WorldWideScience

Sample records for encoded transfer file

  1. Embedded system file transfer USB

    International Nuclear Information System (INIS)

    Jaoua, Mehdi

    2008-01-01

    The development of the communication series A emphasized new aspects of data exchange. The transfer of data, subject of my project of end of studies, consists in transferring from the files of a support of mass towards another via port USB. In first phase, I had like stain the realization of an embarked system allowing the communication between a key USB and final of communication such as a Pc. For this fact, I had to include/understand the operation of protocol USB and thus I could programmed a Peak to manage this communication. The second phase, will consist in extending this project towards a transmission de< donnees between two keys USB without intervention of a powerful machine equipped with an operating system pour rant to manage this transaction. (Author)

  2. Next generation WLCG File Transfer Service (FTS)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    LHC experiments at CERN and worldwide utilize WLCG resources and middleware components to perform distributed computing tasks. One of the most important tasks is reliable file replication. It is a complex problem, suffering from transfer failures, disconnections, transfer duplication, server and network overload, differences in storage systems, etc. To address these problems, EMI and gLite have provided the independent File Transfer Service (FTS) and Grid File Access Library (GFAL) tools. Their development started almost a decade ago, in the meantime, requirements in data management have changed - the old architecture of FTS and GFAL cannot keep support easily these changes. Technology has also been progressing: FTS and GFAL do not fit into the new paradigms (cloud, messaging, for example). To be able to serve the next stage of LHC data collecting (from 2013), we need a new generation of  these tools: FTS 3 and GFAL 2. We envision a service requiring minimal configuration, which can dynamically adapt to the...

  3. THE USELESS OF THE TRANSFER PRICING FILE

    Directory of Open Access Journals (Sweden)

    DEACONU SORIN-CONSTANTIN

    2017-10-01

    Full Text Available In the context of the globalization and of the strengthening of the relations between the UE economical agents, it appears more and more the idea of groups of entities for the justification of the reciprocal deliveries, buying and loans. The transferring price is a concept that requires maximum attention from the affiliated parts, meaning the entities with reciprocal operations and common managers or associates. The theme of our study is the verification of the hypothesis when the transferring price documentary file is not useful. The research methodology of our study include: dedicated literature, study cases, etc. the conclusion is that all affiliated entities (according to the national legislation are legally imposed to establish such a documentary file and the tax authorities may require explanations and information related to the content of this file. Still, the file does not bring extra information for the tax authorities, because its establishing is partial from the start, because no tax payer will accuse himself in front of the tax authorities. We propose the elimination of this documentary file and its replacement with an electronic format of information to an international level, so the tax authority can perform an analysis of the intra-group operation without going to the premises of the economical operators

  4. GIFT: an HEP project for file transfer

    International Nuclear Information System (INIS)

    Ferrer, M.L.; Mirabelli, G.; Valente, E.

    1986-01-01

    Started in autumn 1983, GIFT (General Internetwork File Transfer) is a collaboration among several HEP centers, including CERN, Frascati, Oslo, Oxford, RAL and Rome. The collaboration was initially set up with the aim of studying the feasibility of a software system to allow direct file exchange between computers which do not share a common Virtual File Protocol. After the completion of this first phase, an implementation phase started and, since March 1985, an experimental service based on this system has been running at CERN between DECnet, CERNET and the UK Coloured Book protocols. The authors present the motivations that, together with previous gateway experiences, led to the definition of GIFT specifications and to the implementation of the GIFT Kernel system. The position of GIFT in the overall development framework of the networking facilities needed by large international collaborations within the HEP community is explained. (Auth.)

  5. Storage Manager and File Transfer Web Services

    International Nuclear Information System (INIS)

    William A Watson III; Ying Chen; Jie Chen; Walt Akers

    2002-01-01

    Web services are emerging as an interesting mechanism for a wide range of grid services, particularly those focused upon information services and control. When coupled with efficient data transfer services, they provide a powerful mechanism for building a flexible, open, extensible data grid for science applications. In this paper we present our prototype work on a Java Storage Resource Manager (JSRM) web service and a Java Reliable File Transfer (JRFT) web service. A java client (Grid File Manager) on top of JSRM and is developed to demonstrate the capabilities of these web services. The purpose of this work is to show the extent to which SOAP based web services are an appropriate direction for building a grid-wide data management system, and eventually grid-based portals

  6. MDP: Reliable File Transfer for Space Missions

    Science.gov (United States)

    Rash, James; Criscuolo, Ed; Hogie, Keith; Parise, Ron; Hennessy, Joseph F. (Technical Monitor)

    2002-01-01

    This paper presents work being done at NASA/GSFC by the Operating Missions as Nodes on the Internet (OMNI) project to demonstrate the application of the Multicast Dissemination Protocol (MDP) to space missions to reliably transfer files. This work builds on previous work by the OMNI project to apply Internet communication technologies to space communication. The goal of this effort is to provide an inexpensive, reliable, standard, and interoperable mechanism for transferring files in the space communication environment. Limited bandwidth, noise, delay, intermittent connectivity, link asymmetry, and one-way links are all possible issues for space missions. Although these are link-layer issues, they can have a profound effect on the performance of transport and application level protocols. MDP, a UDP-based reliable file transfer protocol, was designed for multicast environments which have to address these same issues, and it has done so successfully. Developed by the Naval Research Lab in the mid 1990's, MDP is now in daily use by both the US Post Office and the DoD. This paper describes the use of MDP to provide automated end-to-end data flow for space missions. It examines the results of a parametric study of MDP in a simulated space link environment and discusses the results in terms of their implications for space missions. Lessons learned are addressed, which suggest minor enhancements to the MDP user interface to add specific features for space mission requirements, such as dynamic control of data rate, and a checkpoint/resume capability. These are features that are provided for in the protocol, but are not implemented in the sample MDP application that was provided. A brief look is also taken at the status of standardization. A version of MDP known as NORM (Neck Oriented Reliable Multicast) is in the process of becoming an IETF standard.

  7. The gLite File Transfer Service

    CERN Document Server

    Badino, Paolo; Casey, J; Frohner, A; Kunszt, Peter Z; McCance, G

    2006-01-01

    In this paper we describe the architecture and implementation of the gLite File Transfer Service (FTS) and list the most basic deployment scenarios. The FTS is addressing the need to manage massive wide-area data transfers on dedicated network channels while allowing the involved sites and users to manage their policies. The FTS manages the transfers in a robust way, allowing for an optimized high throughput between storage systems. The FTS can be used to perform the LHC Tier-0 to Tier-1 data transfer as well as the Tier-1 to Tier-2 data distribution and collection. The storage system peculiarities can be taken into account by fine-tuning the parameters of the FTS managing a particular channel. All the manageability related features as well as the interaction with other components that form part of the overall service are described as well. The FTS is also extensible so that particular user groups or experiment frameworks can customize its behavior both for pre- and post-transfer tasks. The FTS has been desig...

  8. WinSCP for Windows File Transfers | High-Performance Computing | NREL

    Science.gov (United States)

    WinSCP for Windows File Transfers WinSCP for Windows File Transfers WinSCP for can used to securely transfer files between your local computer running Microsoft Windows and a remote computer running Linux

  9. ARC Code TI: Self-Healing Independent File Transfer (Shift)

    Data.gov (United States)

    National Aeronautics and Space Administration — Shift is a lightweight framework for high performance local and remote file transfers that provides resiliency across a wide variety of failure scenarios through...

  10. Globus File Transfer Services | High-Performance Computing | NREL

    Science.gov (United States)

    installed on the systems at both ends of the data transfer. The NREL endpoint is nrel#globus. Click Login on the Globus web site. On the login page select "Globus ID" as the login method and click Login to the Globus website. From the Manage Data drop down menu, select Transfer Files. Then click Get

  11. Information transfer via implicit encoding with delay time modulation in a time-delay system

    Energy Technology Data Exchange (ETDEWEB)

    Kye, Won-Ho, E-mail: whkye@kipo.go.kr [Korean Intellectual Property Office, Government Complex Daejeon Building 4, 189, Cheongsa-ro, Seo-gu, Daejeon 302-701 (Korea, Republic of)

    2012-08-20

    A new encoding scheme for information transfer with modulated delay time in a time-delay system is proposed. In the scheme, the message is implicitly encoded into the modulated delay time. The information transfer rate as a function of encoding redundancy in various noise scales is presented and it is analyzed that the implicit encoding scheme (IES) has stronger resistance against channel noise than the explicit encoding scheme (EES). In addition, its advantages in terms of secure communication and feasible applications are discussed. -- Highlights: ► We propose new encoding scheme with delay time modulation. ► The message is implicitly encoded with modulated delay time. ► The proposed scheme shows stronger resistance against channel noise.

  12. NET: an inter-computer file transfer command

    International Nuclear Information System (INIS)

    Burris, R.D.

    1978-05-01

    The NET command was defined and supported in order to facilitate file transfer between computers. Among the goals of the implementation were greatest possible ease of use, maximum power (i.e., support of a diversity of equipment and operations), and protection of the operating system

  13. Short Reflections about the Transfer Pricing File

    Directory of Open Access Journals (Sweden)

    Florin TUDOR

    2012-11-01

    Full Text Available Substantive development of the international trade over the past 20 years, reflecting to some extent the degree of integration of national economies and technological progress, presents tax issues of increased complexity in the determination of income and expenses of a company or of a permanent establishment which is part of a multinational group and which must be approached within a jurisdiction. In principle, the specific the right of taxation of each state depends mostly on the tax system used by it: if it is a tax system based on tax residence, source of income, or both. In applying those principles in taxation of multinational companies, one of the most difficult problems encountered consists in establishing, for tax purposes, the appropriate transfer pricing. Taking into account the phenomenon of internationalization of the economic crimes, this paper aims treat uniform the subject in question, but with references to certain mandatory provisions contained in the OECD Guidelines regarding of the transfer pricing.

  14. FTCRP: file format for the device-independent transfer of colored raster pictures

    Science.gov (United States)

    Hofmann, Georg R.; Kromker, Detlef

    1989-04-01

    Research institutes, industrial companies, computer animation studios and printing facilities are often equipped with a lot of different machines for the rendering and display of raster pictures. The output devices (monitors, recording devices, printers) differ in their geometric and color resolution, in the picture format, and in the chromaticity of the color primaries. There is a need to transfer pictures via local networks (LAN) from one device to another at studios and laboratories without having to compromise for the quality of the pictures. And there is a need to transfer pictures via tape, floppy or networks (WAN) from one institute to another, or from an institute to the publisher, and so forth. For these purposes, a special format for the transfer of raster pictures has been developed which is independent of differences in pixel resolution, color resolution, color primaries, number of colors per device, and scan direction. For its use in the networks and on tapes, the file format has to initially have a character encoding to prevent any collision of pixel or image data with control sequences of terminal servers, network controllers, and other hardware devices. Binary encodings are still to be developed; the format is open for different data compressions and other data encodings according to different application profiles. The format is called FTCRP - File for the Transfer of Colored Raster Pictures. Historically, a Version 0 of FTCRP was first developed. Several insights were gained in the imple-mentation of FTCRP driver programs and in the acceptance of the new format. Here, we present the conception of Version 1 of FTCRP, which is an extension and an enhancement of the former version. Unfortunately, the syntax of FTCRP Version 1 was not definitivly determined before the submission of this text. Therefore we concentrate on conceptual considerations. This paper is intended to encourage further discussion and refinements.

