for a more complex signal that incorporates reward probability. Value and probability information may be integrated in the dorsal striatum, to facilitate action planning and allocation of effort. Copyright © 2015 the American Physiological Society.

  12. The neural dynamics of reward value and risk coding in the human orbitofrontal cortex.

    Science.gov (United States)

    Li, Yansong; Vanni-Mercier, Giovanna; Isnard, Jean; Mauguière, François; Dreher, Jean-Claude

    2016-04-01

    The orbitofrontal cortex is known to carry information regarding expected reward, risk and experienced outcome. Yet, due to inherent limitations in lesion and neuroimaging methods, the neural dynamics of these computations has remained elusive in humans. Here, taking advantage of the high temporal definition of intracranial recordings, we characterize the neurophysiological signatures of the intact orbitofrontal cortex in processing information relevant for risky decisions. Local field potentials were recorded from the intact orbitofrontal cortex of patients suffering from drug-refractory partial epilepsy with implanted depth electrodes as they performed a probabilistic reward learning task that required them to associate visual cues with distinct reward probabilities. We observed three successive signals: (i) around 400 ms after cue presentation, the amplitudes of the local field potentials increased with reward probability; (ii) a risk signal emerged during the late phase of reward anticipation and during the outcome phase; and (iii) an experienced value signal appeared at the time of reward delivery. Both the medial and lateral orbitofrontal cortex encoded risk and reward probability while the lateral orbitofrontal cortex played a dominant role in coding experienced value. The present study provides the first evidence from intracranial recordings that the human orbitofrontal cortex codes reward risk both during late reward anticipation and during the outcome phase at a time scale of milliseconds. Our findings offer insights into the rapid mechanisms underlying the ability to learn structural relationships from the environment. © The Author (2016). Published by Oxford University Press on behalf of the Guarantors of Brain. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. Strength Measurements in Acute Hamstring Injuries: Intertester Reliability and Prognostic Value of Handheld Dynamometry

    NARCIS (Netherlands)

    Reurink, Gustaaf; Goudswaard, Gert Jan; Moen, Maarten H.; Tol, Johannes L.; Verhaar, Jan A. N.; Weir, Adam

    2016-01-01

    Study Design Cohort study, repeated measures. Background Although hamstring strength measurements are used for assessing prognosis and monitoring recovery after hamstring injury, their actual clinical relevance has not been established. Handheld dynamometry (HHD) is a commonly used method of

  14. Prognostic value of handgrip strength in people aged 60 years and older: A systematic review and meta-analysis.

    Science.gov (United States)

    Rijk, Joke M; Roos, Paul Rkm; Deckx, Laura; van den Akker, Marjan; Buntinx, Frank

    2016-01-01

    The aim of the present study was to systematically review the literature on the predictive value of handgrip strength as a marker for vulnerability. Furthermore, we aimed to update a recent systematic review on the association between handgrip strength and mortality. Literature searches using Cochrane, PubMed and Embase databases, and searching reference lists of included studies. Eligible studies were observational longitudinal studies presenting handgrip strength at baseline as an independent variable and its association with cognition, depression, mobility, functional status, hospitalization or mortality at follow up in a general population aged 60 years and older. With respect to mortality, we updated a recent systematic review. We included 34 articles. Most of them involved the association between handgrip strength and cognition (n = 9), functional status (n = 12), mobility (n = 6) or mortality (n = 22), and mainly found a positive relationship, meaning that higher handgrip strength at baseline is protective for declines in these outcome measures. Statistical pooling was carried out for functional status and mortality, with a pooled ratio for functional status of 1.78 (95% CI 1.28-2.48) for categorical variables (high vs low handgrip strength) and 0.95 (95% CI 0.92-0.99) for handgrip strength as a continuous variable. The pooled hazard ratio for mortality was 1.79 (95% CI 1.26-2.55) for categorical variables and 0.96 (95% CI 0.93-0.98) for continuous variables. Handgrip strength has a predictive validity for decline in cognition, mobility, functional status and mortality in older community-dwelling populations. © 2015 Japan Geriatrics Society.

  15. Handgrip strength and its prognostic value for mortality in Moscow, Denmark, and England

    DEFF Research Database (Denmark)

    Oksuzyan, Anna; Demakakos, Panayotes; Shkolnikova, Maria

    2017-01-01

    BACKGROUND: This study compares handgrip strength and its association with mortality across studies conducted in Moscow, Denmark, and England. MATERIALS: The data collected by the Study of Stress, Aging, and Health in Russia, the Study of Middle-Aged Danish Twins and the Longitudinal Study of Aging...... Danish Twins, and the English Longitudinal Study of Ageing was utilized. RESULTS: Among the male participants, the age-standardized grip strength was 2 kg and 1 kg lower in Russia than in Denmark and in England, respectively. The age-standardized grip strength among the female participants was 1.9 kg...... and 1.6 kg lower in Russia than in Denmark and in England, respectively. In Moscow, a one-kilogram increase in grip strength was associated with a 4% (hazard ratio [HR] = 0.96, 95% confidence interval [CI]: 0.94, 0.99) reduction in mortality among men and a 10% (HR = 0.90, 95%CI: 0.86, 0.94) among women...

  16. 14 CFR 29.613 - Material strength properties and design values.

    Science.gov (United States)

    2010-01-01

    ... Administrator: (1) MIL—HDBK-5, “Metallic Materials and Elements for Flight Vehicle Structure”. (2) MIL—HDBK-17, “Plastics for Flight Vehicles”. (3) ANC-18, “Design of Wood Aircraft Structures”. (4) MIL—HDBK-23... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Material strength properties and design...

  17. 14 CFR 27.613 - Material strength properties and design values.

    Science.gov (United States)

    2010-01-01

    ... Administrator: (1) MIL-HDBK-5, “Metallic Materials and Elements for Flight Vehicle Structure”. (2) MIL-HDBK-17, “Plastics for Flight Vehicles”. (3) ANC-18, “Design of Wood Aircraft Structures”. (4) MIL-HDBK-23... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Material strength properties and design...

  18. S values at voxels level for 188Re and 90Y calculated with the MCNP-4C code

    International Nuclear Information System (INIS)

    Coca Perez, Marco Antonio; Torres Aroche, Leonel Alberto; Cornejo, Nestor; Martin Hernandez, Guido

    2003-01-01

    The main objective of this work was estimate the voxels S values for 188 Re at cubical geometry using the MCNP-4C code for the simulation of radiation transport and energy deposition. Mean absorbed dose to target voxels per radioactive decay in a source voxels were estimated and reported for 188 Re and Y 90 . A comparison of voxels S values computed with the MCNP code the data reported in MIRD pamphlet 17 for 90 Y was performed in order to evaluate our results

  19. 14 CFR 25.613 - Material strength properties and material design values.

    Science.gov (United States)

    2010-01-01

    ... statistical basis. (b) Material design values must be chosen to minimize the probability of structural... following probability: (1) Where applied loads are eventually distributed through a single member within an... probability with 95 percent confidence. (2) For redundant structure, in which the failure of individual...

  20. S values at voxels level for 188Re and 90Y calculated with the MCNP-4C code

    International Nuclear Information System (INIS)

    Coca, M.A.; Torres, L.A.; Cornejo, N.; Martin, G.

    2008-01-01

    Full text: MIRD formalism at voxel level has been suggested as an optional methodology to perform internal radiation dosimetry calculation during internal radiation therapy in Nuclear Medicine. Voxel S values for Y 90 , 131 I, 32 P, 99m Tc and 89 Sr have been published to different sizes. Currently, 188 Re has been proposed as a promising radionuclide for therapy due to its physical features and availability from generators. The main objective of this work was to estimate the voxel S values for 188 Re at cubical geometry using the MCNP-4C code for the simulations of radiation transport and energy deposition. Mean absorbed dose to target voxels per radioactive decay in a source voxel were estimated and reported for 188 Re and Y 90 . A comparison of voxel S values computed with the MCNP code and the data reported in MIRD Pamphlet 17 for 90 Y was performed in order to evaluate our results. (author)

  1. Reference equations for handgrip strength: Normative values in young adult and middle-aged subjects.

    Science.gov (United States)

    Lopes, Jordão; Grams, Samantha Torres; da Silva, Edy Floriano; de Medeiros, Luana Adriano; de Brito, Christina May Moran; Yamaguti, Wellington Pereira

    2018-06-01

    Handgrip strength (HS) has been widely used as a functionality parameter of the upper limbs (UL) and general health. The measurement of HS by dynamometry is a low cost, non-invasive method of simple applicability, widely used in pulmonary rehabilitation and in critical care units. However, there are no reports in the literature of reference equations for the Brazilian population involving young and middle-aged adults. The aim of this study was to establish reference equations to predict normal HS for young and middle-aged adults through demographic and anthropometric data. This is a cross-sectional study with a sample of 80 healthy subjects (40 men and 40 women), aged 20-60 years. Inclusion criteria were: 1) BMI between 18.5 and 30 kg/m 2 ; 2) presence of dominant hand; 3) no cardiac, pulmonary, metabolic, or neurologic diseases; 4) lack of musculoskeletal disorders; 5) no history of fractures or trauma of the UL. Anthropometric measurements of the UL were obtained by a tape (hand length and width, forearm circumference and length). The dominance of hands was defined by the Dutch Handedness Questionnaire. HS measures were obtained by a manual hydraulic dynamometer, according to the recommendations of the American Association of Hand Therapists. Data were analyzed with SPSS for Windows, version 17.0, and treated with descriptive and inferential analysis. Normality was evaluated by Kolmogorov-Smirnov. Pearson or Spearman coefficients and multiple regression analysis were also used. HS was significantly higher for men compared to women, and also higher for the dominant hand (HSD) compared to the non-dominant hand (HSND) (p  0.05). No correlation was found between HS and age. A weak correlation was found between HS and BMI. A moderate correlation of HS was observed with weight and height. Finally, moderate and high correlations were found between HS and anthropometric variables of UL. The best reference equations with R 2 , adjusted to 0.71 and 0.70, were

  2. An analysis of structure strength and ergonomic value of mechanical systems of integrated kidney and thyroid diagnosis device

    International Nuclear Information System (INIS)

    M-Awwaluddin Tri Hardjanto; Abdul Jalil

    2016-01-01

    The has been performed to ensure the security of the device, understand the patient's as well as operator problem and complaints, as part of the efforts to improve the performance of these devices. The analysis is done by calculating the strength of arm, the main frame chairs, and frame backrest patients, as well as analyzing the static anthropometry data for Indonesian man to determine the size of the dental chair and adjusting the size of the seat. We also use the dynamic anthropometry data for Indonesian man to determine the layout and range of movement of the operator while operating the integrated device The analysis showed that the structure is safe because the actual stress that occurs is still below the limit value of 248 MPa. The device also has good ergonomic value so that it can be bulk produced. (author)

  3. Evaluation of effective J-integral value for 3-D TWC pipe in ABAQUS code

    International Nuclear Information System (INIS)

    Yang, J. S.; You, K. W.; Sung, K. B.; Jung, W. T.; Kim, B. N.

    1999-01-01

    This paper suggests a simple method to estimate the effective J-integral values in applying Leak-Before-Break (LBB) technology to nuclear piping system. In this paper, the effective J-integral estimates were calculated using energy domain integral approach with ABAQUS computer program. In this case, there existed a apparent variation of J-integral values along the crack line through the thickness of pipe. For this reason, several case studies have been performed to evaluate the effective J-integral value. From the results, it was concluded that the simple method suggested in this paper can be effectively used in estimating the effective J-integral value

  4. Grip strength is strongly associated with height, weight and gender in childhood : a cross sectional study of 2241 children and adolescents providing reference values

    NARCIS (Netherlands)

    Ploegmakers, Joris J. W.; Hepping, Ann M.; Geertzen, Jan H. B.; Bulstra, Sjoerd K.; Stevens, Martin

    2013-01-01

    Question: What are reference values for grip strength in children and adolescents based on a large and heterogeneous study population? What is the association of grip strength with age, gender, weight, and height in this population? Design: Cross-sectional study. Participants: Participants were

  5. The Physician Recommendation Coding System (PhyReCS): A Reliable and Valid Method to Quantify the Strength of Physician Recommendations During Clinical Encounters.

    Science.gov (United States)

    Scherr, Karen A; Fagerlin, Angela; Williamson, Lillie D; Davis, J Kelly; Fridman, Ilona; Atyeo, Natalie; Ubel, Peter A

    2017-01-01

    Physicians' recommendations affect patients' treatment choices. However, most research relies on physicians' or patients' retrospective reports of recommendations, which offer a limited perspective and have limitations such as recall bias. To develop a reliable and valid method to measure the strength of physician recommendations using direct observation of clinical encounters. Clinical encounters (n = 257) were recorded as part of a larger study of prostate cancer decision making. We used an iterative process to create the 5-point Physician Recommendation Coding System (PhyReCS). To determine reliability, research assistants double-coded 50 transcripts. To establish content validity, we used 1-way analyses of variance to determine whether relative treatment recommendation scores differed as a function of which treatment patients received. To establish concurrent validity, we examined whether patients' perceived treatment recommendations matched our coded recommendations. The PhyReCS was highly reliable (Krippendorf's alpha = 0.89, 95% CI [0.86, 0.91]). The average relative treatment recommendation score for each treatment was higher for individuals who received that particular treatment. For example, the average relative surgery recommendation score was higher for individuals who received surgery versus radiation (mean difference = 0.98, SE = 0.18, P recommendations matched coded recommendations 81% of the time. The PhyReCS is a reliable and valid way to capture the strength of physician recommendations. We believe that the PhyReCS would be helpful for other researchers who wish to study physician recommendations, an important part of patient decision making. © The Author(s) 2016.

  6. A parametric study of MELCOR Accident Consequence Code System 2 (MACCS2) Input Values for the Predicted Health Effect

    International Nuclear Information System (INIS)

    Kim, So Ra; Min, Byung Il; Park, Ki Hyun; Yang, Byung Mo; Suh, Kyung Suk

    2016-01-01

    The MELCOR Accident Consequence Code System 2, MACCS2, has been the most widely used through the world among the off-site consequence analysis codes. MACCS2 code is used to estimate the radionuclide concentrations, radiological doses, health effects, and economic consequences that could result from the hypothetical nuclear accidents. Most of the MACCS model parameter values are defined by the user and those input parameters can make a significant impact on the output. A limited parametric study was performed to identify the relative importance of the values of each input parameters in determining the predicted early and latent health effects in MACCS2. These results would not be applicable to every case of the nuclear accidents, because only the limited calculation was performed with Kori-specific data. The endpoints of the assessment were early- and latent cancer-risk in the exposed population, therefore it might produce the different results with the parametric studies for other endpoints, such as contamination level, absorbed dose, and economic cost. Accident consequence assessment is important for decision making to minimize the health effect from radiation exposure, accordingly the sufficient parametric studies are required for the various endpoints and input parameters in further research

  7. Human values and codes of behavior: Changes in Oregon's Eagle Cap Wilderness visitors and their attitudes

    Science.gov (United States)

    Alan E. Watson; John C. Hendee; Hans P. Zaglauer

    1996-01-01

    A study of visitors to Oregon's Eagle Cap Wilderness in 1965 offered a baseline against which to evaluate how those who recreate in wilderness have changed their views of wilderness. A study of visitors to that same wilderness area in 1993 provided comparative data. Some characteristics of the visitors changed in ways that would suggest that the values visitors...

  8. Prognostic value of long non-coding RNA TUG1 in various tumors.

    Science.gov (United States)

    Li, Na; Shi, Ke; Kang, Xinmei; Li, Wei

    2017-09-12

    Taurine up-regulated gene 1 (TUG1) is a long non-coding RNA (lncRNA), has been reported that be dysregulated in various tumors, involved in proliferation and apoptosis in a variety of tumor cells. To detect the clinical significance of TUG1 expression in tumor patients, we carried out current systematic review and meta-analysis investigating its relation with the prognosis and clinicopathological features of cancers. A total of 15 studies comprise 1560 patients were analyzed. The pooled results showed that no significant relationship between high TUG1 expression and overall survival (OS) (HR = 1.28, 95% CI: 0.96-1.69, P = 0.091) in various tumors. In the subgroup analysis by cancer type, elevated TUG1 expression was associated with poorer survival in cancer patients with high TUG1 expression subgroup but better survival in patients with low TUG1 expression subgroup. Over-expression of TUG1 associated with significantly unfavorable survival for bladder cancer (HR=2.67, 95% CI: 1.47-4.87, P = 0.001). Up-regulation of TUG1 correlated with distant metastasis (DM) (OR = 4.22, 95% CI: 2.66-6.70, P TUG1 may be a useful prognostic biomarker in cancer patients.

  9. Shared neural coding for social hierarchy and reward value in primate amygdala.

    Science.gov (United States)

    Munuera, Jérôme; Rigotti, Mattia; Salzman, C Daniel

    2018-03-01

    The social brain hypothesis posits that dedicated neural systems process social information. In support of this, neurophysiological data have shown that some brain regions are specialized for representing faces. It remains unknown, however, whether distinct anatomical substrates also represent more complex social variables, such as the hierarchical rank of individuals within a social group. Here we show that the primate amygdala encodes the hierarchical rank of individuals in the same neuronal ensembles that encode the rewards associated with nonsocial stimuli. By contrast, orbitofrontal and anterior cingulate cortices lack strong representations of hierarchical rank while still representing reward values. These results challenge the conventional view that dedicated neural systems process social information. Instead, information about hierarchical rank-which contributes to the assessment of the social value of individuals within a group-is linked in the amygdala to representations of rewards associated with nonsocial stimuli.

  10. The impact of social value orientation on affective commitment : The moderating role of work group cooperative climate, and of climate strength

    NARCIS (Netherlands)

    Bogaert, S.; Boone, Chr.; van Witteloostuijn, A.

    2012-01-01

    We investigate the moderating role of an individual's social value orientation (which refers to self- versus other-regarding preferences) and of climate strength (which refers to the extent of agreement among group members on group norms and values) on the relationship between work group cooperative

  11. CELLDOSE: A Monte Carlo code to assess electron dose distribution - S values for 131I in spheres of various sizes

    International Nuclear Information System (INIS)

    Champion, C.; Zanotti-Fregonara, P.; Hindie, E; Hindie, E.

    2008-01-01

    Monte Carlo simulation can be particularly suitable for modeling the microscopic distribution of energy received by normal tissues or cancer cells and for evaluating the relative merits of different radiopharmaceuticals. We used a new code, CELLDOSE, to assess electron dose for isolated spheres with radii varying from 2,500 μm down to 0.05 μm, in which 131 I is homogeneously distributed. Methods: All electron emissions of 131 I were considered,including the whole β - 131 I spectrum, 108 internal conversion electrons, and 21 Auger electrons. The Monte Carlo track-structure code used follows all electrons down to an energy threshold E-cutoff 7.4 eV. Results: Calculated S values were in good agreement with published analytic methods, lying in between reported results for all experimental points. Our S values were also close to other published data using a Monte Carlo code. Contrary to the latter published results, our results show that dose distribution inside spheres is not homogeneous, with the dose at the outmost layer being approximately half that at the center. The fraction of electron energy retained within the spheres decreased with decreasing radius (r): 87.1 % for r 2,500 μm, 8.73% for r 50 μm, and 1.18% for r 5 μm. Thus, a radioiodine concentration that delivers a dose of 100 Gy to a micro-metastasis of 2,500 μm radius would deliver 10 Gy in a cluster of 50 μm and only 1.4 Gy in an isolated cell. The specific contribution from Auger electrons varied from 0.25% for the largest sphere up to 76.8% for the smallest sphere. Conclusion: The dose to a tumor cell will depend on its position in a metastasis. For the treatment of very small metastases, 131 I may not be the isotope of choice. When trying to kill isolated cells or a small cluster of cells with 131 I, it is important to get the iodine as close as possible to the nucleus to get the enhancement factor from Auger electrons. The Monte Carlo code CELLDOSE can be used to assess the electron map deposit

  12. Definition of the ethical values and ethics codes for Turkish midwifery: a focused group study in kocaeli.

    Science.gov (United States)

    Berkiten Ergin, Ayla; Ozcan, Müesser; Ersoy, Nermin; Acar, Zeynep

    2013-09-01

    The independent roles of midwives have not been properly defined, and midwifery ethical values and moral codes proper to Turkish culture have not been developed. The absence of legal regulations concerning midwifery has negatively affected midwifery in the process of professionalization. The purpose of this study was to identify the professional values of midwifery in Turkey. A focus group was created with the participation of nine midwives working at two state hospitals and a university hospital that provide birth service for women in Kocaeli, which is the most important industrial city in Turkey. The opinions of the midwives on the characteristics that a good midwife should possess and the professional values that a good midwife should observe were collected via in-depth interviews. The interviews were recorded. A total of three meetings were held with the participants. Finally, the notes taken by the reporter during these interviews were rearranged, and the recordings were transcribed by the researchers. THE CHARACTERISTICS SUGGESTED BY THE PARTICIPANTS WERE CLASSIFIED INTO THREE CATEGORIES: professional, personal, and interpersonal. Professional competence, capacity to properly inform interested parties, trustworthiness, respect for individuals and human dignity, and empathy were the most commonly named characteristics. As for the professional values of midwifery, professional competence, trustworthiness, responsibility, maximum benefit, and protection of privacy were the most often identified. Midwives also reported that most of the difficulties they faced in the exercise of daily tasks concerned protecting the privacy of their patients as well as the integrity and prestige of the profession, achieving the maximum benefit and least harm for patients, and providing a just and equal service. The professional values were mentioned by participant midwives were similar to the values proposed by international professional organizations. But there were some

  13. Definition of the Ethical Values and Ethics Codes for Turkish Midwifery: A Focused Group Study in Kocaeli

    Science.gov (United States)

    Berkiten Ergin, Ayla; Özcan, Müesser; Ersoy, Nermin; Acar, Zeynep

    2013-01-01

    Background: The independent roles of midwives have not been properly defined, and midwifery ethical values and moral codes proper to Turkish culture have not been developed. The absence of legal regulations concerning midwifery has negatively affected midwifery in the process of professionalization. Objectives: The purpose of this study was to identify the professional values of midwifery in Turkey. Materials and Methods: A focus group was created with the participation of nine midwives working at two state hospitals and a university hospital that provide birth service for women in Kocaeli, which is the most important industrial city in Turkey. The opinions of the midwives on the characteristics that a good midwife should possess and the professional values that a good midwife should observe were collected via in-depth interviews. The interviews were recorded. A total of three meetings were held with the participants. Finally, the notes taken by the reporter during these interviews were rearranged, and the recordings were transcribed by the researchers. Results: The characteristics suggested by the participants were classified into three categories: professional, personal, and interpersonal. Professional competence, capacity to properly inform interested parties, trustworthiness, respect for individuals and human dignity, and empathy were the most commonly named characteristics. As for the professional values of midwifery, professional competence, trustworthiness, responsibility, maximum benefit, and protection of privacy were the most often identified. Midwives also reported that most of the difficulties they faced in the exercise of daily tasks concerned protecting the privacy of their patients as well as the integrity and prestige of the profession, achieving the maximum benefit and least harm for patients, and providing a just and equal service. Conclusions: The professional values were mentioned by participant midwives were similar to the values proposed by

  14. Nonlinear QR code based optical image encryption using spiral phase transform, equal modulus decomposition and singular value decomposition

    Science.gov (United States)

    Kumar, Ravi; Bhaduri, Basanta; Nishchal, Naveen K.

    2018-01-01

    In this study, we propose a quick response (QR) code based nonlinear optical image encryption technique using spiral phase transform (SPT), equal modulus decomposition (EMD) and singular value decomposition (SVD). First, the primary image is converted into a QR code and then multiplied with a spiral phase mask (SPM). Next, the product is spiral phase transformed with particular spiral phase function, and further, the EMD is performed on the output of SPT, which results into two complex images, Z 1 and Z 2. Among these, Z 1 is further Fresnel propagated with distance d, and Z 2 is reserved as a decryption key. Afterwards, SVD is performed on Fresnel propagated output to get three decomposed matrices i.e. one diagonal matrix and two unitary matrices. The two unitary matrices are modulated with two different SPMs and then, the inverse SVD is performed using the diagonal matrix and modulated unitary matrices to get the final encrypted image. Numerical simulation results confirm the validity and effectiveness of the proposed technique. The proposed technique is robust against noise attack, specific attack, and brutal force attack. Simulation results are presented in support of the proposed idea.

  15. A Maximum Muscle Strength Prediction Formula Using Theoretical Grade 3 Muscle Strength Value in Daniels et al.’s Manual Muscle Test, in Consideration of Age: An Investigation of Hip and Knee Joint Flexion and Extension

    Directory of Open Access Journals (Sweden)

    Hideyuki Usa

    2017-01-01

    Full Text Available This study attempted to develop a formula for predicting maximum muscle strength value for young, middle-aged, and elderly adults using theoretical Grade 3 muscle strength value (moment fair: Mf—the static muscular moment to support a limb segment against gravity—from the manual muscle test by Daniels et al. A total of 130 healthy Japanese individuals divided by age group performed isometric muscle contractions at maximum effort for various movements of hip joint flexion and extension and knee joint flexion and extension, and the accompanying resisting force was measured and maximum muscle strength value (moment max, Mm was calculated. Body weight and limb segment length (thigh and lower leg length were measured, and Mf was calculated using anthropometric measures and theoretical calculation. There was a linear correlation between Mf and Mm in each of the four movement types in all groups, excepting knee flexion in elderly. However, the formula for predicting maximum muscle strength was not sufficiently compatible in middle-aged and elderly adults, suggesting that the formula obtained in this study is applicable in young adults only.

  16. A compilation of radionuclide transfer factors for the plant, meat, milk, and aquatic food pathways and the suggested default values for the RESRAD code

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Y.Y.; Biwer, B.M.; Yu, C.

    1993-08-01

    The ongoing development and revision of the RESRAD computer code at Argonne National Laboratory requires update of radionuclide transfer factors for the plant, meat, milk, and aquatic food pathways. Default values for these transfer factors used in published radiological assessment reports are compiled and compared with values used in RESRAD. The differences among the reported default values used in different radiological assessment codes and reports are also discussed. In data comparisons, values used in more recent reports are given more weight because more recent experimental work tends to be conducted under better-defined laboratory or field conditions. A new default value is suggested for RESRAD if one of the following conditions is met: (1) values used in recent reports are an order of magnitude higher or lower than the default value currently used in RESRAD, or (2) the same default value is used in several recent radiological assessment reports.

  17. Moral Competence and Character Strengths among Adolescents: The Development and Validation of the Values in Action Inventory of Strengths for Youth

    Science.gov (United States)

    Park, Nansook; Peterson, Christopher

    2006-01-01

    Moral competence among adolescents can be approached in terms of good character. Character is a multidimensional construct comprised of a family of positive traits manifest in an individual's thoughts, emotions and behaviours. The Values in Action Inventory for Youth (VIA-Youth) is a self-report questionnaire suitable for adolescents that measures…

  18. A comprehensive strength testing protocol offers no clinical value in predicting risk of hamstring injury: a prospective cohort study of 413 professional football players.

    Science.gov (United States)

    van Dyk, Nicol; Bahr, Roald; Burnett, Angus F; Whiteley, Rod; Bakken, Arnhild; Mosler, Andrea; Farooq, Abdulaziz; Witvrouw, Erik

    2017-12-01

    Hamstring injuries remain prevalent across a number of professional sports. In football, the incidence has even increased by 4% per year at the Champions League level over the last decade. The role of muscle strength or strength ratios and their association with risk of hamstring injury remain restricted by small sample sizes and inconclusive results. The purpose of this study is to identify risk factors for hamstring injury in professional football players in an adequately powered, prospective cohort study. Using both established (isokinetic) and novel (eccentric hamstring test device) measures of muscle strength, we aimed to investigate the relationship between these strength characteristics over the entire range of motion with risk of hamstring injury. All teams (n=18) eligible to compete in the premier football league in Qatar underwent a comprehensive strength assessment during their annual periodic health evaluation at Aspetar Orthopaedic and Sports Medicine Hospital in Doha, Qatar. Variables included isokinetic strength, Nordic hamstring exercise strength and dynamic hamstring: quadriceps ratios. Of the 413 players included (68.2% of all league players), 66 suffered a hamstring injury over the two seasons. Only isokinetic quadriceps concentric at 300°/s (adjusted for bodyweight) was associated with risk of hamstring injury when considered categorically. Age, body mass and playing position were also associated with risk of hamstring injury. None of the other 23 strength variables examined were found to be associated with hamstring injury. The clinical value of isolated strength testing is limited, and its use in musculoskeletal screening to predict future hamstring injury is unfounded. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  19. Shell cracking strength in almond (Prunus dulcis [Mill.] D.A. Webb.) and its implication in uses as a value-added product.

    Science.gov (United States)

    Ledbetter, C A

    2008-09-01

    Researchers are currently developing new value-added uses for almond shells, an abundant agricultural by-product. Almond varieties are distinguished by processors as being either hard or soft shelled, but these two broad classes of almond also exhibit varietal diversity in shell morphology and physical characters. By defining more precisely the physical and chemical characteristics of almond shells from different varieties, researchers will better understand which specific shell types are best suited for specific industrial processes. Eight diverse almond accessions were evaluated in two consecutive harvest seasons for nut and kernel weight, kernel percentage and shell cracking strength. Shell bulk density was evaluated in a separate year. Harvest year by almond accession interactions were highly significant (p0.01) for each of the analyzed variables. Significant (p0.01) correlations were noted for average nut weight with kernel weight, kernel percentage and shell cracking strength. A significant (p0.01) negative correlation for shell cracking strength with kernel percentage was noted. In some cases shell cracking strength was independent of the kernel percentage which suggests that either variety compositional differences or shell morphology affect the shell cracking strength. The varietal characterization of almond shell materials will assist in determining the best value-added uses for this abundant agricultural by-product.

  20. Shear bond strength of self-etching adhesive systems with different pH values to bleached and/or CPP-ACP-treated enamel.

    Science.gov (United States)

    Oskoee, Siavash Savadi; Bahari, Mahmoud; Kimyai, Soodabeh; Navimipour, Elmira Jafari; Firouzmandi, Maryam

    2012-08-01

    To compare shear bond strengths of three different self-etching adhesive systems of different pH values to enamel bleached with carbamide peroxide, treated with casein phosphopeptide-amorphous calcium phosphate (CPP-ACP), or treated with CPP-ACP subsequent to bleaching with carbamide peroxide. Thirty-six human third molars were cut into 4 sections and randomly assigned to 4 groups (n = 36): group I: no treatment; group II: bleaching; group III: CPP-ACP; group IV: bleaching and CPP-ACP. After surface treatments, the samples of each group were further divided into three subgroups (n = 12) based on the adhesive used. The adhesives Clearfil SE Bond (CSE), AdhesE (ADE), and Adper SE Plus (ADP) were applied, and resin composite cylinders with a diameter of 2 mm and a height of 4 mm were bonded to the enamel. Then the specimens were subjected to shear bond strength testing. Two-way ANOVA and a post-hoc Tukey's test were used for statistical analysis (α = 0.05). There were significant differences between the adhesive systems (p system showed the highest bond strength, and the bleaching procedure reduced bond strengths (p = 0.001). Furthermore, there were no significant differences in shear bond strength values between the control and CPP groups. However, the differences between other groups were statistically significant (p material dependent.

  1. Positive Predictive Values of International Classification of Diseases, 10th Revision Coding Algorithms to Identify Patients With Autosomal Dominant Polycystic Kidney Disease

    Directory of Open Access Journals (Sweden)

    Vinusha Kalatharan

    2016-12-01

    Full Text Available Background: International Classification of Diseases, 10th Revision codes (ICD-10 for autosomal dominant polycystic kidney disease (ADPKD is used within several administrative health care databases. It is unknown whether these codes identify patients who meet strict clinical criteria for ADPKD. Objective: The objective of this study is (1 to determine whether different ICD-10 coding algorithms identify adult patients who meet strict clinical criteria for ADPKD as assessed through medical chart review and (2 to assess the number of patients identified with different ADPKD coding algorithms in Ontario. Design: Validation study of health care database codes, and prevalence. Setting: Ontario, Canada. Patients: For the chart review, 201 adult patients with hospital encounters between April 1, 2002, and March 31, 2014, assigned either ICD-10 codes Q61.2 or Q61.3. Measurements: This study measured positive predictive value of the ICD-10 coding algorithms and the number of Ontarians identified with different coding algorithms. Methods: We manually reviewed a random sample of medical charts in London, Ontario, Canada, and determined whether or not ADPKD was present according to strict clinical criteria. Results: The presence of either ICD-10 code Q61.2 or Q61.3 in a hospital encounter had a positive predictive value of 85% (95% confidence interval [CI], 79%-89% and identified 2981 Ontarians (0.02% of the Ontario adult population. The presence of ICD-10 code Q61.2 in a hospital encounter had a positive predictive value of 97% (95% CI, 86%-100% and identified 394 adults in Ontario (0.003% of the Ontario adult population. Limitations: (1 We could not calculate other measures of validity; (2 the coding algorithms do not identify patients without hospital encounters; and (3 coding practices may differ between hospitals. Conclusions: Most patients with ICD-10 code Q61.2 or Q61.3 assigned during their hospital encounters have ADPKD according to the clinical

  2. Criterion-Referenced Values of Grip Strength and Usual Gait Speed Using Instrumental Activities of Daily Living Disability as the Criterion.

    Science.gov (United States)

    Lee, Meng-Chih; Hsu, Chih-Cheng; Tsai, Yi-Fen; Chen, Ching-Yu; Lin, Cheng-Chieh; Wang, Ching-Yi

    Current evidence suggests that grip strength and usual gait speed (UGS) are important predictors of instrumental activities of daily living (IADL) disability. Knowing the optimum cut points of these tests for discriminating people with and without IADL disability could help clinicians or researchers to better interpret the test results and make medical decisions. The purpose of this study was to determine the cutoff values of grip strength and UGS for best discriminating community-dwelling older adults with and without IADL disability, separately for men and women, and to investigate their association with IADL disability. We conducted secondary data analysis on a national dataset collected in the Sarcopenia and Translational Aging Research in Taiwan (START). The data used in this study consisted of health data of 2420 community-dwelling older adults 65 years and older with no history of stroke and with complete data. IADL disability was defined as at least 1 IADL item scored as "need help" or "unable to perform." Receiver operating characteristics analysis was used to estimate the optimum grip strength and UGS cut points for best discriminating older adults with/without IADL disability. The association between each physical performance (grip strength and UGS) and IADL disability was assessed with odds ratios (ORs). With IADL disability as the criterion, the optimal cutoff values of grip strength were 28.7 kg for men and 16.0 kg for women, and those for UGS were 0.76 m/s for men and 0.66 m/s for women. The grip strength test showed satisfactory discriminant validity (area under the curve > 0.7) in men and a strong association with IADL disability (OR > 4). Our cut points using IADL disability as the criterion were close to those indicating frailty or sarcopenia. Our reported cutoffs can serve as criterion-referenced values, along with those previously determined using different indicators, and provide important landmarks on the performance continua of older adults

  3. Emerging putative associations between non-coding RNAs and protein-coding genes in Neuropathic Pain. Added value from re-using microarray data.

    Directory of Open Access Journals (Sweden)

    Enrico Capobianco

    2016-10-01

    Full Text Available Regeneration of injured nerves is likely occurring in the peripheral nervous system, but not in the central nervous system. Although protein-coding gene expression has been assessed during nerve regeneration, little is currently known about the role of non-coding RNAs (ncRNAs. This leaves open questions about the potential effects of ncRNAs at transcriptome level. Due to the limited availability of human neuropathic pain data, we have identified the most comprehensive time-course gene expression profile referred to sciatic nerve injury, and studied in a rat model, using two neuronal tissues, namely dorsal root ganglion (DRG and sciatic nerve (SN. We have developed a methodology to identify differentially expressed bioentities starting from microarray probes, and re-purposing them to annotate ncRNAs, while analyzing the expression profiles of protein-coding genes. The approach is designed to reuse microarray data and perform first profiling and then meta-analysis through three main steps. First, we used contextual analysis to identify what we considered putative or potential protein coding targets for selected ncRNAs. Relevance was therefore assigned to differential expression of neighbor protein-coding genes, with neighborhood defined by a fixed genomic distance from long or antisense ncRNA loci, and of parent genes associated with pseudogenes. Second, connectivity among putative targets was used to build networks, in turn useful to conduct inference at interactomic scale. Last, network paths were annotated to assess relevance to neuropathic pain. We found significant differential expression in long-intergenic ncRNAs (32 lincRNAs in SN, and 8 in DRG, antisense RNA (31 asRNA in SN, and 12 in DRG and pseudogenes (456 in SN, 56 in DRG. In particular, contextual analysis centered on pseudogenes revealed some targets with known association to neurodegeneration and/or neurogenesis processes. While modules of the olfactory receptors were clearly

  4. A review of the empirical evidence of the value of structuring and coding of clinical information within electronic health records for direct patient care

    Directory of Open Access Journals (Sweden)

    Dipak Kalra

    2013-05-01

    Full Text Available Background The case has historically been presented that structured and/or coded electronic health records (EHRs benefit direct patient care, but the evidence base for this is not well documented.Methods We searched for evidence of direct patient care value from the use of structured and/or coded information within EHRs. We interrogated nine international databases from 1990 to 2011. Value was defined using the Institute of Medicine’s six areas for improvement for healthcare systems: effectiveness, safety, patient-centredness, timeliness, efficiency and equitability. We included studies satisfying the Cochrane Effective Practice and Organisation of Care (EPOC group criteria.Results Of 5016 potentially eligible papers, 13 studies satisfied our criteria: 10 focused on effectiveness, with eight demonstrating potential for improved proxy and actual clinical outcomes if a structured and/or coded EHR was combined with alerting or advisory systems in a focused clinical domain. Three studies demonstrated improvement in safety outcomes. No studies were found reporting value in relation to patient-centredness, timeliness, efficiency or equitability.Conclusions We conclude that, to date, there has been patchy effort to investigate empirically the value from structuring and coding EHRs for direct patient care. Future investments in structuring and coding of EHRs should be informed by robust evidence as to the clinical scenarios in which patient care benefits may be realised.

