WorldWideScience

Sample records for education code key

  1. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  2. Development of authentication code for multi-access optical code division multiplexing based quantum key distribution

    Science.gov (United States)

    Taiwo, Ambali; Alnassar, Ghusoon; Bakar, M. H. Abu; Khir, M. F. Abdul; Mahdi, Mohd Adzir; Mokhtar, M.

    2018-05-01

    One-weight authentication code for multi-user quantum key distribution (QKD) is proposed. The code is developed for Optical Code Division Multiplexing (OCDMA) based QKD network. A unique address assigned to individual user, coupled with degrading probability of predicting the source of the qubit transmitted in the channel offer excellent secure mechanism against any form of channel attack on OCDMA based QKD network. Flexibility in design as well as ease of modifying the number of users are equally exceptional quality presented by the code in contrast to Optical Orthogonal Code (OOC) earlier implemented for the same purpose. The code was successfully applied to eight simultaneous users at effective key rate of 32 bps over 27 km transmission distance.

  3. Rehabilitation Counselor Education and the New Code of Ethics

    Science.gov (United States)

    Glosoff, Harriet L.; Cottone, R. Rocco

    2010-01-01

    The purpose of this article is to discuss recent changes in the Commission on Rehabilitation Counselor Certification "Code of Professional Ethics for Rehabilitation Counselors", effective January 1, 2010, that are most relevant to rehabilitation counselor educators. The authors provide a brief overview of these key changes along with implications…

  4. Building capacity in Australian interprofessional health education: perspectives from key health and higher education stakeholders.

    Science.gov (United States)

    Matthews, Lynda R; Pockett, Rosalie B; Nisbet, Gillian; Thistlethwaite, Jill E; Dunston, Roger; Lee, Alison; White, Jill F

    2011-05-01

    A substantial literature engaging with the directions and experiences of stakeholders involved in interprofessional health education exists at the international level, yet almost nothing has been published that documents and analyses the Australian experience. Accordingly, this study aimed to scope the experiences of key stakeholders in health and higher education in relation to the development of interprofessional practice capabilities in health graduates in Australia. Twenty-seven semi-structured interviews and two focus groups of key stakeholders involved in the development and delivery of interprofessional health education in Australian higher education were undertaken. Interview data were coded to identify categories that were organised into key themes, according to principles of thematic analysis. Three themes were identified: the need for common ground between health and higher education, constraints and enablers in current practice, and the need for research to establish an evidence base. Five directions for national development were also identified. The study identified a range of interconnected changes that will be required to successfully mainstream interprofessional education within Australia, in particular, the importance of addressing issues of culture change and the need for a nationally coordinated and research informed approach. These findings reiterate those found in the international literature.

  5. Authentication codes from ε-ASU hash functions with partially secret keys

    NARCIS (Netherlands)

    Liu, S.L.; Tilborg, van H.C.A.; Weng, J.; Chen, Kefei

    2014-01-01

    An authentication code can be constructed with a family of e-Almost strong universal (e-ASU) hash functions, with the index of hash functions as the authentication key. This paper considers the performance of authentication codes from e-ASU, when the authentication key is only partially secret. We

  6. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    Science.gov (United States)

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  7. Code for plant identification (KKS) key in PC version

    International Nuclear Information System (INIS)

    Pannenbaecker, K.

    1991-01-01

    The plant identification system (KKS) as a common development of german plant operators, erection firms and also power plant oriented organisations have decisively influenced the technical-organizing activities of planning and erections as operations and maintenance of all kind of power plants. Fundamentals are three key parts, operation, armatures and function keys. Their management and application is executed by a plantidentification-key code in a PC version, which is briefly described in this report. (orig.) [de

  8. Noncoherent Spectral Optical CDMA System Using 1D Active Weight Two-Code Keying Codes

    Directory of Open Access Journals (Sweden)

    Bih-Chyun Yeh

    2016-01-01

    Full Text Available We propose a new family of one-dimensional (1D active weight two-code keying (TCK in spectral amplitude coding (SAC optical code division multiple access (OCDMA networks. We use encoding and decoding transfer functions to operate the 1D active weight TCK. The proposed structure includes an optical line terminal (OLT and optical network units (ONUs to produce the encoding and decoding codes of the proposed OLT and ONUs, respectively. The proposed ONU uses the modified cross-correlation to remove interferences from other simultaneous users, that is, the multiuser interference (MUI. When the phase-induced intensity noise (PIIN is the most important noise, the modified cross-correlation suppresses the PIIN. In the numerical results, we find that the bit error rate (BER for the proposed system using the 1D active weight TCK codes outperforms that for two other systems using the 1D M-Seq codes and 1D balanced incomplete block design (BIBD codes. The effective source power for the proposed system can achieve −10 dBm, which has less power than that for the other systems.

  9. QR CODES IN EDUCATION AND COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Gurhan DURAK

    2016-04-01

    Full Text Available Technological advances brought applications of innovations to education. Conventional education increasingly flourishes with new technologies accompanied by more learner active environments. In this continuum, there are learners preferring self-learning. Traditional learning materials yield attractive, motivating and technologically enhanced learning materials. The QR (Quick Response Codes are one of these innovations. The aim of this study is to redesign a lesson unit supported with QR Codes and to get the learner views about the redesigned material. For this purpose, the redesigned lesson unit was delivered to 15 learners in Balıkesir University in the academic year of 2013-2014. The learners were asked to study the material. The learners who had smart phones and Internet access were chosen for the study. To provide sectional diversity, three groups were created. The group learners were from Faculty of Education, Faculty of Science and Literature and Faculty of Engineering. After the semi-structured interviews were held, the learners were asked about their pre-knowledge about QR Codes, QR Codes’ contribution to learning, difficulties with using QR Codes about and design issues. Descriptive data analysis was used in the study. The findings were interpreted on the basis of Theory of Diffusion of Innovations and Theory of Uses and Gratifications. After the research, the themes found were awareness of QR Code, types of QR Codes and applications, contributions to learning, and proliferation of QR Codes. Generally, the learners participating in the study reported that they were aware of QR Codes; that they could use the QR Codes; and that using QR Codes in education was useful. They also expressed that such features as visual elements, attractiveness and direct routing had positive impact on learning. In addition, they generally mentioned that they did not have any difficulty using QR Codes; that they liked the design; and that the content should

  10. Cooperative Secret Sharing Using QR Codes and Symmetric Keys

    Directory of Open Access Journals (Sweden)

    Yang-Wai Chow

    2018-04-01

    Full Text Available Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information. Only authorized individuals who are in possession of the required keys will be able to recover the shares. This also means that when group members cooperate to recover a secret, the group can determine the presence of an illegitimate participant if the person does not produce a valid share. This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol.

  11. A New Quantum Key Distribution Scheme Based on Frequency and Time Coding

    International Nuclear Information System (INIS)

    Chang-Hua, Zhu; Chang-Xing, Pei; Dong-Xiao, Quan; Jing-Liang, Gao; Nan, Chen; Yun-Hui, Yi

    2010-01-01

    A new scheme of quantum key distribution (QKD) using frequency and time coding is proposed, in which the security is based on the frequency-time uncertainty relation. In this scheme, the binary information sequence is encoded randomly on either the central frequency or the time delay of the optical pulse at the sender. The central frequency of the single photon pulse is set as ω 1 for bit 0 and set as ω 2 for bit 1 when frequency coding is selected. However, the single photon pulse is not delayed for bit 0 and is delayed in τ for 1 when time coding is selected. At the receiver, either the frequency or the time delay of the pulse is measured randomly, and the final key is obtained after basis comparison, data reconciliation and privacy amplification. With the proposed method, the effect of the noise in the fiber channel and environment on the QKD system can be reduced effectively

  12. Coding as a Trojan Horse for Mathematics Education Reform

    Science.gov (United States)

    Gadanidis, George

    2015-01-01

    The history of mathematics educational reform is replete with innovations taken up enthusiastically by early adopters without significant transfer to other classrooms. This paper explores the coupling of coding and mathematics education to create the possibility that coding may serve as a Trojan Horse for mathematics education reform. That is,…

  13. Overview of codes and tools for nuclear engineering education

    Science.gov (United States)

    Yakovlev, D.; Pryakhin, A.; Medvedeva, L.

    2017-01-01

    The recent world trends in nuclear education have been developed in the direction of social education, networking, virtual tools and codes. MEPhI as a global leader on the world education market implements new advanced technologies for the distance and online learning and for student research work. MEPhI produced special codes, tools and web resources based on the internet platform to support education in the field of nuclear technology. At the same time, MEPhI actively uses codes and tools from the third parties. Several types of the tools are considered: calculation codes, nuclear data visualization tools, virtual labs, PC-based educational simulators for nuclear power plants (NPP), CLP4NET, education web-platforms, distance courses (MOOCs and controlled and managed content systems). The university pays special attention to integrated products such as CLP4NET, which is not a learning course, but serves to automate the process of learning through distance technologies. CLP4NET organizes all tools in the same information space. Up to now, MEPhI has achieved significant results in the field of distance education and online system implementation.

  14. A new two-code keying scheme for SAC-OCDMA systems enabling bipolar encoding

    Science.gov (United States)

    Al-Khafaji, Hamza M. R.; Ngah, Razali; Aljunid, S. A.; Rahman, T. A.

    2015-03-01

    In this paper, we propose a new two-code keying scheme for enabling bipolar encoding in a high-rate spectral-amplitude coding optical code-division multiple-access (SAC-OCDMA) system. The mathematical formulations are derived for the signal-to-noise ratio and bit-error rate (BER) of SAC-OCDMA system based on the suggested scheme using multi-diagonal (MD) code. Performance analyses are assessed considering the effects of phase-induced intensity noise, as well as shot and thermal noises in photodetectors. The numerical results demonstrated that the proposed scheme exhibits an enhanced BER performance compared to the existing unipolar encoding with direct detection technique. Furthermore, the performance improvement afforded by this scheme is verified using simulation experiments.

  15. The ZPIC educational code suite

    Science.gov (United States)

    Calado, R.; Pardal, M.; Ninhos, P.; Helm, A.; Mori, W. B.; Decyk, V. K.; Vieira, J.; Silva, L. O.; Fonseca, R. A.

    2017-10-01

    Particle-in-Cell (PIC) codes are used in almost all areas of plasma physics, such as fusion energy research, plasma accelerators, space physics, ion propulsion, and plasma processing, and many other areas. In this work, we present the ZPIC educational code suite, a new initiative to foster training in plasma physics using computer simulations. Leveraging on our expertise and experience from the development and use of the OSIRIS PIC code, we have developed a suite of 1D/2D fully relativistic electromagnetic PIC codes, as well as 1D electrostatic. These codes are self-contained and require only a standard laptop/desktop computer with a C compiler to be run. The output files are written in a new file format called ZDF that can be easily read using the supplied routines in a number of languages, such as Python, and IDL. The code suite also includes a number of example problems that can be used to illustrate several textbook and advanced plasma mechanisms, including instructions for parameter space exploration. We also invite contributions to this repository of test problems that will be made freely available to the community provided the input files comply with the format defined by the ZPIC team. The code suite is freely available and hosted on GitHub at https://github.com/zambzamb/zpic. Work partially supported by PICKSC.

  16. Stego Keys Performance on Feature Based Coding Method in Text Domain

    Directory of Open Access Journals (Sweden)

    Din Roshidi

    2017-01-01

    Full Text Available A main critical factor on embedding process in any text steganography method is a key used known as stego key. This factor will be influenced the success of the embedding process of text steganography method to hide a message from third party or any adversary. One of the important aspects on embedding process in text steganography method is the fitness performance of the stego key. Three parameters of the fitness performance of the stego key have been identified such as capacity ratio, embedded fitness ratio and saving space ratio. It is because a better as capacity ratio, embedded fitness ratio and saving space ratio offers of any stego key; a more message can be hidden. Therefore, main objective of this paper is to analyze three features coding based namely CALP, VERT and QUAD of stego keys in text steganography on their capacity ratio, embedded fitness ratio and saving space ratio. It is found that CALP method give a good effort performance compared to VERT and QUAD methods.

  17. On the problem of non-zero word error rates for fixed-rate error correction codes in continuous variable quantum key distribution

    International Nuclear Information System (INIS)

    Johnson, Sarah J; Ong, Lawrence; Shirvanimoghaddam, Mahyar; Lance, Andrew M; Symul, Thomas; Ralph, T C

    2017-01-01

    The maximum operational range of continuous variable quantum key distribution protocols has shown to be improved by employing high-efficiency forward error correction codes. Typically, the secret key rate model for such protocols is modified to account for the non-zero word error rate of such codes. In this paper, we demonstrate that this model is incorrect: firstly, we show by example that fixed-rate error correction codes, as currently defined, can exhibit efficiencies greater than unity. Secondly, we show that using this secret key model combined with greater than unity efficiency codes, implies that it is possible to achieve a positive secret key over an entanglement breaking channel—an impossible scenario. We then consider the secret key model from a post-selection perspective, and examine the implications for key rate if we constrain the forward error correction codes to operate at low word error rates. (paper)

  18. Keys of educational change in Ecuador

    Directory of Open Access Journals (Sweden)

    Agustín De la Herrán Gascón

    2018-01-01

    Full Text Available The article analyzes the educational system in Ecuador. The Ecuadorian education system arouses international interest, especially in Latin America. In this essay we will try to answer these questions: What might be the relevant keys from the public education in Ecuador? Why has it reached its present level of development, particularly in inclusive education? What fundaments and policies are behind the results of the goals from Education for All (EFA 2000-2015 From the Dakar framework for Action? (World Education Forum, 2000. In light of these issues, the goal is to understand key factors and reasons that have contributed to the development of the Ecuadorian public education. In terms of methodology, the approach is qualitative, dialectical, documentary and descriptive (Mc Millan and Schumacher, 2005. The research is proposed as a case study, where the choice of the case is justified by its novelty, its degree of development and its emphasis on inclusion and equity in all educational levels. With this aim, it is made a descriptive analysis of the rules underlying the changes in the educational system in Ecuador in the last three decades and it is carried out, particularly since 2008, following the last Constitution (Constituent Assembly, 2008. Tables as an analytical contribution of the authors are offered. Also data endorsed by authors and agencies of maximum national and international prestige are detailed and they realize the effectiveness of policies and such changes.

  19. Engineering Ethics Education Having Reflected Various Values and a Global Code of Ethics

    Science.gov (United States)

    Kanemitsu, Hidekazu

    At the present day, a movement trying to establish a global code of ethics for science and engineering is in activity. The author overviews the context of this movement, and examines the possibility of engineering ethics education which uses global code of ethics. In this paper, the engineering ethics education which uses code of ethics in general will be considered, and an expected function of global code of ethics will be also. Engineering ethics education in the new century should be aimed to share the values among different countries and cultures. To use global code of ethics as a tool for such education, the code should include various values, especially Asian values which engineering ethics has paid little attention to.

  20. Coding and Billing in Surgical Education: A Systems-Based Practice Education Program.

    Science.gov (United States)

    Ghaderi, Kimeya F; Schmidt, Scott T; Drolet, Brian C

    Despite increased emphasis on systems-based practice through the Accreditation Council for Graduate Medical Education core competencies, few studies have examined what surgical residents know about coding and billing. We sought to create and measure the effectiveness of a multifaceted approach to improving resident knowledge and performance of documenting and coding outpatient encounters. We identified knowledge gaps and barriers to documentation and coding in the outpatient setting. We implemented a series of educational and workflow interventions with a group of 12 residents in a surgical clinic at a tertiary care center. To measure the effect of this program, we compared billing codes for 1 year before intervention (FY2012) to prospectively collected data from the postintervention period (FY2013). All related documentation and coding were verified by study-blinded auditors. Interventions took place at the outpatient surgical clinic at Rhode Island Hospital, a tertiary-care center. A cohort of 12 plastic surgery residents ranging from postgraduate year 2 through postgraduate year 6 participated in the interventional sequence. A total of 1285 patient encounters in the preintervention group were compared with 1170 encounters in the postintervention group. Using evaluation and management codes (E&M) as a measure of documentation and coding, we demonstrated a significant and durable increase in billing with supporting clinical documentation after the intervention. For established patient visits, the monthly average E&M code level increased from 2.14 to 3.05 (p coding and billing of outpatient clinic encounters. Using externally audited coding data, we demonstrate significantly increased rates of higher complexity E&M coding in a stable patient population based on improved documentation and billing awareness by the residents. Copyright © 2017 Association of Program Directors in Surgery. Published by Elsevier Inc. All rights reserved.

  1. Academic Primer Series: Eight Key Papers about Education Theory.

    Science.gov (United States)

    Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M; Krzyzaniak, Sara M; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan

    2017-02-01

    Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice.

  2. Code for plant identification (KKS) key in PC version. KKS-Schluessel-Programm in PC-Version

    Energy Technology Data Exchange (ETDEWEB)

    Pannenbaecker, K. (GABO Gesellschaft fuer Ablauforganisation und Informationsverarbeitung mbH, Erlangen (Germany) GABO Gesellschaft fuer Ablauforganisation und Informationsverarbeitung mbH, Muenchen (Germany))

    1991-11-01

    The plant identification system (KKS) as a common development of german plant operators, erection firms and also power plant oriented organisations have decisively influenced the technical-organizing activities of planning and erections as operations and maintenance of all kind of power plants. Fundamentals are three key parts, operation, armatures and function keys. Their management and application is executed by a plantidentification-key code in a PC version, which is briefly described in this report. (orig.).

  3. Key components of financial-analysis education for clinical nurses.

    Science.gov (United States)

    Lim, Ji Young; Noh, Wonjung

    2015-09-01

    In this study, we identified key components of financial-analysis education for clinical nurses. We used a literature review, focus group discussions, and a content validity index survey to develop key components of financial-analysis education. First, a wide range of references were reviewed, and 55 financial-analysis education components were gathered. Second, two focus group discussions were performed; the participants were 11 nurses who had worked for more than 3 years in a hospital, and nine components were agreed upon. Third, 12 professionals, including professors, nurse executive, nurse managers, and an accountant, participated in the content validity index. Finally, six key components of financial-analysis education were selected. These key components were as follows: understanding the need for financial analysis, introduction to financial analysis, reading and implementing balance sheets, reading and implementing income statements, understanding the concepts of financial ratios, and interpretation and practice of financial ratio analysis. The results of this study will be used to develop an education program to increase financial-management competency among clinical nurses. © 2015 Wiley Publishing Asia Pty Ltd.

  4. RunJumpCode: An Educational Game for Educating Programming

    Science.gov (United States)

    Hinds, Matthew; Baghaei, Nilufar; Ragon, Pedrito; Lambert, Jonathon; Rajakaruna, Tharindu; Houghton, Travers; Dacey, Simon

    2017-01-01

    Programming promotes critical thinking, problem solving and analytic skills through creating solutions that can solve everyday problems. However, learning programming can be a daunting experience for a lot of students. "RunJumpCode" is an educational 2D platformer video game, designed and developed in Unity, to teach players the…

  5. High performance reconciliation for continuous-variable quantum key distribution with LDPC code

    Science.gov (United States)

    Lin, Dakai; Huang, Duan; Huang, Peng; Peng, Jinye; Zeng, Guihua

    2015-03-01

    Reconciliation is a significant procedure in a continuous-variable quantum key distribution (CV-QKD) system. It is employed to extract secure secret key from the resulted string through quantum channel between two users. However, the efficiency and the speed of previous reconciliation algorithms are low. These problems limit the secure communication distance and the secure key rate of CV-QKD systems. In this paper, we proposed a high-speed reconciliation algorithm through employing a well-structured decoding scheme based on low density parity-check (LDPC) code. The complexity of the proposed algorithm is reduced obviously. By using a graphics processing unit (GPU) device, our method may reach a reconciliation speed of 25 Mb/s for a CV-QKD system, which is currently the highest level and paves the way to high-speed CV-QKD.

  6. Council Adopts New AERA Code of Ethics: Ethics Committee to Emphasize Ethics Education

    Science.gov (United States)

    Herrington, Carolyn D.

    2011-01-01

    At its February 2011 meeting, the AERA Council adopted unanimously a new Code of Ethics. The Code articulates a set of standards for education researchers in education and provides principles and guidance by which they can build ethical practices in professional, scholarly, and scientific activities. The Code reflects the Association's strong…

  7. Long Non-Coding RNAs: The Key Players in Glioma Pathogenesis

    Energy Technology Data Exchange (ETDEWEB)

    Kiang, Karrie Mei-Yee; Zhang, Xiao-Qin; Leung, Gilberto Ka-Kit, E-mail: gilberto@hku.hk [Department of Surgery, Li Ka Shing Faculty of Medicine, The University of Hong Kong, Queen Mary Hospital, Hong Kong (China)

    2015-07-29

    Long non-coding RNAs (LncRNAs) represent a novel class of RNAs with no functional protein-coding ability, yet it has become increasingly clear that interactions between lncRNAs with other molecules are responsible for important gene regulatory functions in various contexts. Given their relatively high expressions in the brain, lncRNAs are now thought to play important roles in normal brain development as well as diverse disease processes including gliomagenesis. Intriguingly, certain lncRNAs are closely associated with the initiation, differentiation, progression, recurrence and stem-like characteristics in glioma, and may therefore be exploited for the purposes of sub-classification, diagnosis and prognosis. LncRNAs may also serve as potential therapeutic targets as well as a novel biomarkers in the treatment of glioma. In this article, the functional aspects of lncRNAs, particularly within the central nervous system (CNS), will be briefly discussed, followed by highlights of the important roles of lncRNAs in mediating critical steps during glioma development. In addition, the key lncRNA players and their possible mechanistic pathways associated with gliomagenesis will be addressed.

  8. Long Non-Coding RNAs: The Key Players in Glioma Pathogenesis

    International Nuclear Information System (INIS)

    Kiang, Karrie Mei-Yee; Zhang, Xiao-Qin; Leung, Gilberto Ka-Kit

    2015-01-01

    Long non-coding RNAs (LncRNAs) represent a novel class of RNAs with no functional protein-coding ability, yet it has become increasingly clear that interactions between lncRNAs with other molecules are responsible for important gene regulatory functions in various contexts. Given their relatively high expressions in the brain, lncRNAs are now thought to play important roles in normal brain development as well as diverse disease processes including gliomagenesis. Intriguingly, certain lncRNAs are closely associated with the initiation, differentiation, progression, recurrence and stem-like characteristics in glioma, and may therefore be exploited for the purposes of sub-classification, diagnosis and prognosis. LncRNAs may also serve as potential therapeutic targets as well as a novel biomarkers in the treatment of glioma. In this article, the functional aspects of lncRNAs, particularly within the central nervous system (CNS), will be briefly discussed, followed by highlights of the important roles of lncRNAs in mediating critical steps during glioma development. In addition, the key lncRNA players and their possible mechanistic pathways associated with gliomagenesis will be addressed

  9. Ethical and educational considerations in coding hand surgeries.

    Science.gov (United States)

    Lifchez, Scott D; Leinberry, Charles F; Rivlin, Michael; Blazar, Philip E

    2014-07-01

    To assess treatment coding knowledge and practices among residents, fellows, and attending hand surgeons. Through the use of 6 hypothetical cases, we developed a coding survey to assess coding knowledge and practices. We e-mailed this survey to residents, fellows, and attending hand surgeons. In additionally, we asked 2 professional coders to code these cases. A total of 71 participants completed the survey out of 134 people to whom the survey was sent (response rate = 53%). We observed marked disparity in codes chosen among surgeons and among professional coders. Results of this study indicate that coding knowledge, not just its ethical application, had a major role in coding procedures accurately. Surgical coding is an essential part of a hand surgeon's practice and is not well learned during residency or fellowship. Whereas ethical issues such as deliberate unbundling and upcoding may have a role in inaccurate coding, lack of knowledge among surgeons and coders has a major role as well. Coding has a critical role in every hand surgery practice. Inconstancies among those polled in this study reveal that an increase in education on coding during training and improvement in the clarity and consistency of the Current Procedural Terminology coding rules themselves are needed. Copyright © 2014 American Society for Surgery of the Hand. Published by Elsevier Inc. All rights reserved.

  10. Biometrics based key management of double random phase encoding scheme using error control codes

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  11. Reliability of Calderbank-Shor-Steane codes and security of quantum key distribution

    International Nuclear Information System (INIS)

    Hamada, Mitsuru

    2004-01-01

    After Mayers (1996 Advances in Cryptography: Proc. Crypto'96 pp 343-57; 2001 J. Assoc. Comput. Mach. 48 351-406) gave a proof of the security of the Bennett-Brassard (1984 Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing (Bangalore, India) pp 175-9) (BB84) quantum key distribution protocol, Shor and Preskill (2000 Phys. Rev. Lett. 85 441-4) made a remarkable observation that a Calderbank-Shor-Steane (CSS) code had been implicitly used in the BB84 protocol, and suggested its security could be proved by bounding the fidelity, say F n , of the incorporated CSS code of length n in the form 1-F n ≤ exp[-nE + o(n)] for some positive number E. This work presents such a number E = E(R) as a function of the rate of codes R, and a threshold R 0 such that E(R) > 0 whenever R 0 , which is larger than the achievable rate based on the Gilbert-Varshamov bound that is essentially given by Shor and Preskill. The codes in the present work are robust against fluctuations of channel parameters, which fact is needed to establish the security rigorously and was not proved for rates above the Gilbert-Varshamov rate before in the literature. As a byproduct, the security of a modified BB84 protocol against any joint (coherent) attacks is proved quantitatively

  12. Higher Education in Further Education Colleges: Indirectly Funded Partnerships: Codes of Practice for Franchise and Consortia Arrangements. Report.

    Science.gov (United States)

    Higher Education Funding Council for England, Bristol.

    This report provides codes of practice for two types of indirectly funded partnerships entered into by higher education institutions and further education sector colleges: franchises and consortia. The codes of practice set out guidance on the principles that should be reflected in the franchise and consortia agreements that underpin indirectly…

  13. Regulations and Ethical Considerations for Astronomy Education Research III: A Suggested Code of Ethics

    Science.gov (United States)

    Brogt, Erik; Foster, Tom; Dokter, Erin; Buxner, Sanlyn; Antonellis, Jessie

    2009-01-01

    We present an argument for, and suggested implementation of, a code of ethics for the astronomy education research community. This code of ethics is based on legal and ethical considerations set forth by U.S. federal regulations and the existing code of conduct of the American Educational Research Association. We also provide a fictitious research…

  14. Managing clinical education through understanding key principles.

    Science.gov (United States)

    Cunningham, Joanne; Wright, Caroline; Baird, Marilyn

    2015-01-01

    Traditionally, a practicum facilitated the integration of on-campus learning and practical workplace training. Over the past 3 decades, an educative practicum has evolved that promotes clinical reasoning, including analytical and evaluative abilities, through reflective practice. Anecdotal evidence indicates that the delivery of clinical education within medical radiation science entry-level programs continues to vacillate between traditional practicums and the new reflective practicums. To review the literature about clinical education within the medical radiation sciences and identify key principles for practitioners seeking to reflect upon and improve their approach to teaching and supporting students in the clinical environment. A search of 3 major journal databases, Internet searches, and hand searches of reference lists were conducted to identify literature about clinical education in the medical radiation sciences from January 1, 2000, to December 31, 2012. Twenty-two studies were included in this review. The 5 key elements associated with clinical education include the clinical support model and quality, overcoming the theory-practice gap, learning outcomes and reliable and valid assessment, preparing and supporting students, and accommodating differing teaching and learning needs. Many factors influence the quality of clinical education, including the culture of the clinical environment and clinical leadership roles. Several approaches can help students bridge the theory-practice gap, including simulators, role-playing activities, and reflective journals. In addition, clinical educators should use assessment strategies that objectively measure student progress, and they should be positive role models for their students. The successful clinical education of students in the medical radiation sciences depends upon the systems, structures, and people in the clinical environment. Clinical education is accomplished through the collaborative efforts of the

  15. Key-equations for list decoding of Reed-Solomon codes and how to solve them

    DEFF Research Database (Denmark)

    Beelen, Peter; Brander, Kristian

    2010-01-01

    A Reed-Solomon code of length n can be list decoded using the well-known Guruswami-Sudan algorithm. By a result of Alekhnovich (2005) the interpolation part in this algorithm can be done in complexity O(s^4l^4nlog^2nloglogn), where l denotes the designed list size and s the multiplicity parameter....... The parameters l and s are sometimes considered to be constants in the complexity analysis, but for high rate Reed-Solomon codes, their values can be very large. In this paper we will combine ideas from Alekhnovich (2005) and the concept of key equations to get an algorithm that has complexity O(sl^4nlog^2...

  16. A Critical Reflection on Codes of Conduct in Vocational Education

    Science.gov (United States)

    Bagnall, Richard G.; Nakar, Sonal

    2018-01-01

    The contemporary cultural context may be seen as presenting a moral void in vocational education, sanctioning the ascendency of instrumental epistemology and a proliferation of codes of conduct, to which workplace actions are expected to conform. Important among the purposes of such codes is that of encouraging ethical conduct, but, true to their…

  17. Coding in pigeons: Multiple-coding versus single-code/default strategies.

    Science.gov (United States)

    Pinto, Carlos; Machado, Armando

    2015-05-01

    To investigate the coding strategies that pigeons may use in a temporal discrimination tasks, pigeons were trained on a matching-to-sample procedure with three sample durations (2s, 6s and 18s) and two comparisons (red and green hues). One comparison was correct following 2-s samples and the other was correct following both 6-s and 18-s samples. Tests were then run to contrast the predictions of two hypotheses concerning the pigeons' coding strategies, the multiple-coding and the single-code/default. According to the multiple-coding hypothesis, three response rules are acquired, one for each sample. According to the single-code/default hypothesis, only two response rules are acquired, one for the 2-s sample and a "default" rule for any other duration. In retention interval tests, pigeons preferred the "default" key, a result predicted by the single-code/default hypothesis. In no-sample tests, pigeons preferred the key associated with the 2-s sample, a result predicted by multiple-coding. Finally, in generalization tests, when the sample duration equaled 3.5s, the geometric mean of 2s and 6s, pigeons preferred the key associated with the 6-s and 18-s samples, a result predicted by the single-code/default hypothesis. The pattern of results suggests the need for models that take into account multiple sources of stimulus control. © Society for the Experimental Analysis of Behavior.

  18. Students' educational careers in Higher Education: a search into key factors regarding study outcome

    NARCIS (Netherlands)

    Dr. Cyrille A.C. Van Bragt

    2010-01-01

    Students' educational careers in Higher Education: a search into key factors regarding study outcome One of the political goals of the EU is to develop 'the most competitive knowledge-based economy in the world by 2010'. The Dutch knowledge economy faces an increased demand for highly-educated

  19. Double-digit coding of examination math problems

    Directory of Open Access Journals (Sweden)

    Agnieszka Sułowska

    2013-09-01

    Full Text Available Various methods are used worldwide to evaluate student solutions to examination tasks. Usually the results simply provide information about student competency and after aggregation, are also used as a tool of making comparisons between schools. In particular, the standard evaluation methods do not allow conclusions to be drawn about possible improvements of teaching methods. There are however, task assessment methods which not only allow description of student achievement, but also possible causes of failure. One such method, which can be applied to extended response tasks, is double-digit coding which has been used in some international educational research. This paper presents the first Polish experiences of applying this method to examination tasks in mathematics, using a special coding key to carry out the evaluation. Lessons learned during the coding key construction and its application in the assessment process are described.

  20. A Pragmatic Approach to the Application of the Code of Ethics in Nursing Education.

    Science.gov (United States)

    Tinnon, Elizabeth; Masters, Kathleen; Butts, Janie

    The code of ethics for nurses was written for nurses in all settings. However, the language focuses primarily on the nurse in context of the patient relationship, which may make it difficult for nurse educators to internalize the code to inform practice. The purpose of this article is to explore the code of ethics, establish that it can be used to guide nurse educators' practice, and provide a pragmatic approach to application of the provisions.

  1. AERA Code of Ethics: American Educational Research Association Approved by the AERA Council February 2011

    Science.gov (United States)

    Educational Researcher, 2011

    2011-01-01

    The Code of Ethics of the American Educational Research Association (AERA) articulates a common set of values upon which education researchers build their professional and scientific work. The Code is intended to provide both the principles and the rules to cover professional situations encountered by education researchers. It has as its primary…

  2. Trends in EFL Technology and Educational Coding: A Case Study of an Evaluation Application Developed on LiveCode

    Science.gov (United States)

    Uehara, Suwako; Noriega, Edgar Josafat Martinez

    2016-01-01

    The availability of user-friendly coding software is increasing, yet teachers might hesitate to use this technology to develop for educational needs. This paper discusses studies related to technology for educational uses and introduces an evaluation application being developed. Through questionnaires by student users and open-ended discussion by…

  3. In-service education and teachers’ perception about key competences development with Sport Education

    Directory of Open Access Journals (Sweden)

    Antonio Calderón

    2013-01-01

    Full Text Available The purpose of this paper was to analyze the perception of physical education teachers on job opportunities of key competences of a particular teaching model. To this end, 12 teachers, Secondary and Primary, conducted an in-service education course on the model, and once completed, implemented a teaching unit in their respective schools. It was then through a questionnaire, they were asked about their perception of the development of key competences. To check whether there were differences in the perception of teachers on the development of each of the core competencies, it was calculated means and standard deviations of all variables recorded, and used the Mann-Whitney U test for independent samples. Teachers see great potential to work competence through Sport Education Model primarily on social and civic competence, lifelong learning, and autonomy and personal initiative.

  4. Superdense Coding with GHZ and Quantum Key Distribution with W in the ZX-calculus

    Directory of Open Access Journals (Sweden)

    Anne Hillebrand

    2012-10-01

    Full Text Available Quantum entanglement is a key resource in many quantum protocols, such as quantum teleportation and quantum cryptography. Yet entanglement makes protocols presented in Dirac notation difficult to verify. This is why Coecke and Duncan have introduced a diagrammatic language for quantum protocols, called the ZX-calculus. This diagrammatic notation is both intuitive and formally rigorous. It is a simple, graphical, high level language that emphasises the composition of systems and naturally captures the essentials of quantum mechanics. In the author's MSc thesis it has been shown for over 25 quantum protocols that the ZX-calculus provides a relatively easy and more intuitive presentation. Moreover, the author embarked on the task to apply categorical quantum mechanics on quantum security; earlier works did not touch anything but Bennett and Brassard's quantum key distribution protocol, BB84. Superdense coding with the Greenberger-Horne-Zeilinger state and quantum key distribution with the W-state are presented in the ZX-calculus in this paper.

  5. Key aspects about education for refugee children

    Directory of Open Access Journals (Sweden)

    Mª Jesús Vega Pascual

    2003-01-01

    Full Text Available This presentation entitled «Key Aspects about Education for Refugee Children:Refugee Camp Situation», is based on the 2003 UNHCR Guidelines on Education and highlights the relevance of the education even in situations of emergency and crisis, interms of protection and psychosocial well-being of children. It also mentions key issues to consider when working with refugees, internally displaced people, asylum-seekers,stateless and other populations of concen to UNHCR. Aspects such as refugee children’s rights, UNHCR policy commitments to education, participation of refugees and their communities in the design, establishement and implementation of education programmes, specially in emergencies, will be dealt with in this presentation. It will alsomentions topics such as the school drop out, education for vulnerable groups and the need for promoting a gender sentitive approach, bearing in mind that the hard experience of exile, the changes of family structure, the ethnic, cultural, religious and legal differences are key when working with this populationEsta presentación titulada "Consideraciones esenciales sobre la educación de los niños refugiados: la situación en los campos de refugiados", está basada en las Directrices del ACNUR sobre Eduación de 2003, y pretende resaltar la importancia de la educación en las situaciones de refugiados, incluso en situaciones de emergencia o crisis, y cómo ésta juega en favor de la protección y del bienestar psicosocial de los niños. Se mencionan las peculiaridades más relevantes que deben tenerse en cuenta cuando se trabaja con refugiados, desplazados internos, solicitantes de asilo, apátridas y otras poblaciones de las que se ocupa el ACNUR. Se verán aspectos como los derechos de los niños refugiados, los compromisos del Alto Comisionado en materia de Educación, la participación de los refugiados y sus comunidades para diseñar, establecer e impartir programas de educación especialmente

  6. High-efficiency Gaussian key reconciliation in continuous variable quantum key distribution

    Science.gov (United States)

    Bai, ZengLiang; Wang, XuYang; Yang, ShenShen; Li, YongMin

    2016-01-01

    Efficient reconciliation is a crucial step in continuous variable quantum key distribution. The progressive-edge-growth (PEG) algorithm is an efficient method to construct relatively short block length low-density parity-check (LDPC) codes. The qua-sicyclic construction method can extend short block length codes and further eliminate the shortest cycle. In this paper, by combining the PEG algorithm and qua-si-cyclic construction method, we design long block length irregular LDPC codes with high error-correcting capacity. Based on these LDPC codes, we achieve high-efficiency Gaussian key reconciliation with slice recon-ciliation based on multilevel coding/multistage decoding with an efficiency of 93.7%.

  7. Digital games in medical education: Key terms, concepts, and definitions.

    Science.gov (United States)

    Bigdeli, Shoaleh; Kaufman, David

    2017-01-01

    Introduction: Game-based education is fast becoming a key instrument in medical education. Method: In this study, papers related to games were filtered and limited to full-text peer-reviewed published in English. Results: To the best of researchers' knowledge, the concepts used in the literature are varied and distinct, and the literature is not conclusive on the definition of educational games for medical education. Conclusion: This paper attempts to classify terms, concepts and definitions common to gamification in medical education.

  8. Curated Collections for Educators: Five Key Papers about Program Evaluation.

    Science.gov (United States)

    Thoma, Brent; Gottlieb, Michael; Boysen-Osborn, Megan; King, Andrew; Quinn, Antonia; Krzyzaniak, Sara; Pineda, Nicolas; Yarris, Lalena M; Chan, Teresa

    2017-05-04

    The evaluation of educational programs has become an expected part of medical education. At some point, all medical educators will need to critically evaluate the programs that they deliver. However, the evaluation of educational programs requires a very different skillset than teaching. In this article, we aim to identify and summarize key papers that would be helpful for faculty members interested in exploring program evaluation. In November of 2016, the 2015-2016 Academic life in emergency medicine (ALiEM) Faculty Incubator program highlighted key papers in a discussion of program evaluation. This list of papers was augmented with suggestions by guest experts and by an open call on Twitter. This resulted in a list of 30 papers on program evaluation. Our authorship group then engaged in a process akin to a Delphi study to build consensus on the most important papers about program evaluation for medical education faculty. We present our group's top five most highly rated papers on program evaluation. We also summarize these papers with respect to their relevance to junior medical education faculty members and faculty developers. Program evaluation is challenging. The described papers will be informative for junior faculty members as they aim to design literature-informed evaluations for their educational programs.

  9. The Keys to Effective Schools: Educational Reform as Continuous Improvement

    Science.gov (United States)

    Hawley, Willis D., Ed.

    2006-01-01

    Working in tandem with the powerful National Education Association's KEYS initiative (Keys to Excellence in Your Schools), this second edition focuses on how to change a school's organizational structure and culture to improve the quality of teaching and learning. Each chapter, revised and updated to address continuous improvement and narrowing…

  10. Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery

    Directory of Open Access Journals (Sweden)

    Afany Zeinata Firdaus

    2013-12-01

    Full Text Available In today's era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding the secret message is shorter than the average computation time making phase (extracting the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB . Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.

  11. Key Aspects of Current Educational Reforms in Islamic Educational Schools

    Directory of Open Access Journals (Sweden)

    Ibrahim Hashim

    2017-06-01

    Full Text Available This paper is based on the premise that Islamic education plays a significant role in producing an integrated personality of young generation in order to fulfil the needs of present society. This study is important to address the key educational changes in pedagogy, curricular and teaching approach that relate directly to the effectiveness of the implementation of Islamic Education in Islamic schools. Questions raised in this writing is whether and how Muslim schools have transformed to meet the changes and challenges of the globalizing world and what should be done to ensure Islamic schools meet current needs. Thus, it argues that there is a need for reform in contemporary Islamic schools with particular reference to the changes in the curriculum, teaching style, role of Islamic schools and gender participation. The paper considers the possibility of integrating new perspectives across the curriculum and outlines the integrated approach to ensure the quality and excellence of their graduates.

  12. Reciprocity: The Key Ingredient in Humane Education Partnerships.

    Science.gov (United States)

    Savesky, Kathy

    1985-01-01

    Central California Society for the Prevention of Cruelty to Animals (SPCA) and Fresno Unified School District cooperate to promote teacher education and use of SPCA materials in the classrooms. Timing, key persons, building/maintaining contact, teacher involvement, and mutual understanding, which have been important in this productive partnership,…

  13. Embedding QR codes in tumor board presentations, enhancing educational content for oncology information management.

    Science.gov (United States)

    Siderits, Richard; Yates, Stacy; Rodriguez, Arelis; Lee, Tina; Rimmer, Cheryl; Roche, Mark

    2011-01-01

    Quick Response (QR) Codes are standard in supply management and seen with increasing frequency in advertisements. They are now present regularly in healthcare informatics and education. These 2-dimensional square bar codes, originally designed by the Toyota car company, are free of license and have a published international standard. The codes can be generated by free online software and the resulting images incorporated into presentations. The images can be scanned by "smart" phones and tablets using either the iOS or Android platforms, which link the device with the information represented by the QR code (uniform resource locator or URL, online video, text, v-calendar entries, short message service [SMS] and formatted text). Once linked to the device, the information can be viewed at any time after the original presentation, saved in the device or to a Web-based "cloud" repository, printed, or shared with others via email or Bluetooth file transfer. This paper describes how we use QR codes in our tumor board presentations, discusses the benefits, the different QR codes from Web links and how QR codes facilitate the distribution of educational content.

  14. Key Financial Metrics on Australia's Higher Education Sector--December 2016

    Science.gov (United States)

    Australian Government Tertiary Education Quality and Standards Agency, 2016

    2016-01-01

    This report is the second release of financial information held by Tertiary Education Quality and Standards Agency (TEQSA). It provides a snapshot of selected key financial metrics across the Australian higher education sector. Data in this report has been sourced from TEQSA's 2015 data collection and relates to financial years ended 31 December…

  15. Using QR codes for continuous assessment in higher education

    Directory of Open Access Journals (Sweden)

    Virginia Jiménez Rodríguez

    2016-10-01

    Full Text Available The implementation of information and communications technology (ICT in education has accelerated in recent years. At university level educational platforms that provide access to the contents of different subjects are used, as well as on-line communication between teachers and students. This project intended to improve teacher quality and motivation and satisfaction in 1st grade students, through the insertion of new ICT tools [forms Google and QR codes (quick response codes] that allow students the continuous assessment of their own learning, with particular emphasis on the application of metacognitive strategies for problem solving. It was conducted during the academic year 2014-2015 in the subject of Basic Psychology (practices. The subject Basic Psychology is taught in 1st Degree of Social Work at the Complutense University of Madrid. It consists of six ECTS (European Credit Transfer and Accumulation System credits and as such, students receive two hours of lecture and practical class one hour each week. It was during the weekly hour of practice which was carried out this innovation project.

  16. Codes of practice and related issues in biomedical waste management

    Energy Technology Data Exchange (ETDEWEB)

    Moy, D.; Watt, C. [Griffith Univ. (Australia)

    1996-12-31

    This paper outlines the development of a National Code of Practice for biomedical waste management in Australia. The 10 key areas addressed by the code are industry mission statement; uniform terms and definitions; community relations - public perceptions and right to know; generation, source separation, and handling; storage requirements; transportation; treatment and disposal; disposal of solid and liquid residues and air emissions; occupational health and safety; staff awareness and education. A comparison with other industry codes in Australia is made. A list of outstanding issues is also provided; these include the development of standard containers, treatment effectiveness, and reusable sharps containers.

  17. Accounting Education Approach in the Context of New Turkish Commercial Code and Turkish Accounting Standards

    Directory of Open Access Journals (Sweden)

    Cevdet Kızıl

    2014-08-01

    Full Text Available The aim of this article is to investigate the impact of new Turkish commercial code and Turkish accounting standards on accounting education. This study takes advantage of the survey method for gathering information and running the research analysis. For this purpose, questionnaire forms are distributed to university students personally and via the internet.This paper includes significant research questions such as “Are accounting academicians informed and knowledgeable on new Turkish commercial code and Turkish accounting standards?”, “Do accounting academicians integrate new Turkish commercial code and Turkish accounting standards to their lectures?”, “How does modern accounting education methodology and technology coincides with the teaching of new Turkish commercial code and Turkish accounting standards?”, “Do universities offer mandatory and elective courses which cover the new Turkish commercial code and Turkish accounting standards?” and “If such courses are offered, what are their names, percentage in the curriculum and degree of coverage?”Research contributes to the literature in several ways. Firstly, new Turkish commercial code and Turkish accounting standards are current significant topics for the accounting profession. Furthermore, the accounting education provides a basis for the implementations in public and private sector. Besides, one of the intentions of new Turkish commercial code and Turkish accounting standards is to foster transparency. That is definitely a critical concept also in terms of mergers, acquisitions and investments. Stakeholders of today’s business world such as investors, shareholders, entrepreneurs, auditors and government are in need of more standardized global accounting principles Thus, revision and redesigning of accounting educations plays an important role. Emphasized points also clearly prove the necessity and functionality of this research.

  18. Code meshing: Online bilingual tutoring in Higher Education

    Directory of Open Access Journals (Sweden)

    Batyi, Thelma Thokozile

    2016-12-01

    Full Text Available Students’ academic writing literacies are required to express their knowledge, as academic writing is the common mode of assessment in higher education. 28 isiXhosa-speaking first-year diploma students, who failed an academic literacies admission test evaluating the level of their academic writing literacies in the Business faculty, participated once a week over a period of eight months in a course including the practice of code meshing. In the June and November Tourism Communication tests, which also evaluated their academic writing literacies, there was a significant difference in the mean scores when compared to the admission test in the Business faculty. Their academic writing had also improved, according to their assignment marks. The researcher in this project provides evidence that code meshing as a bi/multilingual strategy could be used to improve academic writing literacies in students.

  19. Long noncoding RNAs: Undeciphered cellular codes encrypting keys of colorectal cancer pathogenesis

    Science.gov (United States)

    Kim, Taewan; Croce, Carlo M.

    2018-01-01

    Long noncoding RNAs are non-protein coding transcripts longer than 200 nucleotides in length. By the advance in genetic and bioinformatic technologies, the new genomic landscape including noncoding transcripts has been revealed. Despite their non-capacity to be translated into proteins, lncRNAs have a versatile functions through various mechanisms interacting with other cellular molecules including DNA, protein, and RNA. Recent research interest and endeavor have identified the functional role of lncRNAs in various diseases including cancer. Colorectal cancer (CRC) is not only one of the most frequent cancer but also one of the cancer types with remarkable achievements in lncRNA research. Of the numerous notable lncRNAs identified and characterized in CRC, we will focus on key lncRNAs with the high potential as CRC-specific biomarkers in this review. PMID:29306015

  20. Key Resources for Creating Online Nutrition Education for Those Participating in Supplemental Nutrition Assistance Program Education

    Science.gov (United States)

    Stosich, Marie C.; LeBlanc, Heidi; Kudin, Janette S.; Christofferson, Debra

    2016-01-01

    Internet-based nutrition education is becoming an important tool in serving the rural, low-income community, yet the task of creating such programming can be daunting. The authors describe the key resources used in developing an Internet-based nutrition education program for those participating in Supplemental Nutrition Assistance Program…

  1. Working research codes into fluid dynamics education: a science gateway approach

    Science.gov (United States)

    Mason, Lachlan; Hetherington, James; O'Reilly, Martin; Yong, May; Jersakova, Radka; Grieve, Stuart; Perez-Suarez, David; Klapaukh, Roman; Craster, Richard V.; Matar, Omar K.