  15. WebFTS: File Transfer Web Interface for FTS3

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    WebFTS is a web-delivered file transfer and management solution which allows users to invoke reliable, managed data transfers on distributed infrastructures. The fully open source solution offers a simple graphical interface through which the power of the FTS3 service can be accessed without the installation of any special grid tools. Created following simplicity and efficiency criteria, WebFTS allows the user to access and interact with multiple grid and cloud storage. The “transfer engine” used is FTS3, the service responsible for distributing the majority of LHC data across WLCG infrastructure. This provides WebFTS with reliable, multi-protocol, adaptively optimised data transfers.The talk will focus on the recent development which allows transfers from/to Dropbox and CERNBox (CERN ownCloud deployment)

  16. Gaussian variable neighborhood search for the file transfer scheduling problem

    Directory of Open Access Journals (Sweden)

    Dražić Zorica

    2016-01-01

    Full Text Available This paper presents new modifications of Variable Neighborhood Search approach for solving the file transfer scheduling problem. To obtain better solutions in a small neighborhood of a current solution, we implement two new local search procedures. As Gaussian Variable Neighborhood Search showed promising results when solving continuous optimization problems, its implementation in solving the discrete file transfer scheduling problem is also presented. In order to apply this continuous optimization method to solve the discrete problem, mapping of uncountable set of feasible solutions into a finite set is performed. Both local search modifications gave better results for the large size instances, as well as better average performance for medium and large size instances. One local search modification achieved significant acceleration of the algorithm. The numerical experiments showed that the results obtained by Gaussian modifications are comparable with the results obtained by standard VNS based algorithms, developed for combinatorial optimization. In some cases Gaussian modifications gave even better results. [Projekat Ministarstava nauke Republike Srbije, br. 174010

  17. Transferring and generalizing deep-learning-based neural encoding models across subjects.

    Science.gov (United States)

    Wen, Haiguang; Shi, Junxing; Chen, Wei; Liu, Zhongming

    2018-08-01

    Recent studies have shown the value of using deep learning models for mapping and characterizing how the brain represents and organizes information for natural vision. However, modeling the relationship between deep learning models and the brain (or encoding models), requires measuring cortical responses to large and diverse sets of natural visual stimuli from single subjects. This requirement limits prior studies to few subjects, making it difficult to generalize findings across subjects or for a population. In this study, we developed new methods to transfer and generalize encoding models across subjects. To train encoding models specific to a target subject, the models trained for other subjects were used as the prior models and were refined efficiently using Bayesian inference with a limited amount of data from the target subject. To train encoding models for a population, the models were progressively trained and updated with incremental data from different subjects. For the proof of principle, we applied these methods to functional magnetic resonance imaging (fMRI) data from three subjects watching tens of hours of naturalistic videos, while a deep residual neural network driven by image recognition was used to model visual cortical processing. Results demonstrate that the methods developed herein provide an efficient and effective strategy to establish both subject-specific and population-wide predictive models of cortical representations of high-dimensional and hierarchical visual features. Copyright © 2018 Elsevier Inc. All rights reserved.

  18. Nonlinear transfer function encodes synchronization in a neural network from the mammalian brain.

    Science.gov (United States)

    Menendez de la Prida, L; Sanchez-Andres, J V

    1999-09-01

    Synchronization is one of the mechanisms by which the brain encodes information. The observed synchronization of neuronal activity has, however, several levels of fluctuations, which presumably regulate local features of specific areas. This means that biological neural networks should have an intrinsic mechanism able to synchronize the neuronal activity but also to preserve the firing capability of individual cells. Here, we investigate the input-output relationship of a biological neural network from developing mammalian brain, i.e., the hippocampus. We show that the probability of occurrence of synchronous output activity (which consists in stereotyped population bursts recorded throughout the hippocampus) is encoded by a sigmoidal transfer function of the input frequency. Under this scope, low-frequency inputs will not produce any coherent output while high-frequency inputs will determine a synchronous pattern of output activity (population bursts). We analyze the effect of the network size (N) on the parameters of the transfer function (threshold and slope). We found that sigmoidal functions realistically simulate the synchronous output activity of hippocampal neural networks. This outcome is particularly important in the application of results from neural network models to neurobiology.

  19. Experimental Analysis of File Transfer Rates over Wide-Area Dedicated Connections

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Liu, Qiang [ORNL; Sen, Satyabrata [ORNL; Hinkel, Gregory Carl [ORNL; Imam, Neena [ORNL; Foster, Ian [University of Chicago; Kettimuthu, R. [Argonne National Laboratory (ANL); Settlemyer, Bradley [Los Alamos National Laboratory (LANL); Wu, Qishi [University of Memphis; Yun, Daqing [Harrisburg University

    2016-12-01

    File transfers over dedicated connections, supported by large parallel file systems, have become increasingly important in high-performance computing and big data workflows. It remains a challenge to achieve peak rates for such transfers due to the complexities of file I/O, host, and network transport subsystems, and equally importantly, their interactions. We present extensive measurements of disk-to-disk file transfers using Lustre and XFS file systems mounted on multi-core servers over a suite of 10 Gbps emulated connections with 0-366 ms round trip times. Our results indicate that large buffer sizes and many parallel flows do not always guarantee high transfer rates. Furthermore, large variations in the measured rates necessitate repeated measurements to ensure confidence in inferences based on them. We propose a new method to efficiently identify the optimal joint file I/O and network transport parameters using a small number of measurements. We show that for XFS and Lustre with direct I/O, this method identifies configurations achieving 97% of the peak transfer rate while probing only 12% of the parameter space.

  20. Transfer of numeric ASCII data files between Apple and IBM personal computers.

    Science.gov (United States)

    Allan, R W; Bermejo, R; Houben, D

    1986-01-01

    Listings for programs designed to transfer numeric ASCII data files between Apple and IBM personal computers are provided with accompanying descriptions of how the software operates. Details of the hardware used are also given. The programs may be easily adapted for transferring data between other microcomputers.

  1. FORTRAN data files transference from VAX/VMS to ALPHA/UNIX

    International Nuclear Information System (INIS)

    Sanchez, E.; Milligen, B.Ph. van

    1997-01-01

    Several tools have been developed to access the TJ-I and TJ-IU databases, which currently reside in VAX/VMS servers, from the TJ-II Data Acquisition System DEC ALPHA 8400 server. The TJ-I/TJ-IU databases are not homogeneous and contain several types of data files, namely, SADE. CAMAC and FORTRAN un formatted files. The tools presented in this report allow one to transfer CAMAC and those FORTRAN un formatted files defined herein. from a VAX/VMS server, for data manipulation on the ALPHA/Digital UNIX server. (Author) 5 refs

  2. ANALISIS TRANSFER RATE PENAMBAHAN NODE PADA INFRASTRUKTUR MOBILE ADHOC NETWORK (MANET UNTUK FILE SERVER

    Directory of Open Access Journals (Sweden)

    Rudi Kurniawan

    2017-05-01

    Full Text Available Teknologi Wireless Network sudah lama ditemukan dan seiring waktu juga mengalami perkembangan, Namun sifat teknologi ini menggantungkan diri pada infrastruktur jaringan yang ada. Hal ini bias menjadi kelemahan tersendiri saat kondisi infrastruktur jaringan sedang mengalami gangguan, karena setiap komunikasi yang melewati infrastruktur jaringan tersebut tidak akan sampai pada tujuan. Teknologi jaringan Mobile Ad-hoc Network (MANET diciptakan sebagai antisipasi jika infrastruktur jaringan sedang mengalami gangguan. Dengan jaringan MANET sistem komunikasi yang dilakukan tidak membutuhkan infrastruktur jaringan karena tiap node pada jaringan tersebut bersifat mobile. Untuk menguji kemampuan MANET, pada penelitian ini akan menerapkan File Transfer Protocol (FTP sebagai media untuk melakukan komunikasi data file transfer yang diimplementasi pada jaringan MANET. Dari pengujian yang telah dilakukan diperoleh hasil bahwa File Transfer dapat berfungsi dengan baik saat diterapkan pada jaringan MANET.

  3. Transfer pricing file- a contextualized Approach. Case Study

    Directory of Open Access Journals (Sweden)

    M. Boiţă

    2013-12-01

    Full Text Available The transfer price is basically the price used for transfer of tangible and intangible assets between related parties and it should be determined on the basis of market value without being influenced by the relationship of affiliation. However, if for services or tangible assets, the comparison of the transfer price to the market one is relatively easy to achieve, for the intangible ones, quantifying future benefits waived by the affiliated person compared to the situation in which it would be independent is harder to be established.

  4. [Cloning, mutagenesis and symbiotic phenotype of three lipid transfer protein encoding genes from Mesorhizobium huakuii 7653R].

    Science.gov (United States)

    Li, Yanan; Zeng, Xiaobo; Zhou, Xuejuan; Li, Youguo

    2016-12-04

    Lipid transfer protein superfamily is involved in lipid transport and metabolism. This study aimed to construct mutants of three lipid transfer protein encoding genes in Mesorhizobium huakuii 7653R, and to study the phenotypes and function of mutations during symbiosis with Astragalus sinicus. We used bioinformatics to predict structure characteristics and biological functions of lipid transfer proteins, and conducted semi-quantitative and fluorescent quantitative real-time PCR to analyze the expression levels of target genes in free-living and symbiotic conditions. Using pK19mob insertion mutagenesis to construct mutants, we carried out pot plant experiments to observe symbiotic phenotypes. MCHK-5577, MCHK-2172 and MCHK-2779 genes encoding proteins belonged to START/RHO alpha_C/PITP/Bet_v1/CoxG/CalC (SRPBCC) superfamily, involved in lipid transport or metabolism, and were identical to M. loti at 95% level. Gene relative transcription level of the three genes all increased compared to free-living condition. We obtained three mutants. Compared with wild-type 7653R, above-ground biomass of plants and nodulenitrogenase activity induced by the three mutants significantly decreased. Results indicated that lipid transfer protein encoding genes of Mesorhizobium huakuii 7653R may play important roles in symbiotic nitrogen fixation, and the mutations significantly affected the symbiotic phenotypes. The present work provided a basis to study further symbiotic function mechanism associated with lipid transfer proteins from rhizobia.

  5. Migrant Student Record Transfer System (MSRTS) [machine-readable data file].

    Science.gov (United States)

    Arkansas State Dept. of Education, Little Rock. General Education Div.

