WorldWideScience

Sample records for delivery condition codes

  1. Multiterminal source coding with complementary delivery

    CERN Document Server

    Kimura, Akisato

    2008-01-01

    A coding problem for correlated information sources is investigated. Messages emitted from two correlated sources are jointly encoded, and delivered to two decoders. Each decoder has access to one of the two messages to enable it to reproduce the other message. The rate-distortion function for the coding problem and its interesting properties are clarified.

  2. Universal coding for correlated sources with complementary delivery

    CERN Document Server

    Kimura, Akisato; Kuzuoka, Shigeaki

    2007-01-01

    This paper deals with a universal coding problem for a certain kind of multiterminal source coding system that we call the complementary delivery coding system. In this system, messages from two correlated sources are jointly encoded, and each decoder has access to one of the two messages to enable it to reproduce the other message. Both fixed-to-fixed length and fixed-to-variable length lossless coding schemes are considered. Explicit constructions of universal codes and bounds of the error probabilities are clarified via type-theoretical and graph-theoretical analyses. [[Keywords

  3. Unintended Insulin Pump Delivery in Hyperbaric Conditions.

    Science.gov (United States)

    Bertuzzi, Federico; Pintaudi, Basilio; Bonomo, Matteo; Garuti, Fabio

    2017-04-01

    Unintended pump insulin delivery was reported to occur as a consequence of decreased atmospheric pressure, probably mediated by air bubble formation and the expansion of existing bubbles. This observation has been used to explain some hypoglycemic episodes occurring in patients on insulin pump treatment in between 1 and 1 h 45 min after the flight takeoff. New models of insulin pumps have been introduced in the market, most of them are waterproof certified. It is not clear if in these new pumps the influence of atmospheric pressure changes on the insulin delivery is still present. Moreover, there are no evidences related to the insulin pump operations in hyperbaric conditions, like as during diving activities. Our aim is therefore to verify the eventual variation of insulin pump delivery determined by atmospheric pressure changes in hyperbaric conditions. Three new models of insulin pumps were tested in hyperbaric conditions at a flow rate of 2 U/h. Atmospheric pressure variation affected pump insulin release. An increase in the atmospheric pressure from 1 to 1.3 atmosphere (ATA) induced a decrease of pump basal insulin release (about -0.2 U/10 min); conversely, when the atmospheric pressure returned from 1.3 to 1 ATA, an unintended insulin delivery was observed (about +0.3 U/10 min). This phenomenon appeared to be independent of the insulin pump rate and dependent on the presence of air bubbles within the insulin tube setting and cartridge. Unintended insulin delivery driven by atmospheric pressure changes in hyperbaric conditions occurred in the new insulin pumps available. Patients should pay attention to possible variation of insulin rate during the flight or during diving activities.

  4. Estimating Patient Condition Codes Using Data Mining Techniques

    Science.gov (United States)

    2007-06-01

    Codes using Data Mining Techniques Revised title:___________________________________________________________________ Presented in (input and Bold one...Patient Condition Codes using Data Mining Techniques 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER...ANSI Std Z39-18 2 Estimating Patient Condition Codes using Data Mining Techniques 75th MORSS (WG 23) Joseph Parker, Teledyne Brown Engineering Ray

  5. Conditional entropy coding of DCT coefficients for video compression

    Science.gov (United States)

    Sipitca, Mihai; Gillman, David W.

    2000-04-01

    We introduce conditional Huffman encoding of DCT run-length events to improve the coding efficiency of low- and medium-bit rate video compression algorithms. We condition the Huffman code for each run-length event on a classification of the current block. We classify blocks according to coding mode and signal type, which are known to the decoder, and according to energy, which the decoder must receive as side information. Our classification schemes improve coding efficiency with little or no increased running time and some increased memory use.

  6. Source Code Analysis Laboratory (SCALe) for Energy Delivery Systems

    Science.gov (United States)

    2010-12-01

    and standar - dizing them through the ISO/IEC process should eliminate many of the problems encountered at the NIST SATE and also increase the...view the source code, using both structured and unstruct ons of secure coding rules discovered. However, manua than automated analysis, and the

  7. Delivery Time Reduction for Order-Constrained Applications using Binary Network Codes

    OpenAIRE

    Douik, Ahmed; Karim, Mohammad S.; Sadeghi, Parastoo; Sorour, Sameh

    2016-01-01

    Consider a radio access network wherein a base-station is required to deliver a set of order-constrained messages to a set of users over independent erasure channels. This paper studies the delivery time reduction problem using instantly decodable network coding (IDNC). Motivated by time-critical and order-constrained applications, the delivery time is defined, at each transmission, as the number of undelivered messages. The delivery time minimization problem being computationally intractable...

  8. [Automated delivery of codes for charge in radiotherapy].

    Science.gov (United States)

    Sauer, Michael; Volz, Steffen; Hall, Markus; Röhner, Fred; Frommhold, Hermann; Grosu, Anca-Ligia; Heinemann, Felix

    2010-07-01

    For the medical billing of Radiotherapy every fraction has to be encoded, including date and time of all administered treatments. With fractions averaging 30 per patient and about 2,500 new patients every year the number of Radiotherapy codes reaches an amount of 70,000 and more. Therefore, an automated proceeding for transferring and processing therapy codes has been developed at the Department of Radiotherapy Freiburg, Germany. This is a joint project of the Department of Radiotherapy, the Administration Department, and the Central IT Department of the University Hospital of Freiburg. The project consists of several modules whose collaboration makes the projected automated transfer of treatment codes possible. The first step is to extract the data from the department's Clinical Information System (MOSAIQ). These data are transmitted to the Central IT Department via an HL7 interface, where a check for corresponding hospitalization data is performed. In the further processing of the data, a matching table plays an important role allowing the transformation of a treatment code into a valid medical billing code. In a last step, the data are transferred to the medical billing system. After assembling and implementing the particular modules successfully, a first beta test was launched. In order to test the modules separately as well as the interaction of the components, extensive tests were performed during March 2006. Soon it became clear that the tested procedure worked efficiently and accurately. In April 2006, a pilot project with a few qualities of treatment (e.g., computed tomography, simulation) was put into practice. Since October 2006, nearly all Radiation Therapy codes (approximately 75,000) are being transferred to the comprehensive Hospital Information System (HIS) automatically in a daily routine.

  9. Periodic Boundary Conditions in the ALEGRA Finite Element Code

    Energy Technology Data Exchange (ETDEWEB)

    AIDUN,JOHN B.; ROBINSON,ALLEN C.; WEATHERBY,JOE R.

    1999-11-01

    This document describes the implementation of periodic boundary conditions in the ALEGRA finite element code. ALEGRA is an arbitrary Lagrangian-Eulerian multi-physics code with both explicit and implicit numerical algorithms. The periodic boundary implementation requires a consistent set of boundary input sets which are used to describe virtual periodic regions. The implementation is noninvasive to the majority of the ALEGRA coding and is based on the distributed memory parallel framework in ALEGRA. The technique involves extending the ghost element concept for interprocessor boundary communications in ALEGRA to additionally support on- and off-processor periodic boundary communications. The user interface, algorithmic details and sample computations are given.

  10. Weight hierarchies of linear codes satisfying the almost chain condition

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    The weight hierarchy of a linear [n, k; q] code C over GF(q) is the sequence (d1, d2,…,dk) where dr is the size of the smallest support of an r-dimensional subcode of C. An [n, k; q] codehas dimension r and support of size dr for all r. Further, C satisfies the almost chain condition ifit does not satisfy the chain condition, but there exist subcodes Dr of dimension r and support offor a sequence to be the weight hierarchy of a code satisfying the almost chain condition is given.Further, explicit constructions of such codes are given, showing that in almost all cases, the necessaryconditions are also sufficient.

  11. Rethinking mobile delivery: using Quick Response codes to access information at the point of need.

    Science.gov (United States)

    Lombardo, Nancy T; Morrow, Anne; Le Ber, Jeanne

    2012-01-01

    This article covers the use of Quick Response (QR) codes to provide instant mobile access to information, digital collections, educational offerings, library website, subject guides, text messages, videos, and library personnel. The array of uses and the value of using QR codes to push customized information to patrons are explained. A case is developed for using QR codes for mobile delivery of customized information to patrons. Applications in use at the Libraries of the University of Utah will be reviewed to provide readers with ideas for use in their library.

  12. IMPORTANCE OF DELIVERY CONDITIONS IN THE EXTERNAL PRICE CALCULATION

    Directory of Open Access Journals (Sweden)

    Violeta ISAI

    2005-01-01

    Full Text Available The delivery conditions of the merchandise at export, established by the rules INCOTERMS2000, influence the external price structure. There are some conditions in which the external priceincludes only the value of the merchandise and other conditions in which, besides the value of themerchandise, the price includes also the external transport and insurance. In the case of the exportson commercial credit, when it appears the notion of external interest, this one may be included in theprice or may be invoiced separately, thus defining gross external prices and net external prices.

  13. Arc Jet Facility Test Condition Predictions Using the ADSI Code

    Science.gov (United States)

    Palmer, Grant; Prabhu, Dinesh; Terrazas-Salinas, Imelda

    2015-01-01

    The Aerothermal Design Space Interpolation (ADSI) tool is used to interpolate databases of previously computed computational fluid dynamic solutions for test articles in a NASA Ames arc jet facility. The arc jet databases are generated using an Navier-Stokes flow solver using previously determined best practices. The arc jet mass flow rates and arc currents used to discretize the database are chosen to span the operating conditions possible in the arc jet, and are based on previous arc jet experimental conditions where possible. The ADSI code is a database interpolation, manipulation, and examination tool that can be used to estimate the stagnation point pressure and heating rate for user-specified values of arc jet mass flow rate and arc current. The interpolation is performed in the other direction (predicting mass flow and current to achieve a desired stagnation point pressure and heating rate). ADSI is also used to generate 2-D response surfaces of stagnation point pressure and heating rate as a function of mass flow rate and arc current (or vice versa). Arc jet test data is used to assess the predictive capability of the ADSI code.

  14. Cosmics cosmological initial conditions and microwave anisotropy codes

    CERN Document Server

    Bertschinger, E

    1995-01-01

    COSMICS is a package of fortran programs useful for computing transfer functions and microwave background anisotropy for cosmological models, and for generating gaussian random initial conditions for nonlinear structure formation simulations of such models. Four programs are provided: {\\bf linger\\_con} and {\\bf linger\\_syn} integrate the linearized equations of general relativity, matter, and radiation in conformal Newtonian and synchronous gauge, respectively; {\\bf deltat} integrates the photon transfer functions computed by the linger codes to produce photon anisotropy power spectra; and {\\bf grafic} tabulates normalized matter power spectra and produces constrained or unconstrained samples of the matter density field. Version 1.0 of COSMICS is available at http://arcturus.mit.edu/cosmics/ . The current release gives fortran-77 programs that run on workstations and vectorized supercomputers. Unix makefiles are included that make it simple to build and test the package. A future release will include portable...

  15. FFT-based Network Coding For Peer-To-Peer Content Delivery

    CERN Document Server

    Soro, Alexandre

    2009-01-01

    In this paper, we propose a structured peer-to-peer (P2P) distribution scheme based on Fast Fourier Transform (FFT) graphs. We build a peer-to-peer network that reproduces the FFT graph initially designed for hardware FFT codecs. This topology allows content delivery with a maximum diversity level for a minimum global complexity. The resulting FFTbased network is a structured architecture with an adapted network coding that brings flexibility upon content distribution and robustness upon the dynamic nature of the network. This structure can achieve optimal capacity in terms of content recovery while solving the problem of last remaining blocks, even for large networks.

  16. Optimization of conditions for gene delivery system based on PEI

    Directory of Open Access Journals (Sweden)

    Roya Cheraghi

    2017-01-01

    Full Text Available Objective(s: PEI based nanoparticle (NP due to dual capabilities of proton sponge and DNA binding is known as powerful tool for nucleic acid delivery to cells. However, serious cytotoxicity and complicated conditions, which govern NPs properties and its interactions with cells practically, hindered achievement to high transfection efficiency. Here, we have tried to optimize the properties of PEI/ firefly luciferase plasmid complexes and cellular condition to improve transfection efficiency. Materials and Methods: For this purpose, firefly luciferase, as a robust gene reporter, was complexed with PEI to prepare NPs with different size and charge. The physicochemical properties of nanoparticles were evaluated using agarose gel retardation and dynamic light scattering.  MCF7 and BT474 cells at different confluency were also transfected with prepared nanoparticles at various concentrations for short and long times. Results: The branched PEI can instantaneously bind to DNA and form cationic NPs. The results demonstrated the production of nanoparticles with size about 100-500 nm dependent on N/P ratio. Moreover, increase of nanoparticles concentration on the cell surface drastically improved the transfection rate, so at a concentration of 30 ng/ìl, the highest transfection efficiency was achieved. On the other side, at confluency between 40-60%, the maximum efficiency was obtained. The result demonstrated that N/P ratio of 12 could establish an optimized ratio between transfection efficiency and cytotoxicity of PEI/plasmid nanoparticles. The increase of NPs N/P ratio led to significant cytotoxicity. Conclusion: Obtained results verified the optimum conditions for PEI based gene delivery in different cell lines.

  17. Condition on price in contracts of petrol delivery at wholesale and retail in the Russian Federation

    Directory of Open Access Journals (Sweden)

    Irkyagul A. Sadriyevа

    2016-01-01

    Full Text Available Objective to reveal the peculiarities of forming conditions on price in contracts on delivery of oil products in wholesale and retail markets on thenbspbasis of analysis of legislation and law enforcement practice and to substantiate the proposals concerning the necessity to codify in the legislation the rule that a condition on price in the petrol delivery contract is an essential condition. Methods the methodological basis of the study includes general logical methods analysis induction analogy research synthesis and specific scientific methods of interpretation of law comparative law survey method. Results normative legal acts legal practice and theoretical ideas on price were analyzed. The expediency of the legal rule isnbsp grounded which stipulates that the condition on price in the petrol delivery contract is essential. The peculiarities are revealed of forming the conditions on price in the petrol delivery contracts in wholesale and retail markets. Scientific novelty the article attempts to divide the conditions of price forming on the wholesale and retail markets of oil products supplies. Thenbspconcept is formulated of price in petrol delivery contracts reflecting the specifics of relations in this sphere through analysis of court practice and petrol delivery contracts. Practical significance the conclusions of the research can be used in the field of legislative activity to improve the civil legislation on the petrol delivery contract. The article can be used in educational process for preparing special courses on civil and business law in the law schools. nbsp

  18. Plasminogen Activators and Ischemic Stroke: Conditions for Acute Delivery

    Science.gov (United States)

    del Zoppo, Gregory J

    2013-01-01

    Appropriate acute treatment with plasminogen activators (PAs) can significantly increase the probability of minimal or no disability in selected ischemic stroke patients. There is a great deal of evidence showing that intravenous recombinant tissue PAs (rt-PA) infusion accomplishes this goal, recanalization with other PAs has also been demonstrated in the development of this treatment. Recanalization of symptomatic, documented carotid or vertebrobasilar arterial territory occlusions have also been achieved by local intra-arterial PA delivery, although only a single prospective double-blinded randomized placebo-controlled study has been reported. The increase in intracerebral hemorrhage with these agents by either delivery approach underscores the need for careful patient selection, dose-appropriate safety and efficacy, proper clinical trial design, and an understanding of the evolution of cerebral tissue injury due to focal ischemia. Principles underlying the evolution of focal ischemia have been expanded by experience with acute PA intervention. Several questions remain open that concern the manner in which PAs can be applied acutely in ischemic stroke and how injury development can be limited. PMID:23539414

  19. PRESBC: pressure boundary conditions for the K-FIX code. Supplement III

    Energy Technology Data Exchange (ETDEWEB)

    Travis, J.R.; Rivard, W.C.

    1980-07-01

    Recommended pressure boundary condition modifications are described for the computer code K-FIX, which has been published in the report LA-NUREG-6623 and released to the National Energy Software Center in April 1977.

  20. Local conditions for global stability in the space of codons of the genetic code.

    Science.gov (United States)

    Salinas, Dino G; Gallardo, Mauricio O; Osorio, Manuel I

    2016-12-01

    The polar requirement is an attribute of amino acids that is a major determinant of the structure and function of the proteins, and it plays a role in the flexibility and robustness of the genetic code. The viability of an organism depends on flexibility, which allows the exploration of new functions. However, robustness is necessary to protect the organism from deleterious changes derived from misreading errors and single-point mutations. Compared with random codes, the standard genetic code is one of the most robust against such errors. Here, using analytical and numerical calculations and the set of amino acid-encoding codons, we have proposed some local conditions that are necessary for the optimal robustness of the genetic code, and we explored the association between the local conditions and the robustness. The localness of the proposed conditions and the underlying evolutionary mechanism, which begins with a random code and progresses toward more efficient codes (e.g., the standard code), might be biologically plausible. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  1. Program Code Generator for Cardiac Electrophysiology Simulation with Automatic PDE Boundary Condition Handling.

    Science.gov (United States)

    Punzalan, Florencio Rusty; Kunieda, Yoshitoshi; Amano, Akira

    2015-01-01

    Clinical and experimental studies involving human hearts can have certain limitations. Methods such as computer simulations can be an important alternative or supplemental tool. Physiological simulation at the tissue or organ level typically involves the handling of partial differential equations (PDEs). Boundary conditions and distributed parameters, such as those used in pharmacokinetics simulation, add to the complexity of the PDE solution. These factors can tailor PDE solutions and their corresponding program code to specific problems. Boundary condition and parameter changes in the customized code are usually prone to errors and time-consuming. We propose a general approach for handling PDEs and boundary conditions in computational models using a replacement scheme for discretization. This study is an extension of a program generator that we introduced in a previous publication. The program generator can generate code for multi-cell simulations of cardiac electrophysiology. Improvements to the system allow it to handle simultaneous equations in the biological function model as well as implicit PDE numerical schemes. The replacement scheme involves substituting all partial differential terms with numerical solution equations. Once the model and boundary equations are discretized with the numerical solution scheme, instances of the equations are generated to undergo dependency analysis. The result of the dependency analysis is then used to generate the program code. The resulting program code are in Java or C programming language. To validate the automatic handling of boundary conditions in the program code generator, we generated simulation code using the FHN, Luo-Rudy 1, and Hund-Rudy cell models and run cell-to-cell coupling and action potential propagation simulations. One of the simulations is based on a published experiment and simulation results are compared with the experimental data. We conclude that the proposed program code generator can be used to

  2. Program Code Generator for Cardiac Electrophysiology Simulation with Automatic PDE Boundary Condition Handling.

    Directory of Open Access Journals (Sweden)

    Florencio Rusty Punzalan

    Full Text Available Clinical and experimental studies involving human hearts can have certain limitations. Methods such as computer simulations can be an important alternative or supplemental tool. Physiological simulation at the tissue or organ level typically involves the handling of partial differential equations (PDEs. Boundary conditions and distributed parameters, such as those used in pharmacokinetics simulation, add to the complexity of the PDE solution. These factors can tailor PDE solutions and their corresponding program code to specific problems. Boundary condition and parameter changes in the customized code are usually prone to errors and time-consuming. We propose a general approach for handling PDEs and boundary conditions in computational models using a replacement scheme for discretization. This study is an extension of a program generator that we introduced in a previous publication. The program generator can generate code for multi-cell simulations of cardiac electrophysiology. Improvements to the system allow it to handle simultaneous equations in the biological function model as well as implicit PDE numerical schemes. The replacement scheme involves substituting all partial differential terms with numerical solution equations. Once the model and boundary equations are discretized with the numerical solution scheme, instances of the equations are generated to undergo dependency analysis. The result of the dependency analysis is then used to generate the program code. The resulting program code are in Java or C programming language. To validate the automatic handling of boundary conditions in the program code generator, we generated simulation code using the FHN, Luo-Rudy 1, and Hund-Rudy cell models and run cell-to-cell coupling and action potential propagation simulations. One of the simulations is based on a published experiment and simulation results are compared with the experimental data. We conclude that the proposed program code

  3. Clarifying Analysis and Interpretation in Grounded Theory: Using a Conditional Relationship Guide and Reflective Coding Matrix

    Directory of Open Access Journals (Sweden)

    Karen Wilson Scott PhD

    2008-06-01

    Full Text Available Although qualitative methods, grounded theory included, cannot be reduced to formulaic procedures, research tools can clarify the process. The authors discuss two instruments supporting grounded theory analysis and interpretation using two examples from doctoral students. The conditional relationship guide contextualizes the central phenomenon and relates categories linking structure with process. The reflective coding matrix serves as a bridge to the final phase of grounded theory analysis, selective coding and interpretation, and, ultimately, to substantive theory generation.

  4. DELIVERY OF GOOD IN THE LOAN AGREEMENT: CONDITION OF VALIDITY OR OBLIGATION OF THE LENDER?

    Directory of Open Access Journals (Sweden)

    LIVIU STANCIULESCU

    2011-04-01

    Full Text Available In theory, the loan is generally defined as a contract whereby a person, called the lender, shall use or immovable property of another person, called the loan, which is obliged to repay in kind. Based on the definition above national doctrine is unanimous in determining that the loan is a unilateral contract, because creates obligations only for the borrower. Similarly, the loan is a real contract because the manifestation of will must be accompanied by delivery of the good. Given the above, the question is obvious: delivery of the borrowed good is a condition of validity of the contract (specific for its formation or an obligation of the borrower (operating in the execution phase ? Please note that determining the legal nature of the good delivery has great importance to the doctrine and practice. Thus, relative to the approach adopted: „delivery - a condition of validity” or „ delivery - obligation of the lender”, legal consequences are totally different, with direct implications in defining the actual contract, the contract unilaterally rescinded the conditions in which they operate, etc.. In our approach we try to demonstrate that good delivery in the loan agreement can only be an obligation of the borrower (with all consequences arising from such qualification.

  5. Mode of delivery has an independent impact on neonatal condition at birth.

    Science.gov (United States)

    Prior, Tomas; Kumar, Sailesh

    2014-10-01

    Current intra-partum monitoring techniques are often criticized for their poor specificity, with their performance frequently evaluated using measures of the neonatal condition at birth as a surrogate marker for intra-partum fetal compromise. However, these measures may potentially be influenced by a multitude of other factors, including the mode of delivery itself. This study aimed to investigate the impact of mode of delivery on neonatal condition at birth. This prospective observational study, undertaken at a tertiary referral maternity unit in London, UK, included 604 'low risk' women recruited prior to delivery. Commonly assessed neonatal outcome variables (Apgar score at 1 and 5min, umbilical artery pH and base excess, neonatal unit admission, and a composite neonatal outcome score) were used to compare the condition at birth between babies born by different modes of delivery, using one-way ANOVA and chi-squared testing. Infants born by instrumental delivery for presumed fetal compromise had the poorest condition at birth (mean composite score=1.20), whereas those born by Cesarean section for presumed fetal compromise had a better condition at birth (mean composite score=0.64) (p=surrogate marker of intra-partum fetal compromise. When evaluating the efficacy of intra-partum monitoring techniques, the isolated use of Apgar scores, umbilical artery acidosis and neonatal unit admission should be discouraged. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  6. Inclusion of models to describe severe accident conditions in the fuel simulation code DIONISIO

    Energy Technology Data Exchange (ETDEWEB)

    Lemes, Martín; Soba, Alejandro [Sección Códigos y Modelos, Gerencia Ciclo del Combustible Nuclear, Comisión Nacional de Energía Atómica, Avenida General Paz 1499, 1650 San Martín, Provincia de Buenos Aires (Argentina); Daverio, Hernando [Gerencia Reactores y Centrales Nucleares, Comisión Nacional de Energía Atómica, Avenida General Paz 1499, 1650 San Martín, Provincia de Buenos Aires (Argentina); Denis, Alicia [Sección Códigos y Modelos, Gerencia Ciclo del Combustible Nuclear, Comisión Nacional de Energía Atómica, Avenida General Paz 1499, 1650 San Martín, Provincia de Buenos Aires (Argentina)

    2017-04-15

    The simulation of fuel rod behavior is a complex task that demands not only accurate models to describe the numerous phenomena occurring in the pellet, cladding and internal rod atmosphere but also an adequate interconnection between them. In the last years several models have been incorporated to the DIONISIO code with the purpose of increasing its precision and reliability. After the regrettable events at Fukushima, the need for codes capable of simulating nuclear fuels under accident conditions has come forth. Heat removal occurs in a quite different way than during normal operation and this fact determines a completely new set of conditions for the fuel materials. A detailed description of the different regimes the coolant may exhibit in such a wide variety of scenarios requires a thermal-hydraulic formulation not suitable to be included in a fuel performance code. Moreover, there exist a number of reliable and famous codes that perform this task. Nevertheless, and keeping in mind the purpose of building a code focused on the fuel behavior, a subroutine was developed for the DIONISIO code that performs a simplified analysis of the coolant in a PWR, restricted to the more representative situations and provides to the fuel simulation the boundary conditions necessary to reproduce accidental situations. In the present work this subroutine is described and the results of different comparisons with experimental data and with thermal-hydraulic codes are offered. It is verified that, in spite of its comparative simplicity, the predictions of this module of DIONISIO do not differ significantly from those of the specific, complex codes.

  7. ON THE SECOND GREEDY WEIGHT FOR LINEAR CODES SATISFYING THE FULLRANK CONDITION

    Institute of Scientific and Technical Information of China (English)

    CHEN Wende; KLφVE Torleiv

    2005-01-01

    The maximum of g2 - d2 for linear [n, k, d; q] codes C is studied. Here d2 is the smallest size of the support of 2-dimensional subcodes of C and g2 is the smallest size of the support of 2-dimensional subcodes of C which contains a codeword of weight d. The extra cost to the greedy adversary to get two symbols of inform ation using some algorithmis g2 - d2. For codes satisfying the fullrank condition of general dimensions, upper bounds on the maximum of g2 - d2 are given. Under some condition we have got code C where g2 - d2 reaches the upper bound.

  8. Automated delivery of codes for charge in radiotherapy; Automatisierte Leistungsuebermittlung in der Strahlenheilkunde

    Energy Technology Data Exchange (ETDEWEB)

    Sauer, Michael [Klinikrechenzentrum, Univ. Freiburg (Germany); Volz, Steffen [Verwaltung, Univ. Freiburg (Germany); Hall, Markus; Roehner, Fred; Frommhold, Hermann; Grosu, Anca-Ligia; Heinemann, Felix [Klinik fuer Strahlenheilkunde, Univ. Freiburg (Germany)

    2010-07-15

    Background and purpose: for the medical billing of Radiotherapy every fraction has to be encoded, including date and time of all administered treatments. With fractions averaging 30 per patient and about 2,500 new patients every year the number of Radiotherapy codes reaches an amount of 70,000 and more. Therefore, an automated proceeding for transferring and processing therapy codes has been developed at the Department of Radiotherapy Freiburg, Germany. This is a joint project of the Department of Radiotherapy, the Administration Department, and the Central II Department of the University Hospital of Freiburg. Material and methods: the project consists of several modules whose collaboration makes the projected automated transfer of treatment codes possible. The first step is to extract the data from the department's Clinical Information System (MOSAIQ). These data are transmitted to the Central IT Department via an HL7 interface, where a check for corresponding hospitalization data is performed. In the further processing of the data, a matching table plays an important role allowing the transformation of a treatment code into a valid medical billing code. In a last step, the data are transferred to the medical billing system. Results and conclusion: after assembling and implementing the particular modules successfully, a first beta test was launched. In order to test the modules separately as well as the interaction of the components, extensive tests were performed during March 2006. Soon it became clear that the tested procedure worked efficiently and accurately. In April 2006, a pilot project with a few qualities of treatment (e.g., computed tomography, simulation) was put into practice. Since October 2006, nearly all Radiation Therapy codes ({proportional_to} 75,000) are being transferred to the comprehensive Hospital Information System (HIS) automatically in a daily routine. (orig.)

  9. Extending the application range of a fuel performance code from normal operating to design basis accident conditions

    Science.gov (United States)

    Van Uffelen, P.; Győri, C.; Schubert, A.; van de Laar, J.; Hózer, Z.; Spykman, G.

    2008-12-01

    Two types of fuel performance codes are generally being applied, corresponding to the normal operating conditions and the design basis accident conditions, respectively. In order to simplify the code management and the interface between the codes, and to take advantage of the hardware progress it is favourable to generate a code that can cope with both conditions. In the first part of the present paper, we discuss the needs for creating such a code. The second part of the paper describes an example of model developments carried out by various members of the TRANSURANUS user group for coping with a loss of coolant accident (LOCA). In the third part, the validation of the extended fuel performance code is presented for LOCA conditions, whereas the last section summarises the present status and indicates needs for further developments to enable the code to deal with reactivity initiated accident (RIA) events.

  10. [Mode of delivery, postnatal condition and neonatal outcome in preterm infants].

    Science.gov (United States)

    Ruckhäberle, K E; Viehweg, B; Schlegel, C; Vogtmann, C; Böttcher, H; Schürer, K; Ruckhäberle, B; Weissbach, R; Wolff, C

    1979-01-01

    There were under examination 578 preterm infants of two groups--28. up to 31. and 32. up to 36. week of gestation--after birth of vertex as well as breech prevention. Postnatal condition and neonatal outcome were put into relation to the mode of delivery. We compared Apgar-Score (one and five minute value), morbidity on respiratory distress syndrom as well as rate of survival and neonatal mortality in spontaneous delivery with and without episiotomia, with specula delivery, Shute-forceps and vacuum extraction of vertex presentation as well as with breech presentation after vaginal delivery and primary Caesarean section. In respect of the management of the second stage of labour it is our opinion that prophylactic additional measures in preterm delivery of vertex presentation after 32 weeks of gestation are not necessary and that this question should be examined in a larger study of much more cases. But we were able to demonstrate that up to 32. week of gestation well-timed episiotomia of optimal size is necessary. Our good experiences in breech presentation between 31. and 35. week of gestation treated by obligate Caesarean section have to prove true in future.

  11. Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery

    Directory of Open Access Journals (Sweden)

    Afany Zeinata Firdaus

    2013-12-01

    Full Text Available In today's era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding the secret message is shorter than the average computation time making phase (extracting the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB . Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.

  12. Network-Coded Content Delivery in Femtocaching-Assisted Cellular Networks

    KAUST Repository

    Shnaiwer, Yousef N.

    2015-12-06

    Next-generation cellular networks are expected to be assisted by femtocaches (FCs), which collectively store the most popular files for the clients. Given any arbitrary non-fragmented placement of such files, a strict no-latency constraint, and clients\\' prior knowledge, new file download requests could be efficiently handled by both the FCs and the macrocell base station (MBS) using opportunistic network coding (ONC). In this paper, we aim to find the best allocation of coded file downloads to the FCs so as to minimize the MBS involvement in this download process. We first formulate this optimization problem over an ONC graph, and show that it is NP-hard. We then propose a greedy approach that maximizes the number of files downloaded by the FCs, with the goal to reduce the download share of the MBS. This allocation is performed using a dual conflict ONC graph to avoid conflicts among the FC downloads. Simulations show that our proposed scheme almost achieves the optimal performance and significantly saves on the MBS bandwidth.

  13. Spike-coding mechanisms of cerebellar temporal processing in classical conditioning and voluntary movements.

    Science.gov (United States)

    Yamaguchi, Kenji; Sakurai, Yoshio

    2014-10-01

    Time is a fundamental and critical factor in daily life. Millisecond timing, which is the underlying temporal processing for speaking, dancing, and other activities, is reported to rely on the cerebellum. In this review, we discuss the cerebellar spike-coding mechanisms for temporal processing. Although the contribution of the cerebellum to both classical conditioning and voluntary movements is well known, the difference of the mechanisms for temporal processing between classical conditioning and voluntary movements is not clear. Therefore, we review the evidence of cerebellar temporal processing in studies of classical conditioning and voluntary movements and report the similarities and differences between them. From some studies, which used tasks that can change some of the temporal properties (e.g., the duration of interstimulus intervals) with keeping identical movements, we concluded that classical conditioning and voluntary movements may share a common spike-coding mechanism because simple spikes in Purkinje cells decrease at predicted times for responses regardless of the intervals between responses or stimulation.

  14. Application of Hybrid Encoding Genetic Algorithm on Pickup and Delivery Traveling Salesman Problem with Traffic Conditions

    Directory of Open Access Journals (Sweden)

    S. Patvichaichod

    2011-01-01

    Full Text Available Problem statement: This study deals with the pickup and delivery traveling salesman problem with traffic conditions (PDTSPTW, an extension of the pickup and delivery traveling salesman problem (PDTSP where each customer to be served is associated with two quantities of product to be collected and delivered. Almost PDTSP problems uses distance between each point of customers as Euclidean Distance and are not concerned with other parameters to find minimal cost. Approach: The PDTSPTC concerns more parameters, such as street network and vehicle speed, which results it closer to the real world condition. The study also proposes the developed genetic algorithm called “Hybrid Encoding Genetic Algorithm (HEGA”. The concept is to combine binary encoding and integer encoding together, causing the in complexity of the algorithm structure and the ease of implementation. Results: the HEGA can save the travel cost about 26-57%. It is obviously seen that HEGA in the PDTSPTC test problems result the fast convergence that is about 12-43% and in all, the computational time is under 6 seconds. Conclusion: The HEGA performs quite well when testing a test problem. Computation times are small in all case. The PDTSPTC is closer to real-world conditions than PDTSP. This problem can be applied in logistics immediately if the distance of streets, traffic conditions (average vehicle speed in each street and vehicle conditions (fuel consumption rate and vehicle capacity are known.

  15. 50 CFR Table 1a to Part 679 - Delivery Condition and Product Codes

    Science.gov (United States)

    2010-10-01

    ... body behind head and in front of tail. 21 Fish meal. Meal from whole fish or fish parts; includes bone..., Eastern cut.Head removed just behind the collar bone, and viscera removed. 08 Headed and gutted, tail removed.Head removed usually in front of collar bone, and viscera and tail removed. 10 Heads. Heads...

  16. Safe use of mine winding ropes, volume 4: studies towards a code of practice for rope condition assessment.

    CSIR Research Space (South Africa)

    Borrello, M

    1996-06-01

    Full Text Available The aim of this investigation was the verification of the code of Practice for Rope Condition Assessment. Ropes were meant to be discarded according to the discard criteria as outlined in the code and then tested by the CSIR. The results...

  17. Hyperbolic divergence cleaning, the electrostatic limit, and potential boundary conditions for particle-in-cell codes

    Science.gov (United States)

    Pfeiffer, M.; Munz, C.-D.; Fasoulas, S.

    2015-08-01

    In a numerical solution of the Maxwell-Vlasov system, the consistency with the charge conservation and divergence conditions has to be kept solving the hyperbolic evolution equations of the Maxwell system, since the vector identity ∇ ṡ (∇ × u →) = 0 and/or the charge conservation of moving particles may be not satisfied completely due to discretization errors. One possible method to force the consistency is the hyperbolic divergence cleaning. This hyperbolic constraint formulation of Maxwell's equations has been proposed previously, coupling the divergence conditions to the hyperbolic evolution equations, which can then be treated with the same numerical method. We pick up this method again and show that electrostatic limit may be obtained by accentuating the divergence cleaning sub-system and converging to steady state. Hence, the electrostatic case can be treated by the electrodynamic code with reduced computational effort. In addition, potential boundary conditions as often given in practical applications can be coupled in a similar way to get appropriate boundary conditions for the field equations. Numerical results are shown for an electric dipole, a parallel-plate capacitor, and a Langmuir wave. The use of potential boundary conditions is demonstrated in an Einzel lens simulation.

  18. Diagnosis summary and coding of obstetric conditions in the government hospitals in Pattalung Province, the effects of audit and feedback.

    Science.gov (United States)

    Wittayawarawat, Worapin; Liabsuetrakul, Tippawan; Tassee, Sathana

    2007-02-01

    Assess the effects of audit and feedback through a seminar on the obstetric summary and coding system with respect to the International Classification of Diseases, Tenth Revision (ICD-10) and to determine factors associated with the error of summary and coding audit. The medical records of 1,629 and 1,337 women with obstetric conditions admitted to one provincial and nine district hospitals in Pattalung Province, Southern Thailand, were evaluated before and after a seminar, respectively. The error of coding audit among cases with normal conditions and those with abnormal conditions after the seminar was reduced significantly from 40.7 to 13.0% and from 81.8% to 61.2%, respectively (p audit and feedback was moderately effective on summary and coding audit but the clinical significance of error reduction in abnormal obstetric conditions was marginal, thus intensive intervention, evaluation, and monitoring are necessary.

  19. The sensitivity analysis for APR1400 nodalization under Large Break LOCA condition based on mars code

    Directory of Open Access Journals (Sweden)

    Jang Hyung-Wook

    2017-01-01

    Full Text Available The phenomena of loss of coolant accident have been investigated for long time and the result of experiment shows that the flow condition in the downcomer during the end-of-blowdown were highly multi-dimensional at full-scale. However, the downcomer nodalization of input deck for large break loss of coolant accident used in advanced power reactor 1400 analyses are made up with 1-D model and improperly designed to describe realistic coolant phenomena during loss of coolant accident analysis. In this paper, the authors modified the nodalization of MARS code LBLOCA input deck and performed LBLOCA analysis with new input deck. From original LBLOCA input deck file, the nodalization of downcomer and junction connections with 4 cold legs and direct vessel injection lines are modified for reflecting the realistic cross-flow effect and real downcomer structure. The analysis results show that the peak cladding temperature of new input deck decreases more rapidly than previous result and that the drop of peak cladding temperature was advanced by application of momentum flux term in cross-flow. Additionally, the authors developed a new input deck with multi-dimensional downcomer model and ran MARS code with multi-dimensional input deck as well. By using the modified input deck, the Emergency core cooling system by-pass flow phenomena is better characterized and found to be consistent with both experimental report and regulatory guide.

  20. The formation of neural codes in the hippocampus: trace conditioning as a prototypical paradigm for studying the random recoding hypothesis.

    Science.gov (United States)

    Levy, W B; Sanyal, A; Rodriguez, P; Sullivan, D W; Wu, X B

    2005-06-01

    The trace version of classical conditioning is used as a prototypical hippocampal-dependent task to study the recoding sequence prediction theory of hippocampal function. This theory conjectures that the hippocampus is a random recoder of sequences and that, once formed, the neuronal codes are suitable for prediction. As such, a trace conditioning paradigm, which requires a timely prediction, seems by far the simplest of the behaviorally-relevant paradigms for studying hippocampal recoding. Parameters that affect the formation of these random codes include the temporal aspects of the behavioral/cognitive paradigm and certain basic characteristics of hippocampal region CA3 anatomy and physiology such as connectivity and activity. Here we describe some of the dynamics of code formation and describe how biological and paradigmatic parameters affect the neural codes that are formed. In addition to a backward cascade of coding neurons, we point out, for the first time, a higher-order dynamic growing out of the backward cascade-a particular forward and backward stabilization of codes as training progresses. We also observe that there is a performance compromise involved in the setting of activity levels due to the existence of three behavioral failure modes. Each of these behavioral failure modes exists in the computational model and, presumably, natural selection produced the compromise performance observed by psychologists. Thus, examining the parametric sensitivities of the codes and their dynamic formation gives insight into the constraints on natural computation and into the computational compromises ensuing from these constraints.

  1. Benchmarking of codes for electron cyclotron heating and electron cyclotron current drive under ITER conditions

    NARCIS (Netherlands)

    Prater, R.; Farina, D.; Gribov, Y.; Harvey, R. W.; Ram, A. K.; Lin-Liu, Y. R.; Poli, E.; Smirnov, A. P.; Volpe, F.; Westerhof, E.; Zvonkovo, A.

    2008-01-01

    Optimal design and use of electron cyclotron heating requires that accurate and relatively quick computer codes be available for prediction of wave coupling, propagation, damping and current drive at realistic levels of EC power. To this end, a number of codes have been developed in laboratories wor

  2. Bounds on the Weight Hierarchies of a Kind of Linear Codes Satisfying Non-Chain Condition

    Institute of Scientific and Technical Information of China (English)

    LIUZihui; CHENWende

    2005-01-01

    The upper bound of weight hierarchies of codes with a divided-chain of arbitrary continuous break points are studied and the codes satisfying the upperbound are constructed by finite projective geometry, in particular, the geometrical construction is tight for the upper-bound weight hierarchies.

  3. Ground water stratification and delivery of nitrate to an incised stream under varying flow conditions.

    Science.gov (United States)

    Böhlke, J K; O'Connell, Michael E; Prestegaard, Karen L

    2007-01-01

    Ground water processes affecting seasonal variations of surface water nitrate concentrations were investigated in an incised first-order stream in an agricultural watershed with a riparian forest in the coastal plain of Maryland. Aquifer characteristics including sediment stratigraphy, geochemistry, and hydraulic properties were examined in combination with chemical and isotopic analyses of ground water, macropore discharge, and stream water. The ground water flow system exhibits vertical stratification of hydraulic properties and redox conditions, with sub-horizontal boundaries that extend beneath the field and adjacent riparian forest. Below the minimum water table position, ground water age gradients indicate low recharge rates (2-5 cm yr(-1)) and long residence times (years to decades), whereas the transient ground water wedge between the maximum and minimum water table positions has a relatively short residence time (months to years), partly because of an upward increase in hydraulic conductivity. Oxygen reduction and denitrification in recharging ground waters are coupled with pyrite oxidation near the minimum water table elevation in a mottled weathering zone in Tertiary marine glauconitic sediments. The incised stream had high nitrate concentrations during high flow conditions when much of the ground water was transmitted rapidly across the riparian zone in a shallow oxic aquifer wedge with abundant outflow macropores, and low nitrate concentrations during low flow conditions when the oxic wedge was smaller and stream discharge was dominated by upwelling from the deeper denitrified parts of the aquifer. Results from this and similar studies illustrate the importance of near-stream geomorphology and subsurface geology as controls of riparian zone function and delivery of nitrate to streams in agricultural watersheds.