    2017-11-01

    Research codes are effective for illustrating complex concepts in educational fluid dynamics courses, compared to textbook examples, an interactive three-dimensional visualisation can bring a problem to life! Various barriers, however, prevent the adoption of research codes in teaching: codes are typically created for highly-specific `once-off' calculations and, as such, have no user interface and a steep learning curve. Moreover, a code may require access to high-performance computing resources that are not readily available in the classroom. This project allows academics to rapidly work research codes into their teaching via a minimalist `science gateway' framework. The gateway is a simple, yet flexible, web interface allowing students to construct and run simulations, as well as view and share their output. Behind the scenes, the common operations of job configuration, submission, monitoring and post-processing are customisable at the level of shell scripting. In this talk, we demonstrate the creation of an example teaching gateway connected to the Code BLUE fluid dynamics software. Student simulations can be run via a third-party cloud computing provider or a local high-performance cluster. EPSRC, UK, MEMPHIS program Grant (EP/K003976/1), RAEng Research Chair (OKM).

  2. Plagiarism Detection Algorithm for Source Code in Computer Science Education

    Science.gov (United States)

    Liu, Xin; Xu, Chan; Ouyang, Boyu

    2015-01-01

    Nowadays, computer programming is getting more necessary in the course of program design in college education. However, the trick of plagiarizing plus a little modification exists among some students' home works. It's not easy for teachers to judge if there's plagiarizing in source code or not. Traditional detection algorithms cannot fit this…

  3. Codes of Ethics in Australian Education: Towards a National Perspective

    Science.gov (United States)

    Forster, Daniella J.

    2012-01-01

    Teachers have a dual moral responsibility as both values educators and moral agents representing the integrity of the profession. Codes of ethics and conduct in teaching articulate shared professional values and aim to provide some guidance for action around recognised issues special to the profession but are also instruments of regulation which…

  4. Code Blue Emergencies: A Team Task Analysis and Educational Initiative.

    Science.gov (United States)

    Price, James W; Applegarth, Oliver; Vu, Mark; Price, John R

    2012-01-01

    The objective of this study was to identify factors that have a positive or negative influence on resuscitation team performance during emergencies in the operating room (OR) and post-operative recovery unit (PAR) at a major Canadian teaching hospital. This information was then used to implement a team training program for code blue emergencies. In 2009/10, all OR and PAR nurses and 19 anesthesiologists at Vancouver General Hospital (VGH) were invited to complete an anonymous, 10 minute written questionnaire regarding their code blue experience. Survey questions were devised by 10 recovery room and operation room nurses as well as 5 anesthesiologists representing 4 different hospitals in British Columbia. Three iterations of the survey were reviewed by a pilot group of nurses and anesthesiologists and their feedback was integrated into the final version of the survey. Both nursing staff (n = 49) and anesthesiologists (n = 19) supported code blue training and believed that team training would improve patient outcome. Nurses noted that it was often difficult to identify the leader of the resuscitation team. Both nursing staff and anesthesiologists strongly agreed that too many people attending the code blue with no assigned role hindered team performance. Identifiable leadership and clear communication of roles were identified as keys to resuscitation team functioning. Decreasing the number of people attending code blue emergencies with no specific role, increased access to mock code blue training, and debriefing after crises were all identified as areas requiring improvement. Initial team training exercises have been well received by staff.

  5. Code Blue Emergencies: A Team Task Analysis and Educational Initiative

    Directory of Open Access Journals (Sweden)

    James W. Price

    2012-04-01

    Full Text Available Introduction: The objective of this study was to identify factors that have a positive or negative influence on resuscitation team performance during emergencies in the operating room (OR and post-operative recovery unit (PAR at a major Canadian teaching hospital. This information was then used to implement a team training program for code blue emergencies. Methods: In 2009/10, all OR and PAR nurses and 19 anesthesiologists at Vancouver General Hospital (VGH were invited to complete an anonymous, 10 minute written questionnaire regarding their code blue experience. Survey questions were devised by 10 recovery room and operation room nurses as well as 5 anesthesiologists representing 4 different hospitals in British Columbia. Three iterations of the survey were reviewed by a pilot group of nurses and anesthesiologists and their feedback was integrated into the final version of the survey. Results: Both nursing staff (n = 49 and anesthesiologists (n = 19 supported code blue training and believed that team training would improve patient outcome. Nurses noted that it was often difficult to identify the leader of the resuscitation team. Both nursing staff and anesthesiologists strongly agreed that too many people attending the code blue with no assigned role hindered team performance. Conclusion: Identifiable leadership and clear communication of roles were identified as keys to resuscitation team functioning. Decreasing the number of people attending code blue emergencies with no specific role, increased access to mock code blue training, and debriefing after crises were all identified as areas requiring improvement. Initial team training exercises have been well received by staff.

  6. Educational Evaluation: Key Characteristics. ACER Research Series No. 102.

    Science.gov (United States)

    Maling-Keepes, Jillian

    A set of 13 key characteristics is presented as a framework for educational evaluation studies: (1) program's stage of development when evaluator is appointed; (2) program's openness to revision; (3) program uniformity from site to site; (4) specificity of program objectives; (5) evaluator's independence; (6) evaluator's orientation to value…

  7. Institutional Data Management in Higher Education. ECAR Key Findings

    Science.gov (United States)

    Yanosky, Ronald

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study of institutional data management, which examines the policies and practices by which higher education institutions effectively collect, protect, and use digital information assets to meet academic and business needs. Importantly, it also…

  8. The Nursing Code of Ethics: Its Value, Its History.

    Science.gov (United States)

    Epstein, Beth; Turner, Martha

    2015-05-31

    To practice competently and with integrity, today's nurses must have in place several key elements that guide the profession, such as an accreditation process for education, a rigorous system for licensure and certification, and a relevant code of ethics. The American Nurses Association has guided and supported nursing practice through creation and implementation of a nationally accepted Code of Ethics for Nurses with Interpretive Statements. This article will discuss ethics in society, professions, and nursing and illustrate how a professional code of ethics can guide nursing practice in a variety of settings. We also offer a brief history of the Code of Ethics, discuss the modern Code of Ethics, and describe the importance of periodic revision, including the inclusive and thorough process used to develop the 2015 Code and a summary of recent changes. Finally, the article provides implications for practicing nurses to assure that this document is a dynamic, useful resource in a variety of healthcare settings.

  9. Performance Analysis of Direct-Sequence Code-Division Multiple-Access Communications with Asymmetric Quadrature Phase-Shift-Keying Modulation

    Science.gov (United States)

    Wang, C.-W.; Stark, W.

    2005-01-01

    This article considers a quaternary direct-sequence code-division multiple-access (DS-CDMA) communication system with asymmetric quadrature phase-shift-keying (AQPSK) modulation for unequal error protection (UEP) capability. Both time synchronous and asynchronous cases are investigated. An expression for the probability distribution of the multiple-access interference is derived. The exact bit-error performance and the approximate performance using a Gaussian approximation and random signature sequences are evaluated by extending the techniques used for uniform quadrature phase-shift-keying (QPSK) and binary phase-shift-keying (BPSK) DS-CDMA systems. Finally, a general system model with unequal user power and the near-far problem is considered and analyzed. The results show that, for a system with UEP capability, the less protected data bits are more sensitive to the near-far effect that occurs in a multiple-access environment than are the more protected bits.

  10. THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES

    Directory of Open Access Journals (Sweden)

    Vedat Şiap

    2011-12-01

    Full Text Available Public-key cryptosystems form an important part of cryptography. In these systems, every user has a public and a private key. The public key allows other users to encrypt messages, which can only be decoded using the secret private key. In that way, public-key cryptosystems allow easy and secure communication between all users without the need to actually meet and exchange keys. One such system is the McEliece Public-Key cryptosystem, sometimes also called McEliece Scheme. However, as we live in the information age, coding is used in order to protecet or correct the messages in the transferring or the storing processes. So, linear codes are important in the transferring or the storing. Due to richness of their structure array codes which are linear are also an important codes. However, the information is then transferred into the source more securely by increasing the error correction capability with array codes. In this paper, we combine two interesting topics, McEliece cryptosystem and array codes.

  11. Emotional education in Early Childhood Education teachers: a key aspect in teaching performance

    Directory of Open Access Journals (Sweden)

    María del Camino Escolar Llamazares

    2017-02-01

    Full Text Available Based on the importance of emotional education in Early Childhood students it is equally important that these skills are also present in the training of teachers. The objective is to analyze the training offered by the CFIEs of Burgos and Miranda de Ebro to Early Childhood teachers about emotional education. This is a descriptive cross-sectional study. In relation to the results, the analysis focuses on the study of frequencies using the SPPS statistical program v. 22. Results: We obtain that 69.9% of the courses taken include in the title a term related to emotional education or emotional intelligence, that such courses has tripled in recent years, public schools being mostly what carried them. The main beneficiaries are the teachers of the Early Childhood and primary education. In conclusion, the emotional education in the performance of teachers of Early Childhood it is a key aspect so that they can implement active methodologies that facilitate the overall development of students, so despite the continuing education program related to these aspects is increasing in recent years, it would require that responsible for CFIEs establish an action plan to develop in all areas of the province of Burgos.

  12. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  13. Translation and Its Discontents: Key Concepts in English and German History Education

    Science.gov (United States)

    Seixas, Peter

    2016-01-01

    Key terms and concepts are crucial tools in teaching and learning in the disciplines. Different linguistic traditions approach such tools in diverse ways. This paper offers an initial contribution by a monolingual Anglophone history educator in dialogue with German history educators. It presents three different scenarios for the potential of…

  14. MODERNIZING THE PRIVATE LAW. SOME KEY ISSUES IN THE RECENT DRAFT OF THE SPANISH COMMERCIAL CODE

    Directory of Open Access Journals (Sweden)

    Dan VELICU

    2016-05-01

    Full Text Available The last decades were dominated by the idea that an authentic process to modernize the private law means generally the unification of it by renouncing the distinction between civil and commercial law. A few European countries and some American states or provinces followed this path of the unification. However, beyond the will to change and improve the system one may reflect if this kind of modernization is actually really proper. Of course, there are lots of reasons for unification and reasons against it. Is there a possible and real alternative to this wave of unification? The draft of the Spanish commercial code could be a beginning point in order to settle this controversy. For the first time, the lawmakers are trying to replace the actual code with a new modernized one without renouncing the above mentioned distinction. Without claiming that we have entirely analyzed the topic, we propose a brief critical presentation of the major key issue of the draft.

  15. Interferometric key readable security holograms with secrete-codes

    Indian Academy of Sciences (India)

    A new method is described to create secrete-codes in the security holograms for enhancing their anti-counterfeiting characteristics. ... Scientific Instruments Organisation, Sector 30, Chandigarh 160 030, India; Department of Applied Physics, Guru Jambheshwar University of Science & Technology, Hisar 125 001, India ...

  16. Understanding Mixed Code and Classroom Code-Switching: Myths and Realities

    Science.gov (United States)

    Li, David C. S.

    2008-01-01

    Background: Cantonese-English mixed code is ubiquitous in Hong Kong society, and yet using mixed code is widely perceived as improper. This paper presents evidence of mixed code being socially constructed as bad language behavior. In the education domain, an EDB guideline bans mixed code in the classroom. Teachers are encouraged to stick to…

  17. Network Coding is the 5G Key Enabling Technology

    DEFF Research Database (Denmark)

    Compta, Pol Torres; Fitzek, Frank; Roetter, Daniel Enrique Lucani

    2015-01-01

    The exponential growth of the mobile devices market, not only smartphones, but also tablets, laptops or wearables, poses a serious challenge for 5G communications. Random Linear Network Coding (RLNC) is a promising solution for present and future networks as it has been shown to provide increased...... throughput, security, and robustness for the transmission of data through the network. Most of the analysis and the demonstrators have focused on the study of data packets with the same size (number of bytes). This constitutes a best case scenario as coded packets will incur little overhead to handle...

  18. LDPC coded OFDM over the atmospheric turbulence channel.

    Science.gov (United States)

    Djordjevic, Ivan B; Vasic, Bane; Neifeld, Mark A

    2007-05-14

    Low-density parity-check (LDPC) coded optical orthogonal frequency division multiplexing (OFDM) is shown to significantly outperform LDPC coded on-off keying (OOK) over the atmospheric turbulence channel in terms of both coding gain and spectral efficiency. In the regime of strong turbulence at a bit-error rate of 10(-5), the coding gain improvement of the LDPC coded single-side band unclipped-OFDM system with 64 sub-carriers is larger than the coding gain of the LDPC coded OOK system by 20.2 dB for quadrature-phase-shift keying (QPSK) and by 23.4 dB for binary-phase-shift keying (BPSK).

  19. Children’s stories in the educational theories of Ellen Key, Rudolf Steiner and Maria Montessori

    Directory of Open Access Journals (Sweden)

    William Grandi

    2016-11-01

    Full Text Available The article explores the educational value that Ellen Key (1849-1926, Rudolf Steiner (1861-1925 and Maria Montessori (1870-1952 attributed to children's stories. In the late nineteenth and early twentieth century these three important authors contributed to the renewal of the educational theories and practices. They dedicated a part of their pedagogical reflections to the educational meanings of children's stories; consider, e.g., the many pages of Ellen Key on children's literature, the recommendations of Rudolf Steiner on the educational relevance of fairy tales and mythology or, finally, Maria Montessori's reflections on fairy tales. The article examines these ideas from a historical and pedagogical point of view.

  20. Development of Educational SharePoint portal for coding students

    OpenAIRE

    Colomer Castelló, Gerard

    2016-01-01

    The project will explain what is SharePoint, why is used and who does use it. It will also expose some alternatives, compare them to SharePoint and expose the pros and cons. The main objective of this project will be developing an educational SharePoint portal. Using this portal, coding students will be able to share their solutions to different exercises, vote the best solutions and comment them. This portal will be developed using only software and servers obtained legally without any cost....

  1. Curated Collection for Educators: Five Key Papers about the Flipped Classroom Methodology.

    Science.gov (United States)

    King, Andrew; Boysen-Osborn, Megan; Cooney, Robert; Mitzman, Jennifer; Misra, Asit; Williams, Jennifer; Dulani, Tina; Gottlieb, Michael

    2017-10-25

    The flipped classroom (FC) pedagogy is becoming increasingly popular in medical education due to its appeal to the millennial learner and potential benefits in knowledge acquisition. Despite its popularity and effectiveness, the FC educational method is not without challenges. In this article, we identify and summarize several key papers relevant to medical educators interested in exploring the FC teaching methodology. The authors identified an extensive list of papers relevant to FC pedagogy via online discussions within the Academic Life in Emergency Medicine (ALiEM) Faculty Incubator. This list was augmented by an open call on Twitter (utilizing the #meded, #FOAMed, and #flippedclassroom hashtags) yielding a list of 33 papers. We then conducted a three-round modified Delphi process within the authorship group, which included both junior and senior clinician educators, to identify the most impactful papers for educators interested in FC pedagogy. The three-round modified Delphi process ranked all of the selected papers and selected the five most highly-rated papers for inclusion. The authorship group reviewed and summarized these papers with specific consideration given to their value to junior faculty educators and faculty developers interested in the flipped classroom approach. The list of papers featured in this article serves as a key reading list for junior clinician educators and faculty developers interested in the flipped classroom technique. The associated commentaries contextualize the importance of these papers for medical educators aiming to optimize their understanding and implementation of the flipped classroom methodology in their teaching and through faculty development.

  2. Postsecondary Students With Psychiatric Disabilities Identify Core Services and Key Ingredients to Supporting Education Goals.

    Science.gov (United States)

    Biebel, Kathleen; Mizrahi, Raphael; Ringeisen, Heather

    2017-10-26

    Accessing and successfully completing postsecondary educational opportunities may be challenging for those living with psychiatric disabilities. This exploratory study highlights the experiences of individuals with psychiatric disabilities participating in postsecondary educational support initiatives. Investigators conducted case studies with 3 education support initiatives across the United States. Focus groups revealed what concrete supported education services were helpful and key ingredients in delivering education supports. Access to specialists, mindfulness techniques, help with time management and procrastination, and facilitating classroom accommodations were identified as critical. Developing authentic relationships with supported education staff, flexibility in service delivery and access to student peers living with psychiatric disabilities were noted as key ingredients in service delivery. Incorporating the voice of students with psychiatric disabilities into supported education services can increase access, involvement, and retention, therein providing more supports to students with psychiatric disabilities achieving their postsecondary education goals. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  3. Coding for effective denial management.

    Science.gov (United States)

    Miller, Jackie; Lineberry, Joe

    2004-01-01

    Nearly everyone will agree that accurate and consistent coding of diagnoses and procedures is the cornerstone for operating a compliant practice. The CPT or HCPCS procedure code tells the payor what service was performed and also (in most cases) determines the amount of payment. The ICD-9-CM diagnosis code, on the other hand, tells the payor why the service was performed. If the diagnosis code does not meet the payor's criteria for medical necessity, all payment for the service will be denied. Implementation of an effective denial management program can help "stop the bleeding." Denial management is a comprehensive process that works in two ways. First, it evaluates the cause of denials and takes steps to prevent them. Second, denial management creates specific procedures for refiling or appealing claims that are initially denied. Accurate, consistent and compliant coding is key to both of these functions. The process of proactively managing claim denials also reveals a practice's administrative strengths and weaknesses, enabling radiology business managers to streamline processes, eliminate duplicated efforts and shift a larger proportion of the staff's focus from paperwork to servicing patients--all of which are sure to enhance operations and improve practice management and office morale. Accurate coding requires a program of ongoing training and education in both CPT and ICD-9-CM coding. Radiology business managers must make education a top priority for their coding staff. Front office staff, technologists and radiologists should also be familiar with the types of information needed for accurate coding. A good staff training program will also cover the proper use of Advance Beneficiary Notices (ABNs). Registration and coding staff should understand how to determine whether the patient's clinical history meets criteria for Medicare coverage, and how to administer an ABN if the exam is likely to be denied. Staff should also understand the restrictions on use of

  4. Interferometric key readable security holograms with secrete-codes

    Indian Academy of Sciences (India)

    2Department of Applied Physics, Guru Jambheshwar University of Science & Technology,. Hisar 125 001, India. *E-mail: aka1945@rediffmail.com. MS received 21 ... A new method is described to create secrete-codes in the security holograms for enhancing ... ing, or falsification of the valuable products and documents.

  5. Academic Primer Series: Key Papers About Competency-Based Medical Education

    Directory of Open Access Journals (Sweden)

    Robert Cooney

    2017-05-01

    Full Text Available Introduction: Competency-based medical education (CBME presents a paradigm shift in medical training. This outcome-based education movement has triggered substantive changes across the globe. Since this transition is only beginning, many faculty members may not have experience with CBME nor a solid foundation in the grounding literature. We identify and summarize key papers to help faculty members learn more about CBME. Methods: Based on the online discussions of the 2016–2017 ALiEM Faculty Incubator program, a series of papers on the topic of CBME was developed. Augmenting this list with suggestions by a guest expert and by an open call on Twitter for other important papers, we were able to generate a list of 21 papers in total. Subsequently, we used a modified Delphi study methodology to narrow the list to key papers that describe the importance and significance for educators interested in learning about CBME. To determine the most impactful papers, the mixed junior and senior faculty authorship group used three-round voting methodology based upon the Delphi method. Results: Summaries of the five most highly rated papers on the topic of CBME, as determined by this modified Delphi approach, are presented in this paper. Major themes include a definition of core CBME themes, CBME principles to consider in the design of curricula, a history of the development of the CBME movement, and a rationale for changes to accreditation with CBME. The application of the study findings to junior faculty and faculty developers is discussed. Conclusion: We present five key papers on CBME that junior faculty members and faculty experts identified as essential to faculty development. These papers are a mix of foundational and explanatory papers that may provide a basis from which junior faculty members may build upon as they help to implement CBME programs.

  6. Academic Primer Series: Key Papers About Competency-Based Medical Education.

    Science.gov (United States)

    Cooney, Robert; Chan, Teresa M; Gottlieb, Michael; Abraham, Michael; Alden, Sylvia; Mongelluzzo, Jillian; Pasirstein, Michael; Sherbino, Jonathan

    2017-06-01

    Competency-based medical education (CBME) presents a paradigm shift in medical training. This outcome-based education movement has triggered substantive changes across the globe. Since this transition is only beginning, many faculty members may not have experience with CBME nor a solid foundation in the grounding literature. We identify and summarize key papers to help faculty members learn more about CBME. Based on the online discussions of the 2016-2017 ALiEM Faculty Incubator program, a series of papers on the topic of CBME was developed. Augmenting this list with suggestions by a guest expert and by an open call on Twitter for other important papers, we were able to generate a list of 21 papers in total. Subsequently, we used a modified Delphi study methodology to narrow the list to key papers that describe the importance and significance for educators interested in learning about CBME. To determine the most impactful papers, the mixed junior and senior faculty authorship group used three-round voting methodology based upon the Delphi method. Summaries of the five most highly rated papers on the topic of CBME, as determined by this modified Delphi approach, are presented in this paper. Major themes include a definition of core CBME themes, CBME principles to consider in the design of curricula, a history of the development of the CBME movement, and a rationale for changes to accreditation with CBME. The application of the study findings to junior faculty and faculty developers is discussed. We present five key papers on CBME that junior faculty members and faculty experts identified as essential to faculty development. These papers are a mix of foundational and explanatory papers that may provide a basis from which junior faculty members may build upon as they help to implement CBME programs.

  7. A Prototype for Education Programs using Planetari and Space Centres as Key Tools

    Science.gov (United States)

    Thompson, L; Brumfitt, A.; Honan, P.

    Few hands on space experiments designed for school education allow the students and teachers to participate in the discovery of new science. One particularly experiment which flew on STS107 Columbia was designed specifically to do just this. A key feature of the project was to use a Zoo and a University as key tools in providing through life development and support. The project, "Spiders in Space" ran over a four year period resulted in the student and scientist team publishing over twenty refereed papers on their research findings. Throughout the project teacher and student performance, satisfaction, knowledge, abilities and competency were monitored and critically evaluated. The progressive gathering and feedback was used to improve the program and adapt the learning experience to the student needs and abilities. Based on the experience gained with the Spider Experiment on STS-107, the originating team of scientists and teachers have formulated a structure on which to facilitate the design of similar space education cross discipline projects. The project architecture presented uses as key tools Planetaria, Space science education centres, zoos and Universities in the successful delivery of the programs.The engagement of these key tools facilitates a cost effective and educationally sound support network for thousands of schools to have some ownership of their space program. These key tools provide both continuing professional development for teachers wishing to enter the program and field laboratory support for the student classes engaged in it. The resulting programs are designed to foster collaboration between space research and education on an international scale. The sample new program is presented which demonstrates the application of scientific principles by making students and teachers an integral part of current space research. Issues such as environment, climate control and biological diversity are investigated with a view to providing research outcomes

  8. Academic Primer Series: Five Key Papers about Study Designs in Medical Education.

    Science.gov (United States)

    Gottlieb, Michael; Chan, Teresa M; Fredette, Jenna; Messman, Anne; Robinson, Daniel W; Cooney, Robert; Boysen-Osborn, Megan; Sherbino, Jonathan

    2017-06-01

    A proper understanding of study design is essential to creating successful studies. This is also important when reading or peer reviewing publications. In this article, we aimed to identify and summarize key papers that would be helpful for faculty members interested in learning more about study design in medical education research. The online discussions of the 2016-2017 Academic Life in Emergency Medicine Faculty Incubator program included a robust and vigorous discussion about education study design, which highlighted a number of papers on that topic. We augmented this list of papers with further suggestions by expert mentors. Via this process, we created a list of 29 papers in total on the topic of medical education study design. After gathering these papers, our authorship group engaged in a modified Delphi approach to build consensus on the papers that were most valuable for the understanding of proper study design in medical education. We selected the top five most highly rated papers on the topic domain of study design as determined by our study group. We subsequently summarized these papers with respect to their relevance to junior faculty members and to faculty developers. This article summarizes five key papers addressing study design in medical education with discussions and applications for junior faculty members and faculty developers. These papers provide a basis upon which junior faculty members might build for developing and analyzing studies.

  9. Support of Maritime Education and Training Systems for the Implementation of the ISM Code

    Directory of Open Access Journals (Sweden)

    Elena Maggi

    2012-10-01

    Full Text Available The problem of the safety improvement and pollution preventionin maritime tra11Sp011 has become more and more criticaland urgent to solve. In fact, the number of accidents at seahas increased very quickly over time. Concern is growing aboutpoor qualification on safety and poor management standardsin shipping industry. The ISM Code (Intenzational Safety ManagementCode aims to provide intemational standards for safemanagement of ship operations and for pollution prevention.The paper, which presents a part of the work done by the Universityof Trieste - ISTIEE within the framework of theMETHAR project, aims to identify the expected supp01t fromthe MaJitime Education and Training (MET systems to implemmttheISM Code, consequently improving safety and preventingpollution. The paper desCiibes first the 01igin, the objectivesof the ISM Code and the standard requirements on METidentified by the Code. Secondly, it summarises the opinions ofthe operators collected through questionnaires. Finally, it identifiesthe possible enrichment of the MET system in order tobel/.er optimise the implementation of the Code.

  10. Key Success Factors in E-Learning in Medical Education

    Directory of Open Access Journals (Sweden)

    Hassan Emami

    2009-08-01

    Full Text Available Background and purpose: As in many countries, Medical Education (ME is offered in three levels including Undergraduate ME, Graduate ME, and Continuing ME. Informtion tehnology development has provided a suitable chance for ME. E-learning in ME is growing more and more. The present study seeks to determine the key success factors (KSF in E-learning in medical fields.Methods: KSF has been scrutinized in the literature following of which, and due to similarity, a classification with seven groupings was established including institutional factor, technology, interested parties, information knowledge, methods and approaches educational resources, and environmental factors. Through a questionnaire, the data were gatered from the information technology (IT directors in all medical universities throughout the country. The data collected were subjected to factorial analysis. Data from heads of educational groups were obtained through focus group discussion. Cronbach reliability coefficient was calculated for questionnaire used. Factorial analysis was used to identify meaningful KSF. T-Test, and one-way variance analysis as well as Pearson’s correlation were used. The analysis was conducted with SPSS softwareResults: The results showed no significant differences between age, sex, career, and level of education, and KSF. The preparedness factors were analyzed through group discussions with the heads of the academic departments under the study. By factorial analyses, five factors were found including the departmental interest and potential (27.3%, task performance potential (25.1%, E-teaching development in basic and clinical sciences , and continuing education (20.1%, suitable cultural environment (16.8%, and infrastructures (10.8%. Fisher Exeact Test was used to compare the obtained ratios in 5% curve whose results showed that among the three factors including legal and technocal environment, specialized hardwareand software, and high speed internet

  11. Error-correcting pairs for a public-key cryptosystem

    International Nuclear Information System (INIS)

    Pellikaan, Ruud; Márquez-Corbella, Irene

    2017-01-01

    Code-based Cryptography (CBC) is a powerful and promising alternative for quantum resistant cryptography. Indeed, together with lattice-based cryptography, multivariate cryptography and hash-based cryptography are the principal available techniques for post-quantum cryptography. CBC was first introduced by McEliece where he designed one of the most efficient Public-Key encryption schemes with exceptionally strong security guarantees and other desirable properties that still resist to attacks based on Quantum Fourier Transform and Amplitude Amplification. The original proposal, which remains unbroken, was based on binary Goppa codes. Later, several families of codes have been proposed in order to reduce the key size. Some of these alternatives have already been broken. One of the main requirements of a code-based cryptosystem is having high performance t -bounded decoding algorithms which is achieved in the case the code has a t -error-correcting pair (ECP). Indeed, those McEliece schemes that use GRS codes, BCH, Goppa and algebraic geometry codes are in fact using an error-correcting pair as a secret key. That is, the security of these Public-Key Cryptosystems is not only based on the inherent intractability of bounded distance decoding but also on the assumption that it is difficult to retrieve efficiently an error-correcting pair. In this paper, the class of codes with a t -ECP is proposed for the McEliece cryptosystem. Moreover, we study the hardness of distinguishing arbitrary codes from those having a t -error correcting pair. (paper)

  12. Thirty Years of Education in China: Between Change and No Change--A Comparative Analysis of Four Key Documents on Education Policy

    Science.gov (United States)

    Wenbin, Hu

    2012-01-01

    This article reviews the education reform and development footprints in China by analyzing four key education policy documents in the past three decades. The conclusion is that the reform and development of China's educational establishment have provided excellent support for the operations of China's political and economic systems. The reality is…

  13. Economic Education within the BME Research Community: Rejoinder to "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory"

    Science.gov (United States)

    Asarta, Carlos J.

    2016-01-01

    Carlos Asarta comments here that Arbaugh, Fornaciari, and Hwang (2016) are to be commended for their work ("Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory" "Journal of Management Education," Dec 2016, see EJ1118407). Asarta says that they make several…

  14. The network code

    International Nuclear Information System (INIS)

    1997-01-01

    The Network Code defines the rights and responsibilities of all users of the natural gas transportation system in the liberalised gas industry in the United Kingdom. This report describes the operation of the Code, what it means, how it works and its implications for the various participants in the industry. The topics covered are: development of the competitive gas market in the UK; key points in the Code; gas transportation charging; impact of the Code on producers upstream; impact on shippers; gas storage; supply point administration; impact of the Code on end users; the future. (20 tables; 33 figures) (UK)

  15. QC-LDPC code-based cryptography

    CERN Document Server

    Baldi, Marco

    2014-01-01

    This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several techniques for their design are presented, while tools for assessing the error correction performance of these codes are also described. Some families of QC-LDPC codes that are best suited for use in cryptography are also presented. The second part of the book focuses on the McEliece and Niederreiter cryptosystems, both in their original forms and in some subsequent variants. The applicability of QC-LDPC codes in these frameworks is investigated by means of theoretical analyses and numerical tools, in order to assess their benefits and drawbacks in terms of system efficiency and security. Several examples of QC-LDPC code-based public key cryptosystems are prese...

  16. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory text to algebraic coding theory. In the first chapter, you'll gain inside knowledge of coding fundamentals, which is essential for a deeper understanding of state-of-the-art coding systems. This book is a quick reference for those who are unfamiliar with this topic, as well as for use with specific applications such as cryptography and communication. Linear error-correcting block codes through elementary principles span eleven chapters of the text. Cyclic codes, some finite field algebra, Goppa codes, algebraic decoding algorithms, and applications in public-key cryptography and secret-key cryptography are discussed, including problems and solutions at the end of each chapter. Three appendices cover the Gilbert bound and some related derivations, a derivation of the Mac- Williams' identities based on the probability of undetected error, and two important tools for algebraic decoding-namely, the finite field Fourier transform and the Euclidean algorithm f...

  17. Using Local Climate Science to Educate "Key Influentials" and their Communities in the San Diego Region

    Science.gov (United States)

    Boudrias, M. A.; Estrada, M.; Anders, S.; Silva-Send, N. J.; Yin, Z.; Schultz, P.; Young, E.

    2012-12-01

    The San Diego Regional Climate Education Partnership has formed an innovative and collaborative team whose mission is to implement a research-based climate science education and communications program to increase knowledge about climate science among highly-influential leaders and their communities and foster informed decision making based on climate science and impacts. The team includes climate scientists, behavioral psychologists, formal and informal educators and communication specialists. The Partnership's strategic plan has three major goals: (1) raise public understanding of the causes and consequences of climate change; (2) identify the most effective educational methods to educate non-traditional audiences (Key Influentials) about the causes and consequences of climate change; and (3) develop and implement a replicable model for regional climate change education. To implement this strategic plan, we have anchored our project on three major pillars: (1) Local climate science (causes, impacts and long-term consequences); (2) theoretical, research-based evaluation framework (TIMSI); and (3) Key! Influentials (KI) as primary audience for messages (working w! ith and through them). During CCEP-I, the Partnership formed and convened an advisory board of Key Influentials, completed interviews with a sample of Key Influentials, conducted a public opinion survey, developed a website (www.sandiego.edu/climate) , compiled inventories on literature of climate science education resources and climate change community groups and local activities, hosted stakeholder forums, and completed the first phase of on an experiment to test the effects of different messengers delivering the same local climate change message via video. Results of 38 KI Interviews provided evidence of local climate knowledge, strong concern about climate change, and deeply held values related to climate change education and regional leadership. The most intriguing result was that while 90% of Key

  18. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  19. KEY DRIVERS OF OPTIMAL SPECIAL EDUCATION NEEDS PROVISION: AN ENGLISH STUDY

    Directory of Open Access Journals (Sweden)

    Saneeya QURESHI

    2015-11-01

    Full Text Available Background: The aim of this paper is to argue that there are a number of key drivers for Special Educational Needs (SEN provision that have to be met by Special Educational Needs Coordinators (SENCOs and teaching professionals so as to ensure optimal provision and inclusion for children with SEN in mainstream primary schools. Although the research has been carried out in England, there is a significant European Dimension to the issue, as a similar role to that of SENCOs in respect of SEN management already exists in countries such as Finland and Ireland, and is being considered in Italy. Methods: This paper focuses on the data gathered for the purpose of the author’s doctoral research in England, through questionnaires and interviews with SENCOs, head teachers and teachers. Thematic analysis was used to explore key drivers of SEN provision by practitioners who support children with SEN. Results: Data illustrate that the key drivers of SEN provision include time; teacher openness to change; target setting; evidence of tried interventions; empowerment; decision-making and approachability. The implementation of such drivers depend largely on practitioner skills and competencies. Conclusion: The main conclusion within this paper is to develop points of reference for planning and practice, with illustrations of optimal provision by all practitioners who work with children with SEN.

  20. A New Prime Code for Synchronous Optical Code Division Multiple-Access Networks

    Directory of Open Access Journals (Sweden)

    Huda Saleh Abbas

    2018-01-01

    Full Text Available A new spreading code based on a prime code for synchronous optical code-division multiple-access networks that can be used in monitoring applications has been proposed. The new code is referred to as “extended grouped new modified prime code.” This new code has the ability to support more terminal devices than other prime codes. In addition, it patches subsequences with “0s” leading to lower power consumption. The proposed code has an improved cross-correlation resulting in enhanced BER performance. The code construction and parameters are provided. The operating performance, using incoherent on-off keying modulation and incoherent pulse position modulation systems, has been analyzed. The performance of the code was compared with other prime codes. The results demonstrate an improved performance, and a BER floor of 10−9 was achieved.

  1. Innovation of education for the development of key competencies of university graduates

    Directory of Open Access Journals (Sweden)

    Struková Zuzana

    2017-01-01

    Full Text Available Competency-based education is a new trend in the process of teaching to support and develop the com­petencies of graduates. This challenge of the European Union aimed at changes in learning processes contrib­utes to improvement in the educational qualifications of the population. Recently, in Europe and Slovakia, several research studies aimed at key competencies of graduates have been conducted. This paper provides the results of the study aimed at identification of key competencies of graduates of the study program Construction Technology and Management. A proposal for innovations in learning forms is presented as an output of the national project “Universities as Engines of Knowledge Society Development”. The innovations will influence the development of profes­sion-specific and transferable competencies of graduates of the aforementioned study program at the Faculty of Civil Engineering in Technical University of Košice, Slovakia.

  2. Key Concepts in Education: Critical Issues beyond Definition and Discursive Practices

    Directory of Open Access Journals (Sweden)

    Theo Hug

    2013-11-01

    Full Text Available Along with the processes of digitization, medialization and the globalization of communications and lifeworlds, new topics, subject matters, conceptualizations and methods have been deve­loped in educational research and practice. On the one hand, from a diachronic perspective we can notice how new aspects of education (Bildung, upbringing (Erziehung, learning and communication have been addressed. On the other hand, from a synchronic perspective we can see a simultaneity of the non-simultaneous in terms of understandings, approaches, methodologies and forms of mediation and collaboration. Although more and more open initiatives and open educational resources (OER, as well as international collaborations and transnational intellectual networks, are being brought forward, epistemological aspects about using different key concepts are widely underestimated. The paper starts with: (1 an outline of selected understandings of education and literacy, followed by (2 a discussion of critical epistemological aspects by way of contrasting and correlating conceptual dimensions. Lastly, the contribution aims at (3 a sketch of polylogical design principles for educational knowledge organization.

  3. Flexible digital modulation and coding synthesis for satellite communications

    Science.gov (United States)

    Vanderaar, Mark; Budinger, James; Hoerig, Craig; Tague, John

    1991-01-01

    An architecture and a hardware prototype of a flexible trellis modem/codec (FTMC) transmitter are presented. The theory of operation is built upon a pragmatic approach to trellis-coded modulation that emphasizes power and spectral efficiency. The system incorporates programmable modulation formats, variations of trellis-coding, digital baseband pulse-shaping, and digital channel precompensation. The modulation formats examined include (uncoded and coded) binary phase shift keying (BPSK), quatenary phase shift keying (QPSK), octal phase shift keying (8PSK), 16-ary quadrature amplitude modulation (16-QAM), and quadrature quadrature phase shift keying (Q squared PSK) at programmable rates up to 20 megabits per second (Mbps). The FTMC is part of the developing test bed to quantify modulation and coding concepts.

  4. Presentation of MSc in Higher Education Dissertation School Meeting : What are the key dimensions of the personal tutor role for nurse education today?,

    OpenAIRE

    Leddington, Susan

    2012-01-01

    Presentation of MSc in Higher Education Dissertation School Meeting : What are the key dimensions of the personal tutor role for nurse education today?, A literature review, Missenden Abbey, June 2009, presentation

  5. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    Science.gov (United States)

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  6. Analysing Key Debates in Education and Sustainable Development in Relation to ESD Practice in Viet Nam

    Science.gov (United States)

    Balls, Emily

    2016-01-01

    This article is based on qualitative field research carried out in Ha Noi, Viet Nam, in 2013 for an MA dissertation in Education and International Development at the UCL Institute of Education. It analyses interpretations of education for sustainable development (ESD) in Viet Nam, relating these to key debates around instrumental and democratic…

  7. Quality Improvement of MARS Code and Establishment of Code Coupling

    International Nuclear Information System (INIS)

    Chung, Bub Dong; Jeong, Jae Jun; Kim, Kyung Doo

    2010-04-01

    The improvement of MARS code quality and coupling with regulatory auditing code have been accomplished for the establishment of self-reliable technology based regulatory auditing system. The unified auditing system code was realized also by implementing the CANDU specific models and correlations. As a part of the quality assurance activities, the various QA reports were published through the code assessments. The code manuals were updated and published a new manual which describe the new models and correlations. The code coupling methods were verified though the exercise of plant application. The education-training seminar and technology transfer were performed for the code users. The developed MARS-KS is utilized as reliable auditing tool for the resolving the safety issue and other regulatory calculations. The code can be utilized as a base technology for GEN IV reactor applications

  8. KEY ISSUES OF CONCEPTS' FORMATION OF THE NETWORK OF RESOURCE CENTER OF DISTANCE EDUCATION OF GENERAL EDUCATION INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Yuriy M. Bogachkov

    2013-06-01

    Full Text Available In the article the problem of constructing a network of resource centers for Distance Education to meet the needs of general secondary schools is presented. Modern educational trends in the use of Internet services in education are viewed.  Main contradictions, solution of which helps to create a network of resource centers, are identified. The definition of key terms related to the range of issues are given. The basic categories of participants, who  implementation of e-learning and networking are oriented on. There are considered the basic tasks of  distance education resource centers' functioning and types of supporting: personnel, regulatory, informative, systematic and  technical etc. The review of possible models of implementation of  students' distance education is reviewed . Three options for business models of resource centers, depending on funding  sources are offered.

  9. Programming Video Games and Simulations in Science Education: Exploring Computational Thinking through Code Analysis

    Science.gov (United States)

    Garneli, Varvara; Chorianopoulos, Konstantinos

    2018-01-01

    Various aspects of computational thinking (CT) could be supported by educational contexts such as simulations and video-games construction. In this field study, potential differences in student motivation and learning were empirically examined through students' code. For this purpose, we performed a teaching intervention that took place over five…

  10. ORIENTATION ON STAKEHOLDERS’ OBJECTIVES AS A KEY COMPETENCE OF IMAGE FORMATION OF THE EDUCATIONAL INSTITUTIONS OF HIGHER EDUCATION (GERMAN EXPERIENCE

    Directory of Open Access Journals (Sweden)

    E. N. Kovaleva

    2015-01-01

    Full Text Available Summary. Creating relevant targets activities of marketing model of image formation of the educational organization of higher education is not possible without a systematic approach to understanding the purpose of the key stakeholder organizations that are not only state controls system (one of the stakeholders, but also a number of other, no less important: applicants, students, alumni, members of the business community. In Russia, the opinion of stakeholders in the organization of the learning process is not widely used in the practice of evaluation of educational institutions of higher education, with the exception of the activities implemented in some universities of quality management systems. The article explains the need to reorient the objectives and criteria for measuring the efficiency of the educational institutions of higher education in the target key stakeholder groups. The author has made a comparative analysis of the basic regulations of Russia and Germany in the field of higher education to establish the objectives of the universities and their orientation to target stakeholders. It revealed a possible mechanism for measuring the satisfaction of the stakeholders of the educational activities of the organization on the basis of benchmarking analysis of multi-dimensional ranking higher education programs in Germany. The activities of the state and the public in Germany shows that the estimate legitimate stakeholder groups can be used to assess the activity of educational institutions, the formation of a rational demand for educational services, improve the activities of universities and the formation of objective information field of competitive relations of universities. Focusing on the needs of the stakeholders may not be manifested hypothetical task of universities and law enshrined in the form of goals and objectives of universities imperative to correlate with national interests, the interests of the professional community as

  11. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  12. Improving coding accuracy in an academic practice.

    Science.gov (United States)

    Nguyen, Dana; O'Mara, Heather; Powell, Robert

    2017-01-01

    Practice management has become an increasingly important component of graduate medical education. This applies to every practice environment; private, academic, and military. One of the most critical aspects of practice management is documentation and coding for physician services, as they directly affect the financial success of any practice. Our quality improvement project aimed to implement a new and innovative method for teaching billing and coding in a longitudinal fashion in a family medicine residency. We hypothesized that implementation of a new teaching strategy would increase coding accuracy rates among residents and faculty. Design: single group, pretest-posttest. military family medicine residency clinic. Study populations: 7 faculty physicians and 18 resident physicians participated as learners in the project. Educational intervention: monthly structured coding learning sessions in the academic curriculum that involved learner-presented cases, small group case review, and large group discussion. overall coding accuracy (compliance) percentage and coding accuracy per year group for the subjects that were able to participate longitudinally. Statistical tests used: average coding accuracy for population; paired t test to assess improvement between 2 intervention periods, both aggregate and by year group. Overall coding accuracy rates remained stable over the course of time regardless of the modality of the educational intervention. A paired t test was conducted to compare coding accuracy rates at baseline (mean (M)=26.4%, SD=10%) to accuracy rates after all educational interventions were complete (M=26.8%, SD=12%); t24=-0.127, P=.90. Didactic teaching and small group discussion sessions did not improve overall coding accuracy in a residency practice. Future interventions could focus on educating providers at the individual level.

  13. Major Cyber threat on Nuclear Facility and Key Entry Points of Malicious Codes

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Ickhyun; Kwon, Kookheui [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2013-05-15

    Cyber security incident explicitly shows that the domestic intra net system which is not connected to the Internet can be compromised by the USB based mal ware which was developed by the state-sponsored group. It also tells that the actor for cyber-attack has been changed from script kiddies to state's governments and the target has been changed to nation's main infrastructures such as electricity, transportation and etc. Since the cyber sabotage on nuclear facility has been proven to be possible and can be replicated again with same method, the cyber security on nuclear facility must be strengthened. In this paper, it is explained why the malicious code is the one of the biggest cyber threat in nuclear facility's digital I and C(Instrumentation and Controls) system by analyzing recent cyber attacks and well-known malicious codes. And a feasible cyber attack scenario on nuclear facility's digital I and C system is suggested along with some security measures for prevention of malicious code. As experienced from the cyber sabotage on Iranian nuclear facility in 2010, cyber attack on nuclear facility can be replicated by infecting the computer network with malicious codes. One of the cyber attack scenario on nuclear digital I and C computer network with using malicious code was suggested to help security manager establishing cyber security plan for prevention of malicious code. And some security measures on prevention of malicious code are also provided for reference.

  14. Major Cyber threat on Nuclear Facility and Key Entry Points of Malicious Codes

    International Nuclear Information System (INIS)

    Shin, Ickhyun; Kwon, Kookheui

    2013-01-01

    Cyber security incident explicitly shows that the domestic intra net system which is not connected to the Internet can be compromised by the USB based mal ware which was developed by the state-sponsored group. It also tells that the actor for cyber-attack has been changed from script kiddies to state's governments and the target has been changed to nation's main infrastructures such as electricity, transportation and etc. Since the cyber sabotage on nuclear facility has been proven to be possible and can be replicated again with same method, the cyber security on nuclear facility must be strengthened. In this paper, it is explained why the malicious code is the one of the biggest cyber threat in nuclear facility's digital I and C(Instrumentation and Controls) system by analyzing recent cyber attacks and well-known malicious codes. And a feasible cyber attack scenario on nuclear facility's digital I and C system is suggested along with some security measures for prevention of malicious code. As experienced from the cyber sabotage on Iranian nuclear facility in 2010, cyber attack on nuclear facility can be replicated by infecting the computer network with malicious codes. One of the cyber attack scenario on nuclear digital I and C computer network with using malicious code was suggested to help security manager establishing cyber security plan for prevention of malicious code. And some security measures on prevention of malicious code are also provided for reference

  15. Problematizing official narratives of HIV and AIDS education in ...

    African Journals Online (AJOL)

    2017-11-10

    Nov 10, 2017 ... and developmental challenges, resulting in a high level of stigma and discrimination ... the public sphere but through schools, teacher education and in community settings. .... Profile of key informants. Code. Academic. ZW,1M.

  16. Interactive computer codes for education and training on nuclear safety and radioprotection

    International Nuclear Information System (INIS)

    Leszczynski, Francisco

    2008-01-01

    Two interactive computer codes for education and training on nuclear safety and radioprotection developed at RA6 Reactor Division-Bariloche Atomic Center-CNEA are presented on this paper. The first code named SIMREACT has been developed in order to simulate the control of a research nuclear reactor in real time with a simple but accurate approach. The code solves the equations of neutron punctual kinetics with time variable reactivity. Utilizing the timer of the computer and the controls of a PC keyboard, with an adequate graphic interface, a simulation in real time of the temporal behavior of a research reactor is obtained. The reactivity can be changed by means of the extraction or insertion of control rods. It was implemented also the simulation of automatic pilot and scram. The use of this code is focalized on practices of nuclear reactor control like start-up from the subcritical state with external source up to power to a desired level, change of power level, calibration of a control rod with different methods, and approach to critical condition by interpolation of the answer in function of reactivity. The second code named LICEN has been developed in order to help the studies of all the topics included in examination programs for obtaining licenses for research reactor operators and radioprotection officials. Using the PC mouse, with an adequate graphic interface, the student can gradually learn the topics related with general and special licenses. The general option includes nuclear reactor engineering, radioprotection, nuclear safety, documentation and normative. The specific option includes mandatory documentation, description of the installation and task on normal and emergency situations. For each of these topics there are sub-items with all the relevant information. The objective of this code is to joint in one electronic place a large amount of information which usually it is disseminated on difficult to find separated papers. (author)

  17. Teaching Competences Necessary for Developing Key Competences of Primary Education Students in Spain: Teacher Assessments

    Science.gov (United States)

    De-Juanas Oliva, Ángel; Martín del Pozo, Rosa; Pesquero Franco, Encarnación

    2016-01-01

    In Spain the syllabus of primary education students and their future teachers is broken down by competences. As teacher educators we were interested in finding out "which teaching competences teachers consider are most necessary to facilitate learning of student key competences." Therefore, we conducted a study with a sample of 286…

  18. Code of Ethics for Rehabilitation Educators and Counselors: A Call for Evidence-Based Practice

    Science.gov (United States)

    Burker, Eileen J.; Kazukauskas, Kelly A.