  5. Predictive value of vertebral artery extracranial color-coded duplex sonography for ischemic stroke-related vertigo.

    Science.gov (United States)

    Liou, Li-Min; Lin, Hsiu-Fen; Huang, I-Fang; Chang, Yang-Pei; Lin, Ruey-Tay; Lai, Chiou-Lian

    2013-12-01

    Vertigo can be a major presentation of posterior circulation stroke and can be easily misdiagnosed because of its complicated presentation. We thus prospectively assessed the predictive value of vertebral artery extracranial color-coded duplex sonography (ECCS) for the prediction of ischemic stroke-related vertigo. The inclusion criteria were: (1) a sensation of whirling (vertigo); (2) intractable vertigo for more than 1 hour despite appropriate treatment; and (3) those who could complete cranial magnetic resonance imaging (MRI) and vertebral artery (V2 segment) ECCS studies. Eventually, 76 consecutive participants with vertigo were enrolled from Kaohsiung Municipal Hsiao-Kang Hospital, Kaohsiung, Taiwan between August 2010 and August 2011. Demographic data, neurological symptoms, neurologic examinations, and V2 ECCS were assessed. We chose the parameters of peak systolic velocity (PSV), end diastolic velocity (EDV), PSV/EDV, mean velocity (MV), resistance index (RI), and pulsatility index (PI) to represent the hemodynamics. Values from both sides of V2 segments were averaged. We then calculated the average RI (aRI), average PI (aPI), average PSV (aPSV)/EDV, and average (aMV). Axial and coronal diffusion-weighted MRI findings determined the existence of acute ischemic stroke. We grouped and analyzed participants in two ways (way I and way II analyses) based on the diffusion-weighted MRI findings (to determine whether there was acute stroke) and neurological examinations. Using way I analysis, the "MRI (+)" group had significantly higher impedance (aRI, aPI, and aPSV/EDV ratio) and lower velocity (aPSV, aEDV, and aMV(PSV + EDV/2)), compared to the "MRI (-)" group. The cutoff value/sensitivity/specificity of aPSV, aEDV, aMV, aPI, aRI, and aPSV/EDV between the MRI (+) and MRI (-) groups were 41.15/61.5/66.0 (p = 0.0101), 14.55/69.2/72.0 (p = 0.0003), 29.10/92.1/38.0 (p = 0.0013), 1.07/76.9/64.0 (p = 0.0066), 0.62/76.9/64.0 (p = 0.0076), and 2.69/80.8/66.0 (p = 0

  6. Aspects Concerning the Part of Fair Value within Financial Reports on the Strength of Current Financial Crisis

    OpenAIRE

    Mihalciuc Camelia Catalina; Cibotariu Irina Stefana; Apetri Niculina

    2010-01-01

    The fair value represents the most comprehensive concept referring to evaluation, mostly meaning the determination of market value, based upon supply and demand report. In order to evaluate a company to the fair value, information regarding the past performances, the potential future earnings, the economic climate or the involved human resources have become necessary. This paper brings a support to specialty literature, more and more developed within the area of value’s relevance as concerns ...

  7. Motor Unit Number Estimate and Isometric Hand Grip Strength in Military Veterans with or Without Muscular Complaints: Reference Values for Longitudinal Follow-up.

    Science.gov (United States)

    Li, Mian; Yao, Wenguo; Sundahl, Cynthia

    2018-03-26

    It remains unclear if Gulf War (GW) veterans have a higher risk of developing motor neuron disorder. We intended to establish baseline neurophysiological values, including thenar motor unit number estimate (MUNE) and isometric hand grip (IHG) strength, to compare future follow-ups of deployed GW veterans with or without muscular complaints. We evaluated 19 GW veterans with self-reported weakness, cramps, or excessive muscle fatigue (Ill-19) and compared them with 18 controls without such muscular complaints (C-18). We performed MUNE on hand thenar muscles using adapted multipoint stimulation method for Ill-19 and 15 controls (C-15). We measured IHG strength (maximum force, endurance, and fatigue level) on Ill-19 and C-18 with a hand dynamometer. We performed nerve conduction studies on all study participants to determine which subjects had mild carpal tunnel syndrome (CTS). We compared the MUNE and IHG strength measures between Ill group and controls and between those with CTS and those without CTS. We obtained thenar MUNE of Ill-19 (95% CI of mean: 143-215; mean age: 46 yr) and compared it with that of C-15 (95% CI of mean: 161-230; mean age: 45 yr), and 95% of CI of mean among IHG strength variables (maximum force: 324-381 Newton; endurance: 32-42 s; fatigue level: 24%-33%) compared with C-18 (maximum force: 349-408 Newton; endurance: 35-46 s; fatigue level: 21%-27%). There was no significant difference in either MUNE or IHG strength between Ill-19 group and controls. The MUNE and IHG maximum forces were significantly lower in those with CTS compared with those without CTS. As a surrogate of mild CTS, the median versus ulnar distal sensory latency on nerve conduction study was only weakly associated with MUNE, maximum force, and fatigue level, respectively. To our knowledge, no published study on MUNE reference values of military veteran population has been available. The quantifiable values of both thenar MUNE and IHG strength of military veterans serve as

  8. The added value of international benchmarks for fuel performance codes: an illustration on the basis of TRANSURANUS

    International Nuclear Information System (INIS)

    Van Uffelen, P.; Schubert, A.; Gyeori, C.; Van De Laar, J.

    2009-01-01

    Safety authorities and fuel designers, as well as nuclear research centers rely heavily on fuel performance codes for predicting the behaviour and life-time of fuel rods. The simulation tools are developed and validated on the basis of experimental results, some of which is in the public domain such as the International Fuel Performance Experiments database of the OECD/NEA and IAEA. Publicly available data constitute an excellent basis for assessing codes themselves, but also to compare codes that are being developed by independent teams. The present report summarises the advantages for the TRANSURANUS code by taking part in previous benchmarks organised by the IAEA, and outlines the preliminary results along with the perspectives of our participation in the current coordinated research project FUMEXIII

  9. All Values Are Equal, But Some Are More Equal Than Others: A Critique and Redefinition of Values Clarification. Monograph Series No. 102 Code C-9.

    Science.gov (United States)

    McKnight, Richard

    This literature review presents the essentials of the theory of Values Clarification and its fundamental terms, and makes a critical analysis of the Values Clarification Theory of Valuation. (Author/JLL)

  10. SU-E-T-590: Optimizing Magnetic Field Strengths with Matlab for An Ion-Optic System in Particle Therapy Consisting of Two Quadrupole Magnets for Subsequent Simulations with the Monte-Carlo Code FLUKA

    International Nuclear Information System (INIS)

    Baumann, K; Weber, U; Simeonov, Y; Zink, K

    2015-01-01

    Purpose: Aim of this study was to optimize the magnetic field strengths of two quadrupole magnets in a particle therapy facility in order to obtain a beam quality suitable for spot beam scanning. Methods: The particle transport through an ion-optic system of a particle therapy facility consisting of the beam tube, two quadrupole magnets and a beam monitor system was calculated with the help of Matlab by using matrices that solve the equation of motion of a charged particle in a magnetic field and field-free region, respectively. The magnetic field strengths were optimized in order to obtain a circular and thin beam spot at the iso-center of the therapy facility. These optimized field strengths were subsequently transferred to the Monte-Carlo code FLUKA and the transport of 80 MeV/u C12-ions through this ion-optic system was calculated by using a user-routine to implement magnetic fields. The fluence along the beam-axis and at the iso-center was evaluated. Results: The magnetic field strengths could be optimized by using Matlab and transferred to the Monte-Carlo code FLUKA. The implementation via a user-routine was successful. Analyzing the fluence-pattern along the beam-axis the characteristic focusing and de-focusing effects of the quadrupole magnets could be reproduced. Furthermore the beam spot at the iso-center was circular and significantly thinner compared to an unfocused beam. Conclusion: In this study a Matlab tool was developed to optimize magnetic field strengths for an ion-optic system consisting of two quadrupole magnets as part of a particle therapy facility. These magnetic field strengths could subsequently be transferred to and implemented in the Monte-Carlo code FLUKA to simulate the particle transport through this optimized ion-optic system

  11. Value is in the eye of the beholder: early visual cortex codes monetary value of objects during a diverted attention task.

    Science.gov (United States)

    Persichetti, Andrew S; Aguirre, Geoffrey K; Thompson-Schill, Sharon L

    2015-05-01

    A central concern in the study of learning and decision-making is the identification of neural signals associated with the values of choice alternatives. An important factor in understanding the neural correlates of value is the representation of the object itself, separate from the act of choosing. Is it the case that the representation of an object within visual areas will change if it is associated with a particular value? We used fMRI adaptation to measure the neural similarity of a set of novel objects before and after participants learned to associate monetary values with the objects. We used a range of both positive and negative values to allow us to distinguish effects of behavioral salience (i.e., large vs. small values) from effects of valence (i.e., positive vs. negative values). During the scanning session, participants made a perceptual judgment unrelated to value. Crucially, the similarity of the visual features of any pair of objects did not predict the similarity of their value, so we could distinguish adaptation effects due to each dimension of similarity. Within early visual areas, we found that value similarity modulated the neural response to the objects after training. These results show that an abstract dimension, in this case, monetary value, modulates neural response to an object in visual areas of the brain even when attention is diverted.

  12. Software testing and source code for the calculation of clearance values. Final report; Erprobung von Software und Quellcode zur Berechnung von Freigabewerten. Abschlussbericht

    Energy Technology Data Exchange (ETDEWEB)

    Artmann, Andreas; Meyering, Henrich

    2016-11-15

    The GRS research project was aimed to the test the appropriateness of the software package ''residual radioactivity'' (RESRAD) for the calculation of clearance values according to German and European regulations. Comparative evaluations were performed with RESRAD-OFFSITE and the code SiWa-PRO DSS used by GRS and the GRS program code ARTM. It is recommended to use RESRAD-OFFSITE for comparative calculations. The dose relevant air-path dispersion of radionuclides should not be modeled using RESRAD-OFFSITE, the use of ARTM is recommended. The sensitivity analysis integrated into RESRAD-OFFSITE allows a fast identification of crucial parameters.

  13. Effect of process variables on the calorific value and compressive strength of the briquettes made from high moisture Empty Fruit Bunches (EFB)

    Science.gov (United States)

    Helwani, Z.; Fatra, W.; Arifin, L.; Othman, M. R.; Syapsan

    2018-04-01

    In this study, the manual hydraulic press was designed to prepare the briquettes from selected biomass waste. Each biomass was sun-dried and milled into small particle sizes before mixing with crude glycerol that used as a biomass binder. The effects of applied pressure levels of 100, 110, 120 bars, the particle size of 60, 80 and 100 mesh and the binder composition on the density, compressive strength and calorific heating value of the prepared briquettes were investigated using response surface methodology (RSM). Results showed that the briquettes have an average inside diameter, average outside diameter, and height of 12, 38, and 25-30 mm, respectively. The density of the briquettes increased with increasing the applied pressure, was in the range of 623-923 kg/m3. The densest briquettes were obtained at 80 mesh of particle size, 53:47 binder composition ratio and 110 bars of pressurizing. The heating value of the briquette reached up to 28.99 MJ/kg obtained on the particle size of 80 mesh, 53:47 binder composition, and 110 bars and the best compressive strength of 6.991 kg/cm2 obtained at a particle size of 100 mesh, 60:40 binder composition, and 120 bars. Process conditions influence the calorific value significantly.

  14. Positive predictive values of the International Classification of Disease, 10th edition diagnoses codes for diverticular disease in the Danish National Registry of Patients

    Directory of Open Access Journals (Sweden)

    Rune Erichsen

    2010-10-01

    Full Text Available Rune Erichsen1, Lisa Strate2, Henrik Toft Sørensen1, John A Baron31Department of Clinical Epidemiology, Aarhus University Hospital, Denmark; 2Division of Gastroenterology, University of Washington, Seattle, WA, USA; 3Departments of Medicine and of Community and Family Medicine, Dartmouth Medical School, NH, USAObjective: To investigate the accuracy of diagnostic coding for diverticular disease in the Danish National Registry of Patients (NRP.Study design and setting: At Aalborg Hospital, Denmark, with a catchment area of 640,000 inhabitants, we identified 100 patients recorded in the NRP with a diagnosis of diverticular disease (International Classification of Disease codes, 10th revision [ICD-10] K572–K579 during the 1999–2008 period. We assessed the positive predictive value (PPV as a measure of the accuracy of discharge codes for diverticular disease using information from discharge abstracts and outpatient notes as the reference standard.Results: Of the 100 patients coded with diverticular disease, 49 had complicated diverticular disease, whereas 51 had uncomplicated diverticulosis. For the overall diagnosis of diverticular disease (K57, the PPV was 0.98 (95% confidence intervals [CIs]: 0.93, 0.99. For the more detailed subgroups of diagnosis indicating the presence or absence of complications (K573–K579 the PPVs ranged from 0.67 (95% CI: 0.09, 0.99 to 0.92 (95% CI: 0.52, 1.00. The diagnosis codes did not allow accurate identification of uncomplicated disease or any specific complication. However, the combined ICD-10 codes K572, K574, and K578 had a PPV of 0.91 (95% CI: 0.71, 0.99 for any complication.Conclusion: The diagnosis codes in the NRP can be used to identify patients with diverticular disease in general; however, they do not accurately discern patients with uncomplicated diverticulosis or with specific diverticular complications.Keywords: diverticulum, colon, diverticulitis, validation studies

  15. Weighted f-values, A-values, and line strengths for the E1 transitions among 3d6, 3d54s, and 3d54p levels of Fe III

    International Nuclear Information System (INIS)

    Deb, Narayan C.; Hibbert, Alan

    2009-01-01

    Weighted oscillator strengths, weighted radiative rates, and line strengths for all the E1 transitions between 285 fine-structure levels belonging to the 3d 6 , 3d 5 4s, and 3d 5 4p configurations of Fe III are presented, in ascending order of wavelength. Calculations have been undertaken using the general configuration interaction (CI) code CIV3. The large configuration set is constructed by allowing single and double replacements from any of 3d 6 , 3d 5 4s, 3d 5 4p, and 3d 5 4d configurations to nl orbitals with n≤5,l≤3 as well as 6p. Additional selective promotions from 3s and 3p subshells are also included in the CI expansions to incorporate the important correlation effects in the n=3 shell. Results of some strong transitions between levels of 3d 6 , 3d 5 4s, and 3d 5 4p configurations are also presented and compared with other available calculations. It is found that large disagreements occur in many transitions among the existing calculations

  16. The persuasive strength of values, reputation, and interest arguments for promoting ethical behavior in a global corporate setting

    DEFF Research Database (Denmark)

    Trapp, Leila

    2010-01-01

    This paper examines survey results regarding staff evaluations of various company-issued arguments used to promote ethical behavior in a global corporate setting. The aim of this is to question the appropriateness of approaching business ethics communication from within a corporate communication...... or intercultural management framework. Indeed, the normative stances of these two frameworks are seen to differ with regard to how global companies should communicate with a culturally diverse staff. Staff responses from the Denmark, Sweden, Brazil, and USA affiliates of the global healthcare company, Novo Nordisk......, reveal that although there are some important differences between affiliates, there is also an impressive degree of agreement that corporate identity, values, and reputation are important sources of motivation for ethical behavior. These findings provide practical guidance for the development...

  17. MICROTOUGH - calculation of characteristic upper shelf fracture toughness values from microstructural parameters for high strength structural steels with normalized or quenched and tempered microstructure

    International Nuclear Information System (INIS)

    Muenstermann, S.; Dahl, W.; Langenberg, P.; Deimel, P.; Sattler, E.

    2004-01-01

    In modern applications, high strength steels are often utilised to increase the load bearing capacity of components. For safe design it is also necessary that these steels have an adequate fracture toughness. The mechanical properties of high strength structural steels are a result of the production process. In consequence, they are strongly related to the microstructure. Therefore, the aim of the research work in the Microtough project is to develop and apply a new method of quantitative correlation between microstructural parameters and characteristic fracture toughness values. This correlation will on the one hand help for the design of new structural steels with high toughness. On the other hand, it shall allow to characterise the fracture toughness of steel without performing expensive fracture mechanics tests. The research work is carried out in the full temperature range from lower to upper shelf. As both RWTH Aachen University and MPA Uni Stuttgart concentrate on ductile fracture behaviour in their research work, the focus of the presentation lies in the upper shelf. (orig.)

  18. Separate mechanisms for magnitude and order processing in the spatial-numerical association of response codes (SNARC) effect: The strange case of musical note values.

    Science.gov (United States)

    Prpic, Valter; Fumarola, Antonia; De Tommaso, Matteo; Luccio, Riccardo; Murgia, Mauro; Agostini, Tiziano

    2016-08-01

    The spatial-numerical association of response codes (SNARC) effect is considered an evidence of the association between numbers and space, with faster left key-press responses to small numbers and faster right key-press responses to large numbers. We examined whether visually presented note values produce a SNARC-like effect. Differently from numbers, note values are represented as a decreasing left-to-right progression, allowing us to disambiguate the contribution of order and magnitude in determining the direction of the effect. Musicians with formal education performed a note value comparison in Experiment 1 (direct task), a line orientation judgment in Experiment 2 (indirect task), and a detection task in Experiment 3 (indirect task). When note values were task relevant (direct task), participants responded faster to large note values with the left key-press, and vice versa. Conversely, when note values were task irrelevant (indirect tasks), the direction of this association was reversed. This evidence suggests the existence of separate mechanisms underlying the SNARC effect. Namely, an Order-Related Mechanism (ORM) and a Magnitude-Related Mechanism (MRM) that are revealed by different task demands. Indeed, according to a new model we proposed, ordinal and magnitude related information appears to be preferentially involved in direct and indirect tasks, respectively. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  19. Predictive values of diagnostic codes for identifying serious hypocalcemia and dermatologic adverse events among women with postmenopausal osteoporosis in a commercial health plan database.

    Science.gov (United States)

    Wang, Florence T; Xue, Fei; Ding, Yan; Ng, Eva; Critchlow, Cathy W; Dore, David D

    2018-04-10

    Post-marketing safety studies of medicines often rely on administrative claims databases to identify adverse outcomes following drug exposure. Valid ascertainment of outcomes is essential for accurate results. We aim to quantify the validity of diagnostic codes for serious hypocalcemia and dermatologic adverse events from insurance claims data among women with postmenopausal osteoporosis (PMO). We identified potential cases of serious hypocalcemia and dermatologic events through ICD-9 diagnosis codes among women with PMO within claims from a large US healthcare insurer (June 2005-May 2010). A physician adjudicated potential hypocalcemic and dermatologic events identified from the primary position on emergency department (ED) or inpatient claims through medical record review. Positive predictive values (PPVs) and 95% confidence intervals (CIs) quantified the fraction of potential cases that were confirmed. Among 165,729 patients with PMO, medical charts were obtained for 40 of 55 (73%) potential hypocalcemia cases; 16 were confirmed (PPV 40%, 95% CI 25-57%). The PPV was higher for ED than inpatient claims (82 vs. 24%). Among 265 potential dermatologic events (primarily urticaria or rash), we obtained 184 (69%) charts and confirmed 128 (PPV 70%, 95% CI 62-76%). The PPV was higher for ED than inpatient claims (77 vs. 39%). Diagnostic codes for hypocalcemia and dermatologic events may be sufficient to identify events giving rise to emergency care, but are less accurate for identifying events within hospitalizations.

  20. The diagnostic value of long non-coding RNA MIR31HG and its role in esophageal squamous cell carcinoma.

    Science.gov (United States)

    Sun, Kaiyan; Zhao, Xinwei; Wan, Junhu; Yang, Lijun; Chu, Jie; Dong, Shuling; Yin, Huiqing; Ming, Liang; He, Fucheng

    2018-06-01

    This study aimed to assess plasma lncRNA microRNA-31 hist gene (MIR31HG) as a novel diagnostic and therapeutic biomarker for esophageal squamous cell carcinoma (ESCC) and to investigate its role in ESCC. The expression of MIR31HG, Furin and MMP1 was examined via quantitative real-time polymerase chain reaction. MIR31HG expression between plasma and ESCC tissues was compared using Pearson correlation analysis; furthermore, the association between Furin/MMP1 levels and MIR31HG levels in ESCC tissues was analyzed. Receiver operating characteristic (ROC) curve analysis was performed to evaluate the diagnostic value of plasma MIR31HG. A WST-1 assay was performed to assess cell proliferation. The migratability and invasiveness of cells was determined via Transwell assays. MIR31HG was significantly upregulated in ESCC tissues and plasma (P occurance. Furthermore, knockdown of MIR31HG suppressed the capacity for proliferation, migration, and invasion of ESCC cells (P < 0.01). In addition, silencing of MIR31HG inhibited the expression of Furin and MMP1 in EC9706 and EC1 and the level of Furin/MMP1 in ESCC tissues displayed a significant positive correlation with MIR31HG (P < 0.01). MIR31HG can be used as a novel potential diagnostic biomarker and a potential therapeutic target for ESCC. Copyright © 2018 Elsevier Inc. All rights reserved.

  1. Relationship between various pressure vessel and piping codes

    International Nuclear Information System (INIS)

    Canonico, D.A.

    1976-01-01

    Section VIII of the ASME Code provides stress allowable values for material specifications that are provided in Section II Parts A and B. Since the adoption of the ASME Code over 60 years ago the incidence of failure has been greatly reduced. The Codes are currently based on strength criteria and advancements in the technology of fracture toughness and fracture mechanics should permit an even greater degree of reliability and safety. This lecture discusses the various Sections of the Code. It describes the basis for the establishment of design stress allowables and promotes the idea of the use of fracture mechanics

  2. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  3. Values and ethical principles for practicing as magistrate/ legal advisor out of the perspective of the codes and national and international statements of principles

    Directory of Open Access Journals (Sweden)

    Marţian Iovan

    2016-10-01

    Full Text Available The coordinating and regulating role of the moral values, of the Deontological Code in practicing the magistrate/ legal advisor position is analysed in this article, so that their decisions correspond the universal imperative of practical accomplishment of justice, implicitly to the audience’s expectations with regard to the efficiency and efficacy of the services delivered by the institutions in the judicial system. The subject is of obvious actuality, fact which results in the existence of a relevant number of cases of violation, deforming of the ethical principles, of the specific deontological norms for the legal advisors, especially for the magistrates, which occur in performing the act of justice. The author highlights through examples, the harmful effects of some magistrates’ side-slipping from the ethical principles (Independence, Impartiality, Integrity stipulated in the most important deontological codes, statements of principles or national and international conventions. The logical conclusion, resulting from the analyses, aims to perfection the judicial system, the moral part of the legal higher education, of the magistrates’ continuous training and assessment.

  4. Positive predictive value between medical-chart body-mass-index category and obesity versus codes in a claims-data warehouse.

    Science.gov (United States)

    Caplan, Eleanor O; Kamble, Pravin S; Harvey, Raymond A; Smolarz, B Gabriel; Renda, Andrew; Bouchard, Jonathan R; Huang, Joanna C

    2018-01-01

    To evaluate the positive predictive value of claims-based V85 codes for identifying individuals with varying degrees of BMI relative to their measured BMI obtained from medical record abstraction. This was a retrospective validation study utilizing administrative claims and medical chart data from 1 January 2009 to 31 August 2015. Randomly selected samples of patients enrolled in a Medicare Advantage Prescription Drug (MAPD) or commercial health plan and with a V85 claim were identified. The claims-based BMI category (underweight, normal weight, overweight, obese class I-III) was determined via corresponding V85 codes and compared to the BMI category derived from chart abstracted height, weight and/or BMI. The positive predictive values (PPVs) of the claims-based BMI categories were calculated with the corresponding 95% confidence intervals (CIs). The overall PPVs (95% CIs) in the MAPD and commercial samples were 90.3% (86.3%-94.4%) and 91.1% (87.3%-94.9%), respectively. In each BMI category, the PPVs (95% CIs) for the MAPD and commercial samples, respectively, were: underweight, 71.0% (55.0%-87.0%) and 75.9% (60.3%-91.4%); normal, 93.8% (85.4%-100%) and 87.8% (77.8%-97.8%); overweight, 97.4% (92.5%-100%) and 93.5% (84.9%-100%); obese class I, 96.9 (90.9%-100%) and 97.2% (91.9%-100%); obese class II, 97.0% (91.1%-100%) and 93.0% (85.4%-100%); and obese class III, 85.0% (73.3%-96.1%) and 97.1% (91.4%-100%). BMI categories derived from administrative claims, when available, can be used successfully particularly in the context of obesity research.

  5. Attitude Strength.

    Science.gov (United States)

    Howe, Lauren C; Krosnick, Jon A

    2017-01-03

    Attitude strength has been the focus of a huge volume of research in psychology and related sciences for decades. The insights offered by this literature have tremendous value for understanding attitude functioning and structure and for the effective application of the attitude concept in applied settings. This is the first Annual Review of Psychology article on the topic, and it offers a review of theory and evidence regarding one of the most researched strength-related attitude features: attitude importance. Personal importance is attached to an attitude when the attitude is perceived to be relevant to self-interest, social identification with reference groups or reference individuals, and values. Attaching personal importance to an attitude causes crystallizing of attitudes (via enhanced resistance to change), effortful gathering and processing of relevant information, accumulation of a large store of well-organized relevant information in long-term memory, enhanced attitude extremity and accessibility, enhanced attitude impact on the regulation of interpersonal attraction, energizing of emotional reactions, and enhanced impact of attitudes on behavioral intentions and action. Thus, important attitudes are real and consequential psychological forces, and their study offers opportunities for addressing behavioral change.

  6. Experimental Investigation on Embedding Strength Perpendicular to Grain of Parallel Strand Bamboo

    Directory of Open Access Journals (Sweden)

    Junwen Zhou

    2018-01-01

    Full Text Available Parallel strand bamboo (PSB is a latest construction material; to know more about mechanical properties of PSB, 5 groups of specimens with difference only in bolt diameter were designed to study the impact of the fastener diameter on embedding strength perpendicular to grain of PSB. Based on the tested result, the feasibility for PSB of the theoretical equation in the American code and European code on embedding strength predication was assessed. A controlled displacement was used to load till specimen failure, the stress-displacement curve of all specimens was obtained in terms of the tested results, and the yielding tested strength based on 5% bolt diameter offset proposed by the American code was found. The tested results showed that the yielding strength perpendicular to grain of PSB was stable, the variable coefficient was between 5.88% and 13.34%, and the average yielding strength values were 80.84 MPa, 77.40 MPa, 76.52 MPa, 74.20 MPa, and 67.01 MPa, respectively, which decreased with the increase of bolt diameter, and the average yielding strength values are larger than the calculated results using theoretical formula. Therefore, the theoretical equation on embedding yielding strength of wood in the American code and European code applies to PSB.

  7. The workers opinions have a value in the Code of Ethics: Analysis of the contributions of workers in virtual Forum Catalan Institute of Health.

    Science.gov (United States)

    Peguero, Eva; Berenguera, Anna; Pujol-Ribera, Enriqueta; Roman, Begoña; Prieto, Carmen M; Terribas, Núria

    2015-12-23

    The Catalan Institute of Health (CIH) is the largest health services public provider in Catalonia. "CIH Code of Ethics Virtual Forum" (CEVF), was created within the Intranet of the CIH to facilitate participation among their employees. The current study aims to: a) Analyse the CIH workers' assessment of their own, their colleagues' and the organization's observance of ethical values; b) Identify the opinions, attitudes, experiences and practices related to the ethical values from the discourse of the workers that contributed voluntarily to the CEVF. Mixed methods study with convergent parallel design: 1. Cross sectional study by means of a self-administered, ad hoc, anonymous questionnaire to assess the observance of the ethical values of the CIH according to the participants. A total of 712 workers responded to the questionnaire. A descriptive, bivariate analysis of the results was carried out. 2. Qualitative study to determine the meaning for the workers of the ethical values put forward by the organization. Their individual opinions and experiences were explored by means of a thematic contents analysis of 225 comments posted in the CEVF. The study was conducted between May and December 2008. The average score for observance of the CE by the respondents themselves was high (over 4/5), between 3.5-4/5 for the observance by their colleagues and close to 3/5 for the CIH management. These results do not change when we compare by gender, age group and professional discipline. The comments on the values are information-rich, they mirror the ethical environment of the institution and show various ethical dilemmas and suggestions. Results show that it is feasible for a publicly funded health care organization to develop a CE with the participation of employees and the support of the management. Results underscore the relevance of this strategy for the implementation, improvement and update of the CE as a responsibility shared by all workers. Practices consistent with

  8. Code Cactus; Code Cactus

    Energy Technology Data Exchange (ETDEWEB)

    Fajeau, M; Nguyen, L T; Saunier, J [Commissariat a l' Energie Atomique, Centre d' Etudes Nucleaires de Saclay, 91 - Gif-sur-Yvette (France)

    1966-09-01

    This code handles the following problems: -1) Analysis of thermal experiments on a water loop at high or low pressure; steady state or transient behavior; -2) Analysis of thermal and hydrodynamic behavior of water-cooled and moderated reactors, at either high or low pressure, with boiling permitted; fuel elements are assumed to be flat plates: - Flowrate in parallel channels coupled or not by conduction across plates, with conditions of pressure drops or flowrate, variable or not with respect to time is given; the power can be coupled to reactor kinetics calculation or supplied by the code user. The code, containing a schematic representation of safety rod behavior, is a one dimensional, multi-channel code, and has as its complement (FLID), a one-channel, two-dimensional code. (authors) [French] Ce code permet de traiter les problemes ci-dessous: 1. Depouillement d'essais thermiques sur boucle a eau, haute ou basse pression, en regime permanent ou transitoire; 2. Etudes thermiques et hydrauliques de reacteurs a eau, a plaques, a haute ou basse pression, ebullition permise: - repartition entre canaux paralleles, couples on non par conduction a travers plaques, pour des conditions de debit ou de pertes de charge imposees, variables ou non dans le temps; - la puissance peut etre couplee a la neutronique et une representation schematique des actions de securite est prevue. Ce code (Cactus) a une dimension d'espace et plusieurs canaux, a pour complement Flid qui traite l'etude d'un seul canal a deux dimensions. (auteurs)

  9. Comparison of 2015 Medicare relative value units for gender-specific procedures: Gynecologic and gynecologic-oncologic versus urologic CPT coding. Has time healed gender-worth?

    Science.gov (United States)

    Benoit, M F; Ma, J F; Upperman, B A

    2017-02-01

    In 1992, Congress implemented a relative value unit (RVU) payment system to set reimbursement for all procedures covered by Medicare. In 1997, data supported that a significant gender bias existed in reimbursement for gynecologic compared to urologic procedures. The present study was performed to compare work and total RVU's for gender specific procedures effective January 2015 and to evaluate if time has healed the gender-based RVU worth. Using the 2015 CPT codes, we compared work and total RVU's for 50 pairs of gender specific procedures. We also evaluated 2015 procedure related provider compensation. The groups were matched so that the procedures were anatomically similar. We also compared 2015 to 1997 RVU and fee schedules. Evaluation of work RVU's for the paired procedures revealed that in 36 cases (72%), male vs female procedures had a higher wRVU and tRVU. For total fee/reimbursement, 42 (84%) male based procedures were compensated at a higher rate than the paired female procedures. On average, male specific surgeries were reimbursed at an amount that was 27.67% higher for male procedures than for female-specific surgeries. Female procedure based work RVU's have increased minimally from 1997 to 2015. Time and effort have trended towards resolution of some gender-related procedure worth discrepancies but there are still significant RVU and compensation differences that should be further reviewed and modified as surgical time and effort highly correlate. Copyright © 2016. Published by Elsevier Inc.

  10. The theoretical tensile strength of fcc crystals predicted from shear strength calculations

    International Nuclear Information System (INIS)

    Cerny, M; Pokluda, J

    2009-01-01

    This work presents a simple way of estimating uniaxial tensile strength on the basis of theoretical shear strength calculations, taking into account its dependence on a superimposed normal stress. The presented procedure enables us to avoid complicated and time-consuming analyses of elastic stability of crystals under tensile loading. The atomistic simulations of coupled shear and tensile deformations in cubic crystals are performed using first principles computational code based on pseudo-potentials and the plane wave basis set. Six fcc crystals are subjected to shear deformations in convenient slip systems and a special relaxation procedure controls the stress tensor. The obtained dependence of the ideal shear strength on the normal tensile stress seems to be almost linearly decreasing for all investigated crystals. Taking these results into account, the uniaxial tensile strength values in three crystallographic directions were evaluated by assuming a collapse of the weakest shear system. Calculated strengths for and loading were found to be mostly lower than previously calculated stresses related to tensile instability but rather close to those obtained by means of the shear instability analysis. On the other hand, the strengths for loading almost match the stresses related to tensile instability.

  11. The association between patient attitudes and values and the strength of consideration for contralateral prophylactic mastectomy in a population-based sample of breast cancer patients.

    Science.gov (United States)

    Hawley, Sarah T; Griffith, Kent A; Hamilton, Ann S; Ward, Kevin C; Morrow, Monica; Janz, Nancy K; Katz, Steven J; Jagsi, Reshma

    2017-12-01

    Little is known about how the individual decision styles and values of breast cancer patients at the time of treatment decision making are associated with the consideration of different treatment options and specifically with the consideration of contralateral prophylactic mastectomy (CPM). Newly diagnosed patients with early-stage breast cancer who were treated in 2013-2014 were identified through the Surveillance, Epidemiology, and End Results registries of Los Angeles and Georgia and were surveyed approximately 7 months after surgery (n = 2578; response rate, 71%). The primary outcome was the consideration of CPM (strong vs less strong). The association between patients' values and decision styles and strong consideration was assessed with multivariate logistic regression. Approximately one-quarter of women (25%) reported strong/very strong consideration of CPM, and another 29% considered it moderately/weakly. Decision styles, including a rational-intuitive approach to decision making, varied. The factors most valued by women at the time of treatment decision making were as follows: avoiding worry about recurrence (82%) and reducing the need for more surgery (73%). In a multivariate analysis, patients who preferred to make their own decisions, those who valued avoiding worry about recurrence, and those who valued avoiding radiation significantly more often strongly considered CPM (P decision styles and values. The variability in decision styles and values observed in this study suggests that formally evaluating these characteristics at or before the initial treatment encounter could provide an opportunity for improving patient clinician discussions. Cancer 2017;123:4547-4555. © 2017 American Cancer Society. © 2017 American Cancer Society.

  12. COLLISION STRENGTHS AND EFFECTIVE COLLISION STRENGTHS FOR TRANSITIONS WITHIN THE GROUND-STATE CONFIGURATION OF S III

    Energy Technology Data Exchange (ETDEWEB)

    Hudson, C. E.; Ramsbottom, C. A.; Scott, M. P., E-mail: c.hudson@qub.ac.uk, E-mail: c.ramsbottom@qub.ac.uk, E-mail: p.scott@qub.ac.uk [Department of Applied Maths and Theoretical Physics, The Queen' s University of Belfast, Belfast BT7 1NN (United Kingdom)

    2012-05-01

    We have carried out a 29-state R-matrix calculation in order to calculate collision strengths and effective collision strengths for the electron impact excitation of S III. The recently developed parallel RMATRX II suite of codes have been used, which perform the calculation in intermediate coupling. Collision strengths have been generated over an electron energy range of 0-12 Ryd, and effective collision strength data have been calculated from these at electron temperatures in the range 1000-100,000 K. Results are here presented for the fine-structure transitions between the ground-state configurations of 3s {sup 2}3p {sup 23} P{sub 0,1,2}, {sup 1}D{sub 2}, and {sup 1} S{sub 0}, and the values given resolve a discrepancy between two previous R-matrix calculations.

  13. Strengths only or strengths and relative weaknesses? A preliminary study.

    Science.gov (United States)

    Rust, Teri; Diessner, Rhett; Reade, Lindsay

    2009-10-01

    Does working on developing character strengths and relative character weaknesses cause lower life satisfaction than working on developing character strengths only? The present study provides a preliminary answer. After 76 college students completed the Values in Action Inventory of Strengths (C. Peterson & M. E. P. Seligman, 2004), the authors randomly assigned them to work on 2 character strengths or on 1 character strength and 1 relative weakness. Combined, these groups showed significant gains on the Satisfaction With Life Scale (E. Diener, R. A. Emmons, R. J. Larsen, & S. Griffin, 1985), compared with a 32-student no-treatment group. However, there was no significant difference in gain scores between the 2-strengths group and the 1-character-strength-and-1-relative-character-weakness group. The authors discuss how focusing on relative character weaknesses (along with strengths) does not diminish-and may assist in increasing-life satisfaction.

  14. Biological variation, reference change value (RCV) and minimal important difference (MID) of inspiratory muscle strength (PImax) in patients with stable chronic heart failure.

    Science.gov (United States)

    Täger, Tobias; Schell, Miriam; Cebola, Rita; Fröhlich, Hanna; Dösch, Andreas; Franke, Jennifer; Katus, Hugo A; Wians, Frank H; Frankenstein, Lutz

    2015-10-01

    Despite the widespread application of measurements of respiratory muscle force (PImax) in clinical trials there is no data on biological variation, reference change value (RCV), or the minimal important difference (MID) for PImax irrespective of the target cohort. We addressed this issue for patients with chronic stable heart failure. From the outpatients' clinic of the University of Heidelberg we retrospectively selected three groups of patients with stable systolic chronic heart failure (CHF). Each group had two measurements of PImax: 90 days apart in Group A (n = 25), 180 days apart in Group B (n = 93), and 365 days apart in Group C (n = 184). Stability was defined as (a) no change in NYHA class between visits and (b) absence of cardiac decompensation 3 months prior, during, and 3 months after measurements. For each group, we determined within-subject (CVI), between-subject (CVG), and total (CVT) coefficient of variation (CV), the index of individuality (II), RCV, reliability coefficient, and MID of PImax. CVT was 8.7, 7.5, and 6.9 % for groups A, B, and C, respectively. The II and RCV were 0.21, 0.20, 0.16 and 13.6, 11.6, 10.8 %, respectively. The reliability coefficient and MID were 0.83, 0.87, 0.88 and 1.44, 1.06, 1.12 kPa, respectively. Results were similar between age, gender, and aetiology subgroups. In patients with stable CHF, measurements of PImax are highly stable for intervals up to 1 year. The low values for II suggest that evaluation of change in PImax should be performed on an individual (per patient) basis. Individually significant change can be assumed beyond 14 % (RCV) or 1.12 kPa (MID).

  15. Validity, prognostic value and optimal cutoff of respiratory muscle strength in patients with chronic heart failure changes with beta-blocker treatment.