    The Migrant Student Record Transfer System (MSRTS) machine-readable data file (MRDF) is a collection of education and health data on more than 750,000 migrant children in grades K-12 in the United States (except Hawaii), the District of Columbia, and the outlying territories of Puerto Rico and the Mariana and Marshall Islands. The active file…

  6. Estimating the Transfer Range of Plasmids Encoding Antimicrobial Resistance in a Wastewater Treatment Plant Microbial Community

    DEFF Research Database (Denmark)

    Li, Liguan; Dechesne, Arnaud; He, Zhiming

    2018-01-01

    sludge microbial community was challenged in standardized filter matings with one of three multidrug resistance plasmids (pKJK5, pB10, and RP4) harbored by Escherichia coli or Pseudomonas putida. Different donor–plasmid combinations had distinct transfer frequencies, ranging from 3 to 50 conjugation...... events per 100000 cells of the WWTP microbial community. In addition, transfer was observed to a broad phylogenetic range of 13 bacterial phyla with several taxa containing potentially pathogenic species. Preferential transfer to taxa belonging to the predicted evolutionary host range of the plasmids...... ARG transmission. However, the contribution of microbial communities in WWTPs to ARG dissemination remains poorly understood. Here, we examined for the first time plasmid permissiveness of an activated sludge microbial community by utilizing an established fluorescent bioreporter system. The activated...

  7. FTS3 / WebFTS – A Powerful File Transfer Service for Scientific Communities

    CERN Document Server

    Kiryanov, Andrey; Keeble, Oliver

    2015-01-01

    FTS3, the service responsible for globally distributing the majority of the LHC data across the WLCG infrastructure, is now available to everybody. Already integrated into LHC experiment frameworks, a new web interface now makes the FTS3's transfer technology directly available to end users. In this article we describe this intuitive new interface, “WebFTS”, which allows users to easily schedule and manage large data transfers right from the browser, profiting from a service which has been proven at the scale of petabytes per month. We will shed light on new development activities to extend FTS3 transfers capabilities outside Grid boundaries with support of non-Grid endpoints like Dropbox and S3. We also describe the latest changes integrated into the transfer engine itself, such as new data management operations like deletions and staging files from archive, all of which may be accessed through our standards-compliant REST API. For the Service Managers, we explain such features as the service's horizonta...

  8. Food and human gut as reservoirs of transferable antibiotic resistance encoding genes

    Directory of Open Access Journals (Sweden)

    Jean-Marc eRolain

    2013-06-01

    Full Text Available The increase and spread of antibiotic resistance (AR over the past decade in human pathogens has become a worldwide health concern. Recent genomic and metagenomic studies in humans, animals, in food and in the environment have led to the discovery of a huge reservoir of AR genes called the resistome that could be mobilized and transferred from these sources to human pathogens. AR is a natural phenomenon developed by bacteria to protect antibiotic-producing bacteria from their own products and also to increase their survival in highly competitive microbial environments. Although antibiotics are used extensively in humans and animals, there is also considerable usage of antibiotics in agriculture, especially in animal feeds and aquaculture. The aim of this review is to give an overview of the sources of AR and the use of antibiotics in these reservoirs as selectors for emergence of AR bacteria in humans via the food chain.

  9. The multidrug resistance IncA/C transferable plasmid encodes a novel domain-swapped dimeric protein-disulfide isomerase.

    Science.gov (United States)

    Premkumar, Lakshmanane; Kurth, Fabian; Neyer, Simon; Schembri, Mark A; Martin, Jennifer L

    2014-01-31

    The multidrug resistance-encoding IncA/C conjugative plasmids disseminate antibiotic resistance genes among clinically relevant enteric bacteria. A plasmid-encoded disulfide isomerase is associated with conjugation. Sequence analysis of several IncA/C plasmids and IncA/C-related integrative and conjugative elements (ICE) from commensal and pathogenic bacteria identified a conserved DsbC/DsbG homolog (DsbP). The crystal structure of DsbP reveals an N-terminal domain, a linker region, and a C-terminal catalytic domain. A DsbP homodimer is formed through domain swapping of two DsbP N-terminal domains. The catalytic domain incorporates a thioredoxin-fold with characteristic CXXC and cis-Pro motifs. Overall, the structure and redox properties of DsbP diverge from the Escherichia coli DsbC and DsbG disulfide isomerases. Specifically, the V-shaped dimer of DsbP is inverted compared with EcDsbC and EcDsbG. In addition, the redox potential of DsbP (-161 mV) is more reducing than EcDsbC (-130 mV) and EcDsbG (-126 mV). Other catalytic properties of DsbP more closely resemble those of EcDsbG than EcDsbC. These catalytic differences are in part a consequence of the unusual active site motif of DsbP (CAVC); substitution to the EcDsbC-like (CGYC) motif converts the catalytic properties to those of EcDsbC. Structural comparison of the 12 independent subunit structures of DsbP that we determined revealed that conformational changes in the linker region contribute to mobility of the catalytic domain, providing mechanistic insight into DsbP function. In summary, our data reveal that the conserved plasmid-encoded DsbP protein is a bona fide disulfide isomerase and suggest that a dedicated oxidative folding enzyme is important for conjugative plasmid transfer.

  10. Efficient procedure for transferring specific human genes into Chinese hamster cell mutants: interspecific transfer of the human genes encoding leucyl- and asparaginyl-tRNA synthetases

    International Nuclear Information System (INIS)

    Cirullo, R.E.; Dana, S.; Wasmuth, J.J.

    1983-01-01

    A simple and efficient procedure for transferring specific human genes into mutant Chinese hamster ovary cell recipients has been developed that does not rely on using calcium phosphate-precipitated high-molecular-weight DNA. Interspecific cell hybrids between human leukocytes and temperature-sensitive Chinese hamster cell mutants with either a thermolabile leucyl-tRNA synthetase or a thermolabile asparaginyl-tRNA synthetase were used as the starting material in these experiments. These hybrids contain only one or a few human chromosomes and require expression of the appropriate human aminoacyl-tRNA synthetase gene to grow at 39 degrees C. Hybrids were exposed to very high doses of gamma-irradiation to extensively fragment the chromosomes and re-fused immediately to the original temperature-sensitive Chinese hamster mutant, and secondary hybrids were isolated at 39 degrees C. Secondary hybrids, which had retained small fragments of the human genome containing the selected gene, were subjected to another round of irradiation, refusion, and selection at 39 degrees C to reduce the amount of human DNA even further. Using this procedure, Chinese hamster cell lines have been constructed that express the human genes encoding either asparaginyl- or leucyl-tRNA synthetase, yet less than 0.1% of their DNA is derived from the human genome, as quantitated by a sensitive dot-blot nucleic acid hybridization procedure

  11. The fixABCX genes in Rhodospirillum rubrum encode a putative membrane complex participating in electron transfer to nitrogenase.

    Science.gov (United States)

    Edgren, Tomas; Nordlund, Stefan

    2004-04-01

    In our efforts to identify the components participating in electron transport to nitrogenase in Rhodospirillum rubrum, we used mini-Tn5 mutagenesis followed by metronidazole selection. One of the mutants isolated, SNT-1, exhibited a decreased growth rate and about 25% of the in vivo nitrogenase activity compared to the wild-type values. The in vitro nitrogenase activity was essentially wild type, indicating that the mutation affects electron transport to nitrogenase. Sequencing showed that the Tn5 insertion is located in a region with a high level of similarity to fixC, and extended sequencing revealed additional putative fix genes, in the order fixABCX. Complementation of SNT-1 with the whole fix gene cluster in trans restored wild-type nitrogenase activity and growth. Using Western blotting, we demonstrated that expression of fixA and fixB occurs only under conditions under which nitrogenase also is expressed. SNT-1 was further shown to produce larger amounts of both ribulose 1,5-bisphosphate carboxylase/oxygenase and polyhydroxy alkanoates than the wild type, indicating that the redox status is affected in this mutant. Using Western blotting, we found that FixA and FixB are soluble proteins, whereas FixC most likely is a transmembrane protein. We propose that the fixABCX genes encode a membrane protein complex that plays a central role in electron transfer to nitrogenase in R. rubrum. Furthermore, we suggest that FixC is the link between nitrogen fixation and the proton motive force generated in the photosynthetic reactions.

  12. RANCANG BANGUN FILE TRANSFER PROTOCOL (FTP DENGAN PENGAMANAN OPEN SSL PADA JARINGAN VPN MIKROTIK DI SMK DWIWARNA

    Directory of Open Access Journals (Sweden)

    Devi Ruwaida

    2018-01-01

    Full Text Available File Transfer Protocol (FTP server merupakan jenis sistem yang menghubungkan hak pengakses (client dan penyedia (server dalam melakukan pertukaran data yang melewati port 21, yang semula ftp server berjalan pada protocol yang tidak terlindungi di dalam port 21, kemudian dengan OpenSSL ini di amankan agar data dapat sampai ke tujuan. Pada penelitian ini akan dibangun Rancang Bangun File Transfer Protocol (Ftp Dengan Pengamanan Open Ssl Pada Jaringan Vpn Mikrotik Di Smk Dwiwarna  yang akan di konfigurasi pada debian 9.1 dengan  di tambahnya pengaman sertifikat ssl , dengan harapan  melindungi proses dalam pengiriman data dapat dengan aman dan ditambahkannya sistem VPN PPTP pada mikrotik akan lebih memberikan keamanan yang lebih baik lagi, dimana pemanfaatan Point-to-Point Tunneling Protocol (PPTP suatu protokol jaringan yang bisa memungkinkan client dalam pengiriman data secara aman melalui remote client kepada server sekolah dibangunnya suatu virtual private network (VPN.

  13. Type 3 Fimbriae Encoded on Plasmids Are Expressed from a Unique Promoter without Affecting Host Motility, Facilitating an Exceptional Phenotype That Enhances Conjugal Plasmid Transfer

    DEFF Research Database (Denmark)

    Madsen, Jonas Stenlokke; Riber, Leise; Kot, Witold

    2016-01-01

    Horizontal gene transfer (HGT), the transmission of genetic material to a recipient that is not the progeny of the donor, is fundamental in bacterial evolution. HGT is often mediated by mobile genetic elements such as conjugative plasmids, which may be in conflict with the chromosomal elements...... of the genome because they are independent replicons that may petition their own evolutionary strategy. Here we study differences between type 3 fimbriae encoded on wild type plasmids and in chromosomes. Using known and newly characterized plasmids we show that the expression of type 3 fimbriae encoded...... on plasmids is systematically different, as MrkH, a c-di-GMP dependent transcriptional activator is not needed for strong expression of the fimbriae. MrkH is required for expression of type 3 fimbriae of the Klebsiella pneumoniae chromosome, wherefrom the fimbriae operon (mrkABCDF) of plasmids is believed...

  14. If you watch it move, you'll recognize it in 3D: Transfer of depth cues between encoding and retrieval.

    Science.gov (United States)

    Papenmeier, Frank; Schwan, Stephan

    2016-02-01

    Viewing objects with stereoscopic displays provides additional depth cues through binocular disparity supporting object recognition. So far, it was unknown whether this results from the representation of specific stereoscopic information in memory or a more general representation of an object's depth structure. Therefore, we investigated whether continuous object rotation acting as depth cue during encoding results in a memory representation that can subsequently be accessed by stereoscopic information during retrieval. In Experiment 1, we found such transfer effects from continuous object rotation during encoding to stereoscopic presentations during retrieval. In Experiments 2a and 2b, we found that the continuity of object rotation is important because only continuous rotation and/or stereoscopic depth but not multiple static snapshots presented without stereoscopic information caused the extraction of an object's depth structure into memory. We conclude that an object's depth structure and not specific depth cues are represented in memory. Copyright © 2015 Elsevier B.V. All rights reserved.