    2010-01-01

    Given the emphasis on evidence-based practice (EBP) in the 2010 Code of Professional Ethics for Rehabilitation Counselors, it has become even more critical for rehabilitation educators and rehabilitation counselors to understand EBP, how to implement it in teaching and in practice, and how to access available EBP resources. This paper defines and…

  19. Distributed Video Coding for Multiview and Video-plus-depth Coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo

    The interest in Distributed Video Coding (DVC) systems has grown considerably in the academic world in recent years. With DVC the correlation between frames is exploited at the decoder (joint decoding). The encoder codes the frame independently, performing relatively simple operations. Therefore......, with DVC the complexity is shifted from encoder to decoder, making the coding architecture a viable solution for encoders with limited resources. DVC may empower new applications which can benefit from this reversed coding architecture. Multiview Distributed Video Coding (M-DVC) is the application...... of the to-be-decoded frame. Another key element is the Residual estimation, indicating the reliability of the SI, which is used to calculate the parameters of the correlation noise model between SI and original frame. In this thesis new methods for Inter-camera SI generation are analyzed in the Stereo...

  20. Progress in the Legitimacy of Business and Management Education Research: Rejoinder to "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory"

    Science.gov (United States)

    Bacon, Donald R.

    2016-01-01

    In this rejoinder to "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory," published in the "Journal of Management Education," Dec 2016 (see EJ1118407), Donald R. Bacon discusses the similarities between Arbaugh et al.'s (2016) findings and the scholarship…

  1. Cultural Codes as Catalysts for Collective Conscientisation in Environmental Adult Education: Mr. Floatie, Tree Squatting and Save-Our-Surfers

    Science.gov (United States)

    Walter, Pierre

    2012-01-01

    This study examines how cultural codes in environmental adult education can be used to "frame" collective identity, develop counterhegemonic ideologies, and catalyse "educative-activism" within social movements. Three diverse examples are discussed, spanning environmental movements in urban Victoria, British Columbia, Canada,…

  2. Note related to the elaboration of a coding by key sentences for the programming of a document automatic selection system

    International Nuclear Information System (INIS)

    Leroy, A.; Braffort, P.

    1959-01-01

    This note deals with the providing of CEA documentalists with a tool for coding studies. The authors first discuss issues related to code selection criteria (author classification, topic classification, and so on), and propose an overview and a discussion of linguistic models. They also comment how diagrams illustrating relationships between words are built up, and propose a diagram representation example which includes different concepts such as conditions, properties, object, tools or processes (for example hardness for a steel, batch processing for a condition, or sintering for a process), and also the introduction of negation. Then, the authors address how basic concepts can be highlighted, describe how key sentences can be built up, and propose an example analysis in the case of a published article dealing with nuclear reactors (in this case, the study of a liquid-metal neutron absorber for the control of a gas-cooled power reactor). Perspectives of evolution are finally discussed

  3. Key non-controversial concepts of population education.

    Science.gov (United States)

    Sikes, O J; Palacio, J; Kerr, B

    1993-03-01

    The important components of population education should focus on sexuality rather than sex education; content for inclusion depends upon whether the goal is population awareness or critical awareness. Population awareness is the better understanding of the nature, causes, and consequences of population changes experienced by a community, country, region. Critical awareness is the intent and ability to change the sociocultural or educational characteristics that influence fertility, mortality, and migration. 6 basic concepts with universal applicability are discussed, because if not handled properly, the topic become controversial. The concepts are linked to developing thinking or reasoning ability. The concepts are as follows: 1) respect for others, particularly those of the opposite sex; 2) development of self-esteem for both boys and girls; 3) the knowledge that planning is possible and desirable; 4) postponement of first pregnancy; 5) acceptance of responsibility for the consequences of behavior; and 6) the ability to recognize and withstand social pressure. When children learn respect for others, there is little likelihood that others will be harmed. Respect for girls and women is particularly important, and harmful stereotyping and their effects should be pointed out. The key is to develop healthy attitudes and values toward people, not just an intellectualization of gender issues. Self-esteem is used here to mean self-worth in the present and the future. Children can be helped to develop confidence, perseverance, and optimism. Children need to understand that carefully thought out decisions should precede a birth; fatalism and destiny is a choice. Postponing the first pregnancy can lead to economic, emotional, and physical benefits. Risk to the health of the mother and baby occurs during the teen years. The best time for pregnancy is between the ages of 20 and 30 years. A pregnancy in the teen years may have longterm consequences such as more pregnancy and

  4. Factors influencing subject selection in upper secondary education (Key Stage 4 for males and females in England

    Directory of Open Access Journals (Sweden)

    Joanne Vaughan

    2015-08-01

    Full Text Available Background Research to date has investigated the potential factors that influence students’ decisions in opting to study certain subjects during their upper secondary education. Trends in subject selection at this level (Key Stage 4 have been maintained over time and have consistently displayed comparable differences for males and females. It is recognised that males typically opt for subjects such as physical education and science, while females are traditionally noted as favouring the arts and humanities. These educational decisions may impact on future occupational directions. In light of recent initiatives, such as the English Baccalaureate, it is of interest to explore whether such measures have had an influence on this noted gender gap. Participants and procedure The present study investigates the potential predictors of subject selection, while controlling for gender, offering a specific focus on the education system in England. Attention is given to students’ perceived academic ability and attitude toward school, and how such factors may guide subject choice. Participants (N = 276 were students currently in the process of selecting optional modules for Key Stage 4 study. Results The findings demonstrate that female students are less likely than their male counterparts to opt for physical education (PE and business studies/information and communication technology (ICT as preferred modules, in comparison to ‘creative and performance’ subjects (reference category. Higher levels of reported masculinity were also shown to relate to the up-take of PE at Key Stage 4. Conclusions The implications of these findings are discussed in relation to existing research and practical contributions to the educational arena.

  5. Nevada Administrative Code for Special Education Programs.

    Science.gov (United States)

    Nevada State Dept. of Education, Carson City. Special Education Branch.

    This document presents excerpts from Chapter 388 of the Nevada Administrative Code, which concerns definitions, eligibility, and programs for students who are disabled or gifted/talented. The first section gathers together 36 relevant definitions from the Code for such concepts as "adaptive behavior,""autism,""gifted and…

  6. The Future We Want: Key Issues on Sustainable Development in Higher Education after Rio and the UN Decade of Education for Sustainable Development

    Science.gov (United States)

    Leal Filho, Walter; Manolas, Evangelos; Pace, Paul

    2015-01-01

    Purpose: This paper aims to provide a description of the achievements of the United Nations (UN) Decade of Education for Sustainable Development (2005-2014) with a focus on higher education, and it describes some of the key issues which will guide sustainable development in the coming years. Design/methodology/approach: The paper initially…

  7. Spherical reconciliation for a continuous-variable quantum key distribution

    International Nuclear Information System (INIS)

    Lu Zhao; Shi Jian-Hong; Li Feng-Guang

    2017-01-01

    Information reconciliation is a significant step for a continuous-variable quantum key distribution (CV-QKD) system. We propose a reconciliation method that allows two authorized parties to extract a consistent and secure binary key in a CV-QKD protocol, which is based on Gaussian-modulated coherent states and homodyne detection. This method named spherical reconciliation is based on spherical quantization and non-binary low-density parity-check (LDPC) codes. With the suitable signal-to-noise ratio (SNR) and code rate of non-binary LDPC codes, spherical reconciliation algorithm has a high efficiency and can extend the transmission distance of CV-QKD. (paper)

  8. The code of ethics for nurses.

    Science.gov (United States)

    Zahedi, F; Sanjari, M; Aala, M; Peymani, M; Aramesh, K; Parsapour, A; Maddah, Ss Bagher; Cheraghi, Ma; Mirzabeigi, Gh; Larijani, B; Dastgerdi, M Vahid

    2013-01-01

    Nurses are ever-increasingly confronted with complex concerns in their practice. Codes of ethics are fundamental guidance for nursing as many other professions. Although there are authentic international codes of ethics for nurses, the national code would be the additional assistance provided for clinical nurses in their complex roles in care of patients, education, research and management of some parts of health care system in the country. A national code can provide nurses with culturally-adapted guidance and help them to make ethical decisions more closely to the Iranian-Islamic background. Given the general acknowledgement of the need, the National Code of Ethics for Nurses was compiled as a joint project (2009-2011). The Code was approved by the Health Policy Council of the Ministry of Health and Medical Education and communicated to all universities, healthcare centers, hospitals and research centers early in 2011. The focus of this article is on the course of action through which the Code was compiled, amended and approved. The main concepts of the code will be also presented here. No doubt, development of the codes should be considered as an ongoing process. This is an overall responsibility to keep the codes current, updated with the new progresses of science and emerging challenges, and pertinent to the nursing practice.

  9. A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes

    OpenAIRE

    Chen, Bin; Ignatenko, Tanya; Willems, Frans M. J.; Maes, Roel; van der Sluis, Erik; Selimis, Georgios

    2017-01-01

    Physical unclonable functions (PUFs) are relatively new security primitives used for device authentication and device-specific secret key generation. In this paper we focus on SRAM-PUFs. The SRAM-PUFs enjoy uniqueness and randomness properties stemming from the intrinsic randomness of SRAM memory cells, which is a result of manufacturing variations. This randomness can be translated into the cryptographic keys thus avoiding the need to store and manage the device cryptographic keys. Therefore...

  10. Code Recognition Device for Automobile, a Panacea for Automobiles Theft

    Directory of Open Access Journals (Sweden)

    Ozomata David AHMED

    2011-06-01

    Full Text Available Code Recognition Device is a security device for automobiles. It responds only to the right sequence of codes that are keyed from the key pad. This closes the electrical circuitry of the automobile and enables it to start. If a wrong key is touched, it resets the device which disengages the electrical circuit of the automobile from the power supply. The device works properly on closing all the doors of the automobile, otherwise it cannot start. Also, once the automobile is in operation, opening of any door will disengage the device and the engine will stop. To restart the engine, the doors must be closed and the codes rendered sequentially-in this case the codes are 1974.

  11. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm.......For any nonzero elementcof a general finite fieldGF(q), it is shown that the polynomials(x - c)^i, i = 0,1,2,cdots, have the "weight-retaining" property that any linear combination of these polynomials with coefficients inGF(q)has Hamming weight at least as great as that of the minimum degree...

  12. A nuclear reload optimization approach using a real coded genetic algorithm with random keys

    International Nuclear Information System (INIS)

    Lima, Alan M.M. de; Schirru, Roberto; Medeiros, Jose A.C.C.

    2009-01-01

    The fuel reload of a Pressurized Water Reactor is made whenever the burn up of the fuel assemblies in the nucleus of the reactor reaches a certain value such that it is not more possible to maintain a critical reactor producing energy at nominal power. The problem of fuel reload optimization consists on determining the positioning of the fuel assemblies within the nucleus of the reactor in an optimized way to minimize the cost benefit relationship of fuel assemblies cost per maximum burn up, and also satisfying symmetry and safety restrictions. The fuel reload optimization problem difficulty grows exponentially with the number of fuel assemblies in the nucleus of the reactor. During decades the fuel reload optimization problem was solved manually by experts that used their knowledge and experience to build configurations of the reactor nucleus, and testing them to verify if safety restrictions of the plant are satisfied. To reduce this burden, several optimization techniques have been used, included the binary code genetic algorithm. In this work we show the use of a real valued coded approach of the genetic algorithm, with different recombination methods, together with a transformation mechanism called random keys, to transform the real values of the genes of each chromosome in a combination of discrete fuel assemblies for evaluation of the reload optimization. Four different recombination methods were tested: discrete recombination, intermediate recombination, linear recombination and extended linear recombination. For each of the 4 recombination methods 10 different tests using different seeds for the random number generator were conducted 10 generating, totaling 40 tests. The results of the application of the genetic algorithm are shown with formulation of real numbers for the problem of the nuclear reload of the plant Angra 1 type PWR. Since the best results in the literature for this problem were found by the parallel PSO we will it use for comparison

  13. Advancing Kohlberg through Codes: Using Professional Codes To Reach the Moral Reasoning Objective in Undergraduate Ethics Courses.

    Science.gov (United States)

    Whitehouse, Ginny; Ingram, Michael T.

    The development of moral reasoning as a key course objective in undergraduate communication ethics classes can be accomplished by the critical and deliberate introduction of professional codes of ethics and the internalization of values found in those codes. Notably, "fostering moral reasoning skills" and "surveying current ethical…

  14. Social Responsibility as a Key Performance Indicator for the Quality of Educational Processes

    OpenAIRE

    Gueorguiev, Tzvetelin

    2015-01-01

    Quality of education is a key issue in providing a sustainable future. University rankings have remarkable reputation among various stakeholders but they lack personality. This paper raises questions and proposes alternatives for possible solution for the problem. The change for the better is seen as implementing and in the same time adapting international standards to different regional, national and cultural settings

  15. Facing the Maze: Young Cancer Survivors' Return to Education and Work-A Professional Expert Key Informant Study.

    Science.gov (United States)

    Pedersen, Kaspar Jessen; Boisen, Kirsten Arntz; Midtgaard, Julie; Elsbernd, Abbey; Larsen, Hanne Baekgaard

    2018-03-13

    An insufficient transition to normal life after cancer treatment in adolescent and young adults (AYAs) may lead to decreased occupational and educational opportunities throughout a survivor's lifespan. Key informant interviews were used to access unique knowledge of the healthcare, educational, and social systems. We used key informant interviews with professionals representing disciplines from healthcare, educational, and social systems (n = 15). Informants were recruited through purposive sampling and snowball sampling. Interviews were analyzed thematically using Malterud's Systematic Text Condensation and verified by member checking. We found four major themes: the impact of late effects, navigating the system, social reintegration, and the drive of youth. Although legal frameworks are often in place to assist AYA cancer survivors, navigating the public, educational, and social systems is a complex task and many AYAs do not have the required skill set or energy. Furthermore, AYA survivors often feel different from their peers and misunderstood by their surroundings, which may hinder reintegration into normal social life. In Scandinavia, healthcare and education are free of charge with equal access for all, primarily funded by government taxes. Therefore, insurance status and tuition fees should not constitute barriers for returning to education and work. However, this study finds that the public and educational systems are complex to navigate, and that AYAs face trouble mobilizing the energy to receive needed support.

  16. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  17. The Middle Class Is Key to a Better-Educated Nation: A Stronger Middle Class Is Associated with Better Educational Outcomes

    Science.gov (United States)

    Madland, David; Bunker, Nick

    2011-01-01

    Education is key to America's economic success as technological change and global competition increase exponentially. Unfortunately, where once the nation was atop the world academically, today American students rank in the middle of the pack. Not surprisingly, business leaders and the American public are concerned about the quality of American…

  18. AUTOET code (a code for automatically constructing event trees and displaying subsystem interdependencies)

    International Nuclear Information System (INIS)

    Wilson, J.R.; Burdick, G.R.

    1977-06-01

    This is a user's manual for AUTOET I and II. AUTOET I is a computer code for automatic event tree construction. It is designed to incorporate and display subsystem interdependencies and common or key component dependencies in the event tree format. The code is written in FORTRAN IV for the CDC Cyber 76 using the Integrated Graphics System (IGS). AUTOET II incorporates consequence and risk calculations, in addition to some other refinements. 5 figures

  19. Should diagnosis codes from emergency department data be used for case selection for emergency department key performance indicators?

    Science.gov (United States)

    Howell, Stuart C; Wills, Rachael A; Johnston, Trisha C

    2014-02-01

    The aim of the present study was to assess the suitability of emergency department (ED) discharge diagnosis for identifying patient cohorts included in the definitions of key performance indicators (KPIs) that are used to evaluate ED performance. Hospital inpatient episodes of care with a principal diagnosis that corresponded to an ED-defined KPI were extracted from the Queensland Hospital Admitted Patient Data Collection (QHAPDC) for the year 2010-2011. The data were then linked to the corresponding ED patient record and the diagnoses applied in the two settings were compared. The asthma and injury cohorts produced favourable results with respect to matching the QHAPDC principal diagnosis with the ED discharge diagnosis. The results were generally modest when the QHAPDC principal diagnosis was upper respiratory tract infection, poisoning and toxic effects or a mental health diagnosis, and were quite poor for influenza. There is substantial variation in the capture of patient cohorts using discharge diagnosis as recorded on Queensland Hospital Emergency Department data. WHAT IS KNOWN ABOUT THE TOPIC? There are several existing KPIs that are defined according to the diagnosis recorded on ED data collections. However, there have been concerns over the quality of ED diagnosis in Queensland and other jurisdictions, and the value of these data in identifying patient cohorts for the purpose of assessing ED performance remains uncertain. WHAT DOES THIS PAPER ADD? This paper identifies diagnosis codes that are suitable for use in capturing the patient cohorts that are used to evaluate ED performance, as well as those codes that may be of limited value. WHAT ARE THE IMPLICATIONS FOR PRACTITIONERS? The limitations of diagnosis codes within ED data should be understood by those seeking to use these data items for healthcare planning and management or for research into healthcare quality and outcomes.

  20. Biometrics encryption combining palmprint with two-layer error correction codes

    Science.gov (United States)

    Li, Hengjian; Qiu, Jian; Dong, Jiwen; Feng, Guang

    2017-07-01

    To bridge the gap between the fuzziness of biometrics and the exactitude of cryptography, based on combining palmprint with two-layer error correction codes, a novel biometrics encryption method is proposed. Firstly, the randomly generated original keys are encoded by convolutional and cyclic two-layer coding. The first layer uses a convolution code to correct burst errors. The second layer uses cyclic code to correct random errors. Then, the palmprint features are extracted from the palmprint images. Next, they are fused together by XORing operation. The information is stored in a smart card. Finally, the original keys extraction process is the information in the smart card XOR the user's palmprint features and then decoded with convolutional and cyclic two-layer code. The experimental results and security analysis show that it can recover the original keys completely. The proposed method is more secure than a single password factor, and has higher accuracy than a single biometric factor.

  1. Reasons for Adopting or Revising a Journalism Ethics Code: The Case of Three Ethics Codes in the Netherlands

    OpenAIRE

    Poler Kovačič, Melita; van Putten, Anne-Marie

    2011-01-01

    The authors of this article approached the dilemma of whether or not a universal code of journalism ethics should be drafted based on the existence of factors prompting the need for a new ethics code in a national environment. Semi-structured interviews were performed with the key persons involved in the process of drafting or revising three ethics codes in the Netherlands from 2007 onwards: the Journalism Guideline by the Press Council, the Journalism Code by the Society of Chief-Editors and...

  2. Suture Coding: A Novel Educational Guide for Suture Patterns.

    Science.gov (United States)

    Gaber, Mohamed; Abdel-Wahed, Ramadan

    2015-01-01

    This study aims to provide a helpful guide to perform tissue suturing successfully using suture coding-a method for identification of suture patterns and techniques by giving full information about the method of application of each pattern using numbers and symbols. Suture coding helps construct an infrastructure for surgical suture science. It facilitates the easy understanding and learning of suturing techniques and patterns as well as detects the relationship between the different patterns. Guide points are fixed on both edges of the wound to act as a guideline to help practice suture pattern techniques. The arrangement is fixed as 1-3-5-7 and a-c-e-g on one side (whether right or left) and as 2-4-6-8 and b-d-f-h on the other side. Needle placement must start from number 1 or letter "a" and continue to follow the code till the end of the stitching. Some rules are created to be adopted for the application of suture coding. A suture trainer containing guide points that simulate the coding process is used to facilitate the learning of the coding method. (120) Is the code of simple interrupted suture pattern; (ab210) is the code of vertical mattress suture pattern, and (013465)²/3 is the code of Cushing suture pattern. (0A1) Is suggested as a surgical suture language that gives the name and type of the suture pattern used to facilitate its identification. All suture patterns known in the world should start with (0), (A), or (1). There is a relationship between 2 or more surgical patterns according to their codes. It can be concluded that every suture pattern has its own code that helps in the identification of its type, structure, and method of application. Combination between numbers and symbols helps in the understanding of suture techniques easily without complication. There are specific relationships that can be identified between different suture patterns. Coding methods facilitate suture patterns learning process. The use of suture coding can be a good

  3. Feature coding for image representation and recognition

    CERN Document Server

    Huang, Yongzhen

    2015-01-01

    This brief presents a comprehensive introduction to feature coding, which serves as a key module for the typical object recognition pipeline. The text offers a rich blend of theory and practice while reflects the recent developments on feature coding, covering the following five aspects: (1) Review the state-of-the-art, analyzing the motivations and mathematical representations of various feature coding methods; (2) Explore how various feature coding algorithms evolve along years; (3) Summarize the main characteristics of typical feature coding algorithms and categorize them accordingly; (4) D

  4. Global health education programming as a model for inter-institutional collaboration in interprofessional health education.

    Science.gov (United States)

    Peluso, Michael J; Hafler, Janet P; Sipsma, Heather; Cherlin, Emily

    2014-07-01

    While global health (GH) opportunities have expanded at schools of medicine, nursing, and public health, few examples of interprofessional approaches to GH education have been described. The elective GH program at our university serves as an important opportunity for high-quality interprofessional education. We undertook a qualitative study to examine the experience of student, faculty and administrative leaders of the program. We used content analysis to code responses and analyze data. Among the leadership, key themes fell within the categories of interprofessional education, student-faculty collaboration, professional development, and practical considerations for the development of such programs. The principles described could be considered by institutions seeking to develop meaningful partnerships in an effort to develop or refine interprofessional global health education programs.

  5. Elucidating Article 45.6 of the International Code of Zoological Nomenclature: a dichotomous key for the determination of subspecific or infrasubspecific rank.

    Science.gov (United States)

    Lingafelter, Steven W; Nearns, Eugenio H

    2013-01-01

    We present an overview of the difficulties sometimes encountered when determining whether a published name following a binomen is available or infrasubspecific and unavailable, following Article 45.6 of the International Code of Zoological Nomenclature (ICZN, 1999). We propose a dichotomous key that facilitates this determination and as a preferable method, given the convoluted and subordinate discussion, exceptions, and qualifications laid out in ICZN (1999: 49-50). Examples and citations are provided for each case one can encounter while making this assessment of availability status of names following the binomen.

  6. Marx and Education. Routledge Key Ideas in Education

    Science.gov (United States)

    Anyon, Jean

    2011-01-01

    There was only one Karl Marx, but there have been a multitude of Marxisms. This concise, introductory book by internationally renowned scholar Jean Anyon centers on the ideas of Marx that have been used in education studies as a guide to theory, analysis, research, and practice. "Marx and Education" begins with a brief overview of basic Marxist…

  7. Multi-level trellis coded modulation and multi-stage decoding

    Science.gov (United States)

    Costello, Daniel J., Jr.; Wu, Jiantian; Lin, Shu

    1990-01-01

    Several constructions for multi-level trellis codes are presented and many codes with better performance than previously known codes are found. These codes provide a flexible trade-off between coding gain, decoding complexity, and decoding delay. New multi-level trellis coded modulation schemes using generalized set partitioning methods are developed for Quadrature Amplitude Modulation (QAM) and Phase Shift Keying (PSK) signal sets. New rotationally invariant multi-level trellis codes which can be combined with differential encoding to resolve phase ambiguity are presented.

  8. Resident education in 2011: three key challenges on the road ahead.

    Science.gov (United States)

    Van Eaton, Erik G; Tarpley, John L; Solorzano, Carmen C; Cho, Clifford S; Weber, Sharon M; Termuhlen, Paula M

    2011-04-01

    Two important changes in the past decade have altered the landscape of graduate medical education (GME) in the U.S. The national restrictions on trainee duty hours mandated by the Accreditation Council for Graduate Medical Education (ACGME) were the most visible and generated much controversy. Equally important is the ACGME Outcome Project, which mandates competency-based training. Both of these changes have unique implications for surgery trainees, who traditionally spent long hours caring for patients in the hospital, and who must be assessed in 2 broad domains: their medical care of pre- and postoperative patients, and their technical skill with procedures in and out of the operating room. This article summarizes 3 key challenges that lie ahead for surgical educators. First, the changes in duty hours in the past 7 years are summarized, and the conversation about added restrictions planned for July 2011 is reviewed. Next, the current state of the assessment of competency among surgical trainees is reviewed, with an outline of the challenges that need to be overcome to achieve widespread, competency-based training in surgery. Finally, the article summarizes the problems caused by increased reliance on handoffs among trainees as they compensate for decreased time in the hospital, and suggests changes that need to be made to improve safety and efficiency, including how to use handoffs as part of our educational evaluation of residents. Copyright © 2011 Mosby, Inc. All rights reserved.

  9. Integrating Renewable Energy Requirements Into Building Energy Codes

    Energy Technology Data Exchange (ETDEWEB)

    Kaufmann, John R.; Hand, James R.; Halverson, Mark A.

    2011-07-01

    This report evaluates how and when to best integrate renewable energy requirements into building energy codes. The basic goals were to: (1) provide a rough guide of where we’re going and how to get there; (2) identify key issues that need to be considered, including a discussion of various options with pros and cons, to help inform code deliberations; and (3) to help foster alignment among energy code-development organizations. The authors researched current approaches nationally and internationally, conducted a survey of key stakeholders to solicit input on various approaches, and evaluated the key issues related to integration of renewable energy requirements and various options to address those issues. The report concludes with recommendations and a plan to engage stakeholders. This report does not evaluate whether the use of renewable energy should be required on buildings; that question involves a political decision that is beyond the scope of this report.

  10. Speech and audio processing for coding, enhancement and recognition

    CERN Document Server

    Togneri, Roberto; Narasimha, Madihally

    2015-01-01

    This book describes the basic principles underlying the generation, coding, transmission and enhancement of speech and audio signals, including advanced statistical and machine learning techniques for speech and speaker recognition with an overview of the key innovations in these areas. Key research undertaken in speech coding, speech enhancement, speech recognition, emotion recognition and speaker diarization are also presented, along with recent advances and new paradigms in these areas. ·         Offers readers a single-source reference on the significant applications of speech and audio processing to speech coding, speech enhancement and speech/speaker recognition. Enables readers involved in algorithm development and implementation issues for speech coding to understand the historical development and future challenges in speech coding research; ·         Discusses speech coding methods yielding bit-streams that are multi-rate and scalable for Voice-over-IP (VoIP) Networks; ·     �...

  11. An experimental comparison of coded modulation strategies for 100 Gb/s transceivers

    NARCIS (Netherlands)

    Sillekens, E.; Alvarado, A.; Okonkwo, C.; Thomsen, B.C.

    2016-01-01

    Coded modulation is a key technique to increase the spectral efficiency of coherent optical communication systems. Two popular strategies for coded modulation are turbo trellis-coded modulation (TTCM) and bit-interleaved coded modulation (BICM) based on low-density parity-check (LDPC) codes.

  12. Codes of Ethics and Teachers' Professional Autonomy

    Science.gov (United States)

    Schwimmer, Marina; Maxwell, Bruce

    2017-01-01

    This article considers the value of adopting a code of professional ethics for teachers. After having underlined how a code of ethics stands to benefits a community of educators--namely, by providing a mechanism for regulating autonomy and promoting a shared professional ethic--the article examines the principal arguments against codes of ethics.…

  13. Curated Collections for Educators: Five Key Papers on Evaluating Digital Scholarship.

    Science.gov (United States)

    Quinn, Antonia; Chan, Teresa M; Sampson, Christopher; Grossman, Catherine; Butts, Christine; Casey, John; Caretta-Weyer, Holly; Gottlieb, Michael

    2018-01-03

    Traditionally, scholarship that was recognized for promotion and tenure consisted of clinical research, bench research, and grant funding. Recent trends have allowed for differing approaches to scholarship, including digital publication. As increasing numbers of trainees and faculty turn to online educational resources, it is imperative to critically evaluate these resources. This article summarizes five key papers that address the appraisal of digital scholarship and describes their relevance to junior clinician educators and faculty developers. In May 2017, the Academic Life in Emergency Medicine Faculty Incubator program focused on the topic of digital scholarship, providing and discussing papers relevant to the topic. We augmented this list of papers with further suggestions by guest experts and by an open call via Twitter for other important papers. Through this process, we created a list of 38 papers in total on the topic of evaluating digital scholarship. In order to determine which of these papers best describe how to evaluate digital scholarship, the authorship group assessed the papers using a modified Delphi approach to build consensus. In this paper we present the five most highly rated papers from our process about evaluating digital scholarship. We summarize each paper and discuss its specific relevance to junior faculty members and to faculty developers. These papers provide a framework for assessing the quality of digital scholarship, so that junior faculty can recommend high-quality educational resources to their trainees. These papers help guide educators on how to produce high quality digital scholarship and maximize recognition and credit in respect to receiving promotion and tenure.

  14. Evaluating Coding Accuracy in General Surgery Residents' Accreditation Council for Graduate Medical Education Procedural Case Logs.

    Science.gov (United States)

    Balla, Fadi; Garwe, Tabitha; Motghare, Prasenjeet; Stamile, Tessa; Kim, Jennifer; Mahnken, Heidi; Lees, Jason

    The Accreditation Council for Graduate Medical Education (ACGME) case log captures resident operative experience based on Current Procedural Terminology (CPT) codes and is used to track operative experience during residency. With increasing emphasis on resident operative experiences, coding is more important than ever. It has been shown in other surgical specialties at similar institutions that the residents' ACGME case log may not accurately reflect their operative experience. What barriers may influence this remains unclear. As the only objective measure of resident operative experience, an accurate case log is paramount in representing one's operative experience. This study aims to determine the accuracy of procedural coding by general surgical residents at a single institution. Data were collected from 2 consecutive graduating classes of surgical residents' ACGME case logs from 2008 to 2014. A total of 5799 entries from 7 residents were collected. The CPT codes entered by residents were compared to departmental billing records submitted by the attending surgeon for each procedure. Assigned CPT codes by institutional American Academy of Professional Coders certified abstract coders were considered the "gold standard." A total of 4356 (75.12%) of 5799 entries were identified in billing records. Excel 2010 and SAS 9.3 were used for analysis. In the event of multiple codes for the same patient, any match between resident codes and billing record codes was considered a "correct" entry. A 4-question survey was distributed to all current general surgical residents at our institution for feedback on coding habits, limitations to accurate coding, and opinions on ACGME case log representation of their operative experience. All 7 residents had a low percentage of correctly entered CPT codes. The overall accuracy proportion for all residents was 52.82% (range: 43.32%-60.07%). Only 1 resident showed significant improvement in accuracy during his/her training (p = 0

  15. One way quantum repeaters with quantum Reed-Solomon codes

    OpenAIRE

    Muralidharan, Sreraman; Zou, Chang-Ling; Li, Linshu; Jiang, Liang

    2018-01-01

    We show that quantum Reed-Solomon codes constructed from classical Reed-Solomon codes can approach the capacity on the quantum erasure channel of $d$-level systems for large dimension $d$. We study the performance of one-way quantum repeaters with these codes and obtain a significant improvement in key generation rate compared to previously investigated encoding schemes with quantum parity codes and quantum polynomial codes. We also compare the three generation of quantum repeaters using quan...

  16. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  17. Identifying Key Features of Student Performance in Educational Video Games and Simulations through Cluster Analysis

    Science.gov (United States)

    Kerr, Deirdre; Chung, Gregory K. W. K.

    2012-01-01

    The assessment cycle of "evidence-centered design" (ECD) provides a framework for treating an educational video game or simulation as an assessment. One of the main steps in the assessment cycle of ECD is the identification of the key features of student performance. While this process is relatively simple for multiple choice tests, when…

  18. Key processes shaping the current role and operation of higher education institutions in society

    Directory of Open Access Journals (Sweden)

    Piróg Danuta

    2016-03-01

    Full Text Available The concurrent processes of globalisation, computerisation, and integration shape and constantly modify developmental factors and generate multidirectional social changes. Among social life fields, one of them has been particularly sensitive to the impact of those processes and has remained in clear feedback relationship with them is education, including university-level education. This article aims to present some reflections on the key processes which influence the environment of higher education institutions’ activity and on what their impact specifically is. The factors taken into account include: the transformation of the political and economic system, integration with the European higher education area, the market shift of education, evolving social demands towards higher education institutions and society’s attitude towards work. As knowledge has become an asset largely affecting the quality of life of people and society, universities have changed their focus from searching for and exploring truth, good and beauty in the world towards becoming innovation centres, transferring knowledge as offering their educational services. In this article, those trends have been exemplified in relation to geography degree programmes, and shown through an evolution of the model of the university. Based on a review of the literature, it seems that the processes discussed also concern geography degree programmes, and the future operation of these programmes closely depends on whether they can maintain their care for high quality education coupled with genuine efforts to ensure the smooth transition of graduates into the labour market.

  19. One-way quantum repeaters with quantum Reed-Solomon codes

    Science.gov (United States)

    Muralidharan, Sreraman; Zou, Chang-Ling; Li, Linshu; Jiang, Liang

    2018-05-01

    We show that quantum Reed-Solomon codes constructed from classical Reed-Solomon codes can approach the capacity on the quantum erasure channel of d -level systems for large dimension d . We study the performance of one-way quantum repeaters with these codes and obtain a significant improvement in key generation rate compared to previously investigated encoding schemes with quantum parity codes and quantum polynomial codes. We also compare the three generations of quantum repeaters using quantum Reed-Solomon codes and identify parameter regimes where each generation performs the best.

  20. Accounting Education Approach in the Context of New Turkish Commercial Code and Turkish Accounting Standards

    OpenAIRE

    Cevdet Kızıl; Ayşe Tansel Çetin; Ahmed Bulunmaz

    2014-01-01

    The aim of this article is to investigate the impact of new Turkish commercial code and Turkish accounting standards on accounting education. This study takes advantage of the survey method for gathering information and running the research analysis. For this purpose, questionnaire forms are distributed to university students personally and via the internet.This paper includes significant research questions such as “Are accounting academicians informed and knowledgeable on new Turkish commerc...

  1. Does a code make a difference – assessing the English code of practice on international recruitment

    Directory of Open Access Journals (Sweden)

    Mensah Kwadwo

    2009-04-01

    Full Text Available Abstract Background This paper draws from research completed in 2007 to assess the effect of the Department of Health, England, Code of Practice for the international recruitment of health professionals. The Department of Health in England introduced a Code of Practice for international recruitment for National Health Service employers in 2001. The Code required National Health Service employers not to actively recruit from low-income countries, unless there was government-to-government agreement. The Code was updated in 2004. Methods The paper examines trends in inflow of health professionals to the United Kingdom from other countries, using professional registration data and data on applications for work permits. The paper also provides more detailed information from two country case studies in Ghana and Kenya. Results Available data show a considerable reduction in inflow of health professionals, from the peak years up to 2002 (for nurses and 2004 (for doctors. There are multiple causes for this decline, including declining demand in the United Kingdom. In Ghana and Kenya it was found that active recruitment was perceived to have reduced significantly from the United Kingdom, but it is not clear the extent to which the Code was influential in this, or whether other factors such as a lack of vacancies in the United Kingdom explains it. Conclusion Active international recruitment of health professionals was an explicit policy intervention by the Department of Health in England, as one key element in achieving rapid staffing growth, particularly in the period 2000 to 2005, but the level of international recruitment has dropped significantly since early 2006. Regulatory and education changes in the United Kingdom in recent years have also made international entry more difficult. The potential to assess the effect of the Code in England is constrained by the limitations in available databases. This is a crucial lesson for those considering a

  2. Deliberation at the hub of medical education: beyond virtue ethics and codes of practice.

    Science.gov (United States)

    Barilan, Y M; Brusa, M

    2013-02-01

    Although both codes of practice and virtue ethics are integral to the ethos and history of "medical professionalism", the two trends appear mutually incompatible. Hence, in the first part of the paper we explore and explicate this apparent conflict and seek a direction for medical education. The theoretical and empirical literature indicates that moral deliberation may transcend the incompatibilities between the formal and the virtuous, may enhance moral and other aspects of personal sensitivity, may help design and improve other parts of the curricula, and may foster self-awareness and clarification of the professional role. Not only are these goals essential for good and conscientious doctoring, but they may also reduce physicians' "burn-out". We argue that medical education should focus on the ubiquitous practice of deliberation in contemporary medicine, and especially the practice of moral deliberation.

  3. Spread-spectrum communication using binary spatiotemporal chaotic codes

    International Nuclear Information System (INIS)

    Wang Xingang; Zhan Meng; Gong Xiaofeng; Lai, C.H.; Lai, Y.-C.

    2005-01-01

    We propose a scheme to generate binary code for baseband spread-spectrum communication by using a chain of coupled chaotic maps. We compare the performances of this type of spatiotemporal chaotic code with those of a conventional code used frequently in digital communication, the Gold code, and demonstrate that our code is comparable or even superior to the Gold code in several key aspects: security, bit error rate, code generation speed, and the number of possible code sequences. As the field of communicating with chaos faces doubts in terms of performance comparison with conventional digital communication schemes, our work gives a clear message that communicating with chaos can be advantageous and it deserves further attention from the nonlinear science community

  4. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  5. Subcarrier multiplexing optical quantum key distribution

    International Nuclear Information System (INIS)

    Ortigosa-Blanch, A.; Capmany, J.

    2006-01-01

    We present the physical principles of a quantum key distribution system that opens the possibility of parallel quantum key distribution and, therefore, of a substantial improvement in the bit rate of such systems. Quantum mechanics allows for multiple measurements at different frequencies and thus we exploit this concept by extending the concept of frequency coding to the case where more than one radio-frequency subcarrier is used for independently encoding the bits onto an optical carrier. Taking advantage of subcarrier multiplexing techniques we demonstrate that the bit rate can be greatly improved as parallel key distribution is enabled

  6. Synchronization in Quantum Key Distribution Systems

    Directory of Open Access Journals (Sweden)

    Anton Pljonkin

    2017-10-01

    Full Text Available In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector’s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.

  7. Building a Better Campus: An Update on Building Codes.

    Science.gov (United States)

    Madden, Michael J.

    2002-01-01

    Discusses the implications for higher education institutions in terms of facility planning, design, construction, and renovation of the move from regionally-developed model-building codes to two international sets of codes. Also addresses the new performance-based design option within the codes. (EV)

  8. VLSI IMPLEMENTATION OF NOVEL ROUND KEYS GENERATION SCHEME FOR CRYPTOGRAPHY APPLICATIONS BY ERROR CONTROL ALGORITHM

    Directory of Open Access Journals (Sweden)

    B. SENTHILKUMAR

    2015-05-01

    Full Text Available A novel implementation of code based cryptography (Cryptocoding technique for multi-layer key distribution scheme is presented. VLSI chip is designed for storing information on generation of round keys. New algorithm is developed for reduced key size with optimal performance. Error Control Algorithm is employed for both generation of round keys and diffusion of non-linearity among them. Two new functions for bit inversion and its reversal are developed for cryptocoding. Probability of retrieving original key from any other round keys is reduced by diffusing nonlinear selective bit inversions on round keys. Randomized selective bit inversions are done on equal length of key bits by Round Constant Feedback Shift Register within the error correction limits of chosen code. Complexity of retrieving the original key from any other round keys is increased by optimal hardware usage. Proposed design is simulated and synthesized using VHDL coding for Spartan3E FPGA and results are shown. Comparative analysis is done between 128 bit Advanced Encryption Standard round keys and proposed round keys for showing security strength of proposed algorithm. This paper concludes that chip based multi-layer key distribution of proposed algorithm is an enhanced solution to the existing threats on cryptography algorithms.

  9. APLICACIONES EDUCATIVAS DE LA TEORÍA VYGOTSKIANA. EL PROGRAMA (“KEY TO LEARNING” APPLICATIONS OF VYGOTSKY’S THEORY TO EDUCATION. THE “KEY TO LEARNING” PROGRAM

    Directory of Open Access Journals (Sweden)

    Moisés Esteban Guitart

    2011-08-01

    Full Text Available Resumen:En ciencias de la educación, las últimas décadas han estado marcadas por un interés en las ideas de Lev S. Vygotski. De hecho, a partir de esas ideas se han propuesto varias aplicaciones educativas. Una de ellas es el “Key to learning”. El artículo propone una visión general de este programa educativo desarrollado a partir de algunos trabajos e ideas de autores rusos contemporáneos. Primero, desarrollamos algunas ideas en torno a la noción de zona de desarrollo próximo (ZpD. Después, sugerimos la teoría de las habilidades de aprendizaje. En este sentido, el objetivo principal de “Key to learning” es mejorar las habilidades de aprendizaje cognitivas, comunicativas y directivas de niños de entre 3 a 7 años de edad. Para este propósito son creadas 12 unidades curriculares que componen el programa. Para concluir se enfatiza la creación de zonas de desarrollo próximo estructuradas como parte de un sistema de enseñanza y aprendizaje que vincula la actividad, la asistencia y la agencia.Abstract: The last decades have been marked in educational sciences by an upsurge of interest in Lev S. Vygotsky´s ideas. Indeed, different applications of Vygotsky’s theory to education have been suggested. One of them is the “key to learning” program. This paper proposes an overview of this educational program developed from the work and ideas of several contemporary Russian scholars. First, we develop some ideas on zone of proximal development. After that, we suggest the learning skills theory. In that sense, the main objective of “Key to learning” is to improve the cognitive, communicative, and directive learning skills of children between 3 and 7 years of age. For this purpose are created 12 curriculum units composing the program. We conclude emphasizing the creation of structured zones of proximal development as a part of a teaching-learning learning system, which links activity, assistance and agency.

  10. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed

    2018-04-08

    Convolutional Sparse Coding (CSC) is a well-established image representation model especially suited for image restoration tasks. In this work, we extend the applicability of this model by proposing a supervised approach to convolutional sparse coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements to be discriminative. Experimental results show that using supervised convolutional learning results in two key advantages. First, we learn more semantically relevant filters in the dictionary and second, we achieve improved image reconstruction on unseen data.

  11. Code of Ethics for Education Abroad

    Science.gov (United States)

    Forum on Education Abroad, 2011

    2011-01-01

    The Forum on Education Abroad was formed by educational institutions and study abroad program provider organizations committed to academic excellence and superior professional program management in higher education abroad. As the organization recognized by the U.S. federal government as the standards setting authority for the field, the Forum and…

  12. Educational Leadership: Key Challenges and Ethical Tensions

    Science.gov (United States)

    Duignan, Patrick

    2007-01-01

    "Educational Leadership" is a major research book on contemporary leadership challenges for educational leaders. In this groundbreaking new work, educational leaders in schools, including teachers, are provided with ways of analysing and resolving common but complex leadership challenges. Ethical tensions inherent in these challenges are…

  13. Curated Collections for Educators: Five Key Papers about Residents as Teachers Curriculum Development.

    Science.gov (United States)

    Krzyzaniak, Sara M; Cherney, Alan; Messman, Anne; Natesan, Sreeja; Overbeck, Michael; Schnapp, Benjamin; Boysen-Osborn, Megan

    2018-02-04

    The Accreditation Council for Graduate Medical Education (ACGME) requires residency programs to prepare residents to teach and assess medical students and other learners. In order to achieve this, many programs develop formal residents as teachers (RAT) curricula. Medical educators may seek the guidance of previously published literature during the development of RAT programs at their institutions. The authors sought to identify key articles published on the subject of RAT programs over the last 10 years. The authors utilized a formal literature search with the help of a medical librarian and identified additional articles from virtual discussions among the author group and an open call for articles on Twitter using the hashtag #MedEd. Virtual discussions occurred within an online community of practice, the Academic Life in Emergency Medicine (ALiEM) Faculty Incubator. The lead author conducted a four-round modified Delphi process among the author group in order to narrow the broad article list to five key articles on RAT programs. The authors summarize each article and provide considerations for junior faculty as well as faculty developers. Curriculum development and program evaluation should utilize established frameworks and evidence-based approaches. The papers identified by this Delphi process will help faculty use best practices when creating or revising new RAT curriculum. In addition, faculty tasked with guiding junior faculty in this process or creating faculty development programs around curriculum development will find these articles to be a great resource for building content.

  14. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding...... complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity...... a mechanism to perform efficient Gaussian elimination over sparse matrices going beyond belief propagation but maintaining low decoding complexity. Supporting simulation results are provided showing the trade-off between decoding complexity and completion time....

  15. Optical image encryption using QR code and multilevel fingerprints in gyrator transform domains

    Science.gov (United States)

    Wei, Yang; Yan, Aimin; Dong, Jiabin; Hu, Zhijuan; Zhang, Jingtao

    2017-11-01

    A new concept of GT encryption scheme is proposed in this paper. We present a novel optical image encryption method by using quick response (QR) code and multilevel fingerprint keys in gyrator transform (GT) domains. In this method, an original image is firstly transformed into a QR code, which is placed in the input plane of cascaded GTs. Subsequently, the QR code is encrypted into the cipher-text by using multilevel fingerprint keys. The original image can be obtained easily by reading the high-quality retrieved QR code with hand-held devices. The main parameters used as private keys are GTs' rotation angles and multilevel fingerprints. Biometrics and cryptography are integrated with each other to improve data security. Numerical simulations are performed to demonstrate the validity and feasibility of the proposed encryption scheme. In the future, the method of applying QR codes and fingerprints in GT domains possesses much potential for information security.

  16. University Education Of Specialists In International Affairs As A Way Of Passing Cultural Code

    Directory of Open Access Journals (Sweden)

    Irina M. Shepeleva

    2014-01-01

    Full Text Available The article describes the cultural code approach to the process of higher education requires global understanding and awareness of the integrity of academic studies at the university, comprising both professional and humanitarian disciplines, such as philosophy, history, ethnography, psychology etc. International communication playing the key role in the development of the world community presupposes systemic and interdisciplinary approach to solving problems and facing challenges arising in the modern times. Language is the most essential component of communication whose organization is based on the principles of interaction, cooperation and politeness ensuring the molding of communicative norms of social behavior. Compliance with these norms creates conditions for effective exchange of opinions, shapes an environment for positive interaction and implementation of communicative strategies by participants in verbal disquisition. On the other hand, national pictures of the world, implanted in the conscience of a child by their family and society serve as natural limits to international communication and understanding cross-cultural peculiarities. They often prevent people from reaching rapport with their foreign counterparts, as their worldviews come into contradiction. National and cultural distinctions cause main differences between systems, norms and uses. National stereotypes, focusing on most typical features of a nation, could serve as a tool for overcoming this discrepancy. Holistic approach to studying a foreign language as an integral part of the culture, alongside with other humanitarian and social disciplines, involves a deep insight into core mental and spiritual values of the society. So, the guiding role of the university teacher consists in dealing with professional issues while addressing the wide cultural content and intercultural objectives.

  17. UNIVERSITY EDUCATION OF SPECIALISTS IN INTERNATIONAL AFFAIRS AS A WAY OF PASSING CULTURAL CODE

    Directory of Open Access Journals (Sweden)

    Irina M. Shepeleva

    2014-01-01

    Full Text Available The article describes the cultural code approach to the process of higher education requires global understanding and awareness of the integrity of academic studies at the university, comprising both professional and humanitarian disciplines, such as philosophy, history, ethnography, psychology etc. International communication playing the key role in the development of the world community presupposes systemic and interdisciplinary approach to solving problems and facing challenges arising in the modern times. Language is the most essential component of communication whose organization is based on the principles of interaction, cooperation and politeness ensuring the molding of communicative norms of social behavior. Compliance with these norms creates conditions for effective exchange of opinions, shapes an environment for positive interaction and implementation of communicative strategies by participants in verbal disquisition. On the other hand, national pictures of the world, implanted in the conscience of a child by their family and society serve as natural limits to international communication and understanding cross-cultural peculiarities. They often prevent people from reaching rapport with their foreign counterparts, as their worldviews come into contradiction. National and cultural distinctions cause main differences between systems, norms and uses. National stereotypes, focusing on most typical features of a nation, could serve as a tool for overcoming this discrepancy. Holistic approach to studying a foreign language as an integral part of the culture, alongside with other humanitarian and social disciplines, involves a deep insight into core mental and spiritual values of the society. So, the guiding role of the university teacher consists in dealing with professional issues while addressing the wide cultural content and intercultural objectives.

  18. Attacks on quantum key distribution protocols that employ non-ITS authentication

    Science.gov (United States)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  19. Key Performance Indicators for Primary Schools.

    Science.gov (United States)

    Strand, Steve

    Focusing mostly on their application for primary schools, this document describes the educational key performance indicators (KPI) employed by the Wendsworth, England, Local Educational Authority (LEA). Indicators are divided into 3 areas, educational context, resource development, and outcomes. Contextual indicators include pupil mobility, home…

  20. Professional Education: Key to Transformation

    National Research Council Canada - National Science Library

    Reoyo, Paul

    2002-01-01

    The Army, as an institution must face up to the new challenges of the 21st century and transform professional education with the same urgency and energy it is applying to develop the Objective Force...