    Science.gov (United States)

    Frankenstein, Lutz; Nelles, Manfred; Meyer, F Joachim; Sigg, Caroline; Schellberg, Dieter; Remppis, B Andrew; Katus, Hugo A; Zugck, Christian

    2009-08-01

    Training studies frequently use maximum inspiratory mouth occlusion pressure (PImax) as a therapeutic target and surrogate marker. For patients on beta-blocker (BBL), prognostic data allowing this extrapolation do not exist. Furthermore, the effects of BBL, mainstay of modern chronic heart failure therapy, on respiratory muscle function remain controversial. Finally, no proper separate cutoff according to treatment exists. Prospective, observational inclusion of patients with stable systolic chronic heart failure and recording of 1 year and all-time mortality for endpoint analysis. In 686 patients, 81% men, 494 patients on BBL, PImax was measured along with clinical evaluation. The median follow-up was 50 months (interquartile range: 26-75 months). Patients with or without BBL did not differ significantly for PImax, percentage of predicted PImax or other marker of disease severity. PImax was a significant (hazard ratio: 0.925; 95% confidence interval: 0.879-0.975; chi(2): 8.62) marker of adverse outcome, independent of BBL-status or aetiology. Percentage of predicted PImax was not independent of PImax. The cutoff identified through receiver-operated characteristics for 1-year mortality was 4.14 kPa for patients on BBL and 7.29 kPa for patients not on BBL. When separated accordingly, 1-year mortality was 8.5 versus 21.4%, P=0.02, for patients not on BBL and 4.3 versus 16.2%, P<0.001, for patients on BBL. This study fills the gap between trials targeting respiratory muscle on a functional basis and the resultant prognostic information with regard to BBL. BBL lowered the optimal PImax cutoff values for risk stratification without changing the measured values of PImax. This should be considered at inclusion and evaluation of trials and interpretation of exercise parameters.

  16. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  17. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  18. Tensile strength/yield strength (TS/YS) ratios of high-strength steel (HSS) reinforcing bars

    Science.gov (United States)

    Tavio, Anggraini, Retno; Raka, I. Gede Putu; Agustiar

    2018-05-01

    The building codes such as American Concrete Institute (ACI) 318M-14 and Standard National Indonesia (SNI) 2847:2013 require that the ratio of tensile strength (TS) and yield strength (YS) should not less than 1.25. The requirement is based on the assumption that a capability of a structural member to develop inelastic rotation capacity is a function of the length of the yield region. This paper reports an investigation on various steel grades, namely Grades 420, 550, 650, and 700 MPa, to examine the impact of different TS/YS ratios if it is less or greater than the required value. Grades 550, 650, and 700 MPa were purposely selected with the intention to examine if these higher grades are still promising to be implemented in special structural systems since they are prohibited by the building codes for longitudinal reinforcement, whereas Grade 420 MPa bars are the maximum limit of yield strength of reinforcing bars that is allowable for longitudinal reinforcement of special structural systems. Tensile tests of these steel samples were conducted under displacement controlled mode to capture the complete stress-strain curves and particularly the post-yield response of the steel bars. From the study, it can be concluded that Grade 420 performed higher TS/YS ratios and they were able to reach up to more than 1.25. However, the High Strength Still (HSS) bars (Grades 550, 600, and 700 MPa) resulted in lower TS/YS ratios (less than 1.25) compared with those of Grade 420 MPa.

  19. Coding for urologic office procedures.

    Science.gov (United States)

    Dowling, Robert A; Painter, Mark

    2013-11-01

    This article summarizes current best practices for documenting, coding, and billing common office-based urologic procedures. Topics covered include general principles, basic and advanced urologic coding, creation of medical records that support compliant coding practices, bundled codes and unbundling, global periods, modifiers for procedure codes, when to bill for evaluation and management services during the same visit, coding for supplies, and laboratory and radiology procedures pertinent to urology practice. Detailed information is included for the most common urology office procedures, and suggested resources and references are provided. This information is of value to physicians, office managers, and their coding staff. Copyright © 2013 Elsevier Inc. All rights reserved.

  20. [Clinical values of hemodynamics assessment by parametric color coding of digital subtraction angiography before and after endovascular therapy for critical limb ischaemia].

    Science.gov (United States)

    Su, Haobo; Lou, Wensheng; Gu, Jianping

    2015-10-06

    To investigate the feasibility of parametric color coding of digital subtraction angiography (Syngo iFlow) for hemodynamics assessment in patients with critical limb ischemia in pre- and post-endovascular therapy. To explore the correlation between Syngo iFlow and the conventional techniques. from January 2013 to December 2014, Clinical data of 21 patients with TASC II type B and type C femoropopliteal arteriosclerotic occlusive disease who were treated by percutaneous transluminal angioplasty and/or primary stent implantation in Nanjing first hospital were analyzed retrospectively. Of these patients there were 10 males and 11 females with an average age of (72±6) years (range from 58-85 years). The treatment efficacy was assessed by the variation of a series of clinical symptoms indexes (such as pain score, cold sensation score and intermittent claudication score), ankle braehial index (ABI) and transcutaneous oxygen pressure (TcPO2). Angiography was performed with the same protocol before and after treatment and parametric color coding of digital subtraction angiography was created by Syngo iFlow software on a dedicated workstation. The time to peak (TTP) of artery and tissue perfusion selected at the same regions of foot and ankle were measured and analyzed to evaluate the improvement of microcirculation and hemodynamics of the ischemic limb. The correlations between Syngo iFlow and the traditional clinical evaluation methods were explored using the Spearman rank correlation test. All patients (21 limbs) underwent successful endovaseular therapy. The mean pain score, cold sensation score, intermittent claudication score, ABI and TcPO2 before treatment were (0.48±0.68), (2.71±0.72), (2.86±0.85), ABI (0.33±0.07), TcPO2 (26.83±3.41) mmHg. While 1 week after treatment all above indicators were (2.57±0.93), (0.33±0.48), (0.90±0.54), (0.69±0.11), TcPO2 (53.75±3.60) mmHg respectively. There were significant statistical differences between pre- and post

  1. Multiple component codes based generalized LDPC codes for high-speed optical transport.

    Science.gov (United States)

    Djordjevic, Ivan B; Wang, Ting

    2014-07-14

    A class of generalized low-density parity-check (GLDPC) codes suitable for optical communications is proposed, which consists of multiple local codes. It is shown that Hamming, BCH, and Reed-Muller codes can be used as local codes, and that the maximum a posteriori probability (MAP) decoding of these local codes by Ashikhmin-Lytsin algorithm is feasible in terms of complexity and performance. We demonstrate that record coding gains can be obtained from properly designed GLDPC codes, derived from multiple component codes. We then show that several recently proposed classes of LDPC codes such as convolutional and spatially-coupled codes can be described using the concept of GLDPC coding, which indicates that the GLDPC coding can be used as a unified platform for advanced FEC enabling ultra-high speed optical transport. The proposed class of GLDPC codes is also suitable for code-rate adaption, to adjust the error correction strength depending on the optical channel conditions.

  2. Improvement the value of sodium void reactivity effect of the fast neutron reactor by the instrumentality of the Monte Carlo code

    OpenAIRE

    P.A. Maslov; V.I. Matveev; I.V. Malysheva

    2015-01-01

    To fulfill safety of fast sodium reactors in a beyond design-basis accident (BDBA) like unprotected loss of flow accident (ULOF), the sodium void reactivity effect (SVRE) should be close to zero. Its value depends on the fuel burnup – the higher burnup the higher value of SVRE. We analyze limitation of the fuel burnup in the core of a large sodium reactor imposed by SVRE. The model of a large sodium-cooled reactor core is chosen for analysis. Two fuel types are considered – MOX and nitride...

  3. Reliability-Based Approach for the Determination of the Required Compressive Strength of Concrete in Mix Design

    OpenAIRE

    Okasha , Nader M

    2017-01-01

    International audience; Concrete is recognized as the second most consumed product in our modern life after water. The variability in concrete properties is inevitable. The concrete mix is designed for a compressive strength that is different from, typically higher than, the value specified by the structural designer. Ways to calculate the compressive strength to be used in the mix design are provided in building and structural codes. These ways are all based on criteria related purely and on...

  4. Efficient Coding of Information: Huffman Coding -RE ...

    Indian Academy of Sciences (India)

    to a stream of equally-likely symbols so as to recover the original stream in the event of errors. The for- ... The source-coding problem is one of finding a mapping from U to a ... probability that the random variable X takes the value x written as ...

  5. Minimum critical values of uranyl and plutonium nitrate solutions calculated by various routes of the french criticality codes system CRISTAL using the new isopiestic nitrate density law

    International Nuclear Information System (INIS)

    Anno, Jacques; Rouyer, Veronique; Leclaire, Nicolas

    2003-01-01

    This paper provides for various cases of 235 U enrichment or Pu isotopic vectors, and different reflectors, new minimum critical values of uranyl nitrate and plutonium nitrate solutions (H + =0) obtained by the standard IRSN calculation route and the new isopiestic density laws. Comparisons are also made with other more accurate routes showing that the standard one's results are most often conservative and usable for criticality safety assessments. (author)

  6. Collision strengths for transitions in Ni XIX

    Indian Academy of Sciences (India)

    4l configurations of Ni XIX, for which flexible atomic code. (FAC) has been ... atomic data (namely energy levels, radiative rates, collision strengths, excitation rates, etc.) ... Zhang and Sampson, who adopted the Coulomb–Born-exchange.

  7. PEAR code review

    International Nuclear Information System (INIS)

    De Wit, R.; Jamieson, T.; Lord, M.; Lafortune, J.F.

    1997-07-01

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  8. Expression profiles analysis of long non-coding RNAs identified novel lncRNA biomarkers with predictive value in outcome of cutaneous melanoma.

    Science.gov (United States)

    Ma, Xu; He, Zhijuan; Li, Ling; Yang, Daping; Liu, Guofeng

    2017-09-29

    Recent advancements in cancer biology have identified a large number of lncRNAs that are dysregulated expression in the development and tumorigenesis of cancers, highlighting the importance of lncRNAs as a key player for human cancers. However, the prognostic value of lncRNAs still remains unclear and needs to be further investigated. In the present study, we aim to assess the prognostic value of lncRNAs in cutaneous melanoma by integrated lncRNA expression profiles from TCGA database and matched clinical information from a large cohort of patients with cutaneous melanoma. We finally identified a set of six lncRNAs that are significantly associated with survival of patients with cutaneous melanoma. A linear combination of six lncRNAs ( LINC01260, HCP5, PIGBOS1, RP11-247L20.4, CTA-292E10.6 and CTB-113P19.5 ) was constructed as a six-lncRNA signature which classified patients of training cohort into the high-risk group and low-risk group with significantly different survival time. The prognostic value of the six-lncRNA signature was validated in both the validation cohort and entire TCGA cohort. Moreover, the six-lncRNA signature is independent of known clinic-pathological factors by multivariate Cox regression analysis and demonstrated good performance for predicting three- and five-year overall survival by time-dependent receiver operating characteristic (ROC) analysis. Our study provides novel insights into the molecular heterogeneity of cutaneous melanoma and also shows potentially important implications of lncRNAs for prognosis and therapy for cutaneous melanoma.

  9. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  10. Default values

    International Nuclear Information System (INIS)

    1987-08-01

    In making calculations for the purposes of radiation protection, numerical values for parameters used in the calculations are selected. In some cases, data directly applicable to the set of conditions for which the calculations are to be made are unavailable. Therefore, the selection of the values for these parameters may be based on more general data available from the literature or other sources. These values may be referred to as 'default values', that is, values used in default of those based on directly applicable data. The following policy will be applied by Atomic Energy Control Board (AECB) staff in reviewing the radiation protection aspects of submissions associated with licensing, in participating with other organizations in the development of codes and standards, and in any other work which relies to some extent on using default values

  11. An Experimental Investigation On Minimum Compressive Strength Of Early Age Concrete To Prevent Frost Damage For Nuclear Power Plant Structures In Cold Climates

    International Nuclear Information System (INIS)

    Koh, Kyungtaek; Kim, Dogyeum; Park, Chunjin; Ryu, Gumsung; Park, Jungjun; Lee, Janghwa

    2013-01-01

    Concrete undergoing early frost damage in cold weather will experience significant loss of not only strength, but also of permeability and durability. Accordingly, concrete codes like ACI-306R prescribe a minimum compressive strength and duration of curing to prevent frost damage at an early age and secure the quality of concrete. Such minimum compressive strength and duration of curing are mostly defined based on the strength development of concrete. However, concrete subjected to frost damage at early age may not show a consistent relationship between its strength and durability. Especially, since durability of concrete is of utmost importance in nuclear power plant structures, this relationship should be imperatively clarified. Therefore, this study verifies the feasibility of the minimum compressive strength specified in the codes like ACI-306R by evaluating the strength development and the durability preventing the frost damage of early age concrete for nuclear power plant. The results indicate that the value of 5 MPa specified by the concrete standards like ACI-306R as the minimum compressive strength to prevent the early frost damage is reasonable in terms of the strength development, but seems to be inappropriate in the viewpoint of the resistance to chloride ion penetration and freeze-thaw. Consequently, it is recommended to propose a minimum compressive strength preventing early frost damage in terms of not only the strength development, but also in terms of the durability to secure the quality of concrete for nuclear power plants in cold climates

  12. An Experimental Investigation On Minimum Compressive Strength Of Early Age Concrete To Prevent Frost Damage For Nuclear Power Plant Structures In Cold Climates

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Kyungtaek; Kim, Dogyeum; Park, Chunjin; Ryu, Gumsung; Park, Jungjun; Lee, Janghwa [Korea Institute Construction Technology, Goyang (Korea, Republic of)

    2013-06-15

    Concrete undergoing early frost damage in cold weather will experience significant loss of not only strength, but also of permeability and durability. Accordingly, concrete codes like ACI-306R prescribe a minimum compressive strength and duration of curing to prevent frost damage at an early age and secure the quality of concrete. Such minimum compressive strength and duration of curing are mostly defined based on the strength development of concrete. However, concrete subjected to frost damage at early age may not show a consistent relationship between its strength and durability. Especially, since durability of concrete is of utmost importance in nuclear power plant structures, this relationship should be imperatively clarified. Therefore, this study verifies the feasibility of the minimum compressive strength specified in the codes like ACI-306R by evaluating the strength development and the durability preventing the frost damage of early age concrete for nuclear power plant. The results indicate that the value of 5 MPa specified by the concrete standards like ACI-306R as the minimum compressive strength to prevent the early frost damage is reasonable in terms of the strength development, but seems to be inappropriate in the viewpoint of the resistance to chloride ion penetration and freeze-thaw. Consequently, it is recommended to propose a minimum compressive strength preventing early frost damage in terms of not only the strength development, but also in terms of the durability to secure the quality of concrete for nuclear power plants in cold climates.

  13. Development of unfolding method to obtain pin-wise source strength distribution from PWR spent fuel assembly measurement

    International Nuclear Information System (INIS)

    Sitompul, Yos Panagaman; Shin, Hee-Sung; Park, Se-Hwan; Oh, Jong Myeong; Seo, Hee; Kim, Ho Dong

    2013-01-01

    An unfolding method has been developed to obtain a pin-wise source strength distribution of a 14 × 14 pressurized water reactor (PWR) spent fuel assembly. Sixteen measured gamma dose rates at 16 control rod guide tubes of an assembly are unfolded to 179 pin-wise source strengths of the assembly. The method calculates and optimizes five coefficients of the quadratic fitting function for X-Y source strength distribution, iteratively. The pin-wise source strengths are obtained at the sixth iteration, with a maximum difference between two sequential iterations of about 0.2%. The relative distribution of pin-wise source strength from the unfolding is checked using a comparison with the design code (Westinghouse APA code). The result shows that the relative distribution from the unfolding and design code is consistent within a 5% difference. The absolute value of the pin-wise source strength is also checked by reproducing the dose rates at the measurement points. The result shows that the pin-wise source strengths from the unfolding reproduce the dose rates within a 2% difference. (author)

  14. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  15. The relationship between compressive strength and flexural strength of pavement geopolymer grouting material

    Science.gov (United States)

    Zhang, L.; Han, X. X.; Ge, J.; Wang, C. H.

    2018-01-01

    To determine the relationship between compressive strength and flexural strength of pavement geopolymer grouting material, 20 groups of geopolymer grouting materials were prepared, the compressive strength and flexural strength were determined by mechanical properties test. On the basis of excluding the abnormal values through boxplot, the results show that, the compressive strength test results were normal, but there were two mild outliers in 7days flexural strength test. The compressive strength and flexural strength were linearly fitted by SPSS, six regression models were obtained by linear fitting of compressive strength and flexural strength. The linear relationship between compressive strength and flexural strength can be better expressed by the cubic curve model, and the correlation coefficient was 0.842.

  16. Induction technology optimization code

    International Nuclear Information System (INIS)

    Caporaso, G.J.; Brooks, A.L.; Kirbie, H.C.

    1992-01-01

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  17. Towards Actualizing the Value Potential of Korea Health Insurance Review and Assessment (HIRA) Data as a Resource for Health Research: Strengths, Limitations, Applications, and Strategies for Optimal Use of HIRA Data.

    Science.gov (United States)

    Kim, Jee Ae; Yoon, Seokjun; Kim, Log Young; Kim, Dong Sook

    2017-05-01

    Health Insurance and Review Assessment (HIRA) in South Korea, also called National Health Insurance (NHI) data, is a repository of claims data collected in the process of reimbursing healthcare providers. Under the universal coverage system, having fee-for-services covering all citizens in South Korea, HIRA contains comprehensive and rich information pertaining to healthcare services such as treatments, pharmaceuticals, procedures, and diagnoses for almost 50 million beneficiaries. This corpus of HIRA data, which constitutes a large repository of data in the healthcare sector, has enormous potential to create value in several ways: enhancing the efficiency of the healthcare delivery system without compromising quality of care; adding supporting evidence for a given intervention; and providing the information needed to prevent (or monitor) adverse events. In order to actualize this potential, HIRA data need to actively be utilized for research. Thus understanding this data would greatly enhance this potential. We introduce HIRA data as an important source for health research and provide guidelines for researchers who are currently utilizing HIRA, or interested in doing so, to answer their research questions. We present the characteristics and structure of HIRA data. We discuss strengths and limitations that should be considered in conducting research with HIRA data and suggest strategies for optimal utilization of HIRA data by reviewing published research using HIRA data. © 2017 The Korean Academy of Medical Sciences.

  18. Bond strength of masonry

    NARCIS (Netherlands)

    Pluijm, van der R.; Vermeltfoort, A.Th.

    1992-01-01

    Bond strength is not a well defined property of masonry. Normally three types of bond strength can be distinguished: - tensile bond strength, - shear (and torsional) bond strength, - flexural bond strength. In this contribution the behaviour and strength of masonry in deformation controlled uniaxial

  19. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  20. Allele coding in genomic evaluation

    Directory of Open Access Journals (Sweden)

    Christensen Ole F

    2011-06-01

    Full Text Available Abstract Background Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. Results Theoretical derivations showed that parameter estimates and estimated marker effects in marker-based models are the same irrespective of the allele coding, provided that the model has a fixed general mean. For the equivalent models, the same results hold, even though different allele coding methods lead to different genomic relationship matrices. Calculated genomic breeding values are independent of allele coding when the estimate of the general mean is included into the values. Reliabilities of estimated genomic breeding values calculated using elements of the inverse of the coefficient matrix depend on the allele coding because different allele coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being

  1. Aztheca Code

    International Nuclear Information System (INIS)

    Quezada G, S.; Espinosa P, G.; Centeno P, J.; Sanchez M, H.

    2017-09-01

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  2. Redox Buffer Strength

    Science.gov (United States)

    de Levie, Robert

    1999-04-01

    The proper functioning of enzymes in bodily fluids requires that the pH be maintained within rather narrow limits. The first line of defense against large pH fluctuations in such fluids is the passive control provided by the presence of pH buffers. The ability of pH buffers to stabilize the pH is indicated by the buffer value b introduced in 1922 by van Slyke. It is equally important for many enzymes that the redox potential is kept within a narrow range. In that case, stability of the potential is most readily achieved with a redox buffer. In this communication we define the redox buffer strength by analogy with acid-base buffer strength.

  3. Optimal, Reliability-Based Code Calibration

    DEFF Research Database (Denmark)

    Sørensen, John Dalsgaard

    2002-01-01

    Reliability based code calibration is considered in this paper. It is described how the results of FORM based reliability analysis may be related to the partial safety factors and characteristic values. The code calibration problem is presented in a decision theoretical form and it is discussed how...... of reliability based code calibration of LRFD based design codes....

  4. Reliability and code level

    NARCIS (Netherlands)

    Kasperski, M.; Geurts, C.P.W.

    2005-01-01

    The paper describes the work of the IAWE Working Group WBG - Reliability and Code Level, one of the International Codification Working Groups set up at ICWE10 in Copenhagen. The following topics are covered: sources of uncertainties in the design wind load, appropriate design target values for the

  5. CERN Code of Conduct

    CERN Document Server

    Department, HR

    2010-01-01

    The Code is intended as a guide in helping us, as CERN contributors, to understand how to conduct ourselves, treat others and expect to be treated. It is based around the five core values of the Organization. We should all become familiar with it and try to incorporate it into our daily life at CERN.

  6. Vocable Code

    DEFF Research Database (Denmark)

    Soon, Winnie; Cox, Geoff

    2018-01-01

    a computational and poetic composition for two screens: on one of these, texts and voices are repeated and disrupted by mathematical chaos, together exploring the performativity of code and language; on the other, is a mix of a computer programming syntax and human language. In this sense queer code can...... be understood as both an object and subject of study that intervenes in the world’s ‘becoming' and how material bodies are produced via human and nonhuman practices. Through mixing the natural and computer language, this article presents a script in six parts from a performative lecture for two persons...

  7. NSURE code

    International Nuclear Information System (INIS)

    Rattan, D.S.

    1993-11-01

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  8. Rock strength under explosive loading

    International Nuclear Information System (INIS)

    Rimer, N.; Proffer, W.

    1993-01-01

    This presentation emphasizes the importance of a detailed description of the nonlinear deviatoric (strength) response of the surrounding rock in the numerical simulation of underground nuclear explosion phenomenology to the late times needed for test ban monitoring applications. We will show how numerical simulations which match ground motion measurements in volcanic tuffs and in granite use the strength values obtained from laboratory measurements on small core samples of these rocks but also require much lower strength values after the ground motion has interacted with the rock. The underlying physical mechanisms for the implied strength reduction are not yet well understood, and in fact may depend on the particular rock type. However, constitutive models for shock damage and/or effective stress have been used successfully at S-Cubed in both the Geophysics Program (primarily for DARPA) and the Containment Support Program (for DNA) to simulate late time ground motions measured at NTS in many different rock types

  9. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  10. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  11. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening...... Coding Pirates2. Rapporten er forfattet af Docent i digitale læringsressourcer og forskningskoordinator for forsknings- og udviklingsmiljøet Digitalisering i Skolen (DiS), Mikala Hansbøl, fra Institut for Skole og Læring ved Professionshøjskolen Metropol; og Lektor i læringsteknologi, interaktionsdesign......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017...

  12. Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the objectives, meeting goals and overall NASA goals for the NASA Data Standards Working Group. The presentation includes information on the technical progress surrounding the objective, short LDPC codes, and the general results on the Pu-Pw tradeoff.

  13. ANIMAL code

    International Nuclear Information System (INIS)

    Lindemuth, I.R.

    1979-01-01

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  14. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  15. MCNP code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  16. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  17. Theoretical Atomic Physics code development II: ACE: Another collisional excitation code

    International Nuclear Information System (INIS)

    Clark, R.E.H.; Abdallah, J. Jr.; Csanak, G.; Mann, J.B.; Cowan, R.D.

    1988-12-01

    A new computer code for calculating collisional excitation data (collision strengths or cross sections) using a variety of models is described. The code uses data generated by the Cowan Atomic Structure code or CATS for the atomic structure. Collisional data are placed on a random access file and can be displayed in a variety of formats using the Theoretical Atomic Physics Code or TAPS. All of these codes are part of the Theoretical Atomic Physics code development effort at Los Alamos. 15 refs., 10 figs., 1 tab

  18. Panda code

    International Nuclear Information System (INIS)

    Altomare, S.; Minton, G.

    1975-02-01

    PANDA is a new two-group one-dimensional (slab/cylinder) neutron diffusion code designed to replace and extend the FAB series. PANDA allows for the nonlinear effects of xenon, enthalpy and Doppler. Fuel depletion is allowed. PANDA has a completely general search facility which will seek criticality, maximize reactivity, or minimize peaking. Any single parameter may be varied in a search. PANDA is written in FORTRAN IV, and as such is nearly machine independent. However, PANDA has been written with the present limitations of the Westinghouse CDC-6600 system in mind. Most computation loops are very short, and the code is less than half the useful 6600 memory size so that two jobs can reside in the core at once. (auth)

  19. CANAL code

    International Nuclear Information System (INIS)

    Gara, P.; Martin, E.

    1983-01-01

    The CANAL code presented here optimizes a realistic iron free extraction channel which has to provide a given transversal magnetic field law in the median plane: the current bars may be curved, have finite lengths and cooling ducts and move in a restricted transversal area; terminal connectors may be added, images of the bars in pole pieces may be included. A special option optimizes a real set of circular coils [fr

  20. Put Your Ethics Code to Work.

    Science.gov (United States)

    Eveslage, Tom

    1996-01-01

    States that in order for a code of ethics to be effective, it must make a difference. Discusses some qualities and considerations found in a good code of ethics, including being in accordance with accepted professional values. (PA)

  1. Improvements to SOIL: An Eulerian hydrodynamics code

    International Nuclear Information System (INIS)

    Davis, C.G.

    1988-04-01

    Possible improvements to SOIL, an Eulerian hydrodynamics code that can do coupled radiation diffusion and strength of materials, are presented in this report. Our research is based on the inspection of other Eulerian codes and theoretical reports on hydrodynamics. Several conclusions from the present study suggest that some improvements are in order, such as second-order advection, adaptive meshes, and speedup of the code by vectorization and/or multitasking. 29 refs., 2 figs

  2. Annotation of selection strengths in viral genomes

    DEFF Research Database (Denmark)

    McCauley, Stephen; de Groot, Saskia; Mailund, Thomas

    2007-01-01

    Motivation: Viral genomes tend to code in overlapping reading frames to maximize information content. This may result in atypical codon bias and particular evolutionary constraints. Due to the fast mutation rate of viruses, there is additional strong evidence for varying selection between intra......- and intergenomic regions. The presence of multiple coding regions complicates the concept of Ka/Ks ratio, and thus begs for an alternative approach when investigating selection strengths. Building on the paper by McCauley & Hein (2006), we develop a method for annotating a viral genome coding in overlapping...... may thus achieve an annotation both of coding regions as well as selection strengths, allowing us to investigate different selection patterns and hypotheses. Results: We illustrate our method by applying it to a multiple alignment of four HIV2 sequences, as well as four Hepatitis B sequences. We...

  3. The use of QR Code as a learning technology: an exploratory study

    Directory of Open Access Journals (Sweden)

    Stefano Besana

    2010-12-01

    Full Text Available This paper discusses a pilot study on the potential benefits of QR (Quick Response Codes as a tool for facilitating and enhancing learning processes. An analysis is given of the strengths and added value of QR technologies applied to museum visits, with precautions regarding the design of learning environments like the one presented. Some possible future scenarios are identified for implementing these technologies in contexts more strictly related to teaching and education.

  4. Reliability-Based Code Calibration

    DEFF Research Database (Denmark)

    Faber, M.H.; Sørensen, John Dalsgaard

    2003-01-01

    The present paper addresses fundamental concepts of reliability based code calibration. First basic principles of structural reliability theory are introduced and it is shown how the results of FORM based reliability analysis may be related to partial safety factors and characteristic values....... Thereafter the code calibration problem is presented in its principal decision theoretical form and it is discussed how acceptable levels of failure probability (or target reliabilities) may be established. Furthermore suggested values for acceptable annual failure probabilities are given for ultimate...... and serviceability limit states. Finally the paper describes the Joint Committee on Structural Safety (JCSS) recommended procedure - CodeCal - for the practical implementation of reliability based code calibration of LRFD based design codes....

  5. The Strength Compass

    DEFF Research Database (Denmark)

    Ledertoug, Mette Marie

    In the Ph.D-project ͚Strengths-based Learning - Children͛s character strengths as a means to their learning potential͛ 750 Danish children have assessed ͚The Strength Compass͛ in order to identify their strengths and to create awareness of strengths. This was followed by a strengths......-based intervention program in order to explore the strengths. Finally different methods to apply the strength in everyday life at school were applied. The paper presentation will show the results for strengths display for children aged 6-16 in different categories: Different age groups: Are the same strengths...... present in both small children and youths? Gender: Do the results show differences between the two genders? Danish as a mother- tongue language: Do the results show any differences in the strengths display when considering different language and cultural backgrounds? Children with Special Needs: Do...

  6. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  7. The Importance of Muscular Strength: Training Considerations.

    Science.gov (United States)

    Suchomel, Timothy J; Nimphius, Sophia; Bellon, Christopher R; Stone, Michael H

    2018-04-01

    This review covers underlying physiological characteristics and training considerations that may affect muscular strength including improving maximal force expression and time-limited force expression. Strength is underpinned by a combination of morphological and neural factors including muscle cross-sectional area and architecture, musculotendinous stiffness, motor unit recruitment, rate coding, motor unit synchronization, and neuromuscular inhibition. Although single- and multi-targeted block periodization models may produce the greatest strength-power benefits, concepts within each model must be considered within the limitations of the sport, athletes, and schedules. Bilateral training, eccentric training and accentuated eccentric loading, and variable resistance training may produce the greatest comprehensive strength adaptations. Bodyweight exercise, isolation exercises, plyometric exercise, unilateral exercise, and kettlebell training may be limited in their potential to improve maximal strength but are still relevant to strength development by challenging time-limited force expression and differentially challenging motor demands. Training to failure may not be necessary to improve maximum muscular strength and is likely not necessary for maximum gains in strength. Indeed, programming that combines heavy and light loads may improve strength and underpin other strength-power characteristics. Multiple sets appear to produce superior training benefits compared to single sets; however, an athlete's training status and the dose-response relationship must be considered. While 2- to 5-min interset rest intervals may produce the greatest strength-power benefits, rest interval length may vary based an athlete's training age, fiber type, and genetics. Weaker athletes should focus on developing strength before emphasizing power-type training. Stronger athletes may begin to emphasize power-type training while maintaining/improving their strength. Future research should

  8. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, transparency, neutrality, impartiality, effectiveness, accountability, and legality. The normative context of public administration, as expressed in codes, seems to ignore the New Public Management and Reinventing Government reform movements....

  9. Allele coding in genomic evaluation

    DEFF Research Database (Denmark)

    Standen, Ismo; Christensen, Ole Fredslund

    2011-01-01

    Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker...... effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous...... genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call...

  10. UNSPEC: revisited (semaphore code)

    International Nuclear Information System (INIS)

    Neifert, R.D.

    1981-01-01

    The UNSPEC code is used to solve the problem of unfolding an observed x-ray spectrum given the response matrix of the measuring system and the measured signal values. UNSPEC uses an iterative technique to solve the unfold problem. Due to experimental errors in the measured signal values and/or computer round-off errors, discontinuities and oscillatory behavior may occur in the iterated spectrum. These can be suppressed by smoothing the results after each iteration. Input/output options and control cards are explained; sample input and output are provided

  11. Discrete Sparse Coding.

    Science.gov (United States)

    Exarchakis, Georgios; Lücke, Jörg

    2017-11-01

    Sparse coding algorithms with continuous latent variables have been the subject of a large number of studies. However, discrete latent spaces for sparse coding have been largely ignored. In this work, we study sparse coding with latents described by discrete instead of continuous prior distributions. We consider the general case in which the latents (while being sparse) can take on any value of a finite set of possible values and in which we learn the prior probability of any value from data. This approach can be applied to any data generated by discrete causes, and it can be applied as an approximation of continuous causes. As the prior probabilities are learned, the approach then allows for estimating the prior shape without assuming specific functional forms. To efficiently train the parameters of our probabilistic generative model, we apply a truncated expectation-maximization approach (expectation truncation) that we modify to work with a general discrete prior. We evaluate the performance of the algorithm by applying it to a variety of tasks: (1) we use artificial data to verify that the algorithm can recover the generating parameters from a random initialization, (2) use image patches of natural images and discuss the role of the prior for the extraction of image components, (3) use extracellular recordings of neurons to present a novel method of analysis for spiking neurons that includes an intuitive discretization strategy, and (4) apply the algorithm on the task of encoding audio waveforms of human speech. The diverse set of numerical experiments presented in this letter suggests that discrete sparse coding algorithms can scale efficiently to work with realistic data sets and provide novel statistical quantities to describe the structure of the data.

  12. Codes of Ethics and Teachers' Professional Autonomy

    Science.gov (United States)

    Schwimmer, Marina; Maxwell, Bruce

    2017-01-01

    This article considers the value of adopting a code of professional ethics for teachers. After having underlined how a code of ethics stands to benefits a community of educators--namely, by providing a mechanism for regulating autonomy and promoting a shared professional ethic--the article examines the principal arguments against codes of ethics.…

  13. The strength compass

    DEFF Research Database (Denmark)

    Ledertoug, Mette Marie

    of agreement/disagreement. Also the child/teacher is asked whether the actual strength is important and if he or she has the possibilities to apply the strength in the school. In a PhDproject ‘Strengths-based Learning - Children’s Character Strengths as Means to their Learning Potential’ 750 Danish children......Individual paper presentation: The ‘Strength Compass’. The results of a PhDresearch project among schoolchildren (age 6-16) identifying VIAstrengths concerning age, gender, mother-tongue-langue and possible child psychiatric diagnosis. Strengths-based interventions in schools have a theoretical...... Psychological Publishing Company. ‘The Strength Compass’ is a computer/Ipad based qualitative tool to identify the strengths of a child by a self-survey or a teacher’s survey. It is designed as a visual analogue scale with a statement of the strength in which the child/teacher may declare the degree...

  14. Strength and failure modes of ceramic multilayers

    DEFF Research Database (Denmark)

    Sørensen, Bent F.; Toftegaard, Helmuth Langmaack; Linderoth, Søren

    2012-01-01

    A model was developed for the prediction of the tensile strength of thin, symmetric 3-layer sandwich specimens. The model predictions rationalize the effect of heat-treatment temperature on the strength of sandwich specimens consisting of an YSZ (Yttria-Stabilized Zirconia) substrate coated with ...... and propagating into the substrate. These predictions are consistent with microstructural observations of the fracture surfaces. A good agreement was found between the measured strength values and model predictions. © 2012 Elsevier Ltd. All rights reserved....

  15. Strict optical orthogonal codes for purely asynchronous code-division multiple-access applications

    Science.gov (United States)

    Zhang, Jian-Guo

    1996-12-01

    Strict optical orthogonal codes are presented for purely asynchronous optical code-division multiple-access (CDMA) applications. The proposed code can strictly guarantee the peaks of its cross-correlation functions and the sidelobes of any of its autocorrelation functions to have a value of 1 in purely asynchronous data communications. The basic theory of the proposed codes is given. An experiment on optical CDMA systems is also demonstrated to verify the characteristics of the proposed code.

  16. Automatic coding method of the ACR Code

    International Nuclear Information System (INIS)

    Park, Kwi Ae; Ihm, Jong Sool; Ahn, Woo Hyun; Baik, Seung Kook; Choi, Han Yong; Kim, Bong Gi

    1993-01-01

    The authors developed a computer program for automatic coding of ACR(American College of Radiology) code. The automatic coding of the ACR code is essential for computerization of the data in the department of radiology. This program was written in foxbase language and has been used for automatic coding of diagnosis in the Department of Radiology, Wallace Memorial Baptist since May 1992. The ACR dictionary files consisted of 11 files, one for the organ code and the others for the pathology code. The organ code was obtained by typing organ name or code number itself among the upper and lower level codes of the selected one that were simultaneous displayed on the screen. According to the first number of the selected organ code, the corresponding pathology code file was chosen automatically. By the similar fashion of organ code selection, the proper pathologic dode was obtained. An example of obtained ACR code is '131.3661'. This procedure was reproducible regardless of the number of fields of data. Because this program was written in 'User's Defined Function' from, decoding of the stored ACR code was achieved by this same program and incorporation of this program into program in to another data processing was possible. This program had merits of simple operation, accurate and detail coding, and easy adjustment for another program. Therefore, this program can be used for automation of routine work in the department of radiology

  17. Coding for effective denial management.

    Science.gov (United States)

    Miller, Jackie; Lineberry, Joe

    2004-01-01

    Nearly everyone will agree that accurate and consistent coding of diagnoses and procedures is the cornerstone for operating a compliant practice. The CPT or HCPCS procedure code tells the payor what service was performed and also (in most cases) determines the amount of payment. The ICD-9-CM diagnosis code, on the other hand, tells the payor why the service was performed. If the diagnosis code does not meet the payor's criteria for medical necessity, all payment for the service will be denied. Implementation of an effective denial management program can help "stop the bleeding." Denial management is a comprehensive process that works in two ways. First, it evaluates the cause of denials and takes steps to prevent them. Second, denial management creates specific procedures for refiling or appealing claims that are initially denied. Accurate, consistent and compliant coding is key to both of these functions. The process of proactively managing claim denials also reveals a practice's administrative strengths and weaknesses, enabling radiology business managers to streamline processes, eliminate duplicated efforts and shift a larger proportion of the staff's focus from paperwork to servicing patients--all of which are sure to enhance operations and improve practice management and office morale. Accurate coding requires a program of ongoing training and education in both CPT and ICD-9-CM coding. Radiology business managers must make education a top priority for their coding staff. Front office staff, technologists and radiologists should also be familiar with the types of information needed for accurate coding. A good staff training program will also cover the proper use of Advance Beneficiary Notices (ABNs). Registration and coding staff should understand how to determine whether the patient's clinical history meets criteria for Medicare coverage, and how to administer an ABN if the exam is likely to be denied. Staff should also understand the restrictions on use of

  18. Code of ethics: principles for ethical leadership.

    Science.gov (United States)

    Flite, Cathy A; Harman, Laurinda B

    2013-01-01

    The code of ethics for a professional association incorporates values, principles, and professional standards. A review and comparative analysis of a 1934 pledge and codes of ethics from 1957, 1977, 1988, 1998, 2004, and 2011 for a health information management association was conducted. Highlights of some changes in the healthcare delivery system are identified as a general context for the codes of ethics. The codes of ethics are examined in terms of professional values and changes in the language used to express the principles of the various codes.

  19. Error-correction coding

    Science.gov (United States)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  20. Dynamic Shannon Coding

    OpenAIRE

    Gagie, Travis

    2005-01-01

    We present a new algorithm for dynamic prefix-free coding, based on Shannon coding. We give a simple analysis and prove a better upper bound on the length of the encoding produced than the corresponding bound for dynamic Huffman coding. We show how our algorithm can be modified for efficient length-restricted coding, alphabetic coding and coding with unequal letter costs.

  1. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  2. Codes Over Hyperfields

    Directory of Open Access Journals (Sweden)

    Atamewoue Surdive

    2017-12-01

    Full Text Available In this paper, we define linear codes and cyclic codes over a finite Krasner hyperfield and we characterize these codes by their generator matrices and parity check matrices. We also demonstrate that codes over finite Krasner hyperfields are more interesting for code theory than codes over classical finite fields.

  3. CRUCIB: an axisymmetric convection code

    International Nuclear Information System (INIS)

    Bertram, L.A.