  15. FORTRAN data files transference from VAX/VMS to ALPHA/UNIX; Traspaso de ficheros FORTRAN de datos de VAX/VMS a ALPHA/UNIX

    Energy Technology Data Exchange (ETDEWEB)

    Sanchez, E.; Milligen, B. Ph van [CIEMAT (Spain)

    1997-09-01

    Several tools have been developed to access the TJ-IU databases, which currently reside in VAX/VMS servers, from the TJ-II Data Acquisition System DEC ALPHA 8400 server. The TJ-I/TJ-IU databases are not homogeneous and contain several types of data files, namely, SADE, CAMAC and FORTRAN unformatted files. The tools presented in this report allow one to transfer CAMAC and those FORTRAN unformatted files defined herein, from a VAX/VMS server, for data manipulation on the ALPHA/Digital UNIX server. (Author)

  16. Large IncHI2-plasmids encode extended-spectrum β-lactamases (ESBLs) in Enterobacter spp. bloodstream isolates, and support ESBL-transfer to Escherichia coli.

    Science.gov (United States)

    Nilsen, E; Haldorsen, B C; Sundsfjord, A; Simonsen, G S; Ingebretsen, A; Naseer, U; Samuelsen, O

    2013-11-01

    We investigated the prevalence of extended-spectrum β-lactamases (ESBLs) in Enterobacter spp. bloodstream isolates from 19 hospital laboratories in Norway during 2011. A total of 62/230 (27%) isolates were resistant to third-generation cephalosporins and four (1.7%) were ESBL-positive; blaCTX -M-15 (n = 3) and blaSHV -12 (n = 1). This is comparable to the prevalence of ESBLs in clinical isolates of Escherichia coli and Klebsiella pneumoniae in Norway during the same period. All ESBL-positive isolates were multidrug resistant (MDR) and harboured plasmid-mediated quinolone resistance. Three isolates supported transfer of large IncHI2-plasmids harbouring ESBL- and MDR-encoding genes to E. coli recipients by in vitro conjugation. © 2013 The Authors Clinical Microbiology and Infection © 2013 European Society of Clinical Microbiology and Infectious Diseases.

  17. Displacement encoder

    International Nuclear Information System (INIS)

    Hesketh, T.G.

    1983-01-01

    In an optical encoder, light from an optical fibre input A is encoded by means of the encoding disc and is subsequently collected for transmission via optical fibre B. At some point in the optical path between the fibres A and B, the light is separated into component form by means of a filtering or dispersive system and each colour component is associated with a respective one of the coding channels of the disc. In this way, the significance of each bit of the coded information is represented by a respective colour thereby enabling the components to be re-combined for transmission by the fibre B without loss of information. (author)

  18. Massive lateral transfer of genes encoding plant cell wall-degrading enzymes to the mycoparasitic fungus Trichoderma from its plant-associated hosts

    Science.gov (United States)

    Chenthamara, Komal; Zhang, Jian; Atanasova, Lea; Yang, Dongqing; Miao, Youzhi; Grujic, Marica; Pourmehdi, Shadi; Pretzer, Carina; Kopchinskiy, Alexey G.; Hundley, Hope; Wang, Mei; Aerts, Andrea; Salamov, Asaf; Lipzen, Anna; Barry, Kerrie; Grigoriev, Igor V.; Shen, Qirong; Kubicek, Christian P.

    2018-01-01

    Unlike most other fungi, molds of the genus Trichoderma (Hypocreales, Ascomycota) are aggressive parasites of other fungi and efficient decomposers of plant biomass. Although nutritional shifts are common among hypocrealean fungi, there are no examples of such broad substrate versatility as that observed in Trichoderma. A phylogenomic analysis of 23 hypocrealean fungi (including nine Trichoderma spp. and the related Escovopsis weberi) revealed that the genus Trichoderma has evolved from an ancestor with limited cellulolytic capability that fed on either fungi or arthropods. The evolutionary analysis of Trichoderma genes encoding plant cell wall-degrading carbohydrate-active enzymes and auxiliary proteins (pcwdCAZome, 122 gene families) based on a gene tree / species tree reconciliation demonstrated that the formation of the genus was accompanied by an unprecedented extent of lateral gene transfer (LGT). Nearly one-half of the genes in Trichoderma pcwdCAZome (41%) were obtained via LGT from plant-associated filamentous fungi belonging to different classes of Ascomycota, while no LGT was observed from other potential donors. In addition to the ability to feed on unrelated fungi (such as Basidiomycota), we also showed that Trichoderma is capable of endoparasitism on a broad range of Ascomycota, including extant LGT donors. This phenomenon was not observed in E. weberi and rarely in other mycoparasitic hypocrealean fungi. Thus, our study suggests that LGT is linked to the ability of Trichoderma to parasitize taxonomically related fungi (up to adelphoparasitism in strict sense). This may have allowed primarily mycotrophic Trichoderma fungi to evolve into decomposers of plant biomass. PMID:29630596

  19. Transfer

    DEFF Research Database (Denmark)

    Wahlgren, Bjarne; Aarkrog, Vibe

    Bogen er den første samlede indføring i transfer på dansk. Transfer kan anvendes som praksis-filosofikum. Den giver en systematisk indsigt til den studerende, der spørger: Hvordan kan teoretisk viden bruges til at reflektere over handlinger i situationer, der passer til min fremtidige arbejdsplads?...

  20. Design and application of remote file management system

    International Nuclear Information System (INIS)

    Zhu Haijun; Liu Dekang; Shen liren

    2006-01-01

    File transfer protocol can help users transfer files between computers on internet. FTP can not fulfill the needs of users in special occasions, so it needs programmer define file transfer protocol himself based on users. The method or realization and application for user-defined file transfer protocol is introduced. (authors)

  1. Type 3 fimbriae, encoded by the conjugative plasmid pOLA52, enhance biofilm formation and transfer frequencies in Enterobacteriaceae strains

    DEFF Research Database (Denmark)

    Burmølle, Mette; Bahl, Martin Iain; Jensen, Lars Bogø

    2008-01-01

    pathogenic, members of the family Enterobacteriaceae, including Klebsiella pneumoniae, Salmonella Typhimurium, Kluyvera sp. and Enterobacter aerogenes, pOLA52 facilitated increased biofilm formation. pOLA52 is believed to represent the first example of a conjugative plasmid encoding type 3 fimbriae...

  2. TRANSFER

    African Journals Online (AJOL)

    This paper reports on further studies on long range energy transfer between curcumine as donor and another thiazine dye, thionine, which is closely related to methylene blue as energy harvester (Figure 1). Since thionine is known to have a higher quantum yield of singlet oxygen sensitization than methylene blue [8], it is ...

  3. Methodology used to produce an encoded 1:100,000-scale digital hydrographic data layer for the Pacific Northwest

    Science.gov (United States)

    Fisher, B.J.

    1996-01-01

    The U.S. Geological Survey (USGS) has produced a River Reach File data layer for the Pacific Northwest for use in water-resource management applications. The Pacific Northwest (PNW) River Reach Files, a geo-referenced river reach data layer at 1:100,000-scale, are encoded with the U.S. Environmental Protection Agency"s (EPA) reach numbers. The encoding was a primary task of the River Reach project, because EPA"s reach identifiers are also an integral hydrologic component in a regional Northwest Environmental Data Base-an ongoing effort by Federal and State agencies to compile information on reach-specific resources on rivers in Oregon, Idaho, Washington, and western Montana. A unique conflation algorithm was developed by the USGS to transfer the EPA reach codes and other meaningful attributes from the 1:250,000-scale EPA TRACE graphic files to the PNW Reach Files. The PNW Reach Files also were designed so that reach-specific information upstream or downstream from a point in the stream network could be extracted from feature attribute tables or from a Geographic Information System. This report documents the methodology used to create this 1:100,000-scale hydrologic data layer.

  4. Extending DIRAC File Management with Erasure-Coding for efficient storage.

    Science.gov (United States)

    Cadellin Skipsey, Samuel; Todev, Paulin; Britton, David; Crooks, David; Roy, Gareth

    2015-12-01

    The state of the art in Grid style data management is to achieve increased resilience of data via multiple complete replicas of data files across multiple storage endpoints. While this is effective, it is not the most space-efficient approach to resilience, especially when the reliability of individual storage endpoints is sufficiently high that only a few will be inactive at any point in time. We report on work performed as part of GridPP[1], extending the Dirac File Catalogue and file management interface to allow the placement of erasure-coded files: each file distributed as N identically-sized chunks of data striped across a vector of storage endpoints, encoded such that any M chunks can be lost and the original file can be reconstructed. The tools developed are transparent to the user, and, as well as allowing up and downloading of data to Grid storage, also provide the possibility of parallelising access across all of the distributed chunks at once, improving data transfer and IO performance. We expect this approach to be of most interest to smaller VOs, who have tighter bounds on the storage available to them, but larger (WLCG) VOs may be interested as their total data increases during Run 2. We provide an analysis of the costs and benefits of the approach, along with future development and implementation plans in this area. In general, overheads for multiple file transfers provide the largest issue for competitiveness of this approach at present.

  5. Transfer of mRNA Encoding Invariant NKT Cell Receptors Imparts Glycolipid Specific Responses to T Cells and γδT Cells.

    Science.gov (United States)

    Shimizu, Kanako; Shinga, Jun; Yamasaki, Satoru; Kawamura, Masami; Dörrie, Jan; Schaft, Niels; Sato, Yusuke; Iyoda, Tomonori; Fujii, Shin-Ichiro

    2015-01-01

    Cell-based therapies using genetically engineered lymphocytes expressing antigen-specific T cell receptors (TCRs) hold promise for the treatment of several types of cancers. Almost all studies using this modality have focused on transfer of TCR from CD8 cytotoxic T lymphocytes (CTLs). The transfer of TCR from innate lymphocytes to other lymphocytes has not been studied. In the current study, innate and adaptive lymphocytes were transfected with the human NKT cell-derived TCRα and β chain mRNA (the Vα24 and Vβ11 TCR chains). When primary T cells transfected with NKT cell-derived TCR were subsequently stimulated with the NKT ligand, α-galactosylceramide (α-GalCer), they secreted IFN-γ in a ligand-specific manner. Furthermore when γδT cells were transfected with NKT cell-derived TCR mRNA, they demonstrated enhanced proliferation, IFN-γ production and antitumor effects after α-GalCer stimulation as compared to parental γδT cells. Importantly, NKT cell TCR-transfected γδT cells responded to both NKT cell and γδT cell ligands, rendering them bi-potential innate lymphocytes. Because NKT cell receptors are unique and universal invariant receptors in humans, the TCR chains do not yield mispaired receptors with endogenous TCR α and β chains after the transfection. The transfection of NKT cell TCR has the potential to be a new approach to tumor immunotherapy in patients with various types of cancer.