  4. Use of Electronic Nicotine Delivery Systems among Adults with Mental Health Conditions, 2015

    Directory of Open Access Journals (Sweden)

    Claire Adams Spears

    2016-12-01

    Full Text Available Adults with mental health conditions (MHC are especially likely to smoke and experience tobacco-related health disparities. Individuals with MHC may also use electronic nicotine delivery devices (ENDS at disproportionately high rates. However, there is a relative dearth of knowledge regarding ENDS use among individuals with MHC. In a large representative sample of U.S. adults (n = 6051, associations between self-reported MHC diagnoses and ENDS use and susceptibility were examined, stratified by smoking status. Participants with MHC were approximately 1.5 times more likely to have used ENDS in their lifetime and almost twice as likely to currently use ENDS as those without MHC. MHC status was most strongly linked to higher ENDS use among former smokers, and former smokers with MHC were more likely to report using ENDS during past smoking quit attempts than those without MHC. Among participants who had not tried ENDS, former smokers with MHC were especially susceptible to future ENDS use. The potential advantage of ENDS for cessation purposes should be balanced with the risk of attracting former smokers with MHC to ENDS.

  5. Use of Electronic Nicotine Delivery Systems among Adults with Mental Health Conditions, 2015.

    Science.gov (United States)

    Spears, Claire Adams; Jones, Dina M; Weaver, Scott R; Pechacek, Terry F; Eriksen, Michael P

    2016-12-23

    Adults with mental health conditions (MHC) are especially likely to smoke and experience tobacco-related health disparities. Individuals with MHC may also use electronic nicotine delivery devices (ENDS) at disproportionately high rates. However, there is a relative dearth of knowledge regarding ENDS use among individuals with MHC. In a large representative sample of U.S. adults (n = 6051), associations between self-reported MHC diagnoses and ENDS use and susceptibility were examined, stratified by smoking status. Participants with MHC were approximately 1.5 times more likely to have used ENDS in their lifetime and almost twice as likely to currently use ENDS as those without MHC. MHC status was most strongly linked to higher ENDS use among former smokers, and former smokers with MHC were more likely to report using ENDS during past smoking quit attempts than those without MHC. Among participants who had not tried ENDS, former smokers with MHC were especially susceptible to future ENDS use. The potential advantage of ENDS for cessation purposes should be balanced with the risk of attracting former smokers with MHC to ENDS.

  6. Verification of Dinamika-5 code on experimental data of water level behaviour in PGV-440 under dynamic conditions

    Energy Technology Data Exchange (ETDEWEB)

    Beljaev, Y.V.; Zaitsev, S.I.; Tarankov, G.A. [OKB Gidropress (Russian Federation)

    1995-12-31

    Comparison of the results of calculational analysis with experimental data on water level behaviour in horizontal steam generator (PGV-440) under the conditions with cessation of feedwater supply is presented in the report. Calculational analysis is performed using DIMANIKA-5 code, experimental data are obtained at Kola NPP-4. (orig.). 2 refs.

  7. Use of an Accurate DNS Particulate Flow Method to Supply and Validate Boundary Conditions for the MFIX Code

    Energy Technology Data Exchange (ETDEWEB)

    Zhi-Gang Feng

    2012-05-31

    The simulation of particulate flows for industrial applications often requires the use of two-fluid models, where the solid particles are considered as a separate continuous phase. One of the underlining uncertainties in the use of the two-fluid models in multiphase computations comes from the boundary condition of the solid phase. Typically, the gas or liquid fluid boundary condition at a solid wall is the so called no-slip condition, which has been widely accepted to be valid for single-phase fluid dynamics provided that the Knudsen number is low. However, the boundary condition for the solid phase is not well understood. The no-slip condition at a solid boundary is not a valid assumption for the solid phase. Instead, several researchers advocate a slip condition as a more appropriate boundary condition. However, the question on the selection of an exact slip length or a slip velocity coefficient is still unanswered. Experimental or numerical simulation data are needed in order to determinate the slip boundary condition that is applicable to a two-fluid model. The goal of this project is to improve the performance and accuracy of the boundary conditions used in two-fluid models such as the MFIX code, which is frequently used in multiphase flow simulations. The specific objectives of the project are to use first principles embedded in a validated Direct Numerical Simulation particulate flow numerical program, which uses the Immersed Boundary method (DNS-IB) and the Direct Forcing scheme in order to establish, modify and validate needed energy and momentum boundary conditions for the MFIX code. To achieve these objectives, we have developed a highly efficient DNS code and conducted numerical simulations to investigate the particle-wall and particle-particle interactions in particulate flows. Most of our research findings have been reported in major conferences and archived journals, which are listed in Section 7 of this report. In this report, we will present a

  8. STUDY OF THE CRUDE BIRTH RATE AND DELIVERY CONDITION AMONG THE QASHQAI TRIBE, SOUTHERN IRAN

    Directory of Open Access Journals (Sweden)

    M. Motabar

    1976-11-01

    Full Text Available On the basis of a cross-sectional demographic survey that was conducted among the Qashqai Tribe of southern Iran in 1973, the crude birth rate was estimated at 48.2 per thousand per year. The most productive age groups, was 25-29 years. Forty-nine, point seven per cent (49.7% or about one half of the total births occurred among married women aged 20 to 29 years Eighty-seven point three per cent (87.3% of the deliveries took place in tents, only one per cent at maternity hospitals. Ninety point one per cent (90.1% of babies were delivered with the help of relative and friends, while only 6.9 per cent of all deliveries took place with the aid of midwives. Eighty-nine point seven per cent (89.7% of deliveries were performed without medical expenses.

  9. Lossless image compression based on optimal prediction, adaptive lifting, and conditional arithmetic coding.

    Science.gov (United States)

    Boulgouris, N V; Tzovaras, D; Strintzis, M G

    2001-01-01

    The optimal predictors of a lifting scheme in the general n-dimensional case are obtained and applied for the lossless compression of still images using first quincunx sampling and then simple row-column sampling. In each case, the efficiency of the linear predictors is enhanced nonlinearly. Directional postprocessing is used in the quincunx case, and adaptive-length postprocessing in the row-column case. Both methods are seen to perform well. The resulting nonlinear interpolation schemes achieve extremely efficient image decorrelation. We further investigate context modeling and adaptive arithmetic coding of wavelet coefficients in a lossless compression framework. Special attention is given to the modeling contexts and the adaptation of the arithmetic coder to the actual data. Experimental evaluation shows that the best of the resulting coders produces better results than other known algorithms for multiresolution-based lossless image coding.

  10. Durability of switchable QR code carriers under hydrolytic and photolytic conditions

    Science.gov (United States)

    Ecker, Melanie; Pretsch, Thorsten

    2013-09-01

    Following a guest diffusion approach, the surface of a shape memory poly(ester urethane) (PEU) was either black or blue colored. Bowtie-shaped quick response (QR) code carriers were then obtained from laser engraving and cutting, before thermo-mechanical functionalization (programming) was applied to stabilize the PEU in a thermo-responsive (switchable) state. The stability of the dye within the polymer surface and long-term functionality of the polymer were investigated against UVA and hydrolytic ageing. Spectrophotometric investigations verified UVA ageing-related color shifts from black to yellow-brownish and blue to petrol-greenish whereas hydrolytically aged samples changed from black to greenish and blue to light blue. In the case of UVA ageing, color changes were accompanied by dye decolorization, whereas hydrolytic ageing led to contrast declines due to dye diffusion. The Michelson contrast could be identified as an effective tool to follow ageing-related contrast changes between surface-dyed and laser-ablated (undyed) polymer regions. As soon as the Michelson contrast fell below a crucial value of 0.1 due to ageing, the QR code was no longer decipherable with a scanning device. Remarkably, the PEU information carrier base material could even then be adequately fixed and recovered. Hence, the surface contrast turned out to be the decisive parameter for QR code carrier applicability.

  11. Learning effect of a conditional cash transfer programme on poor rural women's selection of delivery care in Mexico.

    Science.gov (United States)

    Sosa-Rubí, Sandra G; Walker, Dilys; Serván, Edson; Bautista-Arredondo, Sergio

    2011-11-01

    BACKGROUND The Mexican programme Oportunidades/Progresa conditionally transfers money to beneficiary families. Over the past 10 years, poor rural women have been obliged to attend antenatal care (ANC) visits and reproductive health talks. We propose that the length of time in the programme influences women's preferences, thus increasing their use not only of services directly linked to the cash transfers, but also of other services, such as clinic-based delivery, whose utilization is not obligatory. OBJECTIVE To analyse the long-term effect of Oportunidades on women's use of antenatal and delivery care. METHODOLOGY 5051 women aged between 15 and 49 years old with at least one child aged less than 24 months living in rural localities were analysed. Multilevel probit and logit models were used to analyse ANC visits and physician/nurse attended delivery, respectively. Models were adjusted with individual and socio-economic variables and the locality's exposure time to Oportunidades. Findings On average women living in localities with longer exposure to Oportunidades report 2.1% more ANC visits than women living in localities with less exposure. Young women aged 15-19 and 20-24 years and living in localities with longer exposure to Oportunidades (since 1998) have 88% and 41% greater likelihood of choosing a physician/nurse vs. traditional midwife for childbirth, respectively. Women of indigenous origin are 68.9% less likely to choose a physician/nurse for delivery care than non-indigenous women. CONCLUSIONS An increase in the average number of ANC visits has been achieved among Oportunidades beneficiaries. An indirect effect is the increased selection of a physician/nurse for delivery care among young women living in localities with greater exposure time to Oportunidades. Disadvantaged women in Mexico (indigenous women) continue to have less access to skilled delivery care. Developing countries must develop strategies to increase access and use of skilled obstetric

  12. [Footwear according to the "business dress code", and the health condition of women's feet--computer-assisted holistic evaluation].

    Science.gov (United States)

    Lorkowski, Jacek; Mrzygłód, Mirosław; Kotela, Ireneusz; Kiełbasiewicz-Lorkowska, Ewa; Teul, Iwona

    2013-01-01

    According to the verdict of the Supreme Court in 2005, an employer may dismiss an employee if their conduct (including dress) exposes the employer to losses or threatens his interests. The aim of the study was a holistic assessment of the pleiotropic effects of high-heeled pointed shoes on the health condition of women's feet, wearing them at work, in accordance with the existing rules of the "business dress code". A holistic multidisciplinary analysis was performed. It takes into account: 1) women employees of banks and other large corporations (82 persons); 2) 2D FEM computer model developed by the authors of foot deformed by pointed high-heeled shoes; 3) web site found after entering the code "business dress code". Over 60% of women in the office wore high-heeled shoes. The following has been found among people walking to work in high heels: 1) reduction in the quality of life in about 70% of cases, through periodic occurrence of pain and reduction of functional capacity of the feet; 2) increase in the pressure on the plantar side of the forefoot at least twice; 3) the continued effects the forces deforming the forefoot. 1. An evolutionary change of "dress code" shoes is necessary in order to lead to a reduction in non-physiological overload of feet and the consequence of their disability. 2. These changes are particularly urgent in patients with so-called "sensitive foot".

  13. Channel Efficiency with Security Enhancement for Remote Condition Monitoring of Multi Machine System Using Hybrid Huffman Coding

    Science.gov (United States)

    Datta, Jinia; Chowdhuri, Sumana; Bera, Jitendranath

    2016-12-01

    This paper presents a novel scheme of remote condition monitoring of multi machine system where a secured and coded data of induction machine with different parameters is communicated between a state-of-the-art dedicated hardware Units (DHU) installed at the machine terminal and a centralized PC based machine data management (MDM) software. The DHUs are built for acquisition of different parameters from the respective machines, and hence are placed at their nearby panels in order to acquire different parameters cost effectively during their running condition. The MDM software collects these data through a communication channel where all the DHUs are networked using RS485 protocol. Before transmitting, the parameter's related data is modified with the adoption of differential pulse coded modulation (DPCM) and Huffman coding technique. It is further encrypted with a private key where different keys are used for different DHUs. In this way a data security scheme is adopted during its passage through the communication channel in order to avoid any third party attack into the channel. The hybrid mode of DPCM and Huffman coding is chosen to reduce the data packet length. A MATLAB based simulation and its practical implementation using DHUs at three machine terminals (one healthy three phase, one healthy single phase and one faulty three phase machine) proves its efficacy and usefulness for condition based maintenance of multi machine system. The data at the central control room are decrypted and decoded using MDM software. In this work it is observed that Chanel efficiency with respect to different parameter measurements has been increased very much.

  14. Liposomal systems as viable drug delivery technology for skin cancer sites with an outlook on lipid-based delivery vehicles and diagnostic imaging inputs for skin conditions'.

    Science.gov (United States)

    Akhtar, Naseem; Khan, Riaz A

    2016-10-01

    Skin cancer is among one of the most common human malignancies wide-spread world-over with mortality statistics rising continuously at an alarming rate. The increasing frequency of these malignancies has marked the need for adopting effective treatment plan coupled with better and site-specific delivery options for the desired therapeutic agent's availability at the affected site. The concurrent delivery approaches to cancerous tissues are under constant challenge and, as a result, are evolving and gaining advancements in terms of delivery modes, therapeutic agents and site-specificity of the therapeutics delivery. The lipid-based liposomal drug delivery is an attractive and emerging option, and which is meticulously shaping up beyond a threshold level to a promising, and viable route for the effective delivery of therapeutic agents and other required injuctions to the skin cancer. An update on liposomal delivery of chemotherapeutic agents, natural-origin compounds, photosensitizer, and DNA repair enzymes as well as other desirable and typical delivery modes employed in drug delivery and in the treatment of skin cancers is discussed in details. Moreover, liposomal delivery of nucleic acid-based therapeutics, i.e., small interfering RNA (siRNA), mRNA therapy, and RGD-linked liposomes are among the other promising novel technology under constant development. The current clinical applicability, viable clinical plans, future prospects including transport feasibility of delivery vesicles and imaging techniques in conjunction with the therapeutic agents is also discussed. The ongoing innovations in liposomal drug delivery technology for skin cancers hold promise for further development of the methodology for better, more effective and site-specific delivery as part of the better treatment plan by ensuring faster drug transport, better and full payload delivery with enough and required concentration of the dose. Copyright © 2016 Elsevier B.V. All rights reserved.

  15. 20 CFR 662.430 - Under what conditions may One-Stop operators designated to operate in a One-Stop delivery system...

    Science.gov (United States)

    2010-04-01

    ... designated to operate in a One-Stop delivery system established prior to the enactment of WIA be designated... DESCRIPTION OF THE ONE-STOP SYSTEM UNDER TITLE I OF THE WORKFORCE INVESTMENT ACT One-Stop Operators § 662.430 Under what conditions may One-Stop operators designated to operate in a One-Stop delivery system...

  16. Use of a Viscous Flow Simulation Code for Static Aeroelastic Analysis of a Wing at High-Lift Conditions

    Science.gov (United States)

    Akaydin, H. Dogus; Moini-Yekta, Shayan; Housman, Jeffrey A.; Nguyen, Nhan

    2015-01-01

    In this paper, we present a static aeroelastic analysis of a wind tunnel test model of a wing in high-lift configuration using a viscous flow simulation code. The model wing was tailored to deform during the tests by amounts similar to a composite airliner wing in highlift conditions. This required use of a viscous flow analysis to predict the lift coefficient of the deformed wing accurately. We thus utilized an existing static aeroelastic analysis framework that involves an inviscid flow code (Cart3d) to predict the deformed shape of the wing, then utilized a viscous flow code (Overflow) to compute the aerodynamic loads on the deformed wing. This way, we reduced the cost of flow simulations needed for this analysis while still being able to predict the aerodynamic forces with reasonable accuracy. Our results suggest that the lift of the deformed wing may be higher or lower than that of the non-deformed wing, and the washout deformation of the wing is the key factor that changes the lift of the deformed wing in two distinct ways: while it decreases the lift at low to moderate angles of attack simply by lowering local angles of attack along the span, it increases the lift at high angles of attack by alleviating separation.

  17. Redefining Projections of Disease and Nonbattle Injury Patient Condition Code Distributions with Casualty Data from Operation

    Science.gov (United States)

    2006-07-30

    women had more diseases of the genitourinary system than men. The Patient Condition Occurrence Frequency tool was developed to account for these...cardiovascular, sexually transmitted diseases , genitourinary (female), infectious/ parasitic , neuropsychiatric, and miscellaneous. Although considerable...Gastrointestinal 9.4% 4.0% Cardiovascular 13.5% 3.4% Sexually Transmitted Disease 0.4% 0.2% Genitourinary 10.7% 7.3% Infectious/ Parasitic

  18. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  19. Ruthenium release modelling in air under severe accident conditions using the MAAP4 code

    Energy Technology Data Exchange (ETDEWEB)

    Beuzet, E.; Lamy, J.S. [EDF R and D, 1 avenue du General de Gaulle, F-92140 Clamart (France); Perron, H. [EDF R and D, Avenue des Renardieres, Ecuelles, F-77818 Moret sur Loing (France); Simoni, E. [Institut de Physique Nucleaire, Universite de Paris Sud XI, F-91406 Orsay (France)

    2010-07-01

    In a nuclear power plant (NPP), in some situations of low probability of severe accidents, an air ingress into the vessel occurs. Air is a highly oxidizing atmosphere that can lead to an enhanced core degradation affecting the release of Fission Products (FPs) to the environment (source term). Indeed, Zircaloy-4 cladding oxidation by air yields 85% more heat than by steam. Besides, UO{sub 2} can be oxidised to UO{sub 2+x} and mixed with Zr, which may lead to a decrease of the fuel melting temperature. Finally, air atmosphere can enhance the FPs release, noticeably that of ruthenium. Ruthenium is of particular interest for two main reasons: first, its high radiotoxicity due to its short and long half-life isotopes ({sup 103}Ru and {sup 106}Ru respectively) and second, its ability to form highly volatile compounds such as ruthenium gaseous tetra-oxide (RuO{sub 4}). Considering that the oxygen affinity decreases between cladding, fuel and ruthenium inclusions, it is of great need to understand the phenomena governing fuel oxidation by air and ruthenium release as prerequisites for the source term issues. A review of existing data on ruthenium release, controlled by fuel oxidation, leads us to implement a new model in the EDF version of MAAP4 severe accident code (Modular Accident Analysis Program). This model takes into account the fuel stoichiometric deviation and the oxygen partial pressure evolution inside the fuel to simulate its oxidation by air. Ruthenium is then oxidised. Its oxides are released by volatilisation above the fuel. All the different ruthenium oxides formed and released are taken into consideration in the model, in terms of their particular reaction constants. In this way, partial pressures of ruthenium oxides are given in the atmosphere so that it is possible to know the fraction of ruthenium released in the atmosphere. This new model has been assessed against an analytical test of FPs release in air atmosphere performed at CEA (VERCORS RT8). The

  20. Sediment delivery ratio in a small semi-arid watershed under conditions of low connectivity

    Directory of Open Access Journals (Sweden)

    Julio Cesar Neves dos Santos

    Full Text Available ABSTRACT The semi-arid region in the northeast of Brazil is characterised by rains of high intensity and short duration, with the processes of erosion being aggravated by an inappropriate land-use model. In this region, the lack of measured data for runoff and sediment yield increases the need to apply hydro-sedimentological models in estimating erosion, requiring knowledge of the actual sediment delivery ratio for the region. The aim of this study therefore, was to map soil erosion, making use of the Universal Soil Loss Equation (USLE, in the Iguatu Experimental Watershed (IEW. The mean annual sediment delivery ratio (SDR, and the SDR for individual events, was calculated from hydro-sedimentological measurements, contributing to an understanding of the processes of sediment propagation in the Brazilian semi-arid region, allowing identification of areas susceptible to water erosion. The IEW has an area of 16.74 km2 and is equipped with sensors for the continuous measurement of rainfall, flow and sediment yield. The mean annual SDR for the IEW was 0.37%. The SDR for individual rainfall events ranged from 0.08 to 1.67%, with an average of 0.68%. Among the main variables that influence the SDR for individual events is the magnitude of rainfall depth and antecedent soil moisture that can be better represented by the total antecedent precipitation of the previous 15 days. According to maps of soil loss, only 6.27% of the watershed presented losses beyond tolerable limits.

  1. MOCCA code for star cluster simulations - V. Initial globular cluster conditions influence on blue stragglers

    Science.gov (United States)

    Hypki, Arkadiusz; Giersz, Mirek

    2017-04-01

    In this paper, we present an analysis of the properties of blue straggler (BS) populations based on MOCCA simulations covering a range of initial globular cluster conditions. We broadly separate the BSs created in our simulations into two distinct types corresponding to their formation mechanism, namely evolutionary BSs formed from binary evolution and dynamical BSs formed from collisions or mergers induced by direct dynamical interactions between stars and binaries. We find that the dominant type of BS strongly depends on the initial semi-major axis distribution. With mostly compact binaries, the number of evolutionary BSs dominates. Conversely, with mostly wide binaries, dynamical BSs dominate. Higher cluster concentrations increase the contribution from dynamical BSs without affecting the numbers of evolutionary BSs, which are thus mostly descended from primordial binaries. We further consider the ratio between the number of BSs in binaries and as single stars (RB/S). Models that prefer compact and wide binaries begin with, respectively, high and low values of the ratio RB/S before converging to a nearly universal value ∼ 0.4. Finally, the initial eccentricity distribution has little to no influence on BS formation.

  2. Regional TEC model under quiet geomagnetic conditions and low-to-moderate solar activity based on CODE GIMs

    Science.gov (United States)

    Feng, Jiandi; Jiang, Weiping; Wang, Zhengtao; Zhao, Zhenzhen; Nie, Linjuan

    2017-08-01

    Global empirical total electron content (TEC) models based on TEC maps effectively describe the average behavior of the ionosphere. However, the accuracy of these global models for a certain region may not be ideal. Due to the number and distribution of the International GNSS Service (IGS) stations, the accuracy of TEC maps is geographically different. The modeling database derived from the global TEC maps with different accuracy is likely one of the main reasons that limits the accuracy of the new models. Moreover, many anomalies in the ionosphere are geographic or geomagnetic dependent, and as such the accuracy of global models can deteriorate if these anomalies are not fully incorporated into the modeling approach. For regional models built in small areas, these influences on modeling are immensely weakened. Thus, the regional TEC models may better reflect the temporal and spatial variations of TEC. In our previous work (Feng et al., 2016), a regional TEC model TECM-NEC is proposed for northeast China. However, this model is only directed against the typical region of Mid-latitude Summer Nighttime Anomaly (MSNA) occurrence, which is meaningless in other regions without MSNA. Following the technique of TECM-NEC model, this study proposes another regional empirical TEC model for other regions in mid-latitudes. Taking a small area BeiJing-TianJin-Tangshan (JJT) region (37.5°-42.5° N, 115°-120° E) in China as an example, a regional empirical TEC model (TECM-JJT) is proposed using the TEC grid data from January 1, 1999 to June 30, 2015 provided by the Center for Orbit Determination in Europe (CODE) under quiet geomagnetic conditions. The TECM-JJT model fits the input CODE TEC data with a bias of 0.11TECU and a root mean square error of 3.26TECU. Result shows that the regional model TECM-JJT is consistent with CODE TEC data and GPS-TEC data.

  3. Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE

    Directory of Open Access Journals (Sweden)

    Mrs. S. Ramya

    2013-07-01

    Full Text Available Cloud computing techniques are used to share resources. It transfers the application software and databases to the centralized large data centers. Storing important data with cloud storage providers comes with serious security risks. The cloud can leak confidential data, modify the data, or return inconsistent data to different users. So, the cloud data security requires authentication and integrity analysis for the storage data values. An erasure code provides redundancy by breaking objects up into smaller fragments and storing the fragments in different places. The key is that you can recover the data from any combination of a smaller number of those fragments. With threshold proxy re-encryption scheme (PRE , a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval. It meets the requirements that storage servers independently perform encoding and re-encryption and key servers independently perform partial decryption. The system user forwards his data in the storage servers to another user without retrieving the data back. A major feature of the cloud services is that user’s data are usually processed remotely in unknown machines that users do not own or operate. Conditional Proxy Re-Encryption (C-PRE is proposed, whereby user has a fine-grained control over the delegation. As a result, user can flexibly assign her delegate, and decryption capability based on the conditions attached to the messages, using a proxy with no higher trust than in existing PRE schemes

  4. Readability dependence on lithography conditions for printing code marks using a squared optical fiber matrix and light-emitting diodes

    Science.gov (United States)

    Watanabe, Jun; Kato, Kazuhide; Iwasaki, Jun-ya; Horiuchi, Toshiyuki

    2015-06-01

    The direct readability of code marks printed using a new exposure system was investigated. In the new exposure system, code-mark patterns were printed using LEDs as exposure sources and squared optical-fiber ends as code-mark elements. A 10 × 10 fiber matrix was fabricated, and light emitted from each LED was led to each fiber. Because gaps appeared between the code-mark cells, a long exposure time was adopted, and the gaps between cells were eliminated by giving an overdose of light. After code-mark patterns were stably printed, their readability was investigated using a commercial code-mark reader. It was found that all the printed code marks were readable without errors. In concrete, same 100 identical marks printed on a wafer were readable. Moreover, six kinds of marks were repeatedly detected more than 100 times with no reading errors.

  5. Testing of Icy-Soil Sample Delivery in Simulated Martian Conditions (Animation)

    Science.gov (United States)

    2008-01-01

    [figure removed for brevity, see original site] Click on image for animation This movie clip shows testing under simulated Mars conditions on Earth in preparation for NASA's Phoenix Mars Lander using its robotic arm for delivering a sample to the doors of a laboratory oven. The icy soil used in the testing flowed easily from the scoop during all tests at Martian temperatures. On Mars, icy soil has stuck to the scoop, a surprise that may be related to composition of the soil at the landing site. This testing was done at Honeybee Robotics Spacecraft Mechanisms Corp., New York, which supplied the Phoenix scoop. The Phoenix Mission is led by the University of Arizona, Tucson, on behalf of NASA. Project management of the mission is by NASAaE(TM)s Jet Propulsion Laboratory, Pasadena, Calif. Spacecraft development is by Lockheed Martin Space Systems, Denver.

  6. An Innovative Approach to Health Care Delivery for Patients with Chronic Conditions

    Science.gov (United States)

    Bourn, Scott; Skoufalos, Alexis; Beck, Eric H.; Castillo, Daniel J.

    2017-01-01

    Abstract Although the health care reform movement has brought about positive changes, lingering inefficiencies and communication gaps continue to hamper system-wide progress toward achieving the overarching goal—higher quality health care and improved population health outcomes at a lower cost. The multiple interrelated barriers to improvement are most evident in care for the population of patients with multiple chronic conditions. During transitions of care, the lack of integration among various silos and inadequate communication among providers cause delays in delivering appropriate health care services to these vulnerable patients and their caregivers, diminishing positive health outcomes and driving costs ever higher. Long-entrenched acute care-focused treatment and reimbursement paradigms hamper more effective deployment of existing resources to improve the ongoing care of these patients. New models for care coordination during transitions, longitudinal high-risk care management, and unplanned acute episodic care have been conceived and piloted with promising results. Utilizing existing resources, Mobile Integrated Healthcare is an emerging model focused on closing these care gaps by means of a round-the-clock, technologically sophisticated, physician-led interprofessional team to manage care transitions and chronic care services on-site in patients' homes or workplaces. PMID:27563751

  7. An Innovative Approach to Health Care Delivery for Patients with Chronic Conditions.

    Science.gov (United States)

    Clarke, Janice L; Bourn, Scott; Skoufalos, Alexis; Beck, Eric H; Castillo, Daniel J

    2017-02-01

    Although the health care reform movement has brought about positive changes, lingering inefficiencies and communication gaps continue to hamper system-wide progress toward achieving the overarching goal-higher quality health care and improved population health outcomes at a lower cost. The multiple interrelated barriers to improvement are most evident in care for the population of patients with multiple chronic conditions. During transitions of care, the lack of integration among various silos and inadequate communication among providers cause delays in delivering appropriate health care services to these vulnerable patients and their caregivers, diminishing positive health outcomes and driving costs ever higher. Long-entrenched acute care-focused treatment and reimbursement paradigms hamper more effective deployment of existing resources to improve the ongoing care of these patients. New models for care coordination during transitions, longitudinal high-risk care management, and unplanned acute episodic care have been conceived and piloted with promising results. Utilizing existing resources, Mobile Integrated Healthcare is an emerging model focused on closing these care gaps by means of a round-the-clock, technologically sophisticated, physician-led interprofessional team to manage care transitions and chronic care services on-site in patients' homes or workplaces.

  8. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  9. Viral delivery of shRNA to amygdala neurons leads to neurotoxicity and deficits in Pavlovian fear conditioning.

    Science.gov (United States)

    de Solis, Christopher A; Holehonnur, Roopashri; Banerjee, Anwesha; Luong, Jonathan A; Lella, Srihari K; Ho, Anthony; Pahlavan, Bahram; Ploski, Jonathan E

    2015-10-01

    knockdown of Egr1 and GluN2A compared to the other groups examined respectively, but Arc was not knocked down in the shArc group under these conditions. Differences in fear conditioning among the shLuc, shCntrl, shArc and shEgr1 groups were not detected under these circumstances; however, the shGluN2A group exhibited significantly impaired fear conditioning compared to most of the groups, indicating that gene specific deficits in fear conditioning could be observed utilizing viral mediated delivery of shRNA. Collectively, these data indicate that viral mediated shRNA expression was toxic to neurons in vivo, under all viral titers examined and this toxicity in some cases may be masking gene specific changes in learning. Therefore, the use of this technology in behavioral neuroscience warrants a heightened level of careful consideration and potential methods to alleviate shRNA induced toxicity are discussed.

  10. Uterine artery pseudoaneurysm: not a rare condition occurring after non-traumatic delivery or non-traumatic abortion.

    Science.gov (United States)

    Baba, Yosuke; Matsubara, Shigeki; Kuwata, Tomoyuki; Ohkuchi, Akihide; Usui, Rie; Saruyama, Miyuki; Nakata, Manabu; Suzuki, Mitsuaki

    2014-09-01

    Uterine artery pseudoaneurysm (UAP) is considered a rare disorder after traumatic delivery or traumatic pregnancy termination such as cesarean section or dilatation and curettage, initially manifesting as genital hemorrhage. Our clinical impression contradicts these three assumptions; after traumatic delivery/termination, hemorrhage, and its rarity. Thus, we attempted to clarify these three issues. We retrospectively analyzed 22 UAP cases treated at our institute over a 6-year period. Uterine artery pseudoaneurysm occurred in 2-3/1,000 deliveries. Of 22 cases, half occurred after non-traumatic deliveries or non-traumatic pregnancy termination. Fifty-five percent (12/22) showed no hemorrhage; ultrasound or color Doppler revealed UAP. Thus, half of UAP occurred after non-traumatic deliveries or non-traumatic pregnancy termination and showed no hemorrhage at the time of their diagnoses. All patients received transarterial embolization, which stopped blood flow into UAP or achieved hemostasis. We must be aware that UAP may not be so rare and it may be present in patients after non-traumatic deliveries/pregnancy termination and without postpartum or postabortal hemorrhage.

  11. The predictive value of ICD-10 diagnostic coding used to assess Charlson comorbidity index conditions in the population-based Danish National Registry of Patients

    Directory of Open Access Journals (Sweden)

    Lash Timothy L

    2011-05-01

    Full Text Available Abstract Background The Charlson comorbidity index is often used to control for confounding in research based on medical databases. There are few studies of the accuracy of the codes obtained from these databases. We examined the positive predictive value (PPV of the ICD-10 diagnostic coding in the Danish National Registry of Patients (NRP for the 19 Charlson conditions. Methods Among all hospitalizations in Northern Denmark between 1 January 1998 and 31 December 2007 with a first-listed diagnosis of a Charlson condition in the NRP, we selected 50 hospital contacts for each condition. We reviewed discharge summaries and medical records to verify the NRP diagnoses, and computed the PPV as the proportion of confirmed diagnoses. Results A total of 950 records were reviewed. The overall PPV for the 19 Charlson conditions was 98.0% (95% CI; 96.9, 98.8. The PPVs ranged from 82.0% (95% CI; 68.6%, 91.4% for diabetes with diabetic complications to 100% (one-sided 97.5% CI; 92.9%, 100% for congestive heart failure, peripheral vascular disease, chronic pulmonary disease, mild and severe liver disease, hemiplegia, renal disease, leukaemia, lymphoma, metastatic tumour, and AIDS. Conclusion The PPV of NRP coding of the Charlson conditions was consistently high.

  12. Open state problems and perspectives of tax incentives for entrepreneurs in conditions of the Tax Code of Ukraine

    Directory of Open Access Journals (Sweden)

    Varnaliy Z.

    2013-06-01

    Full Text Available Open state, problems and perspectives influence the rules of the Tax Code of Ukraine on the implementation of tax incentives for entrepreneurs. Identified a number of problematic issues in this area, and specific proposals are addressed to solve them.

  13. Reduction of nontarget infection and systemic toxicity by targeted delivery of conditionally replicating viruses transported in mesenchymal stem cells.

    Science.gov (United States)

    Dembinski, J L; Spaeth, E L; Fueyo, J; Gomez-Manzano, C; Studeny, M; Andreeff, M; Marini, F C

    2010-04-01

    The fiber-modified adenoviral vector Delta-24-RGD (D24RGD) offers vast therapeutic potential. Direct injection of D24RGD has been used to successfully target ovarian tumors in mice. However, systemic toxicity, especially in the liver, profoundly limits the efficacy of direct viral vector delivery. Mesenchymal stem cells (MSC) have the ability to function as a vector for targeted gene therapy because of their preferential engraftment into solid tumors and participation in tumor stroma formation. We show that MSC-guided delivery of D24RGD is specific and efficient and reduces the overall systemic toxicity in mice to negligible levels compared with D24RGD alone. In our model, we found efficient targeted delivery of MSC-D24RGD to both breast and ovarian cell lines. Furthermore, immunohistochemical staining for adenoviral hexon protein confirmed negligible levels of systemic toxicity in mice that were administered MSC-D24RGD compared with those that were administered D24RGD. These data suggest that delivery of D24RGD through MSC not only increases the targeted delivery efficiency, but also reduces the systemic exposure of the virus, thereby reducing overall systemic toxicity to the host and ultimately enhancing its value as an anti-tumor therapeutic candidate.

  14. Trace Code Validation for BWR Spray Cooling Injection and CCFL Condition Based on GÖTA Facility Experiments

    Directory of Open Access Journals (Sweden)

    Stefano Racca

    2012-01-01

    Full Text Available Best estimate codes have been used in the past thirty years for the design, licensing, and safety of NPP. Nevertheless, large efforts are necessary for the qualification and the assessment of such codes. The aim of this work is to study the main phenomena involved in the emergency spray cooling injection in a Swedish-designed BWR. For this purpose, data from the Swedish separate effect test facility GÖTA have been simulated using TRACE version 5.0 Patch 2. Furthermore, uncertainty calculations have been performed with the propagation of input errors method, and the identification of the input parameters that mostly influence the peak cladding temperature has been performed.

  15. Association of the position of a hospital-acquired condition diagnosis code with changes in medicare severity diagnosis-related group assignment.

    Science.gov (United States)

    Johnson, Tricia; Kane, Jason M; Odwazny, Richard; McNutt, Robert

    2014-11-01

    Incentives to improve quality include paying less for adverse events, including the Centers for Medicare and Medicaid Services' policy to not pay additionally for events classified as hospital-acquired conditions (HACs). This policy is controversial, as variable coding practices at hospitals may lead to differences in the inclusion and position of HACs in the list of codes used for Medicare Severity Diagnosis-Related Group (MS-DRG) assignment. Evaluate changes in MS-DRG assignment for patients with an HAC and test the association of the position of an HAC in the list of International Classification of Diseases, 9th Revision (ICD-9) diagnosis codes with change in MS-DRG assignment. Retrospective analysis of patients discharged from hospital members of the University HealthSystem Consortium's Clinical Data Base between October 2007 and April 2008. Comparisons were made between the MS-DRG assigned when the HAC was not included in the list of ICD-9 diagnosis codes and the MS-DRG that would have been assigned had the HAC code been included in the assignment. Of the 7027 patients with an HAC, 13.8% changed MS-DRG assignment when the HAC was removed. An HAC in the second position versus third position or lower was associated with a 40-fold increase in the likelihood of MS-DRG change. The position of an HAC in the list of diagnosis codes, rather than the presence of an HAC, is associated with a change in MS-DRG assignment. HACs have little effect on reimbursement unless the HAC is in the second position and patients have minor severity of illness. © 2014 Society of Hospital Medicine.

  16. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    ; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...... development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech...... expression in the public realm. The book’s line of argument defends language against its invasion by economics, arguing that speech continues to underscore the human condition, however paradoxical this may seem in an era of pervasive computing....

  17. Pregnancy and delivery complications in the births of an unselected series of Finnish children with schizophrenic mothers.

    Science.gov (United States)

    Wrede, G; Mednick, S A; Huttunen, M O; Nilsson, C G

    1980-10-01

    Pregnancy, delivery and post partum conditions were coded from Helsinki Well Mother-Baby Clinics and Lying in hospitals for all deliveries to a birth cohort of Helsinki schizophrenic women. Greater difficulty was observed at all perinatal stages for the chronic and mild schizophrenic groups than for controls. These differences were heightened in the case of winter births.

  18. Solving the 3+1 GRMHD equations in the eXtended Conformally Flat Condition: the XNS code for magnetized neutron stars

    CERN Document Server

    Bucciantini, N; Del Zanna, L

    2014-01-01

    High-energy phenomena in astrophysics involve quite generally a combination of relativistic motions and strong gravity. The simultaneous solution of Einstein equations and General Relativistic MHD equations is thus necessary to model with accuracy such phenomena. The so-called Conformally Flat Condition (CFC) allows a simplified treatment of Einstein equations, that can be particularly efficient in those contexts where gravitational wave emission is negligible, like core-collapse, or the formation/evolution of neutron stars. We have developed a set of codes to model axisymmetric MHD flows, in General Relativity, where the solution of Einstein equations is achieved with a semi-spectral scheme. Here, we will show how this framework is particularly well suited to investigate neutron star equilibrium models in the presence of strong magnetic fields and we will present the XNS code, that has been recently developed and here updated to treat poloidal and mixed configurations.

  19. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  20. The Mystery Behind the Code: Differentiated Instruction with Quick Response Codes in Secondary Physical Education

    Science.gov (United States)

    Adkins, Megan; Wajciechowski, Misti R.; Scantling, Ed

    2013-01-01

    Quick response codes, better known as QR codes, are small barcodes scanned to receive information about a specific topic. This article explains QR code technology and the utility of QR codes in the delivery of physical education instruction. Consideration is given to how QR codes can be used to accommodate learners of varying ability levels as…

  1. System for measuring the effect of fouling and corrosion on heat transfer under simulated OTEC conditions. [HTAU and LABTTF codes

    Energy Technology Data Exchange (ETDEWEB)

    Fetkovich, J.G.

    1976-12-01

    A complete system designed to measure, with high precision, changes in heat transfer rates due to fouling and corrosion of simulated heat exchanger tubes, at sea and under OTEC conditions is described. All aspects of the system are described in detail, including theory, mechanical design, electronics design, assembly procedures, test and calibration, operating procedures, laboratory results, field results, and data analysis programs.

  2. Fountain Codes: LT And Raptor Codes Implementation

    Directory of Open Access Journals (Sweden)

    Ali Bazzi, Hiba Harb

    2017-01-01

    Full Text Available Digital fountain codes are a new class of random error correcting codes designed for efficient and reliable data delivery over erasure channels such as internet. These codes were developed to provide robustness against erasures in a way that resembles a fountain of water. A digital fountain is rateless in a way that sender can send limitless number of encoded packets. The receiver doesn’t care which packets are received or lost as long as the receiver gets enough packets to recover original data. In this paper, the design of the fountain codes is explored with its implementation of the encoding and decoding algorithm so that the performance in terms of encoding/decoding symbols, reception overhead, data length, and failure probability is studied.