  1. Bring out your codes! Bring out your codes! (Increasing Software Visibility and Re-use)

    Science.gov (United States)

    Allen, A.; Berriman, B.; Brunner, R.; Burger, D.; DuPrie, K.; Hanisch, R. J.; Mann, R.; Mink, J.; Sandin, C.; Shortridge, K.; Teuben, P.

    2013-10-01

    Progress is being made in code discoverability and preservation, but as discussed at ADASS XXI, many codes still remain hidden from public view. With the Astrophysics Source Code Library (ASCL) now indexed by the SAO/NASA Astrophysics Data System (ADS), the introduction of a new journal, Astronomy & Computing, focused on astrophysics software, and the increasing success of education efforts such as Software Carpentry and SciCoder, the community has the opportunity to set a higher standard for its science by encouraging the release of software for examination and possible reuse. We assembled representatives of the community to present issues inhibiting code release and sought suggestions for tackling these factors. The session began with brief statements by panelists; the floor was then opened for discussion and ideas. Comments covered a diverse range of related topics and points of view, with apparent support for the propositions that algorithms should be readily available, code used to produce published scientific results should be made available, and there should be discovery mechanisms to allow these to be found easily. With increased use of resources such as GitHub (for code availability), ASCL (for code discovery), and a stated strong preference from the new journal Astronomy & Computing for code release, we expect to see additional progress over the next few years.

  2. Civil Behavior, Safe-School Planning, and Dress Codes

    Science.gov (United States)

    Studak, Cathryn M.; Workman, Jane E.

    2007-01-01

    This research examined news reports in order to identify incidents that precipitated dress code revisions. News reports were examined within the framework of rules for civil behavior. Using key words "school dress codes" and "violence," LEXIS/NEXIS was used to access 104 articles from 44 U.S. newspapers from December 3, 2004 to December 2, 2005.…

  3. Is Self-Regulation Sufficient? Case of the German Transparency Code

    Directory of Open Access Journals (Sweden)

    Kristin Buske

    2016-02-01

    Full Text Available The German pharmaceutical industry is stepping ahead with its implementation of a new transparency disclosure code for cooperation between pharmaceutical companies and health care professionals (HCPs and health care organisations (HCOs. In Germany, this transparency code (“Transparenzkodex” is applicable since January 2015, and data will be publicly available around mid-2016. No empirical work has been done that addresses the impact of the transparency code on cooperation between HCPs, HCOs and the pharmaceutical companies, including the possibilities of competitive analysis of the available data. In this paper, we interviewed experts from 11 pharmaceutical companies representing small, medium-sized as well as multinational corporations which represent 80% of the German pharmaceutical market. Besides interviews, the authors designed a game to evaluate possible financial investments in key opinion leaders. The market can be regarded as a zero sum game. By allowing public identification of such key HCPs and HCOs, the amount spent on them might increase and not decrease. In a way, the transparency code may foster more and not less spending; in our simulation game, the financial investment in marketing key HCPs and HCOs exceeded sustainable limits.

  4. The Revised SEND Code of Practice 0-25: Effective Practice in Engaging Children and Young People in Decision-Making about Interventions for Social, Emotional and Mental Health Needs

    Science.gov (United States)

    Kennedy, Emma-Kate

    2015-01-01

    A key principle upon which the Revised Special Educational Needs and Disability (SEND) Code of Practice 0-25 (2015) is based is children's involvement in decision-making that affects them, and a significant change is the removal of the term "behaviour" and an emphasis on social, emotional and mental health (SEMH) needs. To ensure that…

  5. Coding training for medical students: How good is diagnoses coding with ICD-10 by novices?

    Directory of Open Access Journals (Sweden)

    Stausberg, Jürgen

    2005-04-01

    Full Text Available Teaching of knowledge and competence in documentation and coding is an essential part of medical education. Therefore, coding training had been placed within the course of epidemiology, medical biometry, and medical informatics. From this, we can draw conclusions about the quality of coding by novices. One hundred and eighteen students coded diagnoses from 15 nephrological cases in homework. In addition to interrater reliability, validity was calculated by comparison with a reference coding. On the level of terminal codes, 59.3% of the students' results were correct. The completeness was calculated as 58.0%. The results on the chapter level increased up to 91.5% and 87.7% respectively. For the calculation of reliability a new, simple measure was developed that leads to values of 0.46 on the level of terminal codes and 0.87 on the chapter level for interrater reliability. The figures of concordance with the reference coding are quite similar. In contrary, routine data show considerably lower results with 0.34 and 0.63 respectively. Interrater reliability and validity of coding by novices is as good as coding by experts. The missing advantage of experts could be explained by the workload of documentation and a negative attitude to coding on the one hand. On the other hand, coding in a DRG-system is handicapped by a large number of detailed coding rules, which do not end in uniform results but rather lead to wrong and random codes. Anyway, students left the course well prepared for coding.

  6. The Cost of Enforcing Building Energy Codes: Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Williams, Alison [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Vine, Ed [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Price, Sarah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Sturges, Andrew [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Rosenquist, Greg [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-04-01

    The purpose of this literature review is to summarize key findings regarding the costs associated with enforcing building energy code compliance—primarily focusing on costs borne by local government. The review takes into consideration over 150 documents that discuss, to some extent, code enforcement. This review emphasizes those documents that specifically focus on costs associated with energy code enforcement. Given the low rates of building energy code compliance that have been reported in existing studies, as well as the many barriers to both energy code compliance and enforcement, this study seeks to identify the costs of initiatives to improve compliance and enforcement. Costs are reported primarily as presented in the original source. Some costs are given on a per home or per building basis, and others are provided for jurisdictions of a certain size. This literature review gives an overview of state-based compliance rates, barriers to code enforcement, and U.S. Department of Energy (DOE) and key stakeholder involvement in improving compliance with building energy codes. In addition, the processes and costs associated with compliance and enforcement of building energy codes are presented. The second phase of this study, which will be presented in a different report, will consist of surveying 34 experts in the building industry at the national and state or local levels in order to obtain additional cost information, building on the findings from the first phase, as well as recommendations for where to most effectively spend money on compliance and enforcement.

  7. The application of LDPC code in MIMO-OFDM system

    Science.gov (United States)

    Liu, Ruian; Zeng, Beibei; Chen, Tingting; Liu, Nan; Yin, Ninghao

    2018-03-01

    The combination of MIMO and OFDM technology has become one of the key technologies of the fourth generation mobile communication., which can overcome the frequency selective fading of wireless channel, increase the system capacity and improve the frequency utilization. Error correcting coding introduced into the system can further improve its performance. LDPC (low density parity check) code is a kind of error correcting code which can improve system reliability and anti-interference ability, and the decoding is simple and easy to operate. This paper mainly discusses the application of LDPC code in MIMO-OFDM system.

  8. The University of Canberra quantum key distribution testbed

    International Nuclear Information System (INIS)

    Ganeshkumar, G.; Edwards, P.J.; Cheung, W.N.; Barbopoulos, L.O.; Pham, H.; Hazel, J.C.

    1999-01-01

    Full text: We describe the design, operation and preliminary results obtained from a quantum key distribution (QKD) testbed constructed at the University of Canberra. Quantum cryptographic systems use shared secret keys exchanged in the form of sequences of polarisation coded or phase encoded single photons transmitted over an optical communications channel. Secrecy of this quantum key rests upon fundamental laws of quantum physics: measurements of linear or circular photon polarisation states introduce noise into the conjugate variable and so reveal eavesdropping. In its initial realisation reported here, pulsed light from a 650nm laser diode is attenuated by a factor of 10 6 , plane-polarised and then transmitted through a birefringent liquid crystal modulator (LCM) to a polarisation sensitive single photon receiver. This transmitted key sequence consists of a 1 kHz train of weak coherent 100ns wide light pulses, polarisation coded according to the BB84 protocol. Each pulse is randomly assigned one of four polarisation states (two orthogonal linear and two orthogonal circular) by computer PCA operated by the sender ('Alice'). This quaternary polarisation shift keyed photon stream is detected by the receiver ('Bob') whose computer (PCB) randomly chooses either a linear or a circular polarisation basis. Computer PCB is also used for final key selection, authentication, privacy amplification and eavesdropping. We briefly discuss the realisation of a mesoscopic single photon QKD source and the use of the testbed to simulate a global quantum key distribution system using earth satellites. Copyright (1999) Australian Optical Society

  9. Waveguide-type optical circuits for recognition of optical 8QAM-coded label

    Science.gov (United States)

    Surenkhorol, Tumendemberel; Kishikawa, Hiroki; Goto, Nobuo; Gonchigsumlaa, Khishigjargal

    2017-10-01

    Optical signal processing is expected to be applied in network nodes. In photonic routers, label recognition is one of the important functions. We have studied different kinds of label recognition methods so far for on-off keying, binary phase-shift keying, quadrature phase-shift keying, and 16 quadrature amplitude modulation-coded labels. We propose a method based on waveguide circuits to recognize an optical eight quadrature amplitude modulation (8QAM)-coded label by simple passive optical signal processing. The recognition of the proposed method is theoretically analyzed and numerically simulated by the finite difference beam propagation method. The noise tolerance is discussed, and bit-error rate against optical signal-to-noise ratio is evaluated. The scalability of the proposed method is also discussed theoretically for two-symbol length 8QAM-coded labels.

  10. Rediscovering Paideia and the Meaning of a Scholarly Career: Rejoinder to "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory"

    Science.gov (United States)

    Antonacopoulou, Elena P.

    2016-01-01

    In "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory," authors J.B. Arbaugh, Charles J. Fornaciari, and Alvin Hwang ("Journal of Management Education," December 2016 vol. 40 no. 6 p654-691, see EJ1118407) used citation analysis to track the development of…

  11. Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds

    OpenAIRE

    JAJODIA , Sushil; Litwin , Witold; Schwarz , Thomas

    2013-01-01

    Encryption key loss problem is the Achilles's heel of cryptography. Key escrow helps, but favors disclosures. Schemes for recoverable encryption keys through noised secret sharing alleviate the dilemma. Key owner escrows a specifically encrypted backup. The recovery needs a large cloud. Cloud cost, money trail should rarefy illegal attempts. We now propose noised secret sharing schemes supporting discounts. The recovery request with discount code lowers the recovery complexity, easily by orde...

  12. NAEYC Code of Ethical Conduct. Revised = Codigo de Conducta Etica. Revisada

    Science.gov (United States)

    National Association of Elementary School Principals (NAESP), 2005

    2005-01-01

    This document presents a code of ethics for early childhood educators that offers guidelines for responsible behavior and sets forth a common basis for resolving ethical dilemmas encountered in early education. It represents the English and Spanish versions of the revised code. Its contents were approved by the NAEYC Governing Board in April 2005…

  13. Status report on the 'Merging' of the Electron-Cloud Code POSINST with the 3-D Accelerator PIC CODE WARP

    International Nuclear Information System (INIS)

    Vay, J.-L.; Furman, M.A.; Azevedo, A.W.; Cohen, R.H.; Friedman, A.; Grote, D.P.; Stoltz, P.H.

    2004-01-01

    We have integrated the electron-cloud code POSINST [1] with WARP [2]--a 3-D parallel Particle-In-Cell accelerator code developed for Heavy Ion Inertial Fusion--so that the two can interoperate. Both codes are run in the same process, communicate through a Python interpreter (already used in WARP), and share certain key arrays (so far, particle positions and velocities). Currently, POSINST provides primary and secondary sources of electrons, beam bunch kicks, a particle mover, and diagnostics. WARP provides the field solvers and diagnostics. Secondary emission routines are provided by the Tech-X package CMEE

  14. Development of Teaching Materials for a Physical Chemistry Experiment Using the QR Code

    OpenAIRE

    吉村, 忠与志

    2008-01-01

    The development of teaching materials with the QR code was attempted in an educational environment using a mobile telephone. The QR code is not sufficiently utilized in education, and the current study is one of the first in the field. The QR code is encrypted. However, the QR code can be deciphered by mobile telephones, thus enabling the expression of text in a small space.Contents of "Physical Chemistry Experiment" which are available on the Internet are briefly summarized and simplified. T...

  15. High-Speed Soft-Decision Decoding of Two Reed-Muller Codes

    Science.gov (United States)

    Lin, Shu; Uehara, Gregory T.

    1996-01-01

    In his research, we have proposed the (64, 40, 8) subcode of the third-order Reed-Muller (RM) code to NASA for high-speed satellite communications. This RM subcode can be used either alone or as an inner code of a concatenated coding system with the NASA standard (255, 233, 33) Reed-Solomon (RS) code as the outer code to achieve high performance (or low bit-error rate) with reduced decoding complexity. It can also be used as a component code in a multilevel bandwidth efficient coded modulation system to achieve reliable bandwidth efficient data transmission. This report will summarize the key progress we have made toward achieving our eventual goal of implementing a decoder system based upon this code. In the first phase of study, we investigated the complexities of various sectionalized trellis diagrams for the proposed (64, 40, 8) RNI subcode. We found a specific 8-trellis diagram for this code which requires the least decoding complexity with a high possibility of achieving a decoding speed of 600 M bits per second (Mbps). The combination of a large number of states and a hi ch data rate will be made possible due to the utilization of a high degree of parallelism throughout the architecture. This trellis diagram will be presented and briefly described. In the second phase of study which was carried out through the past year, we investigated circuit architectures to determine the feasibility of VLSI implementation of a high-speed Viterbi decoder based on this 8-section trellis diagram. We began to examine specific design and implementation approaches to implement a fully custom integrated circuit (IC) which will be a key building block for a decoder system implementation. The key results will be presented in this report. This report will be divided into three primary sections. First, we will briefly describe the system block diagram in which the proposed decoder is assumed to be operating and present some of the key architectural approaches being used to

  16. Advanced hardware design for error correcting codes

    CERN Document Server

    Coussy, Philippe

    2015-01-01

    This book provides thorough coverage of error correcting techniques. It includes essential basic concepts and the latest advances on key topics in design, implementation, and optimization of hardware/software systems for error correction. The book’s chapters are written by internationally recognized experts in this field. Topics include evolution of error correction techniques, industrial user needs, architectures, and design approaches for the most advanced error correcting codes (Polar Codes, Non-Binary LDPC, Product Codes, etc). This book provides access to recent results, and is suitable for graduate students and researchers of mathematics, computer science, and engineering. • Examines how to optimize the architecture of hardware design for error correcting codes; • Presents error correction codes from theory to optimized architecture for the current and the next generation standards; • Provides coverage of industrial user needs advanced error correcting techniques.

  17. QR Codes in Education and Communication

    Science.gov (United States)

    Durak, Gurhan; Ozkeskin, E. Emre; Ataizi, Murat

    2016-01-01

    Technological advances brought applications of innovations to education. Conventional education increasingly flourishes with new technologies accompanied by more learner active environments. In this continuum, there are learners preferring self-learning. Traditional learning materials yield attractive, motivating and technologically enhanced…

  18. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage....... This paper advocates for the use of SDN to bring about future Internet and 5G network services by incorporating network coding (NC) functionalities. The inherent flexibility of both SDN and NC provides a fertile ground to envision more efficient, robust, and secure networking designs, that may also...

  19. Intrinsically stable phase-modulated polarization encoding system for quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Liu Xiaobao [Laboratory of Photonic Information Technology, School for Information and Optoelectronic Science and Engineering, South China Normal University, Guangzhou 510006 (China); Liao Changjun [Laboratory of Photonic Information Technology, School for Information and Optoelectronic Science and Engineering, South China Normal University, Guangzhou 510006 (China)], E-mail: chliao@scnu.edu.cn; Mi Jinglong; Wang Jindong; Liu Songhao [Laboratory of Photonic Information Technology, School for Information and Optoelectronic Science and Engineering, South China Normal University, Guangzhou 510006 (China)

    2008-12-22

    We demonstrate experimentally an intrinsically stable polarization coding and decoding system composed of optical-fiber Sagnac interferometers with integrated phase modulators for quantum key distribution. An interference visibility of 98.35% can be kept longtime during the experiment without any efforts of active compensation for coding all four desired polarization states.

  20. A Key to the Art of Letters

    DEFF Research Database (Denmark)

    Jensen-Rix, Robert William

    2008-01-01

    The article examines A. Lane's grammar A Key to the Art of Letters and its contexts. Symbolically published at the threshold to the eighteenth century, Lane presents an unusually bold plan to make English a world language. Although Lane's book holds a key position in the development of English...... that Lane is the first to use English as the basis for writing universal grammar, as part of his strategy to promote English as a universal code for learning and science...

  1. SERPENT Monte Carlo reactor physics code

    International Nuclear Information System (INIS)

    Leppaenen, J.

    2010-01-01

    SERPENT is a three-dimensional continuous-energy Monte Carlo reactor physics burnup calculation code, developed at VTT Technical Research Centre of Finland since 2004. The code is specialized in lattice physics applications, but the universe-based geometry description allows transport simulation to be carried out in complicated three-dimensional geometries as well. The suggested applications of SERPENT include generation of homogenized multi-group constants for deterministic reactor simulator calculations, fuel cycle studies involving detailed assembly-level burnup calculations, validation of deterministic lattice transport codes, research reactor applications, educational purposes and demonstration of reactor physics phenomena. The Serpent code has been publicly distributed by the OECD/NEA Data Bank since May 2009 and RSICC in the U. S. since March 2010. The code is being used in some 35 organizations in 20 countries around the world. This paper presents an overview of the methods and capabilities of the Serpent code, with examples in the modelling of WWER-440 reactor physics. (Author)

  2. Low Computational Complexity Network Coding For Mobile Networks

    DEFF Research Database (Denmark)

    Heide, Janus

    2012-01-01

    Network Coding (NC) is a technique that can provide benefits in many types of networks, some examples from wireless networks are: In relay networks, either the physical or the data link layer, to reduce the number of transmissions. In reliable multicast, to reduce the amount of signaling and enable......-flow coding technique. One of the key challenges of this technique is its inherent computational complexity which can lead to high computational load and energy consumption in particular on the mobile platforms that are the target platform in this work. To increase the coding throughput several...

  3. Improving Latino Children's Early Language and Literacy Development: Key Features of Early Childhood Education within Family Literacy Programmes

    Science.gov (United States)

    Jung, Youngok; Zuniga, Stephen; Howes, Carollee; Jeon, Hyun-Joo; Parrish, Deborah; Quick, Heather; Manship, Karen; Hauser, Alison

    2016-01-01

    Noting the lack of research on how early childhood education (ECE) programmes within family literacy programmes influence Latino children's early language and literacy development, this study examined key features of ECE programmes, specifically teacher-child interactions and child engagement in language and literacy activities and how these…

  4. A robust SRAM-PUF key generation scheme based on polar codes

    NARCIS (Netherlands)

    Chen, Bin; Ignatenko, Tanya; Willems, Frans M.J.; Maes, Roel; van der Sluis, Erik; Selimis, Georgios

    2017-01-01

    Physical unclonable functions (PUFs) are relatively new security primitives used for device authentication and device-specific secret key generation. In this paper we focus on SRAM- PUFs. The SRAM-PUFs enjoy uniqueness and randomness properties stemming from the intrinsic randomness of SRAM memory

  5. No Child Left Behind in Art Education Policy: A Review of Key Recommendations for Arts Language Revisions

    Science.gov (United States)

    Grey, Anne C.

    2010-01-01

    From bipartisan origins and a laudable intent, the No Child Left Behind (Act) of 2001 has profoundly altered the condition of art education. A historical vantage point and review of literature reveals the current status of pending arts language revisions to the NCLB Act, as well as a pressing need to examine the key recommendations and to consider…

  6. The NMC code: conduct, performance and ethics.

    Science.gov (United States)

    Goldsmith, Jan

    The Code: Standards of Conduct, Performance and Ethics for Nurses and Midwives is a set of key principles that should underpin the practice of all nurses and midwives, and remind them of their professional responsibilities. It is not just a tool used in fitness-to-practise cases--it should be used to guide daily practice for all nurses and midwives. Alongside other standards, guidance and advice from the NMC, the code should be used to support professional development.

  7. From Cool Cash to Coded Chaos

    DEFF Research Database (Denmark)

    Rennison, Betina Wolfgang

    of management differently. In this chaos of codes the managerial challenge is to take a second order position in order to strategically manage the communication that manages management itself. Key words: Management; personnel management; human-relations; pay-system; communication; system-theory; discursive...... of Denmark (called New Wage), this paper theorizes this complexity in terms of Niklas Luhmann's systems theory. It identifies four wholly different `codes' of communication: legal, economic, pedagogical and intimate. Each of them shapes the phenomena of `pay', the construal of the employee and the form...

  8. Image authentication using distributed source coding.

    Science.gov (United States)

    Lin, Yao-Chung; Varodayan, David; Girod, Bernd

    2012-01-01

    We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.

  9. Nursing students and teaching of codes of ethics: an empirical research study.

    Science.gov (United States)

    Numminen, O H; Leino-Kilpi, H; van der Arend, A; Katajisto, J

    2009-12-01

    To explore graduating nursing students' perception of nurse educators' teaching of codes of ethics in polytechnics providing basic nursing education in Finland. Codes of ethics are regarded as an essential content in most nursing ethics curricula. However, little is known about how their teaching is implemented. Descriptive, cross-sectional design was used in this study. A total of 214 nursing students responded to a structured questionnaire with one open-ended question. The data was analysed statistically by SPSS and content analysis. Students perceived teaching of the codes as fairly extensive. The emphasis was on the nurse-patient relationship. Less attention was paid to nursing in wider social contexts. Educators' use of teaching and evaluation methods was narrow. Students whose teaching had been integrated into clinical training perceived that teaching had been more extensive. However, students did not perceive integration to clinical training as a much used teaching format. Students assessed their own knowledge and ability to apply the codes as mediocre. Those educators, whose knowledge about the codes students had assessed as adequate, were also perceived to teach the codes more extensively. Regardless of the responding students' positive description of the teaching, the findings should be interpreted with caution, due to the students' limited interest to respond. In teaching ethics, particular attention should be paid to more versatile use of teaching and evaluation methods, organization of integrated teaching, educators' competence in ethics, and student outcomes so that the importance of ethics would come across to all nursing students.

  10. Holonomic surface codes for fault-tolerant quantum computation

    Science.gov (United States)

    Zhang, Jiang; Devitt, Simon J.; You, J. Q.; Nori, Franco

    2018-02-01

    Surface codes can protect quantum information stored in qubits from local errors as long as the per-operation error rate is below a certain threshold. Here we propose holonomic surface codes by harnessing the quantum holonomy of the system. In our scheme, the holonomic gates are built via auxiliary qubits rather than the auxiliary levels in multilevel systems used in conventional holonomic quantum computation. The key advantage of our approach is that the auxiliary qubits are in their ground state before and after each gate operation, so they are not involved in the operation cycles of surface codes. This provides an advantageous way to implement surface codes for fault-tolerant quantum computation.

  11. Experimental aspects of deterministic secure quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Walenta, Nino; Korn, Dietmar; Puhlmann, Dirk; Felbinger, Timo; Hoffmann, Holger; Ostermeyer, Martin [Universitaet Potsdam (Germany). Institut fuer Physik; Bostroem, Kim [Universitaet Muenster (Germany)

    2008-07-01

    Most common protocols for quantum key distribution (QKD) use non-deterministic algorithms to establish a shared key. But deterministic implementations can allow for higher net key transfer rates and eavesdropping detection rates. The Ping-Pong coding scheme by Bostroem and Felbinger[1] employs deterministic information encoding in entangled states with its characteristic quantum channel from Bob to Alice and back to Bob. Based on a table-top implementation of this protocol with polarization-entangled photons fundamental advantages as well as practical issues like transmission losses, photon storage and requirements for progress towards longer transmission distances are discussed and compared to non-deterministic protocols. Modifications of common protocols towards a deterministic quantum key distribution are addressed.

  12. UEP Concepts in Modulation and Coding

    Directory of Open Access Journals (Sweden)

    Werner Henkel

    2010-01-01

    Full Text Available First unequal error protection (UEP proposals date back to the 1960's (Masnick and Wolf; 1967, but now with the introduction of scalable video, UEP develops to a key concept for the transport of multimedia data. The paper presents an overview of some new approaches realizing UEP properties in physical transport, especially multicarrier modulation, or with LDPC and Turbo codes. For multicarrier modulation, UEP bit-loading together with hierarchical modulation is described allowing for an arbitrary number of classes, arbitrary SNR margins between the classes, and arbitrary number of bits per class. In Turbo coding, pruning, as a counterpart of puncturing is presented for flexible bit-rate adaptations, including tables with optimized pruning patterns. Bit- and/or check-irregular LDPC codes may be designed to provide UEP to its code bits. However, irregular degree distributions alone do not ensure UEP, and other necessary properties of the parity-check matrix for providing UEP are also pointed out. Pruning is also the means for constructing variable-rate LDPC codes for UEP, especially controlling the check-node profile.

  13. Java Source Code Analysis for API Migration to Embedded Systems

    Energy Technology Data Exchange (ETDEWEB)

    Winter, Victor [Univ. of Nebraska, Omaha, NE (United States); McCoy, James A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Guerrero, Jonathan [Univ. of Nebraska, Omaha, NE (United States); Reinke, Carl Werner [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Perry, James Thomas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-02-01

    Embedded systems form an integral part of our technological infrastructure and oftentimes play a complex and critical role within larger systems. From the perspective of reliability, security, and safety, strong arguments can be made favoring the use of Java over C in such systems. In part, this argument is based on the assumption that suitable subsets of Java’s APIs and extension libraries are available to embedded software developers. In practice, a number of Java-based embedded processors do not support the full features of the JVM. For such processors, source code migration is a mechanism by which key abstractions offered by APIs and extension libraries can made available to embedded software developers. The analysis required for Java source code-level library migration is based on the ability to correctly resolve element references to their corresponding element declarations. A key challenge in this setting is how to perform analysis for incomplete source-code bases (e.g., subsets of libraries) from which types and packages have been omitted. This article formalizes an approach that can be used to extend code bases targeted for migration in such a manner that the threats associated the analysis of incomplete code bases are eliminated.

  14. Blood and Books: Performing Code Switching

    Directory of Open Access Journals (Sweden)

    Jeff Friedman

    2008-05-01

    Full Text Available Code switching is a linguistic term that identifies ways individuals use communication modes and registers to negotiate difference in social relations. This essay suggests that arts-based inquiry, in the form of choreography and performance, provides a suitable and efficacious location within which both verbal and nonverbal channels of code switching can be investigated. Blood and Books, a case study of dance choreography within the context of post-colonial Maori performance in Aotearoa/New Zealand, is described and analyzed for its performance of code switching. The essay is framed by a discussion of how arts-based research within tertiary higher education requires careful negotiation in the form of code switching, as performed by the author's reflexive use of vernacular and formal registers in the essay. URN: urn:nbn:de:0114-fqs0802462

  15. Radio frequency channel coding made easy

    CERN Document Server

    Faruque, Saleh

    2016-01-01

    This book introduces Radio Frequency Channel Coding to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applications of wireless communications. The presentation is designed to be easily accessible, minimizing mathematics and maximizing visuals.

  16. One Step Quantum Key Distribution Based on EPR Entanglement.

    Science.gov (United States)

    Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao

    2016-06-30

    A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.

  17. Status report on the 'Merging' of the Electron-Cloud Code POSINST with the 3-D Accelerator PIC CODE WARP

    Energy Technology Data Exchange (ETDEWEB)

    Vay, J.-L.; Furman, M.A.; Azevedo, A.W.; Cohen, R.H.; Friedman, A.; Grote, D.P.; Stoltz, P.H.

    2004-04-19

    We have integrated the electron-cloud code POSINST [1] with WARP [2]--a 3-D parallel Particle-In-Cell accelerator code developed for Heavy Ion Inertial Fusion--so that the two can interoperate. Both codes are run in the same process, communicate through a Python interpreter (already used in WARP), and share certain key arrays (so far, particle positions and velocities). Currently, POSINST provides primary and secondary sources of electrons, beam bunch kicks, a particle mover, and diagnostics. WARP provides the field solvers and diagnostics. Secondary emission routines are provided by the Tech-X package CMEE.

  18. Static Code Analysis with Gitlab-CI

    CERN Document Server

    Datko, Szymon Tomasz

    2016-01-01

    Static Code Analysis is a simple but efficient way to ensure that application’s source code is free from known flaws and security vulnerabilities. Although such analysis tools are often coming with more advanced code editors, there are a lot of people who prefer less complicated environments. The easiest solution would involve education – where to get and how to use the aforementioned tools. However, counting on the manual usage of such tools still does not guarantee their actual usage. On the other hand, reducing the required effort, according to the idea “setup once, use anytime without sweat” seems like a more promising approach. In this paper, the approach to automate code scanning, within the existing CERN’s Gitlab installation, is described. For realization of that project, the Gitlab-CI service (the “CI” stands for "Continuous Integration"), with Docker assistance, was employed to provide a variety of static code analysers for different programming languages. This document covers the gene...

  19. Blending Classroom Teaching and Learning with QR Codes

    Science.gov (United States)

    Rikala, Jenni; Kankaanranta, Marja

    2014-01-01

    The aim of this case study was to explore the feasibility of the Quick Response (QR) codes and mobile devices in the context of Finnish basic education. The interest was especially to explore how mobile devices and QR codes can enhance and blend teaching and learning. The data were collected with a teacher interview and pupil surveys. The learning…

  20. Optical Code-Division Multiple Access: Challenges and Solutions

    Science.gov (United States)

    Chen, Lawrence R.

    2003-02-01

    Optical code-division multiple-access (OCDMA) is a technique well-suited for providing the required photonic connectivity in local access networks. Although the principles of OCDMA have been known for many years, it has never delivered on its potential. In this paper, we will describe the key challenges and impediments that have prevented OCDMA from delivering on its potential, as well as discuss possible solutions. We focus on the limitations of one-dimensional codes and the benefit of exploiting the additional degrees of freedom in using multiple dimensions for defining the codes. We discuss the advantages of using differential detection in order to implement bipolar communications. We then show how two-dimensional wavelength-time codes can be appropriately combined with differential detection in order to achieve high performance OCDMA systems with a large number of users operating with good BER performance for a large aggregate capacity. We also discuss the impact of channel coding techniques, for example forward error correction or turbo coding, on BER performance.

  1. Electromagnetic reprogrammable coding-metasurface holograms.

    Science.gov (United States)

    Li, Lianlin; Jun Cui, Tie; Ji, Wei; Liu, Shuo; Ding, Jun; Wan, Xiang; Bo Li, Yun; Jiang, Menghua; Qiu, Cheng-Wei; Zhang, Shuang

    2017-08-04

    Metasurfaces have enabled a plethora of emerging functions within an ultrathin dimension, paving way towards flat and highly integrated photonic devices. Despite the rapid progress in this area, simultaneous realization of reconfigurability, high efficiency, and full control over the phase and amplitude of scattered light is posing a great challenge. Here, we try to tackle this challenge by introducing the concept of a reprogrammable hologram based on 1-bit coding metasurfaces. The state of each unit cell of the coding metasurface can be switched between '1' and '0' by electrically controlling the loaded diodes. Our proof-of-concept experiments show that multiple desired holographic images can be realized in real time with only a single coding metasurface. The proposed reprogrammable hologram may be a key in enabling future intelligent devices with reconfigurable and programmable functionalities that may lead to advances in a variety of applications such as microscopy, display, security, data storage, and information processing.Realizing metasurfaces with reconfigurability, high efficiency, and control over phase and amplitude is a challenge. Here, Li et al. introduce a reprogrammable hologram based on a 1-bit coding metasurface, where the state of each unit cell of the coding metasurface can be switched electrically.

  2. Genetic coding and gene expression - new Quadruplet genetic coding model

    Science.gov (United States)

    Shankar Singh, Rama

    2012-07-01

    Successful demonstration of human genome project has opened the door not only for developing personalized medicine and cure for genetic diseases, but it may also answer the complex and difficult question of the origin of life. It may lead to making 21st century, a century of Biological Sciences as well. Based on the central dogma of Biology, genetic codons in conjunction with tRNA play a key role in translating the RNA bases forming sequence of amino acids leading to a synthesized protein. This is the most critical step in synthesizing the right protein needed for personalized medicine and curing genetic diseases. So far, only triplet codons involving three bases of RNA, transcribed from DNA bases, have been used. Since this approach has several inconsistencies and limitations, even the promise of personalized medicine has not been realized. The new Quadruplet genetic coding model proposed and developed here involves all four RNA bases which in conjunction with tRNA will synthesize the right protein. The transcription and translation process used will be the same, but the Quadruplet codons will help overcome most of the inconsistencies and limitations of the triplet codes. Details of this new Quadruplet genetic coding model and its subsequent potential applications including relevance to the origin of life will be presented.

  3. Planning and pre-testing: the key to effective AIDS education materials.

    Science.gov (United States)

    Ostfield, M L; Romocki, L S

    1991-06-01

    The steps in designing and producing effective AIDS prevention educational materials are outlines, using as an example a brochure originated in St. Lucia for clients at STD clinics. The brochure was intended to be read by clients as they waited for their consultation, thus it was targeted to a specific audience delimited by age, sex, language, educational level, religion and associated medical or behavioral characteristics. When researching the audience, it is necessary to learn the medium they best respond to, what they know already, what is their present behavior, how they talk about AIDS, what terms they use, how they perceive the benefits of AIDS prevention behavior, what sources of information they trust. The minimum number of key messages should be selected. Next the most appropriate channel of communication is identified. Mass media are not always best for a target audience, "little media" such as flyers and give-always may be better. The draft is then pre-tested by focus groups and interviews, querying about the text separately, then images, color, format, style. Listen to the way the respondents talk about the draft. Modify the draft and pre-test again. Fine-tune implications of the message for realism in emotional responses, respect, self-esteem, admiration and trust. To achieve wide distribution it is a good idea to involve community leaders to production of the materials, so they will be more likely to take part in the distribution process.

  4. Educators as action researchers: some key considerations

    Directory of Open Access Journals (Sweden)

    Daneel Rossouw

    2009-02-01

    Full Text Available A characteristic of expert educators is their ability to interpret classroom acti­vities critically, to identify and solve problems regarding their teaching practice, and to make thoughtful or reflective instructional and classroom management decisions that are conducive to learning. For educators to be efficacious, they should be active participants in the classroom and observers of the learning and teaching processes, assessing and interpreting the data forthcoming from the classroom and using that knowledge, together with more academic or public theory and research, as a basis for planning and decision-making. Action re­search provides educators with a strategy to enhance their reflective teaching practice, thereby sharpening their understanding of instruction and improving their instructional and classroom management skills, thus promoting educa­tional change. In this article I discuss an action research model for educators to assist them in finding alternatives to current practice by gathering data and using the data to create meaning, which is then fed back into the system with a view to improved action. The proposed action research model is highly rele­vant to pre-service and in-service teacher training.

  5. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  6. Positioning Technology and Engineering Education as a Key Force in STEM Education

    Science.gov (United States)

    Strimel, Greg; Grubbs, Michael E.

    2016-01-01

    As the presence of engineering content and practices increases in science education, the distinction between the two fields of science and technology education becomes even more vague than previously theorized. Furthermore, the addition of engineering to the title of the profession raises the question of the true aim of technology education. As a…

  7. A Public-key based Information Management Model for Mobile Agents

    OpenAIRE

    Rodriguez, Diego; Sobrado, Igor

    2000-01-01

    Mobile code based computing requires development of protection schemes that allow digital signature and encryption of data collected by the agents in untrusted hosts. These algorithms could not rely on carrying encryption keys if these keys could be stolen or used to counterfeit data by hostile hosts and agents. As a consequence, both information and keys must be protected in a way that only authorized hosts, that is the host that provides information and the server that has sent the mobile a...

  8. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  9. How educational innovations and attention to competencies in postgraduate medical education relate to preparedness for practice: the key role of the learning environment.

    Science.gov (United States)

    Dijkstra, Ids S; Pols, Jan; Remmelts, Pine; Rietzschel, Eric F; Cohen-Schotanus, Janke; Brand, Paul L P

    2015-12-01

    Many training programmes in postgraduate medical education (PGME) have introduced competency frameworks, but the effects of this change on preparedness for practice are unknown. Therefore, we explored how elements of competency-based programmes in PGME (educational innovations, attention to competencies and learning environment) were related to perceived preparedness for practice among new consultants. A questionnaire was distributed among 330 new consultants. Respondents rated how well their PGME training programme prepared them for practice, the extent to which educational innovations (portfolio, Mini-CEX) were implemented, and how much attention was paid to CanMEDS competencies during feedback and coaching, and they answered questions on the learning environment and general self-efficacy. Multiple regression and mediation analyses were used to analyze data. The response rate was 43 % (143/330). Controlling for self-efficacy and gender, the learning environment was the strongest predictor of preparedness for practice (B = 0.42, p competencies (B = 0.29, p competencies mediated the relationship between educational innovations and preparedness for practice. This mediation became stronger at higher learning environment values. The learning environment plays a key role in determining the degree to which competency-based PGME prepares trainees for independent practice.

  10. Committed to the Honor Code: An Investment Model Analysis of Academic Integrity

    Science.gov (United States)

    Dix, Emily L.; Emery, Lydia F.; Le, Benjamin

    2014-01-01

    Educators worldwide face challenges surrounding academic integrity. The development of honor codes can promote academic integrity, but understanding how and why honor codes affect behavior is critical to their successful implementation. To date, research has not examined how students' "relationship" to an honor code predicts…

  11. Adaptable Value-Set Analysis for Low-Level Code

    OpenAIRE

    Brauer, Jörg; Hansen, René Rydhof; Kowalewski, Stefan; Larsen, Kim G.; Olesen, Mads Chr.

    2012-01-01

    This paper presents a framework for binary code analysis that uses only SAT-based algorithms. Within the framework, incremental SAT solving is used to perform a form of weakly relational value-set analysis in a novel way, connecting the expressiveness of the value sets to computational complexity. Another key feature of our framework is that it translates the semantics of binary code into an intermediate representation. This allows for a straightforward translation of the program semantics in...

  12. Education as a key objective of the interdisciplinary volcanic risk mitigation strategy VESUVIUS PENTALOGUE for developing resilient and sustainable areas around Vesuvius

    Science.gov (United States)

    Dobran, F.; Imperatrice, A.

    2017-12-01

    VESUVIUS PENTALOGUE requires the achievement of 5 key objectives for Summa-Vesuvius area: (1) Development of temporary settlements for the inhabitants close to their native homeland until the volcanic crisis subsides; (2) Division of the danger zone into an exclusion nucleus that prohibits all future human settlements and discourages the existing ones, a resilience belt that houses most of the current populations, and a sustainable area beyond the resilience belt that allows for sustainable practices and temporary resettlements of resilience belt citizens following the volcanic crises; (3) Development of built environment construction codes for the population of the danger zone by utilizing plinian eruption scenarios, scenario-based seismic hazard assessment and zonation, global volcanic simulator, and dynamic structural analysis; (4) Implementation of volcanic risk information and education campaigns for different risk areas surrounding the volcano; and (5) Production of a memorandum of understanding between the authorities and scientific communities, and production of periodic progress reports for keeping the populations informed on the developments leading to the realization of the above objectives.For the past 20 years we have devoted considerable efforts towards the achievement of educational objectives. We worked with local volunteers and social and cultural organizations and with our colleagues delivered over 200 public and school seminars in 15 communities around Vesuvius, organized 2 international scientific meetings for allowing the public and high school children to interact directly with the scientists working on this volcano, and established numerous contacts with school teachers for helping them engage their students on Vesuvius from the scientific, artistic, social, and cultural perspectives. Every year GVES has been the promoter of Vesuvius area manifestations where the school children have the opportunities to expose their works on this volcano and

  13. Will the new code help researchers to be more ethical?

    Science.gov (United States)

    Sieber, J E

    1994-11-01

    A code of ethics has 2 largely incompatible objectives: to set forth enforceable minimal standards of conduct and to teach about or invoke ethical conduct. The section of the new American Psychological Association code dealing with research ethics achieves the former to some degree. However, it neither provides needed education in the ethics of research nor states where the reader might turn for such information. The code is particularly deficient in the following areas: privacy and confidentiality; institutional review boards; deception; debriefing; data sharing; and research on marginal populations, on children and adolescents, and in organizational contexts. Suggestions are offered for providing a bibliographic resource, in hard copy and on-line, that would stimulate independent interest, scholarship, education, and research on research ethics.

  14. Esophageal function testing: Billing and coding update.

    Science.gov (United States)

    Khan, A; Massey, B; Rao, S; Pandolfino, J

    2018-01-01

    Esophageal function testing is being increasingly utilized in diagnosis and management of esophageal disorders. There have been several recent technological advances in the field to allow practitioners the ability to more accurately assess and treat such conditions, but there has been a relative lack of education in the literature regarding the associated Common Procedural Terminology (CPT) codes and methods of reimbursement. This review, commissioned and supported by the American Neurogastroenterology and Motility Society Council, aims to summarize each of the CPT codes for esophageal function testing and show the trends of associated reimbursement, as well as recommend coding methods in a practical context. We also aim to encourage many of these codes to be reviewed on a gastrointestinal (GI) societal level, by providing evidence of both discrepancies in coding definitions and inadequate reimbursement in this new era of esophageal function testing. © 2017 John Wiley & Sons Ltd.

  15. Writing robust C++ code for critical applications

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    **C++** is one of the most **complex**, expressive and powerful languages out there. However, its complexity makes it hard to write **robust** code. When using C++ to code **critical** applications, ensuring **reliability** is one of the key topics. Testing, debugging and profiling are all a major part of this kind of work. In the BE department we use C++ to write a big part of the controls system for beam operation, which implies putting a big focus on system stability and ensuring smooth operation. This talk will try to: - Highlight potential problems when writing C++ code, giving guidelines on writing defensive code that could have avoided such issues - Explain how to avoid common pitfalls (both in writing C++ code and at the debugging & profiling phase) - Showcase some tools and tricks useful to C++ development The attendees' proficiency in C++ should not be a concern. Anyone is free to join, even people that do not know C++, if only to learn the pitfalls a language may have. This may benefit f...

  16. Great Expectations: Is there Evidence for Predictive Coding in Auditory Cortex?

    Science.gov (United States)

    Heilbron, Micha; Chait, Maria

    2017-08-04

    Predictive coding is possibly one of the most influential, comprehensive, and controversial theories of neural function. While proponents praise its explanatory potential, critics object that key tenets of the theory are untested or even untestable. The present article critically examines existing evidence for predictive coding in the auditory modality. Specifically, we identify five key assumptions of the theory and evaluate each in the light of animal, human and modeling studies of auditory pattern processing. For the first two assumptions - that neural responses are shaped by expectations and that these expectations are hierarchically organized - animal and human studies provide compelling evidence. The anticipatory, predictive nature of these expectations also enjoys empirical support, especially from studies on unexpected stimulus omission. However, for the existence of separate error and prediction neurons, a key assumption of the theory, evidence is lacking. More work exists on the proposed oscillatory signatures of predictive coding, and on the relation between attention and precision. However, results on these latter two assumptions are mixed or contradictory. Looking to the future, more collaboration between human and animal studies, aided by model-based analyses will be needed to test specific assumptions and implementations of predictive coding - and, as such, help determine whether this popular grand theory can fulfill its expectations. Copyright © 2017 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  17. An introduction to LIME 1.0 and its use in coupling codes for multiphysics simulations.

    Energy Technology Data Exchange (ETDEWEB)

    Belcourt, Noel; Pawlowski, Roger Patrick; Schmidt, Rodney Cannon; Hooper, Russell Warren

    2011-11-01

    LIME is a small software package for creating multiphysics simulation codes. The name was formed as an acronym denoting 'Lightweight Integrating Multiphysics Environment for coupling codes.' LIME is intended to be especially useful when separate computer codes (which may be written in any standard computer language) already exist to solve different parts of a multiphysics problem. LIME provides the key high-level software (written in C++), a well defined approach (with example templates), and interface requirements to enable the assembly of multiple physics codes into a single coupled-multiphysics simulation code. In this report we introduce important software design characteristics of LIME, describe key components of a typical multiphysics application that might be created using LIME, and provide basic examples of its use - including the customized software that must be written by a user. We also describe the types of modifications that may be needed to individual physics codes in order for them to be incorporated into a LIME-based multiphysics application.

  18. Entropy, Coding and Data Compression

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 9. Entropy, Coding and Data Compression. S Natarajan. General Article Volume 6 Issue 9 September 2001 pp 35-45. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/09/0035-0045 ...

  19. Technology transfer: The key to successful space engineering education

    Science.gov (United States)

    Fletcher, L. S.; Page, R. H.

    The 1990s are the threshold of the space revolution for the next century. This space revolution was initiated by space pioneers like Tsiolkovsky, Goddard, and Oberth, who contributed a great deal to the evolution of space exploration, and more importantly, to space education. Recently, space engineering education programs for all ages have been advocated around the world, especially in Asia and Europe, as well as the U.S.A. and the Soviet Union. And yet, although space related technologies are developing rapidly, these technologies are not being incorporated successfully into space education programs. Timely technology transfer is essential to assure the continued education of professionals. This paper reviews the evolution of space engineering education and identifies a number of initiatives which could strengthen space engineering education for the next century.

  20. Automatic Coding of Short Text Responses via Clustering in Educational Assessment

    Science.gov (United States)

    Zehner, Fabian; Sälzer, Christine; Goldhammer, Frank

    2016-01-01

    Automatic coding of short text responses opens new doors in assessment. We implemented and integrated baseline methods of natural language processing and statistical modelling by means of software components that are available under open licenses. The accuracy of automatic text coding is demonstrated by using data collected in the "Programme…

  1. The Missing Link: Connection Is the Key to Resilience in Medical Education.

    Science.gov (United States)

    McKenna, Kathleen M; Hashimoto, Daniel A; Maguire, Michael S; Bynum, William E

    2016-09-01

    Awareness of the risks of burnout, depression, learner mistreatment, and suboptimal learning environments is increasing in academic medicine. A growing wellness and resilience movement has emerged in response to these disturbing trends; however, efforts to address threats to physician resilience have often emphasized strategies to improve life outside of work, with less attention paid to the role of belonging and connection at work. In this Commentary the authors propose that connection to colleagues, patients, and profession is fundamental to medical learners' resilience, highlighting "social resilience" as a key factor in overall well-being. They outline three specific forces that drive disconnection in medical education: the impact of shift work, the impact of the electronic medical record, and the impact of "work-life balance." Finally, the authors propose ways to overcome these forces in order to build meaningful connection and enhanced resilience in a new era of medicine.

  2. Governing sexual behaviour through humanitarian codes of conduct.

    Science.gov (United States)

    Matti, Stephanie

    2015-10-01

    Since 2001, there has been a growing consensus that sexual exploitation and abuse of intended beneficiaries by humanitarian workers is a real and widespread problem that requires governance. Codes of conduct have been promoted as a key mechanism for governing the sexual behaviour of humanitarian workers and, ultimately, preventing sexual exploitation and abuse (PSEA). This article presents a systematic study of PSEA codes of conduct adopted by humanitarian non-governmental organisations (NGOs) and how they govern the sexual behaviour of humanitarian workers. It draws on Foucault's analytics of governance and speech act theory to examine the findings of a survey of references to codes of conduct made on the websites of 100 humanitarian NGOs, and to analyse some features of the organisation-specific PSEA codes identified. © 2015 The Author(s). Disasters © Overseas Development Institute, 2015.

  3. Language, Power and Gender: A Case Study of Code Switching by Less Educated People In Pakistan

    Directory of Open Access Journals (Sweden)

    Asim KARIM

    2014-03-01

    The major aims of this research were to find out the relation between language and power and how speakers’ use of powerful language varied across gender. This study was quantitative. Data collection was done through questionnaire comprising of two sections. The first section was consisted of 10 close ended questions to know the relation between language and power. The second section of the questionnaire comprising of 10 close ended questions measured the status of Punjabi and Urdu. After careful inquires 30 less educated L1 Punjabi speakers were randomly selected from the city Sheikhupura. Among these 30 participants 15 were male and 15 were female. Audio recording was taken from 14 participants, 7 males and 7 females who had also took part in survey questionnaire to get the data about Urdu code switching. The results collected through the gathered data revealed the L1 Punjabi speakers regarded Urdu as powerful language and they asserted that language and power are closely related with each other. Further women used more powerful language and for this purpose they did more Urdu code switching as compared to men.