  6. SnoVault and encodeD: A novel object-based storage system and applications to ENCODE metadata.

    Directory of Open Access Journals (Sweden)

    Benjamin C Hitz

    Full Text Available The Encyclopedia of DNA elements (ENCODE project is an ongoing collaborative effort to create a comprehensive catalog of functional elements initiated shortly after the completion of the Human Genome Project. The current database exceeds 6500 experiments across more than 450 cell lines and tissues using a wide array of experimental techniques to study the chromatin structure, regulatory and transcriptional landscape of the H. sapiens and M. musculus genomes. All ENCODE experimental data, metadata, and associated computational analyses are submitted to the ENCODE Data Coordination Center (DCC for validation, tracking, storage, unified processing, and distribution to community resources and the scientific community. As the volume of data increases, the identification and organization of experimental details becomes increasingly intricate and demands careful curation. The ENCODE DCC has created a general purpose software system, known as SnoVault, that supports metadata and file submission, a database used for metadata storage, web pages for displaying the metadata and a robust API for querying the metadata. The software is fully open-source, code and installation instructions can be found at: http://github.com/ENCODE-DCC/snovault/ (for the generic database and http://github.com/ENCODE-DCC/encoded/ to store genomic data in the manner of ENCODE. The core database engine, SnoVault (which is completely independent of ENCODE, genomic data, or bioinformatic data has been released as a separate Python package.

  7. Beyond the single-file fluid limit using transfer matrix method: Exact results for confined parallel hard squares

    International Nuclear Information System (INIS)

    Gurin, Péter; Varga, Szabolcs

    2015-01-01

    We extend the transfer matrix method of one-dimensional hard core fluids placed between confining walls for that case where the particles can pass each other and at most two layers can form. We derive an eigenvalue equation for a quasi-one-dimensional system of hard squares confined between two parallel walls, where the pore width is between σ and 3σ (σ is the side length of the square). The exact equation of state and the nearest neighbor distribution functions show three different structures: a fluid phase with one layer, a fluid phase with two layers, and a solid-like structure where the fluid layers are strongly correlated. The structural transition between differently ordered fluids develops continuously with increasing density, i.e., no thermodynamic phase transition occurs. The high density structure of the system consists of clusters with two layers which are broken with particles staying in the middle of the pore

  8. Heat transfer analysis of unsteady graphene oxide nanofluid flow using a fuzzy identifier evolved by genetically encoded mutable smart bee algorithm

    Directory of Open Access Journals (Sweden)

    Mohammadreza Azimi

    2015-03-01

    Full Text Available In the current research, the unsteady two dimensional Graphene Oxide water based nanofluid heat transfer between two moving parallel plates is analyzed using an intelligent black-box identifier. The developed intelligent tool is known as evolvable evolutionary fuzzy inference system (EE-FIS which is based on the integration of low-level fuzzy programming and hyper-level evolutionary computing concepts. Here, the authors propose the use of a modified evolutionary algorithm (EA which is called hybrid genetic mutable smart bee algorithm (HGMSBA. The proposed HGMSBA is used to evolve both antecedent and consequent parts of fuzzy rule base. Besides, it tries to prune the rule base of fuzzy inference system (FIS to decrease its computational complexity and increase its interpretability. By considering the prediction error of the fuzzy identifier as the objective function of HGMSBA, an automatic soft interpolation machine is developed which can intuitively increase the robustness and accuracy of the final model. Here, HGMSBA-FIS is used to provide a nonlinear map between inputs, i.e. nanoparticles solid volume fraction (ϕ, Eckert number (Ec and a moving parameter which describes the movements of plates (S, and output, i.e. Nusselt number (Nu. Prior to proceeding with the modeling process, a comprehensive numerical comparative study is performed to investigate the potentials of the proposed model for nonlinear system identification. After demonstrating the efficacy of HGMSBA for training the FIS, the system is applied to the considered problem. Based on the obtained results, it can be inferred that the developed HGMSBA-FIS black-box identifier can be used as a very authentic tool with respect to accuracy and robustness. Besides, as the proposed black-box is not a physics-based identifier, it frees experts from the cumbersome mathematical formulations, and can be used for advanced real-time applications such as model-based control. The simulations

  9. Using XML to encode TMA DES metadata

    Directory of Open Access Journals (Sweden)

    Oliver Lyttleton

    2011-01-01

    Full Text Available Background: The Tissue Microarray Data Exchange Specification (TMA DES is an XML specification for encoding TMA experiment data. While TMA DES data is encoded in XML, the files that describe its syntax, structure, and semantics are not. The DTD format is used to describe the syntax and structure of TMA DES, and the ISO 11179 format is used to define the semantics of TMA DES. However, XML Schema can be used in place of DTDs, and another XML encoded format, RDF, can be used in place of ISO 11179. Encoding all TMA DES data and metadata in XML would simplify the development and usage of programs which validate and parse TMA DES data. XML Schema has advantages over DTDs such as support for data types, and a more powerful means of specifying constraints on data values. An advantage of RDF encoded in XML over ISO 11179 is that XML defines rules for encoding data, whereas ISO 11179 does not. Materials and Methods: We created an XML Schema version of the TMA DES DTD. We wrote a program that converted ISO 11179 definitions to RDF encoded in XML, and used it to convert the TMA DES ISO 11179 definitions to RDF. Results: We validated a sample TMA DES XML file that was supplied with the publication that originally specified TMA DES using our XML Schema. We successfully validated the RDF produced by our ISO 11179 converter with the W3C RDF validation service. Conclusions: All TMA DES data could be encoded using XML, which simplifies its processing. XML Schema allows datatypes and valid value ranges to be specified for CDEs, which enables a wider range of error checking to be performed using XML Schemas than could be performed using DTDs.

  10. Using XML to encode TMA DES metadata.

    Science.gov (United States)

    Lyttleton, Oliver; Wright, Alexander; Treanor, Darren; Lewis, Paul

    2011-01-01

    The Tissue Microarray Data Exchange Specification (TMA DES) is an XML specification for encoding TMA experiment data. While TMA DES data is encoded in XML, the files that describe its syntax, structure, and semantics are not. The DTD format is used to describe the syntax and structure of TMA DES, and the ISO 11179 format is used to define the semantics of TMA DES. However, XML Schema can be used in place of DTDs, and another XML encoded format, RDF, can be used in place of ISO 11179. Encoding all TMA DES data and metadata in XML would simplify the development and usage of programs which validate and parse TMA DES data. XML Schema has advantages over DTDs such as support for data types, and a more powerful means of specifying constraints on data values. An advantage of RDF encoded in XML over ISO 11179 is that XML defines rules for encoding data, whereas ISO 11179 does not. We created an XML Schema version of the TMA DES DTD. We wrote a program that converted ISO 11179 definitions to RDF encoded in XML, and used it to convert the TMA DES ISO 11179 definitions to RDF. We validated a sample TMA DES XML file that was supplied with the publication that originally specified TMA DES using our XML Schema. We successfully validated the RDF produced by our ISO 11179 converter with the W3C RDF validation service. All TMA DES data could be encoded using XML, which simplifies its processing. XML Schema allows datatypes and valid value ranges to be specified for CDEs, which enables a wider range of error checking to be performed using XML Schemas than could be performed using DTDs.

  11. Using XML to encode TMA DES metadata

    Science.gov (United States)

    Lyttleton, Oliver; Wright, Alexander; Treanor, Darren; Lewis, Paul

    2011-01-01

    Background: The Tissue Microarray Data Exchange Specification (TMA DES) is an XML specification for encoding TMA experiment data. While TMA DES data is encoded in XML, the files that describe its syntax, structure, and semantics are not. The DTD format is used to describe the syntax and structure of TMA DES, and the ISO 11179 format is used to define the semantics of TMA DES. However, XML Schema can be used in place of DTDs, and another XML encoded format, RDF, can be used in place of ISO 11179. Encoding all TMA DES data and metadata in XML would simplify the development and usage of programs which validate and parse TMA DES data. XML Schema has advantages over DTDs such as support for data types, and a more powerful means of specifying constraints on data values. An advantage of RDF encoded in XML over ISO 11179 is that XML defines rules for encoding data, whereas ISO 11179 does not. Materials and Methods: We created an XML Schema version of the TMA DES DTD. We wrote a program that converted ISO 11179 definitions to RDF encoded in XML, and used it to convert the TMA DES ISO 11179 definitions to RDF. Results: We validated a sample TMA DES XML file that was supplied with the publication that originally specified TMA DES using our XML Schema. We successfully validated the RDF produced by our ISO 11179 converter with the W3C RDF validation service. Conclusions: All TMA DES data could be encoded using XML, which simplifies its processing. XML Schema allows datatypes and valid value ranges to be specified for CDEs, which enables a wider range of error checking to be performed using XML Schemas than could be performed using DTDs. PMID:21969921

  12. Molecular mechanisms for protein-encoded inheritance

    Science.gov (United States)

    Wiltzius, Jed J. W.; Landau, Meytal; Nelson, Rebecca; Sawaya, Michael R.; Apostol, Marcin I.; Goldschmidt, Lukasz; Soriaga, Angela B.; Cascio, Duilio; Rajashankar, Kanagalaghatta; Eisenberg, David

    2013-01-01

    Strains are phenotypic variants, encoded by nucleic acid sequences in chromosomal inheritance and by protein “conformations” in prion inheritance and transmission. But how is a protein “conformation” stable enough to endure transmission between cells or organisms? Here new polymorphic crystal structures of segments of prion and other amyloid proteins offer structural mechanisms for prion strains. In packing polymorphism, prion strains are encoded by alternative packings (polymorphs) of β-sheets formed by the same segment of a protein; in a second mechanism, segmental polymorphism, prion strains are encoded by distinct β-sheets built from different segments of a protein. Both forms of polymorphism can produce enduring “conformations,” capable of encoding strains. These molecular mechanisms for transfer of information into prion strains share features with the familiar mechanism for transfer of information by nucleic acid inheritance, including sequence specificity and recognition by non-covalent bonds. PMID:19684598

  13. The prevalence of encoded digital trace evidence in the nonfile space of computer media(,) (.).

    Science.gov (United States)

    Garfinkel, Simson L

    2014-09-01

    Forensically significant digital trace evidence that is frequently present in sectors of digital media not associated with allocated or deleted files. Modern digital forensic tools generally do not decompress such data unless a specific file with a recognized file type is first identified, potentially resulting in missed evidence. Email addresses are encoded differently for different file formats. As a result, trace evidence can be categorized as Plain in File (PF), Encoded in File (EF), Plain Not in File (PNF), or Encoded Not in File (ENF). The tool bulk_extractor finds all of these formats, but other forensic tools do not. A study of 961 storage devices purchased on the secondary market and shows that 474 contained encoded email addresses that were not in files (ENF). Different encoding formats are the result of different application programs that processed different kinds of digital trace evidence. Specific encoding formats explored include BASE64, GZIP, PDF, HIBER, and ZIP. Published 2014. This article is a U.S. Government work and is in the public domain in the USA. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  14. Portable File Format (PFF) specifications

    Energy Technology Data Exchange (ETDEWEB)

    Dolan, Daniel H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-02-01

    Created at Sandia National Laboratories, the Portable File Format (PFF) allows binary data transfer across computer platforms. Although this capability is supported by many other formats, PFF files are still in use at Sandia, particularly in pulsed power research. This report provides detailed PFF specifications for accessing data without relying on legacy code.