  3. Modelling of Zry-4 cladding oxidation by air, under severe accident conditions using the MAAP4 code

    Energy Technology Data Exchange (ETDEWEB)

    Beuzet, Emilie, E-mail: emilie.beuzet@edf.f [EDF R and D, 1 Avenue du General de Gaulle, F-92140 Clamart (France); Lamy, Jean-Sylvestre, E-mail: jean-sylvestre.lamy@edf.f [EDF R and D, 1 Avenue du General de Gaulle, F-92140 Clamart (France); Bretault, Armelle, E-mail: armelle.bretault@edf.f [EDF R and D, 1 Avenue du General de Gaulle, F-92140 Clamart (France); Simoni, Eric, E-mail: simoni@ipno.in2p3.f [Institut de Physique Nucleaire, Universite Paris Sud XI, F-91406 Orsay (France)

    2011-04-15

    In a nuclear power plant, a potential risk in some low probability situations in severe accidents is air ingress into the vessel. Air is a highly oxidizing atmosphere that can lead to an enhanced core oxidation and degradation affecting the release of Fission Products (FP), especially increasing that of ruthenium. This FP is of particular importance because of its high radio-toxicity and its ability to form highly volatile oxides. Oxygen affinity is decreasing between Zircaloy cladding, fuel and ruthenium inclusions in the fuel. It is consequently of great need to understand the phenomena governing cladding oxidation by air as a prerequisite for the source term issues. A review of existing data in the field of Zircaloy-4 oxidation in air-containing atmosphere shows that this phenomenon is quantitatively well understood. The cladding oxidation process can be divided into two kinetic regimes separated by a breakaway transition. Before transition, a protective dense zirconia scale grows following a solid state diffusion-limited regime for which experimental data are well fitted by a parabolic time dependence. For a given thickness, which depends mainly on temperature and the extent of pre-oxidation in steam, the dense scale can potentially breakdown. In case of breakaway combined with oxygen starvation, cladding oxidation can then be much faster because of the combined action of oxygen and nitrogen through a complex self sustaining nitriding-oxidation process. A review of the pre-existing correlations used to simulate zirconia scale growth under air atmospheres shows a high degree of variation from parabolic to accelerated time dependence. Variations also exist in the choice of the breakaway parameter based on zirconia phase change or oxide thickness. Several correlations and breakaway parameters found in the literature were implemented in the MAAP4.07 Severe Accident code. They were assessed by simulation of the QUENCH-10 test, which is a semi-integral test designed

  4. Analysis of ROSA 1.1 test with TRACE code: ECSS water injection under natural circulation conditions; Analisis con el codigo TRACE del test ROSA 1.1: Inyeccion de agua ECCS bajo condiciones de circulacion natural

    Energy Technology Data Exchange (ETDEWEB)

    Julibe, A. J.; Munoz-Coba, J. L.; Escriva, A.; Romero, A.

    2010-07-01

    This paper is based on modelling the ROSA 1.1 test by TRACE code. The ROSA 1.1 test presents several natural flow phases in biphasic conditions and this was the cause of this work. Therefore, the aim of this paper is verify the TRACE code ability to simulate such flows using standard components and modules.

  5. High Efficiency Integrated Space Conditioning, Water Heating and Air Distribution System for HUD-Code Manufactured Housing

    Energy Technology Data Exchange (ETDEWEB)

    Henry DeLima; Joe Akin; Joseph Pietsch

    2008-09-14

    Recognizing the need for new space conditioning and water heating systems for manufactured housing, DeLima Associates assembled a team to develop a space conditioning system that would enhance comfort conditions while also reducing energy usage at the systems level. The product, Comboflair® was defined as a result of a needs analysis of project sponsors and industry stakeholders. An integrated system would be developed that would combine a packaged airconditioning system with a small-duct, high-velocity air distribution system. In its basic configuration, the source for space heating would be a gas water heater. The complete system would be installed at the manufactured home factory and would require no site installation work at the homesite as is now required with conventional split-system air conditioners. Several prototypes were fabricated and tested before a field test unit was completed in October 2005. The Comboflair® system, complete with ductwork, was installed in a 1,984 square feet, double-wide manufactured home built by Palm Harbor Homes in Austin, TX. After the home was transported and installed at a Palm Harbor dealer lot in Austin, TX, a data acquisition system was installed for remote data collection. Over 60 parameters were continuously monitored and measurements were transmitted to a remote site every 15 minutes for performance analysis. The Comboflair® system was field tested from February 2006 until April 2007. The cooling system performed in accordance with the design specifications. The heating system initially could not provide the needed capacity at peak heating conditions until the water heater was replaced with a higher capacity standard water heater. All system comfort goals were then met. As a result of field testing, we have identified improvements to be made to specific components for incorporation into production models. The Comboflair® system will be manufactured by Unico, Inc. at their new production facility in St. Louis

  6. TRUMP-BD: A computer code for the analysis of nuclear fuel assemblies under severe accident conditions

    Energy Technology Data Exchange (ETDEWEB)

    Lombardo, N.J.; Marseille, T.J.; White, M.D.; Lowery, P.S.

    1990-06-01

    TRUMP-BD (Boil Down) is an extension of the TRUMP (Edwards 1972) computer program for the analysis of nuclear fuel assemblies under severe accident conditions. This extension allows prediction of the heat transfer rates, metal-water oxidation rates, fission product release rates, steam generation and consumption rates, and temperature distributions for nuclear fuel assemblies under core uncovery conditions. The heat transfer processes include conduction in solid structures, convection across fluid-solid boundaries, and radiation between interacting surfaces. Metal-water reaction kinetics are modeled with empirical relationships to predict the oxidation rates of steam-exposed Zircaloy and uranium metal. The metal-water oxidation models are parabolic in form with an Arrhenius temperature dependence. Uranium oxidation begins when fuel cladding failure occurs; Zircaloy oxidation occurs continuously at temperatures above 13000{degree}F when metal and steam are available. From the metal-water reactions, the hydrogen generation rate, total hydrogen release, and temporal and spatial distribution of oxide formations are computed. Consumption of steam from the oxidation reactions and the effect of hydrogen on the coolant properties is modeled for independent coolant flow channels. Fission product release from exposed uranium metal Zircaloy-clad fuel is modeled using empirical time and temperature relationships that consider the release to be subject to oxidation and volitization/diffusion ( bake-out'') release mechanisms. Release of the volatile species of iodine (I), tellurium (Te), cesium (Ce), ruthenium (Ru), strontium (Sr), zirconium (Zr), cerium (Cr), and barium (Ba) from uranium metal fuel may be modeled.

  7. Setting standards at the forefront of delivery system reform: aligning care coordination quality measures for multiple chronic conditions.

    Science.gov (United States)

    DuGoff, Eva H; Dy, Sydney; Giovannetti, Erin R; Leff, Bruce; Boyd, Cynthia M

    2013-01-01

    The primary study objective is to assess how three major health reform care coordination initiatives (Accountable Care Organizations, Independence at Home, and Community-Based Care Transitions) measure concepts critical to care coordination for people with multiple chronic conditions. We find that there are major differences in quality measurement across these three large and politically important programs. Quality measures currently used or proposed for these new health reform-related programs addressing care coordination primarily capture continuity of care. Other key areas of care coordination, such as care transitions, patient-centeredness, and cross-cutting care across multiple conditions are infrequently addressed. The lack of a comprehensive and consistent measure set for care coordination will pose challenges for healthcare providers and policy makers who seek, respectively, to provide and reward well-coordinated care. In addition, this heterogeneity in measuring care coordination quality will generate new information, but will inhibit comparisons between these care coordination programs.

  8. Premature delivery

    Directory of Open Access Journals (Sweden)

    Bernardita Donoso Bernales

    2012-09-01

    Full Text Available Preterm delivery is the single most important cause of perinatal morbidity and mortality. In Chile, preterm births have increased in the past decade, although neonatal morbidity and mortality attributable to it shows a downward trend, thanks to improvements in neonatal care of premature babies, rather than the success of obstetric preventive and therapeutic strategies. This article describes clinical entities, disease processes and conditions that constitute predisposing factors of preterm birth, as well as an outline for the prevention and clinical management of women at risk of preterm birth.

  9. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2009-01-01

    Property testing was initially studied from various motivations in 1990's.A code C (∩)GF(r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector's coordinates.The problem of testing codes was firstly studied by Blum,Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs).How to characterize locally testable codes is a complex and challenge problem.The local tests have been studied for Reed-Solomon (RS),Reed-Muller (RM),cyclic,dual of BCH and the trace subcode of algebraicgeometric codes.In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions).We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  10. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Property testing was initially studied from various motivations in 1990’s. A code C  GF (r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector’s coordinates. The problem of testing codes was firstly studied by Blum, Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs). How to characterize locally testable codes is a complex and challenge problem. The local tests have been studied for Reed-Solomon (RS), Reed-Muller (RM), cyclic, dual of BCH and the trace subcode of algebraicgeometric codes. In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions). We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  11. conditions

    Directory of Open Access Journals (Sweden)

    M. Venkatesulu

    1996-01-01

    Full Text Available Solutions of initial value problems associated with a pair of ordinary differential systems (L1,L2 defined on two adjacent intervals I1 and I2 and satisfying certain interface-spatial conditions at the common end (interface point are studied.

  12. Competence of birth attendants at providing emergency obstetric care under India's JSY conditional cash transfer program for institutional delivery: an assessment using case vignettes in Madhya Pradesh province.

    Science.gov (United States)

    Chaturvedi, Sarika; Upadhyay, Sourabh; De Costa, Ayesha

    2014-05-24

    Access to emergency obstetric care by competent staff can reduce maternal mortality. India has launched the Janani Suraksha Yojana (JSY) conditional cash transfer program to promote institutional births. During implementation of the JSY, India witnessed a steep increase in the proportion of institutional deliveries-from 40% in 2004 to 73% in 2012. However, maternal mortality reduction follows a secular trend. Competent management of complications, when women deliver in facilities under the JSY, is essential for reduction in maternal mortality and therefore to a successful program outcome. We investigate, using clinical vignettes, whether birth attendants at institutions under the program are competent at providing appropriate care for obstetric complications. A facility based cross-sectional study was conducted in three districts of Madhya Pradesh (MP) province. Written case vignettes for two obstetric complications, hemorrhage and eclampsia, were administered to 233 birth attendant nurses at 73 JSY facilities. Their competence at (a) initial assessment, (b) diagnosis, and (c) making decisions on appropriate first-line care for these complications was scored. The mean emergency obstetric care (EmOC) competence score was 5.4 (median = 5) on a total score of 20, and 75% of participants scored below 35% of the maximum score. The overall score, although poor, was marginally higher in respondents with Skilled Birth Attendant (SBA) training, those with general nursing and midwifery qualifications, those at higher facility levels, and those conducting >30 deliveries a month. In all, 14% of respondents were competent at assessment, 58% were competent at making a correct clinical diagnosis, and 20% were competent at providing first-line care. Birth attendants in the JSY facilities have low competence at EmOC provision. Hence, births in the JSY program cannot be considered to have access to competent EmOC. Urgent efforts are required to effectively increase the

  13. Study of counter current flow limitation model of MARS-KS and SPACE codes under Dukler's air/water flooding test conditions

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Won Woong; Kim, Min Gil; Lee, Jeong Ik [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Bang, Young Seok [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2015-10-15

    In particular, CCFL(the counter current flow limitation) occurs in components such as hot leg, downcomer annulus and steam generator inlet plenum during LOCA which is possible to have flows in two opposite directions. Therefore, CCFL is one of the thermal-hydraulic models which has significant effect on the reactor safety analysis code performance. In this study, the CCFL model will be evaluated with MARS-KS based on two-phase two-field governing equations and SPACE code based on two-phase three-field governing equations. This study will be conducted by comparing MARS-KS code which is being used for evaluating the safety of a Korean Nuclear Power Plant and SPACE code which is currently under assessment for evaluating the safety of the designed nuclear power plant. In this study, comparison of the results of liquid upflow and liquid downflow rate for different gas flow rate from two code to the famous Dukler's CCFL experimental data are presented. This study will be helpful to understand the difference between system analysis codes with different governing equations, models and correlations, and further improving the accuracy of system analysis codes. In the nuclear reactor system, CCFL is an important phenomenon for evaluating the safety of nuclear reactors. This is because CCFL phenomenon can limit injection of ECCS water when CCFL occurs in components such as hot leg, downcomer annulus or steam generator inlet plenum during LOCA which is possible to flow in two opposite directions. Therefore, CCFL is one of the thermal-hydraulic models which has significant effect on the reactor safety analysis code performance. In this study, the CCFL model was evaluated with MARS-KS and SPACE codes for studying the difference between system analysis codes with different governing equations, models and correlations. This study was conducted by comparing MARS-KS and SPACE code results of liquid upflow and liquid downflow rate for different gas flow rate to the famous Dukler

  14. Understanding transport simulations of heavy-ion collisions at 100 and 400 AMeV: Comparison of heavy ion transport codes under controlled conditions

    CERN Document Server

    Xu, Jun; Tsang, ManYee Betty; Wolter, Hermann; Zhang, Ying-Xun; Aichelin, Joerg; Colonna, Maria; Cozma, Dan; Danielewicz, Pawel; Feng, Zhao-Qing; Fevre, Arnaud Le; Gaitanos, Theodoros; Hartnack, Christoph; Kim, Kyungil; Kim, Youngman; Ko, Che-Ming; Li, Bao-An; Li, Qing-Feng; Li, Zhu-Xia; Napolitani, Paolo; Ono, Akira; Papa, Massimo; Song, Taesoo; Su, Jun; Tian, Jun-Long; Wang, Ning; Wang, Yong-Jia; Weil, Janus; Xie, Wen-Jie; Zhang, Feng-Shou; Zhang, Guo-Qiang

    2016-01-01

    Transport simulations are very valuable for extracting physics information from heavy-ion collision experiments. With the emergence of many different transport codes in recent years, it becomes important to estimate their robustness in extracting physics information from experiments. We report on the results of a transport code comparison project. 18 commonly used transport codes were included in this comparison: 9 Boltzmann-Uehling-Uhlenbeck-type codes and 9 Quantum-Molecular-Dynamics-type codes. These codes have been required to simulate Au+Au collisions using the same physics input for mean fields and for in-medium nucleon-nucleon cross sections, as well as the same initialization set-up, the impact parameter, and other calculational parameters at 100 and 400 AMeV incident energy. Among the codes we compare one-body observables such as rapidity and transverse flow distributions. We also monitor non-observables such as the initialization of the internal states of colliding nuclei and their stability, the co...

  15. Delivery presentations

    Science.gov (United States)

    ... passage will take place depends on how your baby is positioned during delivery. The best position for the baby to be ... possible, but labor will generally take longer. After delivery, the baby's face or brow will be swollen and may ...

  16. MEMS: Enabled Drug Delivery Systems.

    Science.gov (United States)

    Cobo, Angelica; Sheybani, Roya; Meng, Ellis

    2015-05-01

    Drug delivery systems play a crucial role in the treatment and management of medical conditions. Microelectromechanical systems (MEMS) technologies have allowed the development of advanced miniaturized devices for medical and biological applications. This Review presents the use of MEMS technologies to produce drug delivery devices detailing the delivery mechanisms, device formats employed, and various biomedical applications. The integration of dosing control systems, examples of commercially available microtechnology-enabled drug delivery devices, remaining challenges, and future outlook are also discussed.

  17. Holographic codes

    CERN Document Server

    Latorre, Jose I

    2015-01-01

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  18. Sharing code

    OpenAIRE

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  19. Transdermal drug delivery using microemulsion and aqueous systems: influence of skin storage conditions on the in vitro permeability of diclofenac from aqueous vehicle systems.

    Science.gov (United States)

    Sintov, Amnon C; Botner, Shafir

    2006-03-27

    The objective of this study was to evaluate the transdermal delivery potential of diclofenac-containing microemulsion system in vivo and in vitro. It was found that the transdermal administration of the microemulsion to rats resulted in 8-fold higher drug plasma levels than those obtained after application of Voltaren Emulgel. After s.c. administration (3.5 mg/kg), the plasma levels of diclofenac reached a peak of 0.94 microg/ml at t=1 h and decreased rapidly to 0.19 microg/ml at t=6 h, while transdermal administration of the drug in microemulsion maintained constant levels of 0.7-0.9 microg/ml for at least 8 h. The transdermal fluxes of diclofenac were measured in vitro using skin excised from different animal species. In three rodent species, penetration fluxes of 53.35+/-8.19 (furry mouse), 31.70+/-3.83 (hairless mouse), 31.66+/-4.45 (rat), and 22.89+/-6.23 microg/cm(2)/h (hairless guinea pig) were obtained following the application of the microemulsion. These fluxes were significantly higher than those obtained by application of the drug in aqueous solution. In contrast to these results, a 'flip-flop' phenomenon was observed when frozen porcine skin (but not fresh skin) was significantly more permeable to diclofenac-in-water than to the drug-in-microemulsion. In fact, the drug penetration from the microemulsion was not affected by the skin storage conditions, but it was increased when an aqueous solution was applied. However, this unusual phenomenon observed in non-freshly used porcine skin places a question mark on its relevancy for in vitro penetration studies involving aqueous vehicle systems.

  20. THE PROTECTION OF CONTRADICTORY IN THE BRAZILIAN NEW CIVIL PROCEDURE CODE: THE PROHIBITION OF “SUPRISE DECISIONS”; CONDITION TO THE EXTENSION OF THE OBJECTIVE LIMITS OF “RES JUDICATA”; IDENTIFICATION OF UNMOTIVATED DECISIONS.

    Directory of Open Access Journals (Sweden)

    Paulo Henrique dos Santos Lucon

    2016-06-01

    Full Text Available This article aims to analyze different kinds of judicial protection to the contradictory principle in the new Civil Procedure Code. As a procedural fundamental right, contradictory demands real application by judges and legislators. The new Civil Procedure Code ruled the theme properly, which can be identified by the prohibition of “suprise decisions”; the prevision of contradictory as a condition to the extension of the objective limits of “res judicata” to the so called “prejudicial questions” and the identification of unmotivated decisions

  1. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  2. Polar Codes

    Science.gov (United States)

    2014-12-01

    QPSK Gaussian channels . .......................................................................... 39 vi 1. INTRODUCTION Forward error correction (FEC...Capacity of BSC. 7 Figure 5. Capacity of AWGN channel . 8 4. INTRODUCTION TO POLAR CODES Polar codes were introduced by E. Arikan in [1]. This paper...Under authority of C. A. Wilgenbusch, Head ISR Division EXECUTIVE SUMMARY This report describes the results of the project “More reliable wireless

  3. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    discusses code as the artist’s material and, further, formulates a critique of Cramer. The seductive magic in computer-generated art does not lie in the magical expression, but nor does it lie in the code/material/text itself. It lies in the nature of code to do something – as if it was magic......Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  4. PN/S calculations for a fighter W/F at high-lift yaw conditions. [parabolized Navier-Stokes computer code

    Science.gov (United States)

    Wai, J. C.; Blom, G.; Yoshihara, H.; Chaussee, D.

    1986-01-01

    The NASA/Ames parabolized Navier/Stokes computer code was used to calculate the turbulent flow over the wing/fuselage for a generic fighter at M = 2.2. 18 deg angle-of-attack, and 0 and 5 deg yaw. Good test/theory agreement was achieved in the zero yaw case. No test data were available for the yaw case.

  5. Validation of the RELAP5 code for the modeling of flashing-induced instabilities under natural-circulation conditions using experimental data from the CIRCUS test facility

    Energy Technology Data Exchange (ETDEWEB)

    Kozmenkov, Y. [Helmholtz-Zentrum Dresden-Rossendorf e.V. (FZD), Institute of Safety Research, P.O.B. 510119, D-01324 Dresden (Germany); Institute of Physics and Power Engineering, Obninsk (Russian Federation); Rohde, U., E-mail: U.Rohde@hzdr.de [Helmholtz-Zentrum Dresden-Rossendorf e.V. (FZD), Institute of Safety Research, P.O.B. 510119, D-01324 Dresden (Germany); Manera, A. [Paul Scherrer Institute (Switzerland)

    2012-02-15

    Highlights: Black-Right-Pointing-Pointer We report about the simulation of flashing-induced instabilities in natural circulation systems. Black-Right-Pointing-Pointer Flashing-induced instabilities are of relevance for operation of pool-type reactors of small power at low pressure. Black-Right-Pointing-Pointer The RELAP5 code is validated against measurement data from natural circulation experiments. Black-Right-Pointing-Pointer The magnitude and frequency of the oscillations were reproduced in good agreement with the measurement data. - Abstract: This paper reports on the use of the RELAP5 code for the simulation of flashing-induced instabilities in natural circulation systems. The RELAP 5 code is intended to be used for the simulation of transient processes in the Russian RUTA reactor concept operating at atmospheric pressure with forced convection of coolant. However, during transient processes, natural circulation with flashing-induced instabilities might occur. The RELAP5 code is validated against measurement data from natural circulation experiments performed within the framework of a European project (NACUSP) on the CIRCUS facility. The facility, built at the Delft University of Technology in The Netherlands, is a water/steam 1:1 height-scaled loop of a typical natural-circulation-cooled BWR. It was shown that the RELAP5 code is able to model all relevant phenomena related to flashing induced instabilities. The magnitude and frequency of the oscillations were reproduced in a good agreement with the measurement data. The close correspondence to the experiments was reached by detailed modeling of all components of the CIRCUS facility including the heat exchanger, the buffer vessel and the steam dome at the top of the facility.

  6. Forceps Delivery

    Science.gov (United States)

    ... in place to control the advance of your baby's head. Forceps deliveries aren't always successful. If your health care ... com. Accessed June 12, 2015. You and your baby: Prenatal care, labor and delivery, and postpartum care. Washington, D.C.: The American ...

  7. Code of ethics: principles for ethical leadership.

    Science.gov (United States)

    Flite, Cathy A; Harman, Laurinda B

    2013-01-01

    The code of ethics for a professional association incorporates values, principles, and professional standards. A review and comparative analysis of a 1934 pledge and codes of ethics from 1957, 1977, 1988, 1998, 2004, and 2011 for a health information management association was conducted. Highlights of some changes in the healthcare delivery system are identified as a general context for the codes of ethics. The codes of ethics are examined in terms of professional values and changes in the language used to express the principles of the various codes.

  8. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  9. Embedded multiple description coding of video.

    Science.gov (United States)

    Verdicchio, Fabio; Munteanu, Adrian; Gavrilescu, Augustin I; Cornelis, Jan; Schelkens, Peter

    2006-10-01

    Real-time delivery of video over best-effort error-prone packet networks requires scalable erasure-resilient compression systems in order to 1) meet the users' requirements in terms of quality, resolution, and frame-rate; 2) dynamically adapt the rate to the available channel capacity; and 3) provide robustness to data losses, as retransmission is often impractical. Furthermore, the employed erasure-resilience mechanisms should be scalable in order to adapt the degree of resiliency against transmission errors to the varying channel conditions. Driven by these constraints, we propose in this paper a novel design for scalable erasure-resilient video coding that couples the compression efficiency of the open-loop architecture with the robustness provided by multiple description coding. In our approach, scalability and packet-erasure resilience are jointly provided via embedded multiple description scalar quantization. Furthermore, a novel channel-aware rate-allocation technique is proposed that allows for shaping on-the-fly the output bit rate and the degree of resiliency without resorting to channel coding. As a result, robustness to data losses is traded for better visual quality when transmission occurs over reliable channels, while erasure resilience is introduced when noisy links are involved. Numerical results clearly demonstrate the advantages of the proposed approach over equivalent codec instantiations employing 1) no erasure-resilience mechanisms, 2) erasure-resilience with nonscalable redundancy, or 3) data-partitioning principles.

  10. Software Build and Delivery Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robey, Robert W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-07-10

    This presentation deals with the hierarchy of software build and delivery systems. One of the goals is to maximize the success rate of new users and developers when first trying your software. First impressions are important. Early successes are important. This also reduces critical documentation costs. This is a presentation focused on computer science and goes into detail about code documentation.

  11. LFSC - Linac Feedback Simulation Code

    Energy Technology Data Exchange (ETDEWEB)

    Ivanov, Valentin; /Fermilab

    2008-05-01

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  12. ON CLASSICAL BCH CODES AND QUANTUM BCH CODES

    Institute of Scientific and Technical Information of China (English)

    Xu Yajie; Ma Zhi; Zhang Chunyuan

    2009-01-01

    It is a regular way of constructing quantum error-correcting codes via codes with self-orthogonal property, and whether a classical Bose-Chaudhuri-Hocquenghem (BCH) code is self-orthogonal can be determined by its designed distance. In this paper, we give the sufficient and necessary condition for arbitrary classical BCH codes with self-orthogonal property through algorithms. We also give a better upper bound of the designed distance of a classical narrow-sense BCH code which contains its Euclidean dual. Besides these, we also give one algorithm to compute the dimension of these codes. The complexity of all algorithms is analyzed. Then the results can be applied to construct a series of quantum BCH codes via the famous CSS constructions.

  13. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe...... the codes succinctly using Gröbner bases....

  14. Medical and infectious complications associated with pyelonephritis among pregnant women at delivery.

    Science.gov (United States)

    Dotters-Katz, Sarah K; Heine, R Phillips; Grotegut, Chad A

    2013-01-01

    Pyelonephritis is a common cause of antepartum admission and maternal morbidity. Medical complications associated with pyelonephritis during delivery are not well described; thus the objective of this study was to estimate medical, infectious, and obstetric complications associated with pyelonephritis during the delivery admission. We conducted a retrospective cohort study using the Nationwide Inpatient Sample (NIS) for the years 2008-2010. The NIS was queried for all delivery-related discharges. During the delivery admission, the ICD-9-CM codes for pyelonephritis were used to identify cases and were compared to women without pyelonephritis. A multivariable logistic regression model was constructed for various medical, infectious, and obstetric complications among women with pyelonephritis compared to women without, while controlling for preexisting medical conditions and demographics. During the years 2008-2010, there were 26,397 records with a diagnosis of pyelonephritis during the delivery admission, for a rate of 2.1 per 1000 deliveries. Women with pyelonephritis had increased associated risks for transfusion, need for mechanical ventilation, acute heart failure, pneumonia, pulmonary edema, acute respiratory distress syndrome, sepsis, acute renal failure, preterm labor, and chorioamnionitis, while controlling for preexisting medical conditions. Pyelonephritis at delivery admissions is associated with significant medical and infectious morbidity.

  15. On Expanded Cyclic Codes

    CERN Document Server

    Wu, Yingquan

    2008-01-01

    The paper has a threefold purpose. The first purpose is to present an explicit description of expanded cyclic codes defined in $\\GF(q^m)$. The proposed explicit construction of expanded generator matrix and expanded parity check matrix maintains the symbol-wise algebraic structure and thus keeps many important original characteristics. The second purpose of this paper is to identify a class of constant-weight cyclic codes. Specifically, we show that a well-known class of $q$-ary BCH codes excluding the all-zero codeword are constant-weight cyclic codes. Moreover, we show this class of codes achieve the Plotkin bound. The last purpose of the paper is to characterize expanded cyclic codes utilizing the proposed expanded generator matrix and parity check matrix. We analyze the properties of component codewords of a codeword and particularly establish the precise conditions under which a codeword can be represented by a subbasis. With the new insights, we present an improved lower bound on the minimum distance of...

  16. Bounds on Generalized Huffman Codes

    CERN Document Server

    Baer, Michael B

    2007-01-01

    New lower and upper bounds are obtained for the compression of optimal binary prefix codes according to various nonlinear codeword length objectives. Like the coding bounds for Huffman coding - which concern the traditional linear code objective of minimizing average codeword length -- these are in terms of a form of entropy and the probability of the most probable input symbol. As in Huffman coding, some upper bounds can be found using sufficient conditions for the codeword corresponding to the most probable symbol being one bit long. Whereas having probability no less than 0.4 is a tight sufficient condition for this to be the case in Huffman coding, other penalties differ, some having a tighter condition, some a looser condition, and others having no such sufficient condition. The objectives explored here are ones for which optimal codes can be found using a generalized form of Huffman coding. These objectives include one related to queueing (an increasing exponential average), one related to single-shot c...

  17. On conditions and parameters important to model sensitivity for unsaturated flow through layered, fractured tuff; Results of analyses for HYDROCOIN [Hydrologic Code Intercomparison Project] Level 3 Case 2: Yucca Mountain Project

    Energy Technology Data Exchange (ETDEWEB)

    Prindle, R.W.; Hopkins, P.L.

    1990-10-01

    The Hydrologic Code Intercomparison Project (HYDROCOIN) was formed to evaluate hydrogeologic models and computer codes and their use in performance assessment for high-level radioactive-waste repositories. This report describes the results of a study for HYDROCOIN of model sensitivity for isothermal, unsaturated flow through layered, fractured tuffs. We investigated both the types of flow behavior that dominate the performance measures and the conditions and model parameters that control flow behavior. We also examined the effect of different conceptual models and modeling approaches on our understanding of system behavior. The analyses included single- and multiple-parameter variations about base cases in one-dimensional steady and transient flow and in two-dimensional steady flow. The flow behavior is complex even for the highly simplified and constrained system modeled here. The response of the performance measures is both nonlinear and nonmonotonic. System behavior is dominated by abrupt transitions from matrix to fracture flow and by lateral diversion of flow. The observed behaviors are strongly influenced by the imposed boundary conditions and model constraints. Applied flux plays a critical role in determining the flow type but interacts strongly with the composite-conductivity curves of individual hydrologic units and with the stratigraphy. One-dimensional modeling yields conservative estimates of distributions of groundwater travel time only under very limited conditions. This study demonstrates that it is wrong to equate the shortest possible water-travel path with the fastest path from the repository to the water table. 20 refs., 234 figs., 10 tabs.

  18. [A comparative study of coding and information systems for the evaluation of medical and social conditions: the case of addictive disorders].

    Science.gov (United States)

    Bourdais-Mannone, Claire; Cherikh, Faredj; Gicquel, Nathalie; Gelsi, Eve; Jove, Frédérique; Staccini, Pascal

    2011-01-01

    The purpose of this study was to conduct a descriptive and comparative analysis of the tools used by healthcare professionals specializing in addictive disorders to promote a rapprochement of information systems. The evaluation guide used to assess the compensation needs of disabled persons treated in "Maisons Départementales des Personnes Handicapées" (centres for disabled people) organizes information in different areas, including a psychological component. The guide includes social and environmental information in the "Recueil Commun sur les Addictions et les Prises en charges" (Joint Report on Drug Addiction and Drug Treatment). While the program for the medicalization of information systems includes care data, the current information about social situations remains inadequate. The international classification of diseases provides synthetic diagnostic codes to describe substance use, etiologic factors and the somatic and psychological complications inherent to addictive disorders. The current system could be radically simplified and harmonized and would benefit from adopting a more individualized approach to non-substance behavioral addictions. The international classification of disabilities provides tools for evaluating the psychological component included in the recent definition of addictive disorders. Legal information should play an integral role in the structure of the information system and in international classifications. The prevalence of episodes of care and treatment of addictive and psychological disorders was assessed at Nice University Hospital in all disciplines. Except in addiction treatment units, very few patients were found to have a RECAP file.

  19. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  20. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  1. FLYCHK Collisional-Radiative Code

    Science.gov (United States)

    SRD 160 FLYCHK Collisional-Radiative Code (Web, free access)   FLYCHK provides a capability to generate atomic level populations and charge state distributions for low-Z to mid-Z elements under NLTE conditions.

  2. Good Codes From Generalised Algebraic Geometry Codes

    CERN Document Server

    Jibril, Mubarak; Ahmed, Mohammed Zaki; Tjhai, Cen

    2010-01-01

    Algebraic geometry codes or Goppa codes are defined with places of degree one. In constructing generalised algebraic geometry codes places of higher degree are used. In this paper we present 41 new codes over GF(16) which improve on the best known codes of the same length and rate. The construction method uses places of small degree with a technique originally published over 10 years ago for the construction of generalised algebraic geometry codes.

  3. Bit-Interleaved Coded Multiple Beamforming with Perfect Coding

    CERN Document Server

    Li, Boyu

    2010-01-01

    When the channel state information is known by the transmitter as well as the receiver, beamforming techniques that employ Singular Value Decomposition (SVD) are commonly used in Multiple-Input Multiple-Output (MIMO) systems. Without channel coding, when a single symbol is transmitted, these systems achieve the full diversity order. Whereas, this property is lost when multiple symbols are simultaneously transmitted. Full diversity can be restored when channel coding is added, as long as the code rate Rc and the number of employed subchannels S satisfy the condition RcS =< 1. Moreover, by adding a proper constellation precoder, full diversity can be achieved for both uncoded and coded SVD systems, e.g., Fully Precoded Multiple Beamforming (FPMB) and Bit-Interleaved Coded Multiple Beamforming with Full Precoding (BICMB-FP). Perfect Space-Time Block Code (PSTBC) is a full-rate full-diversity space-time code, which achieves maximum coding gain for MIMO systems. Previously, Perfect Coded Multiple Beamforming (P...

  4. Space Time Codes from Permutation Codes

    CERN Document Server

    Henkel, Oliver

    2006-01-01

    A new class of space time codes with high performance is presented. The code design utilizes tailor-made permutation codes, which are known to have large minimal distances as spherical codes. A geometric connection between spherical and space time codes has been used to translate them into the final space time codes. Simulations demonstrate that the performance increases with the block lengths, a result that has been conjectured already in previous work. Further, the connection to permutation codes allows for moderate complex en-/decoding algorithms.

  5. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  6. Building Codes

    DEFF Research Database (Denmark)

    Rindel, Jens Holger; Rasmussen, Birgit

    1996-01-01

    A state-of-the-art survey concerning acoustic conditions in dwellings has been carried out in 1994. A review of existing investigations related to subjective and/or objective evaluation of dwellings was done, and several countries were contacted to get up-to-date information about the legal...

  7. Building Codes

    DEFF Research Database (Denmark)

    Rindel, Jens Holger; Rasmussen, Birgit

    1996-01-01

    A state-of-the-art survey concerning acoustic conditions in dwellings has been carried out in 1994. A review of existing investigations related to subjective and/or objective evaluation of dwellings was done, and several countries were contacted to get up-to-date information about the legal acous...

  8. PARAVT: Parallel Voronoi tessellation code

    Science.gov (United States)

    González, R. E.

    2016-10-01

    In this study, we present a new open source code for massive parallel computation of Voronoi tessellations (VT hereafter) in large data sets. The code is focused for astrophysical purposes where VT densities and neighbors are widely used. There are several serial Voronoi tessellation codes, however no open source and parallel implementations are available to handle the large number of particles/galaxies in current N-body simulations and sky surveys. Parallelization is implemented under MPI and VT using Qhull library. Domain decomposition takes into account consistent boundary computation between tasks, and includes periodic conditions. In addition, the code computes neighbors list, Voronoi density, Voronoi cell volume, density gradient for each particle, and densities on a regular grid. Code implementation and user guide are publicly available at https://github.com/regonzar/paravt.

  9. Strong Trinucleotide Circular Codes

    Directory of Open Access Journals (Sweden)

    Christian J. Michel

    2011-01-01

    Full Text Available Recently, we identified a hierarchy relation between trinucleotide comma-free codes and trinucleotide circular codes (see our previous works. Here, we extend our hierarchy with two new classes of codes, called DLD and LDL codes, which are stronger than the comma-free codes. We also prove that no circular code with 20 trinucleotides is a DLD code and that a circular code with 20 trinucleotides is comma-free if and only if it is a LDL code. Finally, we point out the possible role of the symmetric group ∑4 in the mathematical study of trinucleotide circular codes.

  10. Decoding of Convolutional Codes over the Erasure Channel

    CERN Document Server

    Tomás, Virtudes; Smarandache, Roxana

    2010-01-01

    In this paper we study the decoding capabilities of convolutional codes over the erasure channel. Of special interest will be maximum distance profile (MDP) convolutional codes. These are codes which have a maximum possible column distance increase. We show how this strong minimum distance condition of MDP convolutional codes help us to solve error situations that maximum distance separable (MDS) block codes fail to solve. Towards this goal, we define two subclasses of MDP codes: reverse-MDP convolutional codes and complete-MDP convolutional codes. Reverse-MDP codes have the capability to recover a maximum number of erasures using an algorithm which runs backward in time. Complete-MDP convolutional codes are both MDP and reverse-MDP codes. They are capable to recover the state of the decoder under the mildest condition. We show that complete-MDP convolutional codes perform in certain sense better than MDS block codes of the same rate over the erasure channel.

  11. Properties of Codes in the Johnson Scheme

    CERN Document Server

    Silberstein, Natalia

    2010-01-01

    Codes which attain the sphere packing bound are called perfect codes. The most important metrics in coding theory on which perfect codes are defined are the Hamming metric and the Johnson metric. While for the Hamming metric all perfect codes over finite fields are known, in the Johnson metric it was conjectured by Delsarte in 1970's that there are no nontrivial perfect codes. The general nonexistence proof still remains the open problem. In this work we examine constant weight codes as well as doubly constant weight codes, and reduce the range of parameters in which perfect codes may exist in both cases. We start with the constant weight codes. We introduce an improvement of Roos' bound for one-perfect codes, and present some new divisibility conditions, which are based on the connection between perfect codes in Johnson graph J(n,w) and block designs. Next, we consider binomial moments for perfect codes. We show which parameters can be excluded for one-perfect codes. We examine two-perfect codes in J(2w,w) a...

  12. Analysis of Non-binary Hybrid LDPC Codes

    CERN Document Server

    Sassatelli, Lucile

    2008-01-01

    In this paper, we analyse asymptotically a new class of LDPC codes called Non-binary Hybrid LDPC codes, which has been recently introduced. We use density evolution techniques to derive a stability condition for hybrid LDPC codes, and prove their threshold behavior. We study this stability condition to conclude on asymptotic advantages of hybrid LDPC codes compared to their non-hybrid counterparts.

  13. Generalized H-codes and type II codes over GF(4)

    Institute of Scientific and Technical Information of China (English)

    LIN Xin-qi; WEN Xiang-ming; ZHENG Wei

    2008-01-01

    The type II codes have been studied widely in applications since their appearance. With analysis of the algebraic structure of finite field of order 4 (i.e., GF(4)), some necessary and sufficient conditions that a generalized H-code (i.e., GH-code) is a type II code over GF(4) are given in this article, and an efficient and simple method to generate type II codes from GH-codes over GF(4) is shown. The conclusions further extend the coding theory of type II.

  14. 超声对剖宫产子宫切口愈合不良监测的意义%The Significance of Ultrasonic Monitoring in Uterus Incision of Abdominal Delivery Healed in Poor Condition

    Institute of Scientific and Technical Information of China (English)

    肖碧芳; 杨彩群; 葛利平; 楼春

    2009-01-01

    Objective To explore the ultrasonic images of the uterus incision of abdominal delivery healed in poor condition.Methods Monitor the uterus incisions of 30 cases after abdominal delivery with B-Ultrasound.Results Divide the uterus incisions into 3 groups according to the characteristics of their ultrasonic images:Group I had parallel or arc-like incisions with hyperecho,which led to good curation.Group Ⅱ had mixed echo mass of inhomogenous echo mass or no echo area,which meant incision inflammation(26cases,86.7%).Group Ⅲ had break-up incisions,patch-like hyperecho,thickened boder to bladder,irregular adnexal area and inhomogenous mass without echo,which led to uterus rupture and ulcer formation with phlogistic exudation.(4 cases,13.3%).Conclusions B-Ultrasound can monitor uterus incision of abdominal delivery healed in poor condition and provide clinical direction to prevent complications such as postpartum Hemorrhage.%目的 探讨剖宫产术后子宫切口愈合不良的声像图表现.方法 应用B超监测30例剖宫产术后子宫切口的愈合情况.结果 根据声像图特点将子宫切口愈合情况分类:I类子宫切口呈平行或弧状强回声带为愈合良好;Ⅱ类子宫切口呈实质性非均质性回声团或无回声区为主的混合性回声团为子宫切口炎性反应,26例(86.7%);Ⅲ类子宫切口区局部中断,内见斑片状强回声,边缘明显增厚,突向膀胱,附件区可及形态不规则,非均质性实质性包块伴无回声,为子宫局部裂开,溃疡形成伴附件炎性渗出,4例(13.3%).结论 B超能够监测剖宫产术后子宫切口愈合不良的情况,为临床提供依据,对防治晚期产后出血等并发症具有重要的临床价值.

  15. Packet Skipping and Network Coding for Delay-Sensitive Network Communication

    CERN Document Server

    Aoun, Marc; Argyriou, Antonios; Denteneer, Dee; van der Stok, Peter

    2012-01-01

    We provide an analytical study of the impact of packet skipping and opportunistic network coding on the timely communication of messages through a single network element. In a first step, we consider a single-server queueing system with Poisson arrivals, exponential service times, and a single buffer position. Packets arriving at a network node have a fixed deadline before which they should reach the destination. To preserve server capacity, we introduce a thresholding policy, based on remaining time until deadline expiration, to decide whether to serve a packet or skip its service. The obtained goodput improvement of the system is derived, as well as the operating conditions under which thresholding can enhance performance. Subsequently, we focus our analysis on a system that supports network coding instead of thresholding. We characterize the impact of network coding at a router node on the delivery of packets associated with deadlines. We model the router node as a queueing system where packets arrive from...

  16. Joint source channel coding using arithmetic codes

    CERN Document Server

    Bi, Dongsheng

    2009-01-01

    Based on the encoding process, arithmetic codes can be viewed as tree codes and current proposals for decoding arithmetic codes with forbidden symbols belong to sequential decoding algorithms and their variants. In this monograph, we propose a new way of looking at arithmetic codes with forbidden symbols. If a limit is imposed on the maximum value of a key parameter in the encoder, this modified arithmetic encoder can also be modeled as a finite state machine and the code generated can be treated as a variable-length trellis code. The number of states used can be reduced and techniques used fo

  17. Determining astronomical seeing conditions at Matjiesfontein by optical and turbulence methods

    Energy Technology Data Exchange (ETDEWEB)

    Nickola, M [Hartebeesthoek Radio Astronomy Observatory (HartRAO) Space Geodesy Programme, PO Box 443, Krugersdorp 1740 (South Africa); Esau, I [G.C. Rieber Climate Institute of the Nansen Environmental and Remote Sensing Center (NERSC), Thoermohlensgate 47, N-5006 Bergen (Norway); Djolov, G [University of Pretoria, Department of Geography, Geoinformatics and Meteorology, Faculty of Natural and Agricultural Sciences, University of Pretoria, Pretoria 0002 (South Africa)

    2010-08-15

    Matjiesfontein in the Karoo has been proposed as a suitable location for a new fundamental space geodetic observatory. On-site geodetic equipment will include a Lunar Laser Ranger (LLR). LLR requires sub-arcsecond optical seeing conditions for delivery of high quality and quantity data. Seeing conditions at the Matjiesfontein site will be evaluated by making use of an automated seeing monitor and by modelling atmospheric turbulence with Large Eddy Simulation Nansen Center Improved Code (LESNIC).