    1975-03-01

    The CRUCIB code was written in support of an experimental program aimed at measurement of thermal diffusivities of refractory liquids. Precise values of diffusivity are necessary to realistic analysis of reactor safety problems, nuclear waste disposal procedures, and fundamental metal forming processes. The code calculates the axisymmetric transient convective motions produced in a right circular cylindrical crucible, which is surface heated by an annular heat pulse. Emphasis of this report is placed on the input-output options of the CRUCIB code, which are tailored to assess the importance of the convective heat transfer in determining the surface temperature distribution. Use is limited to Prandtl numbers less than unity; larger values can be accommodated by replacement of a single block of the code, if desired. (U.S.)

  4. Revealing the Maximum Strength in Nanotwinned Copper

    DEFF Research Database (Denmark)

    Lu, L.; Chen, X.; Huang, Xiaoxu

    2009-01-01

    boundary–related processes. We investigated the maximum strength of nanotwinned copper samples with different twin thicknesses. We found that the strength increases with decreasing twin thickness, reaching a maximum at 15 nanometers, followed by a softening at smaller values that is accompanied by enhanced...

  5. Collision strengths for the excitation of lithium- and boron-like ions by electron impact

    International Nuclear Information System (INIS)

    Goett, S.J.

    1983-01-01

    The theory of collision strengths of highly charged ions is presented in terms of the R-matrix formalism by utilizing time-dependent perturbation theory. This theory is then applied to the general case of an ion with three valence electrons. The theory is general enough to admit the possiblity of three equivalent electrons. The effects of configuration interaction and intermediate coupling are incorporated through the mixing coefficients calculated by diagonalizing the perturbation matrix. This matrix is formed by taking into account the electron-electron electrostatic interaction as well as all first order relativistic corrections. The dipole radiative line strengths are also calculated using these mix coefficients. The line strengths are needed for the Coulomb-Bethe approximation which estimates the contributions to the collision strengths from large values of the impact electron's orbital angular momentum. All the above quantities are calculated in both the LS and jj coupling schemes. This dual calculation provides useful information about the mixing of the states present, as well as serving as a valuable check on the development of the theory and the coding of the computer programs. An application is made to the calculation of transition energies, line strengths and collision strengths of transitions from all lower states with a configuration of 1s 2 2I to all upper states with a configuraiton of 1s2I/sub a/'2I/sub b/'

  6. Isometric shoulder strength in young swimmers.

    Science.gov (United States)

    McLaine, Sally J; Ginn, Karen A; Fell, James W; Bird, Marie-Louise

    2018-01-01

    The prevalence of shoulder pain in young swimmers is high. Shoulder rotation strength and the ratio of internal to external rotation strength have been reported as potential modifiable risk factors associated with shoulder pain. However, relative strength measures in elevated positions, which include flexion and extension, have not been established for the young swimmer. The aim of this study was to establish clinically useful, normative shoulder strength measures and ratios for swimmers (14-20 years) without shoulder pain. Cross-sectional, observational study. Swimmers (N=85) without a recent history of shoulder pain underwent strength testing of shoulder flexion and extension (in 140° abduction); and internal and external rotation (in 90° abduction). Strength tests were performed in supine using a hand-held dynamometer and values normalised to body weight. Descriptive statistics were calculated for strength and strength ratios (flexion:extension and internal:external rotation). Differences between groups (based on gender, history of pain, test and arm dominance) were explored using independent and paired t tests. Normative shoulder strength values and ratios were established for young swimmers. There was a significant difference (pdifferences in strength ratios. Relative strength of the dominant and non-dominant shoulders (except for extension); and for swimmers with and without a history of shoulder pain was not significantly different. A normal shoulder strength profile for the young swimmer has been established which provides a valuable reference for the clinician assessing shoulder strength in this population. Copyright © 2017 Sports Medicine Australia. Published by Elsevier Ltd. All rights reserved.

  7. Protograph-Based Raptor-Like Codes

    Science.gov (United States)

    Divsalar, Dariush; Chen, Tsung-Yi; Wang, Jiadong; Wesel, Richard D.

    2014-01-01

    Theoretical analysis has long indicated that feedback improves the error exponent but not the capacity of pointto- point memoryless channels. The analytic and empirical results indicate that at short blocklength regime, practical rate-compatible punctured convolutional (RCPC) codes achieve low latency with the use of noiseless feedback. In 3GPP, standard rate-compatible turbo codes (RCPT) did not outperform the convolutional codes in the short blocklength regime. The reason is the convolutional codes for low number of states can be decoded optimally using Viterbi decoder. Despite excellent performance of convolutional codes at very short blocklengths, the strength of convolutional codes does not scale with the blocklength for a fixed number of states in its trellis.

  8. The Statistical Analysis of Relation between Compressive and Tensile/Flexural Strength of High Performance Concrete

    Directory of Open Access Journals (Sweden)

    Kępniak M.

    2016-12-01

    Full Text Available This paper addresses the tensile and flexural strength of HPC (high performance concrete. The aim of the paper is to analyse the efficiency of models proposed in different codes. In particular, three design procedures from: the ACI 318 [1], Eurocode 2 [2] and the Model Code 2010 [3] are considered. The associations between design tensile strength of concrete obtained from these three codes and compressive strength are compared with experimental results of tensile strength and flexural strength by statistical tools. Experimental results of tensile strength were obtained in the splitting test. Based on this comparison, conclusions are drawn according to the fit between the design methods and the test data. The comparison shows that tensile strength and flexural strength of HPC depend on more influential factors and not only compressive strength.

  9. Valuing Essays: Essaying Values

    Science.gov (United States)

    Badley, Graham

    2010-01-01

    The essay regularly comes under attack. It is criticised for being rigidly linear rather than flexible and reflective. I first challenge this view by examining reasons why the essay should be valued as an important genre. Secondly, I propose that in using the essay form students and academics necessarily exemplify their own critical values. Essays…

  10. Strengths-based Learning

    DEFF Research Database (Denmark)

    Ledertoug, Mette Marie

    -being. The Ph.D.-project in Strength-based learning took place in a Danish school with 750 pupils age 6-16 and a similar school was functioning as a control group. The presentation will focus on both the aware-explore-apply processes and the practical implications for the schools involved, and on measurable......Strength-based learning - Children͛s Character Strengths as Means to their Learning Potential͛ is a Ph.D.-project aiming to create a strength-based mindset in school settings and at the same time introducing strength-based interventions as specific tools to improve both learning and well...

  11. An Outline of the New Norwegian Criminal Code

    Directory of Open Access Journals (Sweden)

    Jørn Jacobsen

    2015-12-01

    Full Text Available This article gives an overview of the new criminal code, its background and content. It maps out the code’s background, the legislative process and central ideas. Furthermore, the article gives an outline of the general criteria for criminal responsibility according to the code, the offences and forms of punishment and other reactions. The article emphasises the most important changes from the previous code of 1902. To some degree, strengths and weaknesses of the new code are addressed.

  12. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  13. Homological stabilizer codes

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  14. Spin resonance strength calculation through single particle tracking for RHIC

    Energy Technology Data Exchange (ETDEWEB)

    Luo, Y. [Brookhaven National Lab. (BNL), Upton, NY (United States); Dutheil, Y. [Brookhaven National Lab. (BNL), Upton, NY (United States); Huang, H. [Brookhaven National Lab. (BNL), Upton, NY (United States); Meot, F. [Brookhaven National Lab. (BNL), Upton, NY (United States); Ranjbar, V. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2015-05-03

    The strengths of spin resonances for the polarized-proton operation in the Relativistic Heavy Ion Collider are currently calculated with the code DEPOL, which numerically integrates through the ring based on an analytical approximate formula. In this article, we test a new way to calculate the spin resonance strengths by performing Fourier transformation to the actual transverse magnetic fields seen by a single particle traveling through the ring. Comparison of calculated spin resonance strengths is made between this method and DEPOL.

  15. Strength and Microstructure of Ceramics

    Science.gov (United States)

    1989-11-01

    Forex - one particular alumina ceramic, I our own detailed crack ample, the relatively large values of r, and c* for the VI observations, and those of...particularly toughness indices, 1i71", indicating that there is sonic the c° , T parameters. However, the indentation mcth- kind of trade -o1Tbetwecn...macroscopic and microsnpic odology takes us closer to the strengths of specimens toughness levels, and that this trade -off is cont’olled by with natural

  16. Diagnostic Coding for Epilepsy.

    Science.gov (United States)

    Williams, Korwyn; Nuwer, Marc R; Buchhalter, Jeffrey R

    2016-02-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  17. Coding of Neuroinfectious Diseases.

    Science.gov (United States)

    Barkley, Gregory L

    2015-12-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  18. Detection of rock strength at Branisko massif

    Directory of Open Access Journals (Sweden)

    Lazarová Edita

    2000-09-01

    Full Text Available When monitoring and optimizing the driving proces of the exploratory gallery by a computer system, conditions for verification of the interaction between desintegrating head of driving machine and rock massif were created. One of the output values of this mathematical model is the model strength at a simple pressure ótlH, which is defined as a pressure at the discus and the massif contact during the desintigration (a near limit of massif strength. By geological and geological engineering exploration, the section of length 2340 m was divided into fourty-two geological sections and five quasi-homogeneous massif enviroments. In the article, results of scleroscopic strength óCI , the strength in a simple pressure determined from the point load test and the strength at simple pressure ótlH are confronted . The main advance of the electronic geomechanical monitoring is the density of gained information. The two-seconds sample period of input and output data during the driving process makes it possible to describe driving circumstances in an almost continual way for each millimeter of the built tunnel. Then the information about changes of disintegrated rock properties, have the same density (frequency. By comparing a quantity of data gained by examining the index of point strength, scleroscopic strength and the model strength in a simple pressure from the monitoring process of driving process it is obvious that during the driving of exploratory gallery of motorway tunnel Branisko, a proportion of data number from the three “type examinations” of strength was reached and it was approximately 1:7:5000. Approximately in the same proportion, there were determined values for the 42 geologic sections (I. – XLII., which were defined in detail by the geologic, engineering geologic, hydrogeologic and geotechnic research.. The presented quantity values of presented rock mass strength for each geologic section are presented by their arithmetic average

  19. Comparison of the mechanical strength properties of several high-chromium ferritic steels

    International Nuclear Information System (INIS)

    Booker, M.K.; Sikka, V.K.; Booker, B.L.P.

    1981-01-01

    A modified 9 Cr-1 Mo ferritic steel has been selected as an alternative material for breeder reactors. Different 9 Cr-1 Mo steels are already being used commercially in UK and USA and a 9 Cr-2 Mo steel (EM12) is being used commercially in France. The 12% Cr steel alloy HT9 is also often recommended for high-temperature service. Creep-rupture data for all six seels were analyzed to yield rupture life as a function of stress, temperature, and lot-to-lot variations. Yield and tensile strength data for the three 9 Cr-1 Mo materials were also examined. All results were compared with Type 304 stainless steel, and the tensile and creep properties of the modified and British 9 Cr-1 Mo materials were used to calculate allowable stress values S 0 per Section VIII, Division 1 and S/sub m/ per code Case N-47 to section III of the ASME Boiler and Pressure Vessel Code. these values were compared with code listings for American commercial 9 Cr-1 Mo steel, 2 1/4 Cr-1 Mo steel, and Type 304 stainless steel. The conclusion is made that the modified 9 Cr-1 Mo steel displays tensile and creep strengths superior to those of the other ferritic materials examined and is at least comparable to Type 304 stainless steel from room temperature to about 625 0 C. 31 figures

  20. The problem with value

    Science.gov (United States)

    O’Doherty, John P.

    2015-01-01

    Neural correlates of value have been extensively reported in a diverse set of brain regions. However, in many cases it is difficult to determine whether a particular neural response pattern corresponds to a value-signal per se as opposed to an array of alternative non-value related processes, such as outcome-identity coding, informational coding, encoding of autonomic and skeletomotor consequences, alongside previously described “salience” or “attentional” effects. Here, I review a number of experimental manipulations that can be used to test for value, and I identify the challenges in ascertaining whether a particular neural response is or is not a value signal. Finally, I emphasize that some non-value related signals may be especially informative as a means of providing insight into the nature of the decision-making related computations that are being implemented in a particular brain region. PMID:24726573

  1. Give Me Strength.

    Institute of Scientific and Technical Information of China (English)

    维拉

    1996-01-01

    Mort had an absolutely terrible day at the office.Everythingthat could go wrong did go wrong.As he walked home he could beheard muttering strange words to himself:“Oh,give me strength,give me strength.”Mort isn’t asking for the kind of strength thatbuilds strong muscles:he’s asking for the courage or ability to

  2. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  3. Entropy Coding in HEVC

    OpenAIRE

    Sze, Vivienne; Marpe, Detlev

    2014-01-01

    Context-Based Adaptive Binary Arithmetic Coding (CABAC) is a method of entropy coding first introduced in H.264/AVC and now used in the latest High Efficiency Video Coding (HEVC) standard. While it provides high coding efficiency, the data dependencies in H.264/AVC CABAC make it challenging to parallelize and thus limit its throughput. Accordingly, during the standardization of entropy coding for HEVC, both aspects of coding efficiency and throughput were considered. This chapter describes th...

  4. Generalized concatenated quantum codes

    International Nuclear Information System (INIS)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng Bei

    2009-01-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  5. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  6. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  7. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  8. Strength training for the warfighter.

    Science.gov (United States)

    Kraemer, William J; Szivak, Tunde K

    2012-07-01

    Optimizing strength training for the warfighter is challenged by past training philosophies that no longer serve the modern warfighter facing the "anaerobic battlefield." Training approaches for integration of strength with other needed physical capabilities have been shown to require a periodization model that has the flexibility for changes and is able to adapt to ever-changing circumstances affecting the quality of workouts. Additionally, sequencing of workouts to limit over-reaching and development of overtraining syndromes that end in loss of duty time and injury are paramount to long-term success. Allowing adequate time for rest and recovery and recognizing the negative influences of extreme exercise programs and excessive endurance training will be vital in moving physical training programs into a more modern perspective as used by elite strength-power anaerobic athletes in sports today. Because the warfighter is an elite athlete, it is time that training approaches that are scientifically based are updated within the military to match the functional demands of modern warfare and are given greater credence and value at the command levels. A needs analysis, development of periodized training modules, and individualization of programs are needed to optimize the strength of the modern warfighter. We now have the knowledge, professional coaches and nonprofit organization certifications with continuing education units, and modern training technology to allow this to happen. Ultimately, it only takes command decisions and implementation to make this possible.

  9. Voluntary codes: private governance, the public interest and innovation

    National Research Council Canada - National Science Library

    Webb, Kernaghan

    2004-01-01

    This volume is a logical extension of the Office of Consumer Affairs' work in the area of voluntary codes that may assist all parties in developing a better understanding of the strengths, weaknesses...

  10. Anisotropic Concrete Compressive Strength

    DEFF Research Database (Denmark)

    Gustenhoff Hansen, Søren; Jørgensen, Henrik Brøner; Hoang, Linh Cao

    2017-01-01

    When the load carrying capacity of existing concrete structures is (re-)assessed it is often based on compressive strength of cores drilled out from the structure. Existing studies show that the core compressive strength is anisotropic; i.e. it depends on whether the cores are drilled parallel...

  11. High strength ferritic alloy

    International Nuclear Information System (INIS)

    1977-01-01

    A high strength ferritic steel is specified in which the major alloying elements are chromium and molybdenum, with smaller quantities of niobium, vanadium, silicon, manganese and carbon. The maximum swelling is specified for various irradiation conditions. Rupture strength is also specified. (U.K.)

  12. Photon strength functions

    International Nuclear Information System (INIS)

    Bergqvist, I.

    1976-01-01

    Methods for extracting photon strength functions are briefly discussed. We follow the Brink-Axel approach to relate the strength functions to the giant resonances observed in photonuclear work and summarize the available data on the E1, E2 and M1 resonances. Some experimental and theoretical problems are outlined. (author)

  13. Interviewing to Understand Strengths

    Science.gov (United States)

    Hass, Michael R.

    2018-01-01

    Interviewing clients about their strengths is an important part of developing a complete understanding of their lives and has several advantages over simply focusing on problems and pathology. Prerequisites for skillfully interviewing for strengths include the communication skills that emerge from a stance of not knowing, developing a vocabulary…

  14. The Value of Value

    DEFF Research Database (Denmark)

    Sørensen, Asger

    parts of business ethics given prominence to especially one term, namely `value'. The question that interests me is the following: What does the articulation of ethics and morality in terms of values mean for ethics and morality as such. Or, to put the question in a more fashionably way: What......As a social scientist of ethics and morality, Luhmann has noticed the ethical wave that has recently swept across the western world, and states that this particular kind of wave seems to have a wavelength of about one hundred years (cf. Luhmann 1989: 9 ff.). Even though the frequency...... and the regularity of such a phenomenon is both hard to verify and, if true, difficult to explain, it seems fair to say that since the Enlightenment, an approaching fin-de-siecle has brought an increased interest in matters concerning morality and ethics.1 The present peak has in public-political discourse and some...

  15. Neutronic evolution of SENA reactor during the first and second cycles. Comparison between the experimental power distributions obtained from the in-core instrumentation evaluation code CIRCE and the theoretical power values computed with the two-dimensional diffusion-evolution code EVOE

    International Nuclear Information System (INIS)

    Andrieux, Chantal

    1976-03-01

    The neutronic evolution of the reacteur Sena during the first and second cycles is presented. The experimental power distributions, obtained from the in-core instrumentation evaluation code CIRCE are compared with the theoretical powers calculated with the two-dimensional diffusion-evolution code EVOE. The CIRCE code allows: the study of the evolution of the principal parameters of the core, the comparison of the results of measured and theoretical estimates. Therefore this study has a great interest for the knowledge of the neutronic evolution of the core, as well as the validation of the refinement of theoretical estimation methods. The core calculation methods and requisite data for the evaluation of the measurements are presented after a brief description of the SENA core and its inner instrumentation. The principle of the in-core instrumentation evaluation code CIRCE, and calculation of the experimental power distributions and nuclear core parameters are then exposed. The results of the evaluation are discussed, with a comparison of the theoretical and experimental results. Taking account of the approximations used, these results, as far as the first and second cycles at SENA are concerned, are satisfactory, the deviations between theoretical and experimental power distributions being lower than 3% at the middle of the reactor and 9% at the periphery [fr

  16. A FACSIMILE code for calculating void swelling and creep, with vacancy loops present: version VS4

    International Nuclear Information System (INIS)

    Windsor, M.E.; Bullough, R.; Wood, M.H.

    1981-10-01

    This FACSIMILE code calculates void swelling and creep of irradiated materials, taking into account the effects of cavities, interstitial loops, vacancy loops, dislocation network and either grain boundaries or foil surfaces. The creep calculations are based on SIPA theory (stress induced preferred absorption), with no preferred nucleation. Either interactive or non-interactive options are available for the sink strength equations, but rate limitation is not incorporated. FACSIMILE is a computer program for solving simultaneous differential equations, and this VS4 code is one of a series of codes for calculating void swelling using increasingly complex theories. Other reports describing the VS1 and VS2 codes explain their use under control of the TSO system of the Harwell IBM 3033 computer, and explain the basic organization of the codes as required for use by FACSIMILE. The creep theory assumes that the material is under a constant uniaxial tensile stress during the irradiation. Three directions are considered for network parameters relative to the direction of the stress, and two directions for interstitial and vacancy loops. To give a full picture of these various contributions to the total creep, a large set of output parameter values are printed for each demanded dose value via a FORTRAN subroutine. (author)

  17. Are only Emotional Strengths Emotional? Character Strengths and Disposition to Positive Emotions.

    Science.gov (United States)

    Güsewell, Angelika; Ruch, Willibald

    2012-07-01

    This study aimed to examine the relations between character strengths and dispositional positive emotions (i.e. joy, contentment, pride, love, compassion, amusement, and awe). A sample of 574 German-speaking adults filled in the Dispositional Positive Emotion Scales (DPES; Shiota, Keltner, & John, 2006), and the Values in Action Inventory of Strengths (VIA-IS; Peterson, Park, & Seligman, 2005). The factorial structure of the DPES was examined on item level. Joy and contentment could not be clearly separated; the items of the other five emotions loaded on separate factors. A confirmatory factor analysis assuming two latent factors (self-oriented and object/situation specific) was computed on scale level. Results confirmed the existence of these factors, but also indicated that the seven emotions did not split up into two clearly separable families. Correlations between dispositional positive emotions and character strengths were positive and generally low to moderate; a few theoretically meaningful strengths-emotions pairs yielded coefficients>.40. Finally, the link between five character strengths factors (i.e. emotional strengths, interpersonal strengths, strengths of restraint, intellectual strengths, and theological strengths) and the emotional dispositions was examined. Each of the factors displayed a distinctive "emotional pattern"; emotional strengths evidenced the most numerous and strongest links to emotional dispositions. © 2012 The Authors. Applied Psychology: Health and Well-Being © 2012 The International Association of Applied Psychology.

  18. Review of design codes of concrete encased steel short columns under axial compression

    Directory of Open Access Journals (Sweden)

    K.Z. Soliman

    2013-08-01

    Full Text Available In recent years, the use of encased steel concrete columns has been increased significantly in medium-rise or high-rise buildings. The aim of the present investigation is to assess experimentally the current methods and codes for evaluating the ultimate load behavior of concrete encased steel short columns. The current state of design provisions for composite columns from the Egyptian codes ECP203-2007 and ECP-SC-LRFD-2012, as well as, American Institute of Steel Construction, AISC-LRFD-2010, American Concrete Institute, ACI-318-2008, and British Standard BS-5400-5 was reviewed. The axial capacity portion of both the encased steel section and the concrete section was also studied according to the previously mentioned codes. Ten encased steel concrete columns have been investigated experimentally to study the effect of concrete confinement and different types of encased steel sections. The measured axial capacity of the tested ten composite columns was compared with the values calculated by the above mentioned codes. It is concluded that non-negligible discrepancies exist between codes and the experimental results as the confinement effect was not considered in predicting both the strength and ductility of concrete. The confining effect was obviously influenced by the shape of the encased steel section. The tube-shaped steel section leads to better confinement than the SIB section. Among the used codes, the ECP-SC-LRFD-2012 led to the most conservative results.

  19. On irregularity strength of disjoint union of friendship graphs

    Directory of Open Access Journals (Sweden)

    Ali Ahmad

    2013-11-01

    Full Text Available We investigate the vertex total and edge total modication of the well-known irregularity strength of graphs. We have determined the exact values of the total vertex irregularity strength and the total edge irregularity strength of a disjoint union of friendship graphs.

  20. Discussion on LDPC Codes and Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  1. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  2. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Shannon limit of the channel. Among the earliest discovered codes that approach the. Shannon limit were the low density parity check (LDPC) codes. The term low density arises from the property of the parity check matrix defining the code. We will now define this matrix and the role that it plays in decoding. 2. Linear Codes.

  3. Manually operated coded switch

    International Nuclear Information System (INIS)

    Barnette, J.H.

    1978-01-01

    The disclosure related to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made

  4. REPETITIVE STRENGTH AMONG STUDENTS OF AGE 14

    Directory of Open Access Journals (Sweden)

    Besim Halilaj

    2014-06-01

    Full Text Available The study involved 82 male students of the primary school “Qamil Ilazi” in Kaçanik-Kosovo.Four movement tests, which test the repetitive strength, were conducted: 1. Pull-up, 2. Sit-Up, 3. Back extension, 4. Push-up.The main goal of this study was to verify the actual motor status, respectively the component of the repetitive strength among students of age 14 of masculine gender. In addition to verifying the actual motor status, another objective was to verify the relationship between the variables employed.Basic statistical parameters show a distribution which is not significantly different from the normal distribution, yielded highly correlative values among the repetitive strength tests. Space factorization resulted in extracting two latent squares defined as repetitive strength of arms factor, and repetitive strength of body factor.

  5. Mapping strengths into virtues: The relation of the 24 VIA-strengths to six ubiquitous virtues

    Directory of Open Access Journals (Sweden)

    Willibald eRuch

    2015-04-01

    Full Text Available The Values-in-Action (VIA-classification distinguishes six core virtues and 24 strengths. As the assignment of the strengths to the virtues was done on theoretical grounds it still needs empirical verification. As an alternative to factor analytic investigations the present study utilizes expert judgments. In a pilot study the conceptual overlap among five sources of knowledge (strength’s name including synonyms, short definitions, brief descriptions, longer theoretical elaborations, and item content about a particular strength was examined. The results show that the five sources converged quite well, with the short definitions and the items being slightly different from the other. All strengths exceeded a cut-off value but the convergence was much better for some strengths (e.g., zest than for others (e.g., perspective. In the main study 70 experts (from psychology, philosophy, theology, etc. and 41 laypersons rated how prototypical the strengths are for each of the six virtues. The results showed that 10 were very good markers for their virtues, 9 were good markers, four were acceptable markers, and only one strength failed to reach the cut-off score for its assigned virtue. However, strengths were often markers for two or even three virtues, and occasionally they marked the other virtue more strongly than the one they were assigned to. The virtue prototypicality ratings were slightly positively correlated with higher coefficients being found for justice and humanity. A factor analysis of the 24 strengths across the ratings yielded the six factors with an only slightly different composition of strengths and double loadings. It is proposed to adjust either the classification (by reassigning strengths and by allowing strengths to be subsumed under more than one virtue or to change the definition of certain strengths so that they only exemplify one virtue. The results are discussed in the context of factor analytic attempts to verify the

  6. Coding in Muscle Disease.

    Science.gov (United States)

    Jones, Lyell K; Ney, John P

    2016-12-01

    Accurate coding is critically important for clinical practice and research. Ongoing changes to diagnostic and billing codes require the clinician to stay abreast of coding updates. Payment for health care services, data sets for health services research, and reporting for medical quality improvement all require accurate administrative coding. This article provides an overview of administrative coding for patients with muscle disease and includes a case-based review of diagnostic and Evaluation and Management (E/M) coding principles in patients with myopathy. Procedural coding for electrodiagnostic studies and neuromuscular ultrasound is also reviewed.

  7. A Realistic Model under which the Genetic Code is Optimal

    NARCIS (Netherlands)

    Buhrman, H.; van der Gulik, P.T.S.; Klau, G.W.; Schaffner, C.; Speijer, D.; Stougie, L.

    2013-01-01

    The genetic code has a high level of error robustness. Using values of hydrophobicity scales as a proxy for amino acid character, and the mean square measure as a function quantifying error robustness, a value can be obtained for a genetic code which reflects the error robustness of that code. By

  8. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  9. Neutron source strength associated with FTR fuel

    International Nuclear Information System (INIS)

    Boroughs, G.L.; Bunch, W.L.; Johnson, D.L.

    1975-01-01

    The study presented shows the important effect of shelf life on the neutron source strength anticipated from fuel irradiated in the FTR. The neutron source strength will be enhanced appreciably by extended shelf lives. High neutron source strengths will also be associated with reprocessed LWR plutonium, which is expected to contain a greater abundance of the higher isotopes. The branching ratio and cross section of 241 Am is an important parameter that needs to be defined more precisely to establish calculated values with greater precision

  10. Strength of low-carbon rotor steel

    International Nuclear Information System (INIS)

    Voropaev, V.I.; Filimonov, O.V.; Borisov, I.A.

    1988-01-01

    The results of studying the effect of chemical composition and thermal treatment regimes on the structural strength of steels of the 25KhN3MFA type are presented. It is shown that alloying with niobium from 0.01 to 0.08% steels with the increased nickel content (4.2-4.5%) contributes to the increase of structural strength and reduction of semibrittleness temperature. To obtain high values of strength and plastic properties cooling with the rate of 10 3 -10 5 K/hr is recommended

  11. Burst strength of tubing and casing based on twin shear unified strength theory.

    Science.gov (United States)

    Lin, Yuanhua; Deng, Kuanhai; Sun, Yongxing; Zeng, Dezhi; Liu, Wanying; Kong, Xiangwei; Singh, Ambrish

    2014-01-01

    The internal pressure strength of tubing and casing often cannot satisfy the design requirements in high pressure, high temperature and high H2S gas wells. Also, the practical safety coefficient of some wells is lower than the design standard according to the current API 5C3 standard, which brings some perplexity to the design. The ISO 10400: 2007 provides the model which can calculate the burst strength of tubing and casing better than API 5C3 standard, but the calculation accuracy is not desirable because about 50 percent predictive values are remarkably higher than real burst values. So, for the sake of improving strength design of tubing and casing, this paper deduces the plastic limit pressure of tubing and casing under internal pressure by applying the twin shear unified strength theory. According to the research of the influence rule of yield-to-tensile strength ratio and mechanical properties on the burst strength of tubing and casing, the more precise calculation model of tubing-casing's burst strength has been established with material hardening and intermediate principal stress. Numerical and experimental comparisons show that the new burst strength model is much closer to the real burst values than that of other models. The research results provide an important reference to optimize the tubing and casing design of deep and ultra-deep wells.

  12. Study on creep of fiber reinforced ultra-high strength concrete based on strength

    Science.gov (United States)

    Peng, Wenjun; Wang, Tao

    2018-04-01

    To complement the creep performance of ultra-high strength concrete, the long creep process of fiber reinforced concrete was studied in this paper. The long-term creep process and regularity of ultra-high strength concrete with 0.5% PVA fiber under the same axial compression were analyzed by using concrete strength (C80/C100/C120) as a variable. The results show that the creep coefficient of ultra-high strength concrete decreases with the increase of concrete strength. Compared with ACI209R (92), GL2000 models, it is found that the predicted value of ACI209R (92) are close to the experimental value, and the creep prediction model suitable for this experiment is proposed based on ACI209R (92).

  13. Implatation of MC2 computer code

    International Nuclear Information System (INIS)

    Seehusen, J.; Nair, R.P.K.; Becceneri, J.C.

    1981-01-01

    The implantation of MC2 computer code in the CDC system is presented. The MC2 computer code calculates multigroup cross sections for tipical compositions of fast reactors. The multigroup constants are calculated using solutions of PI or BI approximations for determined buckling value as weighting function. (M.C.K.) [pt

  14. GESDATA: A failure-data management code

    International Nuclear Information System (INIS)

    Garcia Gay, J.; Francia Gonzalez, L.; Ortega Prieto, P.; Mira McWilliams, J.; Aguinaga Zapata, M.

    1987-01-01

    GESDATA is a failure data management code for both qualitative and quantitative fault-tree evaluation. Data management using the code should provide the analyst, in the quickest and easiest way, with the reliability data which constitute the input values for fault-tree evaluation programs. (orig./HSCH)

  15. Recent improvements to TRIGLAV code

    International Nuclear Information System (INIS)

    Zagar, T.; Ravnik, M.; Persic, A.

    1998-01-01

    TRIGLAV code was developed for TRIGA research reactor calculations and is based on two-dimensional diffusion equation. The main purpose of the program is calculation of the fuel elements burn-up. Calculated core burn-up and excess reactivity results are compared with experimental values. New control rod model is introduced and tested in this paper. Calculated integral control rod worth and calculated integral reactivity curves are presented and compared with measured values. Comparison with measured fuel element worth values is presented as a test for two-dimensional flux distribution calculations.(author)

  16. Codes and curves

    CERN Document Server

    Walker, Judy L

    2000-01-01

    When information is transmitted, errors are likely to occur. Coding theory examines efficient ways of packaging data so that these errors can be detected, or even corrected. The traditional tools of coding theory have come from combinatorics and group theory. Lately, however, coding theorists have added techniques from algebraic geometry to their toolboxes. In particular, by re-interpreting the Reed-Solomon codes, one can see how to define new codes based on divisors on algebraic curves. For instance, using modular curves over finite fields, Tsfasman, Vladut, and Zink showed that one can define a sequence of codes with asymptotically better parameters than any previously known codes. This monograph is based on a series of lectures the author gave as part of the IAS/PCMI program on arithmetic algebraic geometry. Here, the reader is introduced to the exciting field of algebraic geometric coding theory. Presenting the material in the same conversational tone of the lectures, the author covers linear codes, inclu...

  17. RELAP5/MOD3 code manual: Summaries and reviews of independent code assessment reports. Volume 7, Revision 1

    International Nuclear Information System (INIS)

    Moore, R.L.; Sloan, S.M.; Schultz, R.R.; Wilson, G.E.

    1996-10-01

    Summaries of RELAP5/MOD3 code assessments, a listing of the assessment matrix, and a chronology of the various versions of the code are given. Results from these code assessments have been used to formulate a compilation of some of the strengths and weaknesses of the code. These results are documented in the report. Volume 7 was designed to be updated periodically and to include the results of the latest code assessments as they become available. Consequently, users of Volume 7 should ensure that they have the latest revision available

  18. TECHNO-ECONOMIC ANALYSIS IN A SUPERSTRUCTURE OF A MULTIPLE FLOORS BUILDING (THREE, FIVE, SEVEN AND NINE FLOORS IN REINFORCED CONCRETE AND RIBBED SLABS WITH RECTANGULAR FORM AND DIFFERENT COMPRESSIVE STRENGTH VALUES

    Directory of Open Access Journals (Sweden)

    E. F. S. Moraes

    2017-12-01

    Full Text Available Adapting “fck" values between 25 MPa to 40 MPa, in three, five, seven and nine floor buildings for places under winds of up to 30 m/s, this research calculated the cost and inputs of these variations. The results have as a goal to improve multiple floors building design in reinforced concrete and ribbed slabs, and to contribute to economic gains. The results were analysed in five stages. (I Architectural design definition in a 1:1 proportion, (II structural conception, (III structural design, (IV cost composition and (V techno economic parameters. To sum up, the results showed that lower “fck” has presented more viability to few flooring. In addition, with the increase of floors also the “fck” raised, causing higher cost around 16,54% in the beams and 11,16% in the slabs. Moreover, the pillars showed a saving of 28,89% in the cost, ranging by up to 11,93% in the average thickness and 6,29% in the concrete form expenditure per m³. Therefore, the research showed an economic achievement of 5,14% in the overall cost between the number of floor.

  19. Tensile strength of glulam laminations of Nordic spruce

    DEFF Research Database (Denmark)

    Hoffmeyer, Preben; Bräuner, Lise; Boström, Lars

    1999-01-01

    Design of glulam according to the European timber code Eurocode 5 is based on the standard document prEN1194 , according to which glulam beam strength is to be established either by full scale testing or by calculation. The calculation must be based on a knowledge of lamination tensile strength....... This knowledge may be obtained either by adopting a general rule that the characteristic tensile strength is sixty percent of the characteristic bending strength, or by performing tensile tests on an adequate number of laminations representative of the whole population. The present paper presents...... an investigation aimed at establishing such an adequate experimental background for the assignment of strength classes for glulam made of visually strength graded laminations from Nordic sawmills. The investigation includes more than 1800 boards (laminations) of Norway spruce (Picea abies) sampled from eight...

  20. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    This essay studies the source code of an artwork from a software studies perspective. By examining code that come close to the approach of critical code studies (Marino, 2006), I trace the network artwork, Pupufu (Lin, 2009) to understand various real-time approaches to social media platforms (MSN......, Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  1. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  2. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    Sacramento, A.M. do.

    1989-01-01

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  3. Code Package to Analyze Parameters of the WWER Fuel Rod. TOPRA-2 Code - Verification Data

    International Nuclear Information System (INIS)

    Scheglov, A.; Proselkov, V.; Passage, G.; Stefanova, S.

    2009-01-01

    Presented are the data for computer codes to analyze WWER fuel rods, used in the WWER department of RRC 'Kurchatov Institute'. Presented is the description of TOPRA-2 code intended for the engineering analysis of thermophysical and strength parameters of the WWER fuel rod - temperature distributions along the fuel radius, gas pressures under the cladding, stresses in the cladding, etc. for the reactor operation in normal conditions. Presented are some results of the code verification against test problems and the data obtained in the experimental programs. Presented are comparison results of the calculations with TOPRA-2 and TRANSURANUS (V1M1J06) codes. Results obtained in the course of verification demonstrate possibility of application of the methodology and TOPRA-2 code for the engineering analysis of the WWER fuel rods

  4. Synthesizing Certified Code

    OpenAIRE

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach for formally demonstrating software quality. Its basic idea is to require code producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates that can be checked independently. Since code certification uses the same underlying technology as program verification, it requires detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding annotations to th...

  5. FERRET data analysis code

    International Nuclear Information System (INIS)

    Schmittroth, F.

    1979-09-01

    A documentation of the FERRET data analysis code is given. The code provides a way to combine related measurements and calculations in a consistent evaluation. Basically a very general least-squares code, it is oriented towards problems frequently encountered in nuclear data and reactor physics. A strong emphasis is on the proper treatment of uncertainties and correlations and in providing quantitative uncertainty estimates. Documentation includes a review of the method, structure of the code, input formats, and examples

  6. Stylize Aesthetic QR Code

    OpenAIRE

    Xu, Mingliang; Su, Hao; Li, Yafei; Li, Xi; Liao, Jing; Niu, Jianwei; Lv, Pei; Zhou, Bing

    2018-01-01

    With the continued proliferation of smart mobile devices, Quick Response (QR) code has become one of the most-used types of two-dimensional code in the world. Aiming at beautifying the appearance of QR codes, existing works have developed a series of techniques to make the QR code more visual-pleasant. However, these works still leave much to be desired, such as visual diversity, aesthetic quality, flexibility, universal property, and robustness. To address these issues, in this paper, we pro...

  7. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  8. Effect of shear span, concrete strength and strrup spacing on behavior of pre-stressed concrete beams

    International Nuclear Information System (INIS)

    Ahmad, S.; Bukhari, I.A.

    2007-01-01

    The shear strength of pre-stressed concrete beams is one of the most important factors to be considered in their design. The available data on shear behavior of pre-tensioned prestressed concrete beams is very limited. In this experimental study, pre-tensioned prestressed concrete I-beams are fabricated with normal and high- strength concretes, varying stirrup spacing and shear span-to-depth ratios. 1Wenty one I-beam specimens that are 300 mm deep and 3745-4960mm long are tested up to failure while deflections, cracking pattern, cracking and failure loads were recorded. The research results are compared with ACI 318-02 and Structure Analysis Program, Response 2000. It was observed that with the decrease in concrete strength, failure mode of prestressed concrete beams changes from flexure shear to web shear cracking for values of shear span-to-depth ratio less than 4.75. Increase in stirrup spacing decreased the effectiveness of stirrups in transmitting shear across crack as a result of which failure mode is changed to web shear cracking especially for beams with lower values of shear span-to-depth ratios. ACI code underestimates the shear carrying capacity of prestressed concrete beams with lower values of shear span- to-depth ratios. Response 2000 can be used more effectively in predicting shear behavior of normal strength prestressed concrete beams. (author)

  9. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded...