  15. Extending DIRAC File Management with Erasure-Coding for efficient storage

    CERN Document Server

    Skipsey, Samuel Cadellin; Britton, David; Crooks, David; Roy, Gareth

    2015-01-01

    The state of the art in Grid style data management is to achieve increased resilience of data via multiple complete replicas of data files across multiple storage endpoints. While this is effective, it is not the most space-efficient approach to resilience, especially when the reliability of individual storage endpoints is sufficiently high that only a few will be inactive at any point in time. We report on work performed as part of GridPP\\cite{GridPP}, extending the Dirac File Catalogue and file management interface to allow the placement of erasure-coded files: each file distributed as N identically-sized chunks of data striped across a vector of storage endpoints, encoded such that any M chunks can be lost and the original file can be reconstructed. The tools developed are transparent to the user, and, as well as allowing up and downloading of data to Grid storage, also provide the possibility of parallelising access across all of the distributed chunks at once, improving data transfer and IO performance. ...

  16. File sharing

    NARCIS (Netherlands)

    van Eijk, N.

    2011-01-01

    File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural

  17. Encoding of coordination complexes with XML.

    Science.gov (United States)

    Vinoth, P; Sankar, P

    2017-09-01

    An in-silico system to encode structure, bonding and properties of coordination complexes is developed. The encoding is achieved through a semantic XML markup frame. Composition of the coordination complexes is captured in terms of central atom and ligands. Structural information of central atom is detailed in terms of electron status of valence electron orbitals. The ligands are encoded with specific reference to the electron environment of ligand centre atoms. Behaviour of ligands to form low or high spin complexes is accomplished by assigning a Ligand Centre Value to every ligand based on the electronic environment of ligand centre atom. Chemical ontologies are used for categorization purpose and to control different hybridization schemes. Complexes formed by the central atoms of transition metal, non-transition elements belonging to s-block, p-block and f-block are encoded with a generic encoding platform. Complexes of homoleptic, heteroleptic and bridged types are also covered by this encoding system. Utility of the encoded system to predict redox electron transfer reaction in the coordination complexes is demonstrated with a simple application. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Landscape encodings enhance optimization.

    Directory of Open Access Journals (Sweden)

    Konstantin Klemm

    Full Text Available Hard combinatorial optimization problems deal with the search for the minimum cost solutions (ground states of discrete systems under strong constraints. A transformation of state variables may enhance computational tractability. It has been argued that these state encodings are to be chosen invertible to retain the original size of the state space. Here we show how redundant non-invertible encodings enhance optimization by enriching the density of low-energy states. In addition, smooth landscapes may be established on encoded state spaces to guide local search dynamics towards the ground state.

  19. Landscape Encodings Enhance Optimization

    Science.gov (United States)

    Klemm, Konstantin; Mehta, Anita; Stadler, Peter F.

    2012-01-01

    Hard combinatorial optimization problems deal with the search for the minimum cost solutions (ground states) of discrete systems under strong constraints. A transformation of state variables may enhance computational tractability. It has been argued that these state encodings are to be chosen invertible to retain the original size of the state space. Here we show how redundant non-invertible encodings enhance optimization by enriching the density of low-energy states. In addition, smooth landscapes may be established on encoded state spaces to guide local search dynamics towards the ground state. PMID:22496860

  20. Blind encoding into qudits

    International Nuclear Information System (INIS)

    Shaari, J.S.; Wahiddin, M.R.B.; Mancini, S.

    2008-01-01

    We consider the problem of encoding classical information into unknown qudit states belonging to any basis, of a maximal set of mutually unbiased bases, by one party and then decoding by another party who has perfect knowledge of the basis. Working with qudits of prime dimensions, we point out a no-go theorem that forbids 'shift' operations on arbitrary unknown states. We then provide the necessary conditions for reliable encoding/decoding

  1. An encoding device and a method of encoding

    DEFF Research Database (Denmark)

    2012-01-01

    The present invention relates to an encoding device, such as an optical position encoder, for encoding input from an object, and a method for encoding input from an object, for determining a position of an object that interferes with light of the device. The encoding device comprises a light source...... in the area in the space and may interfere with the light, which interference may be encoded into a position or activation....

  2. Zebra: A striped network file system

    Science.gov (United States)

    Hartman, John H.; Ousterhout, John K.

    1992-01-01

    The design of Zebra, a striped network file system, is presented. Zebra applies ideas from log-structured file system (LFS) and RAID research to network file systems, resulting in a network file system that has scalable performance, uses its servers efficiently even when its applications are using small files, and provides high availability. Zebra stripes file data across multiple servers, so that the file transfer rate is not limited by the performance of a single server. High availability is achieved by maintaining parity information for the file system. If a server fails its contents can be reconstructed using the contents of the remaining servers and the parity information. Zebra differs from existing striped file systems in the way it stripes file data: Zebra does not stripe on a per-file basis; instead it stripes the stream of bytes written by each client. Clients write to the servers in units called stripe fragments, which are analogous to segments in an LFS. Stripe fragments contain file blocks that were written recently, without regard to which file they belong. This method of striping has numerous advantages over per-file striping, including increased server efficiency, efficient parity computation, and elimination of parity update.

  3. ACONC Files

    Data.gov (United States)

    U.S. Environmental Protection Agency — ACONC files containing simulated ozone and PM2.5 fields that were used to create the model difference plots shown in the journal article. This dataset is associated...

  4. XML Files

    Science.gov (United States)

    ... this page: https://medlineplus.gov/xml.html MedlinePlus XML Files To use the sharing features on this page, please enable JavaScript. MedlinePlus produces XML data sets that you are welcome to download ...

  5. 831 Files

    Data.gov (United States)

    Social Security Administration — SSA-831 file is a collection of initial and reconsideration adjudicative level DDS disability determinations. (A few hearing level cases are also present, but the...

  6. a permutation encoding te algorithm solution of reso tation encoding

    African Journals Online (AJOL)

    eobe

    Keywords: Genetic algorithm, resource constrained. 1. INTRODUCTION. 1. .... Nigerian Journal of Technology. Vol. 34, No. 1, January 2015. 128 ... 4. ENCODING OF CHROMOSOME. ENCODING OF CHROMOSOME .... International Multi conference of Engineers and ... method”, Naval Research Logistics, vol 48, issue 2,.

  7. Parallel encoders for pixel detectors

    International Nuclear Information System (INIS)

    Nikityuk, N.M.

    1991-01-01

    A new method of fast encoding and determining the multiplicity and coordinates of fired pixels is described. A specific example construction of parallel encodes and MCC for n=49 and t=2 is given. 16 refs.; 6 figs.; 2 tabs

  8. Progress report on a filed study of soil-to-plant transfer of radioactive caesium, strontium and zinc in tropical Northern Australia

    International Nuclear Information System (INIS)

    Twining, J.; McOrist, G.; Zawadzki, A.; Shotton, P.

    2000-09-01

    This report covers: background, study location, design and rationale, farming practice and application, climate monitoring, summaries of the results of chemical analyses, gamma spectrometry and other analyses performed on plants and soil samples and calculation of transfer factors. Comparison with data from the literature, and a brief discussion of the results and implications for the on-going study are also presented. A detailed evaluation of the results has not been performed at this stage as the study is in progress.The main general observations to date are as follows. Transfer factors for caesium (Cs) and strontium (Sr) are not substantially different from the expected values based on the earlier studies mainly within temperate climates. In contrast, the values for zinc (Zn) are more than an order of magnitude greater than anticipated. Most of the radioactivity added to the soils has been retained in the top 5 cm of both soils. There has been a general decline in decay-corrected radioactivity in soils but also an indication of increased heterogeneity in surface distribution. Additional sampling will be undertaken to address this issue

  9. Stealthy network transfer of data

    CSIR Research Space (South Africa)

    Veerasamy, N

    2007-11-01

    Full Text Available . If the hashing function is initially calculated on a file, small changes carried out on the file, and the hashing function applied once again on the file, a different key will be generated. It is conjectured that it is computationally infeasible to produce... a unified character system to represent all of these characters—hence, Unicode [7].Therefore, the data would be converted into its hexadecimal Unicode equivalent (to hide its content) which would later be encoded once again when the data...

  10. On-Board File Management and Its Application in Flight Operations

    Science.gov (United States)

    Kuo, N.

    1998-01-01

    In this paper, the author presents the minimum functions required for an on-board file management system. We explore file manipulation processes and demonstrate how the file transfer along with the file management system will be utilized to support flight operations and data delivery.

  11. Analysis of Program Obfuscation Schemes with Variable Encoding Technique

    Science.gov (United States)

    Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi

    Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.

  12. Selecting Operations for Assembler Encoding

    Directory of Open Access Journals (Sweden)

    Tomasz Praczyk

    2010-04-01

    Full Text Available Assembler Encoding is a neuro-evolutionary method in which a neural network is represented in the form of a simple program called Assembler Encoding Program. The task of the program is to create the so-called Network Definition Matrix which maintains all the information necessary to construct the network. To generate Assembler Encoding Programs and the subsequent neural networks evolutionary techniques are used.
    The performance of Assembler Encoding strongly depends on operations used in Assembler Encoding Programs. To select the most effective operations, experiments in the optimization and the predator-prey problem were carried out. In the experiments, Assembler Encoding Programs equipped with different types of operations were tested. The results of the tests are presented at the end of the paper.

  13. JENDL special purpose file

    International Nuclear Information System (INIS)

    Nakagawa, Tsuneo

    1995-01-01

    In JENDL-3,2, the data on all the reactions having significant cross section over the neutron energy from 0.01 meV to 20 MeV are given for 340 nuclides. The object range of application extends widely, such as the neutron engineering, shield and others of fast reactors, thermal neutron reactors and nuclear fusion reactors. This is a general purpose data file. On the contrary to this, the file in which only the data required for a specific application field are collected is called special purpose file. The file for dosimetry is a typical special purpose file. The Nuclear Data Center, Japan Atomic Energy Research Institute, is making ten kinds of JENDL special purpose files. The files, of which the working groups of Sigma Committee are in charge, are listed. As to the format of the files, ENDF format is used similarly to JENDL-3,2. Dosimetry file, activation cross section file, (α, n) reaction data file, fusion file, actinoid file, high energy data file, photonuclear data file, PKA/KERMA file, gas production cross section file and decay data file are described on their contents, the course of development and their verification. Dosimetry file and gas production cross section file have been completed already. As for the others, the expected time of completion is shown. When these files are completed, they are opened to the public. (K.I.)