  18. Phase-coded pulse aperiodic transmitter coding

    Directory of Open Access Journals (Sweden)

    I. I. Virtanen

    2009-07-01

    Full Text Available Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC, whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF. When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers – about seven milliseconds – whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  19. Code Carnivals: resuscitating Code Blue training with accelerated learning.

    Science.gov (United States)

    Keys, Vicky A; Malone, Peggy; Brim, Carla; Schoonover, Heather; Nordstrom, Cindy; Selzler, Melissa

    2009-12-01

    Nurses in the hospital setting must be knowledgeable about resuscitation procedures and proficient in the delivery of care during an emergency. They must be ready to implement their knowledge and skills at a moment's notice. A common dilemma for many nurses is that cardiopulmonary emergencies (Code Blues) are infrequent occurrences. Therefore, how do nurses remain competent and confident in their implementation of emergency skills while having limited exposure to the equipment and minimal experience in emergency situations? A team of nurse educators at a regional medical center in Washington State applied adult learning theory and accelerated learning techniques to develop and present a series of learning activities to enhance the staff's familiarity with emergency equipment and procedures. The series began with a carnival venue that provided hands-on practice and review of emergency skills and was reinforced with subsequent random unannounced code drills led by both educators and charge nurses. Copyright 2009, SLACK Incorporated.

  20. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  1. CD40 ligand induced cytotoxicity in carcinoma cells is enhanced by inhibition of metalloproteinase cleavage and delivery via a conditionally-replicating adenovirus

    Directory of Open Access Journals (Sweden)

    Young Lawrence S

    2010-03-01

    Full Text Available Abstract Background CD40 and its ligand (CD40L play a critical role in co-ordinating immune responses. CD40 is also expressed in lymphoid malignancies and a number of carcinomas. In carcinoma cells the physiological outcome of CD40 ligation depends on the level of receptor engagement with low levels promoting cell survival and high levels inducing cell death. The most profound induction of cell death in carcinoma cells is induced by membrane-bound rather than recombinant soluble CD40L, but like other TNF family ligands, it is cleaved from the membrane by matrix metalloproteinases. Results We have generated a replication-deficient adenovirus expressing a mutant CD40L that is resistant to metalloproteinase cleavage such that ligand expression is retained at the cell membrane. Here we show that the mutated, cleavage-resistant form of CD40L is a more potent inducer of apoptosis than wild-type ligand in CD40-positive carcinoma cell lines. Since transgene expression via replication-deficient adenovirus vectors in vivo is low, we have also engineered a conditionally replicating E1A-CR2 deleted adenovirus to express mutant CD40L, resulting in significant amplification of ligand expression and consequent enhancement of its therapeutic effect. Conclusions Combined with numerous studies demonstrating its immunotherapeutic potential, these data provide a strong rationale for the exploitation of the CD40-CD40L pathway for the treatment of solid tumours.

  2. 混合信道下LDPC码稳定条件分析及度序列优化%Analysis of stability condition for LDPC codes and optimizing degree sequences over mixed channel

    Institute of Scientific and Technical Information of China (English)

    孙康宁; 马林华; 茹乐; 范文同; 胡星; 黄绍城

    2016-01-01

    在高斯噪声和随机删除同时存在的背景下,提出LDPC码度序列的稳定收敛条件,理论证明了高斯信道下阈值较高的度序列不适用于混合信道,并仿真验证了该结论。将随机粒子群算法和模拟退火算法相结合,不同删除概率下寻找到了一些高阈值混合信道的度序列,删除概率为40%时,度序列信噪比阈值最大可提高1.6159 dB,适用于光记录、伴随窄带阻塞干扰的跳频通信等混合信道环境。%Under the circumstance that white Gaussian noise and random erasures exist all at once, the stability condition for LDPC codes over mixed channel was proposed. And it was proved that a good degree sequence of LDPC codes was not optimized over mixed channel. It can also be proved by simulation. The random particle swarm optimization (RPSO) and simulated annealing (SA) algorithm were combined to find some capacity-approaching degree sequences over mixed channel with different erasure probabilities. The threshold of signal-to-noise ratio improves 1.615 9 dB than that of the classical degree sequences calculated by Gaussian approximation over mixed channel. These degree sequences are opti-mal for optical recording and frequency-hopping communication with narrow-band interference.

  3. PET-based dose delivery verification in proton therapy: a GATE based simulation study of five PET system designs in clinical conditions

    Science.gov (United States)

    Robert, Charlotte; Fourrier, Nicolas; Sarrut, David; Stute, Simon; Gueth, Pierre; Grevillot, Loïc; Buvat, Irène

    2013-10-01

    PET is a promising technique for in vivo treatment verification in hadrontherapy. Three main PET geometries dedicated to in-beam treatment monitoring have been proposed in the literature: the dual-head PET geometry, the OpenPET geometry and the slanted-closed ring geometry. The aim of this work is to characterize the performance of two of these dedicated PET detectors in realistic clinical conditions. Several configurations of the dual-head PET and OpenPET systems were simulated using GATE v6.2. For the dual-head configuration, two aperture angles (15° and 45°) were studied. For the OpenPET system, two gaps between rings were investigated (110 and 160 mm). A full-ring PET system was also simulated as a reference. After preliminary evaluation of the sensitivity and spatial resolution using a Derenzo phantom, a real small-field head and neck treatment plan was simulated, with and without introducing patient displacements. No wash-out was taken into account. 3D maps of the annihilation photon locations were deduced from the PET data acquired right after the treatment session (5 min acquisition) using a dedicated OS-EM reconstruction algorithm. Detection sensitivity at the center of the field-of-view (FOV) varied from 5.2% (45° dual-head system) to 7.0% (full-ring PET). The dual-head systems had a more uniform efficiency within the FOV than the OpenPET systems. The spatial resolution strongly depended on the location within the FOV for the ϕ = 45° dual-head system and for the two OpenPET systems. All investigated architectures identified the magnitude of mispositioning introduced in the simulations within a 1.5 mm accuracy. The variability on the estimated mispositionings was less than 2 mm for all PET systems.

  4. Competence of birth attendants at providing emergency obstetric care under India’s JSY conditional cash transfer program for institutional delivery: an assessment using case vignettes in Madhya Pradesh province

    Science.gov (United States)

    2014-01-01

    Background Access to emergency obstetric care by competent staff can reduce maternal mortality. India has launched the Janani Suraksha Yojana (JSY) conditional cash transfer program to promote institutional births. During implementation of the JSY, India witnessed a steep increase in the proportion of institutional deliveries-from 40% in 2004 to 73% in 2012. However, maternal mortality reduction follows a secular trend. Competent management of complications, when women deliver in facilities under the JSY, is essential for reduction in maternal mortality and therefore to a successful program outcome. We investigate, using clinical vignettes, whether birth attendants at institutions under the program are competent at providing appropriate care for obstetric complications. Methods A facility based cross-sectional study was conducted in three districts of Madhya Pradesh (MP) province. Written case vignettes for two obstetric complications, hemorrhage and eclampsia, were administered to 233 birth attendant nurses at 73 JSY facilities. Their competence at (a) initial assessment, (b) diagnosis, and (c) making decisions on appropriate first-line care for these complications was scored. Results The mean emergency obstetric care (EmOC) competence score was 5.4 (median = 5) on a total score of 20, and 75% of participants scored below 35% of the maximum score. The overall score, although poor, was marginally higher in respondents with Skilled Birth Attendant (SBA) training, those with general nursing and midwifery qualifications, those at higher facility levels, and those conducting >30 deliveries a month. In all, 14% of respondents were competent at assessment, 58% were competent at making a correct clinical diagnosis, and 20% were competent at providing first-line care. Conclusions Birth attendants in the JSY facilities have low competence at EmOC provision. Hence, births in the JSY program cannot be considered to have access to competent EmOC. Urgent efforts are

  5. Use of ICD-10 codes to monitor uterine rupture

    DEFF Research Database (Denmark)

    Thisted, Dorthe L A; Mortensen, Laust Hvas; Hvidman, Lone

    2014-01-01

    . We retrieved the medical records of all women in the MBR with a code for uterine rupture during labor regardless of whether or not a prior cesarean section had been reported to the registry. In addition medical records of all women with a code for previous cesarean section and delivery of a child...

  6. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  7. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  8. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  9. An implicit Smooth Particle Hydrodynamic code

    Energy Technology Data Exchange (ETDEWEB)

    Knapp, Charles E. [Univ. of New Mexico, Albuquerque, NM (United States)

    2000-05-01

    An implicit version of the Smooth Particle Hydrodynamic (SPH) code SPHINX has been written and is working. In conjunction with the SPHINX code the new implicit code models fluids and solids under a wide range of conditions. SPH codes are Lagrangian, meshless and use particles to model the fluids and solids. The implicit code makes use of the Krylov iterative techniques for solving large linear-systems and a Newton-Raphson method for non-linear corrections. It uses numerical derivatives to construct the Jacobian matrix. It uses sparse techniques to save on memory storage and to reduce the amount of computation. It is believed that this is the first implicit SPH code to use Newton-Krylov techniques, and is also the first implicit SPH code to model solids. A description of SPH and the techniques used in the implicit code are presented. Then, the results of a number of tests cases are discussed, which include a shock tube problem, a Rayleigh-Taylor problem, a breaking dam problem, and a single jet of gas problem. The results are shown to be in very good agreement with analytic solutions, experimental results, and the explicit SPHINX code. In the case of the single jet of gas case it has been demonstrated that the implicit code can do a problem in much shorter time than the explicit code. The problem was, however, very unphysical, but it does demonstrate the potential of the implicit code. It is a first step toward a useful implicit SPH code.

  10. Obstetrical approach in breech presentation delivery

    Directory of Open Access Journals (Sweden)

    G. Grgić

    2007-02-01

    Full Text Available Although it is accompanied by a higher number of intrapartal complications and a higher rate of prenatal mortality and morbidity the breech presentation is not considered to be an unfavourable presentation for delivery. However, delivery with the breech presentation requires a detailed and very careful approach in assessment of the way delivery is to be conducted and a serious approach of an obstetrician when making a final decision. This often results in a high rate of caesarean sections in certain institutions which has been up to 80-100% of all the breech presentations.The objective of this retrospective study was to establish incidence of deliveries of the breech presentations and to determine a way of completing delivery depending on a parity of mother and a condition of the newborn at delivery in the five-year period. The results have shown that breech presentation occurred in 4.69% of the total number of deliveries. There was no statistically significant difference in the way the delivery had been completed neither in the condition of newborns as a result of the way the delivery was completed. 50.75% of deliveries were completed with cesarean section and 49.25% of women delivered the breech presentation vaginally. An average Apgar score for those delivered vaginally was 8.05 and 7.52 for babies delivered naturally. Breech presentation requires a serious prepartal analysis of delivery factors based on which a significant number of deliveries can be conducted vaginally with a satisfactory condition of newborns at delivery.

  11. On Construction of Optimal A2-Codes

    Institute of Scientific and Technical Information of China (English)

    HU Lei

    2001-01-01

    Two authentication codes with arbitration (A2-codes) are constrructed from finite affine spaces to illustrate for the first time that the information-theoretic lower bounds for A2-codes can be strictly tighter than the combinatorial ones. The codes also illustrate that the conditional combinatorial lower bounds on numbers of encoding\\ decoding rules are not genuine ones. As an analogue of 3-dimensional case, an A2-code from 4-dimensional finite projective spaces is constructed, which neets both the information-theoretic and combinatorial lower bounds.

  12. Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers

    CERN Document Server

    Shioji, Eitaro; Uyematsu, Tomohiko

    2010-01-01

    Silva et al. proposed a universal secure network coding scheme based on MRD codes, which can be applied to any underlying network code. This paper considers a stronger eavesdropping model where the eavesdroppers possess the ability to re-select the tapping links during the transmission. We give a proof for the impossibility of attaining universal security against such adversaries using Silva et al.'s code for all choices of code parameters, even with restricted number of tapped links. We also consider the cases with restricted tapping duration and derive some conditions for this code to be secure.

  13. Locally Orderless Registration Code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  14. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  15. Tree Coding of Bilevel Images

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    1998-01-01

    Presently, sequential tree coders are the best general purpose bilevel image coders and the best coders of halftoned images. The current ISO standard, Joint Bilevel Image Experts Group (JBIG), is a good example. A sequential tree coder encodes the data by feeding estimates of conditional...... probabilities to an arithmetic coder. The conditional probabilities are estimated from co-occurrence statistics of past pixels, the statistics are stored in a tree. By organizing the code length calculations properly, a vast number of possible models (trees) reflecting different pixel orderings can...... is one order of magnitude slower than JBIG, obtains excellent and highly robust compression performance. A multipass free tree coding scheme produces superior compression results for all test images. A multipass free template coding scheme produces significantly better results than JBIG for difficult...

  16. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    Science.gov (United States)

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  17. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  18. Constructing quantum codes

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Quantum error correcting codes are indispensable for quantum information processing and quantum computation.In 1995 and 1996,Shor and Steane gave first several examples of quantum codes from classical error correcting codes.The construction of efficient quantum codes is now an active multi-discipline research field.In this paper we review the known several constructions of quantum codes and present some examples.

  19. Unconditional Continuous Variable Dense Coding

    CERN Document Server

    Ralph, T C

    2002-01-01

    We investigate the conditions under which unconditional dense coding can be achieved using continuous variable entanglement. We consider the effect of entanglement impurity and detector efficiency and discuss experimental verification. We conclude that the requirements for a strong demonstration are not as stringent as previously thought and are within the reach of present technology.

  20. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  1. Ultrasound elasticity imaging using Golay code

    Directory of Open Access Journals (Sweden)

    Peng Hui

    2017-01-01

    Full Text Available Ultrasound elasticity imaging is becoming a new diagnostic tool for clinicians to detect lesions or cancers in tissues. In this paper, Golay code is applied to elasticity imaging to improve its quality. Phase-zero algorithm is employed as the displacement estimator, and the amplitude modulation correction location estimate method is used as the location estimator. We compared the performance of Golay code and the conventional short pulse in simulation method. The simulation results demonstrate that Golay code can achieve higher elastographic signal-to-noise ratio (SNRe than the short pulse in low echo signal-to-noise ratio (eSNR conditions, because the eSNR gain with Golay code increases the accuracy of the displacement estimates. However, in high eSNR conditions, Golay code performs worse than the short pulse, because the range sidelobe level of Golay code will decrease the SNRe and the performance of Golay code depends mainly on its range sidelobe level in high eSNR conditions. Therefore, the optimal conditions for Goaly code to be used in elasticity imaging are the low eSNR, great depth or high attenuation conditions.

  2. Transdermal drug delivery

    OpenAIRE

    Prausnitz, Mark R.; Langer, Robert

    2008-01-01

    Transdermal drug delivery has made an important contribution to medical practice, but has yet to fully achieve its potential as an alternative to oral delivery and hypodermic injections. First-generation transdermal delivery systems have continued their steady increase in clinical use for delivery of small, lipophilic, low-dose drugs. Second-generation delivery systems using chemical enhancers, non-cavitational ultrasound and iontophoresis have also resulted in clinical products; the ability ...

  3. Hybrid Noncoherent Network Coding

    CERN Document Server

    Skachek, Vitaly; Nedic, Angelia

    2011-01-01

    We describe a novel extension of subspace codes for noncoherent networks, suitable for use when the network is viewed as a communication system that introduces both dimension and symbol errors. We show that when symbol erasures occur in a significantly large number of different basis vectors transmitted through the network and when the min-cut of the networks is much smaller then the length of the transmitted codewords, the new family of codes outperforms their subspace code counterparts. For the proposed coding scheme, termed hybrid network coding, we derive two upper bounds on the size of the codes. These bounds represent a variation of the Singleton and of the sphere-packing bound. We show that a simple concatenated scheme that represents a combination of subspace codes and Reed-Solomon codes is asymptotically optimal with respect to the Singleton bound. Finally, we describe two efficient decoding algorithms for concatenated subspace codes that in certain cases have smaller complexity than subspace decoder...

  4. Coding Geriatric syndromes: How good are we?

    OpenAIRE

    Ugboma, Ike; Syddall, Holly E.; Cox, Vanessa; Cooper, Cyrus; Briggs, Roger; Sayer, Avan Aihie

    2008-01-01

    High quality coding of hospital activity is important because the data is used for resource allocation and measuring performance. There is little information on the quality of coding of admissions of frail older people who have multiple diagnoses, co-morbidities and functional impairment. Presence or absence of four geriatric syndromes and eight medical conditions was noted on case note review (CNR). Discharge summaries (DS) and hospital coding (HC) were reviewed and compared with the CNR. Fo...

  5. Contract for access to the public power transportation network for an eligible consuming site. Particular conditions at the delivery point; Contrat d'acces au reseau public de transport d'electricte pour un site consommateur eligible. Conditions particulieres au point de livraison

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    On 1 November 2002, the new tariffs for the utilisation of the public power transmission and distribution networks, defined by decree no 2002-1014 of 19 July 2002, will come into effect. A new contract for access to the transmission network has been drawn up in co-operation with the Energy Regulation Commission (CRE) so as to be able to include these new tariffs. This new contract also takes into account the expectations expressed by the users of the transmission network concerning the energy delivery agreement used since the coming into effect of the European Directive on the opening of the electricity market in February 1999. On 31 October 2002, RTE is publishing a new version of the contract for access to the Public Transmission Networks. On 4 August 2003, RTE updated the particular conditions of the contract for access to the public transmission networks. This update takes into account the French regulator's deliberation dated 22/05/03, on the handling of eligible sites indirectly connected to public transmission systems. This document is a model form of the particular conditions of the contract. It comprises the following parts: purpose and contractual perimeter, connection to the public transportation network, metering and deductions, subscribed power, development, exploitation and maintenance of facilities, power continuity and quality, liability, tariffing and conditions of payment, declaration of the balancing actor, general dispositions. 7 models of forms of notification, demand, authorization, agreement, declaration etc.. are given in appendixes.

  6. Hop-by-hop Content Distribution with Network Coding in Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Rami Halloush

    2017-02-01

    Full Text Available The predominant use of today's networks is content access and distribution. Network Coding (NC is an innovative technique that has potential to improve the efficiency of multicast content distribution over multihop Wireless Mesh Networks (WMNs by allowing intermediate Forwarding Nodes (FNs to encode and then forward data packets. Practical protocols are needed to realize the benefits of the NC technique. However, the existing NC-based multicast protocols cannot accurately determine the minimum number of coded packets that a FN should send in order to ensure successful data delivery to the destinations, so that many redundant packets are injected into the network, leading to performance degradation. In this paper, we propose HopCaster, a novel reliable multicast protocol that incorporates network coding with hop-by-hop transport. HopCaster completely eliminates the need for estimating the number of coded packets to be transmitted by a FN, and avoids redundant packet transmissions. It also effectively addresses the challenges of heterogeneous multicast receivers. Moreover, a cross-layer multicast rate adaptation mechanism is proposed, which enables HopCaster to optimize multicast throughput by dynamically adjusting wireless transmission rate based on the changes in the receiver population and channel conditions during the course of multicasting a coded data chunk. Our evaluations show that HopCaster significantly outperforms the existing NC-based multicast protocols.

  7. UNIT-RATE COMPLEX ORTHOGONAL SPACE-TIME BLOCK CODE CONCATENATED WITH TURBO CODING

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Space-Time Block (STB) code has been an effective transmit diversity technique for combating fading due to its orthogonal design, simple decoding and high diversity gains. In this paper, a unit-rate complex orthogonal STB code for multiple antennas in Time Division Duplex (TDD) mode is proposed. Meanwhile, Turbo Coding (TC) is employed to improve the performance of proposed STB code further by utilizing its good ability to combat the burst error of fading channel. Compared with full-diversity multiple antennas STB codes, the proposed code can implement unit rate and partial diversity; and it has much smaller computational complexity under the same system throughput. Moreover, the application of TC can effectively make up for the performance loss due to partial diversity. Simulation results show that on the condition of same system throughput and concatenation of TC, the proposed code has lower Bit Error Rate (BER) than those full-diversity codes.

  8. Network coding for computing: Linear codes

    CERN Document Server

    Appuswamy, Rathinakumar; Karamchandani, Nikhil; Zeger, Kenneth

    2011-01-01

    In network coding it is known that linear codes are sufficient to achieve the coding capacity in multicast networks and that they are not sufficient in general to achieve the coding capacity in non-multicast networks. In network computing, Rai, Dey, and Shenvi have recently shown that linear codes are not sufficient in general for solvability of multi-receiver networks with scalar linear target functions. We study single receiver networks where the receiver node demands a target function of the source messages. We show that linear codes may provide a computing capacity advantage over routing only when the receiver demands a `linearly-reducible' target function. % Many known target functions including the arithmetic sum, minimum, and maximum are not linearly-reducible. Thus, the use of non-linear codes is essential in order to obtain a computing capacity advantage over routing if the receiver demands a target function that is not linearly-reducible. We also show that if a target function is linearly-reducible,...

  9. Soft-decision decoding of RS codes

    DEFF Research Database (Denmark)

    Justesen, Jørn

    2005-01-01

    By introducing a few simplifying assumptions we derive a simple condition for successful decoding using the Koetter-Vardy algorithm for soft-decision decoding of RS codes. We show that the algorithm has a significant advantage over hard decision decoding when the code rate is low, when two or more...

  10. Context quantization by minimum adaptive code length

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Wu, Xiaolin

    2007-01-01

    Context quantization is a technique to deal with the issue of context dilution in high-order conditional entropy coding. We investigate the problem of context quantizer design under the criterion of minimum adaptive code length. A property of such context quantizers is derived for binary symbols...

  11. Practices in Code Discoverability

    CERN Document Server

    Teuben, Peter; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Much of scientific progress now hinges on the reliability, falsifiability and reproducibility of computer source codes. Astrophysics in particular is a discipline that today leads other sciences in making useful scientific components freely available online, including data, abstracts, preprints, and fully published papers, yet even today many astrophysics source codes remain hidden from public view. We review the importance and history of source codes in astrophysics and previous efforts to develop ways in which information about astrophysics codes can be shared. We also discuss why some scientist coders resist sharing or publishing their codes, the reasons for and importance of overcoming this resistance, and alert the community to a reworking of one of the first attempts for sharing codes, the Astrophysics Source Code Library (ASCL). We discuss the implementation of the ASCL in an accompanying poster paper. We suggest that code could be given a similar level of referencing as data gets in repositories such ...

  12. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  13. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  14. Homogenous Chaotic Network Serving as a Rate/Population Code to Temporal Code Converter

    Directory of Open Access Journals (Sweden)

    Mikhail V. Kiselev

    2014-01-01

    Full Text Available At present, it is obvious that different sections of nervous system utilize different methods for information coding. Primary afferent signals in most cases are represented in form of spike trains using a combination of rate coding and population coding while there are clear evidences that temporal coding is used in various regions of cortex. In the present paper, it is shown that conversion between these two coding schemes can be performed under certain conditions by a homogenous chaotic neural network. Interestingly, this effect can be achieved without network training and synaptic plasticity.

  15. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  16. Informal Control code logic

    CERN Document Server

    Bergstra, Jan A

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  17. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  18. Refactoring test code

    NARCIS (Netherlands)

    Deursen, A. van; Moonen, L.M.F.; Bergh, A. van den; Kok, G.

    2001-01-01

    Two key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from refactoring product

  19. Deadline-aware network coding for video on demand service over P2P networks

    Institute of Scientific and Technical Information of China (English)

    CHI Hui-cheng; ZHANG Qian

    2006-01-01

    We are interested in providing Video-on-Demand (VoD) streaming service to a large population of clients using peer-to-peer (P2P) approach. Given the asynchronous demands from multiple clients, continuously changing of the buffered contents, and the continuous video display requirement, how to collaborate with potential partners to get expected data for future content delivery are very important and challenging. In this paper, we develop a novel scheduling algorithm based on deadlineaware network coding (DNC) to fully exploit the network resource for efficient VoD service. DNC generalizes the existing network coding (NC) paradigm, an elegant solution for ubiquitous data distribution. Yet, with deadline awareness, DNC improves the network throughput and meanwhile avoid missing the play deadline in high probability, which is a major deficiency of the conventional NC. Extensive simulation results demonstrated that DNC achieves high streaming continuity even in tight network conditions.

  20. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a distributed...

  1. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of ROC...

  2. 22 CFR 201.32 - Suppliers of delivery services.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Suppliers of delivery services. 201.32 Section... services. (a) Performance of the service contract. The supplier of delivery services financed by USAID shall comply with the terms and conditions of its contract to supply delivery services. (b)...

  3. Universal Rateless Codes From Coupled LT Codes

    CERN Document Server

    Aref, Vahid

    2011-01-01

    It was recently shown that spatial coupling of individual low-density parity-check codes improves the belief-propagation threshold of the coupled ensemble essentially to the maximum a posteriori threshold of the underlying ensemble. We study the performance of spatially coupled low-density generator-matrix ensembles when used for transmission over binary-input memoryless output-symmetric channels. We show by means of density evolution that the threshold saturation phenomenon also takes place in this setting. Our motivation for studying low-density generator-matrix codes is that they can easily be converted into rateless codes. Although there are already several classes of excellent rateless codes known to date, rateless codes constructed via spatial coupling might offer some additional advantages. In particular, by the very nature of the threshold phenomenon one expects that codes constructed on this principle can be made to be universal, i.e., a single construction can uniformly approach capacity over the cl...

  4. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  5. Discriminative sparse coding on multi-manifolds

    KAUST Repository

    Wang, J.J.-Y.

    2013-09-26

    Sparse coding has been popularly used as an effective data representation method in various applications, such as computer vision, medical imaging and bioinformatics. However, the conventional sparse coding algorithms and their manifold-regularized variants (graph sparse coding and Laplacian sparse coding), learn codebooks and codes in an unsupervised manner and neglect class information that is available in the training set. To address this problem, we propose a novel discriminative sparse coding method based on multi-manifolds, that learns discriminative class-conditioned codebooks and sparse codes from both data feature spaces and class labels. First, the entire training set is partitioned into multiple manifolds according to the class labels. Then, we formulate the sparse coding as a manifold-manifold matching problem and learn class-conditioned codebooks and codes to maximize the manifold margins of different classes. Lastly, we present a data sample-manifold matching-based strategy to classify the unlabeled data samples. Experimental results on somatic mutations identification and breast tumor classification based on ultrasonic images demonstrate the efficacy of the proposed data representation and classification approach. 2013 The Authors. All rights reserved.

  6. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  7. Assisted Vaginal Delivery

    Science.gov (United States)

    ... be needed. What are the risks for my baby if I have assisted vaginal delivery? Although the overall rate of injury to the baby as a result of assisted vaginal delivery is low, there still is a risk of ...

  8. eDelivery

    Data.gov (United States)

    US Agency for International Development — eDelivery provides the electronic packaging and delivery of closed and complete OPM investigation files to government agencies, including USAID, in a secure manner....

  9. Index Coding - An Interference Alignment Perspective

    CERN Document Server

    Maleki, Hamed; Jafar, Syed A

    2012-01-01

    The index coding problem is studied from an interference alignment perspective, providing new results as well as new insights into, and generalizations of, previously known results. An equivalence is established between multiple unicast index coding where each message is desired by exactly one receiver, and multiple groupcast index coding where a message can be desired by multiple receivers, which settles the heretofore open question of insufficiency of linear codes for the multiple unicast index coding problem by equivalence with multiple groupcast settings where this question has previously been answered. Necessary and sufficient conditions for the achievability of rate half per message are shown to be a natural consequence of interference alignment constraints, and generalizations to feasibility of rate $\\frac{1}{L+1}$ per message when each destination desires at least $L$ messages, are similarly obtained. Finally, capacity optimal solutions are presented to a series of symmetric index coding problems insp...

  10. Drug delivery goes supercritical

    Directory of Open Access Journals (Sweden)

    Patrick J. Ginty

    2005-08-01

    Full Text Available In the field of drug delivery, the ability to control the size, morphology, and release of drug particles is fundamental to good targeting, but is often hampered by harsh processing conditions or inadequate methods; likewise for the processing of polymeric controlled-release systems. However, the use of supercritical fluids such as supercritical CO2 (scCO2 has provided a ‘clean’ and effective alternative to traditional methods of drug and polymer processing. In particular, scCO2 has a number of unique properties that make it possible to process both bioactive molecules and amorphous polymers without using toxic organic solvents or elevated temperatures. Here, we review the positive impact that supercritical fluids have had on the micronization, encapsulation, and impregnation of molecules of interest to both the pharmaceutical and biotechnology industries.

  11. Polymatroids with Network Coding

    CERN Document Server

    Han, Te Sun

    2010-01-01

    The problem of network coding for multicasting a single source to multiple sinks has first been studied by Ahlswede, Cai, Li and Yeung in 2000, in which they have established the celebrated max-flow mini-cut theorem on non-physical information flow over a network of independent channels. On the other hand, in 1980, Han has studied the case with correlated multiple sources and a single sink from the viewpoint of polymatroidal functions in which a necessary and sufficient condition has been demonstrated for reliable transmission over the network. This paper presents an attempt to unify both cases, which leads to establish a necessary and sufficient condition for reliable transmission over a noisy network for multicasting all the correlated multiple sources to all the multiple sinks. Furthermore, we address also the problem of transmitting "independent" sources over a multiple-access-type of network as well as over a broadcast-type of network, which reveals that the (co-) polymatroidal structures are intrinsical...

  12. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  13. Chinese remainder codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Aili; LIU Xiufeng

    2006-01-01

    Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory.The new type of linear codes take the congruence class in the congruence class ring R/I1 ∩ I2 ∩…∩ In for the information bit,embed R/Ji into R/I1 ∩ I2 ∩…∩ In,and assign the cosets of R/Ji as the subring of R/I1 ∩ I2 ∩…∩ In and the cosets of R/Ji in R/I1 ∩ I2 ∩…∩ In as check lines.Many code classes exist in the Chinese remainder codes that have high code rates.Chinese remainder codes are the essential generalization of Sun Zi codes.

  14. Chinese Remainder Codes

    Institute of Scientific and Technical Information of China (English)

    张爱丽; 刘秀峰; 靳蕃

    2004-01-01

    Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I1∩I2∩…∩In for the information bit, embed R/Ji into R/I1∩I2∩…∩In, and asssign the cosets of R/Ji as the subring of R/I1∩I2∩…∩In and the cosets of R/Ji in R/I1∩I2∩…∩In as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes.

  15. Code of Ethics

    DEFF Research Database (Denmark)

    Adelstein, Jennifer; Clegg, Stewart

    2016-01-01

    Ethical codes have been hailed as an explicit vehicle for achieving more sustainable and defensible organizational practice. Nonetheless, when legal compliance and corporate governance codes are conflated, codes can be used to define organizational interests ostentatiously by stipulating norms...... for employee ethics. Such codes have a largely cosmetic and insurance function, acting subtly and strategically to control organizational risk management and protection. In this paper, we conduct a genealogical discourse analysis of a representative code of ethics from an international corporation...... to understand how management frames expectations of compliance. Our contribution is to articulate the problems inherent in codes of ethics, and we make some recommendations to address these to benefit both an organization and its employees. In this way, we show how a code of ethics can provide a foundation...

  16. Defeating the coding monsters.

    Science.gov (United States)

    Colt, Ross

    2007-02-01

    Accuracy in coding is rapidly becoming a required skill for military health care providers. Clinic staffing, equipment purchase decisions, and even reimbursement will soon be based on the coding data that we provide. Learning the complicated myriad of rules to code accurately can seem overwhelming. However, the majority of clinic visits in a typical outpatient clinic generally fall into two major evaluation and management codes, 99213 and 99214. If health care providers can learn the rules required to code a 99214 visit, then this will provide a 90% solution that can enable them to accurately code the majority of their clinic visits. This article demonstrates a step-by-step method to code a 99214 visit, by viewing each of the three requirements as a monster to be defeated.

  17. Serially Concatenated IRA Codes

    CERN Document Server

    Cheng, Taikun; Belzer, Benjamin J

    2007-01-01

    We address the error floor problem of low-density parity check (LDPC) codes on the binary-input additive white Gaussian noise (AWGN) channel, by constructing a serially concatenated code consisting of two systematic irregular repeat accumulate (IRA) component codes connected by an interleaver. The interleaver is designed to prevent stopping-set error events in one of the IRA codes from propagating into stopping set events of the other code. Simulations with two 128-bit rate 0.707 IRA component codes show that the proposed architecture achieves a much lower error floor at higher SNRs, compared to a 16384-bit rate 1/2 IRA code, but incurs an SNR penalty of about 2 dB at low to medium SNRs. Experiments indicate that the SNR penalty can be reduced at larger blocklengths.

  18. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 4.2 Affine variety codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 4.3 Some Gr¨obner basis theoretical tools . . . . . . . . . . . . . . . . . . . . . . . 155 4.4 A bound on the minimum distance of C(I,L) . . . . . . . . . . . . . . . . . . 157 4.5 The Feng-Rao bound...... for C(I,L)? . . . . . . . . . . . . . . . . . . . . . . . . 160 4.6 Using weighted degree orderings . . . . . . . . . . . . . . . . . . . . . . . . . 163 4.7 The order domain conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 4.8 Weight functions and order domains...

  19. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  20. Assisted delivery with forceps

    Science.gov (United States)

    ... technique your doctor may use to deliver the baby is called vacuum assisted delivery . When is a Forceps Delivery Needed? Even after ... Problems with urinating or moving your bowels after delivery For the baby, the risks are: Bumps, bruises or marks on ...

  1. A Subband Coding Method for HDTV

    Science.gov (United States)

    Chung, Wilson; Kossentini, Faouzi; Smith, Mark J. T.

    1995-01-01

    This paper introduces a new HDTV coder based on motion compensation, subband coding, and high order conditional entropy coding. The proposed coder exploits the temporal and spatial statistical dependencies inherent in the HDTV signal by using intra- and inter-subband conditioning for coding both the motion coordinates and the residual signal. The new framework provides an easy way to control the system complexity and performance, and inherently supports multiresolution transmission. Experimental results show that the coder outperforms MPEG-2, while still maintaining relatively low complexity.

  2. Gray Code for Cayley Permutations

    Directory of Open Access Journals (Sweden)

    J.-L. Baril

    2003-10-01

    Full Text Available A length-n Cayley permutation p of a total ordered set S is a length-n sequence of elements from S, subject to the condition that if an element x appears in p then all elements y < x also appear in p . In this paper, we give a Gray code list for the set of length-n Cayley permutations. Two successive permutations in this list differ at most in two positions.

  3. 在卫星移动信道中不同条件下 Turbo码的纠错性能研究%Study on error-correction performance of Turbo codes in mobile satellite channel under different fading conditions

    Institute of Scientific and Technical Information of China (English)

    童新海; 甘仲民; 杨喜根

    2001-01-01

    研究了采用Turbo码技术的抗衰落性能,首先分析了Turbo码在卫星移动遮蔽Rician衰落信道下的误差纠错性能限,然后通过计算机仿真模拟了三种不同的卫星移动衰落信道下Turbo码的性能,研究了不同衰落信道特性对Turbo码性能的影响情况,同时还讨论了在衰落信道下Turbo码的子码约束长度和交织器长度两个主要参数对性能的影响情况。%In this paper, theoretical analysis of error rate performance about Turbocode on Mobile satellite shadowed Rician fading channel is presented. And comparison with the performance on AWGN is discussed. The simulation results by computer on three different mobile satellite fading channel is also presented. The influence on Turbocode performance of different fading channel characteristic is highlighted. In the meantime, the roles of two Turbocode main parametersconstitute code constraint length and the interleaver lengthon Mobile satellite shadowed fading channel is discussed.

  4. Multi-User Cooperative Diversity through Network Coding Based on Classical Coding Theory

    CERN Document Server

    Rebelatto, João Luiz; Li, Yonghui; Vucetic, Branka

    2010-01-01

    In this work, we propose and analyze a generalized construction of distributed network codes for a network consisting of M users sending different information to a common base station through independent block fading channels. The aim is to increase the diversity order of the system without reducing its code rate. The proposed scheme, called generalized dynamic-network codes (GDNC), is a generalization of the dynamic-network codes (DNC) recently proposed by Xiao and Skoglund. The design of the network codes that maximize the diversity order is recognized as equivalent to the design of linear block codes over a nonbinary finite field under the Hamming metric. We prove that adopting a systematic generator matrix of a maximum distance separable block code over a sufficiently large finite field as the network transfer matrix is a sufficient condition for full diversity order under link failure model. The proposed generalization offers a much better tradeoff between rate and diversity order compared to the DNC. An...

  5. The stellar atmosphere simulation code Bifrost. Code description and validation

    Science.gov (United States)

    Gudiksen, B. V.; Carlsson, M.; Hansteen, V. H.; Hayek, W.; Leenaarts, J.; Martínez-Sykora, J.

    2011-07-01

    Context. Numerical simulations of stellar convection and photospheres have been developed to the point where detailed shapes of observed spectral lines can be explained. Stellar atmospheres are very complex, and very different physical regimes are present in the convection zone, photosphere, chromosphere, transition region and corona. To understand the details of the atmosphere it is necessary to simulate the whole atmosphere since the different layers interact strongly. These physical regimes are very diverse and it takes a highly efficient massively parallel numerical code to solve the associated equations. Aims: The design, implementation and validation of the massively parallel numerical code Bifrost for simulating stellar atmospheres from the convection zone to the corona. Methods: The code is subjected to a number of validation tests, among them the Sod shock tube test, the Orzag-Tang colliding shock test, boundary condition tests and tests of how the code treats magnetic field advection, chromospheric radiation, radiative transfer in an isothermal scattering atmosphere, hydrogen ionization and thermal conduction. Results.Bifrost completes the tests with good results and shows near linear efficiency scaling to thousands of computing cores.

  6. Coding Geriatric syndromes: How good are we?

    Science.gov (United States)

    Ugboma, Ike; Syddall, Holly E; Cox, Vanessa; Cooper, Cyrus; Briggs, Roger; Sayer, Avan Aihie

    2008-01-01

    High quality coding of hospital activity is important because the data is used for resource allocation and measuring performance. There is little information on the quality of coding of admissions of frail older people who have multiple diagnoses, co-morbidities and functional impairment. Presence or absence of four geriatric syndromes and eight medical conditions was noted on case note review (CNR). Discharge summaries (DS) and hospital coding (HC) were reviewed and compared with the CNR. Forty patients had at least one geriatric syndrome noted in the DS; 16 (40.0%) were captured by the HC. Of 57 patients with at least one medical condition noted in the DS, 52 (91.2%) were captured by the HC (p<0.0001 for difference in HC capture rates). We have demonstrated poor capture of information on geriatric syndromes compared to medical conditions in discharge summaries and hospital coding and propose a problem list bookmark approach to improve this.

  7. Rewriting the Genetic Code.

    Science.gov (United States)

    Mukai, Takahito; Lajoie, Marc J; Englert, Markus; Söll, Dieter

    2017-09-08

    The genetic code-the language used by cells to translate their genomes into proteins that perform many cellular functions-is highly conserved throughout natural life. Rewriting the genetic code could lead to new biological functions such as expanding protein chemistries with noncanonical amino acids (ncAAs) and genetically isolating synthetic organisms from natural organisms and viruses. It has long been possible to transiently produce proteins bearing ncAAs, but stabilizing an expanded genetic code for sustained function in vivo requires an integrated approach: creating recoded genomes and introducing new translation machinery that function together without compromising viability or clashing with endogenous pathways. In this review, we discuss design considerations and technologies for expanding the genetic code. The knowledge obtained by rewriting the genetic code will deepen our understanding of how genomes are designed and how the canonical genetic code evolved.

  8. On Polynomial Remainder Codes

    CERN Document Server

    Yu, Jiun-Hung

    2012-01-01

    Polynomial remainder codes are a large class of codes derived from the Chinese remainder theorem that includes Reed-Solomon codes as a special case. In this paper, we revisit these codes and study them more carefully than in previous work. We explicitly allow the code symbols to be polynomials of different degrees, which leads to two different notions of weight and distance. Algebraic decoding is studied in detail. If the moduli are not irreducible, the notion of an error locator polynomial is replaced by an error factor polynomial. We then obtain a collection of gcd-based decoding algorithms, some of which are not quite standard even when specialized to Reed-Solomon codes.

  9. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  10. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  11. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  12. Industrial Computer Codes

    Science.gov (United States)

    Shapiro, Wilbur

    1996-01-01

    This is an overview of new and updated industrial codes for seal design and testing. GCYLT (gas cylindrical seals -- turbulent), SPIRALI (spiral-groove seals -- incompressible), KTK (knife to knife) Labyrinth Seal Code, and DYSEAL (dynamic seal analysis) are covered. CGYLT uses G-factors for Poiseuille and Couette turbulence coefficients. SPIRALI is updated to include turbulence and inertia, but maintains the narrow groove theory. KTK labyrinth seal code handles straight or stepped seals. And DYSEAL provides dynamics for the seal geometry.