  4. Academic freedom, analysis, and the Code of Professional Conduct.

    Science.gov (United States)

    Snelling, Paul C; Lipscomb, Martin

    2004-11-01

    Despite nursing's move into higher education, academic freedom has received little attention within the literature. After discussing the concept of academic freedom, this paper argues that there is a potential tension between academic freedom and the requirement to educate student nurses who are fit for practice. One way in which this tension might be revealed is in the marking of student assignments. We ask the question--how should nurse educators mark an essay which is sufficiently analytical but reaches moral conclusions that lie outside the Code of Professional Conduct? We argue that despite an understandable temptation to penalise such an essay, invoking the Code of Professional Conduct to do so, no penalty should be applied, and academic freedom for students within higher education should be encouraged. This is because first, academic freedom is a good in itself especially as it allows unconventional and unpalatable conclusions to be discussed and rebutted, and second, applying a penalty on these grounds is necessarily inconsistent.

  5. SAFETY IN THE DESIGN OF SCIENCE LABORATORIES AND BUILDING CODES.

    Science.gov (United States)

    HOROWITZ, HAROLD

    THE DESIGN OF COLLEGE AND UNIVERSITY BUILDINGS USED FOR SCIENTIFIC RESEARCH AND EDUCATION IS DISCUSSED IN TERMS OF LABORATORY SAFETY AND BUILDING CODES AND REGULATIONS. MAJOR TOPIC AREAS ARE--(1) SAFETY RELATED DESIGN FEATURES OF SCIENCE LABORATORIES, (2) LABORATORY SAFETY AND BUILDING CODES, AND (3) EVIDENCE OF UNSAFE DESIGN. EXAMPLES EMPHASIZE…

  6. Evaluating the Coding and Workload Accounting Improvement Initiative of Madigan Army Medical Center

    National Research Council Canada - National Science Library

    Bewley, Lee W; Bender, Brian J

    2007-01-01

    ... documentation, provider coding accuracy and education, and clinic electronic medical record (AHLTA) usage. The desired end state of the CWAI is improved medical documentation and coding accuracy at MAMC...

  7. New Channel Coding Methods for Satellite Communication

    Directory of Open Access Journals (Sweden)

    J. Sebesta

    2010-04-01

    Full Text Available This paper deals with the new progressive channel coding methods for short message transmission via satellite transponder using predetermined length of frame. The key benefits of this contribution are modification and implementation of a new turbo code and utilization of unique features with applications of methods for bit error rate estimation and algorithm for output message reconstruction. The mentioned methods allow an error free communication with very low Eb/N0 ratio and they have been adopted for satellite communication, however they can be applied for other systems working with very low Eb/N0 ratio.

  8. Unconditional security of quantum key distribution and the uncertainty principle

    International Nuclear Information System (INIS)

    Koashi, Masato

    2006-01-01

    An approach to the unconditional security of quantum key distribution protocols is presented, which is based on the uncertainty principle. The approach applies to every case that has been treated via the argument by Shor and Preskill, but it is not necessary to find quantum error correcting codes. It can also treat the cases with uncharacterized apparatuses. The proof can be applied to cases where the secret key rate is larger than the distillable entanglement

  9. Using Eight Key Questions as an Inquiry-Based Framework for Ethical Reasoning Issues in a General Education Earth Systems and Climate Change Course

    Science.gov (United States)

    Johnson, E. A.; Ball, T. C.

    2014-12-01

    An important objective in general education geoscience courses is to help students evaluate social and ethical issues based upon scientific knowledge. It can be difficult for instructors trained in the physical sciences to design effective ways of including ethical issues in large lecture courses where whole-class discussions are not practical. The Quality Enhancement Plan for James Madison University, "The Madison Collaborative: Ethical Reasoning in Action," (http://www.jmu.edu/mc/index.shtml) has identified eight key questions to be used as a framework for developing ethical reasoning exercises and evaluating student learning. These eight questions are represented by the acronym FOR CLEAR and are represented by the concepts of Fairness, Outcomes, Responsibilities, Character, Liberty, Empathy, Authority, and Rights. In this study, we use the eight key questions as an inquiry-based framework for addressing ethical issues in a 100-student general education Earth systems and climate change course. Ethical reasoning exercises are presented throughout the course and range from questions of personal behavior to issues regarding potential future generations and global natural resources. In the first few exercises, key questions are identified for the students and calibrated responses are provided as examples. By the end of the semester, students are expected to identify key questions themselves and justify their own ethical and scientific reasoning. Evaluation rubrics are customized to this scaffolding approach to the exercises. Student feedback and course data will be presented to encourage discussion of this and other approaches to explicitly incorporating ethical reasoning in general education geoscience courses.

  10. Technical Education--The Key to Sustainable Technological Development

    Science.gov (United States)

    Odo, J. U.; Okafor, W. C.; Odo, A. L.; Ejikeugwu, L. N.; Ugwuoke, C. N.

    2017-01-01

    Technical education has been identified as one of the most effective human resource development that needs to be embraced for rapid industrialization and sustainable technological development of any nation. Technical education has been an integral part of national development in many societies because of its impact on productivity and economic…

  11. Key Factors for Developing a Cross-Cultural Education Program

    Science.gov (United States)

    Yang, Keeyung; Chung, Sock H.

    2015-01-01

    Purpose: As universities and colleges face an increasingly global environment, internationalization is viewed as a critical aspect of education, a fact that has significant academic and economic implications for higher educational institutions worldwide which need to be current with cultural education to adapt to change. Learning from other…

  12. Cultural Sensitivity: The Key to Teaching Global Business.

    Science.gov (United States)

    Timm, Judee A.

    2003-01-01

    More ethical practices in business begin with ethical training in business schools. International business education classes can compare corporate codes and actual behavior; explore the role of cultural differences in values, principles, and standards; and analyze ethical dilemmas in a global environment. (SK)

  13. Calculation of key reduction for B92 QKD protocol

    Science.gov (United States)

    Mehic, Miralem; Partila, Pavol; Tovarek, Jaromir; Voznak, Miroslav

    2015-05-01

    It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.

  14. KEY ELEMENTS OF HEURISTIC METHODS USAGE IN FOREIGN THEORY OF EDUCATION (ON THE BASIS OF GREAT BRITAIN

    Directory of Open Access Journals (Sweden)

    Skvortsova Svetlana Valerevna

    2013-04-01

    Full Text Available Purpose: identify key elements of employing heuristic teaching methods in foreign theory of education. Methodology: a theoretical analysis of psychological and pedagogical literature on the issues of teaching creativity. Results: on the basis of theoretical analysis the main criteria of heuristic teaching methods are revealed: repeatability; absence of a single decision; need for group discussions; flexibility; wide variability; promotion of creative teaching; influence on the character of knowledge and relationships between the teacher and the students. Heuristic teaching methods have been divided into: methods of working with information, methods of working with problems, methods of research and methods of analyzing the decisions. The main characteristics of each group of methods are presented and certain recommendations for applying them in teaching creativity are given. Practical implications: the system of education.

  15. Microscale optical cryptography using a subdiffraction-limit optical key

    Science.gov (United States)

    Ogura, Yusuke; Aino, Masahiko; Tanida, Jun

    2018-04-01

    We present microscale optical cryptography using a subdiffraction-limit optical pattern, which is finer than the diffraction-limit size of the decrypting optical system, as a key and a substrate with a reflectance distribution as an encrypted image. Because of the subdiffraction-limit spatial coding, this method enables us to construct a secret image with the diffraction-limit resolution. Simulation and experimental results demonstrate, both qualitatively and quantitatively, that the secret image becomes recognizable when and only when the substrate is illuminated with the designed key pattern.

  16. Application and analysis of performance of dqpsk advanced modulation format in spectral amplitude coding ocdma

    International Nuclear Information System (INIS)

    Memon, A.

    2015-01-01

    SAC (Spectral Amplitude Coding) is a technique of OCDMA (Optical Code Division Multiple Access) to encode and decode data bits by utilizing spectral components of the broadband source. Usually OOK (ON-Off-Keying) modulation format is used in this encoding scheme. To make SAC OCDMA network spectrally efficient, advanced modulation format of DQPSK (Differential Quaternary Phase Shift Keying) is applied, simulated and analyzed, m-sequence code is encoded in the simulated setup. Performance regarding various lengths of m-sequence code is also analyzed and displayed in the pictorial form. The results of the simulation are evaluated with the help of electrical constellation diagram, eye diagram and bit error rate graph. All the graphs indicate better transmission quality in case of advanced modulation format of DQPSK used in SAC OCDMA network as compared with OOK. (author)

  17. Key Competences in vocational education and training

    DEFF Research Database (Denmark)

    Andersen, Ole Dibbern; Kruse, Katrine

    This article presents and discusses how key competences in the school based learning are embedded in the VET curricula during the last five years. It gives an overview of how their role has developed in light of the comprehensive Danish VET reform agreed in 2014 and implemented since August 2015....

  18. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  19. Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-method

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2016-01-01

    We show that the XOR-method based on linear error-correcting codes can be applied to achieve the secret-key capacity of binary-symmetric SRAM-PUFs. Then we focus on multiple key-bindings. We prove that no information is leaked by all the helper data about a single secret key both in the case where

  20. Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-Method

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2016-01-01

    We show that the XOR-method based on linear error-correcting codes can be applied to achieve the secret-key capacity of binary-symmetric SRAM-PUFs. Then we focus on multiple key-bindings. We prove that no information is leaked by all the helper data about a single secret key both in the case where

  1. Combined Source-Channel Coding of Images under Power and Bandwidth Constraints

    Directory of Open Access Journals (Sweden)

    Fossorier Marc

    2007-01-01

    Full Text Available This paper proposes a framework for combined source-channel coding for a power and bandwidth constrained noisy channel. The framework is applied to progressive image transmission using constant envelope -ary phase shift key ( -PSK signaling over an additive white Gaussian noise channel. First, the framework is developed for uncoded -PSK signaling (with . Then, it is extended to include coded -PSK modulation using trellis coded modulation (TCM. An adaptive TCM system is also presented. Simulation results show that, depending on the constellation size, coded -PSK signaling performs 3.1 to 5.2 dB better than uncoded -PSK signaling. Finally, the performance of our combined source-channel coding scheme is investigated from the channel capacity point of view. Our framework is further extended to include powerful channel codes like turbo and low-density parity-check (LDPC codes. With these powerful codes, our proposed scheme performs about one dB away from the capacity-achieving SNR value of the QPSK channel.

  2. Performance analysis of LDPC codes on OOK terahertz wireless channels

    International Nuclear Information System (INIS)

    Liu Chun; Wang Chang; Cao Jun-Cheng

    2016-01-01

    Atmospheric absorption, scattering, and scintillation are the major causes to deteriorate the transmission quality of terahertz (THz) wireless communications. An error control coding scheme based on low density parity check (LDPC) codes with soft decision decoding algorithm is proposed to improve the bit-error-rate (BER) performance of an on-off keying (OOK) modulated THz signal through atmospheric channel. The THz wave propagation characteristics and channel model in atmosphere is set up. Numerical simulations validate the great performance of LDPC codes against the atmospheric fading and demonstrate the huge potential in future ultra-high speed beyond Gbps THz communications. (paper)

  3. Doctoral education in a successful ecological niche

    DEFF Research Database (Denmark)

    Christensen, Mette Krogh; Lund, Ole

    2014-01-01

    Scholarly communities are dependent on and often measured by their ability to attract and develop doctoral students. Recent literature suggests that most scholarly communities entail ecological niches in which the doctoral students learn the codes and practices of research. In this article, we...... successful doctoral education because it: 1) fleshes out the professional attitude that is necessary for becoming a successful researcher in the department, 2) shapes and adapts the doctoral students’ desires to grasp and identify with the department’s practices, and 3) provides the doctoral students...... explore the microclimate in an ecological niche of doctoral education. Based on a theoretical definition of microclimate as the emotional atmosphere that ties group members together and affects their actions, we conducted a case study that aimed to describe the key features of the microclimate...

  4. On the Performance of the Cache Coding Protocol

    Directory of Open Access Journals (Sweden)

    Behnaz Maboudi

    2018-03-01

    Full Text Available Network coding approaches typically consider an unrestricted recoding of coded packets in the relay nodes to increase performance. However, this can expose the system to pollution attacks that cannot be detected during transmission, until the receivers attempt to recover the data. To prevent these attacks while allowing for the benefits of coding in mesh networks, the cache coding protocol was proposed. This protocol only allows recoding at the relays when the relay has received enough coded packets to decode an entire generation of packets. At that point, the relay node recodes and signs the recoded packets with its own private key, allowing the system to detect and minimize the effect of pollution attacks and making the relays accountable for changes on the data. This paper analyzes the delay performance of cache coding to understand the security-performance trade-off of this scheme. We introduce an analytical model for the case of two relays in an erasure channel relying on an absorbing Markov chain and an approximate model to estimate the performance in terms of the number of transmissions before successfully decoding at the receiver. We confirm our analysis using simulation results. We show that cache coding can overcome the security issues of unrestricted recoding with only a moderate decrease in system performance.

  5. Independent peer review of nuclear safety computer codes

    International Nuclear Information System (INIS)

    Boyack, B.E.; Jenks, R.P.

    1993-01-01

    A structured, independent computer code peer-review process has been developed to assist the US Nuclear Regulatory Commission (NRC) and the US Department of Energy in their nuclear safety missions. This paper describes a structured process of independent code peer review, benefits associated with a code-independent peer review, as well as the authors' recent peer-review experience. The NRC adheres to the principle that safety of plant design, construction, and operation are the responsibility of the licensee. Nevertheless, NRC staff must have the ability to independently assess plant designs and safety analyses submitted by license applicants. According to Ref. 1, open-quotes this requires that a sound understanding be obtained of the important physical phenomena that may occur during transients in operating power plants.close quotes The NRC concluded that computer codes are the principal products to open-quotes understand and predict plant response to deviations from normal operating conditionsclose quotes and has developed several codes for that purpose. However, codes cannot be used blindly; they must be assessed and found adequate for the purposes they are intended. A key part of the qualification process can be accomplished through code peer reviews; this approach has been adopted by the NRC

  6. QR code optical encryption using spatially incoherent illumination

    Science.gov (United States)

    Cheremkhin, P. A.; Krasnov, V. V.; Rodin, V. G.; Starikov, R. S.

    2017-02-01

    Optical encryption is an actively developing field of science. The majority of encryption techniques use coherent illumination and suffer from speckle noise, which severely limits their applicability. The spatially incoherent encryption technique does not have this drawback, but its effectiveness is dependent on the Fourier spectrum properties of the image to be encrypted. The application of a quick response (QR) code in the capacity of a data container solves this problem, and the embedded error correction code also enables errorless decryption. The optical encryption of digital information in the form of QR codes using spatially incoherent illumination was implemented experimentally. The encryption is based on the optical convolution of the image to be encrypted with the kinoform point spread function, which serves as an encryption key. Two liquid crystal spatial light modulators were used in the experimental setup for the QR code and the kinoform imaging, respectively. The quality of the encryption and decryption was analyzed in relation to the QR code size. Decryption was conducted digitally. The successful decryption of encrypted QR codes of up to 129  ×  129 pixels was demonstrated. A comparison with the coherent QR code encryption technique showed that the proposed technique has a signal-to-noise ratio that is at least two times higher.

  7. Spatial-Aided Low-Delay Wyner-Ziv Video Coding

    Directory of Open Access Journals (Sweden)

    Bo Wu

    2009-01-01

    Full Text Available In distributed video coding, the side information (SI quality plays an important role in Wyner-Ziv (WZ frame coding. Usually, SI is generated at the decoder by the motion-compensated interpolation (MCI from the past and future key frames under the assumption that the motion trajectory between the adjacent frames is translational with constant velocity. However, this assumption is not always true and thus, the coding efficiency for WZ coding is often unsatisfactory in video with high and/or irregular motion. This situation becomes more serious in low-delay applications since only motion-compensated extrapolation (MCE can be applied to yield SI. In this paper, a spatial-aided Wyner-Ziv video coding (WZVC in low-delay application is proposed. In SA-WZVC, at the encoder, each WZ frame is coded as performed in the existing common Wyner-Ziv video coding scheme and meanwhile, the auxiliary information is also coded with the low-complexity DPCM. At the decoder, for the WZ frame decoding, auxiliary information should be decoded firstly and then SI is generated with the help of this auxiliary information by the spatial-aided motion-compensated extrapolation (SA-MCE. Theoretical analysis proved that when a good tradeoff between the auxiliary information coding and WZ frame coding is achieved, SA-WZVC is able to achieve better rate distortion performance than the conventional MCE-based WZVC without auxiliary information. Experimental results also demonstrate that SA-WZVC can efficiently improve the coding performance of WZVC in low-delay application.

  8. RAISING INFORMATION AND COMMUNICATION TECHNOLOGIES COMPETENCE OF SCIENTIFIC AND PEDAGOGICAL EMPLOYEES - A KEY REQUIREMENT OF THE QUALITY OF EDUCATIONAL PROCESS

    Directory of Open Access Journals (Sweden)

    Nataliia V. Morze

    2017-06-01

    Full Text Available In the article it was analyzed one of the basic conditions of providing the quality of higher education according to the system of internal quality assurance standards ESG (European quality assurance standards and guidelines to increase the ICT competence of scientific-pedagogical staff of the University. It was described the modular system of training for scientific and pedagogical staff of the Borys Grinchenko Kyiv University. Special attention is paid to the description of the system of raising the level of formation the ICT competence as one of the key competences of the modern teacher. The system of professional development, which is based on creating mixed studying and technology of "flipped classroom", formative assessment, innovative educational and ICT technologies according to the specially designed informative module "Informational and communication technologies", which allows scientific-pedagogical staff to use modern ICT and educational technologies effectively for their further applying in the provision of educational services and the development of quality of open educational content and open educational e-environment available to the student at any convenient time, which will significantly improve the quality of the educational process.

  9. Key National Education Indicators: Workshop Summary

    Science.gov (United States)

    Beatty, Alexandra; Koenig, Judith A.

    2012-01-01

    The education system in the United States is continually challenged to adapt and improve, in part because its mission has become far more ambitious than it once was. At the turn of the 20th century, less than one-tenth of students enrolled were expected to graduate from high school. Today, most people expect schools to prepare all students to…

  10. Processes of code status transitions in hospitalized patients with advanced cancer.

    Science.gov (United States)

    El-Jawahri, Areej; Lau-Min, Kelsey; Nipp, Ryan D; Greer, Joseph A; Traeger, Lara N; Moran, Samantha M; D'Arpino, Sara M; Hochberg, Ephraim P; Jackson, Vicki A; Cashavelly, Barbara J; Martinson, Holly S; Ryan, David P; Temel, Jennifer S

    2017-12-15

    Although hospitalized patients with advanced cancer have a low chance of surviving cardiopulmonary resuscitation (CPR), the processes by which they change their code status from full code to do not resuscitate (DNR) are unknown. We conducted a mixed-methods study on a prospective cohort of hospitalized patients with advanced cancer. Two physicians used a consensus-driven medical record review to characterize processes that led to code status order transitions from full code to DNR. In total, 1047 hospitalizations were reviewed among 728 patients. Admitting clinicians did not address code status in 53% of hospitalizations, resulting in code status orders of "presumed full." In total, 275 patients (26.3%) transitioned from full code to DNR, and 48.7% (134 of 275 patients) of those had an order of "presumed full" at admission; however, upon further clarification, the patients expressed that they had wished to be DNR before the hospitalization. We identified 3 additional processes leading to order transition from full code to DNR acute clinical deterioration (15.3%), discontinuation of cancer-directed therapy (17.1%), and education about the potential harms/futility of CPR (15.3%). Compared with discontinuing therapy and education, transitions because of acute clinical deterioration were associated with less patient involvement (P = .002), a shorter time to death (P cancer were because of full code orders in patients who had a preference for DNR before hospitalization. Transitions due of acute clinical deterioration were associated with less patient engagement and a higher likelihood of inpatient death. Cancer 2017;123:4895-902. © 2017 American Cancer Society. © 2017 American Cancer Society.

  11. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  12. 2D arc-PIC code description: methods and documentation

    CERN Document Server

    Timko, Helga

    2011-01-01

    Vacuum discharges are one of the main limiting factors for future linear collider designs such as that of the Compact LInear Collider. To optimize machine efficiency, maintaining the highest feasible accelerating gradient below a certain breakdown rate is desirable; understanding breakdowns can therefore help us to achieve this goal. As a part of ongoing theoretical research on vacuum discharges at the Helsinki Institute of Physics, the build-up of plasma can be investigated through the particle-in-cell method. For this purpose, we have developed the 2D Arc-PIC code introduced here. We present an exhaustive description of the 2D Arc-PIC code in two parts. In the first part, we introduce the particle-in-cell method in general and detail the techniques used in the code. In the second part, we provide a documentation and derivation of the key equations occurring in the code. The code is original work of the author, written in 2010, and is therefore under the copyright of the author. The development of the code h...

  13. Demonstration of Emulator-Based Bayesian Calibration of Safety Analysis Codes: Theory and Formulation

    Directory of Open Access Journals (Sweden)

    Joseph P. Yurko

    2015-01-01

    Full Text Available System codes for simulation of safety performance of nuclear plants may contain parameters whose values are not known very accurately. New information from tests or operating experience is incorporated into safety codes by a process known as calibration, which reduces uncertainty in the output of the code and thereby improves its support for decision-making. The work reported here implements several improvements on classic calibration techniques afforded by modern analysis techniques. The key innovation has come from development of code surrogate model (or code emulator construction and prediction algorithms. Use of a fast emulator makes the calibration processes used here with Markov Chain Monte Carlo (MCMC sampling feasible. This work uses Gaussian Process (GP based emulators, which have been used previously to emulate computer codes in the nuclear field. The present work describes the formulation of an emulator that incorporates GPs into a factor analysis-type or pattern recognition-type model. This “function factorization” Gaussian Process (FFGP model allows overcoming limitations present in standard GP emulators, thereby improving both accuracy and speed of the emulator-based calibration process. Calibration of a friction-factor example using a Method of Manufactured Solution is performed to illustrate key properties of the FFGP based process.

  14. Utilizing Codes of Ethics in Health Professions Education

    Science.gov (United States)

    Dahnke, Michael D.

    2014-01-01

    Codes of ethics abound in health care, the aims and purposes of which are multiple and varied, from operating as a decision making tool to acting as a standard of practice that can be operational in a legal context to providing a sense of elevated seriousness and professionalism within a field of practice. There is some doubt and controversy,…

  15. Nurse Educator Perceptions of the Importance of Relationship in Online Teaching and Learning.

    Science.gov (United States)

    Smith, Yvonne M; Crowe, Alicia R

    The purpose of this study was to understand the perceptions of teaching nursing students in online environments as experienced by nursing educators who have been teaching online for a minimum of 2 years. The study used an interview-based qualitative descriptive design. Semistructured interviews with 10 full-time nurse educators were conducted. The participants represented a range of ranks and teaching experience. Analysis involved a constant comparative process of initial and focused coding. Relationships were important to these nurse educators, and there was an interconnected nature among (a) student engagement and learning, (b) "knowing students," and (c) helping students meet their needs. Although different in how they experienced these elements, they seemed to share a sense that you have to know your students to help them meet their needs, and that you have to help them meet their needs so that they can learn, and building relationships within the online environment is key to all if this. Relationships are the heart of nursing and, for these nurse educators, a key aspect of nursing education. Having a strong relationship between nurse educators and nursing students supports student engagement in learning online. With continually increasing online nurse education, understanding these relationships is important to improve nursing education and consequently improve nursing practice. Copyright © 2016 Elsevier Inc. All rights reserved.

  16. Flying through code/space: the real virtuality of air travel

    OpenAIRE

    Martin Dodge; Rob Kitchin

    2004-01-01

    Commercial air travel is a key global industry facilitating the complex daily movements of planes, people, goods, and services across the world. In this paper we analyse contemporary air travel through the conceptualisation of a culture of real virtuality.We contend that air travel now consists of passage through 'code/space'. Such code/space includes travel websites, check-in, security check- points, flight decks, air-traffic control, immigration, and customs checkpoints, which t...

  17. Secure quantum key distribution using squeezed states

    International Nuclear Information System (INIS)

    Gottesman, Daniel; Preskill, John

    2001-01-01

    We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q. If the noise in the quantum channel is weak, squeezing signal states by 2.51 dB (a squeeze factor e r =1.34) is sufficient in principle to ensure the security of a protocol that is suitably enhanced by classical error correction and privacy amplification. Secure key distribution can be achieved over distances comparable to the attenuation length of the quantum channel

  18. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  19. Should contentment be a key aim in higher education?

    OpenAIRE

    Gibbs, Paul

    2016-01-01

    Higher education institutions are major concentrations of political, social, economic, intellectual and communicative resources. They reach freely across populations and cultures, and connect to government, professions, industry and the arts. The neo-liberal logic of markets has entered the realm of (higher) education. Marketing functions centre on the creation, codification and transmission of knowledge, and the certification of graduates and the nature of education are commercialised, both ...

  20. A Practical View on Tunable Sparse Network Coding

    DEFF Research Database (Denmark)

    Sørensen, Chres Wiant; Shahbaz Badr, Arash; Cabrera Guerrero, Juan Alberto

    2015-01-01

    Tunable sparse network coding (TSNC) constitutes a promising concept for trading off computational complexity and delay performance. This paper advocates for the use of judicious feedback as a key not only to make TSNC practical, but also to deliver a highly consistent and controlled delay perfor...

  1. McBits: fast constant-time code-based cryptography

    NARCIS (Netherlands)

    Bernstein, D.J.; Chou, T.; Schwabe, P.

    2015-01-01

    This paper presents extremely fast algorithms for code-based public-key cryptography, including full protection against timing attacks. For example, at a 2^128 security level, this paper achieves a reciprocal decryption throughput of just 60493 cycles (plus cipher cost etc.) on a single Ivy Bridge

  2. A systematic review of service-learning in medical education: 1998-2012.

    Science.gov (United States)

    Stewart, Trae; Wubbena, Zane C

    2015-01-01

    PHENOMENON: In the United States, the Affordable Care Act has increased the need for community-centered pedagogy for medical education such as service-learning, wherein students connect academic curriculum and reflections to address a community need. Yet heterogeneity among service-learning programs suggests the need for a framework to understand variations among service-learning programs in medical education. A qualitative systematic review of literature on service-learning and medical education was conducted for the period between 1998 and 2012. A two-stage inclusion criteria process resulted in articles (n = 32) on service-learning and Doctor of Medicine or Doctor of Osteopathic Medicine being included for both coding and analysis. Focused and selective coding were employed to identify recurring themes and subthemes from the literature. The findings of the qualitative thematic analysis of service-learning variation in medical education identified a total of seven themes with subthemes. The themes identified from the analysis were (a) geographic location and setting, (b) program design, (c) funding, (d) participation, (e) program implementation, (f) assessment, and (g) student outcomes. Insights: This systematic review of literature confirmed the existence of program heterogeneity among service-learning program in medical education. However, the findings of this study provide key insights into the nature of service-learning in medical education building a framework for which to organize differences among service-learning programs. A list of recommendations for future areas of inquiry is provided to guide future research.

  3. Manual versus automated coding of free-text self-reported medication data in the 45 and Up Study: a validation study.

    Science.gov (United States)

    Gnjidic, Danijela; Pearson, Sallie-Anne; Hilmer, Sarah N; Basilakis, Jim; Schaffer, Andrea L; Blyth, Fiona M; Banks, Emily

    2015-03-30

    Increasingly, automated methods are being used to code free-text medication data, but evidence on the validity of these methods is limited. To examine the accuracy of automated coding of previously keyed in free-text medication data compared with manual coding of original handwritten free-text responses (the 'gold standard'). A random sample of 500 participants (475 with and 25 without medication data in the free-text box) enrolled in the 45 and Up Study was selected. Manual coding involved medication experts keying in free-text responses and coding using Anatomical Therapeutic Chemical (ATC) codes (i.e. chemical substance 7-digit level; chemical subgroup 5-digit; pharmacological subgroup 4-digit; therapeutic subgroup 3-digit). Using keyed-in free-text responses entered by non-experts, the automated approach coded entries using the Australian Medicines Terminology database and assigned corresponding ATC codes. Based on manual coding, 1377 free-text entries were recorded and, of these, 1282 medications were coded to ATCs manually. The sensitivity of automated coding compared with manual coding was 79% (n = 1014) for entries coded at the exact ATC level, and 81.6% (n = 1046), 83.0% (n = 1064) and 83.8% (n = 1074) at the 5, 4 and 3-digit ATC levels, respectively. The sensitivity of automated coding for blank responses was 100% compared with manual coding. Sensitivity of automated coding was highest for prescription medications and lowest for vitamins and supplements, compared with the manual approach. Positive predictive values for automated coding were above 95% for 34 of the 38 individual prescription medications examined. Automated coding for free-text prescription medication data shows very high to excellent sensitivity and positive predictive values, indicating that automated methods can potentially be useful for large-scale, medication-related research.

  4. Application and Analysis of Performance of DQPSK Advanced Modulation Format in Spectral Amplitude Coding OCDMA

    Directory of Open Access Journals (Sweden)

    Abdul Latif Memon

    2014-04-01

    Full Text Available SAC (Spectral Amplitude Coding is a technique of OCDMA (Optical Code Division Multiple Access to encode and decode data bits by utilizing spectral components of the broadband source. Usually OOK (ON-Off-Keying modulation format is used in this encoding scheme. To make SAC OCDMA network spectrally efficient, advanced modulation format of DQPSK (Differential Quaternary Phase Shift Keying is applied, simulated and analyzed. m-sequence code is encoded in the simulated setup. Performance regarding various lengths of m-sequence code is also analyzed and displayed in the pictorial form. The results of the simulation are evaluated with the help of electrical constellation diagram, eye diagram and bit error rate graph. All the graphs indicate better transmission quality in case of advanced modulation format of DQPSK used in SAC OCDMA network as compared with OOK

  5. NASA Lewis Steady-State Heat Pipe Code Architecture

    Science.gov (United States)

    Mi, Ye; Tower, Leonard K.

    2013-01-01

    NASA Glenn Research Center (GRC) has developed the LERCHP code. The PC-based LERCHP code can be used to predict the steady-state performance of heat pipes, including the determination of operating temperature and operating limits which might be encountered under specified conditions. The code contains a vapor flow algorithm which incorporates vapor compressibility and axially varying heat input. For the liquid flow in the wick, Darcy s formula is employed. Thermal boundary conditions and geometric structures can be defined through an interactive input interface. A variety of fluid and material options as well as user defined options can be chosen for the working fluid, wick, and pipe materials. This report documents the current effort at GRC to update the LERCHP code for operating in a Microsoft Windows (Microsoft Corporation) environment. A detailed analysis of the model is presented. The programming architecture for the numerical calculations is explained and flowcharts of the key subroutines are given

  6. Strategic management and organizational behavior in dental education: reflections on key issues in an environment of change.

    Science.gov (United States)

    Dunning, David G; Durham, Timothy M; Lange, Brian M; Aksu, Mert N

    2009-06-01

    With issues such as shrinking revenue, access to care, faculty workloads, and graying faculty, dental schools are faced with difficult challenges that fall to dental school deans to manage. Do dental school deans have the organizational skill sets and ethical frameworks necessary to address the challenges now facing dental schools? The purpose of this article is to pose questions and suggestions regarding some of the key issues in dental colleges today and to stimulate discussion in the dental community about needed changes in dental education.

  7. Limitations in the Traditional Code of Journalistic Responsibility.

    Science.gov (United States)

    Capo, James A.

    Objectivity, truth, freedom, and social responsibility--key principles in contemporary media ethics--fail to provide a practical, coherent code for responsible journalism. During the initial television coverage of Watergate on June 19, 1972, for example, the three television networks all observed these standards in their reporting, yet presented…

  8. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  9. The Genetic Code: Yesterday, Today and Tomorrow

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 17; Issue 12. The Genetic Code: Yesterday, Today and Tomorrow. Jiqiang Ling Dieter Söll. General Article Volume 17 Issue 12 December 2012 pp 1136-1142. Fulltext. Click here to view fulltext PDF. Permanent link:

  10. Development of an international code of practice for dosimetry in X-ray diagnostic radiology

    International Nuclear Information System (INIS)

    Pernicka, F.; Carlsson, G.A.; Dance, D.R.; DeWerd, L.A.; Kramer, H.-M.; Ng, K.-H.

    2001-01-01

    Medical x-ray examinations contribute greatly to the population dose from man-made radiation sources. There is a need to control this dose and therefore to optimise the design and use of x-ray imaging systems. A key stage in this process is the standardisation of the procedures for dose measurement in the clinic. The Dosimetry and Medical Radiation Physics Section of the IAEA has a number of activities to further advance the standards for x-ray diagnostics. One of these activities is the coordination of a working group to develop a code of practice, which will facilitate the IAEA calibration activities, TLD intercomparisons and audits, educational activities, and technical assistance to Member States. The code of practice will aid in the standardisation of various dosimetric techniques in x-ray diagnostic radiology. The CoP working group has had an initial meeting to review the current status of dosimetry for conventional radiology, fluoroscopy, mammography, computed tomography and dental radiology. The CoP will include the establishment of standards and calibrations at the SSDLs, phantom and patient measurements and procedures for dosimetry in the clinic. (author)

  11. Automatic coding method of the ACR Code

    International Nuclear Information System (INIS)

    Park, Kwi Ae; Ihm, Jong Sool; Ahn, Woo Hyun; Baik, Seung Kook; Choi, Han Yong; Kim, Bong Gi

    1993-01-01

    The authors developed a computer program for automatic coding of ACR(American College of Radiology) code. The automatic coding of the ACR code is essential for computerization of the data in the department of radiology. This program was written in foxbase language and has been used for automatic coding of diagnosis in the Department of Radiology, Wallace Memorial Baptist since May 1992. The ACR dictionary files consisted of 11 files, one for the organ code and the others for the pathology code. The organ code was obtained by typing organ name or code number itself among the upper and lower level codes of the selected one that were simultaneous displayed on the screen. According to the first number of the selected organ code, the corresponding pathology code file was chosen automatically. By the similar fashion of organ code selection, the proper pathologic dode was obtained. An example of obtained ACR code is '131.3661'. This procedure was reproducible regardless of the number of fields of data. Because this program was written in 'User's Defined Function' from, decoding of the stored ACR code was achieved by this same program and incorporation of this program into program in to another data processing was possible. This program had merits of simple operation, accurate and detail coding, and easy adjustment for another program. Therefore, this program can be used for automation of routine work in the department of radiology

  12. Leadership Class Configuration Interaction Code - Status and Opportunities

    Science.gov (United States)

    Vary, James

    2011-10-01

    With support from SciDAC-UNEDF (www.unedf.org) nuclear theorists have developed and are continuously improving a Leadership Class Configuration Interaction Code (LCCI) for forefront nuclear structure calculations. The aim of this project is to make state-of-the-art nuclear structure tools available to the entire community of researchers including graduate students. The project includes codes such as NuShellX, MFDn and BIGSTICK that run a range of computers from laptops to leadership class supercomputers. Codes, scripts, test cases and documentation have been assembled, are under continuous development and are scheduled for release to the entire research community in November 2011. A covering script that accesses the appropriate code and supporting files is under development. In addition, a Data Base Management System (DBMS) that records key information from large production runs and archived results of those runs has been developed (http://nuclear.physics.iastate.edu/info/) and will be released. Following an outline of the project, the code structure, capabilities, the DBMS and current efforts, I will suggest a path forward that would benefit greatly from a significant partnership between researchers who use the codes, code developers and the National Nuclear Data efforts. This research is supported in part by DOE under grant DE-FG02-87ER40371 and grant DE-FC02-09ER41582 (SciDAC-UNEDF).

  13. Combined Source-Channel Coding of Images under Power and Bandwidth Constraints

    Directory of Open Access Journals (Sweden)

    Marc Fossorier

    2007-01-01

    Full Text Available This paper proposes a framework for combined source-channel coding for a power and bandwidth constrained noisy channel. The framework is applied to progressive image transmission using constant envelope M-ary phase shift key (M-PSK signaling over an additive white Gaussian noise channel. First, the framework is developed for uncoded M-PSK signaling (with M=2k. Then, it is extended to include coded M-PSK modulation using trellis coded modulation (TCM. An adaptive TCM system is also presented. Simulation results show that, depending on the constellation size, coded M-PSK signaling performs 3.1 to 5.2 dB better than uncoded M-PSK signaling. Finally, the performance of our combined source-channel coding scheme is investigated from the channel capacity point of view. Our framework is further extended to include powerful channel codes like turbo and low-density parity-check (LDPC codes. With these powerful codes, our proposed scheme performs about one dB away from the capacity-achieving SNR value of the QPSK channel.

  14. The Efficacy of Key Performance Indicators in Ontario Universities as Perceived by Key Informants

    Science.gov (United States)

    Chan, Vivian

    2015-01-01

    The Ontario Ministry of Education and Training's Task Force on University Accountability first proposed key performance indicators (KPIs) for colleges and universities in Ontario in the early 1990s. The three main KPIs for Ontario universities are the rates of (1) graduation, (2) employment, and (3) Ontario Student Assistance Program loan default.…

  15. Multiple-Symbol Detection Of Multiple-Trellis-Coded MDPSK

    Science.gov (United States)

    Divsalar, Dariush; Simon, Marvin K.; Shahshahani, Mehrdad M.

    1991-01-01

    In proposed scheme for detection and decoding of multiple-trellis-coded multilevel differential-phase-shift-keyed (MDPSK) radio signals, observation time for differential detection extended from conventional 2 to larger number of symbol periods. Decreases rate of error in differential detection of uncoded MDPSK by increasing number of symbol periods.

  16. An Application of Discrete Mathematics to Coding Theory.

    Science.gov (United States)

    Donohoe, L. Joyce

    1992-01-01

    Presents a public-key cryptosystem application to introduce students to several topics in discrete mathematics. A computer algorithms using recursive methods is presented to solve a problem in which one person wants to send a coded message to a second person while keeping the message secret from a third person. (MDH)

  17. Reproducible Computing: a new Technology for Statistics Education and Educational Research

    Science.gov (United States)

    Wessa, Patrick

    2009-05-01

    This paper explains how the R Framework (http://www.wessa.net) and a newly developed Compendium Platform (http://www.freestatistics.org) allow us to create, use, and maintain documents that contain empirical research results which can be recomputed and reused in derived work. It is illustrated that this technological innovation can be used to create educational applications that can be shown to support effective learning of statistics and associated analytical skills. It is explained how a Compendium can be created by anyone, without the need to understand the technicalities of scientific word processing (L style="font-variant: small-caps">ATEX) or statistical computing (R code). The proposed Reproducible Computing system allows educational researchers to objectively measure key aspects of the actual learning process based on individual and constructivist activities such as: peer review, collaboration in research, computational experimentation, etc. The system was implemented and tested in three statistics courses in which the use of Compendia was used to create an interactive e-learning environment that simulated the real-world process of empirical scientific research.

  18. Sub-quadratic decoding of one-point hermitian codes

    DEFF Research Database (Denmark)

    Nielsen, Johan Sebastian Rosenkilde; Beelen, Peter

    2015-01-01

    We present the first two sub-quadratic complexity decoding algorithms for one-point Hermitian codes. The first is based on a fast realization of the Guruswami-Sudan algorithm using state-of-the-art algorithms from computer algebra for polynomial-ring matrix minimization. The second is a power...... decoding algorithm: an extension of classical key equation decoding which gives a probabilistic decoding algorithm up to the Sudan radius. We show how the resulting key equations can be solved by the matrix minimization algorithms from computer algebra, yielding similar asymptotic complexities....

  19. Code Cactus; Code Cactus

    Energy Technology Data Exchange (ETDEWEB)

    Fajeau, M; Nguyen, L T; Saunier, J [Commissariat a l' Energie Atomique, Centre d' Etudes Nucleaires de Saclay, 91 - Gif-sur-Yvette (France)

    1966-09-01

    This code handles the following problems: -1) Analysis of thermal experiments on a water loop at high or low pressure; steady state or transient behavior; -2) Analysis of thermal and hydrodynamic behavior of water-cooled and moderated reactors, at either high or low pressure, with boiling permitted; fuel elements are assumed to be flat plates: - Flowrate in parallel channels coupled or not by conduction across plates, with conditions of pressure drops or flowrate, variable or not with respect to time is given; the power can be coupled to reactor kinetics calculation or supplied by the code user. The code, containing a schematic representation of safety rod behavior, is a one dimensional, multi-channel code, and has as its complement (FLID), a one-channel, two-dimensional code. (authors) [French] Ce code permet de traiter les problemes ci-dessous: 1. Depouillement d'essais thermiques sur boucle a eau, haute ou basse pression, en regime permanent ou transitoire; 2. Etudes thermiques et hydrauliques de reacteurs a eau, a plaques, a haute ou basse pression, ebullition permise: - repartition entre canaux paralleles, couples on non par conduction a travers plaques, pour des conditions de debit ou de pertes de charge imposees, variables ou non dans le temps; - la puissance peut etre couplee a la neutronique et une representation schematique des actions de securite est prevue. Ce code (Cactus) a une dimension d'espace et plusieurs canaux, a pour complement Flid qui traite l'etude d'un seul canal a deux dimensions. (auteurs)

  20. Educated parent as a key member of rehabilitation team.

    Science.gov (United States)

    Mikelić, Valentina Matijević; Bartolović, Jelena; Kosicek, Tena; Crnković, Maja

    2011-12-01

    Involvement of children with minor motor impairments in early intervention programs is becoming a positive trend. Rehabilitation of young children is usually performed in family environment with continuous monitoring by a team of experts including a physiatrist, speech therapist, psychologist, and rehabilitator. For this reason, it is important to educate parents in proper procedures designed to encourage the child's global and language development. Parental competence in encouraging the child's language development and providing home learning environment is associated with the level of parental education. We performed a retrospective analysis of data on 50 children aged 1-3 years, hospitalized during 2010 at Department of Pediatric Rehabilitation, University Department of Rheumatology, Physical Medicine and Rehabilitation, Sestre milosrdnice University Hospital Center in Zagreb. The aim was to determine the percentage of children included in an early intervention program according to the level of parental education and to assess the impact of the program on the children's language development. The results showed a higher percentage of parents to have high school education and a smaller percentage of parents to have university degree. These data indicated the need of educational programs for parents on the procedures of encouraging child development, including language development.

  1. Performance of FSO-OFDM based on BCH code

    Directory of Open Access Journals (Sweden)

    Jiao Xiao-lu

    2016-01-01

    Full Text Available As contrasted with the traditional OOK (on-off key system, FSO-OFDM system can resist the atmospheric scattering and improve the spectrum utilization rate effectively. Due to the instability of the atmospheric channel, the system will be affected by various factors, and resulting in a high BER. BCH code has a good error correcting ability, particularly in the short-length and medium-length code, and its performance is close to the theoretical value. It not only can check the burst errors but also can correct the random errors. Therefore, the BCH code is applied to the system to reduce the system BER. At last, the semi-physical simulation has been conducted with MATLAB. The simulation results show that when the BER is 10-2, the performance of OFDM is superior 4dB compared with OOK. In different weather conditions (extension rain, advection fog, dust days, when the BER is 10-5, the performance of BCH (255,191 channel coding is superior 4~5dB compared with uncoded system. All in all, OFDM technology and BCH code can reduce the system BER.

  2. 77 FR 38273 - Availability of Seats for the Florida Keys National Marine Sanctuary Advisory Council

    Science.gov (United States)

    2012-06-27

    ... of 2] (alternate), Education and Outreach (member), Education and Outreach (alternate), Fishing...), Tourism--Upper Keys (member), and Tourism--Upper Keys (alternate). Applicants are chosen based upon their...

  3. Radiology and Ethics Education.

    Science.gov (United States)

    Camargo, Aline; Liu, Li; Yousem, David M

    2017-09-01

    The purpose of this study is to assess medical ethics knowledge among trainees and practicing radiologists through an online survey that included questions about the American College of Radiology Code of Ethics and the American Medical Association Code of Medical Ethics. Most survey respondents reported that they had never read the American Medical Association Code of Medical Ethics or the American College of Radiology Code of Ethics (77.2% and 67.4% of respondents, respectively). With regard to ethics education during medical school and residency, 57.3% and 70.0% of respondents, respectively, found such education to be insufficient. Medical ethics training should be highlighted during residency, at specialty society meetings, and in journals and online resources for radiologists.

  4. Hydrogen Codes and Standards: An Overview of U.S. DOE Activities

    International Nuclear Information System (INIS)

    James M Ohi

    2006-01-01

    The Hydrogen, Fuel Cells, and Infrastructure Technologies (HFCIT) Program of the U.S. Department of Energy (DOE) and the National Renewable Energy Laboratory (NREL), with the help of leading standards and model code development organizations, other national laboratories, and key stakeholders, are developing a coordinated and collaborative government-industry effort to prepare, review, and promulgate hydrogen codes and standards needed to expedite hydrogen infrastructure development. The focus of this effort is to put in place a coordinated and comprehensive hydrogen codes and standards program at the national and international levels. This paper updates an overview of the U.S. program to facilitate and coordinate the development of hydrogen codes and standards that was presented by the author at WHEC 15. (authors)

  5. Quantum Dense Coding About a Two-Qubit Heisenberg XYZ Model

    Science.gov (United States)

    Xu, Hui-Yun; Yang, Guo-Hui

    2017-09-01

    By taking into account the nonuniform magnetic field, the quantum dense coding with thermal entangled states of a two-qubit anisotropic Heisenberg XYZ chain are investigated in detail. We mainly show the different properties about the dense coding capacity ( χ) with the changes of different parameters. It is found that dense coding capacity χ can be enhanced by decreasing the magnetic field B, the degree of inhomogeneity b and temperature T, or increasing the coupling constant along z-axis J z . In addition, we also find χ remains the stable value as the change of the anisotropy of the XY plane Δ in a certain temperature condition. Through studying different parameters effect on χ, it presents that we can properly turn the values of B, b, J z , Δ or adjust the temperature T to obtain a valid dense coding capacity ( χ satisfies χ > 1). Moreover, the temperature plays a key role in adjusting the value of dense coding capacity χ. The valid dense coding capacity could be always obtained in the lower temperature-limit case.

  6. Time for action: key considerations for implementing social accountability in the education of health professionals.

    Science.gov (United States)

    Ventres, William; Boelen, Charles; Haq, Cynthia

    2017-09-12

    Within health professional education around the world, there exists a growing awareness of the professional duty to be socially responsible, being attentive to the needs of all members of communities, regions, and nations, especially those who disproportionately suffer from the adverse influence of social determinants. However, much work still remains to progress beyond such good intentions. Moving from contemplation to action means embracing social accountability as a key guiding principle for change. Social accountability means that health institutions attend to improving the performance of individual practitioners and health systems by directing educational and practice interventions to promote the health of all the public and assessing the systemic effects of these interventions. In this Reflection, the authors (1) review the reasons why health professional schools and their governing bodies should codify, in both curricular and accreditation standards, norms of excellence in social accountability, (2) present four considerations crucial to successfully implementing this codification, and (3) discuss the challenges such changes might entail. The authors conclude by noting that in adopting socially accountable criteria, schools will need to expand their philosophical scope to recognize social accountability as a vitally important part of their institutional professional identity.

  7. Security Concerns and Countermeasures in Network Coding Based Communications Systems

    DEFF Research Database (Denmark)

    Talooki, Vahid; Bassoli, Riccardo; Roetter, Daniel Enrique Lucani

    2015-01-01

    key protocol types, namely, state-aware and stateless protocols, specifying the benefits and disadvantages of each one of them. We also present the key security assumptions of network coding (NC) systems as well as a detailed analysis of the security goals and threats, both passive and active......This survey paper shows the state of the art in security mechanisms, where a deep review of the current research and the status of this topic is carried out. We start by introducing network coding and its variety applications in enhancing current traditional networks. In particular, we analyze two....... This paper also presents a detailed taxonomy and a timeline of the different NC security mechanisms and schemes reported in the literature. Current proposed security mechanisms and schemes for NC in the literature are classified later. Finally a timeline of these mechanism and schemes is presented....