  14. Evaluating standard terminologies for encoding allergy information.

    Science.gov (United States)

    Goss, Foster R; Zhou, Li; Plasek, Joseph M; Broverman, Carol; Robinson, George; Middleton, Blackford; Rocha, Roberto A

    2013-01-01

    Allergy documentation and exchange are vital to ensuring patient safety. This study aims to analyze and compare various existing standard terminologies for representing allergy information. Five terminologies were identified, including the Systemized Nomenclature of Medical Clinical Terms (SNOMED CT), National Drug File-Reference Terminology (NDF-RT), Medication Dictionary for Regulatory Activities (MedDRA), Unique Ingredient Identifier (UNII), and RxNorm. A qualitative analysis was conducted to compare desirable characteristics of each terminology, including content coverage, concept orientation, formal definitions, multiple granularities, vocabulary structure, subset capability, and maintainability. A quantitative analysis was also performed to compare the content coverage of each terminology for (1) common food, drug, and environmental allergens and (2) descriptive concepts for common drug allergies, adverse reactions (AR), and no known allergies. Our qualitative results show that SNOMED CT fulfilled the greatest number of desirable characteristics, followed by NDF-RT, RxNorm, UNII, and MedDRA. Our quantitative results demonstrate that RxNorm had the highest concept coverage for representing drug allergens, followed by UNII, SNOMED CT, NDF-RT, and MedDRA. For food and environmental allergens, UNII demonstrated the highest concept coverage, followed by SNOMED CT. For representing descriptive allergy concepts and adverse reactions, SNOMED CT and NDF-RT showed the highest coverage. Only SNOMED CT was capable of representing unique concepts for encoding no known allergies. The proper terminology for encoding a patient's allergy is complex, as multiple elements need to be captured to form a fully structured clinical finding. Our results suggest that while gaps still exist, a combination of SNOMED CT and RxNorm can satisfy most criteria for encoding common allergies and provide sufficient content coverage.

  15. HUD GIS Boundary Files

    Data.gov (United States)

    Department of Housing and Urban Development — The HUD GIS Boundary Files are intended to supplement boundary files available from the U.S. Census Bureau. The files are for community planners interested in...

  16. Fast probabilistic file fingerprinting for big data.

    Science.gov (United States)

    Tretyakov, Konstantin; Laur, Sven; Smant, Geert; Vilo, Jaak; Prins, Pjotr

    2013-01-01

    Biological data acquisition is raising new challenges, both in data analysis and handling. Not only is it proving hard to analyze the data at the rate it is generated today, but simply reading and transferring data files can be prohibitively slow due to their size. This primarily concerns logistics within and between data centers, but is also important for workstation users in the analysis phase. Common usage patterns, such as comparing and transferring files, are proving computationally expensive and are tying down shared resources. We present an efficient method for calculating file uniqueness for large scientific data files, that takes less computational effort than existing techniques. This method, called Probabilistic Fast File Fingerprinting (PFFF), exploits the variation present in biological data and computes file fingerprints by sampling randomly from the file instead of reading it in full. Consequently, it has a flat performance characteristic, correlated with data variation rather than file size. We demonstrate that probabilistic fingerprinting can be as reliable as existing hashing techniques, with provably negligible risk of collisions. We measure the performance of the algorithm on a number of data storage and access technologies, identifying its strengths as well as limitations. Probabilistic fingerprinting may significantly reduce the use of computational resources when comparing very large files. Utilisation of probabilistic fingerprinting techniques can increase the speed of common file-related workflows, both in the data center and for workbench analysis. The implementation of the algorithm is available as an open-source tool named pfff, as a command-line tool as well as a C library. The tool can be downloaded from http://biit.cs.ut.ee/pfff.

  17. Analysing and Comparing Encodability Criteria

    Directory of Open Access Journals (Sweden)

    Kirstin Peters

    2015-08-01

    Full Text Available Encodings or the proof of their absence are the main way to compare process calculi. To analyse the quality of encodings and to rule out trivial or meaningless encodings, they are augmented with quality criteria. There exists a bunch of different criteria and different variants of criteria in order to reason in different settings. This leads to incomparable results. Moreover it is not always clear whether the criteria used to obtain a result in a particular setting do indeed fit to this setting. We show how to formally reason about and compare encodability criteria by mapping them on requirements on a relation between source and target terms that is induced by the encoding function. In particular we analyse the common criteria full abstraction, operational correspondence, divergence reflection, success sensitiveness, and respect of barbs; e.g. we analyse the exact nature of the simulation relation (coupled simulation versus bisimulation that is induced by different variants of operational correspondence. This way we reduce the problem of analysing or comparing encodability criteria to the better understood problem of comparing relations on processes.

  18. 76 FR 16621 - Combined Notice of Filings #1

    Science.gov (United States)

    2011-03-24

    ... submits tariff filing per 35.13(a)(2)(iii: Crete Energy Venture, LLC Reactive Service Rate Schedule to be... Transfer Reactive Power Revenue Requirement to be effective 6/1/2011. Filed Date: 03/16/2011. Accession..., DC. There is an eSubscription link on the Web site that enables subscribers to receive e-mail...

  19. Provider of Services File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The POS file consists of two data files, one for CLIA labs and one for 18 other provider types. The file names are CLIA and OTHER. If downloading the file, note it...

  20. PC Graphic file programing

    International Nuclear Information System (INIS)

    Yang, Jin Seok

    1993-04-01

    This book gives description of basic of graphic knowledge and understanding and realization of graphic file form. The first part deals with graphic with graphic data, store of graphic data and compress of data, programing language such as assembling, stack, compile and link of program and practice and debugging. The next part mentions graphic file form such as Mac paint file, GEM/IMG file, PCX file, GIF file, and TIFF file, consideration of hardware like mono screen driver and color screen driver in high speed, basic conception of dithering and conversion of formality.

  1. Multidimensionally encoded magnetic resonance imaging.

    Science.gov (United States)

    Lin, Fa-Hsuan

    2013-07-01

    Magnetic resonance imaging (MRI) typically achieves spatial encoding by measuring the projection of a q-dimensional object over q-dimensional spatial bases created by linear spatial encoding magnetic fields (SEMs). Recently, imaging strategies using nonlinear SEMs have demonstrated potential advantages for reconstructing images with higher spatiotemporal resolution and reducing peripheral nerve stimulation. In practice, nonlinear SEMs and linear SEMs can be used jointly to further improve the image reconstruction performance. Here, we propose the multidimensionally encoded (MDE) MRI to map a q-dimensional object onto a p-dimensional encoding space where p > q. MDE MRI is a theoretical framework linking imaging strategies using linear and nonlinear SEMs. Using a system of eight surface SEM coils with an eight-channel radiofrequency coil array, we demonstrate the five-dimensional MDE MRI for a two-dimensional object as a further generalization of PatLoc imaging and O-space imaging. We also present a method of optimizing spatial bases in MDE MRI. Results show that MDE MRI with a higher dimensional encoding space can reconstruct images more efficiently and with a smaller reconstruction error when the k-space sampling distribution and the number of samples are controlled. Copyright © 2012 Wiley Periodicals, Inc.

  2. TRANSFERENCE BEFORE TRANSFERENCE.

    Science.gov (United States)

    Bonaminio, Vincenzo

    2017-10-01

    This paper is predominantly a clinical presentation that describes the transmigration of one patient's transference to another, with the analyst functioning as a sort of transponder. It involves an apparently accidental episode in which there was an unconscious intersection between two patients. The author's aim is to show how transference from one case may affect transference in another, a phenomenon the author calls transference before transference. The author believes that this idea may serve as a tool for understanding the unconscious work that takes place in the clinical situation. In a clinical example, the analyst finds himself caught up in an enactment involving two patients in which he becomes the medium of what happens in session. © 2017 The Psychoanalytic Quarterly, Inc.

  3. Virally encoded 7TM receptors

    DEFF Research Database (Denmark)

    Rosenkilde, M M; Waldhoer, M; Lüttichau, H R

    2001-01-01

    expression of this single gene in certain lymphocyte cell lineages leads to the development of lesions which are remarkably similar to Kaposi's sarcoma, a human herpesvirus 8 associated disease. Thus, this and other virally encoded 7TM receptors appear to be attractive future drug targets.......A number of herpes- and poxviruses encode 7TM G-protein coupled receptors most of which clearly are derived from their host chemokine system as well as induce high expression of certain 7TM receptors in the infected cells. The receptors appear to be exploited by the virus for either immune evasion...

  4. Fast probabilistic file fingerprinting for big data

    NARCIS (Netherlands)

    Tretjakov, K.; Laur, S.; Smant, G.; Vilo, J.; Prins, J.C.P.

    2013-01-01

    Background: Biological data acquisition is raising new challenges, both in data analysis and handling. Not only is it proving hard to analyze the data at the rate it is generated today, but simply reading and transferring data files can be prohibitively slow due to their size. This primarily

  5. File compression and encryption based on LLS and arithmetic coding

    Science.gov (United States)

    Yu, Changzhi; Li, Hengjian; Wang, Xiyu

    2018-03-01

    e propose a file compression model based on arithmetic coding. Firstly, the original symbols, to be encoded, are input to the encoder one by one, we produce a set of chaotic sequences by using the Logistic and sine chaos system(LLS), and the values of this chaotic sequences are randomly modified the Upper and lower limits of current symbols probability. In order to achieve the purpose of encryption, we modify the upper and lower limits of all character probabilities when encoding each symbols. Experimental results show that the proposed model can achieve the purpose of data encryption while achieving almost the same compression efficiency as the arithmetic coding.

  6. Holovideo: Real-time 3D range video encoding and decoding on GPU

    Science.gov (United States)

    Karpinsky, Nikolaus; Zhang, Song

    2012-02-01

    We present a 3D video-encoding technique called Holovideo that is capable of encoding high-resolution 3D videos into standard 2D videos, and then decoding the 2D videos back into 3D rapidly without significant loss of quality. Due to the nature of the algorithm, 2D video compression such as JPEG encoding with QuickTime Run Length Encoding (QTRLE) can be applied with little quality loss, resulting in an effective way to store 3D video at very small file sizes. We found that under a compression ratio of 134:1, Holovideo to OBJ file format, the 3D geometry quality drops at a negligible level. Several sets of 3D videos were captured using a structured light scanner, compressed using the Holovideo codec, and then uncompressed and displayed to demonstrate the effectiveness of the codec. With the use of OpenGL Shaders (GLSL), the 3D video codec can encode and decode in realtime. We demonstrated that for a video size of 512×512, the decoding speed is 28 frames per second (FPS) with a laptop computer using an embedded NVIDIA GeForce 9400 m graphics processing unit (GPU). Encoding can be done with this same setup at 18 FPS, making this technology suitable for applications such as interactive 3D video games and 3D video conferencing.

  7. AliEnFS - a Linux File System for the AliEn Grid Services

    OpenAIRE

    Peters, Andreas J.; Saiz, P.; Buncic, P.

    2003-01-01

    Among the services offered by the AliEn (ALICE Environment http://alien.cern.ch) Grid framework there is a virtual file catalogue to allow transparent access to distributed data-sets using various file transfer protocols. $alienfs$ (AliEn File System) integrates the AliEn file catalogue as a new file system type into the Linux kernel using LUFS, a hybrid user space file system framework (Open Source http://lufs.sourceforge.net). LUFS uses a special kernel interface level called VFS (Virtual F...