  13. Colloidal drug delivery systems in vaccine delivery.

    Science.gov (United States)

    Beg, Sarwar; Samad, Abdus; Nazish, Iram; Sultana, Ruksar; Rahman, Mahfoozur; Ahmad, Md Zaki; Akbar, Md

    2013-01-01

    Vaccines play a vital role in the field of community medicine to combat against several diseases of human existence. Vaccines primarily trigger the acquired immune system to develop long-lasting immunity against pathogens. Conventional approaches for vaccine delivery lacks potential to target a particular antigen to develop acquired immunity by specific antibodies. Recent advancements in vaccine delivery showed that inclusion of adjuvants in vaccine formulations or delivery of them in a carrier helps in achieving desired targeting ability, reducing the immunogenicity and significant augmentation in the immune response. Colloidal carriers (liposomes, niosomes, microspheres, proteosomes, virosomes and virus like particles (VLPs), antigen cochleates, dendrimers and carbon nanotubes) have been widely explored for vaccine delivery. Further, surface engineering of these carriers with ligands, functional moieties and monoclonal antibodies tend to enhance the immune recognition potential of vaccines by differentiation of antigen specific memory T-cells. The current review, therefore, provides an updated account on the recent advancements in various colloidal delivery systems in vaccine delivery, outlining the mechanism of immune response initiated by them along with potential applications and marketed instances in an explicit manner.

  14. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  15. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  16. Tokamak Systems Code

    Energy Technology Data Exchange (ETDEWEB)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  17. MORSE Monte Carlo code

    Energy Technology Data Exchange (ETDEWEB)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described.

  18. Coding and Allocation for Distributed Data Storage: Fundamental Tradeoffs, Coding Schemes and Allocation Patterns

    OpenAIRE

    Andriyanova, Iryna

    2013-01-01

    Doctoral; Distributed storage is one of the most actively developing topics nowadays, thanks to the growing need of storing more and more large amounts of data and to new distributed applications as cloud computing, multimedia content delivery etc. The core of each distributed storage system (DSS) is its erasure-correcting code; the core of the DSS networking protocol is its allocation pattern.With new aforementioned storage applications we are about to attain the limit of well-developed codi...

  19. Preliminary Coupling of MATRA Code for Multi-physics Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Seongjin; Choi, Jinyoung; Yang, Yongsik; Kwon, Hyouk; Hwang, Daehyun [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-05-15

    The boundary conditions such as the inlet temperature, mass flux, averaged heat flux, power distributions of the rods, and core geometry is given by constant values or functions of time. These conditions are separately calculated and provided by other codes, such as a neutronics or a system codes, into the MATRA code. In addition, the coupling of several codes in the different physics field is focused and embodied. In this study, multiphysics coupling methods were developed for a subchannel code (MATRA) with neutronics codes (MASTER, DeCART) and a fuel performance code (FRAPCON-3). Preliminary evaluation results for representative sample cases are presented. The MASTER and DeCART codes provide the power distribution of the rods in the core to the MATRA code. In case of the FRAPCON-3 code, the variation of the rod diameter induced by the thermal expansion is yielded and provided. The MATRA code transfers the thermal-hydraulic conditions that each code needs. Moreover, the coupling method with each code is described.

  20. Research on universal combinatorial coding.

    Science.gov (United States)

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value.

  1. Weight Distributions of Multi-Edge type LDPC Codes

    CERN Document Server

    KASAI, Kenta; DECLERCQ, David; POULLIAT, Charly; SAKANIWA, Kohichi

    2010-01-01

    The multi-edge type LDPC codes, introduced by Richardson and Urbanke, present the general class of structured LDPC codes. In this paper, we derive the average weight distributions of the multi-edge type LDPC code ensembles. Furthermore, we investigate the asymptotic exponential growth rate of the average weight distributions and investigate the connection to the stability condition of the density evolution.

  2. Do Conditional Reinforcers Count?

    OpenAIRE

    Davison, Michael; Baum, William M.

    2006-01-01

    Six pigeons were trained on a procedure in which seven components arranged different food-delivery ratios on concurrent variable-interval schedules each session. The components were unsignaled, lasted for 10 food deliveries, and occurred in random order with a 60-s blackout between components. The schedules were arranged using a switching-key procedure in which two responses on a center key changed the schedules and associated stimuli on two side keys. In Experiment 1, over five conditions, a...

  3. Current coding practices and patterns of code use of registered dietitian nutritionists: the Academy of Nutrition and Dietetics 2013 coding survey.

    Science.gov (United States)

    Parrott, J Scott; White, Jane V; Schofield, Marsha; Hand, Rosa K; Gregoire, Mary B; Ayoob, Keith T; Pavlinac, Jessie; Lewis, Jaime Lynn; Smith, Karen

    2014-10-01

    Coding, coverage, and reimbursement for nutrition services are vital to the dietetics profession, particularly to registered dietitian nutritionists (RDNs) who provide clinical care. The objective of this study was to assess RDN understanding and use of the medical nutrition therapy (MNT) procedure codes in the delivery of nutrition services. Its design was an Internet survey of all RDNs listed in the Academy of Nutrition and Dietetics (Academy)/Commission on Dietetics Registration database as of September 2013 who resided in the United States and were not retired. Prior coding and coverage surveys provided a basis for survey development. Parameters assessed included knowledge and use of existing MNT and/or alternative procedure codes, barriers to code use, payer reimbursement patterns, complexity of the patient population served, time spent in the delivery of initial and subsequent care, and practice demographics and management. Results show that a majority of respondents were employed by another and provided outpatient MNT services on a part-time basis. MNT codes were used for the provision of individual services, with minimal use of the MNT codes for group services and subsequent care. The typical patient carries two or more diagnoses. The majority of RDNs uses internal billing departments and support staff in their practices. The payer mix is predominantly Medicare and private/commercial insurance. Managers and manager/providers were more likely than providers to carry malpractice insurance. Results point to the need for further education regarding the full spectrum of Current Procedural Terminology codes available for RDN use and the business side of ambulatory MNT practice, including the need to carry malpractice insurance. This survey is part of continuing Academy efforts to understand the complex web of relationships among clinical practice, coverage, MNT code use, and reimbursement so as to further support nutrition services codes revision and/or expansion

  4. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  5. Dress Codes for Teachers?

    Science.gov (United States)

    Million, June

    2004-01-01

    In this article, the author discusses an e-mail survey of principals from across the country regarding whether or not their school had a formal staff dress code. The results indicate that most did not have a formal dress code, but agreed that professional dress for teachers was not only necessary, but showed respect for the school and had a…

  6. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alex

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  7. Pseudonoise code tracking loop

    Science.gov (United States)

    Laflame, D. T. (Inventor)

    1980-01-01

    A delay-locked loop is presented for tracking a pseudonoise (PN) reference code in an incoming communication signal. The loop is less sensitive to gain imbalances, which can otherwise introduce timing errors in the PN reference code formed by the loop.

  8. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  9. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  10. READING A NEURAL CODE

    NARCIS (Netherlands)

    BIALEK, W; RIEKE, F; VANSTEVENINCK, RRD; WARLAND, D

    1991-01-01

    Traditional approaches to neural coding characterize the encoding of known stimuli in average neural responses. Organisms face nearly the opposite task - extracting information about an unknown time-dependent stimulus from short segments of a spike train. Here the neural code was characterized from

  11. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...

  12. Quantized Network Coding for Sparse Messages

    CERN Document Server

    Nabaee, Mahdy

    2012-01-01

    In this paper, we study the data gathering problem in the context of power grids by using a network of sensors, where the sensed data have inter-node redundancy. Specifically, we propose a new transmission method, calledquantized network coding, which performs linear net-work coding in the field of real numbers, and quantization to accommodate the finite capacity of edges. By using the concepts in compressed sensing literature, we propose to use l1-minimization to decode the quantized network coded packets, especially when the number of received packets at the decoder is less than the size of sensed data (i.e. number of nodes). We also propose an appropriate design for network coding coefficients, based on restricted isometry property, which results in robust l1-min decoding. Our numerical analysis show that the proposed quantized network coding scheme with l1-min decoding can achieve significant improvements, in terms of compression ratio and delivery delay, compared to conventional packet forwarding.

  13. Non-binary Entanglement-assisted Stabilizer Quantum Codes

    CERN Document Server

    Riguang, Leng

    2011-01-01

    In this paper, we show how to construct non-binary entanglement-assisted stabilizer quantum codes by using pre-shared entanglement between the sender and receiver. We also give an algorithm to determine the circuit for non-binary entanglement-assisted stabilizer quantum codes and some illustrated examples. The codes we constructed do not require the dual-containing constraint, and many non-binary classical codes, like non-binary LDPC codes, which do not satisfy the condition, can be used to construct non-binary entanglement-assisted stabilizer quantum codes.

  14. Moyamoya disease and pregnancy: case reports and criteria for successful vaginal delivery

    OpenAIRE

    2015-01-01

    Key Clinical Message Based on our experience with seven deliveries (five cesarean and two vaginal deliveries) in five women with Moyamoya disease, we discussed the appropriate method of delivery and anesthesia for patients with Moyamoya disease. In certain conditions, women with Moyamoya disease can successfully undergo vaginal delivery.

  15. Transformation invariant sparse coding

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard

    2011-01-01

    Sparse coding is a well established principle for unsupervised learning. Traditionally, features are extracted in sparse coding in specific locations, however, often we would prefer invariant representation. This paper introduces a general transformation invariant sparse coding (TISC) model....... The model decomposes images into features invariant to location and general transformation by a set of specified operators as well as a sparse coding matrix indicating where and to what degree in the original image these features are present. The TISC model is in general overcomplete and we therefore invoke...... sparse coding to estimate its parameters. We demonstrate how the model can correctly identify components of non-trivial artificial as well as real image data. Thus, the model is capable of reducing feature redundancies in terms of pre-specified transformations improving the component identification....

  16. The SIFT Code Specification

    Science.gov (United States)

    1983-01-01

    The specification of Software Implemented Fault Tolerance (SIFT) consists of two parts, the specifications of the SIFT models and the specifications of the SIFT PASCAL program which actually implements the SIFT system. The code specifications are the last of a hierarchy of models describing the operation of the SIFT system and are related to the SIFT models as well as the PASCAL program. These Specifications serve to link the SIFT models to the running program. The specifications are very large and detailed and closely follow the form and organization of the PASCAL code. In addition to describing each of the components of the SIFT code, the code specifications describe the assumptions of the upper SIFT models which are required to actually prove that the code will work as specified. These constraints are imposed primarily on the schedule tables.

  17. Combustion chamber analysis code

    Science.gov (United States)

    Przekwas, A. J.; Lai, Y. G.; Krishnan, A.; Avva, R. K.; Giridharan, M. G.

    1993-05-01

    A three-dimensional, time dependent, Favre averaged, finite volume Navier-Stokes code has been developed to model compressible and incompressible flows (with and without chemical reactions) in liquid rocket engines. The code has a non-staggered formulation with generalized body-fitted-coordinates (BFC) capability. Higher order differencing methodologies such as MUSCL and Osher-Chakravarthy schemes are available. Turbulent flows can be modeled using any of the five turbulent models present in the code. A two-phase, two-liquid, Lagrangian spray model has been incorporated into the code. Chemical equilibrium and finite rate reaction models are available to model chemically reacting flows. The discrete ordinate method is used to model effects of thermal radiation. The code has been validated extensively against benchmark experimental data and has been applied to model flows in several propulsion system components of the SSME and the STME.

  18. Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Berriman, Bruce; Hanisch, Robert J; Mink, Jessica; Teuben, Peter J

    2012-01-01

    The Astrophysics Source Code Library (ASCL), founded in 1999, is a free on-line registry for source codes of interest to astronomers and astrophysicists. The library is housed on the discussion forum for Astronomy Picture of the Day (APOD) and can be accessed at http://ascl.net. The ASCL has a comprehensive listing that covers a significant number of the astrophysics source codes used to generate results published in or submitted to refereed journals and continues to grow. The ASCL currently has entries for over 500 codes; its records are citable and are indexed by ADS. The editors of the ASCL and members of its Advisory Committee were on hand at a demonstration table in the ADASS poster room to present the ASCL, accept code submissions, show how the ASCL is starting to be used by the astrophysics community, and take questions on and suggestions for improving the resource.

  19. On the Codes over a Semilocal Finite Ring

    Directory of Open Access Journals (Sweden)

    Abdullah Dertli

    2015-10-01

    Full Text Available In this paper, we study the structure of cyclic, quasi cyclic, constacyclic codes and their skew codes over the finite ring R. The Gray images of cyclic, quasi cyclic, skew cyclic, skew quasi cyclic and skew constacyclic codes over R are obtained. A necessary and sufficient condition for cyclic (negacyclic codes over R that contains its dual has been given. The parameters of quantum error correcting codes are obtained from both cyclic and negacyclic codes over R. Some examples are given. Firstly, quasi constacyclic and skew quasi constacyclic codes are introduced. By giving two inner product, it is investigated their duality. A sufficient condition for 1 generator skew quasi constacyclic codes to be free is determined.

  20. Project delivery system (PDS)

    CERN Document Server

    2001-01-01

    As business environments become increasingly competitive, companies seek more comprehensive solutions to the delivery of their projects. "Project Delivery System: Fourth Edition" describes the process-driven project delivery systems which incorporates the best practices from Total Quality and is aligned with the Project Management Institute and ISO Quality Standards is the means by which projects are consistently and efficiently planned, executed and completed to the satisfaction of clients and customers.

  1. Cesarean Delivery in Adolescents.

    Science.gov (United States)

    Katz Eriksen, Jennifer L; Melamed, Alexander; Clapp, Mark A; Little, Sarah E; Zera, Chloe

    2016-10-01

    To examine the effect of maternal age on indication for primary cesarean delivery in low-risk nulliparous women. Retrospective cohort study. Urban academic tertiary care center. Nulliparous women younger than 35 years of age delivering vertex-presenting singletons at term. Participants underwent spontaneous, operative or cesarean delivery. Mode of delivery, indication, and timing of cesarean delivery. Adolescents were half as likely to undergo cesarean delivery overall (odds ratio [OR], 0.48; 95% confidence interval [CI], 0.43-0.54), and more than one-third less likely to undergo cesarean delivery in labor (OR, 0.59; 95% CI, 0.53-0.66). Adjustment for potential confounders did not alter the strength of these associations. Adolescents were half as likely to undergo cesarean delivery for failure to progress (OR, 0.49; 95% CI, 0.43-0.54). There was no difference in the odds of cesarean delivery for nonreassuring fetal status (OR, 0.91; 95% CI, 0.77-1.06), or genital herpes (OR, 1.44; 95% CI, 0.57-3.68). Induction, macrosomia, oxytocin augmentation, and any labor complication were all associated with increased risk of cesarean delivery. There was no difference in the duration of second stage for adolescents who delivered by cesarean delivery compared with adults (240.0 vs 237.7 minutes; P = .84), but adolescents who delivered vaginally had a second stage that was one-third shorter than adults (62.5 vs 100.3 minutes; P cesarean delivery overall, and 40% less likely to undergo a primary cesarean delivery in labor, even after adjustment for multiple maternal, neonatal, and labor characteristics. This difference is not explained by differences in the duration of the second stage of labor. Copyright © 2016 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  2. 26 CFR 31.3306(c)(15)-1 - Services in delivery or distribution of newspapers, shopping news, or magazines.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 15 2010-04-01 2010-04-01 false Services in delivery or distribution of..., Internal Revenue Code of 1954) § 31.3306(c)(15)-1 Services in delivery or distribution of newspapers...-house delivery, such as services in assembling newspapers, are considered to be within the...

  3. 26 CFR 31.3121(b)(14)-1 - Services in delivery or distribution of newspapers, shopping news, or magazines.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 15 2010-04-01 2010-04-01 false Services in delivery or distribution of... (Chapter 21, Internal Revenue Code of 1954) General Provisions § 31.3121(b)(14)-1 Services in delivery or... subsequent delivery or distribution, are excepted from employment. Thus, the services performed by...

  4. Hermitian Self-Orthogonal Constacyclic Codes over Finite Fields

    Directory of Open Access Journals (Sweden)

    Amita Sahni

    2014-01-01

    Full Text Available Necessary and sufficient conditions for the existence of Hermitian self-orthogonal constacyclic codes of length n over a finite field Fq2, n coprime to q, are found. The defining sets and corresponding generator polynomials of these codes are also characterised. A formula for the number of Hermitian self-orthogonal constacyclic codes of length n over a finite field Fq2 is obtained. Conditions for the existence of numerous MDS Hermitian self-orthogonal constacyclic codes are obtained. The defining set and the number of such MDS codes are also found.

  5. Buccal drug delivery.

    Science.gov (United States)

    Smart, John D

    2005-05-01

    Buccal formulations have been developed to allow prolonged localised therapy and enhanced systemic delivery. The buccal mucosa, however, while avoiding first-pass effects, is a formidable barrier to drug absorption, especially for biopharmaceutical products (proteins and oligonucleotides) arising from the recent advances in genomics and proteomics. The buccal route is typically used for extended drug delivery, so formulations that can be attached to the buccal mucosa are favoured. The bioadhesive polymers used in buccal drug delivery to retain a formulation are typically hydrophilic macro-molecules containing numerous hydrogen bonding groups. Newer second-generation bioadhesives have been developed and these include modified or new polymers that allow enhanced adhesion and/or drug delivery, in addition to site-specific ligands such as lectins. Over the last 20 years a wide range of formulations has been developed for buccal drug delivery (tablet, patch, liquids and semisolids) but comparatively few have found their way onto the market. Currently, this route is restricted to the delivery of a limited number of small lipophilic molecules that readily cross the buccal mucosa. However, this route could become a significant means for the delivery of a range of active agents in the coming years, if the barriers to buccal drug delivery are overcome. In particular, patient acceptability and the successful systemic delivery of large molecules (proteins, oligonucleotides and polysaccharides) via this route remains both a significant opportunity and challenge, and new/improved technologies may be required to address these.

  6. XSTAR Code and Database Status

    Science.gov (United States)

    Kallman, Timothy R.

    2017-08-01

    The XSTAR code is a simulation tool for calculating spectra associated with plasmas which are in a time-steady balance among the microphysical processes. It allows for treatment of plasmas which are exposed to illumination by energetic photons, but also treats processes relevant to collision-dominated plasmas. Processes are treated in a full collisional-radiative formalism which includes convergence to local thermodynamic equilibrium under suitable conditions. It features an interface to the most widely used software for fitting to astrophysical spectra, and has also been compared with laboratory plasma experiments. This poster will describe the recent updates to XSTAR, including atomic data, new features, and some recent applications of the code.

  7. On encoding symbol degrees of array BP-XOR codes

    OpenAIRE

    Paterson, Maura B.; Stinson, D.R.; Wang, Y.

    2016-01-01

    Low density parity check (LDPC) codes, LT codes and digital fountain techniques have received significant attention from both academics and industry in the past few years. By employing the underlying ideas of efficient Belief Propagation (BP) decoding process (also called iterative message passing decoding process) on binary erasure channels (BEC) in LDPC codes, Wang has recently introduced the concept of array BP-XOR codes and showed the necessary and sufficient conditions for MDS [k + 2,k] ...

  8. On Coding Non-Contiguous Letter Combinations

    Directory of Open Access Journals (Sweden)

    Frédéric eDandurand

    2011-06-01

    Full Text Available Starting from the hypothesis that printed word identification initially involves the parallel mapping of visual features onto location-specific letter identities, we analyze the type of information that would be involved in optimally mapping this location-specific orthographic code onto a location-invariant lexical code. We assume that some intermediate level of coding exists between individual letters and whole words, and that this involves the representation of letter combinations. We then investigate the nature of this intermediate level of coding given the constraints of optimality. This intermediate level of coding is expected to compress data while retaining as much information as possible about word identity. Information conveyed by letters is a function of how much they constrain word identity and how visible they are. Optimization of this coding is a combination of minimizing resources (using the most compact representations and maximizing information. We show that in a large proportion of cases, non-contiguous letter sequences contain more information than contiguous sequences, while at the same time requiring less precise coding. Moreover, we found that the best predictor of human performance in orthographic priming experiments was within-word ranking of conditional probabilities, rather than average conditional probabilities. We conclude that from an optimality perspective, readers learn to select certain contiguous and non-contiguous letter combinations as information that provides the best cue to word identity.

  9. Embedded foveation image coding.

    Science.gov (United States)

    Wang, Z; Bovik, A C

    2001-01-01

    The human visual system (HVS) is highly space-variant in sampling, coding, processing, and understanding. The spatial resolution of the HVS is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. By taking advantage of this fact, it is possible to remove considerable high-frequency information redundancy from the peripheral regions and still reconstruct a perceptually good quality image. Great success has been obtained previously by a class of embedded wavelet image coding algorithms, such as the embedded zerotree wavelet (EZW) and the set partitioning in hierarchical trees (SPIHT) algorithms. Embedded wavelet coding not only provides very good compression performance, but also has the property that the bitstream can be truncated at any point and still be decoded to recreate a reasonably good quality image. In this paper, we propose an embedded foveation image coding (EFIC) algorithm, which orders the encoded bitstream to optimize foveated visual quality at arbitrary bit-rates. A foveation-based image quality metric, namely, foveated wavelet image quality index (FWQI), plays an important role in the EFIC system. We also developed a modified SPIHT algorithm to improve the coding efficiency. Experiments show that EFIC integrates foveation filtering with foveated image coding and demonstrates very good coding performance and scalability in terms of foveated image quality measurement.

  10. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity in the net...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof.......Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...

  11. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  12. Scalable still image coding based on wavelet

    Science.gov (United States)

    Yan, Yang; Zhang, Zhengbing

    2005-02-01

    The scalable image coding is an important objective of the future image coding technologies. In this paper, we present a kind of scalable image coding scheme based on wavelet transform. This method uses the famous EZW (Embedded Zero tree Wavelet) algorithm; we give a high-quality encoding to the ROI (region of interest) of the original image and a rough encoding to the rest. This method is applied well in limited memory space condition, and we encode the region of background according to the memory capacity. In this way, we can store the encoded image in limited memory space easily without losing its main information. Simulation results show it is effective.

  13. Application of RS Codes in Decoding QR Code

    Institute of Scientific and Technical Information of China (English)

    Zhu Suxia(朱素霞); Ji Zhenzhou; Cao Zhiyan

    2003-01-01

    The QR Code is a 2-dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code's virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm.

  14. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...

  15. Assessment of TRACE Code for GE Level Swell Test to Review Industrial Code

    Energy Technology Data Exchange (ETDEWEB)

    Song, Chanyi; Cheng, Ae Ju; Bang, Young Seok; Hwang, Taesuk [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2015-10-15

    Korea Institute of Nuclear Safety(KINS) has reviewed the industrial code for safety analysis of nuclear power plant, in which TRACE and MARS-KS codes are being used to support the understanding of specific phenomena and code prediction. For this aspect, the TRACE code was assessed for the GE Level Swell Experiment. General Electric (GE) performed a series of experiments to investigate thermal-hydraulic phenomena such as critical flow, void distribution, and liquid-vapor mixture swell during blowdown conditions. These GE Level swell experiments are frequently simulated to verify safety analysis codes as a separate effect test. TRACE code calculations with version 5.0 patch 4 for GE Level Swell experiment 1004-3 have been performed to assess the applicability of the TRACE code for verification of industrial code. An Assessment analysis of the TRACE version 5.0 patch 4 code was carried out for GE Level Swell experiments 1004-3 by comparison purpose with SPACE. Overall, TRACE predicted the pressure and axial void fractions at different times reasonably well for 1004-3 blowdown test, while SPACE tends to underestimate the pressure. It was also found that results of void fraction distribution should be compared at different time to discuss the accuracy of the SPACE code against this test.

  16. Distributed multiple description coding

    CERN Document Server

    Bai, Huihui; Zhao, Yao

    2011-01-01

    This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC,

  17. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  18. Coded MapReduce

    OpenAIRE

    Li, Songze; Maddah-Ali, Mohammad Ali; Avestimehr, A. Salman

    2015-01-01

    MapReduce is a commonly used framework for executing data-intensive jobs on distributed server clusters. We introduce a variant implementation of MapReduce, namely "Coded MapReduce", to substantially reduce the inter-server communication load for the shuffling phase of MapReduce, and thus accelerating its execution. The proposed Coded MapReduce exploits the repetitive mapping of data blocks at different servers to create coding opportunities in the shuffling phase to exchange (key,value) pair...

  19. Classical Holographic Codes

    CERN Document Server

    Brehm, Enrico M

    2016-01-01

    In this work, we introduce classical holographic codes. These can be understood as concatenated probabilistic codes and can be represented as networks uniformly covering hyperbolic space. In particular, classical holographic codes can be interpreted as maps from bulk degrees of freedom to boundary degrees of freedom. Interestingly, they are shown to exhibit features similar to those expected from the AdS/CFT correspondence. Among these are a version of the Ryu-Takayanagi formula and intriguing properties regarding bulk reconstruction and boundary representations of bulk operations. We discuss the relation of our findings with expectations from AdS/CFT and, in particular, with recent results from quantum error correction.

  20. Prediction of preterm delivery

    NARCIS (Netherlands)

    Wilms, F.F.

    2014-01-01

    Preterm delivery is in quantity and in severity an important issue in the obstetric care in the Western world. There is considerable knowledge on maternal and obstetric risk factors of preterm delivery. Of the women presenting with preterm labor, the majority is pregnant with a male fetus and in

  1. Prediction of preterm delivery

    NARCIS (Netherlands)

    Wilms, F.F.

    2014-01-01

    Preterm delivery is in quantity and in severity an important issue in the obstetric care in the Western world. There is considerable knowledge on maternal and obstetric risk factors of preterm delivery. Of the women presenting with preterm labor, the majority is pregnant with a male fetus and in Cau

  2. Delivery by Cesarean Section

    Science.gov (United States)

    ... often when: The mother has had a previous baby by Cesarean delivery The obstetrician feels that the baby’s health might ... lost time. Don’t be surprised if your baby is still affected by the anesthesia for six to twelve hours after delivery and appears a little sleepy. If you’re ...

  3. Vacuum-assisted delivery

    Science.gov (United States)

    ... a handle on the cup to move the baby through the birth canal. When is Vacuum-assisted Delivery Needed? Even after your cervix is fully dilated ( ... delivers the baby's head, you will push the baby the rest of the way out. After delivery, you can hold your baby on your tummy ...

  4. Cesarean Delivery for a Life-threatening Preterm Placental Abruption

    Science.gov (United States)

    Okafor, II; Ugwu, EO

    2015-01-01

    Placental abruption is one of the major life-threatening obstetric conditions. The fetomaternal outcome of a severe placental abruption depends largely on prompt maternal resuscitation and delivery. A case of severe preterm placental abruption with intrauterine fetal death. Following a failed induction of labor with a deteriorating maternal condition despite resuscitation, emergency cesarean delivery was offered with good maternal outcome. Cesarean delivery could avert further disease progression and possible maternal death in cases of severe preterm placental abruption where vaginal delivery is not imminent. However, further studies are necessary before this could be recommended for routine clinical practice. PMID:27057388

  5. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  6. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  7. GOOGLE SUMMER OF CODE

    National Research Council Canada - National Science Library

    Leslie Hawthorn

    2008-01-01

      This article examines the Google Summer of Code (GSoC) program, the world's first global initiative to introduce College and University students to free/libre open source software (F/LOSS) development...

  8. Importance of Building Code

    Directory of Open Access Journals (Sweden)

    Reshmi Banerjee

    2015-06-01

    Full Text Available A building code, or building control, is a set of rules that specify the minimum standards for constructed objects such as buildings and non building structures. The main purpose of building codes are to protect public health, safety and general welfare as they relate to the construction and occupancy of buildings and structures. The building code becomes law of a particular jurisdiction when formally enacted by the appropriate governmental or private authority. Building codes are generally intended to be applied by architects, engineers, constructors and regulators but are also used for various purposes by safety inspectors, environmental scientists, real estate developers, subcontractors, manufacturers of building products and materials, insurance companies, facility managers, tenants and others.

  9. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  10. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    , in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded......The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered...... as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  11. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  12. Annotated Raptor Codes

    CERN Document Server

    Mahdaviani, Kaveh; Tellambura, Chintha

    2011-01-01

    In this paper, an extension of raptor codes is introduced which keeps all the desirable properties of raptor codes, including the linear complexity of encoding and decoding per information bit, unchanged. The new design, however, improves the performance in terms of the reception rate. Our simulations show a 10% reduction in the needed overhead at the benchmark block length of 64,520 bits and with the same complexity per information bit.

  13. Population coding of somatic sensations

    Institute of Scientific and Technical Information of China (English)

    Qiufu Ma

    2012-01-01

    The somatic sensory system includes a variety of sensory modalities,such as touch,pain,itch,and temperature sensitivity.The coding of these modalities appears to be best explained by the population-coding theory,which is composed of the following features.First,an individual somatic sensory afferent is connected with a specific neural circuit or network (for simplicity,a sensory-labeled line),whose isolated activation is sufficient to generate one specific sensation under normal conditions.Second,labeled lines are interconnected through local excitatory and inhibitory interneurons.As a result,activation of one labeled line could modulate,or provide gate control of,another labeled line.Third,most sensory fibers are polymodal,such that a given stimulus placed onto the skin often activates two or multiple sensory-labeled lines;crosstalk among them is needed to generate one dominant sensation.Fourth and under pathological conditions,a disruption of the antagonistic interaction among labeled lines could open normally masked neuronal pathways,and allow a given sensory stimulus to evoke a new sensation,such as pain evoked by innocuous mechanical or thermal stimuli and itch evoked by painful stimuli.As a result of this,some sensory fibers operate along distinct labeled lines under normal versus pathological conditions.Thus,a better understanding of the neural network underlying labeled line crosstalk may provide new strategies to treat chronic pain and itch.

  14. Robust Nonlinear Neural Codes

    Science.gov (United States)

    Yang, Qianli; Pitkow, Xaq

    2015-03-01

    Most interesting natural sensory stimuli are encoded in the brain in a form that can only be decoded nonlinearly. But despite being a core function of the brain, nonlinear population codes are rarely studied and poorly understood. Interestingly, the few existing models of nonlinear codes are inconsistent with known architectural features of the brain. In particular, these codes have information content that scales with the size of the cortical population, even if that violates the data processing inequality by exceeding the amount of information entering the sensory system. Here we provide a valid theory of nonlinear population codes by generalizing recent work on information-limiting correlations in linear population codes. Although these generalized, nonlinear information-limiting correlations bound the performance of any decoder, they also make decoding more robust to suboptimal computation, allowing many suboptimal decoders to achieve nearly the same efficiency as an optimal decoder. Although these correlations are extremely difficult to measure directly, particularly for nonlinear codes, we provide a simple, practical test by which one can use choice-related activity in small populations of neurons to determine whether decoding is suboptimal or optimal and limited by correlated noise. We conclude by describing an example computation in the vestibular system where this theory applies. QY and XP was supported by a grant from the McNair foundation.

  15. Scalable motion vector coding

    Science.gov (United States)

    Barbarien, Joeri; Munteanu, Adrian; Verdicchio, Fabio; Andreopoulos, Yiannis; Cornelis, Jan P.; Schelkens, Peter

    2004-11-01

    Modern video coding applications require transmission of video data over variable-bandwidth channels to a variety of terminals with different screen resolutions and available computational power. Scalable video coding is needed to optimally support these applications. Recently proposed wavelet-based video codecs employing spatial domain motion compensated temporal filtering (SDMCTF) provide quality, resolution and frame-rate scalability while delivering compression performance comparable to that of the state-of-the-art non-scalable H.264-codec. These codecs require scalable coding of the motion vectors in order to support a large range of bit-rates with optimal compression efficiency. Scalable motion vector coding algorithms based on the integer wavelet transform followed by embedded coding of the wavelet coefficients were recently proposed. In this paper, a new and fundamentally different scalable motion vector codec (MVC) using median-based motion vector prediction is proposed. Extensive experimental results demonstrate that the proposed MVC systematically outperforms the wavelet-based state-of-the-art solutions. To be able to take advantage of the proposed scalable MVC, a rate allocation mechanism capable of optimally dividing the available rate among texture and motion information is required. Two rate allocation strategies are proposed and compared. The proposed MVC and rate allocation schemes are incorporated into an SDMCTF-based video codec and the benefits of scalable motion vector coding are experimentally demonstrated.

  16. Non-Binary Polar Codes using Reed-Solomon Codes and Algebraic Geometry Codes

    CERN Document Server

    Mori, Ryuhei

    2010-01-01

    Polar codes, introduced by Arikan, achieve symmetric capacity of any discrete memoryless channels under low encoding and decoding complexity. Recently, non-binary polar codes have been investigated. In this paper, we calculate error probability of non-binary polar codes constructed on the basis of Reed-Solomon matrices by numerical simulations. It is confirmed that 4-ary polar codes have significantly better performance than binary polar codes on binary-input AWGN channel. We also discuss an interpretation of polar codes in terms of algebraic geometry codes, and further show that polar codes using Hermitian codes have asymptotically good performance.

  17. Distributed Video Coding: Iterative Improvements

    DEFF Research Database (Denmark)

    Luong, Huynh Van

    Nowadays, emerging applications such as wireless visual sensor networks and wireless video surveillance are requiring lightweight video encoding with high coding efficiency and error-resilience. Distributed Video Coding (DVC) is a new coding paradigm which exploits the source statistics...

  18. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... that are subcodes of the binary Reed-Muller codes and can be very simply instrumented, 3) a new class of constacyclic codes that are subcodes of thep-ary "Reed-Muller codes," 4) two new classes of binary convolutional codes with large "free distance" derived from known binary cyclic codes, 5) two new classes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm....

  19. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes.......Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  20. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  1. Algebraic geometric codes with applications

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2007-01-01

    The theory of linear error-correcting codes from algebraic geomet-ric curves (algebraic geometric (AG) codes or geometric Goppa codes) has been well-developed since the work of Goppa and Tsfasman, Vladut, and Zink in 1981-1982. In this paper we introduce to readers some recent progress in algebraic geometric codes and their applications in quantum error-correcting codes, secure multi-party computation and the construction of good binary codes.

  2. SELF-DUAL PERMUTATION CODES OVER FORMAL POWER SERIES RINGS AND FINITE PRINCIPAL IDEAL RINGS

    Institute of Scientific and Technical Information of China (English)

    张光辉; 刘宏伟

    2013-01-01

    In this paper, we study self-dual permutation codes over formal power series rings and finite principal ideal rings. We first give some results on the torsion codes associated with the linear codes over formal power series rings. These results allow for obtaining some conditions for non-existence of self-dual permutation codes over formal power series rings. Finally, we describe self-dual permutation codes over finite principal ideal rings by examining permutation codes over their component chain rings.

  3. Global Delivery Models

    DEFF Research Database (Denmark)

    Manning, Stephan; Larsen, Marcus M.; Bharati, Pratyush

    2013-01-01

    This article examines antecedents and performance implications of global delivery models (GDMs) in global business services. GDMs require geographically distributed operations to exploit both proximity to clients and time-zone spread for efficient service delivery. We propose and empirically show...... that service providers who differentiate based on speed of service delivery are likely to set up GDM structures, and that these structures positively affect deal renewal rates if speed is important for clients in selecting vendors. Findings imply that, as co-location becomes less necessary for providing...... digitalized services, time zones increasingly affect....

  4. Global Delivery Models

    DEFF Research Database (Denmark)

    Manning, Stephan; Møller Larsen, Marcus; Bharati, Pratyush

    We investigate antecedents and contingencies of location configurations supporting global delivery models (GDMs) in global outsourcing. GDMs are a new form of IT-enabled client-specific investment promoting services provision integration with clients by exploiting client proximity and time......-zone spread allowing for 24/7 service delivery and access to resources. Based on comprehensive data we show that providers are likely to establish GDM configurations when clients value access to globally distributed talent pools and speed of service delivery, and in particular when services are highly...

  5. Global Delivery Models

    DEFF Research Database (Denmark)

    Manning, Stephan; Møller Larsen, Marcus; Bharati, Pratyush

    We investigate antecedents and contingencies of location configurations supporting global delivery models (GDMs) in global outsourcing. GDMs are a new form of IT-enabled client-specific investment promoting services provision integration with clients by exploiting client proximity and time......-zone spread allowing for 24/7 service delivery and access to resources. Based on comprehensive data we show that providers are likely to establish GDM configurations when clients value access to globally distributed talent pools and speed of service delivery, and in particular when services are highly...... commoditized. Findings imply that coordination across time zones increasingly affects international operations in business-to-business and born-global industries....

  6. Focus on Delivery

    DEFF Research Database (Denmark)

    Hasman, Kirsten; Barfoed, Anne

    2016-01-01

    (2). It is, however, not clarified which of the multifaceted aspects of preventing perineal injury that might explain the decrease (3). Aims: We hypothesized that the use of structured reflection on a clinical practice by midwives and midwifery students would increase both parts’ knowledge on how...... attended a delivery. The tool was developed based on five categories: communication, pace, ergonomic positions, perineal support in the chosen birth position and delivery of the shoulders, and five predefined questions guided an overall reflection upon practice. After a delivery a project midwife, who had...

  7. Secure Source Coding with a Helper

    CERN Document Server

    Tandon, Ravi; Ramchandran, Kannan

    2009-01-01

    We consider a secure lossless source coding problem with a rate-limited helper. In particular, Alice observes an i.i.d. source $X^{n}$ and wishes to transmit this source losslessly to Bob at a rate $R_{x}$. A helper, say Helen, observes a correlated source $Y^{n}$ and transmits at a rate $R_{y}$ to Bob. A passive eavesdropper can observe the coded output of Alice. The equivocation $\\Delta$ is measured by the conditional entropy $H(X^{n}|J_{x})/n$, where $J_{x}$ is the coded output of Alice. We first completely characterize the rate-equivocation region for this secure source coding model, where we show that Slepian-Wolf type coding is optimal. We next study two generalizations of this model and provide single-letter characterizations for the respective rate-equivocation regions. In particular, we first consider the case of a two-sided helper where Alice also has access to the coded output of Helen. We show that for this case, Slepian-Wolf type coding is suboptimal and one can further decrease the information l...

  8. Strength evaluation code STEP for brittle materials

    Energy Technology Data Exchange (ETDEWEB)

    Ishihara, Masahiro [Japan Atomic Energy Research Inst., Oarai, Ibaraki (Japan). Oarai Research Establishment; Futakawa, Masatoshi

    1997-12-01

    In a structural design using brittle materials such as graphite and/or ceramics it is necessary to evaluate the strength of component under complex stress condition. The strength of ceramic materials is said to be influenced by the stress distribution. However, in the structural design criteria simplified stress limits had been adopted without taking account of the strength change with the stress distribution. It is, therefore, important to evaluate the strength of component on the basis of the fracture model for brittle material. Consequently, the strength evaluation program, STEP, on a brittle fracture of ceramic materials based on the competing risk theory had been developed. Two different brittle fracture modes, a surface layer fracture mode dominated by surface flaws and an internal fracture mode by internal flaws, are treated in the STEP code in order to evaluate the strength of brittle fracture. The STEP code uses stress calculation results including complex shape of structures analyzed by the generalized FEM stress analysis code, ABAQUS, so as to be possible to evaluate the strength of brittle fracture for the structures having complicate shapes. This code is, therefore, useful to evaluate the structural integrity of arbitrary shapes of components such as core graphite components in the HTTR, heat exchanger components made of ceramics materials etc. This paper describes the basic equations applying to the STEP code, code system with a combination of the STEP and the ABAQUS codes and the result of the verification analysis. (author)

  9. A global health delivery framework approach to epilepsy care in resource-limited settings.

    Science.gov (United States)

    Cochran, Maggie F; Berkowitz, Aaron L

    2015-11-15

    The Global Health Delivery (GHD) framework (Farmer, Kim, and Porter, Lancet 2013;382:1060-69) allows for the analysis of health care delivery systems along four axes: a care delivery value chain that incorporates prevention, diagnosis, and treatment of a medical condition; shared delivery infrastructure that integrates care within existing healthcare delivery systems; alignment of care delivery with local context; and generation of economic growth and social development through the health care delivery system. Here, we apply the GHD framework to epilepsy care in rural regions of low- and middle-income countries (LMIC) where there are few or no neurologists.

  10. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  11. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  12. 19 CFR 142.51 - Changing election of entry or immediate delivery.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Changing election of entry or immediate delivery... SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) ENTRY PROCESS Line Release § 142.51 Changing election of entry or immediate delivery. An applicant who has already received a C-4 Code and wishes to change the...

  13. Preferred Educational Delivery Strategies among Limited Income Older Adults Enrolled in Community Nutrition Education Programs

    Science.gov (United States)

    Parker, Stephany; Powell, Laura; Hermann, Janice; Phelps, Joshua; Brown, Barbara

    2011-01-01

    The study reported here explored educational delivery preference of limited income older Oklahomans. Sixty participants 60 years or older enrolled in Community Nutrition Education Programs observed three educational delivery strategies and participated in a group discussion. Two researchers independently coded focus group transcripts and frequency…

  14. Golden Coded Multiple Beamforming

    CERN Document Server

    Li, Boyu

    2010-01-01

    The Golden Code is a full-rate full-diversity space-time code, which achieves maximum coding gain for Multiple-Input Multiple-Output (MIMO) systems with two transmit and two receive antennas. Since four information symbols taken from an M-QAM constellation are selected to construct one Golden Code codeword, a maximum likelihood decoder using sphere decoding has the worst-case complexity of O(M^4), when the Channel State Information (CSI) is available at the receiver. Previously, this worst-case complexity was reduced to O(M^(2.5)) without performance degradation. When the CSI is known by the transmitter as well as the receiver, beamforming techniques that employ singular value decomposition are commonly used in MIMO systems. In the absence of channel coding, when a single symbol is transmitted, these systems achieve the full diversity order provided by the channel. Whereas this property is lost when multiple symbols are simultaneously transmitted. However, uncoded multiple beamforming can achieve the full div...