  10. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  11. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  12. Structural reliability codes for probabilistic design

    DEFF Research Database (Denmark)

    Ditlevsen, Ove Dalager

    1997-01-01

    probabilistic code format has not only strong influence on the formal reliability measure, but also on the formal cost of failure to be associated if a design made to the target reliability level is considered to be optimal. In fact, the formal cost of failure can be different by several orders of size for two...... different, but by and large equally justifiable probabilistic code formats. Thus, the consequence is that a code format based on decision theoretical concepts and formulated as an extension of a probabilistic code format must specify formal values to be used as costs of failure. A principle of prudence...... is suggested for guiding the choice of the reference probabilistic code format for constant reliability. In the author's opinion there is an urgent need for establishing a standard probabilistic reliability code. This paper presents some considerations that may be debatable, but nevertheless point...

  13. Code Samples Used for Complexity and Control

    Science.gov (United States)

    Ivancevic, Vladimir G.; Reid, Darryn J.

    2015-11-01

    The following sections are included: * MathematicaⓇ Code * Generic Chaotic Simulator * Vector Differential Operators * NLS Explorer * 2C++ Code * C++ Lambda Functions for Real Calculus * Accelerometer Data Processor * Simple Predictor-Corrector Integrator * Solving the BVP with the Shooting Method * Linear Hyperbolic PDE Solver * Linear Elliptic PDE Solver * Method of Lines for a Set of the NLS Equations * C# Code * Iterative Equation Solver * Simulated Annealing: A Function Minimum * Simple Nonlinear Dynamics * Nonlinear Pendulum Simulator * Lagrangian Dynamics Simulator * Complex-Valued Crowd Attractor Dynamics * Freeform Fortran Code * Lorenz Attractor Simulator * Complex Lorenz Attractor * Simple SGE Soliton * Complex Signal Presentation * Gaussian Wave Packet * Hermitian Matrices * Euclidean L2-Norm * Vector/Matrix Operations * Plain C-Code: Levenberg-Marquardt Optimizer * Free Basic Code: 2D Crowd Dynamics with 3000 Agents

  14. Development of K-Basin High-Strength Homogeneous Sludge Simulants and Correlations Between Unconfined Compressive Strength and Shear Strength

    Energy Technology Data Exchange (ETDEWEB)

    Onishi, Yasuo; Baer, Ellen BK; Chun, Jaehun; Yokuda, Satoru T.; Schmidt, Andrew J.; Sande, Susan; Buchmiller, William C.

    2011-02-20

    K-Basin sludge will be stored in the Sludge Transport and Storage Containers (STSCs) at an interim storage location on Central Plateau before being treated and packaged for disposal. During the storage period, sludge in the STSCs may consolidate/agglomerate, potentially resulting in high-shear-strength material. The Sludge Treatment Project (STP) plans to use water jets to retrieve K-Basin sludge after the interim storage. STP has identified shear strength to be a key parameter that should be bounded to verify the operability and performance of sludge retrieval systems. Determining the range of sludge shear strength is important to gain high confidence that a water-jet retrieval system can mobilize stored K-Basin sludge from the STSCs. The shear strength measurements will provide a basis for bounding sludge properties for mobilization and erosion. Thus, it is also important to develop potential simulants to investigate these phenomena. Long-term sludge storage tests conducted by Pacific Northwest National Laboratory (PNNL) show that high-uranium-content K-Basin sludge can self-cement and form a strong sludge with a bulk shear strength of up to 65 kPa. Some of this sludge has 'paste' and 'chunks' with shear strengths of approximately 3-5 kPa and 380-770 kPa, respectively. High-uranium-content sludge samples subjected to hydrothermal testing (e.g., 185 C, 10 hours) have been observed to form agglomerates with a shear strength up to 170 kPa. These high values were estimated by measured unconfined compressive strength (UCS) obtained with a pocket penetrometer. Due to its ease of use, it is anticipated that a pocket penetrometer will be used to acquire additional shear strength data from archived K-Basin sludge samples stored at the PNNL Radiochemical Processing Laboratory (RPL) hot cells. It is uncertain whether the pocket penetrometer provides accurate shear strength measurements of the material. To assess the bounding material strength and

  15. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  16. Strength of Fibrous Composites

    CERN Document Server

    Huang, Zheng-Ming

    2012-01-01

    "Strength of Fibrous Composites" addresses evaluation of the strength of a fibrous composite by using its constituent material properties and its fiber architecture parameters. Having gone through the book, a reader is able to predict the progressive failure behavior and ultimate strength of a fibrous laminate subjected to an arbitrary load condition in terms of the constituent fiber and matrix properties, as well as fiber geometric parameters. The book is useful to researchers and engineers working on design and analysis for composite materials. Dr. Zheng-Ming Huang is a professor at the School of Aerospace Engineering & Applied Mechanics, Tongji University, China. Mr. Ye-Xin Zhou is a PhD candidate at the Department of Mechanical Engineering, the University of Hong Kong, China.

  17. An Implementation Of Elias Delta Code And ElGamal Algorithm In Image Compression And Security

    Science.gov (United States)

    Rachmawati, Dian; Andri Budiman, Mohammad; Saffiera, Cut Amalia

    2018-01-01

    In data transmission such as transferring an image, confidentiality, integrity, and efficiency of data storage aspects are highly needed. To maintain the confidentiality and integrity of data, one of the techniques used is ElGamal. The strength of this algorithm is found on the difficulty of calculating discrete logs in a large prime modulus. ElGamal belongs to the class of Asymmetric Key Algorithm and resulted in enlargement of the file size, therefore data compression is required. Elias Delta Code is one of the compression algorithms that use delta code table. The image was first compressed using Elias Delta Code Algorithm, then the result of the compression was encrypted by using ElGamal algorithm. Prime test was implemented using Agrawal Biswas Algorithm. The result showed that ElGamal method could maintain the confidentiality and integrity of data with MSE and PSNR values 0 and infinity. The Elias Delta Code method generated compression ratio and space-saving each with average values of 62.49%, and 37.51%.

  18. High strength alloys

    Science.gov (United States)

    Maziasz, Phillip James [Oak Ridge, TN; Shingledecker, John Paul [Knoxville, TN; Santella, Michael Leonard [Knoxville, TN; Schneibel, Joachim Hugo [Knoxville, TN; Sikka, Vinod Kumar [Oak Ridge, TN; Vinegar, Harold J [Bellaire, TX; John, Randy Carl [Houston, TX; Kim, Dong Sub [Sugar Land, TX

    2010-08-31

    High strength metal alloys are described herein. At least one composition of a metal alloy includes chromium, nickel, copper, manganese, silicon, niobium, tungsten and iron. System, methods, and heaters that include the high strength metal alloys are described herein. At least one heater system may include a canister at least partially made from material containing at least one of the metal alloys. At least one system for heating a subterranean formation may include a tubular that is at least partially made from a material containing at least one of the metal alloys.

  19. Hand grip strength

    DEFF Research Database (Denmark)

    Frederiksen, Henrik; Gaist, David; Petersen, Hans Christian

    2002-01-01

    in life is a major problem in terms of prevalence, morbidity, functional limitations, and quality of life. It is therefore of interest to find a phenotype reflecting physical functioning which has a relatively high heritability and which can be measured in large samples. Hand grip strength is known......-55%). A powerful design to detect genes associated with a phenotype is obtained using the extreme discordant and concordant sib pairs, of whom 28 and 77 dizygotic twin pairs, respectively, were found in this study. Hence grip strength is a suitable phenotype for identifying genetic variants of importance to mid...

  20. Pinch Strengths in Healthy Iranian Children and Young Adult Population

    Directory of Open Access Journals (Sweden)

    Iman Dianat

    2015-03-01

    Full Text Available Background: Data on the physical strength capabilities are essential for design-ing safe and usable products and are useful in a wide range of clinical settings especially during treatment of disease affecting the function of the hand. The purpose of this study was to determine peak lateral pinch strength, key pinch strength, tip-to-tip pinch strength and three-jaw pinch strength exertions in a healthy Iranian children and young adult population.Methods: The study was conducted among 511 participants (242 males and 269 females aged 7-30 years. Measurements were carried out with both dominant and non-dominant hands in standard sitting posture using a B&L pinch gauge. Two repetitions of each strength measurement were recorded for each condition and the average value of the two trials was used in the subsequent analysis.Results: The results showed significant differences in the pinch strength data in terms of the age, gender and hand dominance. The lateral pinch strength, key pinch strength, tip-to-tip pinch strength and three-jaw pinch strength exertions by females were 68.4%, 68.8%, 78.8% and 81.8% of those exerted by males, respectively. Strength exertions with the non-dominant hand were 6.4%, 5.2%, 6.6% and 5.1% lower than strength exertions of the dominant hand for the lat-eral pinch strength, key pinch strength, tip-to-tip pinch strength and three-jaw pinch strength exertions, respectively.Conclusion: These findings can be used to fill the gaps in strength data for Iranian population.

  1. The network code

    International Nuclear Information System (INIS)

    1997-01-01

    The Network Code defines the rights and responsibilities of all users of the natural gas transportation system in the liberalised gas industry in the United Kingdom. This report describes the operation of the Code, what it means, how it works and its implications for the various participants in the industry. The topics covered are: development of the competitive gas market in the UK; key points in the Code; gas transportation charging; impact of the Code on producers upstream; impact on shippers; gas storage; supply point administration; impact of the Code on end users; the future. (20 tables; 33 figures) (UK)

  2. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  3. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  4. XSOR codes users manual

    International Nuclear Information System (INIS)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  5. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    1999-01-01

    The present lecture has a main goal to show how the transport lattice calculations are realised in a standard computer code. This is illustrated on the example of the WIMSD code, belonging to the most popular tools for reactor calculations. Most of the approaches discussed here can be easily modified to any other lattice code. The description of the code assumes the basic knowledge of reactor lattice, on the level given in the lecture on 'Reactor lattice transport calculations'. For more advanced explanation of the WIMSD code the reader is directed to the detailed descriptions of the code cited in References. The discussion of the methods and models included in the code is followed by the generally used homogenisation procedure and several numerical examples of discrepancies in calculated multiplication factors based on different sources of library data. (author)

  6. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  7. Value reprioritization in psychoanalysis.

    Science.gov (United States)

    Horowitz, Mardi J

    2009-12-01

    As psychoanalysts, we sometimes seem to regard values as radioactive materials that must be handled with heavy lead gloves. But the gloves should not be so thick that they interfere with the goal of sorting out values. Reasons for our hesitation to deal with issues related to values may include real disagreements with the morals of a patient, a fear of evoking unproductive and negative emotional states, and our own unresolved conflicts about value dilemmas. Psychoanalytic technique should at times include clear verbal statements of values. By being explicit about what is often implicit, we can help our patients in their work of ameliorating harsh, primitive, and critical attitudes and to self-own rules, principles, and codes of conduct. A patient with reprioritized personal values may then function with heightened interpersonal compassion, kindness, and cooperation, gaining in return love, intimacy, respect, and self-esteem.

  8. Probe tests microweld strength

    Science.gov (United States)

    1965-01-01

    Probe is developed to test strength of soldered, brazed or microwelded joints. It consists of a spring which may be adjusted to the desired test pressure by means of a threaded probe head, and an indicator lamp. Device may be used for electronic equipment testing.

  9. Acute Effects of Partial-Body Cryotherapy on Isometric Strength: Maximum Handgrip Strength Evaluation.

    Science.gov (United States)

    De Nardi, Massimo; Pizzigalli, Luisa; Benis, Roberto; Caffaro, Federica; Micheletti Cremasco, Margherita

    2017-12-01

    De Nardi, M, Pizzigalli, L, Benis, R, Caffaro, F, and Cremasco, MM. Acute effects of partial-body cryotherapy on isometric strength: maximum handgrip strength evaluation. J Strength Cond Res 31(12): 3497-3502, 2017-The aim of the study was to evaluate the influence of a single partial-body cryotherapy (PBC) session on the maximum handgrip strength (JAMAR Hydraulic Hand dynamometer). Two hundred healthy adults were randomized into a PBC group and a control group (50 men and 50 women in each group). After the initial handgrip strength test (T0), the experimental group performed a 150-second session of PBC (temperature range between -130 and -160° C), whereas the control group stayed in a thermo neutral room (22.0 ± 0.5° C). Immediately after, both groups performed another handgrip strength test (T1). Data underlined that both groups showed an increase in handgrip strength values, especially the experimental group (Control: T0 = 39.48 kg, T1 = 40.01 kg; PBC: T0 = 39.61 kg, T1 = 41.34 kg). The analysis also reported a statistical effect related to gender (F = 491.99, P ≤ 0.05), with women showing lower handgrip strength values compared with men (women = 30.43 kg, men = 52.27 kg). Findings provide the first evidence that a single session of PBC leads to the improvement of muscle strength in healthy people. The results of the study imply that PBC could be performed also before a training session or a sport competition, to increase hand isometric strength.

  10. Public Values

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Rutgers, Mark R.

    2015-01-01

    administration is approached in terms of processes guided or restricted by public values and as public value creating: public management and public policy-making are both concerned with establishing, following and realizing public values. To study public values a broad perspective is needed. The article suggest......This article provides the introduction to a symposium on contemporary public values research. It is argued that the contribution to this symposium represent a Public Values Perspective, distinct from other specific lines of research that also use public value as a core concept. Public...... a research agenda for this encompasing kind of public values research. Finally the contributions to the symposium are introduced....

  11. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  12. Got LEGO Bricks? Children with Spatial Strengths

    Science.gov (United States)

    Mann, Rebecca

    2013-01-01

    Individuals with spatial strengths have preferences for visual ideation, holistic reasoning, and innovation. With the emphasis on verbal skills, American schools rarely provide opportunities for children to excel in these areas. Standardized assessments used to judge achievement do not value reflective thinking and innovation; therefore, students…

  13. An Optimal Linear Coding for Index Coding Problem

    OpenAIRE

    Pezeshkpour, Pouya

    2015-01-01

    An optimal linear coding solution for index coding problem is established. Instead of network coding approach by focus on graph theoric and algebraic methods a linear coding program for solving both unicast and groupcast index coding problem is presented. The coding is proved to be the optimal solution from the linear perspective and can be easily utilize for any number of messages. The importance of this work is lying mostly on the usage of the presented coding in the groupcast index coding ...

  14. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  15. Majorana fermion codes

    International Nuclear Information System (INIS)

    Bravyi, Sergey; Terhal, Barbara M; Leemhuis, Bernhard

    2010-01-01

    We initiate the study of Majorana fermion codes (MFCs). These codes can be viewed as extensions of Kitaev's one-dimensional (1D) model of unpaired Majorana fermions in quantum wires to higher spatial dimensions and interacting fermions. The purpose of MFCs is to protect quantum information against low-weight fermionic errors, that is, operators acting on sufficiently small subsets of fermionic modes. We examine to what extent MFCs can surpass qubit stabilizer codes in terms of their stability properties. A general construction of 2D MFCs is proposed that combines topological protection based on a macroscopic code distance with protection based on fermionic parity conservation. Finally, we use MFCs to show how to transform any qubit stabilizer code to a weakly self-dual CSS code.

  16. Theory of epigenetic coding.

    Science.gov (United States)

    Elder, D

    1984-06-07

    The logic of genetic control of development may be based on a binary epigenetic code. This paper revises the author's previous scheme dealing with the numerology of annelid metamerism in these terms. Certain features of the code had been deduced to be combinatorial, others not. This paradoxical contrast is resolved here by the interpretation that these features relate to different operations of the code; the combinatiorial to coding identity of units, the non-combinatorial to coding production of units. Consideration of a second paradox in the theory of epigenetic coding leads to a new solution which further provides a basis for epimorphic regeneration, and may in particular throw light on the "regeneration-duplication" phenomenon. A possible test of the model is also put forward.

  17. DISP1 code

    International Nuclear Information System (INIS)

    Vokac, P.

    1999-12-01

    DISP1 code is a simple tool for assessment of the dispersion of the fission product cloud escaping from a nuclear power plant after an accident. The code makes it possible to tentatively check the feasibility of calculations by more complex PSA3 codes and/or codes for real-time dispersion calculations. The number of input parameters is reasonably low and the user interface is simple enough to allow a rapid processing of sensitivity analyses. All input data entered through the user interface are stored in the text format. Implementation of dispersion model corrections taken from the ARCON96 code enables the DISP1 code to be employed for assessment of the radiation hazard within the NPP area, in the control room for instance. (P.A.)

  18. Phonological coding during reading.

    Science.gov (United States)

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  19. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  20. Coding training for medical students: How good is diagnoses coding with ICD-10 by novices?

    Directory of Open Access Journals (Sweden)

    Stausberg, Jürgen

    2005-04-01

    Full Text Available Teaching of knowledge and competence in documentation and coding is an essential part of medical education. Therefore, coding training had been placed within the course of epidemiology, medical biometry, and medical informatics. From this, we can draw conclusions about the quality of coding by novices. One hundred and eighteen students coded diagnoses from 15 nephrological cases in homework. In addition to interrater reliability, validity was calculated by comparison with a reference coding. On the level of terminal codes, 59.3% of the students' results were correct. The completeness was calculated as 58.0%. The results on the chapter level increased up to 91.5% and 87.7% respectively. For the calculation of reliability a new, simple measure was developed that leads to values of 0.46 on the level of terminal codes and 0.87 on the chapter level for interrater reliability. The figures of concordance with the reference coding are quite similar. In contrary, routine data show considerably lower results with 0.34 and 0.63 respectively. Interrater reliability and validity of coding by novices is as good as coding by experts. The missing advantage of experts could be explained by the workload of documentation and a negative attitude to coding on the one hand. On the other hand, coding in a DRG-system is handicapped by a large number of detailed coding rules, which do not end in uniform results but rather lead to wrong and random codes. Anyway, students left the course well prepared for coding.

  1. Determination of giant resonance strengths

    International Nuclear Information System (INIS)

    Serr, F.E.

    1983-01-01

    Using theoretical strength functions to describe the different giant resonances expected at excitation energies of the order of (60-85)/Asup(1/3) MeV, we calculate the double differential cross sections d 2 sigma/dΩ dE associated with the reactions 208 Pb(α, α') and 90 Zr(α, α') (Esub(α) = 152 MeV). The angular distributions for the giant quadrupole and giant monopole resonances obtained from fits to these spectra, making simple, commonly used assumptions for the peak shapes and background, are compared to the original angular distributions. The differences between them are an indication of some of the uncertainties affecting the giant resonance strengths extracted from hadron inelastic scattering data. Fits to limited angular regions lead to errors of up to 50% in the value of the energy-weighted sum rule, depending on the angles examined. While it seems possible to extract the correct EWSR for the GMR by carrying out the analyses at 0 0 , no single privileged angle seems to exist in the case of the GQR. (orig.)

  2. A Code of Ethics for Democratic Leadership

    Science.gov (United States)

    Molina, Ricardo; Klinker, JoAnn Franklin

    2012-01-01

    Democratic leadership rests on sacred values, awareness, judgement, motivation and courage. Four turning points in a 38-year school administrator's career revealed decision-making in problematic moments stemmed from values in a personal and professional code of ethics. Reflection on practice and theory added vocabulary and understanding to make…

  3. MORSE Monte Carlo code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described

  4. Tokamak Systems Code

    International Nuclear Information System (INIS)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  5. Corium crust strength measurements

    Energy Technology Data Exchange (ETDEWEB)

    Lomperski, S. [Argonne National Laboratory, 9700 S. Cass Avenue, Argonne, IL 60439-4840 (United States)], E-mail: lomperski@anl.gov; Farmer, M.T. [Argonne National Laboratory, 9700 S. Cass Avenue, Argonne, IL 60439-4840 (United States)], E-mail: farmer@anl.gov

    2009-11-15

    Corium strength is of interest in the context of a severe reactor accident in which molten core material melts through the reactor vessel and collects on the containment basemat. Some accident management strategies involve pouring water over the melt to solidify it and halt corium/concrete interactions. The effectiveness of this method could be influenced by the strength of the corium crust at the interface between the melt and coolant. A strong, coherent crust anchored to the containment walls could allow the yet-molten corium to fall away from the crust as it erodes the basemat, thereby thermally decoupling the melt from the coolant and sharply reducing the cooling rate. This paper presents a diverse collection of measurements of the mechanical strength of corium. The data is based on load tests of corium samples in three different contexts: (1) small blocks cut from the debris of the large-scale MACE experiments, (2) 30 cm-diameter, 75 kg ingots produced by SSWICS quench tests, and (3) high temperature crusts loaded during large-scale corium/concrete interaction (CCI) tests. In every case the corium consisted of varying proportions of UO{sub 2}, ZrO{sub 2}, and the constituents of concrete to represent a LWR melt at different stages of a molten core/concrete interaction. The collection of data was used to assess the strength and stability of an anchored, plant-scale crust. The results indicate that such a crust is likely to be too weak to support itself above the melt. It is therefore improbable that an anchored crust configuration could persist and the melt become thermally decoupled from the water layer to restrict cooling and prolong an attack of the reactor cavity concrete.

  6. Good governance: Performance values and procedural values in conflict

    NARCIS (Netherlands)

    de Graaf, G.; Paanakker, H.L.

    2015-01-01

    Good governance codes usually end with a list of public values no one could oppose. A recurrent issue is that not all of these values—however desirable they are—can be achieved at the same time. With its focus on performance and procedural values of governance, this article zooms in on the conflict

  7. NR-code: Nonlinear reconstruction code

    Science.gov (United States)

    Yu, Yu; Pen, Ue-Li; Zhu, Hong-Ming

    2018-04-01

    NR-code applies nonlinear reconstruction to the dark matter density field in redshift space and solves for the nonlinear mapping from the initial Lagrangian positions to the final redshift space positions; this reverses the large-scale bulk flows and improves the precision measurement of the baryon acoustic oscillations (BAO) scale.

  8. Strength capability while kneeling.

    Science.gov (United States)

    Haslegrave, C M; Tracy, M F; Corlett, E N

    1997-12-01

    Work sometimes has to be carried out kneeling, particularly where jobs are performed in confined spaces as is common for miners, aircraft baggage handlers and maintenance workers. In order to assess the risks in performing forceful tasks under such conditions, data is needed on strength capabilities of kneeling subjects. A study was undertaken to measure isometric strength in single-handed exertions for male subjects and to investigate the effects on this of task layout factors (direction of force exertion, reach distance, height of the workpiece and orientation relative to the subject's sagittal plane). The data has been tabulated to show the degree to which strength may be reduced in different situations and analysis of the task factors showed their influence to be complex with direction of exertion and reach distance having the greatest effect. The results also suggest that exertions are weaker when subjects are kneeling on two knees than when kneeling on one knee, although this needs to be confirmed by direct experimental comparison.

  9. Swimbladder on Fish Target Strength

    Directory of Open Access Journals (Sweden)

    Sunardi

    2008-08-01

    Full Text Available This paper discusses of target strength (TS for the Selar boops (Oxeye scad and Megalaspis cordyla (Torpedo scad, the most commercially fish in Malaysia. TS can be determined from in situ measurements and acoustic calculation of fish model. TS value, depth, and position (x-y-z of targeted fish can be viewed from echogram using FQ-80 Analyzer by in situ measurement. X-ray imaged can be deployed to develop the acoustic fish model. The percentage of length and upper surface area for swimbladder to body fish of Selar boops more than Megalaspis cordyla can be measured after X-ray process. The percentage of width and volume of swimbladders to its each body are no significantly difference for both fish. These data of swimbladder physic support the result of in situ measurement which TS of Megalaspis cordyla stronger Selar boops.

  10. New features in the design code TLIE

    International Nuclear Information System (INIS)

    van Zeijts, J.

    1993-01-01

    We present features recently installed in the arbitrary-order accelerator design code TLIE. The code uses the MAD input language, and implements programmable extensions modeled after the C language that make it a powerful tool in a wide range of applications: from basic beamline design to high precision-high order design and even control room applications. The basic quantities important in accelerator design are easily accessible from inside the control language. Entities like parameters in elements (strength, current), transfer maps (either in Taylor series or in Lie algebraic form), lines, and beams (either as sets of particles or as distributions) are among the type of variables available. These variables can be set, used as arguments in subroutines, or just typed out. The code is easily extensible with new datatypes

  11. Self-perceived strengths among people who are homeless.

    Science.gov (United States)

    Tweed, Roger G; Biswas-Diener, Robert; Lehman, Darrin R

    2012-11-01

    This study examined self-perceived strengths among 116 people who were homeless. Those who had experienced a longer period of current homelessness tended to report fewer personal strengths (r = -0.23). Nonetheless, in spite of their marginalized position in society, the vast majority of participants (114 out of 116) perceived personal strengths. A prior diagnosis with mental illness was not associated with the number of strengths reported, but self-perception of strengths was associated with altruistic orientation. The Values in Action (VIA) taxonomy of character strengths captured many of the responses generated by this population. The most frequently mentioned character categories included social intelligence, kindness, persistence, authenticity and humour. The most frequently mentioned other strengths included personal skills (e.g. music, sports), job skills, intelligence and education. The results have relevance for efforts to build self-perceptions that facilitate escape from homelessness.

  12. General Sentiment and Value

    DEFF Research Database (Denmark)

    Arvidsson, Adam; Etter, Michael; Colleoni, Elanor

    The aim of this paper is to deepen the understanding of the relationship between corporate reputation and financial value. Theories as the resource based view or the contractual view lie ground for the assumption of a linear positive correlation between reputation and financial performance. However......, existing empirical studies have provided conflicting results regarding the direction and strength of this relationship so far. In this paper we claim that the assumption of a direct linear correlation between corporate reputation and financial value misrepresents current financial practices...

  13. Optimal estimation of the optomechanical coupling strength

    Science.gov (United States)

    Bernád, József Zsolt; Sanavio, Claudio; Xuereb, André

    2018-06-01

    We apply the formalism of quantum estimation theory to obtain information about the value of the nonlinear optomechanical coupling strength. In particular, we discuss the minimum mean-square error estimator and a quantum Cramér-Rao-type inequality for the estimation of the coupling strength. Our estimation strategy reveals some cases where quantum statistical inference is inconclusive and merely results in the reinforcement of prior expectations. We show that these situations also involve the highest expected information losses. We demonstrate that interaction times on the order of one time period of mechanical oscillations are the most suitable for our estimation scenario, and compare situations involving different photon and phonon excitations.

  14. Continuous Non-malleable Codes

    DEFF Research Database (Denmark)

    Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus

    2014-01-01

    or modify it to the encoding of a completely unrelated value. This paper introduces an extension of the standard non-malleability security notion - so-called continuous non-malleability - where we allow the adversary to tamper continuously with an encoding. This is in contrast to the standard notion of non...... is necessary to achieve continuous non-malleability in the split-state model. Moreover, we illustrate that none of the existing constructions satisfies our uniqueness property and hence is not secure in the continuous setting. We construct a split-state code satisfying continuous non-malleability. Our scheme...... is based on the inner product function, collision-resistant hashing and non-interactive zero-knowledge proofs of knowledge and requires an untamperable common reference string. We apply continuous non-malleable codes to protect arbitrary cryptographic primitives against tampering attacks. Previous...

  15. Dopamine reward prediction error coding.

    Science.gov (United States)

    Schultz, Wolfram

    2016-03-01

    Reward prediction errors consist of the differences between received and predicted rewards. They are crucial for basic forms of learning about rewards and make us strive for more rewards-an evolutionary beneficial trait. Most dopamine neurons in the midbrain of humans, monkeys, and rodents signal a reward prediction error; they are activated by more reward than predicted (positive prediction error), remain at baseline activity for fully predicted rewards, and show depressed activity with less reward than predicted (negative prediction error). The dopamine signal increases nonlinearly with reward value and codes formal economic utility. Drugs of addiction generate, hijack, and amplify the dopamine reward signal and induce exaggerated, uncontrolled dopamine effects on neuronal plasticity. The striatum, amygdala, and frontal cortex also show reward prediction error coding, but only in subpopulations of neurons. Thus, the important concept of reward prediction errors is implemented in neuronal hardware.

  16. Importance of Tensile Strength on the Shear Behavior of Discontinuities

    Science.gov (United States)

    Ghazvinian, A. H.; Azinfar, M. J.; Geranmayeh Vaneghi, R.

    2012-05-01

    In this study, the shear behavior of discontinuities possessing two different rock wall types with distinct separate compressive strengths was investigated. The designed profiles consisted of regular artificial joints molded by five types of plaster mortars, each representing a distinct uniaxial compressive strength. The compressive strengths of plaster specimens ranged from 5.9 to 19.5 MPa. These specimens were molded considering a regular triangular asperity profile and were designed so as to achieve joint walls with different strength material combinations. The results showed that the shear behavior of discontinuities possessing different joint wall compressive strengths (DDJCS) tested under constant normal load (CNL) conditions is the same as those possessing identical joint wall strengths, but the shear strength of DDJCS is governed by minor joint wall compressive strength. In addition, it was measured that the predicted values obtained by Barton's empirical criterion are greater than the experimental results. The finding indicates that there is a correlation between the joint roughness coefficient (JRC), normal stress, and mechanical strength. It was observed that the mode of failure of asperities is either pure tensile, pure shear, or a combination of both. Therefore, Barton's strength criterion, which considers the compressive strength of joint walls, was modified by substituting the compressive strength with the tensile strength. The validity of the modified criterion was examined by the comparison of the predicted shear values with the laboratory shear test results reported by Grasselli (Ph.D. thesis n.2404, Civil Engineering Department, EPFL, Lausanne, Switzerland, 2001). These comparisons infer that the modified criterion can predict the shear strength of joints more precisely.

  17. Synthesizing Certified Code

    Science.gov (United States)

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach to demonstrate software quality on a formal level. Its basic idea is to require producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates which can be checked independently. Since code certification uses the same underlying technology as program verification, it also requires many detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding theses annotations to the code is time-consuming and error-prone. We address this problem by combining code certification with automatic program synthesis. We propose an approach to generate simultaneously, from a high-level specification, code and all annotations required to certify generated code. Here, we describe a certification extension of AUTOBAYES, a synthesis tool which automatically generates complex data analysis programs from compact specifications. AUTOBAYES contains sufficient high-level domain knowledge to generate detailed annotations. This allows us to use a general-purpose verification condition generator to produce a set of proof obligations in first-order logic. The obligations are then discharged using the automated theorem E-SETHEO. We demonstrate our approach by certifying operator safety for a generated iterative data classification program without manual annotation of the code.

  18. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  19. Interleaved Product LDPC Codes

    OpenAIRE

    Baldi, Marco; Cancellieri, Giovanni; Chiaraluce, Franco

    2011-01-01

    Product LDPC codes take advantage of LDPC decoding algorithms and the high minimum distance of product codes. We propose to add suitable interleavers to improve the waterfall performance of LDPC decoding. Interleaving also reduces the number of low weight codewords, that gives a further advantage in the error floor region.

  20. Insurance billing and coding.

    Science.gov (United States)

    Napier, Rebecca H; Bruelheide, Lori S; Demann, Eric T K; Haug, Richard H

    2008-07-01

    The purpose of this article is to highlight the importance of understanding various numeric and alpha-numeric codes for accurately billing dental and medically related services to private pay or third-party insurance carriers. In the United States, common dental terminology (CDT) codes are most commonly used by dentists to submit claims, whereas current procedural terminology (CPT) and International Classification of Diseases, Ninth Revision, Clinical Modification (ICD.9.CM) codes are more commonly used by physicians to bill for their services. The CPT and ICD.9.CM coding systems complement each other in that CPT codes provide the procedure and service information and ICD.9.CM codes provide the reason or rationale for a particular procedure or service. These codes are more commonly used for "medical necessity" determinations, and general dentists and specialists who routinely perform care, including trauma-related care, biopsies, and dental treatment as a result of or in anticipation of a cancer-related treatment, are likely to use these codes. Claim submissions for care provided can be completed electronically or by means of paper forms.

  1. Error Correcting Codes

    Indian Academy of Sciences (India)

    Science and Automation at ... the Reed-Solomon code contained 223 bytes of data, (a byte ... then you have a data storage system with error correction, that ..... practical codes, storing such a table is infeasible, as it is generally too large.

  2. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Lene; Pries-Heje, Jan; Dalgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  3. RFQ simulation code

    International Nuclear Information System (INIS)

    Lysenko, W.P.

    1984-04-01

    We have developed the RFQLIB simulation system to provide a means to systematically generate the new versions of radio-frequency quadrupole (RFQ) linac simulation codes that are required by the constantly changing needs of a research environment. This integrated system simplifies keeping track of the various versions of the simulation code and makes it practical to maintain complete and up-to-date documentation. In this scheme, there is a certain standard version of the simulation code that forms a library upon which new versions are built. To generate a new version of the simulation code, the routines to be modified or added are appended to a standard command file, which contains the commands to compile the new routines and link them to the routines in the library. The library itself is rarely changed. Whenever the library is modified, however, this modification is seen by all versions of the simulation code, which actually exist as different versions of the command file. All code is written according to the rules of structured programming. Modularity is enforced by not using COMMON statements, simplifying the relation of the data flow to a hierarchy diagram. Simulation results are similar to those of the PARMTEQ code, as expected, because of the similar physical model. Different capabilities, such as those for generating beams matched in detail to the structure, are available in the new code for help in testing new ideas in designing RFQ linacs

  4. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  5. 78 FR 18321 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2013-03-26

    ... Energy Conservation Code. International Existing Building Code. International Fire Code. International... Code. International Property Maintenance Code. International Residential Code. International Swimming Pool and Spa Code International Wildland-Urban Interface Code. International Zoning Code. ICC Standards...

  6. Variable synaptic strengths controls the firing rate distribution in feedforward neural networks.

    Science.gov (United States)

    Ly, Cheng; Marsat, Gary

    2018-02-01

    Heterogeneity of firing rate statistics is known to have severe consequences on neural coding. Recent experimental recordings in weakly electric fish indicate that the distribution-width of superficial pyramidal cell firing rates (trial- and time-averaged) in the electrosensory lateral line lobe (ELL) depends on the stimulus, and also that network inputs can mediate changes in the firing rate distribution across the population. We previously developed theoretical methods to understand how two attributes (synaptic and intrinsic heterogeneity) interact and alter the firing rate distribution in a population of integrate-and-fire neurons with random recurrent coupling. Inspired by our experimental data, we extend these theoretical results to a delayed feedforward spiking network that qualitatively capture the changes of firing rate heterogeneity observed in in-vivo recordings. We demonstrate how heterogeneous neural attributes alter firing rate heterogeneity, accounting for the effect with various sensory stimuli. The model predicts how the strength of the effective network connectivity is related to intrinsic heterogeneity in such delayed feedforward networks: the strength of the feedforward input is positively correlated with excitability (threshold value for spiking) when firing rate heterogeneity is low and is negatively correlated with excitability with high firing rate heterogeneity. We also show how our theory can be used to predict effective neural architecture. We demonstrate that neural attributes do not interact in a simple manner but rather in a complex stimulus-dependent fashion to control neural heterogeneity and discuss how it can ultimately shape population codes.

  7. Comparison of tensile strength of different carbon fabric reinforced epoxy composites

    Directory of Open Access Journals (Sweden)

    Jane Maria Faulstich de Paiva

    2006-03-01

    Full Text Available Carbon fabric/epoxy composites are materials used in aeronautical industry to manufacture several components as flaps, aileron, landing-gear doors and others. To evaluate these materials become important to know their mechanical properties, for example, the tensile strength. Tensile tests are usually performed in aeronautical industry to determinate tensile property data for material specifications, quality assurance and structural analysis. For this work, it was manufactured four different laminate families (F155/PW, F155/HS, F584/PW and F584/HS using pre-impregnated materials (prepregs based on F155TM and F584TM epoxy resins reinforced with carbon fiber fabric styles Plain Weave (PW and Eight Harness Satin (8HS. The matrix F155TM code is an epoxy resin type DGEBA (diglycidil ether of bisphenol A that contains a curing agent and the F584TM code is a modified epoxy resin type. The laminates were obtained by handing lay-up process following an appropriate curing cycle in autoclave. The samples were evaluated by tensile tests according to the ASTM D3039. The F584/PW laminates presented the highest values of tensile strength. However, the highest modulus results were determined for the 8HS composite laminates. The correlation of these results emphasizes the importance of the adequate combination of the polymeric matrix and the reinforcement arrangement in the structural composite manufacture. The microscopic analyses of the tested specimens show valid failure modes for composites used in aeronautical industry.

  8. Validation of thermalhydraulic codes

    International Nuclear Information System (INIS)

    Wilkie, D.

    1992-01-01

    Thermalhydraulic codes require to be validated against experimental data collected over a wide range of situations if they are to be relied upon. A good example is provided by the nuclear industry where codes are used for safety studies and for determining operating conditions. Errors in the codes could lead to financial penalties, to the incorrect estimation of the consequences of accidents and even to the accidents themselves. Comparison between prediction and experiment is often described qualitatively or in approximate terms, e.g. ''agreement is within 10%''. A quantitative method is preferable, especially when several competing codes are available. The codes can then be ranked in order of merit. Such a method is described. (Author)

  9. Fracture flow code

    International Nuclear Information System (INIS)

    Dershowitz, W; Herbert, A.; Long, J.

    1989-03-01

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  10. Values Research

    Science.gov (United States)

    2009-10-01

    that individualistic employees in individualistic organizations and collectivistic employees in collectivistic organizations show greater job...with Parsons’ causal assumption, in the nineties values were recognized on top of the cultural control –values control norms which in turn control...determines intention which may end in behavior. 7 Defining Human Values Cross- cultural theories on values emerged in the 80s developed by three main

  11. Huffman coding in advanced audio coding standard

    Science.gov (United States)

    Brzuchalski, Grzegorz

    2012-05-01

    This article presents several hardware architectures of Advanced Audio Coding (AAC) Huffman noiseless encoder, its optimisations and working implementation. Much attention has been paid to optimise the demand of hardware resources especially memory size. The aim of design was to get as short binary stream as possible in this standard. The Huffman encoder with whole audio-video system has been implemented in FPGA devices.

  12. Theoretical atomic physics code development I: CATS: Cowan Atomic Structure Code

    International Nuclear Information System (INIS)

    Abdallah, J. Jr.; Clark, R.E.H.; Cowan, R.D.

    1988-12-01

    An adaptation of R.D. Cowan's Atomic Structure program, CATS, has been developed as part of the Theoretical Atomic Physics (TAPS) code development effort at Los Alamos. CATS has been designed to be easy to run and to produce data files that can interface with other programs easily. The CATS produced data files currently include wave functions, energy levels, oscillator strengths, plane-wave-Born electron-ion collision strengths, photoionization cross sections, and a variety of other quantities. This paper describes the use of CATS. 10 refs

  13. Hip strength and range of motion

    DEFF Research Database (Denmark)

    Mosler, Andrea B.; Crossley, Kay M.; Thorborg, Kristian

    2017-01-01

    Objectives To determine the normal profiles for hip strength and range of motion (ROM) in a professional football league in Qatar, and examine the effect of leg dominance, age, past history of injury, and ethnicity on these profiles. Design Cross-sectional cohort study. Methods Participants...... values are documented for hip strength and range of motion that can be used as reference profiles in the clinical assessment, screening, and management of professional football players. Leg dominance, recent past injury history and ethnicity do not need to be accounted for when using these profiles...... included 394 asymptomatic, male professional football players, aged 18–40 years. Strength was measured using a hand held dynamometer with an eccentric test in side-lying for hip adduction and abduction, and the squeeze test in supine with 45° hip flexion. Range of motion measures included: hip internal...