  8. Performance analysis of LDPC codes on OOK terahertz wireless channels

    Science.gov (United States)

    Chun, Liu; Chang, Wang; Jun-Cheng, Cao

    2016-02-01

    Atmospheric absorption, scattering, and scintillation are the major causes to deteriorate the transmission quality of terahertz (THz) wireless communications. An error control coding scheme based on low density parity check (LDPC) codes with soft decision decoding algorithm is proposed to improve the bit-error-rate (BER) performance of an on-off keying (OOK) modulated THz signal through atmospheric channel. The THz wave propagation characteristics and channel model in atmosphere is set up. Numerical simulations validate the great performance of LDPC codes against the atmospheric fading and demonstrate the huge potential in future ultra-high speed beyond Gbps THz communications. Project supported by the National Key Basic Research Program of China (Grant No. 2014CB339803), the National High Technology Research and Development Program of China (Grant No. 2011AA010205), the National Natural Science Foundation of China (Grant Nos. 61131006, 61321492, and 61204135), the Major National Development Project of Scientific Instrument and Equipment (Grant No. 2011YQ150021), the National Science and Technology Major Project (Grant No. 2011ZX02707), the International Collaboration and Innovation Program on High Mobility Materials Engineering of the Chinese Academy of Sciences, and the Shanghai Municipal Commission of Science and Technology (Grant No. 14530711300).

  9. Predictive codes of familiarity and context during the perceptual learning of facial identities

    Science.gov (United States)

    Apps, Matthew A. J.; Tsakiris, Manos

    2013-11-01

    Face recognition is a key component of successful social behaviour. However, the computational processes that underpin perceptual learning and recognition as faces transition from unfamiliar to familiar are poorly understood. In predictive coding, learning occurs through prediction errors that update stimulus familiarity, but recognition is a function of both stimulus and contextual familiarity. Here we show that behavioural responses on a two-option face recognition task can be predicted by the level of contextual and facial familiarity in a computational model derived from predictive-coding principles. Using fMRI, we show that activity in the superior temporal sulcus varies with the contextual familiarity in the model, whereas activity in the fusiform face area covaries with the prediction error parameter that updated facial familiarity. Our results characterize the key computations underpinning the perceptual learning of faces, highlighting that the functional properties of face-processing areas conform to the principles of predictive coding.

  10. Graciela Hierro: Philosophy of Education in Gender Code

    Directory of Open Access Journals (Sweden)

    Georgina Aimé Tapia González

    2016-11-01

    Full Text Available The development of feminist theory and gender studies in Mexico cannot be understood without the work of Graciela Hierro. The aim of this article is to show the lasting value of her ethical proposal for a feminist education, as well as recognizing her contributions. I will deal with this in three sections: in the first one I will present her feminist ethics as a foundation of an education for women; in the second I will carry out a brief historical review of the philosophy of education from the viewpoint of Mexican female philosophers, and in the third, I will show the practical implications of the ethics of pleasure in women formation, from childhood to old age. My principal thesis is that Hierro’s ethics constitute the fundamentals for a philosophy of education that originates from feminist geneaology to Mexican culture through the visibilization of the legacy of local thinkers, that, from different standpoints, have reflected upon the “female question”.

  11. ClinicalKey: a point-of-care search engine.

    Science.gov (United States)

    Vardell, Emily

    2013-01-01

    ClinicalKey is a new point-of-care resource for health care professionals. Through controlled vocabulary, ClinicalKey offers a cross section of resources on diseases and procedures, from journals to e-books and practice guidelines to patient education. A sample search was conducted to demonstrate the features of the database, and a comparison with similar tools is presented.

  12. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . 171 4.9 Codes form order domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4.10 One-point geometric Goppa codes . . . . . . . . . . . . . . . . . . . . . . . . 176 4.11 Bibliographical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 References...

  13. Recent Improvements to the IMPACT-T Parallel Particle Tracking Code

    International Nuclear Information System (INIS)

    Qiang, J.; Pogorelov, I.V.; Ryne, R.

    2006-01-01

    The IMPACT-T code is a parallel three-dimensional quasi-static beam dynamics code for modeling high brightness beams in photoinjectors and RF linacs. Developed under the US DOE Scientific Discovery through Advanced Computing (SciDAC) program, it includes several key features including a self-consistent calculation of 3D space-charge forces using a shifted and integrated Green function method, multiple energy bins for beams with large energy spread, and models for treating RF standing wave and traveling wave structures. In this paper, we report on recent improvements to the IMPACT-T code including modeling traveling wave structures, short-range transverse and longitudinal wakefields, and longitudinal coherent synchrotron radiation through bending magnets

  14. Short-lived non-coding transcripts (SLiTs): Clues to regulatory long non-coding RNA.

    Science.gov (United States)

    Tani, Hidenori

    2017-03-22

    Whole transcriptome analyses have revealed a large number of novel long non-coding RNAs (lncRNAs). Although the importance of lncRNAs has been documented in previous reports, the biological and physiological functions of lncRNAs remain largely unknown. The role of lncRNAs seems an elusive problem. Here, I propose a clue to the identification of regulatory lncRNAs. The key point is RNA half-life. RNAs with a long half-life (t 1/2 > 4 h) contain a significant proportion of ncRNAs, as well as mRNAs involved in housekeeping functions, whereas RNAs with a short half-life (t 1/2 regulatory ncRNAs and regulatory mRNAs. This novel class of ncRNAs with a short half-life can be categorized as Short-Lived non-coding Transcripts (SLiTs). I consider that SLiTs are likely to be rich in functionally uncharacterized regulatory RNAs. This review describes recent progress in research into SLiTs.

  15. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  16. On Competences and Values: From the Desire to Educate to Educating the Desire of Being

    Science.gov (United States)

    Larrañaga, Roberto Sancho

    2015-01-01

    The competence discourse issued by the Colombian Ministry of National Education defines an ontological duty, a set of logics for the education of subjectivity. Some interesting elements result from this analysis. The first level, or denotative level, manages a management or business cultural code. This code is closely related to the second level…

  17. Addressing challenges in bar-code scanning of large-volume infusion bags.

    Science.gov (United States)

    Raman, Kirthana; Heelon, Mark; Kerr, Gary; Higgins, Thomas L

    2011-08-01

    A hospital pharmacy's efforts to identify and address challenges with bedside scanning of bar codes on large-volume parenteral (LVP) infusion bags are described. Bar-code-assisted medication administration (BCMA) has been shown to reduce medication errors and improve patient safety. After the pilot implementation of a BCMA system and point-of-care scanning procedures at a medical center's intensive care unit, it was noted that nurses' attempted bedside scans of certain LVP bags for product identification purposes often were not successful. An investigation and root-cause analysis, including observation of nurses' scanning technique by a multidisciplinary team, determined that the scanning failures stemmed from the placement of two bar-code imprints-one with the product identification code and another, larger imprint with the expiration date and lot number-adjacently on the LVP bags. The nursing staff was educated on a modified scanning technique, which resulted in significantly improved success rates in the scanning of the most commonly used LVP bags. Representatives of the LVP bag manufacturer met with hospital staff to discuss the problem and corrective measures. As part of a subsequent infusion bag redesign, the manufacturer discontinued the use of the bar-code imprint implicated in the scanning failures. Failures in scanning LVP bags were traced to problematic placement of bar-code imprints on the bags. Interdisciplinary collaboration, consultation with the bag manufacturer, and education of the nursing and pharmacy staff resulted in a reduction in scanning failures and the manufacturer's removal of one of the bar codes from its LVP bags.

  18. Should Contentment Be a Key Aim in Higher Education?

    Science.gov (United States)

    Gibbs, Paul

    2017-01-01

    Higher education institutions are major concentrations of political, social, economic, intellectual and communicative resources. They reach freely across populations and cultures and connect to government, professions, industry and the arts. The neoliberal logic of markets has entered the realm of (higher) education. This leads to discourse on the…

  19. Input parameters to codes which analyze LMFBR wire-wrapped bundles

    International Nuclear Information System (INIS)

    Hawley, J.T.; Chan, Y.N.; Todreas, N.E.

    1980-12-01

    This report provides a current summary of recommended values of key input parameters required by ENERGY code analysis of LMFBR wire wrapped bundles. This data is based on the interpretation of experimental results from the MIT and other available laboratory programs

  20. Prior-to-Secondary School Course Classification System: School Codes for the Exchange of Data (SCED). NFES 2011-801

    Science.gov (United States)

    National Forum on Education Statistics, 2011

    2011-01-01

    In this handbook, "Prior-to-Secondary School Course Classification System: School Codes for the Exchange of Data" (SCED), the National Center for Education Statistics (NCES) and the National Forum on Education Statistics have extended the existing secondary course classification system with codes and descriptions for courses offered at…

  1. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    International Nuclear Information System (INIS)

    Kiktenko, Evgeniy O.

    2017-01-01

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration of results of unsuccessful belief-propagation decodings.

  2. An Optimal Linear Coding for Index Coding Problem

    OpenAIRE

    Pezeshkpour, Pouya

    2015-01-01

    An optimal linear coding solution for index coding problem is established. Instead of network coding approach by focus on graph theoric and algebraic methods a linear coding program for solving both unicast and groupcast index coding problem is presented. The coding is proved to be the optimal solution from the linear perspective and can be easily utilize for any number of messages. The importance of this work is lying mostly on the usage of the presented coding in the groupcast index coding ...

  3. Three-dimensional polarization marked multiple-QR code encryption by optimizing a single vectorial beam

    Science.gov (United States)

    Lin, Chao; Shen, Xueju; Hua, Binbin; Wang, Zhisong

    2015-10-01

    We demonstrate the feasibility of three dimensional (3D) polarization multiplexing by optimizing a single vectorial beam using a multiple-signal window multiple-plane (MSW-MP) phase retrieval algorithm. Original messages represented with multiple quick response (QR) codes are first partitioned into a series of subblocks. Then, each subblock is marked with a specific polarization state and randomly distributed in 3D space with both longitudinal and transversal adjustable freedoms. A generalized 3D polarization mapping protocol is established to generate a 3D polarization key. Finally, multiple-QR code is encrypted into one phase only mask and one polarization only mask based on the modified Gerchberg-Saxton (GS) algorithm. We take the polarization mask as the cyphertext and the phase only mask as additional dimension of key. Only when both the phase key and 3D polarization key are correct, original messages can be recovered. We verify our proposal with both simulation and experiment evidences.

  4. Rural School District Dress Code Implementation: Perceptions of Stakeholders after First Year

    Science.gov (United States)

    Wright, Krystal M.

    2012-01-01

    Schools are continuously searching for solutions to solve truancy, academic, behavioral, safety, and climate issues. One of the latest trends in education is requiring students to adhere to dress codes as a solution to these issues. Dress codes can range from slightly restrictive clothing to the requiring of a uniform. Many school district…

  5. Web- and system-code based, interactive, nuclear power plant simulators

    International Nuclear Information System (INIS)

    Kim, K. D.; Jain, P.; Rizwan, U.

    2006-01-01

    Using two different approaches, on-line, web- and system-code based graphical user interfaces have been developed for reactor system analysis. Both are LabVIEW (graphical programming language developed by National Instruments) based systems that allow local users as well as those at remote sites to run, interact and view the results of the system code in a web browser. In the first approach, only the data written by the system code in a tab separated ASCII output file is accessed and displayed graphically. In the second approach, LabVIEW virtual instruments are coupled with the system code as dynamic link libraries (DLL). RELAP5 is used as the system code to demonstrate the capabilities of these approaches. From collaborative projects between teams in geographically remote locations to providing system code experience to distance education students, these tools can be very beneficial in many areas of teaching and R and D. (authors)

  6. Numerical simulations of inertial confinement fusion hohlraum with LARED-integration code

    International Nuclear Information System (INIS)

    Li Jinghong; Li Shuanggui; Zhai Chuanlei

    2011-01-01

    In the target design of the Inertial Confinement Fusion (ICF) program, it is common practice to apply radiation hydrodynamics code to study the key physical processes happened in ICF process, such as hohlraum physics, radiation drive symmetry, capsule implosion physics in the radiation-drive approach of ICF. Recently, many efforts have been done to develop our 2D integrated simulation capability of laser fusion with a variety of optional physical models and numerical methods. In order to effectively integrate the existing codes and to facilitate the development of new codes, we are developing an object-oriented structured-mesh parallel code-supporting infrastructure, called JASMIN. Based on two-dimensional three-temperature hohlraum physics code LARED-H and two-dimensional multi-group radiative transfer code LARED-R, we develop a new generation two-dimensional laser fusion code under the JASMIN infrastructure, which enable us to simulate the whole process of laser fusion from the laser beams' entrance into the hohlraum to the end of implosion. In this paper, we will give a brief description of our new-generation two-dimensional laser fusion code, named LARED-Integration, especially in its physical models, and present some simulation results of holhraum. (author)

  7. ISODEP, A Fuel Depletion Analysis Code for Predicting Isotopic ...

    African Journals Online (AJOL)

    The trend of results was found to be consistent with those obtained by analytical and other numerical methods. Discovery and Innovation Vol. 13 no. 3/4 December (2001) pp. 184-195. KEY WORDS: depletion analysis, code, research reactor, simultaneous equations, decay of nuclides, radionuclitides, isotope. Résumé

  8. Code Shift: Grid Specifications and Dynamic Wind Turbine Models

    DEFF Research Database (Denmark)

    Ackermann, Thomas; Ellis, Abraham; Fortmann, Jens

    2013-01-01

    Grid codes (GCs) and dynamic wind turbine (WT) models are key tools to allow increasing renewable energy penetration without challenging security of supply. In this article, the state of the art and the further development of both tools are discussed, focusing on the European and North American e...

  9. Using Quick Response Codes in the Classroom: Quality Outcomes.

    Science.gov (United States)

    Zurmehly, Joyce; Adams, Kellie

    2017-10-01

    With smart device technology emerging, educators are challenged with redesigning teaching strategies using technology to allow students to participate dynamically and provide immediate answers. To facilitate integration of technology and to actively engage students, quick response codes were included in a medical surgical lecture. Quick response codes are two-dimensional square patterns that enable the coding or storage of more than 7000 characters that can be accessed via a quick response code scanning application. The aim of this quasi-experimental study was to explore quick response code use in a lecture and measure students' satisfaction (met expectations, increased interest, helped understand, and provided practice and prompt feedback) and engagement (liked most, liked least, wanted changed, and kept involved), assessed using an investigator-developed instrument. Although there was no statistically significant correlation of quick response use to examination scores, satisfaction scores were high, and there was a small yet positive association between how students perceived their learning with quick response codes and overall examination scores. Furthermore, on open-ended survey questions, students responded that they were satisfied with the use of quick response codes, appreciated the immediate feedback, and planned to use them in the clinical setting. Quick response codes offer a way to integrate technology into the classroom to provide students with instant positive feedback.

  10. Becoming Inclusive: A Code of Conduct for Inclusion and Diversity.

    Science.gov (United States)

    Schmidt, Bonnie J; MacWilliams, Brent R; Neal-Boylan, Leslie

    There are increasing concerns about exclusionary behaviors and lack of diversity in the nursing profession. Exclusionary behaviors, which may include incivility, bullying, and workplace violence, discriminate and isolate individuals and groups who are different, whereas inclusive behaviors encourage diversity. To address inclusion and diversity in nursing, this article offers a code of conduct. This code of conduct builds on existing nursing codes of ethics and applies to nursing students and nurses in both educational and practice settings. Inclusive behaviors that are demonstrated in nurses' relationships with patients, colleagues, the profession, and society are described. This code of conduct provides a basis for measureable change, empowerment, and unification of the profession. Recommendations, implications, and a pledge to action are discussed. Copyright © 2016 Elsevier Inc. All rights reserved.

  11. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  12. 47 CFR 11.51 - EAS code and Attention Signal Transmission requirements.

    Science.gov (United States)

    2010-10-01

    ... interfere with other visual messages. (e) Analog class D non-commercial educational FM stations as defined in § 73.506 of this chapter, digital class D non-commercial educational FM stations, analog Low Power... Message (EOM) codes using the EAS Protocol. The Attention Signal must precede any emergency audio message...

  13. A new coding concept for fast ultrasound imaging using pulse trains

    DEFF Research Database (Denmark)

    Misaridis, T.; Jensen, Jørgen Arendt

    2002-01-01

    Frame rate in ultrasound imaging can he increased by simultaneous transmission of multiple beams using coded waveforms. However, the achievable degree of orthogonality among coded waveforms is limited in ultrasound, and the image quality degrades unacceptably due to interbeam interference....... In this paper, an alternative combined time-space coding approach is undertaken. In the new method all transducer elements are excited with short pulses and the high time-bandwidth (TB) product waveforms are generated acoustically. Each element transmits a short pulse spherical wave with a constant transmit...... delay from element to element, long enough to assure no pulse overlapping for all depths in the image. Frequency shift keying is used for "per element" coding. The received signals from a point scatterer are staggered pulse trains which are beamformed for all beam directions and further processed...

  14. A PSYCHOSOCIAL ANALYSIS OF CYBERBULLYING: KEYS TO A MORAL EDUCATION

    Directory of Open Access Journals (Sweden)

    José María Avilés Martínez

    2013-01-01

    Full Text Available The aim of this paper is to review the processes that occur in cyberbullying at the interpersonal, intrapersonal, group and contextual levels, analyzing the most significant components in the profiles of those involved in this type of abuse. Moreover, these situations are placed in context in relation to the moral values that come into play. Thus, the paper highlights the educational conditions that can favour prevention and intervention initiatives from the educational community in relation to cyberbullying. Finally, suggestions are made for educational agents about lines of work on moral education issues that can help eradicate these behaviours.

  15. LGBTQ Women, Appearance Negotiations, and Workplace Dress Codes.

    Science.gov (United States)

    Reddy-Best, Kelly L

    2018-01-01

    The purpose of this study was to explore LGBTQ women's experiences with unwritten or formal dress codes at work. I asked: What are LGBTQ women's experiences in the workplace with appearance management, and what are LGBTQ women's experiences navigating the written and unwritten dress codes in the workplace? To answer the research question, interviews were conducted with 24 self-identifying LGBTQ women. Six key themes emerged from the data. Themes included (1) expressed sexual identity in appearance, (2) unwritten dress codes in work environments did not always allow for expression of sexual identity in appearance, (3) motivations for pressure or desire to conceal expression of sexual identity in appearance at work, (4) negotiations of revealing or concealing sexual identity in appearance in the workplace impacted levels of comfort and confidence, (5) verbal and nonverbal negative experiences related to appearance at work, and (6) received compliments about appearance at work.

  16. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Kern, Oliver

    2009-05-25

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  17. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    International Nuclear Information System (INIS)

    Kern, Oliver

    2009-01-01

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  18. Student Dress Codes and Uniforms. Research Brief

    Science.gov (United States)

    Johnston, Howard

    2009-01-01

    According to an Education Commission of the States "Policy Report", research on the effects of dress code and school uniform policies is inconclusive and mixed. Some researchers find positive effects; others claim no effects or only perceived effects. While no state has legislatively mandated the wearing of school uniforms, 28 states and…

  19. Audiovisual facilitation of clinical knowledge: a paradigm for dispersed student education based on Paivio's Dual Coding Theory.

    Science.gov (United States)

    Hartland, William; Biddle, Chuck; Fallacaro, Michael

    2008-06-01

    This article explores the application of Paivio's Dual Coding Theory (DCT) as a scientifically sound rationale for the effects of multimedia learning in programs of nurse anesthesia. We explore and highlight this theory as a practical infrastructure for programs that work with dispersed students (ie, distance education models). Exploring the work of Paivio and others, we are engaged in an ongoing outcome study using audiovisual teaching interventions (SBVTIs) that we have applied to a range of healthcare providers in a quasiexperimental model. The early results of that study are reported in this article. In addition, we have observed powerful and sustained learning in a wide range of healthcare providers with our SBVTIs and suggest that this is likely explained by DCT.

  20. Application programming interface document for the modernized Transient Reactor Analysis Code (TRAC-M)

    International Nuclear Information System (INIS)

    Mahaffy, J.; Boyack, B.E.; Steinke, R.G.

    1998-05-01

    The objective of this document is to ease the task of adding new system components to the Transient Reactor Analysis Code (TRAC) or altering old ones. Sufficient information is provided to permit replacement or modification of physical models and correlations. Within TRAC, information is passed at two levels. At the upper level, information is passed by system-wide and component-specific data modules at and above the level of component subroutines. At the lower level, information is passed through a combination of module-based data structures and argument lists. This document describes the basic mechanics involved in the flow of information within the code. The discussion of interfaces in the body of this document has been kept to a general level to highlight key considerations. The appendices cover instructions for obtaining a detailed list of variables used to communicate in each subprogram, definitions and locations of key variables, and proposed improvements to intercomponent interfaces that are not available in the first level of code modernization

  1. A FEW ASPECTS REGARDING THE SIMULATION OF CONTRACT IN THE ROMANIAN CIVIL CODE

    Directory of Open Access Journals (Sweden)

    Tudor Vlad RĂDULESCU

    2017-05-01

    Full Text Available The article aims to analyze some key aspects of simulation in contracts, as regulated by the Romanian Civil Code . The process of simulation will be explained, based on the provisions of the previous Civil Code, but also with reference to the relevant provisions of the legislation of some European countries. The analyse will focus on the apparent act, and also on the secret one and a special emphasis on intention to simulate, animo simulandi, the key aspect of the matter. Also the effects of the simulation will be reviewed, both from the point of view of the parties and that of third parties, the concept of third parties having another meaning in this procedure.

  2. A Test of Two Alternative Cognitive Processing Models: Learning Styles and Dual Coding

    Science.gov (United States)

    Cuevas, Joshua; Dawson, Bryan L.

    2018-01-01

    This study tested two cognitive models, learning styles and dual coding, which make contradictory predictions about how learners process and retain visual and auditory information. Learning styles-based instructional practices are common in educational environments despite a questionable research base, while the use of dual coding is less…

  3. An Analysis of Countries which have Integrated Coding into their Curricula and the Content Analysis of Academic Studies on Coding Training in Turkey

    Directory of Open Access Journals (Sweden)

    Hüseyin Uzunboylu

    2017-11-01

    Full Text Available The first aim is to conduct a general analysis of countries which have integrated coding training into their curricula, and the second aim is to conduct a content analysis of studies on coding training in Turkey. It was identified that there are only a few academic studies on coding training in Turkey, and that the majority of them were published in 2016, the intended population was mainly “undergraduate students” and that the majority of these students were Computer Education and Instructional Technology undergraduates. It was determined that the studies mainly focused on the subjects of “programming” and “Scratch”, the terms programming and coding were used as synonyms, most of the studies were carried out using quantitative methods and data was obtained mostly by literature review and scale/survey interval techniques.

  4. Novel secure and bandwidth efficient optical code division multiplexed system for future access networks

    Science.gov (United States)

    Singh, Simranjit

    2016-12-01

    In this paper, a spectrally coded optical code division multiple access (OCDMA) system using a hybrid modulation scheme has been investigated. The idea is to propose an effective approach for simultaneous improvement of the system capacity and security. Data formats, NRZ (non-return to zero), DQPSK (differential quadrature phase shift keying), and PoISk (polarisation shift keying) are used to get the orthogonal modulated signal. It is observed that the proposed hybrid modulation provides efficient utilisation of bandwidth, increases the data capacity and enhances the data confidentiality over existing OCDMA systems. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  5. Duty hour restrictions and surgical complications for head and neck key indicator procedures.

    Science.gov (United States)

    Smith, Aaron; Jain, Nikhita; Wan, Jim; Wang, Lei; Sebelik, Merry

    2017-08-01

    Graduate medical education has traditionally required long work hours, allowing trainees little time for adequate rest. Based on concerns over performance deterioration with sleep deprivation and its effect on patient outcomes, duty hour restrictions have been mandated. We sought to characterize complications from otolaryngology key indicator procedures performed before and after duty hour reform. Retrospective cross-sectional analysis of National Inpatient Sample (NIS). The NIS was queried for procedure codes associated with head and neck key indicator groupings for the years 2000-2002 (45,363 procedures) and 2006-2008 (51,144 procedures). Hospitals were divided into three groups: nonteaching hospitals (NTH), teaching hospitals without otolaryngology programs (TH), and teaching hospitals with otolaryngology programs (TH-OTO). Surgical complication rates, length of stay, and mortality rates were analyzed using logistic and linear regression. The number of procedures increased (12.7%), with TH-OTO contributing more in postrestriction years (21% to 30%). Overall complication rates between the two periods revealed no difference, regardless of hospital setting. Subset analysis showed some variation within each complication within each grouping. Length of stay increased at TH-OTO (2.75 to 2.78 days) and decreased at NTH (2.28 to 2.24 days) and TH (2.39 to 2.36 days). Mortality did not increase among the three hospital types (NTH, P key indicator procedures. Moreover, concerns about reduced surgical case numbers appear unfounded, especially for otolaryngology programs. 2c Laryngoscope, 127:1797-1803, 2017. © 2016 The American Laryngological, Rhinological and Otological Society, Inc.

  6. The new CMSS code for interactions with companies managing relationships to minimize conflicts.

    Science.gov (United States)

    Kahn, Norman B; Lichter, Allen S

    2011-09-01

    Conflicts of interest in medicine have received significant attention in recent years, through the public and professional media, federal and state governments, and through a 2009 report of the Institute of Medicine on Conflict of Interest in Medical Research, Education and Practice. The Council of Medical Specialty Societies (CMSS) Code for Interactions with Companies was adopted by the CMSS in April 2010. The Code guides specialty societies in the profession of medicine in ethical relationships between societies and the pharmaceutical and medical device industries. The Code serves to protect and promote the independence of specialty societies and their leaders in corporate sponsorships, licensing, advertising, society meetings, exhibits, educational programs, journals, clinical practice guidelines, and research. Copyright © 2011 Society for Vascular Surgery. Published by Mosby, Inc. All rights reserved.

  7. Current Status of the LIFE Fast Reactors Fuel Performance Codes

    International Nuclear Information System (INIS)

    Yacout, A.M.; Billone, M.C.

    2013-01-01

    The LIFE-4 (Rev. 1) code was calibrated and validated using data from (U,Pu)O2 mixed-oxide fuel pins and UO2 blanket rods which were irradiation tested under steady-state and transient conditions. – It integrates a broad material and fuel-pin irradiation database into a consistent framework for use and extrapolation of the database to reactor design applications. – The code is available and running on different computer platforms (UNIX & PC) – Detailed documentations of the code’s models, routines, calibration and validation data sets are available. LIFE-METAL code is based on LIFE4 with modifications to include key phenomena applicable to metallic fuel, and metallic fuel properties – Calibrated with large database from irradiations in EBR-II – Further effort for calibration and detailed documentation. Recent activities with the codes are related to reactor design studies and support of licensing efforts for 4S and KAERI SFR designs. Future activities are related to re-assessment of the codes calibration and validation and inclusion of models for advanced fuels (transmutation fuels)

  8. Advanced codes and methods supporting improved fuel cycle economics - 5493

    International Nuclear Information System (INIS)

    Curca-Tivig, F.; Maupin, K.; Thareau, S.

    2015-01-01

    AREVA's code development program was practically completed in 2014. The basic codes supporting a new generation of advanced methods are the followings. GALILEO is a state-of-the-art fuel rod performance code for PWR and BWR applications. Development is completed, implementation started in France and the U.S.A. ARCADIA-1 is a state-of-the-art neutronics/ thermal-hydraulics/ thermal-mechanics code system for PWR applications. Development is completed, implementation started in Europe and in the U.S.A. The system thermal-hydraulic codes S-RELAP5 and CATHARE-2 are not really new but still state-of-the-art in the domain. S-RELAP5 was completely restructured and re-coded such that its life cycle increases by further decades. CATHARE-2 will be replaced in the future by the new CATHARE-3. The new AREVA codes and methods are largely based on first principles modeling with an extremely broad international verification and validation data base. This enables AREVA and its customers to access more predictable licensing processes in a fast evolving regulatory environment (new safety criteria, requests for enlarged qualification databases, statistical applications, uncertainty propagation...). In this context, the advanced codes and methods and the associated verification and validation represent the key to avoiding penalties on products, on operational limits, or on methodologies themselves

  9. Qualification of the coupled RELAP5/PANTHER/COBRA code package for licensing applications

    International Nuclear Information System (INIS)

    Schneidesch, C.R.; Zhang Jinzhao

    2004-01-01

    A coupled thermal hydraulics-neutronics code package has been developed at Tractebel Engineering (TE), in which the best-estimate thermal-hydraulic system code, RELAP5/mod2.5, is coupled with the full three-dimensional reactor core kinetics code, PANTHER, via the dynamic data exchange interface, TALINK. The Departure from Nucleate Boiling Ratio (DNBR) is calculated by the sub-channel thermal-hydraulic analysis code COBRA-3C. The package provides the capability to accurately simulate the key physical phenomena in nuclear power plant accidents with strong asymmetric behaviours and system-core interactions. This paper presents the TE coupled code package and focuses on the methodology followed for qualifying it for licensing applications. The qualification of the coupling demonstrated the robustness achieved by the combined 3-D neutron kinetics/system T-H code package for transient simulations. The coupled TE code package has been qualified and will be used at Tractebel Engineering (TE) for analyzing asymmetric PWR accidents with strong core-system interactions

  10. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  11. European Validation of the Integral Code ASTEC (EVITA)

    International Nuclear Information System (INIS)

    Allelein, H.-J.; Neu, K.; Dorsselaere, J.P. Van

    2005-01-01

    where ASTEC plays a key role as the reference European integral code

  12. Demonstration Of The Violation Of Bell Inequality In Quantum Key Distribution

    International Nuclear Information System (INIS)

    Dermez, R.

    2010-01-01

    Today, the data privacy has become very important. Quantum Key Distribution (QKD) system is developed in this area. QKD, coding technique with single-use method of encoding used keys (information and messages) security guarantees. The system is based on Quantum Mechanics (The Certainty Principle). However, in some cases for quantum communication, QKD are limited. In determining this limit Bell Inequality (CHSH Inequality, 1969) is used. Bell inequality shows a violation of Quantum Key Distribution. In this study, using the program of Matematica 6, QKD through bilateral quantum system (system with two qubits) has been investigating the leak case and the violations. We showed leakage and violations in these figures via the calculations results in Matematica program.

  13. Fermilab Education Office - Contacts

    Science.gov (United States)

    Search The Office of Education and Public Outreach: Contacts All telephone numbers require area code Presentations for Presenters 840-3094 Office of Education and Public Outreach Spencer Pasero spasero@fnal.gov Education Office 840-3076 Fermilab Friends for Science Education General Questions Susan Dahl sdahl@fnal.gov

  14. Self-complementary circular codes in coding theory.

    Science.gov (United States)

    Fimmel, Elena; Michel, Christian J; Starman, Martin; Strüngmann, Lutz

    2018-04-01

    Self-complementary circular codes are involved in pairing genetic processes. A maximal [Formula: see text] self-complementary circular code X of trinucleotides was identified in genes of bacteria, archaea, eukaryotes, plasmids and viruses (Michel in Life 7(20):1-16 2017, J Theor Biol 380:156-177, 2015; Arquès and Michel in J Theor Biol 182:45-58 1996). In this paper, self-complementary circular codes are investigated using the graph theory approach recently formulated in Fimmel et al. (Philos Trans R Soc A 374:20150058, 2016). A directed graph [Formula: see text] associated with any code X mirrors the properties of the code. In the present paper, we demonstrate a necessary condition for the self-complementarity of an arbitrary code X in terms of the graph theory. The same condition has been proven to be sufficient for codes which are circular and of large size [Formula: see text] trinucleotides, in particular for maximal circular codes ([Formula: see text] trinucleotides). For codes of small-size [Formula: see text] trinucleotides, some very rare counterexamples have been constructed. Furthermore, the length and the structure of the longest paths in the graphs associated with the self-complementary circular codes are investigated. It has been proven that the longest paths in such graphs determine the reading frame for the self-complementary circular codes. By applying this result, the reading frame in any arbitrary sequence of trinucleotides is retrieved after at most 15 nucleotides, i.e., 5 consecutive trinucleotides, from the circular code X identified in genes. Thus, an X motif of a length of at least 15 nucleotides in an arbitrary sequence of trinucleotides (not necessarily all of them belonging to X) uniquely defines the reading (correct) frame, an important criterion for analyzing the X motifs in genes in the future.

  15. Diagonal Eigenvalue Unity (DEU) code for spectral amplitude coding-optical code division multiple access

    Science.gov (United States)

    Ahmed, Hassan Yousif; Nisar, K. S.

    2013-08-01

    Code with ideal in-phase cross correlation (CC) and practical code length to support high number of users are required in spectral amplitude coding-optical code division multiple access (SAC-OCDMA) systems. SAC systems are getting more attractive in the field of OCDMA because of its ability to eliminate the influence of multiple access interference (MAI) and also suppress the effect of phase induced intensity noise (PIIN). In this paper, we have proposed new Diagonal Eigenvalue Unity (DEU) code families with ideal in-phase CC based on Jordan block matrix with simple algebraic ways. Four sets of DEU code families based on the code weight W and number of users N for the combination (even, even), (even, odd), (odd, odd) and (odd, even) are constructed. This combination gives DEU code more flexibility in selection of code weight and number of users. These features made this code a compelling candidate for future optical communication systems. Numerical results show that the proposed DEU system outperforms reported codes. In addition, simulation results taken from a commercial optical systems simulator, Virtual Photonic Instrument (VPI™) shown that, using point to multipoint transmission in passive optical network (PON), DEU has better performance and could support long span with high data rate.

  16. List Decoding of Matrix-Product Codes from nested codes: an application to Quasi-Cyclic codes

    DEFF Research Database (Denmark)

    Hernando, Fernando; Høholdt, Tom; Ruano, Diego

    2012-01-01

    A list decoding algorithm for matrix-product codes is provided when $C_1,..., C_s$ are nested linear codes and $A$ is a non-singular by columns matrix. We estimate the probability of getting more than one codeword as output when the constituent codes are Reed-Solomon codes. We extend this list...... decoding algorithm for matrix-product codes with polynomial units, which are quasi-cyclic codes. Furthermore, it allows us to consider unique decoding for matrix-product codes with polynomial units....

  17. Towards a heavy-ion transport capability in the MARS15 Code

    International Nuclear Information System (INIS)

    Mokhov, N.V.; Gudima, K.K.; Mashnik, S.G.; Rakhno, I.L.; Striganov, S.

    2004-01-01

    In order to meet the challenges of new accelerator and space projects and further improve modelling of radiation effects in microscopic objects, heavy-ion interaction and transport physics have been recently incorporated into the MARS15 Monte Carlo code. A brief description of new modules is given in comparison with experimental data. The MARS Monte Carlo code is widely used in numerous accelerator, detector, shielding and cosmic ray applications. The needs of the Relativistic Heavy-Ion Collider, Large Hadron Collider, Rare Isotope Accelerator and NASA projects have recently induced adding heavy-ion interaction and transport physics to the MARS15 code. The key modules of the new implementation are described below along with their comparisons to experimental data.

  18. Key features of human episodic recollection in the cross-episode retrieval of rat hippocampus representations of space.

    Directory of Open Access Journals (Sweden)

    Eduard Kelemen

    2013-07-01

    Full Text Available Neurophysiological studies focus on memory retrieval as a reproduction of what was experienced and have established that neural discharge is replayed to express memory. However, cognitive psychology has established that recollection is not a verbatim replay of stored information. Recollection is constructive, the product of memory retrieval cues, the information stored in memory, and the subject's state of mind. We discovered key features of constructive recollection embedded in the rat CA1 ensemble discharge during an active avoidance task. Rats learned two task variants, one with the arena stable, the other with it rotating; each variant defined a distinct behavioral episode. During the rotating episode, the ensemble discharge of CA1 principal neurons was dynamically organized to concurrently represent space in two distinct codes. The code for spatial reference frame switched rapidly between representing the rat's current location in either the stationary spatial frame of the room or the rotating frame of the arena. The code for task variant switched less frequently between a representation of the current rotating episode and the stable episode from the rat's past. The characteristics and interplay of these two hippocampal codes revealed three key properties of constructive recollection. (1 Although the ensemble representations of the stable and rotating episodes were distinct, ensemble discharge during rotation occasionally resembled the stable condition, demonstrating cross-episode retrieval of the representation of the remote, stable episode. (2 This cross-episode retrieval at the level of the code for task variant was more likely when the rotating arena was about to match its orientation in the stable episode. (3 The likelihood of cross-episode retrieval was influenced by preretrieval information that was signaled at the level of the code for spatial reference frame. Thus key features of episodic recollection manifest in rat hippocampal

  19. Adaptive Modulation and Coding for LTE Wireless Communication

    Science.gov (United States)

    Hadi, S. S.; Tiong, T. C.

    2015-04-01

    Long Term Evolution (LTE) is the new upgrade path for carrier with both GSM/UMTS networks and CDMA2000 networks. The LTE is targeting to become the first global mobile phone standard regardless of the different LTE frequencies and bands use in other countries barrier. Adaptive Modulation and Coding (AMC) is used to increase the network capacity or downlink data rates. Various modulation types are discussed such as Quadrature Phase Shift Keying (QPSK), Quadrature Amplitude Modulation (QAM). Spatial multiplexing techniques for 4×4 MIMO antenna configuration is studied. With channel station information feedback from the mobile receiver to the base station transmitter, adaptive modulation and coding can be applied to adapt to the mobile wireless channels condition to increase spectral efficiencies without increasing bit error rate in noisy channels. In High-Speed Downlink Packet Access (HSDPA) in Universal Mobile Telecommunications System (UMTS), AMC can be used to choose modulation types and forward error correction (FEC) coding rate.

  20. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  1. Decoy state method for quantum cryptography based on phase coding into faint laser pulses

    Science.gov (United States)

    Kulik, S. P.; Molotkov, S. N.

    2017-12-01

    We discuss the photon number splitting attack (PNS) in systems of quantum cryptography with phase coding. It is shown that this attack, as well as the structural equations for the PNS attack for phase encoding, differs physically from the analogous attack applied to the polarization coding. As far as we know, in practice, in all works to date processing of experimental data has been done for phase coding, but using formulas for polarization coding. This can lead to inadequate results for the length of the secret key. These calculations are important for the correct interpretation of the results, especially if it concerns the criterion of secrecy in quantum cryptography.

  2. Optimal attacks on qubit-based Quantum Key Recycling

    Science.gov (United States)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  3. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli.

  4. Assessing the Practicality and Relevance of Adventist Educational Philosophy in a Contemporary Education Paradigm

    Science.gov (United States)

    Jackman, W. Marc

    2014-01-01

    This article examines the key tenets of contemporary education philosophy and compares it to the principles of the Adventist educational philosophy. The intent is to determine whether Adventist educational philosophy aligns with the demands of contemporary education. In this vein, 10 key principles of contemporary education are first described.…

  5. LDGM Codes for Channel Coding and Joint Source-Channel Coding of Correlated Sources

    Directory of Open Access Journals (Sweden)

    Javier Garcia-Frias

    2005-05-01

    Full Text Available We propose a coding scheme based on the use of systematic linear codes with low-density generator matrix (LDGM codes for channel coding and joint source-channel coding of multiterminal correlated binary sources. In both cases, the structures of the LDGM encoder and decoder are shown, and a concatenated scheme aimed at reducing the error floor is proposed. Several decoding possibilities are investigated, compared, and evaluated. For different types of noisy channels and correlation models, the resulting performance is very close to the theoretical limits.

  6. Students' educational careers in higher education : a search into key factors regarding study outcome

    NARCIS (Netherlands)

    Bragt, van C.A.C.

    2010-01-01

    One of the political goals of the EU is to develop ‘the most competitive knowledge-based economy in the world by 2010’. The Dutch knowledge economy faces an increased demand for highly-educated inhabitants, and more graduates from Higher Education are needed. Dutch Universities of Applied Sciences

  7. How to review 4 million lines of ATLAS code

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00226135; The ATLAS collaboration; Lampl, Walter

    2017-01-01

    As the ATLAS Experiment prepares to move to a multi-threaded framework (AthenaMT) for Run3, we are faced with the problem of how to migrate 4 million lines of C++ source code. This code has been written over the past 15 years and has often been adapted, re-written or extended to the changing requirements and circumstances of LHC data taking. The code was developed by different authors, many of whom are no longer active, and under the deep assumption that processing ATLAS data would be done in a serial fashion. In order to understand the scale of the problem faced by the ATLAS software community, and to plan appropriately the significant efforts posed by the new AthenaMT framework, ATLAS embarked on a wide ranging review of our offline code, covering all areas of activity: event generation, simulation, trigger, reconstruction. We discuss the difficulties in even logistically organising such reviews in an already busy community, how to examine areas in sufficient depth to learn key areas in need of upgrade, yet...

  8. How To Review 4 Million Lines of ATLAS Code

    CERN Document Server

    Stewart, Graeme; The ATLAS collaboration

    2016-01-01

    As the ATLAS Experiment prepares to move to a multi-threaded framework (AthenaMT) for Run3, we are faced with the problem of how to migrate 4 million lines of C++ source code. This code has been written over the past 15 years and has often been adapted, re-written or extended to the changing requirements and circumstances of LHC data taking. The code was developed by different authors, many of whom are no longer active, and under the deep assumption that processing ATLAS data would be done in a serial fashion. In order to understand the scale of the problem faced by the ATLAS software community, and to plan appropriately the significant efforts posed by the new AthenaMT framework, ATLAS embarked on a wide ranging review of our offline code, covering all areas of activity: event generation, simulation, trigger, reconstruction. We discuss the difficulties in even logistically organising such reviews in an already busy community, how to examine areas in sufficient depth to learn key areas in need of upgrade, yet...

  9. 全球教育的重要主題及其課程設計On Key Themes of Global Education and Their

    Directory of Open Access Journals (Sweden)

    林永豐 Yung-Feng Lin

    2012-09-01

    Full Text Available 有鑑於全球化的趨勢與衝擊愈來愈明顯,各國紛紛重視國際或全球教育的改革,尤其希望透過課程與教學的調整,培育具備國際觀、全球行動與競爭力的人才。本研究旨在探討全球教育課程的重要主題,並分析我國在國際教育課程設計上的現況與重點。首先,分析全球教育課程的內涵,繼之彙整英國與澳洲的課程設計實例,並進而探討全球教育課程設計的三類模式及其重要主題,包括第一類是透過五大類主題來彰顯全球教育內涵;第二類是透過全球性議題來建立全球公民素養;第三類則是透過合作專案學習來擴展國際視野。本研究亦分析我國中小學九年一貫課程綱要與中小學國際教育能力指標,整體而言,「文化差異與認同差異」和「生態環境與永續發展」是最受重視的主題;而「衝突解決與世界和平」和「基本人權與社會正義」是較被忽視的主題,值得爾後我國發展國際教育課程時加以重視,適時導正,以培育學生更完整均衡的全球教育視野。In the wake of increasingly evident impacts of globalization, many countries around the world are putting more emphases on developing global or international education then ever before. Through different curriculum or pedagogy reforms, it is hope that students could be equipped with a global view of world or with global competitiveness. This paper aims to investigate key themes of global education and to analyze the global education in the current 1-9 year education. In the first section, main themes or topics of global education are investigated and curricula in both England and Australia are discussed. Furthermore, three key models of curriculum design concerning global education are elaborated. In other words, global education are presented through: first, five key themes; second, diverse global issues; and thirdly, collaborated

  10. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  11. Performance Analysis of DPSK Signals with Selection Combining and Convolutional Coding in Fading Channel

    National Research Council Canada - National Science Library

    Ong, Choon

    1998-01-01

    The performance analysis of a differential phase shift keyed (DPSK) communications system, operating in a Rayleigh fading environment, employing convolutional coding and diversity processing is presented...

  12. Pre-Service Teachers' Perception of Quick Response (QR) Code Integration in Classroom Activities

    Science.gov (United States)

    Ali, Nagla; Santos, Ieda M.; Areepattamannil, Shaljan

    2017-01-01

    Quick Response (QR) codes have been discussed in the literature as adding value to teaching and learning. Despite their potential in education, more research is needed to inform practice and advance knowledge in this field. This paper investigated the integration of the QR code in classroom activities and the perceptions of the integration by…

  13. Improving radiopharmaceutical supply chain safety by implementing bar code technology.

    Science.gov (United States)

    Matanza, David; Hallouard, François; Rioufol, Catherine; Fessi, Hatem; Fraysse, Marc

    2014-11-01

    The aim of this study was to describe and evaluate an approach for improving radiopharmaceutical supply chain safety by implementing bar code technology. We first evaluated the current situation of our radiopharmaceutical supply chain and, by means of the ALARM protocol, analysed two dispensing errors that occurred in our department. Thereafter, we implemented a bar code system to secure selected key stages of the radiopharmaceutical supply chain. Finally, we evaluated the cost of this implementation, from overtime, to overheads, to additional radiation exposure to workers. An analysis of the events that occurred revealed a lack of identification of prepared or dispensed drugs. Moreover, the evaluation of the current radiopharmaceutical supply chain showed that the dispensation and injection steps needed to be further secured. The bar code system was used to reinforce product identification at three selected key stages: at usable stock entry; at preparation-dispensation; and during administration, allowing to check conformity between the labelling of the delivered product (identity and activity) and the prescription. The extra time needed for all these steps had no impact on the number and successful conduct of examinations. The investment cost was reduced (2600 euros for new material and 30 euros a year for additional supplies) because of pre-existing computing equipment. With regard to the radiation exposure to workers there was an insignificant overexposure for hands with this new organization because of the labelling and scanning processes of radiolabelled preparation vials. Implementation of bar code technology is now an essential part of a global securing approach towards optimum patient management.

  14. Compilation of documented computer codes applicable to environmental assessment of radioactivity releases

    International Nuclear Information System (INIS)

    Hoffman, F.O.; Miller, C.W.; Shaeffer, D.L.; Garten, C.T. Jr.; Shor, R.W.; Ensminger, J.T.

    1977-04-01

    The objective of this paper is to present a compilation of computer codes for the assessment of accidental or routine releases of radioactivity to the environment from nuclear power facilities. The capabilities of 83 computer codes in the areas of environmental transport and radiation dosimetry are summarized in tabular form. This preliminary analysis clearly indicates that the initial efforts in assessment methodology development have concentrated on atmospheric dispersion, external dosimetry, and internal dosimetry via inhalation. The incorporation of terrestrial and aquatic food chain pathways has been a more recent development and reflects the current requirements of environmental legislation and the needs of regulatory agencies. The characteristics of the conceptual models employed by these codes are reviewed. The appendixes include abstracts of the codes and indexes by author, key words, publication description, and title

  15. Discussion on LDPC Codes and Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  16. A joint multi-view plus depth image coding scheme based on 3D-warping

    DEFF Research Database (Denmark)

    Zamarin, Marco; Zanuttigh, Pietro; Milani, Simone

    2011-01-01

    on the scene structure that can be effectively exploited to improve the performance of multi-view coding schemes. In this paper we introduce a novel coding architecture that replaces the inter-view motion prediction operation with a 3D warping approach based on depth information to improve the coding......Free viewpoint video applications and autostereoscopic displays require the transmission of multiple views of a scene together with depth maps. Current compression and transmission solutions just handle these two data streams as separate entities. However, depth maps contain key information...

  17. Complementary Walsh-Hadamard coded optical CDMA coder/decoders structured over arrayed-waveguide grating routers

    Science.gov (United States)

    Huang, Jen-Fa; Yang, Chao-Chin; Tseng, Shin-Pin

    2004-01-01

    In this paper, an optical code-division multiple-access (OCDMA) system with complementary Walsh-Hadamard coded optical encoder/decoder configuration structured over arrayed-waveguide grating (AWG) routers is examined. In the proposed system, each network user requires only two AWG routers to accomplish spectral encoding and decoding for complementary keying, thus, resulting a simpler and low cost system. Performance of the proposed system is analyzed by taking the effect of phase-induced intensity noise into account. The result indicates that the established system not only preserves the capability of suppressing multiple-access interference (MAI), but also improves bit-error-rate performance as compared to the conventional coders employing simple on-off keying.