  15. Coded source neutron imaging

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; Santos-Villalobos, Hector J [ORNL

    2011-01-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100 m) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100um and 10um aperture hole diameters show resolutions matching the hole diameters.

  16. Coded source neutron imaging

    Science.gov (United States)

    Bingham, Philip; Santos-Villalobos, Hector; Tobin, Ken

    2011-03-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100μm) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100μm and 10μm aperture hole diameters show resolutions matching the hole diameters.

  17. Error Correcting Codes for Distributed Control

    CERN Document Server

    Sukhavasi, Ravi Teja

    2011-01-01

    The problem of stabilizing an unstable plant over a noisy communication link is an increasingly important one that arises in applications of networked control systems. Although the work of Schulman and Sahai over the past two decades, and their development of the notions of "tree codes"\\phantom{} and "anytime capacity", provides the theoretical framework for studying such problems, there has been scant practical progress in this area because explicit constructions of tree codes with efficient encoding and decoding did not exist. To stabilize an unstable plant driven by bounded noise over a noisy channel one needs real-time encoding and real-time decoding and a reliability which increases exponentially with decoding delay, which is what tree codes guarantee. We prove that linear tree codes occur with high probability and, for erasure channels, give an explicit construction with an expected decoding complexity that is constant per time instant. We give novel sufficient conditions on the rate and reliability req...

  18. The stellar atmosphere simulation code Bifrost

    CERN Document Server

    Gudiksen, Boris V; Hansteen, Viggo H; Hayek, Wolfgang; Leenaarts, Jorrit; Martínez-Sykora, Juan

    2011-01-01

    Context: Numerical simulations of stellar convection and photospheres have been developed to the point where detailed shapes of observed spectral lines can be explained. Stellar atmospheres are very complex, and very different physical regimes are present in the convection zone, photosphere, chromosphere, transition region and corona. To understand the details of the atmosphere it is necessary to simulate the whole atmosphere since the different layers interact strongly. These physical regimes are very diverse and it takes a highly efficient massively parallel numerical code to solve the associated equations. Aims: The design, implementation and validation of the massively parallel numerical code Bifrost for simulating stellar atmospheres from the convection zone to the corona. Methods: The code is subjected to a number of validation tests, among them the Sod shock tube test, the Orzag-Tang colliding shock test, boundary condition tests and tests of how the code treats magnetic field advection, chromospheric ...

  19. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  20. Nested Quantum Error Correction Codes

    CERN Document Server

    Wang, Zhuo; Fan, Hen; Vedral, Vlatko

    2009-01-01

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  1. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  2. Autocatalysis, information and coding.

    Science.gov (United States)

    Wills, P R

    2001-01-01

    Autocatalytic self-construction in macromolecular systems requires the existence of a reflexive relationship between structural components and the functional operations they perform to synthesise themselves. The possibility of reflexivity depends on formal, semiotic features of the catalytic structure-function relationship, that is, the embedding of catalytic functions in the space of polymeric structures. Reflexivity is a semiotic property of some genetic sequences. Such sequences may serve as the basis for the evolution of coding as a result of autocatalytic self-organisation in a population of assignment catalysts. Autocatalytic selection is a mechanism whereby matter becomes differentiated in primitive biochemical systems. In the case of coding self-organisation, it corresponds to the creation of symbolic information. Prions are present-day entities whose replication through autocatalysis reflects aspects of biological semiotics less obvious than genetic coding.

  3. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  4. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  5. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  6. Spread codes and spread decoding in network coding

    OpenAIRE

    Manganiello, F; Gorla, E.; Rosenthal, J.

    2008-01-01

    In this paper we introduce the class of spread codes for the use in random network coding. Spread codes are based on the construction of spreads in finite projective geometry. The major contribution of the paper is an efficient decoding algorithm of spread codes up to half the minimum distance.

  7. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes...

  8. Transdermal delivery of proteins.

    Science.gov (United States)

    Kalluri, Haripriya; Banga, Ajay K

    2011-03-01

    Transdermal delivery of peptides and proteins avoids the disadvantages associated with the invasive parenteral route of administration and other alternative routes such as the pulmonary and nasal routes. Since proteins have a large size and are hydrophilic in nature, they cannot permeate passively across the skin due to the stratum corneum which allows the transport of only small lipophilic drug molecules. Enhancement techniques such as chemical enhancers, iontophoresis, microneedles, electroporation, sonophoresis, thermal ablation, laser ablation, radiofrequency ablation and noninvasive jet injectors aid in the delivery of proteins by overcoming the skin barrier in different ways. In this review, these enhancement techniques that can enable the transdermal delivery of proteins are discussed, including a discussion of mechanisms, sterility requirements, and commercial development of products. Combination of enhancement techniques may result in a synergistic effect allowing increased protein delivery and these are also discussed.

  9. CBP PHASE I CODE INTEGRATION

    Energy Technology Data Exchange (ETDEWEB)

    Smith, F.; Brown, K.; Flach, G.; Sarkar, S.

    2011-09-30

    The goal of the Cementitious Barriers Partnership (CBP) is to develop a reasonable and credible set of software tools to predict the structural, hydraulic, and chemical performance of cement barriers used in nuclear applications over extended time frames (greater than 100 years for operating facilities and greater than 1000 years for waste management). The simulation tools will be used to evaluate and predict the behavior of cementitious barriers used in near surface engineered waste disposal systems including waste forms, containment structures, entombments, and environmental remediation. These cementitious materials are exposed to dynamic environmental conditions that cause changes in material properties via (i) aging, (ii) chloride attack, (iii) sulfate attack, (iv) carbonation, (v) oxidation, and (vi) primary constituent leaching. A set of state-of-the-art software tools has been selected as a starting point to capture these important aging and degradation phenomena. Integration of existing software developed by the CBP partner organizations was determined to be the quickest method of meeting the CBP goal of providing a computational tool that improves the prediction of the long-term behavior of cementitious materials. These partner codes were selected based on their maturity and ability to address the problems outlined above. The GoldSim Monte Carlo simulation program (GTG 2010a, GTG 2010b) was chosen as the code integration platform (Brown & Flach 2009b). GoldSim (current Version 10.5) is a Windows based graphical object-oriented computer program that provides a flexible environment for model development (Brown & Flach 2009b). The linking of GoldSim to external codes has previously been successfully demonstrated (Eary 2007, Mattie et al. 2007). GoldSim is capable of performing deterministic and probabilistic simulations and of modeling radioactive decay and constituent transport. As part of the CBP project, a general Dynamic Link Library (DLL) interface was

  10. MUCOSAL DRUG DELIVERY SYSTEM

    OpenAIRE

    Madan Jyotsana; Banode Sagar; Dangi Mahesh

    2010-01-01

    The process of mucoadhesion involving a polymeric drug delivery system is a complex one that includes processes such as wetting, adsorption and interpenetration of polymer chains. The success and degree of mucoadhesion bonding is influenced by various polymer-based properties such as the degree of cross-linking, chain length and the presence of various functional groupings. The attractiveness of mucosal-targeted controlled drug delivery of active pharmaceutical ingredients, has led formulatio...

  11. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  12. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  13. HIGH-PERFORMANCE SIMPLE-ENCODING GENERATOR-BASED SYSTEMATIC IRREGULAR LDPC CODES AND RESULTED PRODUCT CODES

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Low-Density Parity-Check (LDPC) code is one of the most exciting topics among the coding theory community. It is of great importance in both theory and practical communications over noisy channels. The most advantage of LDPC codes is their relatively lower decoding complexity compared with turbo codes, while the disadvantage is its higher encoding complexity. In this paper, a new approach is first proposed to construct high performance irregular systematic LDPC codes based on sparse generator matrix, which can significantly reduce the encoding complexity under the same decoding complexity as that of regular or irregular LDPC codes defined by traditional sparse parity-check matrix. Then, the proposed generator-based systematic irregular LDPC codes are adopted ss constituent block codes in rows and columns to design a new kind of product codes family, which also can be interpreted as irregular LDPC codes characterized by graph and thus decoded iteratively. Finally,the performance of the generator-based LDPC codes and the resultant product codes is investigated over an Additive White Gaussian Noise (AWGN) and also compared with the conventional LDPC codes under the same conditions of decoding complexity and channel noise.

  14. Ultrasound-mediated gastrointestinal drug delivery.

    Science.gov (United States)

    Schoellhammer, Carl M; Schroeder, Avi; Maa, Ruby; Lauwers, Gregory Yves; Swiston, Albert; Zervas, Michael; Barman, Ross; DiCiccio, Angela M; Brugge, William R; Anderson, Daniel G; Blankschtein, Daniel; Langer, Robert; Traverso, Giovanni

    2015-10-21

    There is a significant clinical need for rapid and efficient delivery of drugs directly to the site of diseased tissues for the treatment of gastrointestinal (GI) pathologies, in particular, Crohn's and ulcerative colitis. However, complex therapeutic molecules cannot easily be delivered through the GI tract because of physiologic and structural barriers. We report the use of ultrasound as a modality for enhanced drug delivery to the GI tract, with an emphasis on rectal delivery. Ultrasound increased the absorption of model therapeutics inulin, hydrocortisone, and mesalamine two- to tenfold in ex vivo tissue, depending on location in the GI tract. In pigs, ultrasound induced transient cavitation with negligible heating, leading to an order of magnitude enhancement in the delivery of mesalamine, as well as successful systemic delivery of a macromolecule, insulin, with the expected hypoglycemic response. In a rodent model of chemically induced acute colitis, the addition of ultrasound to a daily mesalamine enema (compared to enema alone) resulted in superior clinical and histological scores of disease activity. In both animal models, ultrasound treatment was well tolerated and resulted in minimal tissue disruption, and in mice, there was no significant effect on histology, fecal score, or tissue inflammatory cytokine levels. The use of ultrasound to enhance GI drug delivery is safe in animals and could augment the efficacy of GI therapies and broaden the scope of agents that could be delivered locally and systemically through the GI tract for chronic conditions such as inflammatory bowel disease.

  15. Code-to-Code Comparison, and Material Response Modeling of Stardust and MSL using PATO and FIAT

    Science.gov (United States)

    Omidy, Ali D.; Panerai, Francesco; Martin, Alexandre; Lachaud, Jean R.; Cozmuta, Ioana; Mansour, Nagi N.

    2015-01-01

    This report provides a code-to-code comparison between PATO, a recently developed high fidelity material response code, and FIAT, NASA's legacy code for ablation response modeling. The goal is to demonstrates that FIAT and PATO generate the same results when using the same models. Test cases of increasing complexity are used, from both arc-jet testing and flight experiment. When using the exact same physical models, material properties and boundary conditions, the two codes give results that are within 2% of errors. The minor discrepancy is attributed to the inclusion of the gas phase heat capacity (cp) in the energy equation in PATO, and not in FIAT.

  16. New code match strategy for wideband code division multiple access code tree management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%.

  17. Reed-Solomon convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Schmale, W

    2005-01-01

    In this paper we will introduce a specific class of cyclic convolutional codes. The construction is based on Reed-Solomon block codes. The algebraic parameters as well as the distance of these codes are determined. This shows that some of these codes are optimal or near optimal.

  18. Redefining global health-care delivery.

    Science.gov (United States)

    Kim, Jim Yong; Farmer, Paul; Porter, Michael E

    2013-09-21

    Initiatives to address the unmet needs of those facing both poverty and serious illness have expanded significantly over the past decade. But many of them are designed in an ad-hoc manner to address one health problem among many; they are too rarely assessed; best practices spread slowly. When assessments of delivery do occur, they are often narrow studies of the cost-effectiveness of a single intervention rather than the complex set of them required to deliver value to patients and their families. We propose a framework for global health-care delivery and evaluation by considering efforts to introduce HIV/AIDS care to resource-poor settings. The framework introduces the notion of care delivery value chains that apply a systems-level analysis to the complex processes and interventions that must occur, across a health-care system and over time, to deliver high-value care for patients with HIV/AIDS and cooccurring conditions, from tuberculosis to malnutrition. To deliver value, vertical or stand-alone projects must be integrated into shared delivery infrastructure so that personnel and facilities are used wisely and economies of scale reaped. Two other integrative processes are necessary for delivering and assessing value in global health: one is the alignment of delivery with local context by incorporating knowledge of both barriers to good outcomes (from poor nutrition to a lack of water and sanitation) and broader social and economic determinants of health and wellbeing (jobs, housing, physical infrastructure). The second is the use of effective investments in care delivery to promote equitable economic development, especially for those struggling against poverty and high burdens of disease. We close by reporting our own shared experience of seeking to move towards a science of delivery by harnessing research and training to understand and improve care delivery.

  19. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  20. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  1. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and compositi

  2. Polar Code Validation

    Science.gov (United States)

    1989-09-30

    SUMMARY OF POLAR ACHIEVEMENTS ..... .......... 3 3. POLAR CODE PHYSICAL MODELS ..... ............. 5 3.1 PL- ASMA Su ^"ru5 I1LS SH A...of this problem. 1.1. The Charge-2 Rocket The Charge-2 payload was launched on a Black Brant VB from White Sands Mis- sile Range in New Mexico in

  3. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  4. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  5. Corner neutronic code

    Directory of Open Access Journals (Sweden)

    V.P. Bereznev

    2015-10-01

    An iterative solution process is used, including external iterations for the fission source and internal iterations for the scattering source. The paper presents the results of a cross-verification against the Monte Carlo MMK code [3] and on a model of the BN-800 reactor core.

  6. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  7. Focusing Automatic Code Inspections

    NARCIS (Netherlands)

    Boogerd, C.J.

    2010-01-01

    Automatic Code Inspection tools help developers in early detection of defects in software. A well-known drawback of many automatic inspection approaches is that they yield too many warnings and require a clearer focus. In this thesis, we provide such focus by proposing two methods to prioritize

  8. Fundamentals of coding and reimbursement.

    Science.gov (United States)

    Price, Paula

    2002-01-01

    After completing this introduction to radiology coding and reimbursement, readers will: Understand how health care reimbursement evolved over the past 50 years. Know the importance of documenting the patient's history. Have an overall picture of the standardized numerical coding system. Understand how accurate coding affects reimbursement. Understand coding functions as they pertain to regulatory compliance in the radiology department. Be familiar with the U.S. Justice Department's use of coding in tracking health care fraud.

  9. On Asymmetric Quantum MDS Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Ling, San

    2010-01-01

    Assuming the validity of the MDS Conjecture, the weight distribution of all MDS codes is known. Using a recently-established characterization of asymmetric quantum error-correcting codes, linear MDS codes can be used to construct asymmetric quantum MDS codes with $d_{z} \\geq d_{x}\\geq 2$ for all possible values of length $n$ for which linear MDS codes over $\\F_{q}$ are known to exist.

  10. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  11. Improvements of embedded zerotree wavelet (EZW) coding

    Science.gov (United States)

    Li, Jin; Cheng, Po-Yuen; Kuo, C.-C. Jay

    1995-04-01

    In this research, we investigate several improvements of embedded zerotree wavelet (EZW) coding. Several topics addressed include: the choice of wavelet transforms and boundary conditions, the use of arithmetic coder and arithmetic context and the design of encoding order for effective embedding. The superior performance of our improvements is demonstrated with extensive experimental results.

  12. European Code against Cancer 4th Edition

    DEFF Research Database (Denmark)

    Friis, Søren; Kesminiene, Ausrele; Espina, Carolina

    2015-01-01

    The 4th edition of the European Code against Cancer recommends limiting - or avoiding when possible - the use of hormone replacement therapy (HRT) because of the increased risk of cancer, nevertheless acknowledging that prescription of HRT may be indicated under certain medical conditions. Curren...

  13. Methodology, status and plans for development and assessment of Cathare code

    Energy Technology Data Exchange (ETDEWEB)

    Bestion, D.; Barre, F.; Faydide, B. [CEA - Grenoble (France)

    1997-07-01

    This paper presents the methodology, status and plans for the development, assessment and uncertainty evaluation of the Cathare code. Cathare is a thermalhydraulic code developed by CEA (DRN), IPSN, EDF and FRAMATOME for PWR safety analysis. First, the status of the code development and assessment is presented. The general strategy used for the development and the assessment of the code is presented. Analytical experiments with separate effect tests, and component tests are used for the development and the validation of closure laws. Successive Revisions of constitutive laws are implemented in successive Versions of the code and assessed. System tests or integral tests are used to validate the general consistency of the Revision. Each delivery of a code Version + Revision is fully assessed and documented. A methodology is being developed to determine the uncertainty on all constitutive laws of the code using calculations of many analytical tests and applying the Discrete Adjoint Sensitivity Method (DASM). At last, the plans for the future developments of the code are presented. They concern the optimization of the code performance through parallel computing - the code will be used for real time full scope plant simulators - the coupling with many other codes (neutronic codes, severe accident codes), the application of the code for containment thermalhydraulics. Also, physical improvements are required in the field of low pressure transients and in the modeling for the 3-D model.

  14. Cipher quasi-chaotic code for frequency hopping communications

    Institute of Scientific and Technical Information of China (English)

    王宏霞; 何晨; 虞厥邦

    2004-01-01

    The chaotic frequency hopping (FH) communication systems have been presented so far. The chaotic sequences possesses good randomness and sensitive dependence on initial conditions, which is quite advantageous to run the FH codes in code-division multiple access (CDMA) systems. But the finite precision of computation and the fact of the low-dimensional chaos predicted easily cause difficulty in chaotic application. In this paper, some disadvantages associated with the conventional FH codes and the chaotic code scrambled by m-sequences are reviewed briefly. In order to overcome these drawbacks to some extents, a new higher performance FH code called cipher quasi-chaotic (CQC) code is proposed,which is generated by combining the clock-controlled stream cipher technique and chaotic dynamics. Performance analysis applying in FH communication systems of this kind of code is given. The privacy of the CQC sequence is also analyzed.

  15. Comparison of SAGS I vs. SAGS II delivery systems in emerging implantation technologies

    Science.gov (United States)

    Despres, Joseph; Sweeney, Joseph

    2012-11-01

    The International Fire Code has classified Subatmospheric Gas Delivery Systems (SAGS) technologies into two main categories: SAGS Type I and SAGS Type II systems. SAGS Type I delivery systems both store and deliver gases at subatmospheric pressures. An example of this technology is ATMI's Safe Delivery Source (SDS®) adsorbent based cylinder. SAGS Type II delivery systems store fluids at high pressure and utilize mechanical devices internal to the cylinder to deliver the gas at subatmospheric pressures. Typical mechanical devices used to enable subatmospheric delivery are either set point regulators or mechanical capillary based systems. This paper focuses on how these delivery systems perform against the unique requirements of traditional beam line ion implantation as well as solar and flat panel applications. Specifically, data are provided showing the capability of these systems with respect to flow rate, residual gas left within the cylinder, and cylinder end-point flow and delivery pressure dynamics.

  16. Fountain Codes with Multiplicatively Repeated Non-Binary LDPC Codes

    CERN Document Server

    Kasai, Kenta

    2010-01-01

    We study fountain codes transmitted over the binary-input symmetric-output channel. For channels with small capacity, receivers needs to collects many channel outputs to recover information bits. Since a collected channel output yields a check node in the decoding Tanner graph, the channel with small capacity leads to large decoding complexity. In this paper, we introduce a novel fountain coding scheme with non-binary LDPC codes. The decoding complexity of the proposed fountain code does not depend on the channel. Numerical experiments show that the proposed codes exhibit better performance than conventional fountain codes, especially for small number of information bits.

  17. Quantum codes from linear codes over finite chain rings

    Science.gov (United States)

    Liu, Xiusheng; Liu, Hualu

    2017-10-01

    In this paper, we provide two methods of constructing quantum codes from linear codes over finite chain rings. The first one is derived from the Calderbank-Shor-Steane (CSS) construction applied to self-dual codes over finite chain rings. The second construction is derived from the CSS construction applied to Gray images of the linear codes over finite chain ring {\\mathbb {F}}_{p^{2m}}+u{\\mathbb {F}}_{p^{2m}}. The good parameters of quantum codes from cyclic codes over finite chain rings are obtained.

  18. Reserved-Length Prefix Coding

    CERN Document Server

    Baer, Michael B

    2008-01-01

    Huffman coding finds an optimal prefix code for a given probability mass function. Consider situations in which one wishes to find an optimal code with the restriction that all codewords have lengths that lie in a user-specified set of lengths (or, equivalently, no codewords have lengths that lie in a complementary set). This paper introduces a polynomial-time dynamic programming algorithm that finds optimal codes for this reserved-length prefix coding problem. This has applications to quickly encoding and decoding lossless codes. In addition, one modification of the approach solves any quasiarithmetic prefix coding problem, while another finds optimal codes restricted to the set of codes with g codeword lengths for user-specified g (e.g., g=2).

  19. Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes

    CERN Document Server

    Senger, Christian; Bossert, Martin; Zyablov, Victor

    2008-01-01

    Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one...

  20. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  1. Epetra developers coding guidelines.

    Energy Technology Data Exchange (ETDEWEB)

    Heroux, Michael Allen; Sexton, Paul Michael

    2003-12-01

    Epetra is a package of classes for the construction and use of serial and distributed parallel linear algebra objects. It is one of the base packages in Trilinos. This document describes guidelines for Epetra coding style. The issues discussed here go beyond correct C++ syntax to address issues that make code more readable and self-consistent. The guidelines presented here are intended to aid current and future development of Epetra specifically. They reflect design decisions that were made in the early development stages of Epetra. Some of the guidelines are contrary to more commonly used conventions, but we choose to continue these practices for the purposes of self-consistency. These guidelines are intended to be complimentary to policies established in the Trilinos Developers Guide.

  2. Efficient convolutional sparse coding

    Energy Technology Data Exchange (ETDEWEB)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  3. Decoding the productivity code

    DEFF Research Database (Denmark)

    Hansen, David

    .e., to be prepared to initiate improvement. The study shows how the effectiveness of the improvement system depends on the congruent fit between the five elements as well as the bridging coherence between the improvement system and the work system. The bridging coherence depends on how improvements are activated...... approach often ends up with demanding intense employee focus to sustain improvement and engagement. Likewise, a single-minded employee development approach often ends up demanding rationalization to achieve the desired financial results. These ineffective approaches make organizations react like pendulums...... that swing between rationalization and employee development. The productivity code is the lack of alternatives to this ineffective approach. This thesis decodes the productivity code based on the results from a 3-year action research study at a medium-sized manufacturing facility. During the project period...

  4. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well...... as conceptions of good governance from other international organizations. While values converge, they are balanced and communicated differently, and seem to some extent to be translated into the national cultures. The set of global public values derived from this analysis include public interest, regime dignity...

  5. Confocal coded aperture imaging

    Energy Technology Data Exchange (ETDEWEB)

    Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

    2001-01-01

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  6. The Phantom SPH code

    Science.gov (United States)

    Price, Daniel; Wurster, James; Nixon, Chris

    2016-05-01

    I will present the capabilities of the Phantom SPH code for global simulations of dust and gas in protoplanetary discs. I will present our new algorithms for simulating both small and large grains in discs, as well as our progress towards simulating evolving grain populations and coupling with radiation. Finally, I will discuss our recent applications to HL Tau and the physics of dust gap opening.

  7. The Liege Oscillation Code

    CERN Document Server

    Scuflaire, R; Théado, S; Bourge, P -O; Miglio, A; Godart, M; Thoul, A; Noels, A

    2007-01-01

    The Liege Oscillation code can be used as a stand-alone program or as a library of subroutines that the user calls from a Fortran main program of his own to compute radial and non-radial adiabatic oscillations of stellar models. We describe the variables and the equations used by the program and the methods used to solve them. A brief account is given of the use and the output of the program.

  8. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  9. Clinical applications of biomedical microdevices for controlled drug delivery.

    Science.gov (United States)

    Gurman, Pablo; Miranda, Oscar R; Clayton, Kevin; Rosen, Yitzhak; Elman, Noel M

    2015-01-01

    Miniaturization of devices to micrometer and nanometer scales, combined with the use of biocompatible and functional materials, has created new opportunities for the implementation of drug delivery systems. Advances in biomedical microdevices for controlled drug delivery platforms promise a new generation of capabilities for the treatment of acute conditions and chronic illnesses, which require high adherence to treatment, in which temporal control over the pharmacokinetic profiles is critical. In addition, clinical conditions that require a combination of drugs with specific pharmacodynamic profiles and local delivery will benefit from drug delivery microdevices. This review provides a summary of various clinical applications for state-of-the-art controlled drug delivery microdevices, including cancer, endocrine and ocular disorders, and acute conditions such as hemorrhagic shock. Regulatory considerations for clinical translation of drug delivery microdevices are also discussed. Drug delivery microdevices promise a remarkable gain in clinical outcomes and a substantial social impact. A review of articles covering the field of microdevices for drug delivery was performed between January 1, 1990, and January 1, 2014, using PubMed as a search engine.

  10. ARQ for Network Coding

    CERN Document Server

    Sundararajan, Jay Kumar; Médard, Muriel

    2008-01-01

    A new coding and queue management algorithm is proposed for communication networks that employ linear network coding. The algorithm has the feature that the encoding process is truly online, as opposed to a block-by-block approach. The setup assumes a packet erasure broadcast channel with stochastic arrivals and full feedback, but the proposed scheme is potentially applicable to more general lossy networks with link-by-link feedback. The algorithm guarantees that the physical queue size at the sender tracks the backlog in degrees of freedom (also called the virtual queue size). The new notion of a node "seeing" a packet is introduced. In terms of this idea, our algorithm may be viewed as a natural extension of ARQ schemes to coded networks. Our approach, known as the drop-when-seen algorithm, is compared with a baseline queuing approach called drop-when-decoded. It is shown that the expected queue size for our approach is $O(\\frac1{1-\\rho})$ as opposed to $\\Omega(\\frac1{(1-\\rho)^2})$ for the baseline approach...

  11. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  12. Global Delivery Models

    DEFF Research Database (Denmark)

    Manning, Stephan; Møller Larsen, Marcus; Bharati, Pratyush M.

    2015-01-01

    Global delivery models (GDMs) are transforming the global IT and business process outsourcing industry. GDMs are a new form of client-specific investment promoting service integration with clients by combining client proximity with time-zone spread for 24/7 service operations. We investigate...... antecedents and contingencies of setting up GDM structures. Based on comprehensive data we show that providers are likely to establish GDM location configurations when clients value access to globally distributed talent and speed of service delivery, in particular when services are highly commoditized...

  13. L2 Orthogonal Space Time Code for Continuous Phase Modulation

    CERN Document Server

    Hesse, Matthias; Deneire, Luc

    2008-01-01

    To combine the high power efficiency of Continuous Phase Modulation (CPM) with either high spectral efficiency or enhanced performance in low Signal to Noise conditions, some authors have proposed to introduce CPM in a MIMO frame, by using Space Time Codes (STC). In this paper, we address the code design problem of Space Time Block Codes combined with CPM and introduce a new design criterion based on L2 orthogonality. This L2 orthogonality condition, with the help of simplifying assumption, leads, in the 2x2 case, to a new family of codes. These codes generalize the Wang and Xia code, which was based on pointwise orthogonality. Simulations indicate that the new codes achieve full diversity and a slightly better coding gain. Moreover, one of the codes can be interpreted as two antennas fed by two conventional CPMs using the same data but with different alphabet sets. Inspection of these alphabet sets lead also to a simple explanation of the (small) spectrum broadening of Space Time Coded CPM.

  14. Birth delivery assisted by nurse-midwife: perspectives and controversies

    Directory of Open Access Journals (Sweden)

    Selma Aparecida Lagrosa Garcia

    2010-12-01

    Full Text Available Objectives: To present the conflicts in birth deliveries assisted by nurse midwife and propose ways to minimize them. Methods: We researched the historical evolution of childbirth and the actions that were necessary for the training of professionals. Codes of Ethics of Nursing and Medicine, the current law, basic books of obstetrics and gynecology, articles from medical and nursing journals, with Lilacs and Medline as data sources; laic texts and others from non-governmental organizations (NGO were surveyed. Conflicts were identified in birth deliveries by nurse midwife, for which we propose ways of acting. Results: The analysis of research material shows that the time of delivery, initially at home and afterwards in institutions, brought interventionism in this activity; that social and human aspects of birth and delivery were minimized and birth delivery changed into medical act. We found a strong link between the focus in humanization at child delivery and its assistance by nurses. Conclusions: We conclude that even with legal and ethical support the delivery care by nurse midwife is a source of conflict between the health team, particularly with regard to the limits of performance of the nurse and doctor. Such conflicts must be identified and discussed in the institutions and they should invest in teamwork and have clear protocols defining boundaries of responsibility.

  15. Ethical issues in cesarean delivery.

    Science.gov (United States)

    Chervenak, Frank A; McCullough, Laurence B

    2017-08-01

    Cesarean delivery is the most common and important surgical intervention in obstetric practice. Ethics provides essential guidance to obstetricians for offering, recommending, recommending against, and performing cesarean delivery. This chapter provides an ethical framework based on the professional responsibility model of obstetric ethics. This framework is then used to address two especially ethically challenging clinical topics in cesarean delivery: patient-choice cesarean delivery and trial of labor after cesarean delivery. This chapter emphasizes a preventive ethics approach, designed to prevent ethical conflict in clinical practice. To achieve this goal, a preventive ethics approach uses the informed consent process to offer cesarean delivery as a medically reasonable alternative to vaginal delivery, to recommend cesarean delivery, and to recommend against cesarean delivery. The limited role of shared decision making is also described. The professional responsibility model of obstetric ethics guides this multi-faceted preventive ethics approach. Copyright © 2017. Published by Elsevier Ltd.

  16. original article predictors of safe delivery service utilization in arsi ...

    African Journals Online (AJOL)

    Abrham

    labor, delivery and early post-partum period could reduce deaths due to obstructed labor, hemorrhage, sepsis and eclampsia. ... to conditions related to pregnancy and child birth ...... studies conducted in Bangladesh and India which show that ...

  17. low bit rate video coding low bit rate video coding

    African Journals Online (AJOL)

    eobe

    ariable length bit rate (VLBR) broadly encompasses video coding which broadly encompasses ... for motion estimation and compensation to reduce the prediction sation to reduce the ... a special interest among the video coding community ...

  18. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  19. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  20. Understanding the chromatin remodeling code.

    Science.gov (United States)

    Ha, Misook

    2013-10-01

    Remodeling a chromatin structure enables the genetic elements stored in a genome to function in a condition-specific manner and predisposes the interactions between cis-regulatory elements and trans-acting factors. A chromatin signature can be an indicator of the activity of the underlying genetic elements. This paper reviews recent studies showing that the combination and arrangements of chromatin remodeling marks play roles as chromatin code affecting the activity of genetic elements. This paper also reviews recent studies inferring the primary DNA sequence contexts associated with chromatin remodeling that suggest interactions between genetic and epigenetic factors. We conclude that chromatin remodeling, which provides accurate models of gene expression and morphological variations, may help to find the biological marks that cannot be detected by genome-wide association study or genetic study. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  1. Mapping Initial Hydrostatic Models in Godunov Codes

    CERN Document Server

    Zingale, M A; Zu Hone, J; Calder, A C; Fryxell, B; Plewa, T; Truran, J W; Caceres, A; Olson, K; Ricker, P M; Riley, K; Rosner, R; Siegel, A; Timmes, F X; Vladimirova, N

    2002-01-01

    We look in detail at the process of mapping an astrophysical initial model from a stellar evolution code onto the computational grid of an explicit, Godunov type code while maintaining hydrostatic equilibrium. This mapping process is common in astrophysical simulations, when it is necessary to follow short-timescale dynamics after a period of long timescale buildup. We look at the effects of spatial resolution, boundary conditions, the treatment of the gravitational source terms in the hydrodynamics solver, and the initialization process itself. We conclude with a summary detailing the mapping process that yields the lowest ambient velocities in the mapped model.

  2. Temporal Coding of Volumetric Imagery

    Science.gov (United States)

    Llull, Patrick Ryan

    'Image volumes' refer to realizations of images in other dimensions such as time, spectrum, and focus. Recent advances in scientific, medical, and consumer applications demand improvements in image volume capture. Though image volume acquisition continues to advance, it maintains the same sampling mechanisms that have been used for decades; every voxel must be scanned and is presumed independent of its neighbors. Under these conditions, improving performance comes at the cost of increased system complexity, data rates, and power consumption. This dissertation explores systems and methods capable of efficiently improving sensitivity and performance for image volume cameras, and specifically proposes several sampling strategies that utilize temporal coding to improve imaging system performance and enhance our awareness for a variety of dynamic applications. Video cameras and camcorders sample the video volume (x,y,t) at fixed intervals to gain understanding of the volume's temporal evolution. Conventionally, one must reduce the spatial resolution to increase the framerate of such cameras. Using temporal coding via physical translation of an optical element known as a coded aperture, the compressive temporal imaging (CACTI) camera emonstrates a method which which to embed the temporal dimension of the video volume into spatial (x,y) measurements, thereby greatly improving temporal resolution with minimal loss of spatial resolution. This technique, which is among a family of compressive sampling strategies developed at Duke University, temporally codes the exposure readout functions at the pixel level. Since video cameras nominally integrate the remaining image volume dimensions (e.g. spectrum and focus) at capture time, spectral (x,y,t,lambda) and focal (x,y,t,z) image volumes are traditionally captured via sequential changes to the spectral and focal state of the system, respectively. The CACTI camera's ability to embed video volumes into images leads to exploration

  3. Molecular imprinted polymers as drug delivery vehicles.

    Science.gov (United States)

    Zaidi, Shabi Abbas

    2016-09-01

    This review is aimed to discuss the molecular imprinted polymer (MIP)-based drug delivery systems (DDS). Molecular imprinted polymers have proved to possess the potential and also as a suitable material in several areas over a long period of time. However, only recently it has been employed for pharmaceuticals and biomedical applications, particularly as drug delivery vehicles due to properties including selective recognition generated from imprinting the desired analyte, favorable in harsh experimental conditions, and feedback-controlled recognitive drug release. Hence, this review will discuss their synthesis, the reason they are selected as drug delivery vehicles and for their applications in several drug administration routes (i.e. transdermal, ocular and gastrointestinal or stimuli-reactive routes).

  4. Convolutional coding techniques for data protection

    Science.gov (United States)

    Massey, J. L.

    1975-01-01

    Results of research on the use of convolutional codes in data communications are presented. Convolutional coding fundamentals are discussed along with modulation and coding interaction. Concatenated coding systems and data compression with convolutional codes are described.

  5. Code Flows : Visualizing Structural Evolution of Source Code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual met

  6. Code flows : Visualizing structural evolution of source code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual met

  7. New quantum codes from dual-containing cyclic codes over finite rings

    Science.gov (United States)

    Tang, Yongsheng; Zhu, Shixin; Kai, Xiaoshan; Ding, Jian

    2016-11-01

    Let R=F_{2m}+uF_{2m}+\\cdots +ukF_{2m}, where F_{2m} is the finite field with 2m elements, m is a positive integer, and u is an indeterminate with u^{k+1}=0. In this paper, we propose the constructions of two new families of quantum codes obtained from dual-containing cyclic codes of odd length over R. A new Gray map over R is defined, and a sufficient and necessary condition for the existence of dual-containing cyclic codes over R is given. A new family of 2m-ary quantum codes is obtained via the Gray map and the Calderbank-Shor-Steane construction from dual-containing cyclic codes over R. In particular, a new family of binary quantum codes is obtained via the Gray map, the trace map and the Calderbank-Shor-Steane construction from dual-containing cyclic codes over R.

  8. Measures of Consistency for Holland-Type Codes.

    Science.gov (United States)

    Strahan, Robert F.

    1987-01-01

    Describes two new measures of consistency which refer to the extent to which more closely related scale types are found together in Holland's Self-Directed Search sort. One measure is based on the hexagonal model for use with three-point codes. The other is based on conditional probabilities for use with two-point codes. (Author/ABL)

  9. On locality of Generalized Reed-Muller codes over the broadcast erasure channel

    KAUST Repository

    Alloum, Amira

    2016-07-28

    One to Many communications are expected to be among the killer applications for the currently discussed 5G standard. The usage of coding mechanisms is impacting broadcasting standard quality, as coding is involved at several levels of the stack, and more specifically at the application layer where Rateless, LDPC, Reed Slomon codes and network coding schemes have been extensively studied, optimized and standardized in the past. Beyond reusing, extending or adapting existing application layer packet coding mechanisms based on previous schemes and designed for the foregoing LTE or other broadcasting standards; our purpose is to investigate the use of Generalized Reed Muller codes and the value of their locality property in their progressive decoding for Broadcast/Multicast communication schemes with real time video delivery. Our results are meant to bring insight into the use of locally decodable codes in Broadcasting. © 2016 IEEE.

  10. Protein-Based Drug-Delivery Materials

    Directory of Open Access Journals (Sweden)

    Dave Jao

    2017-05-01

    Full Text Available There is a pressing need for long-term, controlled drug release for sustained treatment of chronic or persistent medical conditions and diseases. Guided drug delivery is difficult because therapeutic compounds need to survive numerous transport barriers and binding targets throughout the body. Nanoscale protein-based polymers are increasingly used for drug and vaccine delivery to cross these biological barriers and through blood circulation to their molecular site of action. Protein-based polymers compared to synthetic polymers have the advantages of good biocompatibility, biodegradability, environmental sustainability, cost effectiveness and availability. This review addresses the sources of protein-based polymers, compares the similarity and differences, and highlights characteristic properties and functionality of these protein materials for sustained and controlled drug release. Targeted drug delivery using highly functional multicomponent protein composites to guide active drugs to the site of interest will also be discussed. A systematical elucidation of drug-delivery efficiency in the case of molecular weight, particle size, shape, morphology, and porosity of materials will then be demonstrated to achieve increased drug absorption. Finally, several important biomedical applications of protein-based materials with drug-delivery function—including bone healing, antibiotic release, wound healing, and corneal regeneration, as well as diabetes, neuroinflammation and cancer treatments—are summarized at the end of this review.

  11. [Complications of cesarean deliveries].

    Science.gov (United States)

    Valgeirsdottir, Heiddis; Hardardottir, Hildur; Bjarnadottir, Ragnheidur I

    2010-01-01

    The objective of the study was to determine the rate of complications which accompany cesarean sections at Landspitali University Hospital (LSH). All deliveries by cesarean section from July 1st 2001 to December 31st 2002 were examined in a retrospective manner. Information was collected from maternity records regarding the operation and its complications if they occurred, during or following the operation. During this period 761 women delivered by cesarean section at LSH. The overall complication rate was 35,5%. The most common complications were; blood loss > or =1000 ml (16.5%), post operative fever (12.2%), extension from the uterine incision (7.2%) and need for blood transfusion (4.3%). Blood transfusion was most common in women undergoing cesarean section after attempted instrumental vaginal delivery (20%). Fever and extension from the uterine incision were most common in women undergoing cesarean section after full cervical dilation without attempt of instrumental delivery (19,4%). These complications were least likely to occur if the patient underwent an elective cesarean section. Complications following cesarean section are common, especially if labor is advanced. Each indication for an operative delivery should be carefully weighed and the patient informed accordingly.

  12. A Medical Delivery Device

    DEFF Research Database (Denmark)

    2010-01-01

    The present invention relates to a medical delivery device comprising at least two membrane electrode assembly units each of which comprises three layers: an upper and a lower electrode and a selective ionic conductive membrane provided there-between. At least one of the three layers are shared...

  13. Recovering from Delivery

    Science.gov (United States)

    ... suicidal thoughts, or any thoughts of harming your baby While recovering from delivery can be a lot to handle, things will get easier. Before you know it, you will be able to fully focus on enjoying your new baby. Reviewed by: Larissa Hirsch, MD Date reviewed: June ...

  14. A Medical Delivery Device

    DEFF Research Database (Denmark)

    2010-01-01

    The present invention relates to a medical delivery device comprising at least two membrane electrode assembly units each of which comprises three layers: an upper and a lower electrode and a selective ionic conductive membrane provided there-between. At least one of the three layers are shared...

  15. What Froze the Genetic Code?

    National Research Council Canada - National Science Library

    Lluís Ribas de Pouplana; Adrian Gabriel Torres; albert Rafels-Ybern

    2017-01-01

    The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids...

  16. GAPCON-THERMAL-3 code description

    Energy Technology Data Exchange (ETDEWEB)

    Lanning, D.D.; Mohr, C.L.; Panisko, F.E.; Stewart, K.B.

    1978-01-01

    GAPCON-3 is a computer program that predicts the thermal and mechanical behavior of an operating fuel rod during its normal lifetime. The code calculates temperatures, dimensions, stresses, and strains for the fuel and the cladding in both the radial and axial directions for each step of the user specified power history. The method of weighted residuals is for the steady state temperature calculation, and is combined with a finite difference approximation of the time derivative for transient conditions. The stress strain analysis employs an iterative axisymmetric finite element procedure that includes plasticity and creep for normal and pellet-clad mechanical interaction loads. GAPCON-3 can solve steady state and operational transient problems. Comparisons of GAPCON-3 predictions to both closed form analytical solutions and actual inpile instrumented fuel rod data have demonstrated the ability of the code to calculate fuel rod behavior. GAPCON-3 features a restart capability and an associated plot package unavailable in previous GAPCON series codes.

  17. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  18. The path of code linting

    CERN Document Server

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  19. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  20. Self-nanoemulsifying drug delivery systems for oral insulin delivery

    DEFF Research Database (Denmark)

    Li, Ping; Tan, Angel; Prestidge, Clive A

    2014-01-01

    This study aims at evaluating the combination of self-nanoemulsifying drug delivery systems (SNEDDS) and enteric-coated capsules as a potential delivery strategy for oral delivery of insulin. The SNEDDS preconcentrates, loaded with insulin-phospholipid complex at different levels (0, 2.5 and 10% w...