  14. Strength Training: For Overall Fitness

    Science.gov (United States)

    Healthy Lifestyle Fitness Strength training is an important part of an overall fitness program. Here's what strength training can do for ... is a key component of overall health and fitness for everyone. Lean muscle mass naturally diminishes with ...

  15. Theoretical Atomic Physics code development IV: LINES, A code for computing atomic line spectra

    International Nuclear Information System (INIS)

    Abdallah, J. Jr.; Clark, R.E.H.

    1988-12-01

    A new computer program, LINES, has been developed for simulating atomic line emission and absorption spectra using the accurate fine structure energy levels and transition strengths calculated by the (CATS) Cowan Atomic Structure code. Population distributions for the ion stages are obtained in LINES by using the Local Thermodynamic Equilibrium (LTE) model. LINES is also useful for displaying the pertinent atomic data generated by CATS. This report describes the use of LINES. Both CATS and LINES are part of the Theoretical Atomic PhysicS (TAPS) code development effort at Los Alamos. 11 refs., 9 figs., 1 tab

  16. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  17. Report number codes

    International Nuclear Information System (INIS)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  18. Short-term Periodization Models: Effects on Strength and Speed-strength Performance.

    Science.gov (United States)

    Hartmann, Hagen; Wirth, Klaus; Keiner, Michael; Mickel, Christoph; Sander, Andre; Szilvas, Elena

    2015-10-01

    Dividing training objectives into consecutive phases to gain morphological adaptations (hypertrophy phase) and neural adaptations (strength and power phases) is called strength-power periodization (SPP). These phases differ in program variables (volume, intensity, and exercise choice or type) and use stepwise intensity progression and concomitant decreasing volume, converging to peak intensity (peaking phase). Undulating periodization strategies rotate these program variables in a bi-weekly, weekly, or daily fashion. The following review addresses the effects of different short-term periodization models on strength and speed-strength both with subjects of different performance levels and with competitive athletes from different sports who use a particular periodization model during off-season, pre-season, and in-season conditioning. In most periodization studies, it is obvious that the strength endurance sessions are characterized by repetition zones (12-15 repetitions) that induce muscle hypertrophy in persons with a low performance level. Strictly speaking, when examining subjects with a low training level, many periodization studies include mainly hypertrophy sessions interspersed with heavy strength/power sessions. Studies have demonstrated equal or statistically significant higher gains in maximal strength for daily undulating periodization compared with SPP in subjects with a low to moderate performance level. The relatively short intervention period and the lack of concomitant sports conditioning call into question the practical value of these findings for competitive athletes. Possibly owing to differences in mesocycle length, conditioning programs, and program variables, competitive athletes either maintained or improved strength and/or speed-strength performance by integrating daily undulating periodization and SPP during off-season, pre-season and in-season conditioning. In high-performance sports, high-repetition strength training (>15) should be

  19. Facial expression coding in children and adolescents with autism: Reduced adaptability but intact norm-based coding.

    Science.gov (United States)

    Rhodes, Gillian; Burton, Nichola; Jeffery, Linda; Read, Ainsley; Taylor, Libby; Ewing, Louise

    2018-05-01

    Individuals with autism spectrum disorder (ASD) can have difficulty recognizing emotional expressions. Here, we asked whether the underlying perceptual coding of expression is disrupted. Typical individuals code expression relative to a perceptual (average) norm that is continuously updated by experience. This adaptability of face-coding mechanisms has been linked to performance on various face tasks. We used an adaptation aftereffect paradigm to characterize expression coding in children and adolescents with autism. We asked whether face expression coding is less adaptable in autism and whether there is any fundamental disruption of norm-based coding. If expression coding is norm-based, then the face aftereffects should increase with adaptor expression strength (distance from the average expression). We observed this pattern in both autistic and typically developing participants, suggesting that norm-based coding is fundamentally intact in autism. Critically, however, expression aftereffects were reduced in the autism group, indicating that expression-coding mechanisms are less readily tuned by experience. Reduced adaptability has also been reported for coding of face identity and gaze direction. Thus, there appears to be a pervasive lack of adaptability in face-coding mechanisms in autism, which could contribute to face processing and broader social difficulties in the disorder. © 2017 The British Psychological Society.

  20. Economic demand and essential value.

    Science.gov (United States)

    Hursh, Steven R; Silberberg, Alan

    2008-01-01

    The strength of a rat's eating reflex correlates with hunger level when strength is measured by the response frequency that precedes eating (B. F. Skinner, 1932a, 1932b). On the basis of this finding, Skinner argued response frequency could index reflex strength. Subsequent work documented difficulties with this notion because responding was affected not only by the strengthening properties of the reinforcer but also by the rate-shaping effects of the schedule. This article obviates this problem by measuring strength via methods from behavioral economics. This approach uses demand curves to map how reinforcer consumption changes with changes in the "price" different ratio schedules impose. An exponential equation is used to model these demand curves. The value of this exponential's rate constant is used to scale the strength or essential value of a reinforcer, independent of the scalar dimensions of the reinforcer. Essential value determines the consumption level to be expected at particular prices and the response level that will occur to support that consumption. This approach permits comparing reinforcers that differ in kind, contributing toward the goal of scaling reinforcer value. (c) 2008 APA, all rights reserved

  1. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  2. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  3. Transport theory and codes

    International Nuclear Information System (INIS)

    Clancy, B.E.

    1986-01-01

    This chapter begins with a neutron transport equation which includes the one dimensional plane geometry problems, the one dimensional spherical geometry problems, and numerical solutions. The section on the ANISN code and its look-alikes covers problems which can be solved; eigenvalue problems; outer iteration loop; inner iteration loop; and finite difference solution procedures. The input and output data for ANISN is also discussed. Two dimensional problems such as the DOT code are given. Finally, an overview of the Monte-Carlo methods and codes are elaborated on

  4. Gravity inversion code

    International Nuclear Information System (INIS)

    Burkhard, N.R.

    1979-01-01

    The gravity inversion code applies stabilized linear inverse theory to determine the topography of a subsurface density anomaly from Bouguer gravity data. The gravity inversion program consists of four source codes: SEARCH, TREND, INVERT, and AVERAGE. TREND and INVERT are used iteratively to converge on a solution. SEARCH forms the input gravity data files for Nevada Test Site data. AVERAGE performs a covariance analysis on the solution. This document describes the necessary input files and the proper operation of the code. 2 figures, 2 tables

  5. Electric Monopole Transition Strengths in 62Ni

    Directory of Open Access Journals (Sweden)

    Evitts L. J.

    2016-01-01

    Full Text Available Excited states in 62Ni were populated with a (p, p’ reaction using the 14UD Pelletron accelerator at the Australian National University. Electric monopole transition strengths, ρ2(E0, were measured through simultaneous detection of the internal conversion electrons and γ rays emitted from the de-excitation of populated states, using the Super-e spectrometer coupled with a germanium detector. The strength of the 02+ to 01+ transition has been measured to be 77−34+23 × 10−3 and agrees with previously reported values. Upper limits have been placed on the 03+ to 01+ and 03+ to 02+ transitions. The measured ρ2(E0 value of the 22+ to 21+ transition in 62Ni has been measured for the first time and found to be one of the largest ρ2(E0 values measured to date in nuclei heavier than Ca. The low-lying states of 62Ni have previously been classified as one- and two-phonon vibrational states based on level energies. The measured electric quadrupole transition strengths are consistent with this interpretation. However as electric monopole transitions are forbidden between states which differ by one phonon number, the simple harmonic quadrupole vibrational picture is not suffcient to explain the large ρ2(E0 value for the 22+ to 21+ transition.

  6. Electric Monopole Transition Strengths in 62Ni

    Science.gov (United States)

    Evitts, L. J.; Garnsworthy, A. B.; Kibédi, T.; Moukaddam, M.; Alshahrani, B.; Eriksen, T. K.; Holt, J. D.; Hota, S. S.; Lane, G. J.; Lee, B. Q.; McCormick, B. P.; Palalani, N.; Reed, M. W.; Stroberg, S. R.; Stuchbery, A. E.

    2016-09-01

    Excited states in 62Ni were populated with a (p, p') reaction using the 14UD Pelletron accelerator at the Australian National University. Electric monopole transition strengths, ρ2(E0), were measured through simultaneous detection of the internal conversion electrons and γ rays emitted from the de-excitation of populated states, using the Super-e spectrometer coupled with a germanium detector. The strength of the 02+ to 01+ transition has been measured to be 77-34+23 × 10-3 and agrees with previously reported values. Upper limits have been placed on the 03+ to 01+ and 03+ to 02+ transitions. The measured ρ2(E0) value of the 22+ to 21+ transition in 62Ni has been measured for the first time and found to be one of the largest ρ2(E0) values measured to date in nuclei heavier than Ca. The low-lying states of 62Ni have previously been classified as one- and two-phonon vibrational states based on level energies. The measured electric quadrupole transition strengths are consistent with this interpretation. However as electric monopole transitions are forbidden between states which differ by one phonon number, the simple harmonic quadrupole vibrational picture is not suffcient to explain the large ρ2(E0) value for the 22+ to 21+ transition.

  7. Fatigue strength of socket welded pipe joint

    International Nuclear Information System (INIS)

    Iida, K.; Matsuda, F.; Sato, M.; Higuchi, M.; Nakagawa, A.

    1994-01-01

    Fully reversed four point bending fatigue tests were carried out of small diameter socket welded joints made of carbon steels. Experimental parameters are pipe diameter, thickness of pipe and socket wall, throat depth and shape of fillet welds, slip-on and diametral gaps in the socket welding, lack of penetration at the root of fillet welds, and peening of fillet welds. In most cases a fatigue crack started from the root of the fillet, but in the case of higher stress amplitude, it tended to start from the toe of fillet. The standard socket welded joint of 50 mm diameter showed relatively low fatigue strength, 46 MPa in stress amplitude at the 10 7 cycles failure life. This value corresponds to about 1/5 of that of the smoothed base metal specimens in axial fatigue. The fatigue strength showed decrease with increasing pipe diameter, and increase with increasing the thickness of pipe and socket wall. The effects of throat depth and shape of fillet welds on fatigue strength were not significant. Contrary to the expectation, the fatigue strength of the socket welded joint without slip-on gap is higher than that of the joint with the normal gap. A lack of penetration at the root deleteriously reduced fatigue strength, showing 14 MPa in stress amplitude at the 10 7 cycles failure life for the 50 mm diameter socket joint. (orig.)

  8. Microtensile bond strength of enamel after bleaching.

    Science.gov (United States)

    Lago, Andrea Dias Neves; Garone-Netto, Narciso

    2013-01-01

    To evaluate the bond strength of a composite resin to the bovine enamel bleached with 35% hydrogen peroxide. It was used an etching-and-rinse adhesive system employed immediately, 7 and 14 days after the bleaching. Twenty bovine teeth were randomly distributed into 4 groups (n = 5), 3 experimental and 1 control. G1: Unbleached + restoration 14 days after storage in artificial saliva (control); G2: Bleached + restoration immediately after bleaching; G3: Bleached + restoration 7 days after bleaching; G4: Bleached + restoration 14 days after bleaching. Their buccal enamel surfaces were flattened, and a 25 mm² (5 × 5 mm) area from each one of these regions was outlined so as to standardize the experimental region. Universal hybrid composite resin Filtek™Z350 was inserted into four layers of 1 mm each and photo-activated. The bond strength was quantitatively evaluated by a microtensile test (1.0 mm/min) 24 h after the restorative procedures. The failure mode was assessed through scanning electron microscopy (SEM). There was a significant reduction in the bond strength of the restored teeth immediately after the bleaching (G2). There were no significant differences in enamel bond strength between groups G1, G3, and G4. There was a predominance of adhesive and mixed (cohesive + adhesive) failure in all groups. The 7-day-period after the end of the bleaching with 35% hydrogen peroxide was enough to achieve the appropriate values of bond strength to the enamel.

  9. Stress-strain relationship of high-strength steel (HSS) reinforcing bars

    Science.gov (United States)

    Anggraini, Retno; Tavio, Raka, I. Gede Putu; Agustiar

    2018-05-01

    The introduction of High-Strength Steel (HSS) reinforcing bars in reinforced concrete members has gained much attention in recent years and led to many advantages such as construction timesaving. It is also more economical since it can reduce the amount of reinforcing steel bars used in concrete members which in turn alleviates the congestion of reinforcement. Up to present, the building codes, e.g. American Concrete Institute (ACI) 318M-14 and Standard National Indonesia (SNI) 2847:2013, still restrict the use of higher-strength steel reinforcing bars for concrete design up to Grade 420 MPa due to the possible suspected brittle behavior of concrete members. This paper evaluates the characteristics of stress-strain relationships of HSS bars if they are comparable to the characteristics of those of Grade 420 MPa. To achieve the objective of the study, a series of steel bars from various grades (420, 550, 650, and 700 MPa) was selected. Tensile tests of these steel samples were conducted under displacement-controlled mode to capture the complete stress-strain curves and particularly the post-yield response of the steel bars. The results indicate that all the steel bars tested had the actual yield strengths greater than the corresponding specified values. The stress-strain curves of HSS reinforcing bars (Grade 550, 650, and 700 MPa) performed slightly different characteristics with those of Grade 420 MPa.

  10. Compression strength perpendicular to grain of structural timber and glulam

    DEFF Research Database (Denmark)

    Damkilde, Lars; Hoffmeyer, Preben; Pedersen, Torben N.

    1998-01-01

    The characteristic strength values for compression perpendicular to grain as they appear in EN 338 (structural timber) and EN 1194 (glulam) are currently up for discussion. The present paper provides experimental results based on EN 1193 that may assist in the correct assignment of such strength...... values. The dominant failure mode of glulam specimens is shown to be fundamentally different from that of structural timber specimens. Glulam specimens often show tension perpendicular to grain failure before the compression strength value is reached. Such failure mode is not seen for structural timber....... Nonetheless test results show that the levels of characteristic compression strength perpendicular to grain are of the same order for structural timber and glulam. The values are slightly lower than those appearing in EN 1194 and less than half of those appearing in EN 338. The paper presents a numerical...

  11. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  12. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed; Ghanem, Bernard; Wonka, Peter

    2018-01-01

    coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements

  13. SASSYS LMFBR systems code

    International Nuclear Information System (INIS)

    Dunn, F.E.; Prohammer, F.G.; Weber, D.P.

    1983-01-01

    The SASSYS LMFBR systems analysis code is being developed mainly to analyze the behavior of the shut-down heat-removal system and the consequences of failures in the system, although it is also capable of analyzing a wide range of transients, from mild operational transients through more severe transients leading to sodium boiling in the core and possible melting of clad and fuel. The code includes a detailed SAS4A multi-channel core treatment plus a general thermal-hydraulic treatment of the primary and intermediate heat-transport loops and the steam generators. The code can handle any LMFBR design, loop or pool, with an arbitrary arrangement of components. The code is fast running: usually faster than real time

  14. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  15. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  16. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  17. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  18. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  19. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    2001-01-01

    The description of reactor lattice codes is carried out on the example of the WIMSD-5B code. The WIMS code in its various version is the most recognised lattice code. It is used in all parts of the world for calculations of research and power reactors. The version WIMSD-5B is distributed free of charge by NEA Data Bank. The description of its main features given in the present lecture follows the aspects defined previously for lattice calculations in the lecture on Reactor Lattice Transport Calculations. The spatial models are described, and the approach to the energy treatment is given. Finally the specific algorithm applied in fuel depletion calculations is outlined. (author)

  20. Critical Care Coding for Neurologists.

    Science.gov (United States)

    Nuwer, Marc R; Vespa, Paul M

    2015-10-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  1. Lattice Index Coding

    OpenAIRE

    Natarajan, Lakshmi; Hong, Yi; Viterbo, Emanuele

    2014-01-01

    The index coding problem involves a sender with K messages to be transmitted across a broadcast channel, and a set of receivers each of which demands a subset of the K messages while having prior knowledge of a different subset as side information. We consider the specific case of noisy index coding where the broadcast channel is Gaussian and every receiver demands all the messages from the source. Instances of this communication problem arise in wireless relay networks, sensor networks, and ...

  2. Towards advanced code simulators

    International Nuclear Information System (INIS)

    Scriven, A.H.

    1990-01-01

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  3. Cracking the Gender Codes

    DEFF Research Database (Denmark)

    Rennison, Betina Wolfgang

    2016-01-01

    extensive work to raise the proportion of women. This has helped slightly, but women remain underrepresented at the corporate top. Why is this so? What can be done to solve it? This article presents five different types of answers relating to five discursive codes: nature, talent, business, exclusion...... in leadership management, we must become more aware and take advantage of this complexity. We must crack the codes in order to crack the curve....

  4. Unified strength theory and its applications

    CERN Document Server

    Yu, Mao-Hong

    2004-01-01

    This is a completely new theory dealing with the yield and failure of materials under multi-axial stresses. It provides a system of yield and failure criteria adopted for most materials, from metallic materials to rocks, concretes, soils, polymers etc. The Unified Strength Theory has been applied successfully to analyse the elastic limit, plastic limit capacities, the dynamic response behavior for some structures under static and moderate impulsive load, and may be implemented in some elasto-plastic finite element computer codes. The Unified Strength Theory is described in detail and by using this theory a series of results can be obtained. The Unified Strength Theory can improve the conservative Mohr-Coulomb Theory, and since intermediate principal stress is not taken into account in the Mohr-Coulomb theory and most experimental data is not pertainable to the Mohr-Coulomb Theory, a considerable economic benefit may be obtained. The book can also increase the effect of most commercial finite element computer ...

  5. Gaussian discriminating strength

    Science.gov (United States)

    Rigovacca, L.; Farace, A.; De Pasquale, A.; Giovannetti, V.

    2015-10-01

    We present a quantifier of nonclassical correlations for bipartite, multimode Gaussian states. It is derived from the Discriminating Strength measure, introduced for finite dimensional systems in Farace et al., [New J. Phys. 16, 073010 (2014), 10.1088/1367-2630/16/7/073010]. As the latter the new measure exploits the quantum Chernoff bound to gauge the susceptibility of the composite system with respect to local perturbations induced by unitary gates extracted from a suitable set of allowed transformations (the latter being identified by posing some general requirements). Closed expressions are provided for the case of two-mode Gaussian states obtained by squeezing or by linearly mixing via a beam splitter a factorized two-mode thermal state. For these density matrices, we study how nonclassical correlations are related with the entanglement present in the system and with its total photon number.

  6. A Comparative Study on Seismic Analysis of Bangladesh National Building Code (BNBC) with Other Building Codes

    Science.gov (United States)

    Bari, Md. S.; Das, T.

    2013-09-01

    Tectonic framework of Bangladesh and adjoining areas indicate that Bangladesh lies well within an active seismic zone. The after effect of earthquake is more severe in an underdeveloped and a densely populated country like ours than any other developed countries. Bangladesh National Building Code (BNBC) was first established in 1993 to provide guidelines for design and construction of new structure subject to earthquake ground motions in order to minimize the risk to life for all structures. A revision of BNBC 1993 is undergoing to make this up to date with other international building codes. This paper aims at the comparison of various provisions of seismic analysis as given in building codes of different countries. This comparison will give an idea regarding where our country stands when it comes to safety against earth quake. Primarily, various seismic parameters in BNBC 2010 (draft) have been studied and compared with that of BNBC 1993. Later, both 1993 and 2010 edition of BNBC codes have been compared graphically with building codes of other countries such as National Building Code of India 2005 (NBC-India 2005), American Society of Civil Engineering 7-05 (ASCE 7-05). The base shear/weight ratios have been plotted against the height of the building. The investigation in this paper reveals that BNBC 1993 has the least base shear among all the codes. Factored Base shear values of BNBC 2010 are found to have increased significantly than that of BNBC 1993 for low rise buildings (≤20 m) around the country than its predecessor. Despite revision of the code, BNBC 2010 (draft) still suggests less base shear values when compared to the Indian and American code. Therefore, this increase in factor of safety against the earthquake imposed by the proposed BNBC 2010 code by suggesting higher values of base shear is appreciable.

  7. Determining the in situ concrete strength of existing structures for assessing their structural safety

    NARCIS (Netherlands)

    Steenbergen, R.D.J.M.; Vervuurt, A.H.J.M.

    2012-01-01

    EN 13791 applies when assessing the in situ compressive strength of structures and precast concrete components. According to the code itself, it may be adopted when doubt arises about the compressive strength of a concrete. For assessing the structural safety of existing structures, however, the

  8. Health Education in India: A Strengths, Weaknesses, Opportunities, and Threats (SWOT) Analysis

    Science.gov (United States)

    Sharma, Manoj

    2005-01-01

    The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of the health education profession and discipline in India. Materials from CINAHL, ERIC, MEDLINE, and Internet were collected to conduct the open coding of the SWOT analysis. Strengths of health education in India include an elaborate…

  9. KENO-V code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P 1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  10. Code, standard and specifications

    International Nuclear Information System (INIS)

    Abdul Nassir Ibrahim; Azali Muhammad; Ab. Razak Hamzah; Abd. Aziz Mohamed; Mohamad Pauzi Ismail

    2008-01-01

    Radiography also same as the other technique, it need standard. This standard was used widely and method of used it also regular. With that, radiography testing only practical based on regulations as mentioned and documented. These regulation or guideline documented in code, standard and specifications. In Malaysia, level one and basic radiographer can do radiography work based on instruction give by level two or three radiographer. This instruction was produced based on guideline that mention in document. Level two must follow the specifications mentioned in standard when write the instruction. From this scenario, it makes clearly that this radiography work is a type of work that everything must follow the rule. For the code, the radiography follow the code of American Society for Mechanical Engineer (ASME) and the only code that have in Malaysia for this time is rule that published by Atomic Energy Licensing Board (AELB) known as Practical code for radiation Protection in Industrial radiography. With the existence of this code, all the radiography must follow the rule or standard regulated automatically.

  11. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    OpenAIRE

    Gao, Yuan; Liu, Pengyu; Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content ...

  12. Deep Value

    DEFF Research Database (Denmark)

    Asness, Clifford S.; Liew, John M.; Pedersen, Lasse Heje

    premium. Following these episodes, the value strategy has (1) high average returns; (2) low market betas, but high betas to a global value factor; (3) deteriorating fundamentals; (4) negative news sentiment; (5) selling pressure; (6) increased limits to arbitrage; and (7) increased arbitrage activity...

  13. Forestland values.

    Science.gov (United States)

    John H. Beuter; Ralph J. Alig

    2004-01-01

    This issue of the journal of Forestry is devoted to articles about forestland values. Viewed broadly, natural resources and humans are our two basic resources. An expression of the importance of land as a foundation for forest ecosystems is forestland value. Our attitudes about land and the forest ecosystems that they support have changed considerably in recent years....

  14. Stochastic-Strength-Based Damage Simulation Tool for Ceramic Matrix Composite

    Science.gov (United States)

    Nemeth, Noel; Bednarcyk, Brett; Pineda, Evan; Arnold, Steven; Mital, Subodh; Murthy, Pappu

    2015-01-01

    Reported here is a coupling of two NASA developed codes: CARES (Ceramics Analysis and Reliability Evaluation of Structures) with the MAC/GMC (Micromechanics Analysis Code/ Generalized Method of Cells) composite material analysis code. The resulting code is called FEAMAC/CARES and is constructed as an Abaqus finite element analysis UMAT (user defined material). Here we describe the FEAMAC/CARES code and an example problem (taken from the open literature) of a laminated CMC in off-axis loading is shown. FEAMAC/CARES performs stochastic-strength-based damage simulation response of a CMC under multiaxial loading using elastic stiffness reduction of the failed elements.

  15. FEAMAC/CARES Stochastic-Strength-Based Damage Simulation Tool for Ceramic Matrix Composites

    Science.gov (United States)

    Nemeth, Noel; Bednarcyk, Brett; Pineda, Evan; Arnold, Steven; Mital, Subodh; Murthy, Pappu; Bhatt, Ramakrishna

    2016-01-01

    Reported here is a coupling of two NASA developed codes: CARES (Ceramics Analysis and Reliability Evaluation of Structures) with the MAC/GMC (Micromechanics Analysis Code/ Generalized Method of Cells) composite material analysis code. The resulting code is called FEAMAC/CARES and is constructed as an Abaqus finite element analysis UMAT (user defined material). Here we describe the FEAMAC/CARES code and an example problem (taken from the open literature) of a laminated CMC in off-axis loading is shown. FEAMAC/CARES performs stochastic-strength-based damage simulation response of a CMC under multiaxial loading using elastic stiffness reduction of the failed elements.

  16. Heliospheric Modulation Strength During The Neutron Monitor Era

    Science.gov (United States)

    Usoskin, I. G.; Alanko, K.; Mursula, K.; Kovaltsov, G. A.

    Using a stochastic simulation of a one-dimensional heliosphere we calculate galactic cosmic ray spectra at the Earth's orbit for different values of the heliospheric mod- ulation strength. Convoluting these spectra with the specific yield function of a neu- tron monitor, we obtain the expected neutron monitor count rates for different values of the modulation strength. Finally, inverting this relation, we calculate the modula- tion strength using the actually recorded neutron monitor count rates. We present the reconstructed annual heliospheric modulation strengths for the neutron monitor era (1953­2000) using several neutron monitors from different latitudes, covering a large range of geomagnetic rigidity cutoffs from polar to equatorial regions. The estimated modulation strengths are shown to be in good agreement with the corresponding esti- mates reported earlier for some years.

  17. Relative scale and the strength and deformability of rock masses

    Science.gov (United States)

    Schultz, Richard A.

    1996-09-01

    The strength and deformation of rocks depend strongly on the degree of fracturing, which can be assessed in the field and related systematically to these properties. Appropriate Mohr envelopes obtained from the Rock Mass Rating (RMR) classification system and the Hoek-Brown criterion for outcrops and other large-scale exposures of fractured rocks show that rock-mass cohesive strength, tensile strength, and unconfined compressive strength can be reduced by as much as a factor often relative to values for the unfractured material. The rock-mass deformation modulus is also reduced relative to Young's modulus. A "cook-book" example illustrates the use of RMR in field applications. The smaller values of rock-mass strength and deformability imply that there is a particular scale of observation whose identification is critical to applying laboratory measurements and associated failure criteria to geologic structures.

  18. Computation of radionuclide particulate finite area fugitive source strengths

    Energy Technology Data Exchange (ETDEWEB)

    Fields, D E

    1983-06-01

    Atmospheric source strengths quantifying particulate re-suspension from wind and non-wind disturbance-driven processes are computed for sites of small area. These values are useful in computing downwind air concentration values to evaluate risk to exposed populations. The net source strength for the site is the sum of the wind- and disturbance-driven components. A unified source strength approach includes both classes of re-suspension processes. More research is needed to satisfactorily express the time-dependence of re-suspension parameters, especially in non-arid climates where population densities are greater. (JMT)

  19. The Value of Value Sets

    DEFF Research Database (Denmark)

    Sløk-Madsen, Stefan Kirkegaard; Christensen, Jesper

    The world over classrooms in business schools are being taught that corporate values can impact performance. The argument is typically that culture matter more than strategy plans and culture can be influenced and indeed changed by a shared corporate value set. While the claim seems intuitively a...... a unique contribution to the effects of investment in shared company values, and to whether agent rationality can be fundamentally changed by committed organizational efforts....

  20. Soft radiative strength in warm nuclei

    International Nuclear Information System (INIS)

    Becker, J A; Bernstein, L A; Garrett, P E; Nelson, R O; Schiller, A; Voinov, A; Agvaanluvsan, U; Algin, E; Belgya, T; Chankova, R; Guttormsen, M; Mitchell, G E; Rekstad, J; Siem, S

    2004-01-01

    Unresolved transitions in the nuclear γ-ray cascade produced in the decay of excited nuclei are best described by statistical concepts: a continuous radiative strength function (RSF) and level density yield mean values of transition matrix elements. Data on the soft (E γ < 3-4 MeV) RSF for transitions between warm states (i.e. states several MeV above the yrast line) have, however, remained elusive

  1. Under-coding of secondary conditions in coded hospital health data: Impact of co-existing conditions, death status and number of codes in a record.

    Science.gov (United States)

    Peng, Mingkai; Southern, Danielle A; Williamson, Tyler; Quan, Hude

    2017-12-01

    This study examined the coding validity of hypertension, diabetes, obesity and depression related to the presence of their co-existing conditions, death status and the number of diagnosis codes in hospital discharge abstract database. We randomly selected 4007 discharge abstract database records from four teaching hospitals in Alberta, Canada and reviewed their charts to extract 31 conditions listed in Charlson and Elixhauser comorbidity indices. Conditions associated with the four study conditions were identified through multivariable logistic regression. Coding validity (i.e. sensitivity, positive predictive value) of the four conditions was related to the presence of their associated conditions. Sensitivity increased with increasing number of diagnosis code. Impact of death on coding validity is minimal. Coding validity of conditions is closely related to its clinical importance and complexity of patients' case mix. We recommend mandatory coding of certain secondary diagnosis to meet the need of health research based on administrative health data.

  2. Compressive and flexural strength of high strength phase change mortar

    Science.gov (United States)

    Qiao, Qingyao; Fang, Changle

    2018-04-01

    High-strength cement produces a lot of hydration heat when hydrated, it will usually lead to thermal cracks. Phase change materials (PCM) are very potential thermal storage materials. Utilize PCM can help reduce the hydration heat. Research shows that apply suitable amount of PCM has a significant effect on improving the compressive strength of cement mortar, and can also improve the flexural strength to some extent.

  3. Value Representations

    DEFF Research Database (Denmark)

    Rasmussen, Majken Kirkegaard; Petersen, Marianne Graves

    2011-01-01

    Stereotypic presumptions about gender affect the design process, both in relation to how users are understood and how products are designed. As a way to decrease the influence of stereotypic presumptions in design process, we propose not to disregard the aspect of gender in the design process......, as the perspective brings valuable insights on different approaches to technology, but instead to view gender through a value lens. Contributing to this perspective, we have developed Value Representations as a design-oriented instrument for staging a reflective dialogue with users. Value Representations...

  4. Hip strength assessment using handheld dynamometry is subject to intertester bias when testers are of different sex and strength

    DEFF Research Database (Denmark)

    Thorborg, K; Bandholm, T; Schick, M

    2013-01-01

    Handheld dynamometry (HHD) is a promising tool for obtaining reliable hip strength measurements in the clinical setting, but intertester reliability has been questioned, especially in situations where testers exhibit differences in upper-extremity muscle strength (male vs female). The purpose...... of this study was to examine the intertester reliability concerning strength assessments of hip abduction, adduction, external and internal rotation, flexion and extension using HHD, and to test whether systematic differences in test values exist between testers of different upper-extremity strength. Fifty...... healthy individuals (29 women), aged 25 ± 5 years were included. Two physiotherapist students (one female, one male) of different upper-extremity strength performed the measurements. The tester order and strength test order were randomized. Intraclass correlation coefficients were used to quantify...

  5. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  6. Anisotropy effect on strengths of metamorphic rocks

    Directory of Open Access Journals (Sweden)

    Ahmet Özbek

    2018-02-01

    Full Text Available This paper aims to study the effect of anisotropy on strengths of several metamorphic rocks of southern (Çine submassif of Menderes metamorphic massif in southwest Turkey. Four different metamorphic rocks including foliated phyllite, schist, gneiss and marble (calcschist were selected and examined. Discontinuity surveys were made along lines for each rock and evaluated with DIPS program. L-type Schmidt hammer was applied in the directions parallel and perpendicular to foliation during the field study. Several hand samples and rock blocks were collected during the field study for measurements of dry and saturated densities, dry and saturated unit weights and porosity, and for petrographic analysis and strength determination in laboratory. L- and N-type Schmidt hammers were applied in the directions perpendicular (anisotropy angle of 0° and parallel (anisotropy angle of 90° to the foliation on selected blocks of phyllite, schist, gneiss and marble (calcschist. The phyllite and schist have higher porosity and lower density values than the other rocks. However, coarse crystalline gneiss and marble (calcschist have higher rebound values and strengths, and they are classified as strong–very strong rocks. Generally, the rebound values in the direction perpendicular to the foliation are slightly higher than that in the direction parallel to foliation. Rebound values of N-type Schmidt hammer are higher than the L-type values except for phyllite. Sometimes, the rebound values of laboratory and field applications gave different results. This may result from variable local conditions such as minerals differentiation, discontinuities, water content, weathering degree and thickness of foliated structure.

  7. Nuclear code abstracts (1975 edition)

    International Nuclear Information System (INIS)

    Akanuma, Makoto; Hirakawa, Takashi

    1976-02-01

    Nuclear Code Abstracts is compiled in the Nuclear Code Committee to exchange information of the nuclear code developments among members of the committee. Enlarging the collection, the present one includes nuclear code abstracts obtained in 1975 through liaison officers of the organizations in Japan participating in the Nuclear Energy Agency's Computer Program Library at Ispra, Italy. The classification of nuclear codes and the format of code abstracts are the same as those in the library. (auth.)

  8. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  9. Preliminary Coupling of MATRA Code for Multi-physics Analysis

    International Nuclear Information System (INIS)

    Kim, Seongjin; Choi, Jinyoung; Yang, Yongsik; Kwon, Hyouk; Hwang, Daehyun

    2014-01-01

    The boundary conditions such as the inlet temperature, mass flux, averaged heat flux, power distributions of the rods, and core geometry is given by constant values or functions of time. These conditions are separately calculated and provided by other codes, such as a neutronics or a system codes, into the MATRA code. In addition, the coupling of several codes in the different physics field is focused and embodied. In this study, multiphysics coupling methods were developed for a subchannel code (MATRA) with neutronics codes (MASTER, DeCART) and a fuel performance code (FRAPCON-3). Preliminary evaluation results for representative sample cases are presented. The MASTER and DeCART codes provide the power distribution of the rods in the core to the MATRA code. In case of the FRAPCON-3 code, the variation of the rod diameter induced by the thermal expansion is yielded and provided. The MATRA code transfers the thermal-hydraulic conditions that each code needs. Moreover, the coupling method with each code is described

  10. Institutional Strength in Depth

    International Nuclear Information System (INIS)

    Weightman, M.

    2016-01-01

    Much work has been undertaken in order to identify, learn and implement the lessons from the TEPCO Fukushima Daiichi nuclear accident. These have mainly targeted on engineering or operational lessons. Less attention has been paid to the institutional lessons, although there have been some measures to improve individual peer reviews, particularly by the World Association of Nuclear Operators, and the authoritative IAEA report published in 2015 brought forward several important lessons for regulators and advocated a system approach. The report noted that one of the contributing factors the accident was the tendency of stakeholders not to challenge. Additionally, it reported deficiencies in the regulatory authority and system. Earlier, the root cause of the accident was identified by a Japanese independent parliamentary report as being cultural and institutional. The sum total of the institutions, the safety system, was ineffective. While it is important to address the many technical and operational lessons these may not necessary address this more fundamental lesson, and may not serve to provide robust defences against human or institutional failings over a wide variety of possible events and combinations. The overall lesson is that we can have rigorous and comprehensive safety standards and other tools in place to deliver high levels of safety, but ultimately what is important is the ability of the nuclear safety system to ensure that the relevant institutions diligently and effectively apply those standards and tools — to be robust and resilient. This has led to the consideration of applying the principles of the strength in depth philosophy to a nuclear safety system as a way of providing a framework for developing, assessing, reviewing and improving the system. At an IAEA conference in October 2013, a model was presented for a robust national nuclear safety system based on strength in depth philosophy. The model highlighted three main layers: industry, the

  11. Description and application of the AERIN Code at LLNL

    International Nuclear Information System (INIS)

    King, W.C.

    1986-01-01

    The AERIN code was written at the Lawrence Livermore National Laboratory in 1976 to compute the organ burdens and absorbed dose resulting from a chronic or acute inhalation of transuranic isotopes. The code was revised in 1982 to reflect the concepts of ICRP-30. This paper will describe the AERIN code and how it has been used at LLNL to study more than 80 cases of internal deposition and obtain estimates of internal dose. A comparison with the computed values of the committed organ dose is made with ICRP-30 values. The benefits of using the code are described. 3 refs., 3 figs., 6 tabs

  12. Novel Area Optimization in FPGA Implementation Using Efficient VHDL Code

    Directory of Open Access Journals (Sweden)

    . Zulfikar

    2012-10-01

    Full Text Available A new novel method for area efficiency in FPGA implementation is presented. The method is realized through flexibility and wide capability of VHDL coding. This method exposes the arithmetic operations such as addition, subtraction and others. The design technique aim to reduce occupies area for multi stages circuits by selecting suitable range of all value involved in every step of calculations. Conventional and efficient VHDL coding methods are presented and the synthesis result is compared. The VHDL code which limits range of integer values is occupies less area than the one which is not. This VHDL coding method is suitable for multi stage circuits.

  13. Novel Area Optimization in FPGA Implementation Using Efficient VHDL Code

    Directory of Open Access Journals (Sweden)

    Zulfikar .

    2015-05-01

    Full Text Available A new novel method for area efficiency in FPGA implementation is presented. The method is realized through flexibility and wide capability of VHDL coding. This method exposes the arithmetic operations such as addition, subtraction and others. The design technique aim to reduce occupies area for multi stages circuits by selecting suitable range of all value involved in every step of calculations. Conventional and efficient VHDL coding methods are presented and the synthesis result is compared. The VHDL code which limits range of integer values is occupies less area than the one which is not. This VHDL coding method is suitable for multi stage circuits.

  14. ACE - Manufacturer Identification Code (MID)

    Data.gov (United States)

    Department of Homeland Security — The ACE Manufacturer Identification Code (MID) application is used to track and control identifications codes for manufacturers. A manufacturer is identified on an...

  15. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  16. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  17. Unravelling Value

    DEFF Research Database (Denmark)

    Walsh, Matthew

    Paper presented in the symposium “What’s It All Worth? Material Possessions and Value in Past Societies” at 22nd Annual Meeting of the European Association of Archaeologists, Vilnius, Lithuania.......Paper presented in the symposium “What’s It All Worth? Material Possessions and Value in Past Societies” at 22nd Annual Meeting of the European Association of Archaeologists, Vilnius, Lithuania....

  18. The Aster code

    International Nuclear Information System (INIS)

    Delbecq, J.M.

    1999-01-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  19. Adaptive distributed source coding.