  18. Improved security proofs and constructions for public-key cryptography

    OpenAIRE

    Pan, Jiaxin (M. Sc.)

    2016-01-01

    Diese Arbeit verbessert die Sicherheitsanalyse und Konstruktierbarkeit von Public-Key-Kryptographie: Der erste Teil der Arbeit schlägt einen vereinfachten Sicherheitsbeweis für digitale Signaturverfahren von kanonischen Identifikationsschemata über die klassischen Fiat-Shamir-Transformation im Random Oracle Modell vor. Der zweite Teil der Arbeit schlägt eine neue Variante der Message Authentication Codes (MACs) vor, die sogenannten affinen MACs. Außerdem wird eine generische Transform...

  19. Five Keys for Teaching Mental Math

    Science.gov (United States)

    Olsen, James R.

    2015-01-01

    After studying the Common Core State Standards for Mathematics (CCSSM) and brain-based learning research, James Olsen believes mental math instruction in secondary school mathematics (grades 7-12) and in teacher education programs needs increased attention. The purpose of this article is to share some keys for teaching mental math. Olsen also…

  20. Variable disparity-motion estimation based fast three-view video coding

    Science.gov (United States)

    Bae, Kyung-Hoon; Kim, Seung-Cheol; Hwang, Yong Seok; Kim, Eun-Soo

    2009-02-01

    In this paper, variable disparity-motion estimation (VDME) based 3-view video coding is proposed. In the encoding, key-frame coding (KFC) based motion estimation and variable disparity estimation (VDE) for effectively fast three-view video encoding are processed. These proposed algorithms enhance the performance of 3-D video encoding/decoding system in terms of accuracy of disparity estimation and computational overhead. From some experiments, stereo sequences of 'Pot Plant' and 'IVO', it is shown that the proposed algorithm's PSNRs is 37.66 and 40.55 dB, and the processing time is 0.139 and 0.124 sec/frame, respectively.

  1. Social Cognition and Executive Functions As Key Factors for Effective Pedagogy in Higher Education.

    Science.gov (United States)

    Correia, Rut; Navarrete, Gorka

    2017-01-01

    Higher education (HE) faces the challenge of responding to an increasing diversity. In this context, more attention is being paid to teachers and teaching skills positively related to students learning. Beyond the knowledges identified as key components of an effective teacher, teachers also need to be capable of unraveling what their students think and believe, and how they accommodate the new information. More importantly, teachers need to be able to adapt their own teaching to their audience's needs. In learners, social cognition (SC) has been related to a better receptivity to the different teacher-student interactions. Since these interactions are bidirectional, SC could also help to explain teachers' receptiveness to the information available in feedback situations. However, little is known about how SC is related to teacher development, and therefore teaching effectiveness, in HE. In addition, executive functions (EFs), closely related to SC, could play a key role in the ability to self-regulate their own teaching to better answering their students emerging needs. Although there is wide evidence regarding the association of EFs to performance in high demanding settings, as far as we know, there are no studies exploring the relationship between teachers' EFs and teaching effectiveness in HE. Establishing a positive association between teaching effectiveness and these socio-cognitive functions could be a promising first step in designing professional development programs that promote HE academics' ability to understand and care about students thoughts and emotions, to eventually adapt their teaching to their students needs for a better learning.

  2. Time for change: a roadmap to guide the implementation of the World Anti-Doping Code 2015.

    Science.gov (United States)

    Dvorak, Jiri; Baume, Norbert; Botré, Francesco; Broséus, Julian; Budgett, Richard; Frey, Walter O; Geyer, Hans; Harcourt, Peter Rex; Ho, Dave; Howman, David; Isola, Victor; Lundby, Carsten; Marclay, François; Peytavin, Annie; Pipe, Andrew; Pitsiladis, Yannis P; Reichel, Christian; Robinson, Neil; Rodchenkov, Grigory; Saugy, Martial; Sayegh, Souheil; Segura, Jordi; Thevis, Mario; Vernec, Alan; Viret, Marjolaine; Vouillamoz, Marc; Zorzoli, Mario

    2014-05-01

    A medical and scientific multidisciplinary consensus meeting was held from 29 to 30 November 2013 on Anti-Doping in Sport at the Home of FIFA in Zurich, Switzerland, to create a roadmap for the implementation of the 2015 World Anti-Doping Code. The consensus statement and accompanying papers set out the priorities for the antidoping community in research, science and medicine. The participants achieved consensus on a strategy for the implementation of the 2015 World Anti-Doping Code. Key components of this strategy include: (1) sport-specific risk assessment, (2) prevalence measurement, (3) sport-specific test distribution plans, (4) storage and reanalysis, (5) analytical challenges, (6) forensic intelligence, (7) psychological approach to optimise the most deterrent effect, (8) the Athlete Biological Passport (ABP) and confounding factors, (9) data management system (Anti-Doping Administration & Management System (ADAMS), (10) education, (11) research needs and necessary advances, (12) inadvertent doping and (13) management and ethics: biological data. True implementation of the 2015 World Anti-Doping Code will depend largely on the ability to align thinking around these core concepts and strategies. FIFA, jointly with all other engaged International Federations of sports (Ifs), the International Olympic Committee (IOC) and World Anti-Doping Agency (WADA), are ideally placed to lead transformational change with the unwavering support of the wider antidoping community. The outcome of the consensus meeting was the creation of the ad hoc Working Group charged with the responsibility of moving this agenda forward.

  3. Code-Hopping Based Transmission Scheme for Wireless Physical-Layer Security

    Directory of Open Access Journals (Sweden)

    Liuguo Yin

    2018-01-01

    Full Text Available Due to the broadcast and time-varying natures of wireless channels, traditional communication systems that provide data encryption at the application layer suffer many challenges such as error diffusion. In this paper, we propose a code-hopping based secrecy transmission scheme that uses dynamic nonsystematic low-density parity-check (LDPC codes and automatic repeat-request (ARQ mechanism to jointly encode and encrypt source messages at the physical layer. In this scheme, secret keys at the transmitter and the legitimate receiver are generated dynamically upon the source messages that have been transmitted successfully. During the transmission, each source message is jointly encoded and encrypted by a parity-check matrix, which is dynamically selected from a set of LDPC matrices based on the shared dynamic secret key. As for the eavesdropper (Eve, the uncorrectable decoding errors prevent her from generating the same secret key as the legitimate parties. Thus she cannot select the correct LDPC matrix to recover the source message. We demonstrate that our scheme can be compatible with traditional cryptosystems and enhance the security without sacrificing the error-correction performance. Numerical results show that the bit error rate (BER of Eve approaches 0.5 as the number of transmitted source messages increases and the security gap of the system is small.

  4. Key Elements of the User-Friendly, GFDL SKYHI General Circulation Model

    Directory of Open Access Journals (Sweden)

    Richard S. Hemler

    2000-01-01

    Full Text Available Over the past seven years, the portability of the GFDL SKYHI general circulation model has greatly increased. Modifications to the source code have allowed SKYHI to be run on the GFDL Cray Research PVP machines, the TMC CM-5 machine at Los Alamos National Laboratory, and more recently on the GFDL 40-processor Cray Research T3E system. At the same time, changes have been made to the model to make it more usable and flexible. Because of the reduction of the human resources available to manage and analyze scientific experiments, it is no longer acceptable to consider only the optimization of computer resources when producing a research code; one must also consider the availability and cost of the people necessary to maintain, modify and use the model as an investigative tool, and include these factors in defining the form of the model code. The new SKYHI model attempts to strike a balance between the optimization of the use of machine resources (CPU time, memory, disc and the optimal use of human resources (ability to understand code, ability to modify code, ability to perturb code to do experiments, ability to run code on different platforms. Two of the key features that make the new SKYHI code more usable and flexible are the archiving package and the user variable block. The archiving package is used to manage the writing of all archive files, which contain data for later analysis. The model-supplied user variable block allows the easy inclusion of any new variables needed for particular experiments.

  5. Current Status of the Elevated Temperature Structure Design Codes for VHTR

    International Nuclear Information System (INIS)

    Kim, Jong-Bum; Kim, Seok-Hoon; Park, Keun-Bae; Lee, Won-Jae

    2006-01-01

    An elevated temperature structure design and analysis is one of the key issues in the VHTR (Very High Temperature Reactor) project to achieve an economic production of hydrogen which will be an essential energy source for the near future. Since the operating temperature of a VHTR is above 850 .deg. C, the existing code and standards are insufficient for a high temperature structure design. Thus the issues concerning a material selection and behaviors are being studied for the main structural components of a VHTR in leading countries such as US, France, UK, and Japan. In this study, the current status of the ASME code, French RCC-MR, UK R5, and Japanese code were investigated and the necessary R and D items were discussed

  6. New quantum codes constructed from quaternary BCH codes

    Science.gov (United States)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  7. Writing for the web composing, coding, and constructing web sites

    CERN Document Server

    Applen, JD

    2013-01-01

    Writing for the Web unites theory, technology, and practice to explore writing and hypertext for website creation. It integrates such key topics as XHTML/CSS coding, writing (prose) for the Web, the rhetorical needs of the audience, theories of hypertext, usability and architecture, and the basics of web site design and technology. Presenting information in digestible parts, this text enables students to write and construct realistic and manageable Web sites with a strong theoretical understanding of how online texts communicate to audiences. Key features of the book

  8. Metformin-Induced Changes of the Coding Transcriptome and Non-Coding RNAs in the Livers of Non-Alcoholic Fatty Liver Disease Mice.

    Science.gov (United States)

    Guo, Jun; Zhou, Yuan; Cheng, Yafen; Fang, Weiwei; Hu, Gang; Wei, Jie; Lin, Yajun; Man, Yong; Guo, Lixin; Sun, Mingxiao; Cui, Qinghua; Li, Jian

    2018-01-01

    Recent studies have suggested that changes in non-coding mRNA play a key role in the progression of non-alcoholic fatty liver disease (NAFLD). Metformin is now recommended and effective for the treatment of NAFLD. We hope the current analyses of the non-coding mRNA transcriptome will provide a better presentation of the potential roles of mRNAs and long non-coding RNAs (lncRNAs) that underlie NAFLD and metformin intervention. The present study mainly analysed changes in the coding transcriptome and non-coding RNAs after the application of a five-week metformin intervention. Liver samples from three groups of mice were harvested for transcriptome profiling, which covered mRNA, lncRNA, microRNA (miRNA) and circular RNA (circRNA), using a microarray technique. A systematic alleviation of high-fat diet (HFD)-induced transcriptome alterations by metformin was observed. The metformin treatment largely reversed the correlations with diabetes-related pathways. Our analysis also suggested interaction networks between differentially expressed lncRNAs and known hepatic disease genes and interactions between circRNA and their disease-related miRNA partners. Eight HFD-responsive lncRNAs and three metformin-responsive lncRNAs were noted due to their widespread associations with disease genes. Moreover, seven miRNAs that interacted with multiple differentially expressed circRNAs were highlighted because they were likely to be associated with metabolic or liver diseases. The present study identified novel changes in the coding transcriptome and non-coding RNAs in the livers of NAFLD mice after metformin treatment that might shed light on the underlying mechanism by which metformin impedes the progression of NAFLD. © 2018 The Author(s). Published by S. Karger AG, Basel.

  9. RECEPTING THE PRINCIPLE OF SUPREMACY OF CONSTITUTION ON THE NEW PENAL CODE

    Directory of Open Access Journals (Sweden)

    Marius ANDREESCU

    2016-07-01

    Full Text Available The supremacy of Constitution has as main consequence the compliance of entire law with the constitutional norms. Guaranteeing of the observance of this principle is essential for the rule of law, is primarily an attribute of the Constitutional Court, but also an obligation of the legislator to receive by texts adopted, within its content and form, the constitutional norms. Entering into force of the new criminal codes generated a significant jurisprudence of the Constitutional Court on the verification of constitutionality of some regulations in the Criminal Code and Criminal Procedure Code. Through this study we intend to analyze the following key issues: a how were the constitutional principles and values embodied in some criminal and criminal procedural norms of the new codes; b the effects of Constitutional Court decisions in the process of constitutionalizing of the criminal law; c applying into judicial activities of the Constitutional Court decisions, particularly those through which the new Criminal Code regulations were found unconstitutional.

  10. Entanglement-assisted quantum MDS codes from negacyclic codes

    Science.gov (United States)

    Lu, Liangdong; Li, Ruihu; Guo, Luobin; Ma, Yuena; Liu, Yang

    2018-03-01

    The entanglement-assisted formalism generalizes the standard stabilizer formalism, which can transform arbitrary classical linear codes into entanglement-assisted quantum error-correcting codes (EAQECCs) by using pre-shared entanglement between the sender and the receiver. In this work, we construct six classes of q-ary entanglement-assisted quantum MDS (EAQMDS) codes based on classical negacyclic MDS codes by exploiting two or more pre-shared maximally entangled states. We show that two of these six classes q-ary EAQMDS have minimum distance more larger than q+1. Most of these q-ary EAQMDS codes are new in the sense that their parameters are not covered by the codes available in the literature.

  11. Visualizing code and coverage changes for code review

    NARCIS (Netherlands)

    Oosterwaal, Sebastiaan; van Deursen, A.; De Souza Coelho, R.; Sawant, A.A.; Bacchelli, A.

    2016-01-01

    One of the tasks of reviewers is to verify that code modifications are well tested. However, current tools offer little support in understanding precisely how changes to the code relate to changes to the tests. In particular, it is hard to see whether (modified) test code covers the changed code.

  12. PEAK-TO-AVERAGE POWER RATIO REDUCTION USING CODING AND HYBRID TECHNIQUES FOR OFDM SYSTEM

    Directory of Open Access Journals (Sweden)

    Bahubali K. Shiragapur

    2016-03-01

    Full Text Available In this article, the research work investigated is based on an error correction coding techniques are used to reduce the undesirable Peak-to-Average Power Ratio (PAPR quantity. The Golay Code (24, 12, Reed-Muller code (16, 11, Hamming code (7, 4 and Hybrid technique (Combination of Signal Scrambling and Signal Distortion proposed by us are used as proposed coding techniques, the simulation results shows that performance of Hybrid technique, reduces PAPR significantly as compared to Conventional and Modified Selective mapping techniques. The simulation results are validated through statistical properties, for proposed technique’s autocorrelation value is maximum shows reduction in PAPR. The symbol preference is the key idea to reduce PAPR based on Hamming distance. The simulation results are discussed in detail, in this article.

  13. Cryptographic robustness of a quantum cryptography system using phase-time coding

    International Nuclear Information System (INIS)

    Molotkov, S. N.

    2008-01-01

    A cryptographic analysis is presented of a new quantum key distribution protocol using phase-time coding. An upper bound is obtained for the error rate that guarantees secure key distribution. It is shown that the maximum tolerable error rate for this protocol depends on the counting rate in the control time slot. When no counts are detected in the control time slot, the protocol guarantees secure key distribution if the bit error rate in the sifted key does not exceed 50%. This protocol partially discriminates between errors due to system defects (e.g., imbalance of a fiber-optic interferometer) and eavesdropping. In the absence of eavesdropping, the counts detected in the control time slot are not caused by interferometer imbalance, which reduces the requirements for interferometer stability.

  14. Homological stabilizer codes

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  15. Development of fast ignition integrated interconnecting code (FI3) for fast ignition scheme

    International Nuclear Information System (INIS)

    Nagatomo, H.; Johzaki, T.; Mima, K.; Sunahara, A.; Nishihara, K.; Izawa, Y.; Sakagami, H.; Nakao, Y.; Yokota, T.; Taguchi, T.

    2005-01-01

    The numerical simulation plays an important role in estimating the feasibility and performance of the fast ignition. There are two key issues in numerical analysis for the fast ignition. One is the controlling the implosion dynamics to form a high density core plasma in non-spherical implosion, and the other is heating core plasma efficiency by the short pulse high intense laser. From initial laser irradiation to final fusion burning, all the physics are coupling strongly in any phase, and they must be solved consistently in computational simulation. However, in general, it is impossible to simulate laser plasma interaction and radiation hydrodynamics in a single computational code, without any numerical dissipation, special assumption or conditional treatment. Recently, we have developed 'Fast Ignition Integrated Interconnecting code' (FI 3 ) which consists of collective Particle-in-Cell code, Relativistic Fokker-Planck hydro code, and 2-dimensional radiation hydrodynamics code. And those codes are connecting with each other in data-flow bases. In this paper, we will present detail feature of the FI 3 code, and numerical results of whole process of fast ignition. (author)

  16. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  17. Codes of Professional Conduct and Ethics Education for Future Teachers

    Science.gov (United States)

    Maxwell, Bruce

    2017-01-01

    This paper argues that the way future teachers are being initiated into the ethical dimensions of their future profession is largely out of step with the movement to professionalize teaching. After recalling the role that codes of professional conduct play in the ecology of professional self-regulation, and arguing that familiarizing students with…

  18. From text to codings: intercoder reliability assessment in qualitative content analysis.

    Science.gov (United States)

    Burla, Laila; Knierim, Birte; Barth, Jurgen; Liewald, Katharina; Duetz, Margreet; Abel, Thomas

    2008-01-01

    High intercoder reliability (ICR) is required in qualitative content analysis for assuring quality when more than one coder is involved in data analysis. The literature is short of standardized procedures for ICR procedures in qualitative content analysis. To illustrate how ICR assessment can be used to improve codings in qualitative content analysis. Key steps of the procedure are presented, drawing on data from a qualitative study on patients' perspectives on low back pain. First, a coding scheme was developed using a comprehensive inductive and deductive approach. Second, 10 transcripts were coded independently by two researchers, and ICR was calculated. A resulting kappa value of .67 can be regarded as satisfactory to solid. Moreover, varying agreement rates helped to identify problems in the coding scheme. Low agreement rates, for instance, indicated that respective codes were defined too broadly and would need clarification. In a third step, the results of the analysis were used to improve the coding scheme, leading to consistent and high-quality results. The quantitative approach of ICR assessment is a viable instrument for quality assurance in qualitative content analysis. Kappa values and close inspection of agreement rates help to estimate and increase quality of codings. This approach facilitates good practice in coding and enhances credibility of analysis, especially when large samples are interviewed, different coders are involved, and quantitative results are presented.

  19. The Effectiveness of Business Codes: A Critical Examination of Existing Studies and the Development of an Integrated Research Model

    NARCIS (Netherlands)

    S.P. Kaptein (Muel); M.S. Schwartz (Mark)

    2007-01-01

    textabstractBusiness codes are a widely used management instrument. Research into the effectiveness of business codes has, however, produced conflicting results. The main reasons for the divergent findings are: varying definitions of key terms; deficiencies in the empirical data and methodologies

  20. The effectiveness of business codes: a critical examination of existing studies and the development of an integrated research model

    NARCIS (Netherlands)

    S.P. Kaptein (Muel); M.S. Schwartz (Mark)

    2008-01-01

    textabstractBusiness codes are a widely used management instrument. Research into the effectiveness of business codes has, however, produced conflicting results. The main reasons for the divergent findings are: varying definitions of key terms; deficiencies in the empirical data and methodologies

  1. Nuclear Energy Advanced Modeling and Simulation (NEAMS) waste Integrated Performance and Safety Codes (IPSC): gap analysis for high fidelity and performance assessment code development

    International Nuclear Information System (INIS)

    Lee, Joon H.; Siegel, Malcolm Dean; Arguello, Jose Guadalupe Jr.; Webb, Stephen Walter; Dewers, Thomas A.; Mariner, Paul E.; Edwards, Harold Carter; Fuller, Timothy J.; Freeze, Geoffrey A.; Jove-Colon, Carlos F.; Wang, Yifeng

    2011-01-01

    needed for repository modeling are severely lacking. In addition, most of existing reactive transport codes were developed for non-radioactive contaminants, and they need to be adapted to account for radionuclide decay and in-growth. The accessibility to the source codes is generally limited. Because the problems of interest for the Waste IPSC are likely to result in relatively large computational models, a compact memory-usage footprint and a fast/robust solution procedure will be needed. A robust massively parallel processing (MPP) capability will also be required to provide reasonable turnaround times on the analyses that will be performed with the code. A performance assessment (PA) calculation for a waste disposal system generally requires a large number (hundreds to thousands) of model simulations to quantify the effect of model parameter uncertainties on the predicted repository performance. A set of codes for a PA calculation must be sufficiently robust and fast in terms of code execution. A PA system as a whole must be able to provide multiple alternative models for a specific set of physical/chemical processes, so that the users can choose various levels of modeling complexity based on their modeling needs. This requires PA codes, preferably, to be highly modularized. Most of the existing codes have difficulties meeting these requirements. Based on the gap analysis results, we have made the following recommendations for the code selection and code development for the NEAMS waste IPSC: (1) build fully coupled high-fidelity THCMBR codes using the existing SIERRA codes (e.g., ARIA and ADAGIO) and platform, (2) use DAKOTA to build an enhanced performance assessment system (EPAS), and build a modular code architecture and key code modules for performance assessments. The key chemical calculation modules will be built by expanding the existing CANTERA capabilities as well as by extracting useful components from other existing codes.

  2. Nuclear Energy Advanced Modeling and Simulation (NEAMS) waste Integrated Performance and Safety Codes (IPSC) : gap analysis for high fidelity and performance assessment code development.

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Joon H.; Siegel, Malcolm Dean; Arguello, Jose Guadalupe, Jr.; Webb, Stephen Walter; Dewers, Thomas A.; Mariner, Paul E.; Edwards, Harold Carter; Fuller, Timothy J.; Freeze, Geoffrey A.; Jove-Colon, Carlos F.; Wang, Yifeng

    2011-03-01

    needed for repository modeling are severely lacking. In addition, most of existing reactive transport codes were developed for non-radioactive contaminants, and they need to be adapted to account for radionuclide decay and in-growth. The accessibility to the source codes is generally limited. Because the problems of interest for the Waste IPSC are likely to result in relatively large computational models, a compact memory-usage footprint and a fast/robust solution procedure will be needed. A robust massively parallel processing (MPP) capability will also be required to provide reasonable turnaround times on the analyses that will be performed with the code. A performance assessment (PA) calculation for a waste disposal system generally requires a large number (hundreds to thousands) of model simulations to quantify the effect of model parameter uncertainties on the predicted repository performance. A set of codes for a PA calculation must be sufficiently robust and fast in terms of code execution. A PA system as a whole must be able to provide multiple alternative models for a specific set of physical/chemical processes, so that the users can choose various levels of modeling complexity based on their modeling needs. This requires PA codes, preferably, to be highly modularized. Most of the existing codes have difficulties meeting these requirements. Based on the gap analysis results, we have made the following recommendations for the code selection and code development for the NEAMS waste IPSC: (1) build fully coupled high-fidelity THCMBR codes using the existing SIERRA codes (e.g., ARIA and ADAGIO) and platform, (2) use DAKOTA to build an enhanced performance assessment system (EPAS), and build a modular code architecture and key code modules for performance assessments. The key chemical calculation modules will be built by expanding the existing CANTERA capabilities as well as by extracting useful components from other existing codes.

  3. Implementation of continuous-variable quantum key distribution with discrete modulation

    Science.gov (United States)

    Hirano, Takuya; Ichikawa, Tsubasa; Matsubara, Takuto; Ono, Motoharu; Oguri, Yusuke; Namiki, Ryo; Kasai, Kenta; Matsumoto, Ryutaroh; Tsurumaru, Toyohiro

    2017-06-01

    We have developed a continuous-variable quantum key distribution (CV-QKD) system that employs discrete quadrature-amplitude modulation and homodyne detection of coherent states of light. We experimentally demonstrated automated secure key generation with a rate of 50 kbps when a quantum channel is a 10 km optical fibre. The CV-QKD system utilises a four-state and post-selection protocol and generates a secure key against the entangling cloner attack. We used a pulsed light source of 1550 nm wavelength with a repetition rate of 10 MHz. A commercially available balanced receiver is used to realise shot-noise-limited pulsed homodyne detection. We used a non-binary LDPC code for error correction (reverse reconciliation) and the Toeplitz matrix multiplication for privacy amplification. A graphical processing unit card is used to accelerate the software-based post-processing.

  4. Field test of a continuous-variable quantum key distribution prototype

    International Nuclear Information System (INIS)

    Fossier, S; Debuisschert, T; Diamanti, E; Villing, A; Tualle-Brouri, R; Grangier, P

    2009-01-01

    We have designed and realized a prototype that implements a continuous-variable quantum key distribution (QKD) protocol based on coherent states and reverse reconciliation. The system uses time and polarization multiplexing for optimal transmission and detection of the signal and phase reference, and employs sophisticated error-correction codes for reconciliation. The security of the system is guaranteed against general coherent eavesdropping attacks. The performance of the prototype was tested over preinstalled optical fibres as part of a quantum cryptography network combining different QKD technologies. The stable and automatic operation of the prototype over 57 h yielded an average secret key distribution rate of 8 kbit s -1 over a 3 dB loss optical fibre, including the key extraction process and all quantum and classical communication. This system is therefore ideal for securing communications in metropolitan size networks with high-speed requirements.

  5. Research on Key Technology and Applications for Internet of Things

    Science.gov (United States)

    Chen, Xian-Yi; Jin, Zhi-Gang

    The Internet of Things (IOT) has been paid more and more attention by the academe, industry, and government all over the world. The concept of IOT and the architecture of IOT are discussed. The key technologies of IOT, including Radio Frequency Identification technology, Electronic Product Code technology, and ZigBee technology are analyzed. The framework of digital agriculture application based on IOT is proposed.

  6. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Heide, Janus; Roetter, Daniel Enrique Lucani

    2018-01-01

    Although cloud systems provide a reliable and flexible storage solution, the use of a single cloud service constitutes a single point of failure, which can compromise data availability, download speed, and security. To address these challenges, we advocate for the use of multiple cloud storage...... providers simultaneously using network coding as the key enabling technology. Our goal is to study two challenges of network coded storage systems. First, the efficient update of the number of coded fragments per cloud in a system aggregating multiple clouds in order to boost the download speed of files. We...... developed a novel scheme using recoding with limited packets to trade-off storage space, reliability, and data retrieval speed. Implementation and measurements with commercial cloud providers show that up to 9x less network use is needed compared to other network coding schemes, while maintaining similar...

  7. Surveying Adult Education Practitioners about Ethical Issues.

    Science.gov (United States)

    McDonald, Kimberly S.; Wood, George S., Jr.

    1993-01-01

    An Indiana survey of 113 of 248 adult basic educators, 113 of 117 trainers, and 23 of 29 continuing educators identified ethical dilemmas they face. Fifty-two percent believed a code of ethics should be created and enforced by professional associations, covering broad issues. Those who had experience with codes were positive about them. (SK)

  8. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  9. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  10. Development of System Based Code: Case Study of Life-Cycle Margin Evaluation

    International Nuclear Information System (INIS)

    Tai Asayama; Masaki Morishita; Masanori Tashimo

    2006-01-01

    For a leap of progress in structural deign of nuclear plant components, The late Professor Emeritus Yasuhide Asada proposed the System Based Code. The key concepts of the System Based Code are; (1) life-cycle margin optimization, (2) expansion of technical options as well as combinations of technical options beyond the current codes and standards, and (3) designing to clearly defined target reliabilities. Those concepts are very new to most of the nuclear power plant designers who are naturally obliged to design to current codes and standards; the application of the concepts of the System Based Code to design will lead to entire change of practices that designers have long been accustomed to. On the other hand, experienced designers are supposed to have expertise that can support and accelerate the development of the System Based Code. Therefore, interfacing with experienced designers is of crucial importance for the development of the System Based Code. The authors conducted a survey on the acceptability of the System Based Code concept. The results were analyzed from the possibility of improving structural design both in terms of reliability and cost effectiveness by the introduction of the System Based Code concept. It was concluded that the System Based Code is beneficial for those purposes. Also described is the expertise elicited from the results of the survey that can be reflected to the development of the System Based Code. (authors)

  11. The clinical role of lecturers in nursing in Ireland: perceptions from key stakeholder groups in nurse education on the role.

    Science.gov (United States)

    Meskell, Pauline; Murphy, Kathleen; Shaw, David

    2009-10-01

    The clinical role of lecturers in nursing has been a focus of debate since the integration of nurse education into higher education institutions. The purpose of this paper is to report the findings from the preliminary phase of a study, undertaken to investigate the perceptions of key stakeholder groups in nurse education, regarding the current clinical role of nurse lecturers in Ireland. A descriptive exploratory design was used involving focus group and individual interviews, soliciting views of purposefully selected educationalists, clinicians, policy formulators and students. The issue was examined from a policy perspective, aiming to collectively represent views of all participant groups. This approach facilitated a more complete picture of perceptions of the role to emerge, to better inform future decision making. Twenty two focus group interviews and twenty one individual interviews were conducted. Content analysis was used to identify themes. All groups were in agreement that role definition was urgently required to dispel ambiguities surrounding what the clinical role should involve. Conflicting views were evident among groups regarding lecturers' clinical credibility, visibility and teaching effectiveness. Findings highlight the essential nature of nurse lecturers engaging with clinical areas to maintain their skills, demonstrate a value for the practice component of the role and provide a link between education and practice.

  12. Application of the MELCOR code to design basis PWR large dry containment analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Jesse; Notafrancesco, Allen (USNRC, Office of Nuclear Regulatory Research, Rockville, MD); Tills, Jack Lee (Jack Tills & Associates, Inc., Sandia Park, NM)

    2009-05-01

    The MELCOR computer code has been developed by Sandia National Laboratories under USNRC sponsorship to provide capability for independently auditing analyses submitted by reactor manufactures and utilities. MELCOR is a fully integrated code (encompassing the reactor coolant system and the containment building) that models the progression of postulated accidents in light water reactor power plants. To assess the adequacy of containment thermal-hydraulic modeling incorporated in the MELCOR code for application to PWR large dry containments, several selected demonstration designs were analyzed. This report documents MELCOR code demonstration calculations performed for postulated design basis accident (DBA) analysis (LOCA and MSLB) inside containment, which are compared to other code results. The key processes when analyzing the containment loads inside PWR large dry containments are (1) expansion and transport of high mass/energy releases, (2) heat and mass transfer to structural passive heat sinks, and (3) containment pressure reduction due to engineered safety features. A code-to-code benchmarking for DBA events showed that MELCOR predictions of maximum containment loads were equivalent to similar predictions using a qualified containment code known as CONTAIN. This equivalency was found to apply for both single- and multi-cell containment models.

  13. The use of case tools in OPG safety analysis code qualification

    International Nuclear Information System (INIS)

    Pascoe, J.; Cheung, A.; Westbye, C.

    2001-01-01

    Ontario Power Generation (OPG) is currently qualifying its critical safety analysis software. The software quality assurance (SQA) framework is described. Given the legacy nature of much of the safety analysis software the reverse engineering methodology has been adopted. The safety analysis suite of codes was developed over a period of many years to differing standards of quality and had sparse or incomplete documentation. Key elements of the reverse engineering process require recovery of design information from existing coding. This recovery, if performed manually, could represent an enormous effort. Driven by a need to maximize productivity and enhance the repeatability and objectivity of software qualification activities the decision was made to acquire or develop and implement Computer Aided Software Engineering (CASE) tools. This paper presents relevant background information on CASE tools and discusses how the OPG SQA requirements were used to assess the suitability of available CASE tools. Key findings from the application of CASE tools to the qualification of the OPG safety analysis software are discussed. (author)

  14. Preparedness of newly qualified midwives to deliver clinical care: an evaluation of pre-registration midwifery education through an analysis of key events.

    Science.gov (United States)

    Skirton, Heather; Stephen, Nicole; Doris, Faye; Cooper, Maggie; Avis, Mark; Fraser, Diane M

    2012-10-01

    this study was part of a larger project commissioned to ascertain whether midwife teachers bring a unique contribution to the preparation of midwives for practice. The aim of this phase was to determine whether the student midwives' educational programme had equipped them to practise competently after entry to the professional register. this was a prospective, longitudinal qualitative study, using participant diaries to collect data. data were collected from newly qualified midwives during the initial six months after they commenced their first post as a qualified midwife. the potential participants were all student midwives who were completing their education at one of six Universities (three in England, one in Scotland, one in Wales and one in Northern Ireland). Diary data were submitted by 35 newly qualified midwives; 28 were graduates of the three year programme and seven of the shortened programme. diary entries were analysed using thematic analysis (Braun and Clarke, 2006), with a focus on identification of key events in the working lives of the newly qualified midwives. A total of 263 key events were identified, under three main themes: (1) impact of the event on confidence, (2) gaps in knowledge or experience and (3) articulated frustration, conflict or distress. essentially, pre-registration education, delivered largely by midwife teachers and supported by clinical mentors, has been shown to equip newly qualified midwives to work effectively as autonomous practitioners caring for mothers and babies. While newly qualified midwives are able to cope with a range of challenging clinical situations in a safe manner, they lack confidence in key areas. Positive reinforcement by supportive colleagues plays a significant role in enabling them to develop as practitioners. whilst acknowledging the importance of normality in childbearing there is a need within the curriculum to enable midwives to recognise and respond to complex care situations by providing theory

  15. Innovation and Standardization in School Building: A Proposal for the National Code in Italy.

    Science.gov (United States)

    Ridolfi, Giuseppe

    This document discusses the University of Florence's experience and concepts as it developed the research to define a proposal for designing a new national school building code. Section 1 examines the current school building code and the Italian Reform Process in Education between 1960 and 2000. Section 2 details and explains the new school…

  16. How Color Coding Formulaic Writing Enhances Organization: A Qualitative Approach for Measuring Student Affect

    Science.gov (United States)

    Geigle, Bryce A.

    2014-01-01

    The aim of this thesis is to investigate and present the status of student synthesis with color coded formula writing for grade level six through twelve, and to make recommendations for educators to teach writing structure through a color coded formula system in order to increase classroom engagement and lower students' affect. The thesis first…

  17. Growing up and role modeling: a theory in Iranian nursing students' education.

    Science.gov (United States)

    Mokhtari Nouri, Jamileh; Ebadi, Abbas; Alhani, Fatemeh; Rejeh, Nahid

    2014-11-16

    One of the key strategies in students' learning is being affected by models. Understanding the role-modeling process in education will help to make greater use of this training strategy. The aim of this grounded theory study was to explore Iranian nursing students and instructors' experiences about role modeling process. Data was analyzed by Glaserian's Grounded Theory methodology through semi-structured interviews with 7 faculty members, 2 nursing students; the three focus group discussions with 20 nursing students based on purposive and theoretical sampling was done for explaining role modeling process from four nursing faculties in Tehran. Through basic coding, an effort to comprehensive growth and excellence was made with the basic social process consisting the core category and through selective coding three phases were identified as: realizing and exposure to inadequate human and professional growth, facilitating human and professional growth and evolution. The role modeling process is taking place unconscious, involuntary, dynamic and with positive progressive process in order to facilitate overall growth in nursing student. Accordingly, the design and implementation of the designed model can be used to make this unconscious to conscious, active and voluntarily processes a process to help education administrators of nursing colleges and supra organization to prevent threats to human and professional in nursing students' education and promote nursing students' growth.

  18. Calibration of Monte Carlo simulation code to low voltage electron beams through radiachromic dosimetry

    International Nuclear Information System (INIS)

    Weiss, D.E.; Kalweit, H.W.; Kensek, R.P.

    1994-01-01

    A simple multilayer slab model of an electron beam using the ITS/TIGER code can consistently account for about 80% of the actual dose delivered by a low voltage electron beam. The difference in calculated values is principally due to the 3D hibachi structure which blocks 22% of the beam. A 3D model was constructed using the ITS/ACCEPT code to improve upon the TIGER simulations. A rectangular source description update to the code and reproduction of all key geometric elements involved, including the hibachi, accounted for 90-95% of the dose received by routine dosimetry

  19. HyDEn: A Hybrid Steganocryptographic Approach for Data Encryption Using Randomized Error-Correcting DNA Codes

    Directory of Open Access Journals (Sweden)

    Dan Tulpan

    2013-01-01

    Full Text Available This paper presents a novel hybrid DNA encryption (HyDEn approach that uses randomized assignments of unique error-correcting DNA Hamming code words for single characters in the extended ASCII set. HyDEn relies on custom-built quaternary codes and a private key used in the randomized assignment of code words and the cyclic permutations applied on the encoded message. Along with its ability to detect and correct errors, HyDEn equals or outperforms existing cryptographic methods and represents a promising in silico DNA steganographic approach.

  20. BER EVALUATION OF LDPC CODES WITH GMSK IN NAKAGAMI FADING CHANNEL

    Directory of Open Access Journals (Sweden)

    Surbhi Sharma

    2010-06-01

    Full Text Available LDPC codes (Low Density Parity Check Codes have already proved its efficacy while showing its performance near to the Shannon limit. Channel coding schemes are spectrally inefficient as using an unfiltered binary data stream to modulate an RF carrier that will produce an RF spectrum of considerable bandwidth. Techniques have been developed to improve this bandwidth inefficiency or spectral efficiency, and ease detection. GMSK or Gaussian-filtered Minimum Shift Keying uses a Gaussian Filter of an appropriate bandwidth so as to make system spectrally efficient. A Nakagami model provides a better explanation to less and more severe conditions than the Rayleigh and Rician model and provide a better fit to the mobile communication channel data. In this paper we have demonstrated the performance of Low Density Parity Check codes with GMSK modulation (BT product=0.25 technique in Nakagami fading channel. In results it is shown that average bit error rate decreases as the ‘m’ parameter increases (Less fading.

  1. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  2. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  3. High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique

    Science.gov (United States)

    Zhao, Shengmei; Wang, Le; Liang, Wenqiang; Cheng, Weiwen; Gong, Longyan

    2015-10-01

    In this paper, we propose a high performance optical encryption (OE) scheme based on computational ghost imaging (GI) with QR code and compressive sensing (CS) technique, named QR-CGI-OE scheme. N random phase screens, generated by Alice, is a secret key and be shared with its authorized user, Bob. The information is first encoded by Alice with QR code, and the QR-coded image is then encrypted with the aid of computational ghost imaging optical system. Here, measurement results from the GI optical system's bucket detector are the encrypted information and be transmitted to Bob. With the key, Bob decrypts the encrypted information to obtain the QR-coded image with GI and CS techniques, and further recovers the information by QR decoding. The experimental and numerical simulated results show that the authorized users can recover completely the original image, whereas the eavesdroppers can not acquire any information about the image even the eavesdropping ratio (ER) is up to 60% at the given measurement times. For the proposed scheme, the number of bits sent from Alice to Bob are reduced considerably and the robustness is enhanced significantly. Meantime, the measurement times in GI system is reduced and the quality of the reconstructed QR-coded image is improved.

  4. Converter of a continuous code into the Grey code

    International Nuclear Information System (INIS)

    Gonchar, A.I.; TrUbnikov, V.R.

    1979-01-01

    Described is a converter of a continuous code into the Grey code used in a 12-charged precision amplitude-to-digital converter to decrease the digital component of spectrometer differential nonlinearity to +0.7% in the 98% range of the measured band. To construct the converter of a continuous code corresponding to the input signal amplitude into the Grey code used is the regularity in recycling of units and zeroes in each discharge of the Grey code in the case of a continuous change of the number of pulses of a continuous code. The converter is constructed on the elements of 155 series, the frequency of continuous code pulse passing at the converter input is 25 MHz

  5. The Cost of Enforcing Building Energy Codes: Phase 2

    Energy Technology Data Exchange (ETDEWEB)

    Williams, Alison [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Price, Sarah K. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Vine, Ed [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2014-10-15

    The purpose of this study is to present key findings regarding costs associated with enforcing building energy code compliance–primarily focusing on costs borne by local government. Building codes, if complied with, have the ability to save a significant amount of energy. However, energy code compliance rates have been significantly lower than 100%. Renewed interest in building energy codes has focused efforts on increasing compliance, particularly as a result of the 2009 American Recovery and Reinvestment Act (ARRA) requirement that in order for states to receive additional energy grants, they must have “a plan for the jurisdiction achieving compliance with the building energy code…in at least 90 percent of new and renovated residential and commercial building space” by 2017 (Public Law 111-5, Section 410(2)(C)). One study by the Institute for Market Transformation (IMT) estimated the costs associated with reaching 90% compliance to be $810 million, or $610 million in additional funding over existing expenditures, a non-trivial value. [Majersik & Stellberg 2010] In this context, Lawrence Berkeley National Laboratory (LBNL) conducted a study to better pinpoint the costs of enforcement through a two-phase process.

  6. Metacognition and Transfer: Keys to Improving Marketing Education

    Science.gov (United States)

    Ramocki, Stephen P.

    2007-01-01

    A primary purpose of marketing education is to prepare students to perform throughout their careers, and performance largely relies on transferability of knowledge. It has been demonstrated that training in metacognition, along with emphasis on transfer, does lead to increased probability that knowledge will be transferred into environments…

  7. EDUCATIONAL QUEST AS MEANS OF FORMING OF INFORMATION CULTURE

    Directory of Open Access Journals (Sweden)

    В И Глизбург

    2016-12-01

    Full Text Available Creative use of the potential of modern information and communication technologies for solving pedagogical, educational and training tasks is now an urgent problem of education. It is already impossible to isolate pupils from the modern means of communication (smartphones, tablets, etc.. The objective of a teacher to show how you can use the gadgets for educational purposes. Interest in their use as a source of useful information. Learn to evaluate and select information sources on various criteria: reliability, availability, adequacy and completeness of the information, response rate, etc. Theseand other skills to work with information are key in our rapidly changing world, and are part of the concept of information culture of the modern man. This article describes the use of educational technology of QR-codes to address these issues, as well as justification its effectiveness. The intellectual quest, which is the embodiment of the above ideas, combines the dynamism and kindness, interest and attentiveness, ability to work in a team and contribute to the common cause; aimed at the development of tolerance, inquisitiveness, activity, courtesy, accuracy, attention and thinking; as well as to broaden their horizons and the formation of information culture of schoolboys.

  8. A Secure Network Coding Based on Broadcast Encryption in SDN

    Directory of Open Access Journals (Sweden)

    Yue Chen

    2016-01-01

    Full Text Available By allowing intermediate nodes to encode the received packets before sending them out, network coding improves the capacity and robustness of multicast applications. But it is vulnerable to the pollution attacks. Some signature schemes were proposed to thwart such attacks, but most of them need to be homomorphic that the keys cannot be generated and managed easily. In this paper, we propose a novel fast and secure switch network coding multicast (SSNC on the software defined networks (SDN. In our scheme, the complicated secure multicast management was separated from the fast data transmission based on the SDN. Multiple multicasts will be aggregated to one multicast group according to the requirements of services and the network status. Then, the controller will route aggregated multicast group with network coding; only the trusted switch will be allowed to join the network coding by using broadcast encryption. The proposed scheme can use the traditional cryptography without homomorphy, which greatly reduces the complexity of the computation and improves the efficiency of transmission.

  9. Trade in Higher Education Services in Malaysia: Key Policy Challenges

    Science.gov (United States)

    Tham, Siew Yean

    2010-01-01

    In recent years, Malaysia has emerged as an unexpected contender in the world market for international students in higher education. Recognizing this sector as a potential new source of growth and export revenue, Malaysia aims to become a regional hub for higher education. In view of this, the objectives of this paper are to profile the pattern of…

  10. Power Control and Coding Formulation for State Estimation with Wireless Sensors

    DEFF Research Database (Denmark)

    Quevedo, Daniel; Østergaard, Jan; Ahlen, Anders

    2014-01-01

    efficient communication. In this paper, we examine the role of power control and coding for Kalman filtering over wireless correlated channels. Two estimation architectures are considered; initially, the sensors send their measurements directly to a single gateway (GW). Next, wireless relay nodes provide...... additional links. The GW decides on the coding scheme and the transmitter power levels of the wireless nodes. The decision process is carried out online and adapts to varying channel conditions to improve the tradeoff between state estimation accuracy and energy expenditure. In combination with predictive......Technological advances made wireless sensors cheap and reliable enough to be brought into industrial use. A major challenge arises from the fact that wireless channels introduce random packet dropouts. Power control and coding are key enabling technologies in wireless communications to ensure...

  11. Workplace Integration: Key Considerations for Internationally Educated Nurses and Employers

    Directory of Open Access Journals (Sweden)

    Zubeida Ramji

    2018-02-01

    Full Text Available Integration of internationally educated nurses (IENs in the workplace over the long term, has not been a clear focus in nursing. The role of the employer organization in facilitating workplace integration for IENs has also not been emphasized in research. The overall aim of this paper is to highlight findings from an instrumental qualitative case study research informed by critical social theory, which examined workplace integration of IENs. The study explored what is meant by ‘integration’ and how the employer organizational context affects workplace integration of IENs. A purposeful sample of twenty-eight participants was involved. The participants included: stakeholders from various vantage points within the case organization as well as IENs from diverse backgrounds who were beyond the process of transitioning into the Canadian workplace—they had worked in Canada for an average of eleven years. Four methods of data collection were used: semi-structured interviews; socio-demographic survey; review of documents; and focus group discussions (FGDs. Thematic analysis methods guided the within subcase analysis first, followed by an across subcase analysis. FGDs were used as a platform for member-checking to establish the credibility of study findings. The resulting definition and conceptual framework point to workplace integration of IENs as a two-way process requiring efforts on the part of the IENs as well as the employer organization. This paper elaborates on selected themes of how beyond transition, workplace integration entails IENs progressing on their leadership journey, while persevering to overcome challenges. Organizational factors such as workforce diversity, leadership commitment to equity and engagement with the broader community serve as critical enablers and the importance of workplaces striving to avoid common pitfalls in addressing the priority of IEN integration are also discussed. This paper concludes with implications and

  12. Information-Dispersion-Entropy-Based Blind Recognition of Binary BCH Codes in Soft Decision Situations

    Directory of Open Access Journals (Sweden)

    Yimeng Zhang

    2013-05-01

    Full Text Available A method of blind recognition of the coding parameters for binary Bose-Chaudhuri-Hocquenghem (BCH codes is proposed in this paper. We consider an intelligent communication receiver which can blindly recognize the coding parameters of the received data stream. The only knowledge is that the stream is encoded using binary BCH codes, while the coding parameters are unknown. The problem can be addressed on the context of the non-cooperative communications or adaptive coding and modulations (ACM for cognitive radio networks. The recognition processing includes two major procedures: code length estimation and generator polynomial reconstruction. A hard decision method has been proposed in a previous literature. In this paper we propose the recognition approach in soft decision situations with Binary-Phase-Shift-Key modulations and Additive-White-Gaussian-Noise (AWGN channels. The code length is estimated by maximizing the root information dispersion entropy function. And then we search for the code roots to reconstruct the primitive and generator polynomials. By utilizing the soft output of the channel, the recognition performance is improved and the simulations show the efficiency of the proposed algorithm.

  13. Code-Switching in Persian-English and Telugu-English Conversations: With a Focus on Light Verb Constructions

    Science.gov (United States)

    Moradi, Hamzeh

    2014-01-01

    Depending on the demands of a particular communicative situation, bilingual or multilingual speakers ("bilingualism-multilingualism") will switch between language varieties. Code-switching is the practice of moving between variations of languages in different contexts. In an educational context, code-switching is defined as the practice…

  14. Key Emerging Technologies for Elementary and Secondary Education

    Science.gov (United States)

    Johnson, Laurence F.; Levine, Alan; Smith, Rachel S.; Haywood, Keene

    2010-01-01

    The Horizon Report series is the most visible outcome of the New Media Consortium's Horizon Project, an ongoing research effort that identifies and describes emerging technologies likely to have a large impact on teaching, learning, research, or creative expression within education around the globe. The report examines emerging technologies for…

  15. Key Institutions in Business and Management Education Research

    Science.gov (United States)

    Fornaciari, Charles J.; Arbaugh, J. B.; Asarta, Carlos J.; Bento, Regina F.; Hwang, Alvin; Lund Dean, Kathy

    2017-01-01

    The authors investigate institutional productivity in business and management education (BME) research based on the analysis of 4,464 articles published by 7,210 authors across 17 BME journals over a 10-year period, involving approximately 1,900 schools worldwide. Departing from traditional disciplinary silos, they examine the BME research field…

  16. Proposing a Web-Based Tutorial System to Teach Malay Language Braille Code to the Sighted

    Science.gov (United States)

    Wah, Lee Lay; Keong, Foo Kok

    2010-01-01

    The "e-KodBrailleBM Tutorial System" is a web-based tutorial system which is specially designed to teach, facilitate and support the learning of Malay Language Braille Code to individuals who are sighted. The targeted group includes special education teachers, pre-service teachers, and parents. Learning Braille code involves memorisation…

  17. Relation of knowledge and level of education to the rationality of self-medication on childhood diarrhea on the Code River banks in Jogoyudan, Jetis, Yogyakarta

    Science.gov (United States)

    Dania, H.; Ihsan, M. N.