  1. Code stroke in Asturias.

    Science.gov (United States)

    Benavente, L; Villanueva, M J; Vega, P; Casado, I; Vidal, J A; Castaño, B; Amorín, M; de la Vega, V; Santos, H; Trigo, A; Gómez, M B; Larrosa, D; Temprano, T; González, M; Murias, E; Calleja, S

    2016-04-01

    Intravenous thrombolysis with alteplase is an effective treatment for ischaemic stroke when applied during the first 4.5 hours, but less than 15% of patients have access to this technique. Mechanical thrombectomy is more frequently able to recanalise proximal occlusions in large vessels, but the infrastructure it requires makes it even less available. We describe the implementation of code stroke in Asturias, as well as the process of adapting various existing resources for urgent stroke care in the region. By considering these resources, and the demographic and geographic circumstances of our region, we examine ways of reorganising the code stroke protocol that would optimise treatment times and provide the most appropriate treatment for each patient. We distributed the 8 health districts in Asturias so as to permit referral of candidates for reperfusion therapies to either of the 2 hospitals with 24-hour stroke units and on-call neurologists and providing IV fibrinolysis. Hospitals were assigned according to proximity and stroke severity; the most severe cases were immediately referred to the hospital with on-call interventional neurology care. Patient triage was provided by pre-hospital emergency services according to the NIHSS score. Modifications to code stroke in Asturias have allowed us to apply reperfusion therapies with good results, while emphasising equitable care and managing the severity-time ratio to offer the best and safest treatment for each patient as soon as possible. Copyright © 2015 Sociedad Española de Neurología. Published by Elsevier España, S.L.U. All rights reserved.

  2. MHD Generation Code

    OpenAIRE

    Frutos-Alfaro, Francisco; Carboni-Mendez, Rodrigo

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a c...

  3. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  4. Code Optimization in FORM

    CERN Document Server

    Kuipers, J; Vermaseren, J A M

    2013-01-01

    We describe the implementation of output code optimization in the open source computer algebra system FORM. This implementation is based on recently discovered techniques of Monte Carlo tree search to find efficient multivariate Horner schemes, in combination with other optimization algorithms, such as common subexpression elimination. For systems for which no specific knowledge is provided it performs significantly better than other methods we could compare with. Because the method has a number of free parameters, we also show some methods by which to tune them to different types of problems.

  5. Topological code Autotune

    CERN Document Server

    Fowler, Austin G; McInnes, Angus L; Rabbani, Alimohammad

    2012-01-01

    Tailoring a fault-tolerant quantum error correction scheme to a specific physical architecture can be a laborious task. We describe a tool Autotune capable of analyzing and optimizing the classical processing for an arbitrary 2-D qubit architecture making use of arbitrary circuits implementing either the surface code or progressively generated slices of a 3-D topological cluster state with arbitrary stochastic error models for each quantum gate. Autotune is designed to facilitate precise study of the performance of real hardware running topological quantum error correction.

  6. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  7. Memory Code©

    OpenAIRE

    Gómez-Londoño, Ana María

    2013-01-01

    El proyecto Memory Code© pertenece al ámbito de las cosmopolíticas del arte contemporáneo porque se ocupa de una relación singular de lo humano (mujer) con lo no-humano (caballo y técnicas)5. Específicamente enmarca el estudio del Binomio Ecuestre: caballo-jinete en el marco de una relación afectiva y de adiestramiento (doma clásica). Dicha relación estuvo compuesta por los siguientes operadores : a) Elementos de con-tacto entre jinete-caballo: espuelas, estribus, fustas b) Sistemas rítmicos ...

  8. A comparison of cosmological hydrodynamic codes

    Science.gov (United States)

    Kang, Hyesung; Ostriker, Jeremiah P.; Cen, Renyue; Ryu, Dongsu; Hernquist, Lars; Evrard, August E.; Bryan, Greg L.; Norman, Michael L.

    1994-01-01

    We present a detailed comparison of the simulation results of various hydrodynamic codes. Starting with identical initial conditions based on the cold dark matter scenario for the growth of structure, with parameters h = 0.5 Omega = Omega(sub b) = 1, and sigma(sub 8) = 1, we integrate from redshift z = 20 to z = O to determine the physical state within a representative volume of size L(exp 3) where L = 64 h(exp -1) Mpc. Five indenpendent codes are compared: three of them Eulerian mesh-based and two variants of the smooth particle hydrodynamics 'SPH' Lagrangian approach. The Eulerian codes were run at N(exp 3) = (32(exp 3), 64(exp 3), 128(exp 3), and 256(exp 3)) cells, the SPH codes at N(exp 3) = 32(exp 3) and 64(exp 3) particles. Results were then rebinned to a 16(exp 3) grid with the exception that the rebinned data should converge, by all techniques, to a common and correct result as N approaches infinity. We find that global averages of various physical quantities do, as expected, tend to converge in the rebinned model, but that uncertainites in even primitive quantities such as (T), (rho(exp 2))(exp 1/2) persists at the 3%-17% level achieve comparable and satisfactory accuracy for comparable computer time in their treatment of the high-density, high-temeprature regions as measured in the rebinned data; the variance among the five codes (at highest resolution) for the mean temperature (as weighted by rho(exp 2) is only 4.5%. Examined at high resolution we suspect that the density resolution is better in the SPH codes and the thermal accuracy in low-density regions better in the Eulerian codes. In the low-density, low-temperature regions the SPH codes have poor accuracy due to statiscal effects, and the Jameson code gives the temperatures which are too high, due to overuse of artificial viscosity in these high Mach number regions. Overall the comparison allows us to better estimate errors; it points to ways of improving this current generation ofhydrodynamic

  9. Wavefront coding with adaptive optics

    Science.gov (United States)

    Agbana, Temitope E.; Soloviev, Oleg; Bezzubik, Vitalii; Patlan, Vsevolod; Verhaegen, Michel; Vdovin, Gleb

    2015-03-01

    We have implemented an extended depth of field optical system by wavefront coding with a micromachined membrane deformable mirror. This approach provides a versatile extension to standard wavefront coding based on fixed phase mask. First experimental results validate the feasibility of the use of adaptive optics for variable depth wavefront coding in imaging optical systems.

  10. Authorship Attribution of Source Code

    Science.gov (United States)

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  11. Strongly-MDS convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Rosenthal, J; Smarandache, R

    2006-01-01

    Maximum-distance separable (MDS) convolutional codes have the property that their free distance is maximal among all codes of the same rate and the same degree. In this paper, a class of MDS convolutional codes is introduced whose column distances reach the generalized Singleton bound at the earlies

  12. Improved code-tracking loop

    Science.gov (United States)

    Laflame, D. T.

    1980-01-01

    Delay-locked loop tracks pseudonoise codes without introducing dc timing errors, because it is not sensitive to gain imbalance between signal processing arms. "Early" and "late" reference codes pass in combined form through both arms, and each arm acts on both codes. Circuit accomodates 1 dB weaker input signals with tracking ability equal to that of tau-dither loops.

  13. On Maximum Lee Distance Codes

    OpenAIRE

    Alderson, Tim L.; Svenja Huntemann

    2013-01-01

    Singleton-type upper bounds on the minimum Lee distance of general (not necessarily linear) Lee codes over ℤq are discussed. Two bounds known for linear codes are shown to also hold in the general case, and several new bounds are established. Codes meeting these bounds are investigated and in some cases characterised.

  14. Coding Issues in Grounded Theory

    Science.gov (United States)

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  15. The Weights in MDS Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Sole, Patrick

    2009-01-01

    The weights in MDS codes of length n and dimension k over the finite field GF(q) are studied. Up to some explicit exceptional cases, the MDS codes with parameters given by the MDS conjecture are shown to contain all k weights in the range n-k+1 to n. The proof uses the covering radius of the dual code

  16. Coding Issues in Grounded Theory

    Science.gov (United States)

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  17. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...

  18. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...... machinery of algebraic geometry....

  19. A class of constacyclic BCH codes and new quantum codes

    Science.gov (United States)

    liu, Yang; Li, Ruihu; Lv, Liangdong; Ma, Yuena

    2017-03-01

    Constacyclic BCH codes have been widely studied in the literature and have been used to construct quantum codes in latest years. However, for the class of quantum codes of length n=q^{2m}+1 over F_{q^2} with q an odd prime power, there are only the ones of distance δ ≤ 2q^2 are obtained in the literature. In this paper, by a detailed analysis of properties of q2-ary cyclotomic cosets, maximum designed distance δ _{max} of a class of Hermitian dual-containing constacyclic BCH codes with length n=q^{2m}+1 are determined, this class of constacyclic codes has some characteristic analog to that of primitive BCH codes over F_{q^2}. Then we can obtain a sequence of dual-containing constacyclic codes of designed distances 2q^2 2q^2 can be constructed from these dual-containing codes via Hermitian Construction. These newly obtained quantum codes have better code rate compared with those constructed from primitive BCH codes.

  20. New quantum codes constructed from quaternary BCH codes

    Science.gov (United States)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  1. Structured error recovery for code-word-stabilized quantum codes

    Science.gov (United States)

    Li, Yunfan; Dumer, Ilya; Grassl, Markus; Pryadko, Leonid P.

    2010-05-01

    Code-word-stabilized (CWS) codes are, in general, nonadditive quantum codes that can correct errors by an exhaustive search of different error patterns, similar to the way that we decode classical nonlinear codes. For an n-qubit quantum code correcting errors on up to t qubits, this brute-force approach consecutively tests different errors of weight t or less and employs a separate n-qubit measurement in each test. In this article, we suggest an error grouping technique that allows one to simultaneously test large groups of errors in a single measurement. This structured error recovery technique exponentially reduces the number of measurements by about 3t times. While it still leaves exponentially many measurements for a generic CWS code, the technique is equivalent to syndrome-based recovery for the special case of additive CWS codes.

  2. On (Partial) Unit Memory Codes Based on Gabidulin Codes

    CERN Document Server

    Wachter, Antonia; Bossert, Martin; Zyablov, Victor

    2011-01-01

    (Partial) Unit Memory ((P)UM) codes provide a powerful possibility to construct convolutional codes based on block codes in order to achieve a high decoding performance. In this contribution, a construction based on Gabidulin codes is considered. This construction requires a modified rank metric, the so-called sum rank metric. For the sum rank metric, the free rank distance, the extended row rank distance and its slope are defined analogous to the extended row distance in Hamming metric. Upper bounds for the free rank distance and the slope of (P)UM codes in the sum rank metric are derived and an explicit construction of (P)UM codes based on Gabidulin codes is given, achieving the upper bound for the free rank distance.

  3. Description of Transport Codes for Space Radiation Shielding

    Science.gov (United States)

    Kim, Myung-Hee Y.; Wilson, John W.; Cucinotta, Francis A.

    2011-01-01

    This slide presentation describes transport codes and their use for studying and designing space radiation shielding. When combined with risk projection models radiation transport codes serve as the main tool for study radiation and designing shielding. There are three criteria for assessing the accuracy of transport codes: (1) Ground-based studies with defined beams and material layouts, (2) Inter-comparison of transport code results for matched boundary conditions and (3) Comparisons to flight measurements. These three criteria have a very high degree with NASA's HZETRN/QMSFRG.

  4. Lossy/lossless coding of bi-level images

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    1997-01-01

    Summary form only given. We present improvements to a general type of lossless, lossy, and refinement coding of bi-level images (Martins and Forchhammer, 1996). Loss is introduced by flipping pixels. The pixels are coded using arithmetic coding of conditional probabilities obtained using a template...... as is known from JBIG and proposed in JBIG-2 (Martins and Forchhammer). Our new state-of-the-art results are obtained using the more general free tree instead of a template. Also we introduce multiple refinement template coding. The lossy algorithm is analogous to the greedy `rate...

  5. Nanotopography applications in drug delivery

    Science.gov (United States)

    Walsh, Laura A; Allen, Jessica L; Desai, Tejal A

    2016-01-01

    Refinement of micro- and nanofabrication in the semiconductor field has led to innovations in biomedical technologies. Nanotopography, in particular, shows great potential in facilitating drug delivery. The flexibility of fabrication techniques has created a diverse array of topographies that have been developed for drug delivery applications. Nanowires and nanostraws deliver drug cytosolically for in vitro and ex vivo applications. In vivo drug delivery is limited by the barrier function of the epithelium. Nanowires on microspheres increase adhesion and residence time for oral drug delivery, while also increasing permeability of the epithelium. Low aspect ratio nanocolumns increase paracellular permeability, and in conjunction with microneedles increase transdermal drug delivery of biologics in vivo. In summary, nanotopography is a versatile tool for drug delivery. It can deliver directly to cells or be used for in vivo delivery across epithelial barriers. This editorial highlights the application of nanotopography in the field of drug delivery. PMID:26512871

  6. The natural variation of a neural code.

    Science.gov (United States)

    Kfir, Yoav; Renan, Ittai; Schneidman, Elad; Segev, Ronen

    2012-01-01

    The way information is represented by sequences of action potentials of spiking neurons is determined by the input each neuron receives, but also by its biophysics, and the specifics of the circuit in which it is embedded. Even the "code" of identified neurons can vary considerably from individual to individual. Here we compared the neural codes of the identified H1 neuron in the visual systems of two families of flies, blow flies and flesh flies, and explored the effect of the sensory environment that the flies were exposed to during development on the H1 code. We found that the two families differed considerably in the temporal structure of the code, its content and energetic efficiency, as well as the temporal delay of neural response. The differences in the environmental conditions during the flies' development had no significant effect. Our results may thus reflect an instance of a family-specific design of the neural code. They may also suggest that individual variability in information processing by this specific neuron, in terms of both form and content, is regulated genetically.

  7. Optimizing drugs for local delivery.

    Science.gov (United States)

    Collingwood, S; Lock, R; Searcey, M

    2009-12-01

    An international panel of speakers together with approximately 70 delegates were brought together by The Society for Medicines Research's symposium on Optimising Drugs for Local Delivery, held on June 11, 2009 at the Novartis Institutes for Biomedical Research, Horsham, UK. The focus of the conference was on the delivery of drugs direct to the site of action and the consequences of this delivery route on delivery technologies, formulation science and molecular design.

  8. Microprocessor controlled transdermal drug delivery.

    Science.gov (United States)

    Subramony, J Anand; Sharma, Ashutosh; Phipps, J B

    2006-07-06

    Transdermal drug delivery via iontophoresis is reviewed with special focus on the delivery of lidocaine for local anesthesia and fentanyl for patient controlled acute therapy such as postoperative pain. The role of the microprocessor controller in achieving dosimetry, alternating/reverse polarity, pre-programmed, and sensor-based delivery is highlighted. Unique features such as the use of tactile signaling, telemetry control, and pulsatile waveforms in iontophoretic drug delivery are described briefly.

  9. APPROACHES, TECHNIQUES AND EVALUATION OF GASTRORETENTIVE DRUG DELIVERY SYSTEMS: AN OVERVIEW

    OpenAIRE

    Kumar D; Saini S; Seth N; Khullar R; Sharma R

    2011-01-01

    This review explains the recent advances in gastroretentive drug delivery systems with special focus on floating drug delivery systems. Oral route is the most convenient and painless technique of drug delivery. Gastroretentive drug delivery systems have been developed which overcome physiological conditions in gastrointestinal tract such as short gastric resident time (GRT) and unpredictable gastric emptying times (GET). Various approaches used for prolonging GRT are mucoadhesive systems (Bio...

  10. Cytosolic mRNA Target and Bioavailability of Nanoparticulate siRNA delivery systems for gene silencing.

    Science.gov (United States)

    Leucuta, Sorin Emilian

    2017-03-22

    Recent research in medical and pharmaceutical sciences has benefited from advances in molecular biology and genetics, which made possible a diagnosis at the molecular level in more and more diseases. This implies the drug treatment at the molecular level. The interest in Ribonucleic acid interference (RNAi) is based on the mechanism operates by eliminating the messenger RNAs (mRNAs) coding for multiple proteins, which open solutions for treating many types of diseases. Small (short) interfering RNA (siRNA) has quickly been established as an effective gene-silencing strategy in animal models, and more recently in human clinical trials, as a potential therapeutic approach. Various nanoparticulate drug delivery systems for siRNA delivery have been explored extensively. However, there are many more barriers and challenges that need to be addressed and overcome to achieve the ideal formulation in terms of selectivity, efficacy and safety. One of the major causes of the drawback of these treatments is the difficulty to transport the nucleic acids in the cytosol and organelles. These delivery systems will favorably alter the pharmacokinetics and biodistribution of siRNAs, should be biocompatible and genocompatible to avoid immune stimulation and off-target gene effects. These properties are essential for systemic use, as they prolong siRNA half-lives in blood and increase intracellular bioavailability of siRNA. Future research needs drug delivery systems with more effective design, enhanced biological stability, subcellular bioavailability, and efficient targeted delivery in vivo for improved targeting and specificity of siRNA molecules for any given clinical condition. The paper shows how to overcome physiological barriers to achieve the target, and examples in which significant results were obtained in therapeutic in vitro and in vivo research including nanoparticulate systems.To day, only a few nanoparticle-based siRNA delivery systems have been approved by the Food

  11. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause/receive inter......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...

  12. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  13. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  14. Interface requirements for coupling a containment code to a reactor system thermal hydraulic codes

    Energy Technology Data Exchange (ETDEWEB)

    Baratta, A.J.

    1997-07-01

    To perform a complete analysis of a reactor transient, not only the primary system response but the containment response must also be accounted for. Such transients and accidents as a loss of coolant accident in both pressurized water and boiling water reactors and inadvertent operation of safety relief valves all challenge the containment and may influence flows because of containment feedback. More recently, the advanced reactor designs put forth by General Electric and Westinghouse in the US and by Framatome and Seimens in Europe rely on the containment to act as the ultimate heat sink. Techniques used by analysts and engineers to analyze the interaction of the containment and the primary system were usually iterative in nature. Codes such as RELAP or RETRAN were used to analyze the primary system response and CONTAIN or CONTEMPT the containment response. The analysis was performed by first running the system code and representing the containment as a fixed pressure boundary condition. The flows were usually from the primary system to the containment initially and generally under choked conditions. Once the mass flows and timing are determined from the system codes, these conditions were input into the containment code. The resulting pressures and temperatures were then calculated and the containment performance analyzed. The disadvantage of this approach becomes evident when one performs an analysis of a rapid depressurization or a long term accident sequence in which feedback from the containment can occur. For example, in a BWR main steam line break transient, the containment heats up and becomes a source of energy for the primary system. Recent advances in programming and computer technology are available to provide an alternative approach. The author and other researchers have developed linkage codes capable of transferring data between codes at each time step allowing discrete codes to be coupled together.

  15. What Is a Cesarean Delivery?

    Science.gov (United States)

    ... are common complications? What is a high-risk pregnancy? What is labor? What is a cesarean delivery? Other FAQs NICHD Research Information Clinical Trials Resources and Publications What is a cesarean delivery? Skip sharing on social media links Share this: Page Content A cesarean delivery ...

  16. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  17. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  18. Three Paradigms for Mixing Coding and Games: Coding in a Game, Coding as a Game, and Coding for a Game

    OpenAIRE

    2015-01-01

    Games for teaching coding have been an educational holy grail since at least the early 1980s. Yet for decades, with games more popular than ever and with the need to teach kids coding having been well-recognized, no blockbuster coding games have arisen (see Chapter 2). Over the years, the research community has made various games for teaching computer science: a survey made by shows that most do not teach coding, and of the ones that do teach coding, most are research prototypes (not produc...

  19. Remarks on generalized toric codes

    CERN Document Server

    Little, John B

    2011-01-01

    This note presents some new information on how the minimum distance of the generalized toric code corresponding to a fixed set of integer lattice points S in R^2 varies with the base field. The main results show that in some cases, over sufficiently large fields, the minimum distance of the code corresponding to a set S will be the same as that of the code corresponding to the convex hull of S. In an example, we will also discuss a [49,12,28] generalized toric code over GF(8), better than any previously known code according to M. Grassl's online tables, as of July 2011.

  20. Rotated and Scaled Alamouti Coding

    CERN Document Server

    Willems, Frans M J

    2008-01-01

    Repetition-based retransmission is used in Alamouti-modulation [1998] for $2\\times 2$ MIMO systems. We propose to use instead of ordinary repetition so-called "scaled repetition" together with rotation. It is shown that the rotated and scaled Alamouti code has a hard-decision performance which is only slightly worse than that of the Golden code [2005], the best known $2\\times 2$ space-time code. Decoding the Golden code requires an exhaustive search over all codewords, while our rotated and scaled Alamouti code can be decoded with an acceptable complexity however.

  1. On constructing disjoint linear codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Weiguo; CAI Mian; XIAO Guozhen

    2007-01-01

    To produce a highly nonlinear resilient function,the disjoint linear codes were originally proposed by Johansson and Pasalic in IEEE Trans.Inform.Theory,2003,49(2):494-501.In this paper,an effective method for finding a set of such disjoint linear codes is presented.When n≥2k,we can find a set of[n,k] disjoint linear codes with joint linear codes exists with cardinality at least 2.We also describe a result on constructing a set of [n,k] disjoint linear codes with minimum distance at least some fixed positive integer.

  2. Modeling of the vapor cycle of Laguna Verde with the PEPSE code to conditions of thermal power licensed at present (2027 MWt); Modelado del ciclo de vapor de Laguna Verde con el codigo PEPSE a condiciones de potencia termica actualmente licenciada (2027 MWt)

    Energy Technology Data Exchange (ETDEWEB)

    Castaneda G, M. A.; Maya G, F.; Medel C, J. E.; Cardenas J, J. B.; Cruz B, H. J.; Mercado V, J. J., E-mail: miguel.castaneda01@cfe.gob.mx [Comision Federal de Electricidad, Central Nucleoelectrica Laguna Verde, Carretera Cardel-Nautla Km 42.5, Veracruz (Mexico)

    2011-11-15

    By means of the use of the performance evaluation of power system efficiencies (PEPSE) code was modeled the vapor cycle of the nuclear power station of Laguna Verde to reproduce the nuclear plant behavior to conditions of thermal power, licensed at present (2027 MWt); with the purpose of having a base line before the implementation of the project of extended power increase. The model of the gauged vapor cycle to reproduce the nuclear plant conditions makes use of the PEPSE model, design case of the vapor cycle of nuclear power station of Laguna Verde, which has as main components of the model the great equipment of the vapor cycle of Laguna Verde. The design case model makes use of information about the design requirements of each equipment for theoretically calculating the electric power of exit, besides thermodynamic conditions of the vapor cycle in different points. Starting from the design model and making use of data of the vapor cycle measured in the nuclear plant; the adjustment factors were calculated for the different equipment s of the vapor cycle, to reproduce with the PEPSE model the real vapor cycle of Laguna Verde. Once characterized the model of the vapor cycle of Laguna Verde, we can realize different sensibility studies to determine the effects macros to the vapor cycle by the variation of certain key parameters. (Author)

  3. Multipoint videoconferencing with scalable video coding

    Institute of Scientific and Technical Information of China (English)

    ELEFTHERIADIS Alexandros; CIVANLAR M. Reha; SHAPIRO Ofer

    2006-01-01

    We describe a system for multipoint videoconferencing that offers extremely low end-to-end delay, low cost and complexity, and high scalability, alongside standard features associated with high-end solutions such as rate matching and personal video layout. The system accommodates heterogeneous receivers and networks based on the Internet Protocol and relies on scalable video coding to provide a coded representation of a source video signal at multiple temporal and spatial resolutions as well as quality levels. These are represented by distinct bitstream components which are created at each end-user encoder. Depending on the specific conferencing environment, some or all of these components are transmitted to a Scalable Video Conferencing Server (SVCS). The SVCS redirects these components to one or more recipients depending on, e.g., the available network conditions and user preferences. The scalable aspect of the video coding technique allows the system to adapt to different network conditions, and also accommodates different end-user requirements (e.g., a user may elect to view another user at a high or low spatial resolution). Performance results concerning flexibility, video quality and delay of the system are presented using the Joint Scalable Video Model (JSVM) of the forthcoming SVC (H.264 Annex G) standard, demonstrating that scalable coding outperforms existing state-of-the-art systems and offers the right platform for building next-generation multipoint videoconferencing systems.

  4. Assessment of the computer code COBRA/CFTL

    Energy Technology Data Exchange (ETDEWEB)

    Baxi, C. B.; Burhop, C. J.

    1981-07-01

    The COBRA/CFTL code has been developed by Oak Ridge National Laboratory (ORNL) for thermal-hydraulic analysis of simulated gas-cooled fast breeder reactor (GCFR) core assemblies to be tested in the core flow test loop (CFTL). The COBRA/CFTL code was obtained by modifying the General Atomic code COBRA*GCFR. This report discusses these modifications, compares the two code results for three cases which represent conditions from fully rough turbulent flow to laminar flow. Case 1 represented fully rough turbulent flow in the bundle. Cases 2 and 3 represented laminar and transition flow regimes. The required input for the COBRA/CFTL code, a sample problem input/output and the code listing are included in the Appendices.

  5. Orthogonal coding of object location.

    Science.gov (United States)

    Knutsen, Per Magne; Ahissar, Ehud

    2009-02-01

    It has been argued whether internal representations are encoded using a universal ('the neural code') or multiple codes. Here, we review a series of experiments that demonstrate that tactile encoding of object location via whisking employs an orthogonal, triple-code scheme. Rats, and other rodents, actively move the whiskers back and forth to localize and identify objects. Neural recordings from primary sensory afferents, along with behavioral observations, demonstrate that vertical coordinates of contacted objects are encoded by the identity of activated afferents, horizontal coordinates by the timing of activation and radial coordinates by the intensity of activation. Because these codes are mutually independent, the three-dimensional location of an object could, in principle, be encoded by individual afferents during single whisker-object contacts. One advantage of such a same-neuron-different-codes scheme over the traditionally assumed same-code-different-neurons scheme is a reduction of code ambiguity that, in turn, simplifies decoding circuits.

  6. New Codes for Spectral Amplitude Coding Optical CDMA Systems

    Directory of Open Access Journals (Sweden)

    Hassan Yousif Ahmed

    2011-03-01

    Full Text Available A new code structure with zero in-phase cross correlation for spectral amplitude coding optical code division multiple access (SAC-OCDMA system is proposed, and called zero vectors combinatorial (ZVC. This code is constructed in a simple algebraic way using Euclidean vectors and combinatorial theories based on the relationship between the number of users N and the weight W. One of the important properties of this code is that the maximum cross correlation (CC is always zero, which means that multi-user interference (MUI and phase induced intensity noise (PIIN are reduced. Bit error rate (BER performance is compared with previous reported codes. Therefore, theoretically, we demonstrate the performance of ZVC code with the related equations. In addition, the structure of the encoder/decoder based on fiber Bragg gratings (FBGs and the proposed system have been analyzed theoretically by taking into consideration the effects of some noises. The results characterizing BER with respect to the total number of active users show that ZVC code offers a significantly improved performance over previous reported codes by supporting large numbers of users at BER≥ 10-9. A comprehensive simulation study has been carried out using a commercial optical system simulator “VPI™”. Moreover, it was shown that the proposed code managed to reduce the hardware complexity and eventually the cost.

  7. Making your code citable with the Astrophysics Source Code Library

    Science.gov (United States)

    Allen, Alice; DuPrie, Kimberly; Schmidt, Judy; Berriman, G. Bruce; Hanisch, Robert J.; Mink, Jessica D.; Nemiroff, Robert J.; Shamir, Lior; Shortridge, Keith; Taylor, Mark B.; Teuben, Peter J.; Wallin, John F.

    2016-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) is a free online registry of codes used in astronomy research. With nearly 1,200 codes, it is the largest indexed resource for astronomy codes in existence. Established in 1999, it offers software authors a path to citation of their research codes even without publication of a paper describing the software, and offers scientists a way to find codes used in refereed publications, thus improving the transparency of the research. It also provides a method to quantify the impact of source codes in a fashion similar to the science metrics of journal articles. Citations using ASCL IDs are accepted by major astronomy journals and if formatted properly are tracked by ADS and other indexing services. The number of citations to ASCL entries increased sharply from 110 citations in January 2014 to 456 citations in September 2015. The percentage of code entries in ASCL that were cited at least once rose from 7.5% in January 2014 to 17.4% in September 2015. The ASCL's mid-2014 infrastructure upgrade added an easy entry submission form, more flexible browsing, search capabilities, and an RSS feeder for updates. A Changes/Additions form added this past fall lets authors submit links for papers that use their codes for addition to the ASCL entry even if those papers don't formally cite the codes, thus increasing the transparency of that research and capturing the value of their software to the community.

  8. Optimal Electrical Parameters of Transdermal Delivery of Gentiana Aqueous Solution under the Electroporation Condition%电致孔条件下秦艽水提液体内外透皮给药最优电学参数的研究

    Institute of Scientific and Technical Information of China (English)

    程昊; 杨文婧; 甄小龙; 唐斌斌; 郝保华

    2009-01-01

    目的 探索电致孔条件下秦艽水提液体外透皮给药与体内透皮给药的最优电学参数并研究其相关性.方法 采用双室扩散池,用电致孔导入仪产生多种电学参数条件,分别以离体和活体小鼠皮肤为透皮屏障进行秦艽药液电致孔条件下经皮渗透实验,以HPLC测定接收池中龙胆苦苷含量,确定最优的电学参数并考察其相关性.结果 电致孔条件下秦艽水提液体外透皮给药的最优电学参数条件为脉冲电压300 V、脉冲时间1.1 ms、波形SW、脉冲频率140个·min~(-1)、脉冲数300个;体内透皮给药的最优电学参数条件为脉冲电压300 V、脉冲时间1.2 ms、波形SW、脉冲频率140个min~(-1)、脉冲数300个,显示二者最优电学参数条件基本一致.结论 电致孔条件下秦艽水提液体外透皮与体内透皮吸收之间相关性良好,故可利用体外实验研究药物的透皮规律,与此同时进行体内研究保证临床用药安全,为开发新型透皮给药系统提供了依据.%OBJECTIVE To explore the optimal electrical parameters of the transdermal delivery of Gentiana aqueous solution in vitro and in vivo under the electroporation condition,and to study its relevance.METHODS The electrical parameters were determined using the two-chambered diffusion cell and the electroporation equipment.The percutaneous penetration experiments on Gentiana aqueous solution were performed with the ex vivo and in vivo rat skin repectively the transdemal barrier.The content of gentiopicroside in the receiving pool was measured by HPLC and the optimal electrical parameters were determined.The relevance,and the content of lactate dehydrogenase in vitro and in vivo rat skin under the electroporation condition were detected.RESULTS Under the electroporation condition,the optimal electrical parameters in vitro transdermal delivery were as follows:pulse voltage 300V,pulse duration 1.1 ms,waveform SW,pulse frequency 140 pulse·min~(-1),pulse

  9. Mucoadhesive drug delivery systems

    Directory of Open Access Journals (Sweden)

    Rahamatullah Shaikh

    2011-01-01

    Full Text Available Mucoadhesion is commonly defined as the adhesion between two materials, at least one of which is a mucosal surface. Over the past few decades, mucosal drug delivery has received a great deal of attention. Mucoadhesive dosage forms may be designed to enable prolonged retention at the site of application, providing a controlled rate of drug release for improved therapeutic outcome. Application of dosage forms to mucosal surfaces may be of benefit to drug molecules not amenable to the oral route, such as those that undergo acid degradation or extensive first-pass metabolism. The mucoadhesive ability of a dosage form is dependent upon a variety of factors, including the nature of the mucosal tissue and the physicochemical properties of the polymeric formulation. This review article aims to provide an overview of the various aspects of mucoadhesion, mucoadhesive materials, factors affecting mucoadhesion, evaluating methods, and finally various mucoadhesive drug delivery systems (buccal, nasal, ocular, gastro, vaginal, and rectal.

  10. Social video content delivery

    CERN Document Server

    Wang, Zhi; Zhu, Wenwu

    2016-01-01

    This brief presents new architecture and strategies for distribution of social video content. A primary framework for socially-aware video delivery and a thorough overview of the possible approaches is provided. The book identifies the unique characteristics of socially-aware video access and social content propagation, revealing the design and integration of individual modules that are aimed at enhancing user experience in the social network context. The change in video content generation, propagation, and consumption for online social networks, has significantly challenged the traditional video delivery paradigm. Given the massive amount of user-generated content shared in online social networks, users are now engaged as active participants in the social ecosystem rather than as passive receivers of media content. This revolution is being driven further by the deep penetration of 3G/4G wireless networks and smart mobile devices that are seamlessly integrated with online social networking and media-sharing s...

  11. Pyomyositis after vaginal delivery.

    LENUS (Irish Health Repository)

    Gaughan, Eve

    2011-01-01

    Pyomyositis is a purulent infection of skeletal muscle that arises from haematogenous spread, usually with abscess formation. It can develop after a transient bacteraemia of any cause. This type of infection has never been reported before in the literature after vaginal delivery. A 34-year-old woman had progressive severe pain in the left buttock and thigh and weakness in the left lower limb day 1 post spontaneous vaginal delivery. MRI showed severe oedema of the left gluteus, iliacus, piriformis and adductor muscles of the left thigh and a small fluid collection at the left hip joint. She was diagnosed with pyomyositis. She had fever of 37.9°C immediately postpartum and her risk factors for bacteraemia were a mild IV cannula-associated cellulitis and labour itself. She required prolonged treatment with antibiotics before significant clinical improvement was noted.

  12. Delivery strategies for antiparasitics.

    Science.gov (United States)

    Kayser, Oliver; Kiderlen, Albrecht F

    2003-02-01

    Optimisation of drug carrier systems and drug delivery strategies that take into account the peculiarities of individual infectious agents and diseases are key elements of modern drug development. In the following, different aspects of a rational design for antiparasitic drug formulation will be reviewed, covering delivery systems such as nano- and microparticles, liposomes, emulsions and microemulsions, cochleates and bioadhesive macromolecules. Functional properties for each carrier system will be discussed as well as their therapeutic efficacy for parasitic diseases, including leishmaniasis, human African trypanosomiasis, human cryptosporidiosis, malaria and schistosomiasis. Critical issues for the application of drug carrier systems will be discussed, focusing on biopharmaceutical and pathophysiological parameters such as routes of application, improvement of body distribution and targeting intracellularly persisting pathogens.

  13. Transcutaneous antigen delivery system

    Directory of Open Access Journals (Sweden)

    Mi-Young Lee

    2013-01-01

    Full Text Available Transcutaneous immunization refers to the topical applicationof antigens onto the epidermis. Transcutaneous immunizationtargeting the Langerhans cells of the skin has received muchattention due to its safe, needle-free, and noninvasive antigendelivery. The skin has important immunological functions withunique roles for antigen-presenting cells such as epidermalLangerhans cells and dermal dendritic cells. In recent years,novel vaccine delivery strategies have continually beendeveloped; however, transcutaneous immunization has not yetbeen fully exploited due to the penetration barrier representedby the stratum corneum, which inhibits the transport ofantigens and adjuvants. Herein we review recent achievementsin transcutaneous immunization, focusing on the variousstrategies for the enhancement of antigen delivery andvaccination efficacy. [BMB Reports 2013; 46(1: 17-24

  14. Transdermal Delivery of Proteins

    OpenAIRE

    Kalluri, Haripriya; Banga, Ajay K.

    2011-01-01

    Transdermal delivery of peptides and proteins avoids the disadvantages associated with the invasive parenteral route of administration and other alternative routes such as the pulmonary and nasal routes. Since proteins have a large size and are hydrophilic in nature, they cannot permeate passively across the skin due to the stratum corneum which allows the transport of only small lipophilic drug molecules. Enhancement techniques such as chemical enhancers, iontophoresis, microneedles, electro...

  15. Subspace Properties of Network Coding and their Applications

    CERN Document Server

    Siavoshani, Mahdi Jafari; Diggavi, Suhas

    2011-01-01

    Systems that employ network coding for content distribution convey to the receivers linear combinations of the source packets. If we assume randomized network coding, during this process the network nodes collect random subspaces of the space spanned by the source packets. We establish several fundamental properties of the random subspaces induced in such a system, and show that these subspaces implicitly carry topological information about the network and its state that can be passively collected and inferred. We leverage this information towards a number of applications that are interesting in their own right, such as topology inference, bottleneck discovery in peer-to-peer systems and locating Byzantine attackers. We thus argue that, randomized network coding, apart from its better known properties for improving information delivery rate, can additionally facilitate network management and control.

  16. On Bounded Weight Codes

    CERN Document Server

    Bachoc, Christine; Cohen, Gerard; Sole, Patrick; Tchamkerten, Aslan

    2010-01-01

    The maximum size of a binary code is studied as a function of its length N, minimum distance D, and minimum codeword weight W. This function B(N,D,W) is first characterized in terms of its exponential growth rate in the limit as N tends to infinity for fixed d=D/N and w=W/N. The exponential growth rate of B(N,D,W) is shown to be equal to the exponential growth rate of A(N,D) for w <= 1/2, and equal to the exponential growth rate of A(N,D,W) for 1/2< w <= 1. Second, analytic and numerical upper bounds on B(N,D,W) are derived using the semidefinite programming (SDP) method. These bounds yield a non-asymptotic improvement of the second Johnson bound and are tight for certain values of the parameters.

  17. Homomorphic encryption from codes

    CERN Document Server

    Bogdanov, Andrej

    2011-01-01

    We propose a new homomorphic encryption scheme based on the hardness of decoding under independent random noise from certain affine families of codes. Unlike in previous lattice-based homomorphic encryption schemes, where the message is hidden in the noisy part of the ciphertext, our scheme carries the message in the affine part of the transformation and applies noise only to achieve security. Our scheme can tolerate noise of arbitrary magnitude, as long as the noise vector has sufficiently small hamming weight (and its entries are independent). Our design achieves "proto-homomorphic" properties in an elementary manner: message addition and multiplication are emulated by pointwise addition and multiplication of the ciphertext vectors. Moreover, the extremely simple nature of our decryption makes the scheme easily amenable to bootstrapping. However, some complications are caused by the inherent presence of noticeable encryption error. Our main technical contribution is the development of two new techniques for...

  18. LDGM Codes for Channel Coding and Joint Source-Channel Coding of Correlated Sources

    Directory of Open Access Journals (Sweden)

    Javier Garcia-Frias

    2005-05-01

    Full Text Available We propose a coding scheme based on the use of systematic linear codes with low-density generator matrix (LDGM codes for channel coding and joint source-channel coding of multiterminal correlated binary sources. In both cases, the structures of the LDGM encoder and decoder are shown, and a concatenated scheme aimed at reducing the error floor is proposed. Several decoding possibilities are investigated, compared, and evaluated. For different types of noisy channels and correlation models, the resulting performance is very close to the theoretical limits.

  19. FACTAR 2.0 code validation

    Energy Technology Data Exchange (ETDEWEB)

    Middleton, P.B.; Rock, R.C.K.; Wadsworth, S.L. [Ontario Hydro, Reactor Safety and Operational Analysis Dept., Toronto, Ontario (Canada)

    1997-07-01

    The FACTAR code models the thermal and mechanical behaviour of a CANDU fuel channel under degraded cooling conditions. FACTAR is currently undergoing a process of validation against various data sets in order to qualify its use in nuclear safety analysis. This paper outlines the methodology being followed in this effort. The BTF-104 and BTF-105A tests, conducted at Chalk River Laboratories, have been chosen as the first in reactor tests to be used for FACTAR validation. The BTF experiments were designed to represent CANDU fuel behaviour under typical large LOCA conditions. The two tests are summarized briefly, and the results of code comparisons to experimental data are outlined. The comparisons demonstrate that FACTAR is able to accurately predict the values of selected key parameters. As anticipated in the validation plan, further work is required to fully quantify simulation biases for all parameters of interest. (author)

  20. Deterministic mediated superdense coding with linear optics

    Energy Technology Data Exchange (ETDEWEB)

    Pavičić, Mladen, E-mail: mpavicic@physik.hu-berlin.de [Department of Physics—Nanooptics, Faculty of Mathematics and Natural Sciences, Humboldt University of Berlin (Germany); Center of Excellence for Advanced Materials and Sensing Devices (CEMS), Photonics and Quantum Optics Unit, Ruđer Bošković Institute, Zagreb (Croatia)

    2016-02-22

    We present a scheme of deterministic mediated superdense coding of entangled photon states employing only linear-optics elements. Ideally, we are able to deterministically transfer four messages by manipulating just one of the photons. Two degrees of freedom, polarization and spatial, are used. A new kind of source of heralded down-converted photon pairs conditioned on detection of another pair with an efficiency of 92% is proposed. Realistic probabilistic experimental verification of the scheme with such a source of preselected pairs is feasible with today's technology. We obtain the channel capacity of 1.78 bits for a full-fledged implementation. - Highlights: • Deterministic linear optics mediated superdense coding is proposed. • Two degrees of freedom, polarization and spatial, are used. • Heralded source of conditioned entangled photon pairs, 92% efficient, is proposed.

  1. Improved lossless intra coding for next generation video coding

    Science.gov (United States)

    Vanam, Rahul; He, Yuwen; Ye, Yan

    2016-09-01

    Recently, there have been efforts by the ITU-T VCEG and ISO/IEC MPEG to further improve the compression performance of the High Efficiency Video Coding (HEVC) standard for developing a potential next generation video coding standard. The exploratory codec software of this potential standard includes new coding tools for inter and intra coding. In this paper, we present a new intra prediction mode for lossless intra coding. Our new intra mode derives a prediction filter for each input pixel using its neighboring reconstructed pixels, and applies this filter to the nearest neighboring reconstructed pixels to generate a prediction pixel. The proposed intra mode is demonstrated to improve the performance of the exploratory software for lossless intra coding, yielding a maximum and average bitrate savings of 4.4% and 2.11%, respectively.