    Science.gov (United States)

    Varodayan, David; Lin, Yao-Chung; Girod, Bernd

    2012-05-01

    We consider distributed source coding in the presence of hidden variables that parameterize the statistical dependence among sources. We derive the Slepian-Wolf bound and devise coding algorithms for a block-candidate model of this problem. The encoder sends, in addition to syndrome bits, a portion of the source to the decoder uncoded as doping bits. The decoder uses the sum-product algorithm to simultaneously recover the source symbols and the hidden statistical dependence variables. We also develop novel techniques based on density evolution (DE) to analyze the coding algorithms. We experimentally confirm that our DE analysis closely approximates practical performance. This result allows us to efficiently optimize parameters of the algorithms. In particular, we show that the system performs close to the Slepian-Wolf bound when an appropriate doping rate is selected. We then apply our coding and analysis techniques to a reduced-reference video quality monitoring system and show a bit rate saving of about 75% compared with fixed-length coding.

  20. The improved design method of shear strength of reinforced concrete beams without transverse reinforcement

    Directory of Open Access Journals (Sweden)

    Vegera Pavlo

    2017-12-01

    Full Text Available In this article, results of experimental testing of reinforced concrete beams without transverse shear reinforcement are given. Three prototypes for improved testing methods were tested. The testing variable parameter was the shear span to the effective depth ratio. In the result of the tests we noticed that bearing capacity of RC beams is increased with the decreasing shear span to the effective depth ratio. The design method according to current codes was applied to test samples and it showed a significant discrepancy results. Than we proposed the improved design method using the adjusted value of shear strength of concrete CRd,c. The results obtained by the improved design method showed satisfactory reproducibility.

  1. RH-TRU Waste Content Codes

    Energy Technology Data Exchange (ETDEWEB)

    Washington TRU Solutions

    2007-07-01

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: • A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. • A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is “3.” The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR

  2. Spatially coded backscatter radiography

    International Nuclear Information System (INIS)

    Thangavelu, S.; Hussein, E.M.A.

    2007-01-01

    Conventional radiography requires access to two opposite sides of an object, which makes it unsuitable for the inspection of extended and/or thick structures (airframes, bridges, floors etc.). Backscatter imaging can overcome this problem, but the indications obtained are difficult to interpret. This paper applies the coded aperture technique to gamma-ray backscatter-radiography in order to enhance the detectability of flaws. This spatial coding method involves the positioning of a mask with closed and open holes to selectively permit or block the passage of radiation. The obtained coded-aperture indications are then mathematically decoded to detect the presence of anomalies. Indications obtained from Monte Carlo calculations were utilized in this work to simulate radiation scattering measurements. These simulated measurements were used to investigate the applicability of this technique to the detection of flaws by backscatter radiography

  3. Aztheca Code; Codigo Aztheca

    Energy Technology Data Exchange (ETDEWEB)

    Quezada G, S.; Espinosa P, G. [Universidad Autonoma Metropolitana, Unidad Iztapalapa, San Rafael Atlixco No. 186, Col. Vicentina, 09340 Ciudad de Mexico (Mexico); Centeno P, J.; Sanchez M, H., E-mail: sequga@gmail.com [UNAM, Facultad de Ingenieria, Ciudad Universitaria, Circuito Exterior s/n, 04510 Ciudad de Mexico (Mexico)

    2017-09-15

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  4. The Coding Question.

    Science.gov (United States)

    Gallistel, C R

    2017-07-01

    Recent electrophysiological results imply that the duration of the stimulus onset asynchrony in eyeblink conditioning is encoded by a mechanism intrinsic to the cerebellar Purkinje cell. This raises the general question - how is quantitative information (durations, distances, rates, probabilities, amounts, etc.) transmitted by spike trains and encoded into engrams? The usual assumption is that information is transmitted by firing rates. However, rate codes are energetically inefficient and computationally awkward. A combinatorial code is more plausible. If the engram consists of altered synaptic conductances (the usual assumption), then we must ask how numbers may be written to synapses. It is much easier to formulate a coding hypothesis if the engram is realized by a cell-intrinsic molecular mechanism. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Revised SRAC code system

    International Nuclear Information System (INIS)

    Tsuchihashi, Keichiro; Ishiguro, Yukio; Kaneko, Kunio; Ido, Masaru.

    1986-09-01

    Since the publication of JAERI-1285 in 1983 for the preliminary version of the SRAC code system, a number of additions and modifications to the functions have been made to establish an overall neutronics code system. Major points are (1) addition of JENDL-2 version of data library, (2) a direct treatment of doubly heterogeneous effect on resonance absorption, (3) a generalized Dancoff factor, (4) a cell calculation based on the fixed boundary source problem, (5) the corresponding edit required for experimental analysis and reactor design, (6) a perturbation theory calculation for reactivity change, (7) an auxiliary code for core burnup and fuel management, etc. This report is a revision of the users manual which consists of the general description, input data requirements and their explanation, detailed information on usage, mathematics, contents of libraries and sample I/O. (author)

  6. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  7. What to do with a Dead Research Code

    Science.gov (United States)

    Nemiroff, Robert J.

    2016-01-01

    The project has ended -- should all of the computer codes that enabled the project be deleted? No. Like research papers, research codes typically carry valuable information past project end dates. Several possible end states to the life of research codes are reviewed. Historically, codes are typically left dormant on an increasingly obscure local disk directory until forgotten. These codes will likely become any or all of: lost, impossible to compile and run, difficult to decipher, and likely deleted when the code's proprietor moves on or dies. It is argued here, though, that it would be better for both code authors and astronomy generally if project codes were archived after use in some way. Archiving is advantageous for code authors because archived codes might increase the author's ADS citable publications, while astronomy as a science gains transparency and reproducibility. Paper-specific codes should be included in the publication of the journal papers they support, just like figures and tables. General codes that support multiple papers, possibly written by multiple authors, including their supporting websites, should be registered with a code registry such as the Astrophysics Source Code Library (ASCL). Codes developed on GitHub can be archived with a third party service such as, currently, BackHub. An important code version might be uploaded to a web archiving service like, currently, Zenodo or Figshare, so that this version receives a Digital Object Identifier (DOI), enabling it to found at a stable address into the future. Similar archiving services that are not DOI-dependent include perma.cc and the Internet Archive Wayback Machine at archive.org. Perhaps most simply, copies of important codes with lasting value might be kept on a cloud service like, for example, Google Drive, while activating Google's Inactive Account Manager.

  8. The correspondence between projective codes and 2-weight codes

    NARCIS (Netherlands)

    Brouwer, A.E.; Eupen, van M.J.M.; Tilborg, van H.C.A.; Willems, F.M.J.

    1994-01-01

    The hyperplanes intersecting a 2-weight code in the same number of points obviously form the point set of a projective code. On the other hand, if we have a projective code C, then we can make a 2-weight code by taking the multiset of points E PC with multiplicity "Y(w), where W is the weight of

  9. Visualizing code and coverage changes for code review

    NARCIS (Netherlands)

    Oosterwaal, Sebastiaan; van Deursen, A.; De Souza Coelho, R.; Sawant, A.A.; Bacchelli, A.

    2016-01-01

    One of the tasks of reviewers is to verify that code modifications are well tested. However, current tools offer little support in understanding precisely how changes to the code relate to changes to the tests. In particular, it is hard to see whether (modified) test code covers the changed code.

  10. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    Today, both turbo codes and low-density parity-check codes are largely superior to other code families and are being used in an increasing number of modern communication systems including 3G standards, satellite and deep space communications. However, the two codes have certain distinctive characteristics that ...

  11. The effect of a 6-week land and resistance training of 13-16 years old swimmers groups to lower limb isokinetic strength values and to swimming performance13-16 yaş grubu yüzücülerde 6 haftalık kara ve direnç antrenmanlarının alt ekstremite izokinetik kuvvet performansına ve yüzme derecelerine etkisi

    OpenAIRE

    Yapıcı, Ayşegül; Maden, Barış; Fındıkoğlu, Gülin

    2016-01-01

    The aim of this study is to investigate the effect of a 6-week land and resistance training of 13-16 year old swimmers groups to lower limb isokinetic strength values and to swimming performance. 22 swimmers participated in this study. The subjects were divided into three groups (A-B-C) according to their 50m swimming degrees. 25m underwater,25m,50m,75m and 100m freestyle swimming degrees of swimmers were recorded. As isokinetic measurements was applied at 60°/s,180°/s and 240°/s speed and th...

  12. Algorithms for coding scanned halftone pictures

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Forchhammer, Morten

    1988-01-01

    A method for coding scanned documents containing halftone pictures, e.g. newspapers and magazines, for transmission purposes is proposed. The halftone screen is estimated and the grey value of each dot is found, thus giving a compact description. At the receiver the picture is rescreened. A novel...

  13. On the subfield subcodes of Hermitian codes

    DEFF Research Database (Denmark)

    Pinero, Fernando; Janwa, Heeralal

    2014-01-01

    We present a fast algorithm using Gröbner basis to compute the dimensions of subfield subcodes of Hermitian codes. With these algorithms we are able to compute the exact values of the dimension of all subfield subcodes up to q ≤ 32 and length up to 215. We show that some of the subfield subcodes ...

  14. MARC Coding of DDC for Subject Retrieval.

    Science.gov (United States)

    Wajenberg, Arnold S.

    1983-01-01

    Recommends an expansion of MARC codes for decimal class numbers to enhance automated subject retrieval. Five values for a second indicator and two new subfields are suggested for encoding hierarchical relationships among decimal class numbers. Additional subfields are suggested to enhance retrieval through analysis of synthesized numbers in…

  15. Code of Medical Ethics

    Directory of Open Access Journals (Sweden)

    . SZD-SZZ

    2017-03-01

    Full Text Available Te Code was approved on December 12, 1992, at the 3rd regular meeting of the General Assembly of the Medical Chamber of Slovenia and revised on April 24, 1997, at the 27th regular meeting of the General Assembly of the Medical Chamber of Slovenia. The Code was updated and harmonized with the Medical Association of Slovenia and approved on October 6, 2016, at the regular meeting of the General Assembly of the Medical Chamber of Slovenia.

  16. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed

    2018-04-08

    Convolutional Sparse Coding (CSC) is a well-established image representation model especially suited for image restoration tasks. In this work, we extend the applicability of this model by proposing a supervised approach to convolutional sparse coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements to be discriminative. Experimental results show that using supervised convolutional learning results in two key advantages. First, we learn more semantically relevant filters in the dictionary and second, we achieve improved image reconstruction on unseen data.

  17. CONCEPT computer code

    International Nuclear Information System (INIS)

    Delene, J.

    1984-01-01

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  18. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  19. ZERODUR: deterministic approach for strength design

    Science.gov (United States)

    Hartmann, Peter

    2012-12-01

    There is an increasing request for zero expansion glass ceramic ZERODUR substrates being capable of enduring higher operational static loads or accelerations. The integrity of structures such as optical or mechanical elements for satellites surviving rocket launches, filigree lightweight mirrors, wobbling mirrors, and reticle and wafer stages in microlithography must be guaranteed with low failure probability. Their design requires statistically relevant strength data. The traditional approach using the statistical two-parameter Weibull distribution suffered from two problems. The data sets were too small to obtain distribution parameters with sufficient accuracy and also too small to decide on the validity of the model. This holds especially for the low failure probability levels that are required for reliable applications. Extrapolation to 0.1% failure probability and below led to design strengths so low that higher load applications seemed to be not feasible. New data have been collected with numbers per set large enough to enable tests on the applicability of the three-parameter Weibull distribution. This distribution revealed to provide much better fitting of the data. Moreover it delivers a lower threshold value, which means a minimum value for breakage stress, allowing of removing statistical uncertainty by introducing a deterministic method to calculate design strength. Considerations taken from the theory of fracture mechanics as have been proven to be reliable with proof test qualifications of delicate structures made from brittle materials enable including fatigue due to stress corrosion in a straight forward way. With the formulae derived, either lifetime can be calculated from given stress or allowable stress from minimum required lifetime. The data, distributions, and design strength calculations for several practically relevant surface conditions of ZERODUR are given. The values obtained are significantly higher than those resulting from the two

  20. A method for the calculation of collision strengths for complex atomic structures based on Slater parameter optimisation

    International Nuclear Information System (INIS)

    Fawcett, B.C.; Mason, H.E.

    1989-02-01

    This report presents details of a new method to enable the computation of collision strengths for complex ions which is adapted from long established optimisation techniques previously applied to the calculation of atomic structures and oscillator strengths. The procedure involves the adjustment of Slater parameters so that they determine improved energy levels and eigenvectors. They provide a basis for collision strength calculations in ions where ab initio computations break down or result in reducible errors. This application is demonstrated through modifications of the DISTORTED WAVE collision code and SUPERSTRUCTURE atomic-structure code which interface via a transformation code JAJOM which processes their output. (author)

  1. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . 171 4.9 Codes form order domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4.10 One-point geometric Goppa codes . . . . . . . . . . . . . . . . . . . . . . . . 176 4.11 Bibliographical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 References...

  2. Perturbation theory for arbitrary coupling strength?

    Science.gov (United States)

    Mahapatra, Bimal P.; Pradhan, Noubihary

    2018-03-01

    We present a new formulation of perturbation theory for quantum systems, designated here as: “mean field perturbation theory” (MFPT), which is free from power-series-expansion in any physical parameter, including the coupling strength. Its application is thereby extended to deal with interactions of arbitrary strength and to compute system-properties having non-analytic dependence on the coupling, thus overcoming the primary limitations of the “standard formulation of perturbation theory” (SFPT). MFPT is defined by developing perturbation about a chosen input Hamiltonian, which is exactly solvable but which acquires the nonlinearity and the analytic structure (in the coupling strength) of the original interaction through a self-consistent, feedback mechanism. We demonstrate Borel-summability of MFPT for the case of the quartic- and sextic-anharmonic oscillators and the quartic double-well oscillator (QDWO) by obtaining uniformly accurate results for the ground state of the above systems for arbitrary physical values of the coupling strength. The results obtained for the QDWO may be of particular significance since “renormalon”-free, unambiguous results are achieved for its spectrum in contrast to the well-known failure of SFPT in this case.

  3. Improving the quality of clinical coding: a comprehensive audit model

    Directory of Open Access Journals (Sweden)

    Hamid Moghaddasi

    2014-04-01

    Full Text Available Introduction: The review of medical records with the aim of assessing the quality of codes has long been conducted in different countries. Auditing medical coding, as an instructive approach, could help to review the quality of codes objectively using defined attributes, and this in turn would lead to improvement of the quality of codes. Method: The current study aimed to present a model for auditing the quality of clinical codes. The audit model was formed after reviewing other audit models, considering their strengths and weaknesses. A clear definition was presented for each quality attribute and more detailed criteria were then set for assessing the quality of codes. Results: The audit tool (based on the quality attributes included legibility, relevancy, completeness, accuracy, definition and timeliness; led to development of an audit model for assessing the quality of medical coding. Delphi technique was then used to reassure the validity of the model. Conclusion: The inclusive audit model designed could provide a reliable and valid basis for assessing the quality of codes considering more quality attributes and their clear definition. The inter-observer check suggested in the method of auditing is of particular importance to reassure the reliability of coding.

  4. Public Value: rethinking value creation

    OpenAIRE

    Meynhardt, Timo; Gomez, Peter; Strathoff, Pepe; Hermann, Carolin

    2014-01-01

    Managers might refute public criticism of their business as an attitude of taking everything for granted in a saturated society, but ignoring Public Value aspects can threaten the success of new products and even the survival of entire firms.

  5. Development and Application of a Code for Internal Exposure (CINEX) based on the CINDY code

    International Nuclear Information System (INIS)

    Kravchik, T.; Duchan, N.; Sarah, R.; Gabay, Y.; Kol, R.

    2004-01-01

    Internal exposure to radioactive materials at the NRCN is evaluated using the CINDY (Code for Internal Dosimetry) Package. The code was developed by the Pacific Northwest Laboratory to assist the interpretation of bioassay data, provide bioassay projections and evaluate committed and calendar-year doses from intake or bioassay measurement data. It provides capabilities to calculate organ dose and effective dose equivalents using the International Commission on Radiological Protection (ICRP) 30 approach. The CINDY code operates under DOS operating system and consequently its operation needs a relatively long procedure which also includes a lot of manual typing that can lead to personal human mistakes. A new code has been developed at the NRCN, the CINEX (Code for Internal Exposure), which is an Excel application and leads to a significant reduction in calculation time (in the order of 5-10 times) and in the risk of personal human mistakes. The code uses a database containing tables which were constructed by the CINDY and contain the bioassay values predicted by the ICRP30 model after an intake of an activity unit of each isotope. Using the database, the code than calculates the appropriate intake and consequently the committed effective dose and organ dose. Calculations with the CINEX code were compared to similar calculations with the CINDY code. The discrepancies were less than 5%, which is the rounding error of the CINDY code. Attached is a table which compares parameters calculated with the CINEX and the CINDY codes (for a class Y uranium). The CINEX is now used at the NRCN to calculate occupational intakes and doses to workers with radioactive materials

  6. Grip Strength Survey Based on Hand Tool Usage

    Directory of Open Access Journals (Sweden)

    Erman ÇAKIT

    2016-12-01

    Full Text Available Hand grip strength is broadly used for performing tasks involving equipment in production and processing activities. Most professionals in this field rely on grip strength to perform their tasks. There were three main aims of this study: i determining various hand grip strength measurements for the group of hand tool users, ii investigating the effects of height, weight, age, hand dominance, body mass index, previous Cumulative Trauma Disorder (CTD diagnosis, and hand tool usage experience on hand grip strength, and iii comparing the obtained results with existing data for other populations. The study groups comprised 71 healthy male facility workers. The values of subjects’ ages was observed between 26 and 74 years. The data were statistically analyzed to assess the normality of data and the percentile values of grip strength. The results of this study demonstrate that there were no significance differences noted between dominant and non-dominant hands. However, there were highly significant differences between the CTD group and the other group. Hand grip strength for the dominant hand was positively correlated to height, weight, and body mass index, and negatively correlated to age and tool usage experience. Hand dominance, height, weight, body mass index, age and tool usage experience should be considered when establishing normal values for grip strength.

  7. Code package to analyse behavior of the WWER fuel rods in normal operation: TOPRA's code

    International Nuclear Information System (INIS)

    Scheglov, A.; Proselkov, V.

    2001-01-01

    This paper briefly describes the code package intended for analysis of WWER fuel rod characteristics. The package includes two computer codes: TOPRA-1 and TOPRA-2 for full-scale fuel rod analyses; MRZ and MKK codes for analyzing the separate sections of fuel rods in r-z and r-j geometry. The TOPRA's codes are developed on the base of PIN-mod2 version and verified against experimental results obtained in MR, MIR and Halden research reactors (in the framework of SOFIT, FGR-2 and FUMEX experimental programs). Comparative analysis of calculation results and results from post-reactor examination of the WWER-440 and WWER-1000 fuel rod are also made as additional verification of these codes. To avoid the enlarging of uncertainties in fuel behavior prediction as a result of simplifying of the fuel geometry, MKK and MRZ codes are developed on the basis of the finite element method with use of the three nodal finite elements. Results obtained in the course of the code verification indicate the possibility for application of the method and TOPRA's code for simplified engineering calculations of WWER fuel rods thermal-physical parameters. An analysis of maximum relative errors for predicting of the fuel rod characteristics in the range of the accepted parameter values is also presented in the paper

  8. Dual Coding in Children.

    Science.gov (United States)

    Burton, John K.; Wildman, Terry M.

    The purpose of this study was to test the applicability of the dual coding hypothesis to children's recall performance. The hypothesis predicts that visual interference will have a small effect on the recall of visually presented words or pictures, but that acoustic interference will cause a decline in recall of visually presented words and…

  9. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  10. Radioactive action code

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    A new coding system, 'Hazrad', for buildings and transportation containers for alerting emergency services personnel to the presence of radioactive materials has been developed in the United Kingdom. The hazards of materials in the buildings or transport container, together with the recommended emergency action, are represented by a number of codes which are marked on the building or container and interpreted from a chart carried as a pocket-size guide. Buildings would be marked with the familiar yellow 'radioactive' trefoil, the written information 'Radioactive materials' and a list of isotopes. Under this the 'Hazrad' code would be written - three symbols to denote the relative radioactive risk (low, medium or high), the biological risk (also low, medium or high) and the third showing the type of radiation emitted, alpha, beta or gamma. The response cards indicate appropriate measures to take, eg for a high biological risk, Bio3, the wearing of a gas-tight protection suit is advised. The code and its uses are explained. (U.K.)

  11. Building Codes and Regulations.

    Science.gov (United States)

    Fisher, John L.

    The hazard of fire is of great concern to libraries due to combustible books and new plastics used in construction and interiors. Building codes and standards can offer architects and planners guidelines to follow but these standards should be closely monitored, updated, and researched for fire prevention. (DS)

  12. Physics of codes

    International Nuclear Information System (INIS)

    Cooper, R.K.; Jones, M.E.

    1989-01-01

    The title given this paper is a bit presumptuous, since one can hardly expect to cover the physics incorporated into all the codes already written and currently being written. The authors focus on those codes which have been found to be particularly useful in the analysis and design of linacs. At that the authors will be a bit parochial and discuss primarily those codes used for the design of radio-frequency (rf) linacs, although the discussions of TRANSPORT and MARYLIE have little to do with the time structures of the beams being analyzed. The plan of this paper is first to describe rather simply the concepts of emittance and brightness, then to describe rather briefly each of the codes TRANSPORT, PARMTEQ, TBCI, MARYLIE, and ISIS, indicating what physics is and is not included in each of them. It is expected that the vast majority of what is covered will apply equally well to protons and electrons (and other particles). This material is intended to be tutorial in nature and can in no way be expected to be exhaustive. 31 references, 4 figures

  13. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  14. Nuclear safety code study

    Energy Technology Data Exchange (ETDEWEB)

    Hu, H.H.; Ford, D.; Le, H.; Park, S.; Cooke, K.L.; Bleakney, T.; Spanier, J.; Wilburn, N.P.; O' Reilly, B.; Carmichael, B.

    1981-01-01

    The objective is to analyze an overpower accident in an LMFBR. A simplified model of the primary coolant loop was developed in order to understand the instabilities encountered with the MELT III and SAS codes. The computer programs were translated for switching to the IBM 4331. Numerical methods were investigated for solving the neutron kinetics equations; the Adams and Gear methods were compared. (DLC)

  15. Revised C++ coding conventions

    CERN Document Server

    Callot, O

    2001-01-01

    This document replaces the note LHCb 98-049 by Pavel Binko. After a few years of practice, some simplification and clarification of the rules was needed. As many more people have now some experience in writing C++ code, their opinion was also taken into account to get a commonly agreed set of conventions

  16. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  17. Error Correcting Codes -34 ...

    Indian Academy of Sciences (India)

    information and coding theory. A large scale relay computer had failed to deliver the expected results due to a hardware fault. Hamming, one of the active proponents of computer usage, was determined to find an efficient means by which computers could detect and correct their own faults. A mathematician by train-.

  18. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives ...

  19. Software Defined Coded Networking

    DEFF Research Database (Denmark)

    Di Paola, Carla; Roetter, Daniel Enrique Lucani; Palazzo, Sergio

    2017-01-01

    the quality of each link and even across neighbouring links and using simulations to show that an additional reduction of packet transmission in the order of 40% is possible. Second, to advocate for the use of network coding (NC) jointly with software defined networking (SDN) providing an implementation...

  20. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  1. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  2. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    having a probability Pi of being equal to a 1. Let us assume ... equal to a 0/1 has no bearing on the probability of the. It is often ... bits (call this set S) whose individual bits add up to zero ... In the context of binary error-correct~ng codes, specifi-.

  3. The Redox Code.

    Science.gov (United States)

    Jones, Dean P; Sies, Helmut

    2015-09-20

    The redox code is a set of principles that defines the positioning of the nicotinamide adenine dinucleotide (NAD, NADP) and thiol/disulfide and other redox systems as well as the thiol redox proteome in space and time in biological systems. The code is richly elaborated in an oxygen-dependent life, where activation/deactivation cycles involving O₂ and H₂O₂ contribute to spatiotemporal organization for differentiation, development, and adaptation to the environment. Disruption of this organizational structure during oxidative stress represents a fundamental mechanism in system failure and disease. Methodology in assessing components of the redox code under physiological conditions has progressed, permitting insight into spatiotemporal organization and allowing for identification of redox partners in redox proteomics and redox metabolomics. Complexity of redox networks and redox regulation is being revealed step by step, yet much still needs to be learned. Detailed knowledge of the molecular patterns generated from the principles of the redox code under defined physiological or pathological conditions in cells and organs will contribute to understanding the redox component in health and disease. Ultimately, there will be a scientific basis to a modern redox medicine.

  4. Remote-Handled Transuranic Content Codes

    Energy Technology Data Exchange (ETDEWEB)

    Washington TRU Solutions

    2006-12-01

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: • A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. • A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is “3.” The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR

  5. Values Clarification: Your Job or Mine?

    Science.gov (United States)

    McGough, Kris

    1977-01-01

    The author criticizes values clarification techniques done without parental consent in non-elective courses because they invade privacy, lead to ethical relativism, and have the potential to damage children's ego-strength. (Author/AV)

  6. Brittle-fracture statistics for the determination of the strength of fuel particle coatings

    International Nuclear Information System (INIS)

    Bongartz, K.; Schuster, H.

    1976-04-01

    Two influences on characteristic strength values of brittle materials were investigated: the specimen number which is limited in the laboratory by practical reasons, and the procedure for fitting the Weibull formalism to experimental results. The study was performed with respect to the evaluation of the strength of coatings of HTR-fuel particles. Strength values following Weibull statistics were produced artificially to simulate experimental results. The applicability of four different methods was studied to get best fits of the Weibull parameters to these values. The relation of the scatter of strength values and Weibull parameter to the specimen number is determined. (orig./GSCH) [de

  7. Value of Fundamental Science

    Science.gov (United States)

    Burov, Alexey

    Fundamental science is a hard, long-term human adventure that has required high devotion and social support, especially significant in our epoch of Mega-science. The measure of this devotion and this support expresses the real value of the fundamental science in public opinion. Why does fundamental science have value? What determines its strength and what endangers it? The dominant answer is that the value of science arises out of curiosity and is supported by the technological progress. Is this really a good, astute answer? When trying to attract public support, we talk about the ``mystery of the universe''. Why do these words sound so attractive? What is implied by and what is incompatible with them? More than two centuries ago, Immanuel Kant asserted an inseparable entanglement between ethics and metaphysics. Thus, we may ask: which metaphysics supports the value of scientific cognition, and which does not? Should we continue to neglect the dependence of value of pure science on metaphysics? If not, how can this issue be addressed in the public outreach? Is the public alienated by one or another message coming from the face of science? What does it mean to be politically correct in this sort of discussion?

  8. Z₂-double cyclic codes

    OpenAIRE

    Borges, J.

    2014-01-01

    A binary linear code C is a Z2-double cyclic code if the set of coordinates can be partitioned into two subsets such that any cyclic shift of the coordinates of both subsets leaves invariant the code. These codes can be identified as submodules of the Z2[x]-module Z2[x]/(x^r − 1) × Z2[x]/(x^s − 1). We determine the structure of Z2-double cyclic codes giving the generator polynomials of these codes. The related polynomial representation of Z2-double cyclic codes and its duals, and the relation...

  9. Loading Conditions and Longitudinal Strength

    DEFF Research Database (Denmark)

    Sørensen, Herman

    1995-01-01

    Methods for the calculation of the lightweight of the ship.Loading conditions satisfying draught, trim and intact stability requirements and analysis of the corresponding stillwater longitudinal strength.......Methods for the calculation of the lightweight of the ship.Loading conditions satisfying draught, trim and intact stability requirements and analysis of the corresponding stillwater longitudinal strength....

  10. Oscillator strengths for neutral technetium

    International Nuclear Information System (INIS)

    Garstang, R.H.

    1981-01-01

    Oscillator strengths have been calculated for most of the spectral lines of TcI which are of interest in the study of stars of spectral type S. Oscillator strengths have been computed for the corresponding transitions in MnI as a partial check of the technetium calculations

  11. Variable weight spectral amplitude coding for multiservice OCDMA networks

    Science.gov (United States)

    Seyedzadeh, Saleh; Rahimian, Farzad Pour; Glesk, Ivan; Kakaee, Majid H.

    2017-09-01

    The emergence of heterogeneous data traffic such as voice over IP, video streaming and online gaming have demanded networks with capability of supporting quality of service (QoS) at the physical layer with traffic prioritisation. This paper proposes a new variable-weight code based on spectral amplitude coding for optical code-division multiple-access (OCDMA) networks to support QoS differentiation. The proposed variable-weight multi-service (VW-MS) code relies on basic matrix construction. A mathematical model is developed for performance evaluation of VW-MS OCDMA networks. It is shown that the proposed code provides an optimal code length with minimum cross-correlation value when compared to other codes. Numerical results for a VW-MS OCDMA network designed for triple-play services operating at 0.622 Gb/s, 1.25 Gb/s and 2.5 Gb/s are considered.

  12. Collision strengths for dipole-allowed transitions in S II

    International Nuclear Information System (INIS)

    Ho, Y.K.; Henry, R.J.W.

    1990-01-01

    Calculations of collision strengths for electron-impact excitations of S II from the ground state 3p3 4S0 to excited states 3p4 4P, 3d 4F, 3d 4D, 4s 4P, and 3d 4P were carried out using the R-matrix code described by Berrington et al. (1978) and the NIEM code described by Henry et al. (1981). Results are presented for the thermally averaged collision strengths for the five-state and six-state calculations. Convergence behaviors were examined by comparison with the six-state calculations and the previously obtained two-state calculations. Uncertainties for these transitions were estimated to be within 20 percent, except for the 4S0 - 3p4 4P transition in which a 40 percent uncertainty was estimated. 22 refs

  13. STRENGTH OF NANOMODIFIED HIGH-STRENGTH LIGHTWEIGHT CONCRETES

    Directory of Open Access Journals (Sweden)

    NOZEMTСEV Alexandr Sergeevich

    2013-02-01

    Full Text Available The paper presents the results of research aimed at development of nanomodified high-strength lightweight concrete for construction. The developed concretes are of low average density and high ultimate compressive strength. It is shown that to produce this type of concrete one need to use hollow glass and aluminosilicate microspheres. To increase the durability of adhesion between cement stone and fine filler the authors offer to use complex nanodimensinal modifier based on iron hydroxide sol and silica sol as a surface nanomodifier for hollow microspheres. It is hypothesized that the proposed modifier has complex effect on the activity of the cement hydration and, at the same time increases bond strength between filler and cement-mineral matrix. The compositions for energy-efficient nanomodified high-strength lightweight concrete which density is 1300…1500 kg/m³ and compressive strength is 40…65 MPa have been developed. The approaches to the design of high-strength lightweight concrete with density of less than 2000 kg/m³ are formulated. It is noted that the proposed concretes possess dense homogeneous structure and moderate mobility. Thus, they allow processing by vibration during production. The economic and practical implications for realization of high-strength lightweight concrete in industrial production have been justified.

  14. Essential idempotents and simplex codes

    Directory of Open Access Journals (Sweden)

    Gladys Chalom

    2017-01-01

    Full Text Available We define essential idempotents in group algebras and use them to prove that every mininmal abelian non-cyclic code is a repetition code. Also we use them to prove that every minimal abelian code is equivalent to a minimal cyclic code of the same length. Finally, we show that a binary cyclic code is simplex if and only if is of length of the form $n=2^k-1$ and is generated by an essential idempotent.

  15. SCALE Code System

    Energy Technology Data Exchange (ETDEWEB)

    Jessee, Matthew Anderson [ORNL

    2016-04-01

    The SCALE Code System is a widely-used modeling and simulation suite for nuclear safety analysis and design that is developed, maintained, tested, and managed by the Reactor and Nuclear Systems Division (RNSD) of Oak Ridge National Laboratory (ORNL). SCALE provides a comprehensive, verified and validated, user-friendly tool set for criticality safety, reactor and lattice physics, radiation shielding, spent fuel and radioactive source term characterization, and sensitivity and uncertainty analysis. Since 1980, regulators, licensees, and research institutions around the world have used SCALE for safety analysis and design. SCALE provides an integrated framework with dozens of computational modules including three deterministic and three Monte Carlo radiation transport solvers that are selected based on the desired solution strategy. SCALE includes current nuclear data libraries and problem-dependent processing tools for continuous-energy (CE) and multigroup (MG) neutronics and coupled neutron-gamma calculations, as well as activation, depletion, and decay calculations. SCALE includes unique capabilities for automated variance reduction for shielding calculations, as well as sensitivity and uncertainty analysis. SCALE’s graphical user interfaces assist with accurate system modeling, visualization of nuclear data, and convenient access to desired results.SCALE 6.2 provides many new capabilities and significant improvements of existing features.New capabilities include:• ENDF/B-VII.1 nuclear data libraries CE and MG with enhanced group structures,• Neutron covariance data based on ENDF/B-VII.1 and supplemented with ORNL data,• Covariance data for fission product yields and decay constants,• Stochastic uncertainty and correlation quantification for any SCALE sequence with Sampler,• Parallel calculations with KENO,• Problem-dependent temperature corrections for CE calculations,• CE shielding and criticality accident alarm system analysis with MAVRIC,• CE

  16. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  17. Catalogue of oscillator strengths for Ti II lines

    International Nuclear Information System (INIS)

    Savanov, I.S.; Huovelin, J.; Tuominen, I.

    1990-01-01

    We have revised the published values of oscillator strengths for ionized titanium. The zero point of gf-values has been established using the lifetime measurements of excited states of atoms. The data on the adopted oscillator strengths for 419 Ti II lines are compiled. Using the adopted gf-values and the analysis by Biemont for the titanium in the solar atmosphere determined from the Ti II lines and the HOLMU model, we obtained the abundance log A(Ti) = 4.96 ± 0.05

  18. Strength conditions for the elastic structures with a stress error

    Science.gov (United States)

    Matveev, A. D.

    2017-10-01

    As is known, the constraints (strength conditions) for the safety factor of elastic structures and design details of a particular class, e.g. aviation structures are established, i.e. the safety factor values of such structures should be within the given range. It should be noted that the constraints are set for the safety factors corresponding to analytical (exact) solutions of elasticity problems represented for the structures. Developing the analytical solutions for most structures, especially irregular shape ones, is associated with great difficulties. Approximate approaches to solve the elasticity problems, e.g. the technical theories of deformation of homogeneous and composite plates, beams and shells, are widely used for a great number of structures. Technical theories based on the hypotheses give rise to approximate (technical) solutions with an irreducible error, with the exact value being difficult to be determined. In static calculations of the structural strength with a specified small range for the safety factors application of technical (by the Theory of Strength of Materials) solutions is difficult. However, there are some numerical methods for developing the approximate solutions of elasticity problems with arbitrarily small errors. In present paper, the adjusted reference (specified) strength conditions for the structural safety factor corresponding to approximate solution of the elasticity problem have been proposed. The stress error estimation is taken into account using the proposed strength conditions. It has been shown that, to fulfill the specified strength conditions for the safety factor of the given structure corresponding to an exact solution, the adjusted strength conditions for the structural safety factor corresponding to an approximate solution are required. The stress error estimation which is the basis for developing the adjusted strength conditions has been determined for the specified strength conditions. The adjusted strength

  19. Precision measurement of relative oscillator strengths

    International Nuclear Information System (INIS)

    Blackwell, D.E.; Ibbetson, P.A.; Petford, A.D.; Shallis, M.J.

    1979-01-01

    The accuracy of the Oxford method of comparing oscillator strengths has been improved by a factor of 10 to 0.5 per cent (0.002 dex) for low excitation lines. The improvements made to the apparatus are briefly described and its new performance discussed. A test for LTE in the furnace is also described. Relative oscillator strengths for 60 lines of Fe I with excitation potentials between 0.00 and 0.12 eV are given. Those with lambda > 320 nm have an accuracy of 0.5 per cent, and those with lambda < 320 nm have an accuracy of 1.0 per cent. Absolute values with an accuracy of 2.5 per cent for all lines are given. (author)

  20. Visual search asymmetries within color-coded and intensity-coded displays.

    Science.gov (United States)

    Yamani, Yusuke; McCarley, Jason S

    2010-06-01

    Color and intensity coding provide perceptual cues to segregate categories of objects within a visual display, allowing operators to search more efficiently for needed information. Even within a perceptually distinct subset of display elements, however, it may often be useful to prioritize items representing urgent or task-critical information. The design of symbology to produce search asymmetries (Treisman & Souther, 1985) offers a potential technique for doing this, but it is not obvious from existing models of search that an asymmetry observed in the absence of extraneous visual stimuli will persist within a complex color- or intensity-coded display. To address this issue, in the current study we measured the strength of a visual search asymmetry within displays containing color- or intensity-coded extraneous items. The asymmetry persisted strongly in the presence of extraneous items that were drawn in a different color (Experiment 1) or a lower contrast (Experiment 2) than the search-relevant items, with the targets favored by the search asymmetry producing highly efficient search. The asymmetry was attenuated but not eliminated when extraneous items were drawn in a higher contrast than search-relevant items (Experiment 3). Results imply that the coding of symbology to exploit visual search asymmetries can facilitate visual search for high-priority items even within color- or intensity-coded displays. PsycINFO Database Record (c) 2010 APA, all rights reserved.

  1. Add Value

    DEFF Research Database (Denmark)

    Kobbelgaard, Cecilie Elisabeth

    2016-01-01

    "Add Value – kend din kunde" er et brætspil, som giver både offentlige og private virksomheder unikke muligheder for at forbedre deres service overfor kunderne. Spillet giver, på en alternativ og handlingsorienteret måde, mulighed for at blive skarpere på kundeoplevelsen – hvor er der værdi...... at hente, og hvor kan der spares på tid og ressourcer? Dette samtidig med, at kunderne får den oplevelse og service, de forventer. Når I spiller "Add Value – kend din kunde" sættes der fokus på Jeres kundeservice ud fra kundens perspektiv, og det er i alle Jeres kontaktflader med kunden. Lige fra kunden...