    2017-11-01

    Self-medication as an alternative is used to reduce the severity of diarrhea. Optimal treatment can be done by increasing the rationalization of self-medication on diarrhea. This can be achieved with good knowledge about self-medication, which is in turn influenced by level of education. The aim of this study was to determine the relationship of knowledge and education level to rationality of self-medication on childhood diarrhea around the Code River in Jogoyudan, Jetis, Yogyakarta. The study was conducted by cross-sectional analytical observational design. The subjects were mothers who had children aged 2-11 years who had experienced diarrhea and had self-medication. Questionnaires were used to assess the rationality of self-medication on children's diarrhea by the parents. The respondents were askeds to fill out about indications, right drugs, doses, time intervals and periods of drug administration. Data were analyzed using chi- square. It was showed that of 40 respondents, 14 respondents (35%) performed rational self-medication on children's diarrhea and 26 respondents (65%). did not rationalize the treatment. The results of a bivariate test obtained a chi-square value of 9.808 (> 3.841) and a p value of 0.002 ( 3.841) and a p value of 0.000 (<0.05) on relationship between knowledge and rationality of self- medication. The conclusion of this study is that there is a correlation between knowledge and level of education and rationality of self-medication on childhood diarrhea on the Code River banks in Jogoyudan, Jetis, Yogyakarta.

  18. The Earth Science Education Unit's Professional Development Workshop on "The Carbon Question--Cycling, Releasing, Capturing" for Teachers of Key Stages 3 and 4

    Science.gov (United States)

    King, Chris

    2014-01-01

    The revised National Curriculum for Science for key stages 3 and 4 (ages 11-16) in England provides the opportunity to develop a new coherent approach to teaching about the carbon cycle, the use of carbon as a fuel and the resulting issues. The Earth Science Education Unit (ESEU) intends to develop a new workshop to support the teaching of this…

  19. Educator Talk Ratio as a Quality Indicator in Group-Based Patient Education

    Science.gov (United States)

    Stenov, Vibeke; Henriksen, Jan Erik; Folker, Anna P.; Skinner, Timothy C.; Willaing, Ingrid

    2016-01-01

    Objective: The purpose of this study was to investigate participants' experiences of and satisfaction with the content and outcome of 13 different sessions of a 4-day diabetes education programme and to compare participants' experiences with the extent of educator talk in the sessions. A 10-second event coding was used to evaluate educators'…

  20. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  1. Entanglement-assisted quantum MDS codes constructed from negacyclic codes

    Science.gov (United States)

    Chen, Jianzhang; Huang, Yuanyuan; Feng, Chunhui; Chen, Riqing

    2017-12-01

    Recently, entanglement-assisted quantum codes have been constructed from cyclic codes by some scholars. However, how to determine the number of shared pairs required to construct entanglement-assisted quantum codes is not an easy work. In this paper, we propose a decomposition of the defining set of negacyclic codes. Based on this method, four families of entanglement-assisted quantum codes constructed in this paper satisfy the entanglement-assisted quantum Singleton bound, where the minimum distance satisfies q+1 ≤ d≤ n+2/2. Furthermore, we construct two families of entanglement-assisted quantum codes with maximal entanglement.

  2. Education Studies: Issues & Critical Perspectives

    Science.gov (United States)

    Kassem, Derek; Mufti, Emmanuel; Robinson, John

    2006-01-01

    This major text for Education Studies students provides a critical account of key issues in education today. The text features: (1) A critical analysis of key issues in Education Studies to encourage students' thinking about education in the broadest terms; (2) Themed sections with introductions to link the issues discussed in each chapter; (3)…

  3. Organizational Codes of Ethics: Why So Difficult to Enforce?

    Science.gov (United States)

    Jinks, Michael; Bowman, James

    2008-01-01

    Many professional organizations exist within the broad field of education. Membership in these organizations is not particularly selective, with qualifications being tied primarily to job status and title; as such, membership is often taken for granted. Yet members and the general public expect these organizations to have formally adopted codes of…

  4. Random Linear Network Coding is Key to Data Survival in Highly Dynamic Distributed Storage

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Fitzek, Frank; Roetter, Daniel Enrique Lucani

    2015-01-01

    Distributed storage solutions have become widespread due to their ability to store large amounts of data reliably across a network of unreliable nodes, by employing repair mechanisms to prevent data loss. Conventional systems rely on static designs with a central control entity to oversee...... and control the repair process. Given the large costs for maintaining and cooling large data centers, our work proposes and studies the feasibility of a fully decentralized systems that can store data even on unreliable and, sometimes, unavailable mobile devices. This imposes new challenges on the design...... as the number of available nodes varies greatly over time and keeping track of the system's state becomes unfeasible. As a consequence, conventional erasure correction approaches are ill-suited for maintaining data integrity. In this highly dynamic context, random linear network coding (RLNC) provides...

  5. Error-correction coding

    Science.gov (United States)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  6. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  7. An object-oriented framework for magnetic-fusion modeling and analysis codes

    International Nuclear Information System (INIS)

    Cohen, R H; Yang, T Y Brian.

    1999-01-01

    The magnetic-fusion energy (MFE) program, like many other scientific and engineering activities, has a need to efficiently develop complex modeling codes which combine detailed models of components to make an integrated model of a device, as well as a rich supply of legacy code that could provide the component models. There is also growing recognition in many technical fields of the desirability of steerable software: computer programs whose functionality can be changed by the user as it is run. This project had as its goals the development of two key pieces of infrastructure that are needed to combine existing code modules, written mainly in Fortran, into flexible, steerable, object-oriented integrated modeling codes for magnetic- fusion applications. These two pieces are (1) a set of tools to facilitate the interfacing of Fortran code with a steerable object-oriented framework (which we have chosen to be based on PythonlW3, an object-oriented interpreted language), and (2) a skeleton for the integrated modeling code which defines the relationships between the modules. The first of these activities obviously has immediate applicability to a spectrum of projects; the second is more focussed on the MFE application, but may be of value as an example for other applications

  8. Opacity calculations for extreme physical systems: code RACHEL

    Science.gov (United States)

    Drska, Ladislav; Sinor, Milan

    1996-08-01

    Computer simulations of physical systems under extreme conditions (high density, temperature, etc.) require the availability of extensive sets of atomic data. This paper presents basic information on a self-consistent approach to calculations of radiative opacity, one of the key characteristics of such systems. After a short explanation of general concepts of the atomic physics of extreme systems, the structure of the opacity code RACHEL is discussed and some of its applications are presented.

  9. Learning Outcomes as a Key Concept in Policy Documents throughout Policy Changes

    Science.gov (United States)

    Prøitz, Tine Sophie

    2015-01-01

    Learning outcomes can be considered to be a key concept in a changing education policy landscape, enhancing aspects such as benchmarking and competition. Issues relating to concepts of performance have a long history of debate within the field of education. Today, the concept of learning outcomes has become central in education policy development,…

  10. Challenges for nursing education in Angola: the perception of nurse leaders affiliated with professional education institutions.

    Science.gov (United States)

    Marchi-Alves, Leila Maria; Ventura, Carla A Arena; Trevizan, Maria Auxiliadora; Mazzo, Alessandra; de Godoy, Simone; Mendes, Isabel Amélia Costa

    2013-07-17

    Angola is one of the African countries with the highest morbidity and mortality rates and a devastating lack of human resources for health, including nursing. The World Health Organization stimulates and takes technical cooperation initiatives for human resource education and training in health and education, with a view to the development of countries in the region. The aim in this study was to identify how nurses affiliated with nursing education institutions perceive the challenges nursing education is facing in Angola. After consulting the National Directory of Human Resources in Angola, the nurse leaders affiliated with professional nursing education institutions in Angola were invited to participate in the study by email. Data were collected in February 2009 through the focus group technique. The group of participants was focused on the central question: what are the challenges faced for nursing education in your country? To register and understand the information, besides the use of a recorder, the reporters elaborated an interpretative report. Data were coded using content analysis. Fourteen nurses participated in the meeting, most of whom were affiliated with technical nursing education institutions. It was verified that the nurse leaders at technical and higher nursing education institutions in Angola face many challenges, mainly related to the lack of infrastructure, absence of trained human resources,bureaucratic problems to regularize the schools and lack of material resources. On the opposite, the solutions they present are predominantly centered on the valuation of nursing professionals, which implies cultural and attitude changes. Public health education policies need to be established in Angola, including action guidelines that permit effective nursing activities. Professional education institutions need further regularizations and nurses need to be acknowledged as key elements for the qualitative enhancement of health services in the country.

  11. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    Today, both turbo codes and low-density parity-check codes are largely superior to other code families and are being used in an increasing number of modern communication systems including 3G standards, satellite and deep space communications. However, the two codes have certain distinctive characteristics that ...

  12. Developing CALL for Heritage Languages: "The 7 Keys of the Dragon"

    Science.gov (United States)

    Revithiadou, Anthi; Kourtis-Kazoullis, Vasilia; Soukalopoulou, Maria; Konstantoudakis, Konstantinos; Zarras, Christos

    2015-01-01

    In this article we present an interactive extensible software, "The 7 Keys of the Dragon," for the teaching/learning of Albanian and Russian to students that attend primary and secondary education in Greece with the respective languages as their heritage languages. We address the key challenges we encountered during the conceptualization…

  13. Design and Analysis of LT Codes with Decreasing Ripple Size

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Popovski, Petar; Østergaard, Jan

    2012-01-01

    In this paper we propose a new design of LT codes, which decreases the amount of necessary overhead in comparison to existing designs. The design focuses on a parameter of the LT decoding process called the ripple size. This parameter was also a key element in the design proposed in the original...... work by Luby. Specifically, Luby argued that an LT code should provide a constant ripple size during decoding. In this work we show that the ripple size should decrease during decoding, in order to reduce the necessary overhead. Initially we motivate this claim by analytical results related...... to the redundancy within an LT code. We then propose a new design procedure, which can provide any desired achievable decreasing ripple size. The new design procedure is evaluated and compared to the current state of the art through simulations. This reveals a significant increase in performance with respect...

  14. TASS code topical report. V.1 TASS code technical manual

    International Nuclear Information System (INIS)

    Sim, Suk K.; Chang, W. P.; Kim, K. D.; Kim, H. C.; Yoon, H. Y.

    1997-02-01

    TASS 1.0 code has been developed at KAERI for the initial and reload non-LOCA safety analysis for the operating PWRs as well as the PWRs under construction in Korea. TASS code will replace various vendor's non-LOCA safety analysis codes currently used for the Westinghouse and ABB-CE type PWRs in Korea. This can be achieved through TASS code input modifications specific to each reactor type. The TASS code can be run interactively through the keyboard operation. A simimodular configuration used in developing the TASS code enables the user easily implement new models. TASS code has been programmed using FORTRAN77 which makes it easy to install and port for different computer environments. The TASS code can be utilized for the steady state simulation as well as the non-LOCA transient simulations such as power excursions, reactor coolant pump trips, load rejections, loss of feedwater, steam line breaks, steam generator tube ruptures, rod withdrawal and drop, and anticipated transients without scram (ATWS). The malfunctions of the control systems, components, operator actions and the transients caused by the malfunctions can be easily simulated using the TASS code. This technical report describes the TASS 1.0 code models including reactor thermal hydraulic, reactor core and control models. This TASS code models including reactor thermal hydraulic, reactor core and control models. This TASS code technical manual has been prepared as a part of the TASS code manual which includes TASS code user's manual and TASS code validation report, and will be submitted to the regulatory body as a TASS code topical report for a licensing non-LOCA safety analysis for the Westinghouse and ABB-CE type PWRs operating and under construction in Korea. (author). 42 refs., 29 tabs., 32 figs

  15. Media Management Education: Key Themes, Pedagogies, and Challenges

    Science.gov (United States)

    Förster, Kati; Rohn, Ulrike

    2015-01-01

    The media sphere has changed significantly as a result of globalization, technology, and new habits of media use. Scholars in journalism and mass communication thus call on a transformation and reinvention of higher education in the field. The purpose of this article is to investigate how media management is taught across different institutions,…

  16. On the implementation of a deterministic secure coding protocol using polarization entangled photons

    OpenAIRE

    Ostermeyer, Martin; Walenta, Nino

    2007-01-01

    We demonstrate a prototype-implementation of deterministic information encoding for quantum key distribution (QKD) following the ping-pong coding protocol [K. Bostroem, T. Felbinger, Phys. Rev. Lett. 89 (2002) 187902-1]. Due to the deterministic nature of this protocol the need for post-processing the key is distinctly reduced compared to non-deterministic protocols. In the course of our implementation we analyze the practicability of the protocol and discuss some security aspects of informat...

  17. Phonological, visual, and semantic coding strategies and children's short-term picture memory span.

    Science.gov (United States)

    Henry, Lucy A; Messer, David; Luger-Klein, Scarlett; Crane, Laura

    2012-01-01

    Three experiments addressed controversies in the previous literature on the development of phonological and other forms of short-term memory coding in children, using assessments of picture memory span that ruled out potentially confounding effects of verbal input and output. Picture materials were varied in terms of phonological similarity, visual similarity, semantic similarity, and word length. Older children (6/8-year-olds), but not younger children (4/5-year-olds), demonstrated robust and consistent phonological similarity and word length effects, indicating that they were using phonological coding strategies. This confirmed findings initially reported by Conrad (1971), but subsequently questioned by other authors. However, in contrast to some previous research, little evidence was found for a distinct visual coding stage at 4 years, casting doubt on assumptions that this is a developmental stage that consistently precedes phonological coding. There was some evidence for a dual visual and phonological coding stage prior to exclusive use of phonological coding at around 5-6 years. Evidence for semantic similarity effects was limited, suggesting that semantic coding is not a key method by which young children recall lists of pictures.

  18. Mechatronics Engineers’ Perception of Code Mixing: Philadelphia University and Hashemite University as a Case Study

    Directory of Open Access Journals (Sweden)

    Mustafa Al-Khawaldeh

    2016-11-01

    Full Text Available It has recently been widely recognized that code-switching is prevalent in Jordanians' daily conversation in various situations such as home, cafés, universities, restaurants and clubs. Abalhassan and Alshalawi (2000: 183 made a very related observation on code switching behavior among Arab speakers of English that “without exception, all respondents switched into English to some degree”. This could be referred to the increase number of technological advances and people travelling across countries for pleasure or for pursuing further education. In light of this observation, the crucial role of language in people's life, ambivalent attitudes towards code-switching (Akbar, 2007, the dearth of research in this area, such a present study is required to explore Jordanian university students’ and instructors’ perceptions of code-switching in their daily classroom conversation and its expected impact on their language proficiency. In particular, it investigates the factors leading them to code mix and their underlying attitudes towards its expected future impact on their language proficiency. To the best knowledge of the present researcher, this study is the first of its kind in Jordan. Data was collected via semi-structured interviews and a questionnaire from 70 university students and 30 instructors from both Philadelphia University and the Hashemite University. Data revealed that code mixing between English and Arabic is a common phenomenon in lectures they have attended in their academic institutions. The participants also show that they find code mixing fascinating and believe that though code switching might have a positive impact on their learning as it helps them better understand the topic. The instructors revealed that code mixing fulfill a set of functions that serve the educational process.

  19. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  20. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    OpenAIRE

    Gao, Yuan; Liu, Pengyu; Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content ...

  1. Benchmark calculation for GT-MHR using HELIOS/MASTER code package and MCNP

    International Nuclear Information System (INIS)

    Lee, Kyung Hoon; Kim, Kang Seog; Noh, Jae Man; Song, Jae Seung; Zee, Sung Quun

    2005-01-01

    The latest research associated with the very high temperature gas-cooled reactor (VHTR) is focused on the verification of a system performance and safety under operating conditions for the VHTRs. As a part of those, an international gas-cooled reactor program initiated by IAEA is going on. The key objectives of this program are the validation of analytical computer codes and the evaluation of benchmark models for the projected and actual VHTRs. New reactor physics analysis procedure for the prismatic VHTR is under development by adopting the conventional two-step procedure. In this procedure, a few group constants are generated through the transport lattice calculations using the HELIOS code, and the core physics analysis is performed by the 3-dimensional nodal diffusion code MASTER. We evaluated the performance of the HELIOS/MASTER code package through the benchmark calculations related to the GT-MHR (Gas Turbine-Modular Helium Reactor) to dispose weapon plutonium. In parallel, MCNP is employed as a reference code to verify the results of the HELIOS/MASTER procedure

  2. Energy Savings Analysis of the Proposed NYStretch-Energy Code 2018

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Bing [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Zhang, Jian [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Chen, Yan [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Edelson, Jim [New Buildings Inst. (NBI), Portland, OR (United States); Lyles, Mark [New Buildings Inst. (NBI), Portland, OR (United States)

    2018-01-20

    This study was conducted by the Pacific Northwest National Laboratory (PNNL) in support of the stretch energy code development led by the New York State Energy Research and Development Authority (NYSERDA). In 2017 NYSERDA developed its 2016 Stretch Code Supplement to the 2016 New York State Energy Conservation Construction Code (hereinafter referred to as “NYStretch-Energy”). NYStretch-Energy is intended as a model energy code for statewide voluntary adoption that anticipates other code advancements culminating in the goal of a statewide Net Zero Energy Code by 2028. Since then, NYSERDA continues to develop the NYStretch-Energy Code 2018 edition. To support the effort, PNNL conducted energy simulation analysis to quantify the energy savings of proposed commercial provisions of the NYStretch-Energy Code (2018) in New York. The focus of this project is the 20% improvement over existing commercial model energy codes. A key requirement of the proposed stretch code is that it be ‘adoptable’ as an energy code, meaning that it must align with current code scope and limitations, and primarily impact building components that are currently regulated by local building departments. It is largely limited to prescriptive measures, which are what most building departments and design projects are most familiar with. This report describes a set of energy-efficiency measures (EEMs) that demonstrate 20% energy savings over ANSI/ASHRAE/IES Standard 90.1-2013 (ASHRAE 2013) across a broad range of commercial building types and all three climate zones in New York. In collaboration with New Building Institute, the EEMs were developed from national model codes and standards, high-performance building codes and standards, regional energy codes, and measures being proposed as part of the on-going code development process. PNNL analyzed these measures using whole building energy models for selected prototype commercial buildings and multifamily buildings representing buildings in New

  3. Key populations and human rights in the context of HIV services rendition in Ghana.

    Science.gov (United States)

    Laar, Amos; DeBruin, Debra

    2017-08-02

    In line with its half century old penal code, Ghana currently criminalizes and penalizes behaviors of some key populations - populations deemed to be at higher risk of acquiring or transmitting Human Immunodeficiency Virus (HIV). Men who have sex with men (MSM), and sex workers (SWs) fit into this categorization. This paper provides an analysis of how enactment and implementation of rights-limiting laws not only limit rights, but also amplify risk and vulnerability to HIV in key and general populations. The paper derives from a project that assessed the ethics sensitivity of key documents guiding Ghana's response to its HIV epidemic. Assessment was guided by leading frameworks from public health ethics, and relevant articles from the international bill of rights. Ghana's response to her HIV epidemic does not adequately address the rights and needs of key populations. Even though the national response has achieved some public health successes, palpable efforts to address rights issues remain nascent. Ghana's guiding documents for HIV response include no advocacy for decriminalization, depenalization or harm reduction approaches for these key populations. The impact of rights-restricting codes on the nation's HIV epidemic is real: criminalization impedes key populations' access to HIV prevention and treatment services. Given that they are bridging populations, whatever affects the Ghanaian key populations directly, affects the general population indirectly. The right to the highest attainable standard of health, without qualification, is generally acknowledged as a fundamental human right. Unfortunately, this right currently eludes the Ghanaian SW and MSM. The paper endorses decriminalization as a means of promoting this right. In the face of opposition to decriminalization, the paper proposes specific harm reduction strategies as approaches to promote health and uplift the diminished rights of key populations. Thus the authors call on Ghana to remove impediments to

  4. Modeling RIA scenarios with the FRAPTRAN and SCANAIR codes

    International Nuclear Information System (INIS)

    Sagrado Garcia, I. C.; Vallejo, I.; Herranz, L. E.

    2013-01-01

    The need of defining new RIA safety criteria has pointed out the importance of performing a rigorous assessment of the transient codes capabilities. The present work is a comparative exercise devoted to identify the origin of the key deviations found between the predictions of FRAPTRAN-1.4 and SCANAIR-7.1. To do so, the calculations submitted by CIEMAT to the OECD/NEA RIA benchmark have been exploited. This work shows that deviations in clad temperatures mainly come from the treatment of the oxide layer. The systematically higher deformations calculated by FRAPTRAN-1.4 in early failed tests are caused by the different gap closure estimation. Besides, the dissimilarities observed in the FGR predictions are inherent to the different modeling strategies adopted in each code.

  5. Modeling RIA scenarios with the FRAPTRAN and SCANAIR codes

    Energy Technology Data Exchange (ETDEWEB)

    Sagrado Garcia, I. C.; Vallejo, I.; Herranz, L. E.

    2013-07-01

    The need of defining new RIA safety criteria has pointed out the importance of performing a rigorous assessment of the transient codes capabilities. The present work is a comparative exercise devoted to identify the origin of the key deviations found between the predictions of FRAPTRAN-1.4 and SCANAIR-7.1. To do so, the calculations submitted by CIEMAT to the OECD/NEA RIA benchmark have been exploited. This work shows that deviations in clad temperatures mainly come from the treatment of the oxide layer. The systematically higher deformations calculated by FRAPTRAN-1.4 in early failed tests are caused by the different gap closure estimation. Besides, the dissimilarities observed in the FGR predictions are inherent to the different modeling strategies adopted in each code.

  6. Codes Over Hyperfields

    Directory of Open Access Journals (Sweden)

    Atamewoue Surdive

    2017-12-01

    Full Text Available In this paper, we define linear codes and cyclic codes over a finite Krasner hyperfield and we characterize these codes by their generator matrices and parity check matrices. We also demonstrate that codes over finite Krasner hyperfields are more interesting for code theory than codes over classical finite fields.

  7. Amino acid codes in mitochondria as possible clues to primitive codes

    Science.gov (United States)

    Jukes, T. H.

    1981-01-01

    Differences between mitochondrial codes and the universal code indicate that an evolutionary simplification has taken place, rather than a return to a more primitive code. However, these differences make it evident that the universal code is not the only code possible, and therefore earlier codes may have differed markedly from the previous code. The present universal code is probably a 'frozen accident.' The change in CUN codons from leucine to threonine (Neurospora vs. yeast mitochondria) indicates that neutral or near-neutral changes occurred in the corresponding proteins when this code change took place, caused presumably by a mutation in a tRNA gene.

  8. The Effects of Educational Tools in Reducing Code-Switching in Child Simultaneous Bilingual Education

    Science.gov (United States)

    Jalilian, Sahar; Rahmatian, Rouhollah; Safa, Parivash; Letafati, Roya

    2016-01-01

    Simultaneous bilingual education of a child is a dynamic process. Construction of linguistic competences undeniably depends on the conditions of the linguistic environment of the child. This education in a monolingual family, requires the practice of parenting tactics to increase the frequency of the language use in minority, during which,…

  9. Construction and Iterative Decoding of LDPC Codes Over Rings for Phase-Noisy Channels

    Directory of Open Access Journals (Sweden)

    Karuppasami Sridhar

    2008-01-01

    Full Text Available Abstract This paper presents the construction and iterative decoding of low-density parity-check (LDPC codes for channels affected by phase noise. The LDPC code is based on integer rings and designed to converge under phase-noisy channels. We assume that phase variations are small over short blocks of adjacent symbols. A part of the constructed code is inherently built with this knowledge and hence able to withstand a phase rotation of radians, where " " is the number of phase symmetries in the signal set, that occur at different observation intervals. Another part of the code estimates the phase ambiguity present in every observation interval. The code makes use of simple blind or turbo phase estimators to provide phase estimates over every observation interval. We propose an iterative decoding schedule to apply the sum-product algorithm (SPA on the factor graph of the code for its convergence. To illustrate the new method, we present the performance results of an LDPC code constructed over with quadrature phase shift keying (QPSK modulated signals transmitted over a static channel, but affected by phase noise, which is modeled by the Wiener (random-walk process. The results show that the code can withstand phase noise of standard deviation per symbol with small loss.

  10. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  11. Knowledge and Performance about Nursing Ethic Codes from Nurses' and Patients' Perspective in Tabriz Teaching Hospitals, Iran.

    Science.gov (United States)

    Mohajjel-Aghdam, Alireza; Hassankhani, Hadi; Zamanzadeh, Vahid; Khameneh, Saied; Moghaddam, Sara

    2013-09-01

    Nursing profession requires knowledge of ethics to guide performance. The nature of this profession necessitates ethical care more than routine care. Today, worldwide definition of professional ethic code has been done based on human and ethical issues in the communication between nurse and patient. To improve all dimensions of nursing, we need to respect ethic codes. The aim of this study is to assess knowledge and performance about nursing ethic codes from nurses' and patients' perspective. A descriptive study Conducted upon 345 nurses and 500 inpatients in six teaching hospitals of Tabriz, 2012. To investigate nurses' knowledge and performance, data were collected by using structured questionnaires. Statistical analysis was done using descriptive and analytic statistics, independent t-test and ANOVA and Pearson correlation coefficient, in SPSS13. Most of the nurses were female, married, educated at BS degree and 86.4% of them were aware of Ethic codes also 91.9% of nurses and 41.8% of patients represented nurses respect ethic codes. Nurses' and patients' perspective about ethic codes differed significantly. Significant relationship was found between nurses' knowledge of ethic codes and job satisfaction and complaint of ethical performance. According to the results, consideration to teaching ethic codes in nursing curriculum for student and continuous education for staff is proposed, on the other hand recognizing failures of the health system, optimizing nursing care, attempt to inform patients about Nursing ethic codes, promote patient rights and achieve patient satisfaction can minimize the differences between the two perspectives.

  12. Key Issues in the Application of Knowledge Management in Education

    National Research Council Canada - National Science Library

    Mendoza, George A

    2005-01-01

    .... This shift in paradigms has made knowledge the key resource as organizations shift their focus from natural resources to intellectual assets, heralding the use of a concept called Knowledge Management (KM...

  13. Analysis of quantum error-correcting codes: Symplectic lattice codes and toric codes

    Science.gov (United States)

    Harrington, James William

    Quantum information theory is concerned with identifying how quantum mechanical resources (such as entangled quantum states) can be utilized for a number of information processing tasks, including data storage, computation, communication, and cryptography. Efficient quantum algorithms and protocols have been developed for performing some tasks (e.g. , factoring large numbers, securely communicating over a public channel, and simulating quantum mechanical systems) that appear to be very difficult with just classical resources. In addition to identifying the separation between classical and quantum computational power, much of the theoretical focus in this field over the last decade has been concerned with finding novel ways of encoding quantum information that are robust against errors, which is an important step toward building practical quantum information processing devices. In this thesis I present some results on the quantum error-correcting properties of oscillator codes (also described as symplectic lattice codes) and toric codes. Any harmonic oscillator system (such as a mode of light) can be encoded with quantum information via symplectic lattice codes that are robust against shifts in the system's continuous quantum variables. I show the existence of lattice codes whose achievable rates match the one-shot coherent information over the Gaussian quantum channel. Also, I construct a family of symplectic self-dual lattices and search for optimal encodings of quantum information distributed between several oscillators. Toric codes provide encodings of quantum information into two-dimensional spin lattices that are robust against local clusters of errors and which require only local quantum operations for error correction. Numerical simulations of this system under various error models provide a calculation of the accuracy threshold for quantum memory using toric codes, which can be related to phase transitions in certain condensed matter models. I also present

  14. Informing the educators: one of the keys to public acceptance

    International Nuclear Information System (INIS)

    Mattox, G.C.; Reynolds, A.B.; Brenizer, J.S.

    1986-01-01

    One of the most difficult barriers to overcome in the task of gaining greater public acceptance of nuclear power is the widespread lack of correct information about the true risks and benefits of nuclear energy. The news media are the most prevalent sources of information for the public but they are highly constrained by the limits of space, time, and reader/viewer interest span in being able to cover this complex subject with any degree of completeness, much less with any degree of accuracy. Another source of information for the general public is the educational system, and while it also has its limitations, they are somewhat different from those faced by the media, and the educational system is generally considered to be a more credible information source than the media. This paper report on three programs undertaken in 1985 and 1986 by the Virginia Section of the American Nuclear Society (ANS) in conjunction with the University of Virginia (UVA), the Virginia State Department of Education, and various nuclear industry participants. Each program had its unique features, successes, an failures. All-in-all, these programs have been reported as being quite successful in helping to reach the public through informing the educators

  15. Some aspects of grading Java code submissions in MOOCs

    Directory of Open Access Journals (Sweden)

    Sándor Király

    2017-07-01

    Full Text Available Recently, massive open online courses (MOOCs have been offering a new online approach in the field of distance learning and online education. A typical MOOC course consists of video lectures, reading material and easily accessible tests for students. For a computer programming course, it is important to provide interactive, dynamic, online coding exercises and more complex programming assignments for learners. It is expedient for the students to receive prompt feedback on their coding submissions. Although MOOC automated programme evaluation subsystem is capable of assessing source programme files that are in learning management systems, in MOOC systems there is a grader that is responsible for evaluating students’ assignments with the result that course staff would be required to assess thousands of programmes submitted by the participants of the course without the benefit of an automatic grader. This paper presents a new concept for grading programming submissions of students and improved techniques based on the Java unit testing framework that enables automatic grading of code chunks. Some examples are also given such as the creation of unique exercises by dynamically generating the parameters of the assignment in a MOOC programming course combined with the kind of coding style recognition to teach coding standards.

  16. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  17. QR code-based non-linear image encryption using Shearlet transform and spiral phase transform

    Science.gov (United States)

    Kumar, Ravi; Bhaduri, Basanta; Hennelly, Bryan

    2018-02-01

    In this paper, we propose a new quick response (QR) code-based non-linear technique for image encryption using Shearlet transform (ST) and spiral phase transform. The input image is first converted into a QR code and then scrambled using the Arnold transform. The scrambled image is then decomposed into five coefficients using the ST and the first Shearlet coefficient, C1 is interchanged with a security key before performing the inverse ST. The output after inverse ST is then modulated with a random phase mask and further spiral phase transformed to get the final encrypted image. The first coefficient, C1 is used as a private key for decryption. The sensitivity of the security keys is analysed in terms of correlation coefficient and peak signal-to noise ratio. The robustness of the scheme is also checked against various attacks such as noise, occlusion and special attacks. Numerical simulation results are shown in support of the proposed technique and an optoelectronic set-up for encryption is also proposed.

  18. ISPOR Code of Ethics 2017 (4th Edition).

    Science.gov (United States)

    Santos, Jessica; Palumbo, Francis; Molsen-David, Elizabeth; Willke, Richard J; Binder, Louise; Drummond, Michael; Ho, Anita; Marder, William D; Parmenter, Louise; Sandhu, Gurmit; Shafie, Asrul A; Thompson, David

    2017-12-01

    As the leading health economics and outcomes research (HEOR) professional society, ISPOR has a responsibility to establish a uniform, harmonized international code for ethical conduct. ISPOR has updated its 2008 Code of Ethics to reflect the current research environment. This code addresses what is acceptable and unacceptable in research, from inception to the dissemination of its results. There are nine chapters: 1 - Introduction; 2 - Ethical Principles respect, beneficence and justice with reference to a non-exhaustive compilation of international, regional, and country-specific guidelines and standards; 3 - Scope HEOR definitions and how HEOR and the Code relate to other research fields; 4 - Research Design Considerations primary and secondary data related issues, e.g., participant recruitment, population and research setting, sample size/site selection, incentive/honorarium, administration databases, registration of retrospective observational studies and modeling studies; 5 - Data Considerations privacy and data protection, combining, verification and transparency of research data, scientific misconduct, etc.; 6 - Sponsorship and Relationships with Others (roles of researchers, sponsors, key opinion leaders and advisory board members, research participants and institutional review boards (IRBs) / independent ethics committees (IECs) approval and responsibilities); 7 - Patient Centricity and Patient Engagement new addition, with explanation and guidance; 8 - Publication and Dissemination; and 9 - Conclusion and Limitations. Copyright © 2017 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  19. Detecting non-coding selective pressure in coding regions

    Directory of Open Access Journals (Sweden)

    Blanchette Mathieu

    2007-02-01

    Full Text Available Abstract Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements.

  20. Dynamic Shannon Coding

    OpenAIRE

    Gagie, Travis

    2005-01-01

    We present a new algorithm for dynamic prefix-free coding, based on Shannon coding. We give a simple analysis and prove a better upper bound on the length of the encoding produced than the corresponding bound for dynamic Huffman coding. We show how our algorithm can be modified for efficient length-restricted coding, alphabetic coding and coding with unequal letter costs.

  1. The Human Rights Key: An innovative tool for teaching health and ...

    African Journals Online (AJOL)

    I propose the Human Rights Key as a useful visual communication tool to guide students in connecting their classroom learning with the reality of local, regional and international health and human rights issues. As an OER with a Creative Commons licence, the Key is available online for both educators and students to use ...

  2. The correspondence between projective codes and 2-weight codes

    NARCIS (Netherlands)

    Brouwer, A.E.; Eupen, van M.J.M.; Tilborg, van H.C.A.; Willems, F.M.J.

    1994-01-01

    The hyperplanes intersecting a 2-weight code in the same number of points obviously form the point set of a projective code. On the other hand, if we have a projective code C, then we can make a 2-weight code by taking the multiset of points E PC with multiplicity "Y(w), where W is the weight of

  3. Key successes and challenges in providing mental health care in an urban male remand prison: a qualitative study

    OpenAIRE

    Samele, Chiara; Forrester, Andrew; Urqu?a, Norman; Hopkin, Gareth

    2016-01-01

    Purpose This study aimed to describe the workings of an urban male remand prison mental health service exploring the key challenges and successes, levels of integration and collaboration with other services. Method A purposive sampling was used to recruit key prison and healthcare professionals for in-depth interviews. A thematic analysis was used to analyse transcripts based on an initial coding frame of several predefined themes. Other key themes were also identified. Results Twenty-eight i...

  4. Starting Point, Keys and Milestones of a Computer Code for the Simulation of the Behaviour of a Nuclear Fuel Rod

    Directory of Open Access Journals (Sweden)

    Armando C. Marino

    2011-01-01

    Full Text Available The BaCo code (“Barra Combustible” was developed at the Atomic Energy National Commission of Argentina (CNEA for the simulation of nuclear fuel rod behaviour under irradiation conditions. We present in this paper a brief description of the code and the strategy used for the development, improvement, enhancement, and validation of a BaCo during the last 30 years. “Extreme case analysis”, parametric (or sensitivity, probabilistic (or statistic analysis plus the analysis of the fuel performance (full core analysis are the tools developed in the structure of BaCo in order to improve the understanding of the burnup extension in the Atucha I NPP, and the design of advanced fuel elements as CARA and CAREM. The 3D additional tools of BaCo can enhance the understanding of the fuel rod behaviour, the fuel design, and the safety margins. The modular structure of the BaCo code and its detailed coupling of thermo-mechanical and irradiation-induced phenomena make it a powerful tool for the prediction of the influence of material properties on the fuel rod performance and integrity.

  5. Development of Evaluation Code for MUF Uncertainty

    International Nuclear Information System (INIS)

    Won, Byung Hee; Han, Bo Young; Shin, Hee Sung; Ahn, Seong-Kyu; Park, Geun-Il; Park, Se Hwan

    2015-01-01

    Material Unaccounted For (MUF) is the material balance evaluated by measured nuclear material in a Material Balance Area (MBA). Assuming perfect measurements and no diversion from a facility, one can expect a zero MUF. However, non-zero MUF is always occurred because of measurement uncertainty even though the facility is under normal operation condition. Furthermore, there are many measurements using different equipment at various Key Measurement Points (KMPs), and the MUF uncertainty is affected by errors of those measurements. Evaluating MUF uncertainty is essentially required to develop safeguards system including nuclear measurement system in pyroprocessing, which is being developed for reducing radioactive waste from spent fuel in Korea Atomic Energy Research Institute (KAERI). The evaluation code for analyzing MUF uncertainty has been developed and it was verified using sample problem from the IAEA reference. MUF uncertainty can be simply and quickly calculated by using this evaluation code which is made based on graphical user interface for user friendly. It is also expected that the code will make the sensitivity analysis on the MUF uncertainty for the various safeguards systems easy and more systematic. It is suitable for users who want to evaluate the conventional safeguards system as well as to develop a new system for developing facilities

  6. Development of Evaluation Code for MUF Uncertainty

    Energy Technology Data Exchange (ETDEWEB)

    Won, Byung Hee; Han, Bo Young; Shin, Hee Sung; Ahn, Seong-Kyu; Park, Geun-Il; Park, Se Hwan [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2015-05-15

    Material Unaccounted For (MUF) is the material balance evaluated by measured nuclear material in a Material Balance Area (MBA). Assuming perfect measurements and no diversion from a facility, one can expect a zero MUF. However, non-zero MUF is always occurred because of measurement uncertainty even though the facility is under normal operation condition. Furthermore, there are many measurements using different equipment at various Key Measurement Points (KMPs), and the MUF uncertainty is affected by errors of those measurements. Evaluating MUF uncertainty is essentially required to develop safeguards system including nuclear measurement system in pyroprocessing, which is being developed for reducing radioactive waste from spent fuel in Korea Atomic Energy Research Institute (KAERI). The evaluation code for analyzing MUF uncertainty has been developed and it was verified using sample problem from the IAEA reference. MUF uncertainty can be simply and quickly calculated by using this evaluation code which is made based on graphical user interface for user friendly. It is also expected that the code will make the sensitivity analysis on the MUF uncertainty for the various safeguards systems easy and more systematic. It is suitable for users who want to evaluate the conventional safeguards system as well as to develop a new system for developing facilities.

  7. Improving 3D-Turbo Code's BER Performance with a BICM System over Rayleigh Fading Channel

    Directory of Open Access Journals (Sweden)

    R. Yao

    2016-12-01

    Full Text Available Classical Turbo code suffers from high error floor due to its small Minimum Hamming Distance (MHD. Newly-proposed 3D-Turbo code can effectively increase the MHD and achieve a lower error floor by adding a rate-1 post encoder. In 3D-Turbo codes, part of the parity bits from the classical Turbo encoder are further encoded through the post encoder. In this paper, a novel Bit-Interleaved Coded Modulation (BICM system is proposed by combining rotated mapping Quadrature Amplitude Modulation (QAM and 3D-Turbo code to improve the Bit Error Rate (BER performance of 3D-Turbo code over Raleigh fading channel. A key-bit protection scheme and a Two-Dimension (2D iterative soft demodulating-decoding algorithm are developed for the proposed BICM system. Simulation results show that the proposed system can obtain about 0.8-1.0 dB gain at BER of 10^{-6}, compared with the existing BICM system with Gray mapping QAM.

  8. ANALYSIS OF FOREIGN EXPERIENCE OF INTRODUCTION OF THE SCHOOL DRESS CODE

    Directory of Open Access Journals (Sweden)

    O, I, Denisova

    2016-01-01

    Full Text Available The aim of this article is to analyze the international discourse on policy issues of school dress code; to identify problems relevant to the national system of education, and proposed ways of their solution.Methods. The methods involve summarizing of the content of the leading internationalsources regarding issues regarding school education and health; a systematic analysis of sociological researchResults. The polemic aspects to the requirements for the appearance of the students are considered. These requirements affect many important aspects and the principles of functioning of an educational system and all society in general: the observance of the constitutional rights of a child, including freedom of expression on grounds of gender; tolerance policy of intra school and state policy in the light of migration processes; problems of leveling of social and economic stratification of children, etc. The advantages and disadvantages of existing approaches to the development requirements in the countries of Europe, Asia, Africa, and North America are analysed.Scientific novelty. The influence of policy of a school dress-code on children’s behavior and health, relationships in multinational school groups, identification and safety of school students is proved. The ambiguity of information expressiveness and  ignificance of garments of clothing and other elements of appearance of modern school students is disclosed: symbols of belonging to a religious and/or national culture, a well-known fashion brand, a modern informal/political trend, as well as the severity of gender differences in the design of school uniforms. The correlation between the wording of the requirements of the dress code and the effectiveness of its implementation from the point of view of minimization of internal stresses in the school team is defined.Practical significance. Based on the systemized proposals for quality improvement of the socio-cultural environment of

  9. Development status of the lattice physics code in COSINE project

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Y.; Yu, H.; Li, S.; Liu, Z.; Yan, Y. [State Nuclear Power Software Development Center, SNPTC, National Energy Key Laboratory of Nuclear Power Software NEKLS, North Third Ring Road, Beijing 100029 (China)

    2013-07-01

    LATC is an essential part of COSINE code package, which stands for Core and System Integrated Engine for design and analysis. LATC performs 2D multi-group assembly transport calculation and generates few group constants and the required cross-section data for CORE, the core simulator code. LATC is designed to have the capability of modeling the API 000 series assemblies. The development is a continuously improved process. Currently, LATC uses well-proven technology to achieve the key functions. In the next stage, more advanced methods and modules will be implemented. At present, WIMS and WIMS improved format library could be read in LATC code. For resonance calculation, equivalent relation with rational approximations is utilized. For transport calculation, two options are available. One choice is collision probability method in cell homogenization while discrete coordinate method in assembly homogenization, the other is method of characteristics in assembly homogenization directly. For depletion calculation, an improved linear rate 'constant power' depletion method has been developed. (authors)

  10. Development status of the lattice physics code in COSINE project

    International Nuclear Information System (INIS)

    Chen, Y.; Yu, H.; Li, S.; Liu, Z.; Yan, Y.

    2013-01-01

    LATC is an essential part of COSINE code package, which stands for Core and System Integrated Engine for design and analysis. LATC performs 2D multi-group assembly transport calculation and generates few group constants and the required cross-section data for CORE, the core simulator code. LATC is designed to have the capability of modeling the API 000 series assemblies. The development is a continuously improved process. Currently, LATC uses well-proven technology to achieve the key functions. In the next stage, more advanced methods and modules will be implemented. At present, WIMS and WIMS improved format library could be read in LATC code. For resonance calculation, equivalent relation with rational approximations is utilized. For transport calculation, two options are available. One choice is collision probability method in cell homogenization while discrete coordinate method in assembly homogenization, the other is method of characteristics in assembly homogenization directly. For depletion calculation, an improved linear rate 'constant power' depletion method has been developed. (authors)

  11. Alternative Line Coding Scheme with Fixed Dimming for Visible Light Communication

    Science.gov (United States)

    Niaz, M. T.; Imdad, F.; Kim, H. S.

    2017-01-01

    An alternative line coding scheme called fixed-dimming on/off keying (FD-OOK) is proposed for visible-light communication (VLC). FD-OOK reduces the flickering caused by a VLC transmitter and can maintain a 50% dimming level. Simple encoder and decoder are proposed which generates codes where the number of bits representing one is same as the number of bits representing zero. By keeping the number of ones and zeros equal the change in the brightness of lighting may be minimized and kept constant at 50%, thereby reducing the flickering in VLC. The performance of FD-OOK is analysed with two parameters: the spectral efficiency and power requirement.

  12. Multiple component codes based generalized LDPC codes for high-speed optical transport.

    Science.gov (United States)

    Djordjevic, Ivan B; Wang, Ting

    2014-07-14

    A class of generalized low-density parity-check (GLDPC) codes suitable for optical communications is proposed, which consists of multiple local codes. It is shown that Hamming, BCH, and Reed-Muller codes can be used as local codes, and that the maximum a posteriori probability (MAP) decoding of these local codes by Ashikhmin-Lytsin algorithm is feasible in terms of complexity and performance. We demonstrate that record coding gains can be obtained from properly designed GLDPC codes, derived from multiple component codes. We then show that several recently proposed classes of LDPC codes such as convolutional and spatially-coupled codes can be described using the concept of GLDPC coding, which indicates that the GLDPC coding can be used as a unified platform for advanced FEC enabling ultra-high speed optical transport. The proposed class of GLDPC codes is also suitable for code-rate adaption, to adjust the error correction strength depending on the optical channel conditions.

  13. Lifelong Learning Key Competence Levels of Graduate Students

    Science.gov (United States)

    Adabas, Abdurrahman; Kaygin, Hüseyin

    2016-01-01

    The European Union defines lifelong learning as all activities aimed at improving an individual's knowledge, skills and competences individually, socially or vocationally throughout his/her life. In 2007, eight key competences necessary for lifelong learning were identified by the European Union Education and Culture Commission. These competences…

  14. JEA's Code of Ethics for Advisers; and Sites for Additional Ethics Information.

    Science.gov (United States)

    Bowen, John

    1997-01-01

    Lists general principles that media advisers should follow, the 12 points agreed upon as the Journalism Education Association's (JEA) Code of Ethics for Advisers, and a list of Web sites that deal with journalism ethics. (PA)

  15. Code-Switching Functions in Modern Hebrew Teaching and Learning

    Science.gov (United States)

    Gilead, Yona

    2016-01-01

    The teaching and learning of Modern Hebrew outside of Israel is essential to Jewish education and identity. One of the most contested issues in Modern Hebrew pedagogy is the use of code-switching between Modern Hebrew and learners' first language. Moreover, this is one of the longest running disputes in the broader field of second language…

  16. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  17. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  18. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  19. Continuing education is the key in Jamaica.

    Science.gov (United States)

    1992-01-01

    An evaluation of the Jamaican Women's Center Programme by the Population Council of New York found that 55% of teenage mothers in Jamaica returned to school in Kingston and 73% in the Mandeville branch following their pregnancies and exposure to the program. Only 15% who were not exposed to the program returned to school. The Sister School Workshop Program on Teenage Pregnancy provides knowledge instead of the myth and fantasy given by parents and clergy. Continuing education is particularly important for those with low self-esteem. The Center also provided knowledge about contraception. The findings were that contraceptive use was 89% among program graduates and 81% among nonprogram persons. In addition to the higher % of usage, there were differences in methods used. Center users preferred the IUD and pills, while nonprogram persons favored pills and injections. Subsequent pregnancies were much higher among nonprogram persons at 39%, while for program participants 15% at Kingston and 8% from the Mandeville Center had subsequent pregnancies within 3 years. The creation of the Jamaican Women's Center in 1978 has also promoted continuing education during pregnancy. Assistance is also provided to those reentering the school system after giving birth. The financial cost has been reasonable at J$3500 program year/woman and nursery facility costs at J$664/child/year. Other services to former students include counseling and school visits and occasionally financial aid amounts J$176/woman/year. Rural outreach averages J$336/woman/year. The identifiable weakness was in preparation of these girls for employment. It is suggested that additional efforts be made to provide wider and more marketable skills to meet local needs. There is also a need to provide linkage with other skills training programs and small business groups in order to expand labor force opportunities for these women.

  20. New quantum codes derived from a family of antiprimitive BCH codes

    Science.gov (United States)

    Liu, Yang; Li, Ruihu; Lü, Liangdong; Guo, Luobin

    The Bose-Chaudhuri-Hocquenghem (BCH) codes have been studied for more than 57 years and have found wide application in classical communication system and quantum information theory. In this paper, we study the construction of quantum codes from a family of q2-ary BCH codes with length n=q2m+1 (also called antiprimitive BCH codes in the literature), where q≥4 is a power of 2 and m≥2. By a detailed analysis of some useful properties about q2-ary cyclotomic cosets modulo n, Hermitian dual-containing conditions for a family of non-narrow-sense antiprimitive BCH codes are presented, which are similar to those of q2-ary primitive BCH codes. Consequently, via Hermitian Construction, a family of new quantum codes can be derived from these dual-containing BCH codes. Some of these new antiprimitive quantum BCH codes are comparable with those derived from primitive BCH codes.