  2. Analysis of Market Opportunities for Chinese Private Express Delivery Industry

    Science.gov (United States)

    Jiang, Changbing; Bai, Lijun; Tong, Xiaoqing

    China's express delivery market has become the arena in which each express enterprise struggles to chase due to the huge potential demand and high profitable prospects. So certain qualitative and quantitative forecast for the future changes of China's express delivery market will help enterprises understand various types of market conditions and social changes in demand and adjust business activities to enhance their competitiveness timely. The development of China's express delivery industry is first introduced in this chapter. Then the theoretical basis of the regression model is overviewed. We also predict the demand trends of China's express delivery market by using Pearson correlation analysis and regression analysis from qualitative and quantitative aspects, respectively. Finally, we draw some conclusions and recommendations for China's express delivery industry.

  3. CodeSlinger: a case study in domain-driven interactive tool design for biomedical coding scheme exploration and use.

    Science.gov (United States)

    Flowers, Natalie L

    2010-01-01

    CodeSlinger is a desktop application that was developed to aid medical professionals in the intertranslation, exploration, and use of biomedical coding schemes. The application was designed to provide a highly intuitive, easy-to-use interface that simplifies a complex business problem: a set of time-consuming, laborious tasks that were regularly performed by a group of medical professionals involving manually searching coding books, searching the Internet, and checking documentation references. A workplace observation session with a target user revealed the details of the current process and a clear understanding of the business goals of the target user group. These goals drove the design of the application's interface, which centers on searches for medical conditions and displays the codes found in the application's database that represent those conditions. The interface also allows the exploration of complex conceptual relationships across multiple coding schemes.

  4. Selection of Code and Interleaver for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1998-01-01

    The selection of component codes for turbo coding has often been based on the performance at high SNR's. However, we will argue that the selection mainly should be based on the performance at low SNR's, i.e. the convergence properties. Further, we will present a way to construct interleavers...... that significantly improve the performance of the turbo coding scheme at high SNR's, i.e. lowers the error floor...

  5. Superimposed Code Theorectic Analysis of DNA Codes and DNA Computing

    Science.gov (United States)

    2010-03-01

    Bounds for DNA Codes Based on Fibonacci Ensembles of DNA Sequences ”, 2008 IEEE Proceedings of International Symposium on Information Theory, pp. 2292...5, June 2008, pp. 525-34. 32 28. A. Macula, et al., “Random Coding Bounds for DNA Codes Based on Fibonacci Ensembles of DNA Sequences ”, 2008...combinatorial method of bio-memory design and detection that encodes item or process information as numerical sequences represented in DNA. ComDMem is a

  6. Coding for Correlated Sources with Unknown Parameters.

    Science.gov (United States)

    1980-05-01

    A 1 (pl) is used, and hence a coding technique which gives o mal performance is easily obtained. This is not the case with the F ’ian- Wolf problem...consider conditional distributions wl, w2, w3 defined by wl( OjO ) w1 (0O0) = w2 (lll) = .5, w1 (l) = w2 (0l0) = 1, and Wa3(UIV ) [ Wl (UIV ) +w 2(ujvl

  7. Variable weight Khazani-Syed code using hybrid fixed-dynamic technique for optical code division multiple access system

    Science.gov (United States)

    Anas, Siti Barirah Ahmad; Seyedzadeh, Saleh; Mokhtar, Makhfudzah; Sahbudin, Ratna Kalos Zakiah

    2016-10-01

    Future Internet consists of a wide spectrum of applications with different bit rates and quality of service (QoS) requirements. Prioritizing the services is essential to ensure that the delivery of information is at its best. Existing technologies have demonstrated how service differentiation techniques can be implemented in optical networks using data link and network layer operations. However, a physical layer approach can further improve system performance at a prescribed received signal quality by applying control at the bit level. This paper proposes a coding algorithm to support optical domain service differentiation using spectral amplitude coding techniques within an optical code division multiple access (OCDMA) scenario. A particular user or service has a varying weight applied to obtain the desired signal quality. The properties of the new code are compared with other OCDMA codes proposed for service differentiation. In addition, a mathematical model is developed for performance evaluation of the proposed code using two different detection techniques, namely direct decoding and complementary subtraction.

  8. Yeast-mediated mRNA delivery polarizes immuno-suppressive macrophages towards an immuno-stimulatory phenotype.

    Science.gov (United States)

    Seif, Michelle; Hoppstädter, Jessica; Breinig, Frank; Kiemer, Alexandra K

    2017-08-01

    Macrophages have increasingly gained interest as a therapeutic target since they represent an integral component of the tumor microenvironment. In fact, M2 macrophage accumulation in solid tumors is associated with poor prognosis and therapy failure. Therefore, reprogramming M2 macrophages towards an M1 phenotype with anti-tumor activity by gene therapy represents a promising therapeutic approach. Herein, we describe recombinant Saccharomyces cerevisiae as a novel gene delivery vehicle for primary human macrophages. Opsonized S. cerevisiae was taken up efficiently by M2 macrophages and initiated the expression of pro-inflammatory cytokines. Recombinant yeast delivered functional nucleic acids to macrophages, especially when constitutively biosynthesized mRNA was used as cargo. Interestingly, expression of the protein encoded for by the delivered nucleic acid was higher in M2 cells when compared to M1 macrophages. Finally, the delivery of mRNA coding for the pro-inflammatory regulators MYD88 and TNF to M2 macrophages induced a prolonged upregulation of pro-inflammatory and cytotoxic cytokines in these cells, suggesting their successful re-education towards an anti-tumor M1 phenotype. Our results suggest the use of yeast-based gene delivery as a promising approach for the treatment of pathologic conditions that may benefit from the presence of M1-polarized macrophages, such as cancer. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Using a non-invasive technique in nutrition: synchrotron radiation infrared microspectroscopy spectroscopic characterization of oil seeds treated with different processing conditions on molecular spectral factors influencing nutrient delivery.

    Science.gov (United States)

    Zhang, Xuewei; Yu, Peiqiang

    2014-07-02

    Non-invasive techniques are a key to study nutrition and structure interaction. Fourier transform infrared microspectroscopy coupled with a synchrotron radiation source (SR-IMS) is a rapid, non-invasive, and non-destructive bioanalytical technique. To understand internal structure changes in relation to nutrient availability in oil seed processing is vital to find optimal processing conditions. The objective of this study was to use a synchrotron-based bioanalytical technique SR-IMS as a non-invasive and non-destructive tool to study the effects of heat-processing methods and oil seed canola type on modeled protein structure based on spectral data within intact tissue that were randomly selected and quantify the relationship between the modeled protein structure and protein nutrient supply to ruminants. The results showed that the moisture heat-related processing significantly changed (p0.05) in the protein spectral profile between the raw and dry-heated canola tissue and between yellow- and brown-type canola tissue. The results indicated that different heat processing methods have different impacts on the protein inherent structure. The protein intrinsic structure in canola seed tissue was more sensitive and more response to the moisture heating in comparison to the dry heating. These changes are expected to be related to the nutritive value. However, the current study is based on limited samples, and more large-scale studies are needed to confirm our findings.

  10. Pregnancy and Vaginal Delivery after Sacrohysteropexy

    Directory of Open Access Journals (Sweden)

    Deniz Balsak

    2015-01-01

    Full Text Available Pregnancy and birth after a Pelvic Organ Prolapse (POP surgery is a rare condition and less is known about the method for delivery. A 31-year-old women with gravida 3 para 3 underwent abdominal sacrohysteropexy and transobturatuar tape (TOT procedures for stage III prolapse who delivered via vaginal birth and showed no relapse. Sacrohysteropexy is a good option for women with POP who desire fertility with a long term follow-up period.

  11. Mesenteric venous thrombosis following vaginal delivery

    Directory of Open Access Journals (Sweden)

    Roopa Sachidananda

    2013-01-01

    Full Text Available Acute abdomen following an uneventful vaginal delivery is a rare occurrence. Diagnosis may be delayed due to pregnancy related comorbid conditions such as preeclampsia, hemolysis elevated, liver enzymes, low platelet (HELLP count syndrome, acute fatty liver of pregnancy (AFLP, etc. We describe a 21-year-old woman with pre-eclampsia, HELLP syndrome and AFLP with acute abdomen that was managed successfully in our intensive care unit.

  12. Practices in Code Discoverability: Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysical source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL (http://ascl.net) has on average added 19 new codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available ei...

  13. An information theoretic approach to use high-fidelity codes to calibrate low-fidelity codes

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Allison, E-mail: lewis.allison10@gmail.com [Department of Mathematics, North Carolina State University, Raleigh, NC 27695 (United States); Smith, Ralph [Department of Mathematics, North Carolina State University, Raleigh, NC 27695 (United States); Williams, Brian [Los Alamos National Laboratory, Los Alamos, NM 87545 (United States); Figueroa, Victor [Sandia National Laboratories, Albuquerque, NM 87185 (United States)

    2016-11-01

    For many simulation models, it can be prohibitively expensive or physically infeasible to obtain a complete set of experimental data to calibrate model parameters. In such cases, one can alternatively employ validated higher-fidelity codes to generate simulated data, which can be used to calibrate the lower-fidelity code. In this paper, we employ an information-theoretic framework to determine the reduction in parameter uncertainty that is obtained by evaluating the high-fidelity code at a specific set of design conditions. These conditions are chosen sequentially, based on the amount of information that they contribute to the low-fidelity model parameters. The goal is to employ Bayesian experimental design techniques to minimize the number of high-fidelity code evaluations required to accurately calibrate the low-fidelity model. We illustrate the performance of this framework using heat and diffusion examples, a 1-D kinetic neutron diffusion equation, and a particle transport model, and include initial results from the integration of the high-fidelity thermal-hydraulics code Hydra-TH with a low-fidelity exponential model for the friction correlation factor.

  14. Adaptive Cooperative FEC Based on Combination of Network Coding and Channel Coding for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yong Jin

    2014-02-01

    Full Text Available The data delivery over wireless links with QoS-guarantee is a big challenge because of the unreliable and dynamic characteristics of wireless sensor networks, as well as QoS diversity requirements of applications. In this paper, we propose an adaptive cooperative Forward Error Correction algorithm based on network coding, in the hope quality of experience could be satisfied on receivers with high quality. The algorithm, based on wireless link and distance, adjusts the RS coder parameter and selects the optimal relay nodes. On the other hand, we combine the channel coding and network coding technology at the data link layer to fulfil the requirements of QoS diversity. Both mathematical analysis and NS simulation results demonstrate the proposed mechanism is superior to the traditional FEC and cooperative FEC alone at the reliability, real time performance and energy efficiency. In addition, the proposed mechanism can significantly improve quality of media streaming, in terms of playable frame rate on the receiving side. 

  15. Retrotransposon vectors for gene delivery in plants

    Directory of Open Access Journals (Sweden)

    Hou Yi

    2010-08-01

    Full Text Available Abstract Background Retrotransposons are abundant components of plant genomes, and although some plant retrotransposons have been used as insertional mutagens, these mobile genetic elements have not been widely exploited for plant genome manipulation. In vertebrates and yeast, retrotransposons and retroviruses are routinely altered to carry additional genes that are copied into complementary (cDNA through reverse transcription. Integration of cDNA results in gene delivery; recombination of cDNA with homologous chromosomal sequences can create targeted gene modifications. Plant retrotransposon-based vectors, therefore, may provide new opportunities for plant genome engineering. Results A retrotransposon vector system was developed for gene delivery in plants based on the Tnt1 element from Nicotiana tabacum. Mini-Tnt1 transfer vectors were constructed that lack coding sequences yet retain the 5' and 3' long terminal repeats (LTRs and adjacent cis sequences required for reverse transcription. The internal coding region of Tnt1 was replaced with a neomycin phosphotransferase gene to monitor replication by reverse transcription. Two different mini-Tnt1 s were developed: one with the native 5' LTR and the other with a chimeric 5' LTR that had the first 233 bp replaced by the CaMV 35 S promoter. After transfer into tobacco protoplasts, both vectors undergo retrotransposition using GAG and POL proteins provided in trans by endogenous Tnt1 elements. The transposition frequencies of mini-Tnt1 vectors are comparable with native Tnt1 elements, and like the native elements, insertion sites are within or near coding sequences. In this paper, we provide evidence that template switching occurs during mini-Tnt1 reverse transcription, indicating that multiple copies of Tnt1 mRNA are packaged into virus-like particles. Conclusions Our data demonstrate that mini-Tnt1 vectors can replicate efficiently in tobacco cells using GAG and POL proteins provided in trans by

  16. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory textto algebraic coding theory. In the first chapter, you'll gain insideknowledge of coding fundamentals, which is essential for a deeperunderstanding of state-of-the-art coding systems.This book is a quick reference for those who are unfamiliar withthis topic, as well as for use with specific applications such as cryptographyand communication. Linear error-correcting block codesthrough elementary principles span eleven chapters of the text.Cyclic codes, some finite field algebra, Goppa codes, algebraic decodingalgorithms, and applications in public-key cryptography andsecret-key cryptography are discussed, including problems and solutionsat the end of each chapter. Three appendices cover the Gilbertbound and some related derivations, a derivation of the Mac-Williams' identities based on the probability of undetected error,and two important tools for algebraic decoding-namely, the finitefield Fourier transform and the Euclidean algorithm for polynomials.

  17. BILINEAR FORMS AND LINEAR CODES

    Institute of Scientific and Technical Information of China (English)

    高莹

    2004-01-01

    Abraham Lempel et al[1] made a connection between linear codes and systems of bilinear forms over finite fields. In this correspondence, a new simple proof of a theorem in [1] is presented; in addition, the encoding process and the decoding procedure of RS codes are simplified via circulant matrices. Finally, the results show that the correspondence between bilinear forms and linear codes is not unique.

  18. Error correcting coding for OTN

    DEFF Research Database (Denmark)

    Justesen, Jørn; Larsen, Knud J.; Pedersen, Lars A.

    2010-01-01

    Forward error correction codes for 100 Gb/s optical transmission are currently receiving much attention from transport network operators and technology providers. We discuss the performance of hard decision decoding using product type codes that cover a single OTN frame or a small number...... of such frames. In particular we argue that a three-error correcting BCH is the best choice for the component code in such systems....

  19. High performance scalable image coding

    Institute of Scientific and Technical Information of China (English)

    Gan Tao; He Yanmin; Zhu Weile

    2007-01-01

    A high performance scalable image coding algorithm is proposed. The salient features of this algorithm are the ways to form and locate the significant clusters. Thanks to the list structure, the new coding algorithm achieves fine fractional bit-plane coding with negligible additional complexity. Experiments show that it performs comparably or better than the state-of-the-art coders. Furthermore, the flexible codec supports both quality and resolution scalability, which is very attractive in many network applications.

  20. Code Speed Measuring for VC++

    Science.gov (United States)

    2015-10-01

    UNCLASSIFIED AD-E403 688 Technical Report ARWSE-TR-14025 CODE SPEED MEASURING FOR VC++ Tom Nealis...TYPE Final 3. DATES COVERED (From – To) 4. TITLE AND SUBTITLE CODE SPEED MEASURING FOR VC++ 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...ABSTRACT It’s often important to know how fast a snippet of code executes. This information allows the coder to make important decisions

  1. ACE spectrum of LDPC codes

    Directory of Open Access Journals (Sweden)

    Vukobratović Dejan

    2006-01-01

    Full Text Available Construction of short-length LDPC codes with good, both waterfall and error-floor, behavior is still an attractive research problem. Recently proposed construction algorithms in this field are based on remarkably simple ideas, but yet, their effectiveness can still be questioned. In this paper we investigate a novel measure of goodness of a given LDPC code namely its ACE spectrum, based on a previously introduced ACE metrics associated with each cycle in LDPC code graph.

  2. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  3. Polymethacrylate microparticles gel for topical drug delivery.

    Science.gov (United States)

    Labouta, Hagar Ibrahim; El-Khordagui, Labiba K

    2010-10-01

    Evaluating the potentials of particulate delivery systems in topical drug delivery. Polymethacrylate microparticles (MPs) incorporating verapamil hydrochloride (VRP) as a model hydrophilic drug with potential topical clinical uses, using Eudragit RS100 and Eudragit L100 were prepared for the formulation of a composite topical gel. The effect of initial drug loading, polymer composition, particularly the proportion of Eudragit L100 as an interacting polymer component and the HLB of the dispersing agent on MPs characteristics was investigated. A test MPs formulation was incorporated in gel and evaluated for drug release and human skin permeation. MPs showed high % incorporation efficiency and % yield. Composition of the hybrid polymer matrix was a main determinant of MPs characteristics, particularly drug release. Factors known to influence drug release such as MPs size and high drug solubility were outweighed by strong VRP-Eudragit L100 interaction. The developed MPs gel showed controlled VRP release and reduced skin retention compared to a free drug gel. Topical drug delivery and skin retention could be modulated using particulate delivery systems. From a practical standpoint, the VRP gel developed may offer advantage in a range of dermatological conditions, in response to the growing off-label topical use of VRP.

  4. A Low-Jitter Wireless Transmission Based on Buffer Management in Coding-Aware Routing

    Directory of Open Access Journals (Sweden)

    Cunbo Lu

    2015-08-01

    Full Text Available It is significant to reduce packet jitter for real-time applications in a wireless network. Existing coding-aware routing algorithms use the opportunistic network coding (ONC scheme in a packet coding algorithm. The ONC scheme never delays packets to wait for the arrival of a future coding opportunity. The loss of some potential coding opportunities may degrade the contribution of network coding to jitter performance. In addition, most of the existing coding-aware routing algorithms assume that all flows participating in the network have equal rate. This is unrealistic, since multi-rate environments often appear. To overcome the above problem and expand coding-aware routing to multi-rate scenarios, from the view of data transmission, we present a low-jitter wireless transmission algorithm based on buffer management (BLJCAR, which decides packets in coding node according to the queue-length based threshold policy instead of the regular ONC policy as used in existing coding-aware routing algorithms. BLJCAR is a unified framework to merge the single rate case and multiple rate case. Simulations results show that the BLJCAR algorithm embedded in coding-aware routing outperforms the traditional ONC policy in terms of jitter, packet delivery delay, packet loss ratio and network throughput in network congestion in any traffic rates.

  5. Astrophysics Source Code Library Enhancements

    CERN Document Server

    Hanisch, Robert J; Berriman, G Bruce; DuPrie, Kimberly; Mink, Jessica; Nemiroff, Robert J; Schmidt, Judy; Shamir, Lior; Shortridge, Keith; Taylor, Mark; Teuben, Peter J; Wallin, John

    2014-01-01

    The Astrophysics Source Code Library (ASCL; ascl.net) is a free online registry of codes used in astronomy research; it currently contains over 900 codes and is indexed by ADS. The ASCL has recently moved a new infrastructure into production. The new site provides a true database for the code entries and integrates the WordPress news and information pages and the discussion forum into one site. Previous capabilities are retained and permalinks to ascl.net continue to work. This improvement offers more functionality and flexibility than the previous site, is easier to maintain, and offers new possibilities for collaboration. This presentation covers these recent changes to the ASCL.

  6. Multiple Beamforming with Perfect Coding

    CERN Document Server

    Li, Boyu

    2011-01-01

    In Singular Value Decomposition (SVD) beamforming, without channel coding, there is a trade-off between full diversity and full multiplexing. Adding channel coding, full diversity and full multiplexing can be both achieved, as long as the code rate Rc and the number of subchannels S satisfy RcS1. Recently discovered Perfect Space-Time Block Codes (PSTBCs) are full-rate full-diversity space-time codes, achieving maximum coding gain. In this paper, two novel techniques, Perfect Coded Multiple Beamforming (PCMB) and Bit-Interleaved Coded Multiple Beamforming with Perfect Coding (BICMB-PC), are proposed, employing PSTBCs. PCMB achieves full diversity, full multiplexing, and full rate simultaneously, and its performance is close to PSTBC and FPMB, while the decoding complexity is significantly less than PSTBC and much lower than FPMB of dimensions 2 and 4. On the other hand, BICMB-PC achieves both full diversity and full multiplexing, and its performance is similar to BICMB-FP, but provides much lower decoding com...

  7. Automatic code generation in practice

    DEFF Research Database (Denmark)

    Adam, Marian Sorin; Kuhrmann, Marco; Schultz, Ulrik Pagh

    2016-01-01

    -specific language to specify those requirements and to allow for generating a safety-enforcing layer of code, which is deployed to the robot. The paper at hand reports experiences in practically applying code generation to mobile robots. For two cases, we discuss how we addressed challenges, e.g., regarding weaving...... code generation into proprietary development environments and testing of manually written code. We find that a DSL based on the same conceptual model can be used across different kinds of hardware modules, but a significant adaptation effort is required in practical scenarios involving different kinds...

  8. Should you learn to code?

    CERN Document Server

    Team, The Hyperink

    2013-01-01

    On May 15, 2012 Jeff Atwood (co-founder of Stack Overflow) published a blog post titled "Please Don't Learn to Code" in response to Mayor Mike Bloomberg's resolution to learn how to code in 2012. In that post he argues against "learning to code just for the sake of learning how to code," a sentiment that sparked an active online debate. This book is a compilation of several different perspectives on that debate. Should programming be taught to every student as part of their core curriculum, similar to mathematics, reading, and writing? Should every working professional take time to learn a

  9. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions...... with a maximal number of -rational points for a given spanning dimension. We study the case and give a conjecture for general . We also define Schubert union codes in general, and study the parameters and support weights of these codes....

  10. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  11. Multifunctional Nanoparticles for Drug Delivery Applications Imaging, Targeting, and Delivery

    CERN Document Server

    Prud'homme, Robert

    2012-01-01

    This book clearly demonstrates the progression of nanoparticle therapeutics from basic research to applications. Unlike other books covering nanoparticles used in medical applications, Multifunctional Nanoparticles for Drug Delivery Applications presents the medical challenges that can be reduced or even overcome by recent advances in nanoscale drug delivery. Each chapter highlights recent progress in the design and engineering of select multifunctional nanoparticles with topics covering targeting, imaging, delivery, diagnostics, and therapy.

  12. Validation uncertainty of MATRA code for subchannel void distributions

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, Dae-Hyun; Kim, S. J.; Kwon, H.; Seo, K. W. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-10-15

    To extend code capability to the whole core subchannel analysis, pre-conditioned Krylov matrix solvers such as BiCGSTAB and GMRES are implemented in MATRA code as well as parallel computing algorithms using MPI and OPENMP. It is coded by fortran 90, and has some user friendly features such as graphic user interface. MATRA code was approved by Korean regulation body for design calculation of integral-type PWR named SMART. The major role subchannel code is to evaluate core thermal margin through the hot channel analysis and uncertainty evaluation for CHF predictions. In addition, it is potentially used for the best estimation of core thermal hydraulic field by incorporating into multiphysics and/or multi-scale code systems. In this study we examined a validation process for the subchannel code MATRA specifically in the prediction of subchannel void distributions. The primary objective of validation is to estimate a range within which the simulation modeling error lies. The experimental data for subchannel void distributions at steady state and transient conditions was provided on the framework of OECD/NEA UAM benchmark program. The validation uncertainty of MATRA code was evaluated for a specific experimental condition by comparing the simulation result and experimental data. A validation process should be preceded by code and solution verification. However, quantification of verification uncertainty was not addressed in this study. The validation uncertainty of the MATRA code for predicting subchannel void distribution was evaluated for a single data point of void fraction measurement at a 5x5 PWR test bundle on the framework of OECD UAM benchmark program. The validation standard uncertainties were evaluated as 4.2%, 3.9%, and 2.8% with the Monte-Carlo approach at the axial levels of 2216 mm, 2669 mm, and 3177 mm, respectively. The sensitivity coefficient approach revealed similar results of uncertainties but did not account for the nonlinear effects on the

  13. Metrology for drug delivery.

    Science.gov (United States)

    Lucas, Peter; Klein, Stephan

    2015-08-01

    In various recently published studies, it is argued that there are underestimated risks with infusion technology, i.e., adverse incidents believed to be caused by inadequate administration of the drugs. This is particularly the case for applications involving very low-flow rates, i.e., metrological infrastructure for low-flow rates. Technical challenges such as these were the reason a European research project "Metrology for Drug Delivery" was started in 2011. In this special issue of Biomedical Engineering, the results of that project are discussed.

  14. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  15. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-04-11

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaickingand 4D light field view synthesis.

  16. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  17. The KIDTALK Behavior and Language Code: Manual and Coding Protocol.

    Science.gov (United States)

    Delaney, Elizabeth M.; Ezell, Sara S.; Solomon, Ned A.; Hancock, Terry B.; Kaiser, Ann P.

    Developed as part of the Milieu Language Teaching Project at the John F. Kennedy Center at Vanderbilt University in Nashville, Tennessee, this KIDTALK Behavior-Language Coding Protocol and manual measures behavior occurring during adult-child interactions. The manual is divided into 5 distinct sections: (1) the adult behavior codes describe…

  18. Coded Path Protection: Efficient Conversion of Sharing to Coding

    CERN Document Server

    Avci, Serhat Nazim

    2011-01-01

    Link failures in wide area networks are common and cause significant data losses. Mesh-based protection schemes offer high capacity efficiency but they are slow and require complex signaling. Additionally, real-time reconfiguration of a cross-connect threatens their transmission integrity. On the other hand, coding-based protection schemes are proactive. Therefore, they have higher restoration speed, lower signaling complexity, and higher transmission integrity. This paper introduces a coding-based protection scheme, named Coded Path Protection (CPP). In CPP, a backup copy of the primary data is encoded with other data streams, resulting in capacity savings. This paper presents an optimal and simple capacity placement and coding group formation algorithm. The algorithm converts the sharing structure of any solution of a Shared Path Protection (SPP) technique into a coding structure with minimum extra capacity. We conducted quantitative and qualitative comparisons of our technique with the SPP and, another tec...

  19. Developmental changes in hippocampal associative coding.

    Science.gov (United States)

    Goldsberry, Mary E; Kim, Jangjin; Freeman, John H

    2015-03-11

    Behavioral analyses of the ontogeny of memory have shown that hippocampus-dependent learning emerges relatively late in postnatal development compared with simple associative learning. Maturation of hippocampal mnemonic mechanisms has been hypothesized to underlie the development of the later emerging learning processes. However, the role of hippocampal maturation in learning has not been examined directly. The goal of the present study was to examine developmental changes in hippocampal neuronal coding during acquisition of a hippocampus-dependent learning task. We recorded activity from CA1 pyramidal cells in rat pups while they were trained on trace eyeblink conditioning. Trace eyeblink conditioning is a Pavlovian conditioning task that involves the association of a conditioned stimulus (CS) with an unconditioned stimulus over a stimulus-free trace interval. The inclusion of the trace interval is what makes the task hippocampus dependent. In the present study, rats were trained at 21-23, 24-26, and 31-33 d of age. Previous research from our laboratory and others shows that trace conditioning begins to emerge during the third postnatal week. The results indicate that hippocampal neurons show a substantial increase in responsiveness to task-relevant events during development. Moreover, there is an age-related increase in the proportion of neurons that respond to a combination of trial events (e.g., CS and trace). Our findings indicate that the developmental emergence of hippocampally mediated learning is related to increases in the strength and complexity of CA1 associative coding.

  20. An Autotrophic Origin for the Coded Amino Acids is Concordant with the Coevolution Theory of the Genetic Code.

    Science.gov (United States)

    Di Giulio, Massimo

    2016-10-01

    The coevolution theory of the origin of the genetic code maintains that the biosynthetic relationships between amino acids co-evolved with the genetic code organization. In other words, the metabolism of amino acids co-evolved with the organization of the genetic code because the biosynthetic pathways of amino acids occurred on tRNA-like molecules. Thus, a heterotrophic origin of amino acids-also only of those involved in the early phase of the structuring of the genetic code-would seem to contradict the main postulate of the coevolution theory. As a matter of fact, this origin not being linked to the metabolism of amino acids in any way-being taken from a physical setting-would seem to remove the possibility that this metabolism had instead heavily contributed to the structuring of the genetic code. Therefore, I have analyzed the structure of the genetic code and mechanisms that brought to its structuring for understanding if the coevolution theory is compatible with autotrophic or heterotrophic conditions. One of the arguments was that an autotrophic origin of amino acids would have the advantage to be able to directly link their metabolism to the structure of the genetic code if-as hypothesized by the coevolution theory-the biosyntheses of amino acids occurred on tRNA-like molecules. Simultaneously, a heterotrophic origin would not have been able to link the metabolism of amino acids to the structure of the genetic code for the absence of a precise determinism of allocation of amino acids, that is to say of a clear mechanism-linked to tRNA-like molecules, for example-that would have determined the specific pattern observed in the genetic code of the biosynthetic relationships between amino acids. The conclusion is that an autotrophic origin of coded amino acids would seem to be the condition under which the genetic code originated.

  1. Allele coding in genomic evaluation

    Directory of Open Access Journals (Sweden)

    Christensen Ole F

    2011-06-01

    Full Text Available Abstract Background Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. Results Theoretical derivations showed that parameter estimates and estimated marker effects in marker-based models are the same irrespective of the allele coding, provided that the model has a fixed general mean. For the equivalent models, the same results hold, even though different allele coding methods lead to different genomic relationship matrices. Calculated genomic breeding values are independent of allele coding when the estimate of the general mean is included into the values. Reliabilities of estimated genomic breeding values calculated using elements of the inverse of the coefficient matrix depend on the allele coding because different allele coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being

  2. Civil Code, 11 December 1987.

    Science.gov (United States)

    1988-01-01

    Article 162 of this Mexican Code provides, among other things, that "Every person has the right freely, responsibly, and in an informed fashion to determine the number and spacing of his or her children." When a marriage is involved, this right is to be observed by the spouses "in agreement with each other." The civil codes of the following states contain the same provisions: 1) Baja California (Art. 159 of the Civil Code of 28 April 1972 as revised in Decree No. 167 of 31 January 1974); 2) Morelos (Art. 255 of the Civil Code of 26 September 1949 as revised in Decree No. 135 of 29 December 1981); 3) Queretaro (Art. 162 of the Civil Code of 29 December 1950 as revised in the Act of 9 January 1981); 4) San Luis Potosi (Art. 147 of the Civil Code of 24 March 1946 as revised in 13 June 1978); Sinaloa (Art. 162 of the Civil Code of 18 June 1940 as revised in Decree No. 28 of 14 October 1975); 5) Tamaulipas (Art. 146 of the Civil Code of 21 November 1960 as revised in Decree No. 20 of 30 April 1975); 6) Veracruz-Llave (Art. 98 of the Civil Code of 1 September 1932 as revised in the Act of 30 December 1975); and 7) Zacatecas (Art. 253 of the Civil Code of 9 February 1965 as revised in Decree No. 104 of 13 August 1975). The Civil Codes of Puebla and Tlaxcala provide for this right only in the context of marriage with the spouses in agreement. See Art. 317 of the Civil Code of Puebla of 15 April 1985 and Article 52 of the Civil Code of Tlaxcala of 31 August 1976 as revised in Decree No. 23 of 2 April 1984. The Family Code of Hidalgo requires as a formality of marriage a certification that the spouses are aware of methods of controlling fertility, responsible parenthood, and family planning. In addition, Article 22 the Civil Code of the Federal District provides that the legal capacity of natural persons is acquired at birth and lost at death; however, from the moment of conception the individual comes under the protection of the law, which is valid with respect to the

  3. CONTROLLED DRUG DELIVERY THROUGH MICROENCAPSULATION

    Directory of Open Access Journals (Sweden)

    NIKHIL K. SACHAN

    2006-01-01

    Full Text Available An appropriately designed controlled release drug delivery system can be a major advance towards solving problems concerning to the targeting of drug to a specific organ or tissue and controlling the rate of drug delivery to the target site. The development of oral controlled release systems has been a challenge to formulation scientist due to their inability to restrain and localize the system at targeted areas of gastrointestinal tract. Microparticulate drug delivery systems are an interesting and promising option when developing an oral controlled release system. The objective of this paper is to take a closer look at microparticles as drug delivery devices for increasing efficiency of drug delivery, improving the release profile and drug targeting. In order to appreciate the application possibilities of microcapsules in drug delivery, some fundamental aspects are briefly reviewed.

  4. Magnetic targeted drug delivery

    Directory of Open Access Journals (Sweden)

    Timothy Wiedmann

    2009-10-01

    Full Text Available Lung cancer is the most common cause of death from cancer in both men and women. Treatment by intravenous or oral administration of chemotherapy agents results in serious and often treatment-limiting side effects. Delivery of drugs directly to the lung by inhalation of an aerosol holds the promise of achieving a higher concentration in the lung with lower blood levels. To further enhance the selective lung deposition, it may be possible to target deposition by using external magnetic fields to direct the delivery of drug coupled to magnetic particles. Moreover, alternating magnetic fields can be used to induce particle heating, which in turn controls the drug release rate with the appropriate thermal sensitive material.With this goal, superparamagetic nanoparticles (SPNP were prepared and characterized, and enhanced magnetic deposition was demonstrated in vitro and in vivo. SPNPs were also incorporated into a lipid-based/SPNP aerosol formulation, and drug release was shown to be controlled by thermal activation. Because of the inherent imaging potential of SPNPs, this use of nanotechnology offers the possibility of coupling the diagnosis of lung cancer to drug release, which perhaps will ultimately provide the “magic bullet” that Paul Ehrlich originally sought.

  5. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four......This thesis consists of six chapters. The first chapter, contains a short introduction to coding theory in which we explain the coding theory concepts we use. In the second chapter, we present the required theory for evaluation codes and also give an example of some fundamental codes in coding...... are optimal or best known for their parameters. In chapter five we study some graph codes with Reed–Solomon component codes. The underlying graph is well known and widely used for its good characteristics. This helps us to compute the dimension of the graph codes. We also introduce a combinatorial concept...

  6. Beam Delivery Simulation - Recent Developments and Optimization

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00232566; Boogert, Stewart Takashi; Garcia-Morales, H; Gibson, Stephen; Kwee-Hinzmann, Regina; Nevay, Laurence James; Deacon, Lawrence Charles

    2015-01-01

    Beam Delivery Simulation (BDSIM) is a particle tracking code that simulates the passage of particles through both the magnetic accelerator lattice as well as their interaction with the material of the accelerator itself. The Geant4 toolkit is used to give a full range of physics processes needed to simulate both the interaction of primary particles and the production and subsequent propagation of secondaries. BDSIM has already been used to simulate linear accelerators such as the International Linear Collider (ILC) and the Compact Linear Collider (CLIC), but it has recently been adapted to simulate circular accelerators as well, producing loss maps for the Large Hadron Collider (LHC). In this paper the most recent developments, which extend BDSIM’s functionality as well as improve its efficiency are presented. Improvement and refactorisation of the tracking algorithms are presented alongside improved automatic geometry construction for increased particle tracking speed.

  7. Revised Safety Code A2

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the revised Safety Code A2 (Code A2 rev.) entitled "REPORTING OF ACCIDENTS AND NEAR MISSES" is available on the web at the following url: https://edms.cern.ch/document/335502/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  8. Flow Analysis of Code Customizations

    DEFF Research Database (Denmark)

    Hessellund, Anders; Sestoft, Peter

    2008-01-01

    Inconsistency between metadata and code customizations is a major concern in modern, configurable enterprise systems. The increasing reliance on metadata, in the form of XML files, and code customizations, in the form of Java files, has led to a hybrid development platform. The expected consisten...

  9. NETWORK CODING BY BEAM FORMING

    DEFF Research Database (Denmark)

    2013-01-01

    Network coding by beam forming in networks, for example, in single frequency networks, can provide aid in increasing spectral efficiency. When network coding by beam forming and user cooperation are combined, spectral efficiency gains may be achieved. According to certain embodiments, a method...... cooperating with the plurality of user equipment to decode the received data....

  10. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions...

  11. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  12. Accelerator Physics Code Web Repository

    Energy Technology Data Exchange (ETDEWEB)

    Zimmermann, F.; Basset, R.; Bellodi, G.; Benedetto, E.; Dorda, U.; Giovannozzi, M.; Papaphilippou, Y.; Pieloni, T.; Ruggiero, F.; Rumolo, G.; Schmidt, F.; Todesco, E.; Zotter, B.W.; /CERN; Payet, J.; /Saclay; Bartolini, R.; /RAL, Diamond; Farvacque, L.; /ESRF, Grenoble; Sen, T.; /Fermilab; Chin, Y.H.; Ohmi, K.; Oide, K.; /KEK, Tsukuba; Furman, M.; /LBL, Berkeley /Oak Ridge /Pohang Accelerator Lab. /SLAC /TRIUMF /Tech-X, Boulder /UC, San Diego /Darmstadt, GSI /Rutherford /Brookhaven

    2006-10-24

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  13. ACCELERATION PHYSICS CODE WEB REPOSITORY.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.

    2006-06-26

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  14. Distributed space-time coding

    CERN Document Server

    Jing, Yindi

    2014-01-01

    Distributed Space-Time Coding (DSTC) is a cooperative relaying scheme that enables high reliability in wireless networks. This brief presents the basic concept of DSTC, its achievable performance, generalizations, code design, and differential use. Recent results on training design and channel estimation for DSTC and the performance of training-based DSTC are also discussed.

  15. Recommendations for ECG diagnostic coding

    NARCIS (Netherlands)

    Bonner, R.E.; Caceres, C.A.; Cuddy, T.E.; Meijler, F.L.; Milliken, J.A.; Rautaharju, P.M.; Robles de Medina, E.O.; Willems, J.L.; Wolf, H.K.; Working Group 'Diagnostic Codes'

    1978-01-01

    The Oxford dictionary defines code as "a body of laws so related to each other as to avoid inconsistency and overlapping". It is obvious that natural language with its high degree of ambiguity does not qualify as a code in the sense of this definition. Everyday experiences provide ample evidence tha

  16. Recommendations for ECG diagnostic coding

    NARCIS (Netherlands)

    Bonner, R.E.; Caceres, C.A.; Cuddy, T.E.; Meijler, F.L.; Milliken, J.A.; Rautaharju, P.M.; Robles de Medina, E.O.; Willems, J.L.; Wolf, H.K.; Working Group 'Diagnostic Codes'

    1978-01-01

    The Oxford dictionary defines code as "a body of laws so related to each other as to avoid inconsistency and overlapping". It is obvious that natural language with its high degree of ambiguity does not qualify as a code in the sense of this definition. Everyday experiences provide ample evidence tha

  17. Cyclic Codes of Length 2

    Indian Academy of Sciences (India)

    Manju Pruthi

    2001-11-01

    In this paper explicit expressions of + 1 idempotents in the ring $R = F_q[X]/\\langle X^{2^m}-1\\rangle$ are given. Cyclic codes of length 2 over the finite field , of odd characteristic, are defined in terms of their generator polynomials. The exact minimum distance and the dimension of the codes are obtained.

  18. Coded continuous wave meteor radar

    OpenAIRE

    2015-01-01

    The concept of coded continuous wave meteor radar is introduced. The radar uses a continuously transmitted pseudo-random waveform, which has several advantages: coding avoids range aliased echoes, which are often seen with commonly used pulsed specular meteor radars (SMRs); continuous transmissions maximize pulse compression gain, allowing operation with significantly lower peak transmit power; the temporal resolution can be changed after ...

  19. Document delivery services contrasting views

    CERN Document Server

    1999-01-01

    Design and maintain document delivery services that are ideal for academic patrons! In Document Delivery Services: Contrasting Views, you'll visit four university library systems to discover the considerations and challenges each library faced in bringing document delivery to its clientele. This book examines the questions about document delivery that are most pressing in the profession of library science. Despite their own unique experiences, you'll find common practices among all four?including planning, implementation of service, and evaluation of either user satisfaction and/or vendor per

  20. Obstructed Defecation Syndrome After Delivery Trauma

    Directory of Open Access Journals (Sweden)

    Mehrvarz

    2015-11-01

    Full Text Available Background Obstructed defecation syndrome (ODS occurs in about 7% of adults; it seems that the etiology of pelvic floor disorders is multifactorial. Pregnancy and childbirth damage to the pelvic nerve and muscles are proposed causes for this condition. The precise role of vaginal delivery (VD is not clearly defined, although in recent studies association of pelvic floor disorder with Operative vaginal delivery and episiotomy has been proposed. Objectives In this prospective study, we assessed the outcome of stapled transanal rectal resection (STARR in females with one of the two modes of delivery (VD or caesarean section (C/S. Patients and Methods We used Longo’s ODS score for the assessment of the severity of pelvic floor malfunction. Stapled Trans Anal Rectal Resection (STARR procedure was performed using two circular staplers. Follow-up was done 12 months after the discharge. To assess the role of episiotomy in patient with VD, we divided them into two subgroups; females who had VD with episiotomy (Vd + epi and females who had VD alone. Data were analyzed using SPSS version 20 software. P values less than 0.05 were considered statistically significant. Results In 30 consecutive females undergoing STARR for the treatment of ODS, who enrolled in this prospective study, 19 (63.3% had Vaginal Delivery VD and 11 (36.7% had Cesarean Section (C/S. The ODS score before the surgery was higher in females who had C/S, although there was no significant difference between VD and C/S groups in terms of the percentage of the ODS score improvement after the STARR surgery. Conclusions Higher ODS score in females who had C/S showed that C/S could not protect the pelvic organ from pregnancy and delivery trauma. It seems that episiotomy has a protective effect during VD; it can reduce the severity of trauma in pelvic organs during childbearing.