  2. Microtensile bond strength of enamel after bleaching

    Directory of Open Access Journals (Sweden)

    Andréa Dias Neves Lago

    2013-01-01

    Full Text Available Objective: To evaluate the bond strength of a composite resin to the bovine enamel bleached with 35% hydrogen peroxide. It was used an etching-and-rinse adhesive system employed immediately, 7 and 14 days after the bleaching. Materials and Methods: Twenty bovine teeth were randomly distributed into 4 groups (n = 5, 3 experimental and 1 control. G1: Unbleached + restoration 14 days after storage in artificial saliva (control; G2: Bleached + restoration immediately after bleaching; G3: Bleached + restoration 7 days after bleaching; G4: Bleached + restoration 14 days after bleaching. Their buccal enamel surfaces were flattened, and a 25 mm² (5 × 5 mm area from each one of these regions was outlined so as to standardize the experimental region. Universal hybrid composite resin Filtek™Z350 was inserted into four layers of 1 mm each and photo-activated. The bond strength was quantitatively evaluated by a microtensile test (1.0 mm/min 24 h after the restorative procedures. The failure mode was assessed through scanning electron microscopy (SEM. Results: There was a significant reduction in the bond strength of the restored teeth immediately after the bleaching (G2. There were no significant differences in enamel bond strength between groups G1, G3, and G4. There was a predominance of adhesive and mixed (cohesive + adhesive failure in all groups. Conclusion: The 7-day-period after the end of the bleaching with 35% hydrogen peroxide was enough to achieve the appropriate values of bond strength to the enamel.

  3. Predicting vertebral bone strength by vertebral static histomorphometry

    DEFF Research Database (Denmark)

    Thomsen, Jesper Skovhus; Ebbesen, Ebbe Nils; Mosekilde, Lis

    2002-01-01

    of the entire vertebral bodies (L-2) were used for histomorphometry. The other iliac crest biopsies and the L-3 were destructively tested by compression. High correlation was found between BV/TV or Tb.Sp and vertebral bone strength (absolute value of r = 0.86 in both cases). Addition of Tb.Th significantly....... No gender-related differences were found in any of the relationships. Neither static histomorphometry nor biomechanical testing of iliac crest bone biopsies is a good predictor of vertebral bone strength.......The study investigates the relationship between static histomorphometry and bone strength of human lumbar vertebral bone. The ability of vertebral histomorphometry to predict vertebral bone strength was compared with that of vertebral densitometry, and also with histomorphometry and bone strength...

  4. Tensile rock mass strength estimated using InSAR

    KAUST Repository

    Jonsson, Sigurjon

    2012-11-01

    The large-scale strength of rock is known to be lower than the strength determined from small-scale samples in the laboratory. However, it is not well known how strength scales with sample size. I estimate kilometer-scale tensional rock mass strength by measuring offsets across new tensional fractures (joints), formed above a shallow magmatic dike intrusion in western Arabia in 2009. I use satellite radar observations to derive 3D ground displacements and by quantifying the extension accommodated by the joints and the maximum extension that did not result in a fracture, I put bounds on the joint initiation threshold of the surface rocks. The results indicate that the kilometer-scale tensile strength of the granitic rock mass is 1–3 MPa, almost an order of magnitude lower than typical laboratory values.

  5. Tensile rock mass strength estimated using InSAR

    KAUST Repository

    Jonsson, Sigurjon

    2012-01-01

    The large-scale strength of rock is known to be lower than the strength determined from small-scale samples in the laboratory. However, it is not well known how strength scales with sample size. I estimate kilometer-scale tensional rock mass strength by measuring offsets across new tensional fractures (joints), formed above a shallow magmatic dike intrusion in western Arabia in 2009. I use satellite radar observations to derive 3D ground displacements and by quantifying the extension accommodated by the joints and the maximum extension that did not result in a fracture, I put bounds on the joint initiation threshold of the surface rocks. The results indicate that the kilometer-scale tensile strength of the granitic rock mass is 1–3 MPa, almost an order of magnitude lower than typical laboratory values.

  6. Conservation Value

    OpenAIRE

    Tisdell, Clement A.

    2010-01-01

    This paper outlines the significance of the concept of conservation value and discusses ways in which it is determined paying attention to views stemming from utilitarian ethics and from deontological ethics. The importance of user costs in relation to economic decisions about the conservation and use of natural resources is emphasised. Particular attention is given to competing views about the importance of conserving natural resources in order to achieve economic sustainability. This then l...

  7. Measurement of reactivity coefficients for code validation

    International Nuclear Information System (INIS)

    Nuding, Matthias; Loetsch, Thomas

    2005-01-01

    In the year 2003 measurements in the cold reactor state have been performed at the NPP KKI 2 in order to validate the codes that are used for reactor core calculations and especially for the proof of the shutdown margin that is produced by calculations only. For full power states code verification is quite easy because the calculations can be compared with different measured values, e.g. with the activation values determined by the aeroball system. For cold reactor states, however the data base is smaller, especially for reactor cores that are quite 'inhomogeneous' and have rather high Pu-fiss-and 235 U-contents. At the same time the cold reactor state is important regarding the shutdown margin. For these reasons the measurements mentioned above have been performed in order to check the accuracy of the codes that are used by the operator and by our organization for many years. Basically, boron concentrations and control rod worths for different configurations have been measured. The results of the calculation show a very good agreement with the measured values. Therefore, it can be stated that the operator's as well as our code system is suitable for routine use, e.g. during licensing procedures (Authors)

  8. Tensile strength and fatigue strength of 6061 aluminum alloy friction welded joints

    Energy Technology Data Exchange (ETDEWEB)

    Ochi, H.; Tsujino, R. [Osaka Inst. of Tech., Asahi-ku Osaka (Japan); Sawai, T. [Osaka Sangyo Univ., Daito (Japan); Yamamoto, Y. [Setsunan Univ., Neyagawa (Japan); Ogawa, K. [Osaka Prefecture Univ., Sakai (Japan); Suga, Y. [Keio Univ., Kohoku-ku, Yokohama (Japan)

    2002-07-01

    Friction welding of 6061 aluminum alloy was carried out in order to examine the relationship between deformation heat input in the upset stage and joint performance. The joint performance was evaluated by tensile testing and fatigue testing. Stabilized tensile strength was obtained when the deformation heat input in the upset stage exceeded 200 J/s. Weld condition at the weld interface and the width of softened area affected fatigue strength more than tensile strength. That is, when the weld condition at the weld interface is good and the softened area is wide, fatigue strength increases. On the other hand, when the weld condition at the weld interface is good and the softened area is narrow, and when the weld condition at the weld interface is somewhat poor in spite of the wide softened area, fatigue strength decreases. The fatigue limit obtained by the fatigue testing revealed that, when the deformation heat input in the upset stage exceeded a certain value, sound joints could be produced. (orig.)

  9. The Alba ray tracing code: ART

    Science.gov (United States)

    Nicolas, Josep; Barla, Alessandro; Juanhuix, Jordi

    2013-09-01

    The Alba ray tracing code (ART) is a suite of Matlab functions and tools for the ray tracing simulation of x-ray beamlines. The code is structured in different layers, which allow its usage as part of optimization routines as well as an easy control from a graphical user interface. Additional tools for slope error handling and for grating efficiency calculations are also included. Generic characteristics of ART include the accumulation of rays to improve statistics without memory limitations, and still providing normalized values of flux and resolution in physically meaningful units.

  10. Should managers have a code of conduct?

    Science.gov (United States)

    Bayliss, P

    1994-02-01

    Much attention is currently being given to values and ethics in the NHS. Issues of accountability are being explored as a consequence of the Cadbury report. The Institute of Health Services Management (IHSM) is considering whether managers should have a code of ethics. Central to this issue is what managers themselves think; the application of such a code may well stand or fall by whether managers are prepared to have ownership of it, and are prepared to make it work. Paul Bayliss reports on a survey of managers' views.

  11. Decoding the productivity code

    DEFF Research Database (Denmark)

    Hansen, David

    . Improvement leaders can combine different improvement approaches, here problem solving and strength-based thinking, to achieve ambidextrous improvement capability that can balance exploitation and exploration. An organizational transformation is necessary to develop continuous improvement capability...... also showed that organizational transformation is not about changing people’s thinking or training them in new methods, but rather about the development of a coherent improvement system and the competence to initiate and management improvement processes in an organizational setting. The study......This thesis introduces a new perspective on how organizations can achieve sustainable organizational performance in a changing world. By integrating Lean, the strength-based perspective, and organizational development, the false dichotomy and struggle between rationalization and employee well being...

  12. Advanced Code for Photocathode Design

    Energy Technology Data Exchange (ETDEWEB)

    Ives, Robert Lawrence [Calabazas Creek Research, Inc., San Mateo, CA (United States); Jensen, Kevin [Naval Research Lab. (NRL), Washington, DC (United States); Montgomery, Eric [Univ. of Maryland, College Park, MD (United States); Bui, Thuc [Calabazas Creek Research, Inc., San Mateo, CA (United States)

    2015-12-15

    The Phase I activity demonstrated that PhotoQE could be upgraded and modified to allow input using a graphical user interface. Specific calls to platform-dependent (e.g. IMSL) function calls were removed, and Fortran77 components were rewritten for Fortran95 compliance. The subroutines, specifically the common block structures and shared data parameters, were reworked to allow the GUI to update material parameter data, and the system was targeted for desktop personal computer operation. The new structures overcomes the previous rigid and unmodifiable library structures by implementing new, materials library data sets and repositioning the library values to external files. Material data may originate from published literature or experimental measurements. Further optimization and restructuring would allow custom and specific emission models for beam codes that rely on parameterized photoemission algorithms. These would be based on simplified and parametric representations updated and extended from previous versions (e.g., Modified Fowler-Dubridge, Modified Three-Step, etc.).

  13. Entanglement-assisted quantum MDS codes constructed from negacyclic codes

    Science.gov (United States)

    Chen, Jianzhang; Huang, Yuanyuan; Feng, Chunhui; Chen, Riqing

    2017-12-01

    Recently, entanglement-assisted quantum codes have been constructed from cyclic codes by some scholars. However, how to determine the number of shared pairs required to construct entanglement-assisted quantum codes is not an easy work. In this paper, we propose a decomposition of the defining set of negacyclic codes. Based on this method, four families of entanglement-assisted quantum codes constructed in this paper satisfy the entanglement-assisted quantum Singleton bound, where the minimum distance satisfies q+1 ≤ d≤ n+2/2. Furthermore, we construct two families of entanglement-assisted quantum codes with maximal entanglement.

  14. ADGEN: An automated adjoint code generator for large-scale sensitivity analysis

    International Nuclear Information System (INIS)

    Pin, F.G.; Oblow, E.M.; Horwedel, J.E.; Lucius, J.L.

    1987-01-01

    This paper describes a new automated system, named ADGEN, which makes use of the strengths of computer calculus to automate the costly and time-consuming calculation of derivatives in FORTRAN computer codes, and automatically generate adjoint solutions of computer codes

  15. Structural strength of core graphite bars

    International Nuclear Information System (INIS)

    Kikuchi, K.; Futakawa, M.

    1987-01-01

    A HTR core consists of fuel, hot plenum, reflector and thermal barrier blocks. Each graphite block is supported by three thin cylindrical graphite bars called support post. Static and dynamic core loads are transmitted by the support posts to the thermal barrier blocks and a support plate. These posts are in contact with the blocks through hemispherical post seats to absorb the relative displacement caused by seismic force and the difference of thermal expansion of materials at the time of the start-up and shutdown of a reactor. The mixed fracture criterion of principal stress and modified Mohr-Coulomb's theory as well as the fracture criterion of principal stress based on elastic stress analysis was discussed in connection with the application to HTR graphite components. The buckling fracture of a support post was taken in consideration as one of the fracture modes. The effect that the length/diameter ratio of a post, small rotation and the curvature of post ends and seats exerted on the fracture strength was studied by using IG-110 graphite. Contacting stress analysis was carried out by using the structural analysis code 'COSMOS-7'. The experimental method, the analysis of buckling strength and the results are reported. The fracture of a support post is caused by the mixed mode of bending deformation, split fracture and shearing fracture. (Kako, I.)

  16. Influence of initial imperfections on ultimate strength of spherical shells

    Directory of Open Access Journals (Sweden)

    Chang-Li Yu

    2017-09-01

    Full Text Available Comprehensive consideration regarding influence mechanisms of initial imperfections on ultimate strength of spherical shells is taken to satisfy requirement of deep-sea structural design. The feasibility of innovative numerical procedure that combines welding simulation and non-linear buckling analysis is verified by a good agreement to experimental and theoretical results. Spherical shells with a series of wall thicknesses to radius ratios are studied. Residual stress and deformations from welding process are investigated separately. Variant influence mechanisms are discovered. Residual stress is demonstrated to be influential to stress field and buckling behavior but not to the ultimate strength. Deformations are proved to have a significant impact on ultimate strength. When central angles are less than critical value, concave magnitudes reduce ultimate strengths linearly. However, deformations with central angles above critical value are of much greater harm. Less imperfection susceptibility is found in spherical shells with larger wall thicknesses to radius ratios.

  17. [Reflection around the code of ethics for nurses].

    Science.gov (United States)

    Depoire, Nathalie

    2017-09-01

    The code of ethics for nurses highlights the values, principles and obligations which characterise our profession. It also emphasises the conditions required to enable nurses to perform their professional practice with the autonomy granted to them by the Public Health Code. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  18. Method and device for decoding coded digital video signals

    NARCIS (Netherlands)

    2000-01-01

    The invention relates to a video coding method and system including a quantization and coding sub-assembly (38) in which a quantization parameter is controlled by another parameter defined as being in direct relation with the dynamic range value of the data contained in given blocks of pixels.

  19. Efficient convolutional sparse coding

    Science.gov (United States)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  20. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off......-the-shelf hardware is less reliable than the dedicated network elements used in conventional cellular deployments. The typical solution for this problem is to duplicate network functions across geographically distributed hardware in order to ensure diversity. In contrast, this letter proposes to leverage channel...... coding in order to enhance the robustness on NFV to hardware failure. The proposed approach targets the network function of uplink channel decoding, and builds on the algebraic structure of the encoded data frames in order to perform in-network coding on the signals to be processed at different servers...

  1. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  2. Computer code FIT

    International Nuclear Information System (INIS)

    Rohmann, D.; Koehler, T.

    1987-02-01

    This is a description of the computer code FIT, written in FORTRAN-77 for a PDP 11/34. FIT is an interactive program to decude position, width and intensity of lines of X-ray spectra (max. length of 4K channels). The lines (max. 30 lines per fit) may have Gauss- or Voigt-profile, as well as exponential tails. Spectrum and fit can be displayed on a Tektronix terminal. (orig.) [de

  3. Code of Practice

    International Nuclear Information System (INIS)

    Doyle, Colin; Hone, Christopher; Nowlan, N.V.

    1984-05-01

    This Code of Practice introduces accepted safety procedures associated with the use of alpha, beta, gamma and X-radiation in secondary schools (pupils aged 12 to 18) in Ireland, and summarises good practice and procedures as they apply to radiation protection. Typical dose rates at various distances from sealed sources are quoted, and simplified equations are used to demonstrate dose and shielding calculations. The regulatory aspects of radiation protection are outlined, and references to statutory documents are given

  4. Tokamak simulation code manual

    International Nuclear Information System (INIS)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs

  5. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  6. Orthopedics coding and funding.

    Science.gov (United States)

    Baron, S; Duclos, C; Thoreux, P

    2014-02-01

    The French tarification à l'activité (T2A) prospective payment system is a financial system in which a health-care institution's resources are based on performed activity. Activity is described via the PMSI medical information system (programme de médicalisation du système d'information). The PMSI classifies hospital cases by clinical and economic categories known as diagnosis-related groups (DRG), each with an associated price tag. Coding a hospital case involves giving as realistic a description as possible so as to categorize it in the right DRG and thus ensure appropriate payment. For this, it is essential to understand what determines the pricing of inpatient stay: namely, the code for the surgical procedure, the patient's principal diagnosis (reason for admission), codes for comorbidities (everything that adds to management burden), and the management of the length of inpatient stay. The PMSI is used to analyze the institution's activity and dynamism: change on previous year, relation to target, and comparison with competing institutions based on indicators such as the mean length of stay performance indicator (MLS PI). The T2A system improves overall care efficiency. Quality of care, however, is not presently taken account of in the payment made to the institution, as there are no indicators for this; work needs to be done on this topic. Copyright © 2014. Published by Elsevier Masson SAS.

  7. Code Modernization of VPIC

    Science.gov (United States)

    Bird, Robert; Nystrom, David; Albright, Brian

    2017-10-01

    The ability of scientific simulations to effectively deliver performant computation is increasingly being challenged by successive generations of high-performance computing architectures. Code development to support efficient computation on these modern architectures is both expensive, and highly complex; if it is approached without due care, it may also not be directly transferable between subsequent hardware generations. Previous works have discussed techniques to support the process of adapting a legacy code for modern hardware generations, but despite the breakthroughs in the areas of mini-app development, portable-performance, and cache oblivious algorithms the problem still remains largely unsolved. In this work we demonstrate how a focus on platform agnostic modern code-development can be applied to Particle-in-Cell (PIC) simulations to facilitate effective scientific delivery. This work builds directly on our previous work optimizing VPIC, in which we replaced intrinsic based vectorisation with compile generated auto-vectorization to improve the performance and portability of VPIC. In this work we present the use of a specialized SIMD queue for processing some particle operations, and also preview a GPU capable OpenMP variant of VPIC. Finally we include a lessons learnt. Work performed under the auspices of the U.S. Dept. of Energy by the Los Alamos National Security, LLC Los Alamos National Laboratory under contract DE-AC52-06NA25396 and supported by the LANL LDRD program.

  8. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  9. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L.; Hodge, S.A.; Hyman, C.R.; Sanders, R.L.

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  10. Effective collision strengths of quasar ultraviolet emission lines

    International Nuclear Information System (INIS)

    Osterbrock, D.E.; Wallace, R.K.

    1977-01-01

    The best available published collision strengths for excitation of permitted and semiforbidden emission lines of abundant ions observed or expected in quasars have been collected and averaged over Maxwellian velocity distributions. For a few ions for which calculations are not available, extrapolation along isoelectronic sequences or in principal quantum number n was used to estimate values. These collision strengths were used to correct differentially published photoionization models of quasars, and the corrected models compared with published observational data

  11. [Compressive and bend strength of experimental admixed high copper alloys].

    Science.gov (United States)

    Sourai, P; Paximada, H; Lagouvardos, P; Douvitsas, G

    1988-01-01

    Mixed alloys for dental amalgams have been used mainly in the form of admixed alloys, where eutectic spheres are blend with conventional flakes. In the present study the compressive strength, bend strength and microstructure of two high-copper alloys (Tytin, Ana-2000) is compared with three experimental alloys prepared of the two high copper by mixing them in proportions of 3:1, 1:1 and 1:3 by weight. The results revealed that experimental alloys inherited high early and final strength values without any significant change in their microstructure.

  12. Explicit Constructions and Bounds for Batch Codes with Restricted Size of Reconstruction Sets

    OpenAIRE

    Thomas, Eldho K.; Skachek, Vitaly

    2017-01-01

    Linear batch codes and codes for private information retrieval (PIR) with a query size $t$ and a restricted size $r$ of the reconstruction sets are studied. New bounds on the parameters of such codes are derived for small values of $t$ or of $r$ by providing corresponding constructions. By building on the ideas of Cadambe and Mazumdar, a new bound in a recursive form is derived for batch codes and PIR codes.

  13. Effects of small defects and nonmetallic inclusions on the fatigue strength of metals

    International Nuclear Information System (INIS)

    Murakami, Y.

    1991-01-01

    The equation for predicting the effects of artificial small defects on the fatigue strength of metals is introduced, and it is applied to the quantitative evaluation of the effects of nonmetallic inclusions on the fatigue strength of high-strength steels. The importance of the concept that nonmetallic inclusions are virtually equivalent to defects, from the viewpoint of fatigue strength and, more practically, are equivalent to small cracks is emphasized. It is shown that nonmetallic inclusions cause relatively low-fatigue strength and large scatter of the fatigue strength of steels with high static strength or high hardness. The statistics of extreme values is used to estimate the expected maximum size of nonmetallic inclusions contained in a definite number of specimens. The lower limit of scatter in the fatigue strength of a high-strength steel is obtained by using the prediction equation for small defects together with the expected maximum size of nonmetallic inclusions

  14. Labour in Global Value Chains

    DEFF Research Database (Denmark)

    Lund-Thomsen, Peter; Nadvi, Khalid; Chan, Anita

    2012-01-01

    production contexts that influence work conditions. In doing so, it argues that current debates on the role of labour in global value chains have to go beyond a narrow focus on labour standards and corporate social responsibility compliance and engage with economic, technological and social upgrading......A critical challenge facing developing country producers is to meet international labour standards and codes of conduct in order to engage in global value chains. Evidence of gains for workers from compliance with such standards and codes remains limited and patchy. This article focuses...... on the global football industry, a sector dominated by leading global brands that manage dispersed global value chains. It assesses the working conditions for football stitchers engaged in different forms of work organization, factories, stitching centres and home-based settings in Pakistan, India and China...

  15. Advancing Kohlberg through Codes: Using Professional Codes To Reach the Moral Reasoning Objective in Undergraduate Ethics Courses.

    Science.gov (United States)

    Whitehouse, Ginny; Ingram, Michael T.

    The development of moral reasoning as a key course objective in undergraduate communication ethics classes can be accomplished by the critical and deliberate introduction of professional codes of ethics and the internalization of values found in those codes. Notably, "fostering moral reasoning skills" and "surveying current ethical…

  16. Quality Improvement of MARS Code and Establishment of Code Coupling

    International Nuclear Information System (INIS)

    Chung, Bub Dong; Jeong, Jae Jun; Kim, Kyung Doo

    2010-04-01

    The improvement of MARS code quality and coupling with regulatory auditing code have been accomplished for the establishment of self-reliable technology based regulatory auditing system. The unified auditing system code was realized also by implementing the CANDU specific models and correlations. As a part of the quality assurance activities, the various QA reports were published through the code assessments. The code manuals were updated and published a new manual which describe the new models and correlations. The code coupling methods were verified though the exercise of plant application. The education-training seminar and technology transfer were performed for the code users. The developed MARS-KS is utilized as reliable auditing tool for the resolving the safety issue and other regulatory calculations. The code can be utilized as a base technology for GEN IV reactor applications

  17. Design of convolutional tornado code

    Science.gov (United States)

    Zhou, Hui; Yang, Yao; Gao, Hongmin; Tan, Lu

    2017-09-01

    As a linear block code, the traditional tornado (tTN) code is inefficient in burst-erasure environment and its multi-level structure may lead to high encoding/decoding complexity. This paper presents a convolutional tornado (cTN) code which is able to improve the burst-erasure protection capability by applying the convolution property to the tTN code, and reduce computational complexity by abrogating the multi-level structure. The simulation results show that cTN code can provide a better packet loss protection performance with lower computation complexity than tTN code.

  18. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  19. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    Chin, Yu-Shan; Mathew, P.M.; Glowa, Glenn; Dickson, Ray; Liang, Zhe; Leitch, Brian; Barber, Duncan; Vasic, Aleks; Bentaib, Ahmed; Journeau, Christophe; Malet, Jeanne; Studer, Etienne; Meynet, Nicolas; Piluso, Pascal; Gelain, Thomas; Michielsen, Nathalie; Peillon, Samuel; Porcheron, Emmanuel; Albiol, Thierry; Clement, Bernard; Sonnenkalb, Martin; Klein-Hessling, Walter; Arndt, Siegfried; Weber, Gunter; Yanez, Jorge; Kotchourko, Alexei; Kuznetsov, Mike; Sangiorgi, Marco; Fontanet, Joan; Herranz, Luis; Garcia De La Rua, Carmen; Santiago, Aleza Enciso; Andreani, Michele; Paladino, Domenico; Dreier, Joerg; Lee, Richard; Amri, Abdallah

    2014-01-01

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  20. The reason for having a code of pharmaceutical ethics: Spanish Pharmacists Code of Ethics

    Directory of Open Access Journals (Sweden)

    Ana Mulet Alberola

    2017-05-01

    Full Text Available The pharmacist profession needs its own code of conduct set out in writing to serve as a stimulus to pharmacists in their day-to-day work in the different areas of pharmacy, in conjunction always with each individual pharmacist´s personal commitment to their patients, to other healthcare professionals and to society. An overview is provided of the different codes of ethics for pharmacists on the national and international scale, the most up-to-date code for 2015 being presented as a set of principles which must guide a pharmacutical conduct from the standpoint of deliberative judgment. The difference between codes of ethics and codes of practice is discussed. In the era of massive-scale collaboration, this code is a project holding bright prospects for the future. Each individual pharmacutical attitude in practicing their profession must be identified with the pursuit of excellence in their own personal practice for the purpose of achieving the ethical and professional values above and beyond complying with regulations and code of practice.

  1. The reason for having a code of pharmaceutical ethics: Spanish Pharmacists Code of Ethics.

    Science.gov (United States)

    Barreda Hernández, Dolores; Mulet Alberola, Ana; González Bermejo, Diana; Soler Company, Enrique

    2017-05-01

    The pharmacist profession needs its own code of conduct set out in writing to serve as a stimulus to pharmacists in their day-to-day work in the different areas of pharmacy, in conjunction always with each individual pharmacist´s personal commitment to their patients, to other healthcare professionals and to society. An overview is provided of the different codes of ethics for pharmacists on the national and international scale, the most up-to-date code for 2015 being presented as a set of principles which must guide a pharmacutical conduct from the standpoint of deliberative judgment. The difference between codes of ethics and codes of practice is discussed. In the era of massive-scale collaboration, this code is a project holding bright prospects for the future. Each individual pharmacutical attitude in practicing their profession must be identified with the pursuit of excellence in their own personal practice for the purpose of achieving the ethical and professional values above and beyond complying with regulations and code of practice. Copyright AULA MEDICA EDICIONES 2017. Published by AULA MEDICA. All rights reserved.

  2. SWAT2: The improved SWAT code system by incorporating the continuous energy Monte Carlo code MVP

    International Nuclear Information System (INIS)

    Mochizuki, Hiroki; Suyama, Kenya; Okuno, Hiroshi

    2003-01-01

    SWAT is a code system, which performs the burnup calculation by the combination of the neutronics calculation code, SRAC95 and the one group burnup calculation code, ORIGEN2.1. The SWAT code system can deal with the cell geometry in SRAC95. However, a precise treatment of resonance absorptions by the SRAC95 code using the ultra-fine group cross section library is not directly applicable to two- or three-dimensional geometry models, because of restrictions in SRAC95. To overcome this problem, SWAT2 which newly introduced the continuous energy Monte Carlo code, MVP into SWAT was developed. Thereby, the burnup calculation by the continuous energy in any geometry became possible. Moreover, using the 147 group cross section library called SWAT library, the reactions which are not dealt with by SRAC95 and MVP can be treated. OECD/NEA burnup credit criticality safety benchmark problems Phase-IB (PWR, a single pin cell model) and Phase-IIIB (BWR, fuel assembly model) were calculated as a verification of SWAT2, and the results were compared with the average values of calculation results of burnup calculation code of each organization. Through two benchmark problems, it was confirmed that SWAT2 was applicable to the burnup calculation of the complicated geometry. (author)

  3. 34 CFR 74.42 - Codes of conduct.

    Science.gov (United States)

    2010-07-01

    ... Procurement Standards § 74.42 Codes of conduct. The recipient shall maintain written standards of conduct... interest is not substantial or the gift is an unsolicited item of nominal value. The standards of conduct...

  4. 22 CFR 518.42 - Codes of conduct.

    Science.gov (United States)

    2010-04-01

    ... Procurement Standards § 518.42 Codes of conduct. The recipient shall maintain written standards of conduct... financial interest is not substantial or the gift is an unsolicited item of nominal value. The standards of...

  5. 22 CFR 145.42 - Code of conduct.

    Science.gov (United States)

    2010-04-01

    ..., HOSPITALS, AND OTHER NON-PROFIT ORGANIZATIONS Post-Award Requirements Procurement Standards § 145.42 Code of... substantial or the gift is an unsolicited item of nominal value. The standards of conduct shall provide for...

  6. 45 CFR 74.42 - Codes of conduct.

    Science.gov (United States)

    2010-10-01

    ..., AND COMMERCIAL ORGANIZATIONS Post-Award Requirements Procurement Standards § 74.42 Codes of conduct... the gift is an unsolicited item of nominal value. The standards of conduct shall provide for...

  7. 24 CFR 84.42 - Codes of conduct.

    Science.gov (United States)

    2010-04-01

    ..., HOSPITALS, AND OTHER NON-PROFIT ORGANIZATIONS Post-Award Requirements Procurement Standards § 84.42 Codes of... substantial or the gift is an unsolicited item of nominal value. The standards of conduct shall provide for...

  8. Elastic Resistance Effectiveness on Increasing Strength of Shoulders and Hips.

    Science.gov (United States)

    Picha, Kelsey J; Almaddah, Muataz R; Barker, Jordan; Ciochetty, Tavis; Black, W Scott; Uhl, Tim L

    2017-09-12

    Elastic resistance is a common training method used to gain strength. Currently, progression with elastic resistance is based on the perceived exertion of the exercise or completion of targeted repetitions; exact resistance is typically unknown. This study's objective is to determine if knowledge of load during elastic resistance exercise will increase strength gains during exercises. Participants were randomized into two strength training groups, elastic resistance only and elastic resistance using a load cell (LC) that displays force during exercise. The LC group used a Smart Handle (Patterson Medical Supply, Chicago, IL) to complete all exercises. Each participant completed the same exercises three times weekly for 8 weeks. The LC group was provided with a set load for exercises whereas the elastic resistance only group was not. Participant's strength was tested at baseline and program completion, measuring isometric strength for shoulder abduction (SAb), shoulder external rotation (SER), hip abduction (HAb), and hip extension (HEx). Independent t-tests were used to compare the normalized torques between groups. No significant differences were found between groups. Shoulder strength gains did not differ between groups (SAb p>0.05; SER p>0.05). Hip strength gains did not differ between groups (HAb p>0.05; HEx p>0.05). Both groups increased strength due to individual supervision, constantly evaluating degree of difficulty associated with exercise and providing feedback while using elastic resistance. Using a LC is as effective as supervised training and could provide value in a clinic setting when patients are working unsupervised.

  9. Statistical considerations of graphite strength for assessing design allowable stresses

    International Nuclear Information System (INIS)

    Ishihara, M.; Mogi, H.; Ioka, I.; Arai, T.; Oku, T.

    1987-01-01

    Several aspects of statistics need to be considered to determine design allowable stresses for graphite structures. These include: 1) Statistical variation of graphite material strength. 2) Uncertainty of calculated stress. 3) Reliability (survival probability) required from operational and safety performance of graphite structures. This paper deals with some statistical considerations of structural graphite for assessing design allowable stress. Firstly, probability distribution functions of tensile and compressive strengths are investigated on experimental Very High Temperature candidated graphites. Normal, logarithmic normal and Weibull distribution functions are compared in terms of coefficient of correlation to measured strength data. This leads to the adaptation of normal distribution function. Then, the relation between factor of safety and fracture probability is discussed on the following items: 1) As the graphite strength is more variable than metalic material's strength, the effect of strength variation to the fracture probability is evaluated. 2) Fracture probability depending on survival probability of 99 ∼ 99.9 (%) with confidence level of 90 ∼ 95 (%) is discussed. 3) As the material properties used in the design analysis are usually the mean values of their variation, the additional effect of these variations on the fracture probability is discussed. Finally, the way to assure the minimum ultimate strength with required survival probability with confidence level is discussed in view of statistical treatment of the strength data from varying sample numbers in a material acceptance test. (author)

  10. Estimated strength of shear keys in concrete dams

    Energy Technology Data Exchange (ETDEWEB)

    Curtis, D.D. [Hatch Energy, Niagara Falls, ON (Canada); Lum, K.K.Y. [BC Hydro, Burnaby, BC (Canada)

    2008-07-01

    BC Hydro requested that Hatch Energy review the seismic stability of Ruskin Dam which was constructed in 1930 at Hayward Lake in British Columbia. The concrete gravity dam is founded nearly entirely on rock in a narrow valley. The vertical joints between blocks are keyed and grouted. The strength of the shear keys was assessed when a non-linear finite element model found that significant forces were being transferred laterally to the abutments during an earthquake. The lateral transfer of loads to the abutment relies on the strength of the shear keys. The dynamic finite element analysis was used to determine the stability of the dam. A review of the shear strength measurements reported in literature showed that the measurements compared well to those obtained by BC Hydro from cores taken from Ruskin Dam. The cohesive strength obtained using the Griffith failure criteria was also in good agreement with both sets of measurements. A simple ultimate shear strength equation was developed using the Mohr-Coulomb failure criteria to determine combined cohesive and frictional strength of shear keys. Safety factors of 2.0 for static loads and 1.5 for seismic loads were proposed to reduce the ultimate strength to allowable values. It was concluded that given the relatively high shear strength established for the shear keys, the abutment rock or dam/abutment contact will control the amount of load which can arch to the abutments. 8 refs., 4 tabs., 5 figs.

  11. Strength Calculation of Locally Loaded Orthotropic Shells

    Directory of Open Access Journals (Sweden)

    Yu. I. Vinogradov

    2015-01-01

    Full Text Available The article studies laminated orthotropic cylindrical, conic, spherical, and toroidal shells, which are often locally loaded in the aircraft designs over small areas of their surfaces.The aim of this work is to determine stress concentration in shells versus structure of orthotropic composite material, shell form and parameters, forms of loading areas, which borders do not coincide with lines of main curvatures of shells. For this purpose, an analytical computing algorithm to estimate strength of shells in terms of stress is developed. It enables us to have solution results of the boundary value problem with a controlled error. To solve differential equations an analytical method is used. An algorithm of the boundary value problem solution is multiplicative.The main results of researches are graphs of stress concentration in the orthotropic shells versus their parameters and areas of loading lineated by circles and ellipses.Among the other works aimed at determination of stress concentration in shells, the place of this one is defined by the analytical solution of applied problems for strength estimation in terms of shell stresses of classical forms.The developed effective analytical algorithm to solve the boundary value problem and received results are useful in research and development.

  12. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  13. TASS code topical report. V.1 TASS code technical manual

    International Nuclear Information System (INIS)

    Sim, Suk K.; Chang, W. P.; Kim, K. D.; Kim, H. C.; Yoon, H. Y.

    1997-02-01

    TASS 1.0 code has been developed at KAERI for the initial and reload non-LOCA safety analysis for the operating PWRs as well as the PWRs under construction in Korea. TASS code will replace various vendor's non-LOCA safety analysis codes currently used for the Westinghouse and ABB-CE type PWRs in Korea. This can be achieved through TASS code input modifications specific to each reactor type. The TASS code can be run interactively through the keyboard operation. A simimodular configuration used in developing the TASS code enables the user easily implement new models. TASS code has been programmed using FORTRAN77 which makes it easy to install and port for different computer environments. The TASS code can be utilized for the steady state simulation as well as the non-LOCA transient simulations such as power excursions, reactor coolant pump trips, load rejections, loss of feedwater, steam line breaks, steam generator tube ruptures, rod withdrawal and drop, and anticipated transients without scram (ATWS). The malfunctions of the control systems, components, operator actions and the transients caused by the malfunctions can be easily simulated using the TASS code. This technical report describes the TASS 1.0 code models including reactor thermal hydraulic, reactor core and control models. This TASS code models including reactor thermal hydraulic, reactor core and control models. This TASS code technical manual has been prepared as a part of the TASS code manual which includes TASS code user's manual and TASS code validation report, and will be submitted to the regulatory body as a TASS code topical report for a licensing non-LOCA safety analysis for the Westinghouse and ABB-CE type PWRs operating and under construction in Korea. (author). 42 refs., 29 tabs., 32 figs

  14. Construction of new quantum MDS codes derived from constacyclic codes

    Science.gov (United States)

    Taneja, Divya; Gupta, Manish; Narula, Rajesh; Bhullar, Jaskaran

    Obtaining quantum maximum distance separable (MDS) codes from dual containing classical constacyclic codes using Hermitian construction have paved a path to undertake the challenges related to such constructions. Using the same technique, some new parameters of quantum MDS codes have been constructed here. One set of parameters obtained in this paper has achieved much larger distance than work done earlier. The remaining constructed parameters of quantum MDS codes have large minimum distance and were not explored yet.

  15. Strength Training and Your Child

    Science.gov (United States)

    ... in organized sports or activities such as baseball, soccer, or gymnastics usually can safely to start strength ... as biking and running, adequate hydration, and healthy nutrition. Reviewed by: Mary L. Gavin, MD Date reviewed: ...

  16. From “Smaller is Stronger” to “Size-Independent Strength Plateau”: Towards Measuring the Ideal Strength of Iron

    KAUST Repository

    Han, Wei-Zhong

    2015-04-17

    The trend from “smaller is stronger” to “size-independent strength plateau” is observed in the compression of spherical iron nanoparticles. When the diameter of iron nanospheres is less than a critical value, the maximum contact pressure saturates at 10.7 GPa, corresponding to a local shear stress of ≈9.4 GPa, which is comparable to the theoretical shear strength of iron.

  17. From “Smaller is Stronger” to “Size-Independent Strength Plateau”: Towards Measuring the Ideal Strength of Iron

    KAUST Repository

    Han, Wei-Zhong; Huang, Ling; Ogata, Shigenobu; Kimizuka, Hajime; Yang, Zhao-Chun; Weinberger, Christopher; Li, Qing-Jie; Liu, Bo-Yu; Zhang, Xixiang; Li, Ju; Ma, Evan; Shan, Zhi-Wei

    2015-01-01

    The trend from “smaller is stronger” to “size-independent strength plateau” is observed in the compression of spherical iron nanoparticles. When the diameter of iron nanospheres is less than a critical value, the maximum contact pressure saturates at 10.7 GPa, corresponding to a local shear stress of ≈9.4 GPa, which is comparable to the theoretical shear strength of iron.

  18. Phenotypic Graphs and Evolution Unfold the Standard Genetic Code as the Optimal

    Science.gov (United States)

    Zamudio, Gabriel S.; José, Marco V.

    2018-03-01

    In this work, we explicitly consider the evolution of the Standard Genetic Code (SGC) by assuming two evolutionary stages, to wit, the primeval RNY code and two intermediate codes in between. We used network theory and graph theory to measure the connectivity of each phenotypic graph. The connectivity values are compared to the values of the codes under different randomization scenarios. An error-correcting optimal code is one in which the algebraic connectivity is minimized. We show that the SGC is optimal in regard to its robustness and error-tolerance when compared to all random codes under different assumptions.

  19. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli.

  20. Hamor-2: a computer code for LWR inventory calculation

    International Nuclear Information System (INIS)

    Guimaraes, L.N.F.; Marzo, M.A.S.

    1985-01-01

    A method for calculating the accuracy inventory of LWR reactors is presented. This method uses the Hamor-2 computer code. Hamor-2 is obtained from the coupling of two other computer codes Hammer-Techion and Origen-2 for testing Hamor-2, its results were compared to concentration values measured from activides of two PWR reactors; Kernkraftwerk Obrighein (KWO) and H.B. Robinson (HBR). These actinides are U 235 , U 236 , U 238 , Pu 239 , Pu 241 and PU 242 . The computer code Hammor-2 shows better results than the computer code Origem-2, when both are compared with experimental results. (E.G.) [pt