  8. The mitochondrial gene encoding ribosomal protein S12 has been translocated to the nuclear genome in Oenothera.

    Science.gov (United States)

    Grohmann, L; Brennicke, A; Schuster, W

    1992-01-01

    The Oenothera mitochondrial genome contains only a gene fragment for ribosomal protein S12 (rps12), while other plants encode a functional gene in the mitochondrion. The complete Oenothera rps12 gene is located in the nucleus. The transit sequence necessary to target this protein to the mitochondrion is encoded by a 5'-extension of the open reading frame. Comparison of the amino acid sequence encoded by the nuclear gene with the polypeptides encoded by edited mitochondrial cDNA and genomic sequences of other plants suggests that gene transfer between mitochondrion and nucleus started from edited mitochondrial RNA molecules. Mechanisms and requirements of gene transfer and activation are discussed. Images PMID:1454526

  9. Decay data file based on the ENSDF file

    Energy Technology Data Exchange (ETDEWEB)

    Katakura, J. [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    1997-03-01

    A decay data file with the JENDL (Japanese Evaluated Nuclear Data Library) format based on the ENSDF (Evaluated Nuclear Structure Data File) file was produced as a tentative one of special purpose files of JENDL. The problem using the ENSDF file as primary source data of the JENDL decay data file is presented. (author)

  10. A 10 Gbit/s OCDMA system based on electric encoding and optical transmission

    Science.gov (United States)

    Li, Chuan-qi; Hu, Jin-lin; He, Dong-dong; Chen, Mei-juan; Wang, Da-chi; Chen, Yan

    2013-11-01

    An electric encoded/optical transmission system of code division multiple access (CDMA) is proposed. It encodes the user signal in electric domain, and transfers the different code slice signals via the different wavelengths of light. This electric domain encoder/decoder is compared with current traditional encoder/decoder. Four-user modulation/demodulation optical CDMA (OCDMA) system with rate of 2.5 Gbit/s is simulated, which is based on the optical orthogonal code (OCC) designed in our laboratory. The results show that the structure of electric encoding/optical transmission can encode/decode signal correctly, and can achieve the chip rate equal to the user data rate. It can overcome the rate limitation of electronic bottleneck, and bring some potential applications in the electro-optical OCDMA system.

  11. UPIN Group File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Group Unique Physician Identifier Number (UPIN) File is the business entity file that contains the group practice UPIN and descriptive information. It does NOT...

  12. CryptoCache: A Secure Sharable File Cache for Roaming Users

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2000-01-01

    . Conventional distributed file systems cache everything locally or not at all; there is no possibility to cache files on nearby nodes.In this paper we present the design of a secure cache system called CryptoCache that allows roaming users to cache files on untrusted file hosting servers. The system allows...... flexible sharing of cached files among unauthenticated users, i.e. unlike most distributed file systems CryptoCache does not require a global authentication framework.Files are encrypted when they are transferred over the network and while stored on untrusted servers. The system uses public key......Small mobile computers are now sufficiently powerful to run many applications, but storage capacity remains limited so working files cannot be cached or stored locally. Even if files can be stored locally, the mobile device is not powerful enough to act as server in collaborations with other users...

  13. Environmental Baseline File National Transportation

    International Nuclear Information System (INIS)

    Harris, M.

    1999-01-01

    This Environmental Baseline File summarizes and consolidates information related to the national-level transportation of commercial spent nuclear fuel. Topics addressed include: shipments of commercial spent nuclear fuel based on mostly truck and mostly rail shipping scenarios; transportation routing for commercial spent nuclear fuel sites and DOE sites; radionuclide inventories for various shipping container capacities; transportation routing; populations along transportation routes; urbanized area population densities; the impacts of historical, reasonably foreseeable, and general transportation; state-level food transfer factors; Federal Guidance Report No. 11 and 12 radionuclide dose conversion factors; and national average atmospheric conditions

  14. PCF File Format.

    Energy Technology Data Exchange (ETDEWEB)

    Thoreson, Gregory G [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    PCF files are binary files designed to contain gamma spectra and neutron count rates from radiation sensors. It is the native format for the GAmma Detector Response and Analysis Software (GADRAS) package [1]. It can contain multiple spectra and information about each spectrum such as energy calibration. This document outlines the format of the file that would allow one to write a computer program to parse and write such files.

  15. Encoding information into precipitation structures

    International Nuclear Information System (INIS)

    Martens, Kirsten; Bena, Ioana; Droz, Michel; Rácz, Zoltan

    2008-01-01

    Material design at submicron scales would be profoundly affected if the formation of precipitation patterns could be easily controlled. It would allow the direct building of bulk structures, in contrast to traditional techniques which consist of removing material in order to create patterns. Here, we discuss an extension of our recent proposal of using electrical currents to control precipitation bands which emerge in the wake of reaction fronts in A + + B – → C reaction–diffusion processes. Our main result, based on simulating the reaction–diffusion–precipitation equations, is that the dynamics of the charged agents can be guided by an appropriately designed time-dependent electric current so that, in addition to the control of the band spacing, the width of the precipitation bands can also be tuned. This makes straightforward the encoding of information into precipitation patterns and, as an amusing example, we demonstrate the feasibility by showing how to encode a musical rhythm

  16. A File Archival System

    Science.gov (United States)

    Fanselow, J. L.; Vavrus, J. L.

    1984-01-01

    ARCH, file archival system for DEC VAX, provides for easy offline storage and retrieval of arbitrary files on DEC VAX system. System designed to eliminate situations that tie up disk space and lead to confusion when different programers develop different versions of same programs and associated files.

  17. Text File Comparator

    Science.gov (United States)

    Kotler, R. S.

    1983-01-01

    File Comparator program IFCOMP, is text file comparator for IBM OS/VScompatable systems. IFCOMP accepts as input two text files and produces listing of differences in pseudo-update form. IFCOMP is very useful in monitoring changes made to software at the source code level.

  18. High performance data transfer

    Science.gov (United States)

    Cottrell, R.; Fang, C.; Hanushevsky, A.; Kreuger, W.; Yang, W.

    2017-10-01

    The exponentially increasing need for high speed data transfer is driven by big data, and cloud computing together with the needs of data intensive science, High Performance Computing (HPC), defense, the oil and gas industry etc. We report on the Zettar ZX software. This has been developed since 2013 to meet these growing needs by providing high performance data transfer and encryption in a scalable, balanced, easy to deploy and use way while minimizing power and space utilization. In collaboration with several commercial vendors, Proofs of Concept (PoC) consisting of clusters have been put together using off-the- shelf components to test the ZX scalability and ability to balance services using multiple cores, and links. The PoCs are based on SSD flash storage that is managed by a parallel file system. Each cluster occupies 4 rack units. Using the PoCs, between clusters we have achieved almost 200Gbps memory to memory over two 100Gbps links, and 70Gbps parallel file to parallel file with encryption over a 5000 mile 100Gbps link.

  19. 31 CFR 585.305 - Transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transfer. 585.305 Section 585.305 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN... agent, trustee, or fiduciary; the creation or transfer of any lien; the issuance, docketing, filing, or...

  20. 31 CFR 593.310 - Transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transfer. 593.310 Section 593.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN..., trustee, or fiduciary; the creation or transfer of any lien; the issuance, docketing, filing, or levy of...

  1. 31 CFR 545.312 - Transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transfer. 545.312 Section 545.312 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN...; the creation or transfer of any lien; the issuance, docketing, filing, or levy of or under any...

  2. 31 CFR 598.316 - Transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transfer. 598.316 Section 598.316 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN..., trustee, or fiduciary; the creation or transfer of any lien; the issuance, docketing, filing, or levy of...

  3. 31 CFR 547.309 - Transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transfer. 547.309 Section 547.309 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN...; the creation or transfer of any lien; the issuance, docketing, filing, or levy of or under any...

  4. 31 CFR 536.314 - Transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transfer. 536.314 Section 536.314 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN...; the creation or transfer of any lien; the issuance, docketing, filing, or levy of or under any...

  5. 31 CFR 515.310 - Transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transfer. 515.310 Section 515.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN..., or other fiduciary; the creation or transfer of any lien; the issuance, docketing, filing, or the...

  6. 31 CFR 594.312 - Transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transfer. 594.312 Section 594.312 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN... creation or transfer of any lien; the issuance, docketing, filing, or levy of or under any judgment, decree...

  7. 31 CFR 535.310 - Transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transfer. 535.310 Section 535.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN..., or fiduciary; the creation or transfer of any lien; the issuance, docketing, filing, or the levy of...

  8. 31 CFR 597.317 - Transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transfer. 597.317 Section 597.317 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN...; the creation or transfer of any lien; the issuance, docketing, filing, or levy of or under any...

  9. 31 CFR 575.317 - Transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transfer. 575.317 Section 575.317 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN..., or fiduciary; the creation or transfer of any lien; the issuance, docketing, filing, or the levy of...

  10. 31 CFR 543.309 - Transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transfer. 543.309 Section 543.309 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN... creation or transfer of any lien; the issuance, docketing, filing, or levy of or under any judgment, decree...

  11. 31 CFR 588.309 - Transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transfer. 588.309 Section 588.309 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN... creation or transfer of any lien; the issuance, docketing, filing, or levy of or under any judgment, decree...

  12. 31 CFR 500.310 - Transfer.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transfer. 500.310 Section 500.310 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN..., or other fiduciary; the creation or transfer of any lien; the issuance, docketing, filing, or the...

  13. The Jade File System. Ph.D. Thesis

    Science.gov (United States)

    Rao, Herman Chung-Hwa

    1991-01-01

    design. The prototype consists of interfaces to the Unix File System, the Sun Network File System, and the File Transfer Protocol.

  14. Hall effect encoding of brushless dc motors

    Science.gov (United States)

    Berard, C. A.; Furia, T. J.; Goldberg, E. A.; Greene, R. C.

    1970-01-01

    Encoding mechanism integral to the motor and using the permanent magnets embedded in the rotor eliminates the need for external devices to encode information relating the position and velocity of the rotating member.

  15. A SSVEP Stimuli Encoding Method Using Trinary Frequency-Shift Keying Encoded SSVEP (TFSK-SSVEP

    Directory of Open Access Journals (Sweden)

    Xing Zhao

    2017-06-01

    Full Text Available SSVEP is a kind of BCI technology with advantage of high information transfer rate. However, due to its nature, frequencies could be used as stimuli are scarce. To solve such problem, a stimuli encoding method which encodes SSVEP signal using Frequency Shift–Keying (FSK method is developed. In this method, each stimulus is controlled by a FSK signal which contains three different frequencies that represent “Bit 0,” “Bit 1” and “Bit 2” respectively. Different to common BFSK in digital communication, “Bit 0” and “Bit 1” composited the unique identifier of stimuli in binary bit stream form, while “Bit 2” indicates the ending of a stimuli encoding. EEG signal is acquired on channel Oz, O1, O2, Pz, P3, and P4, using ADS1299 at the sample rate of 250 SPS. Before original EEG signal is quadrature demodulated, it is detrended and then band-pass filtered using FFT-based FIR filtering to remove interference. Valid peak of the processed signal is acquired by calculating its derivative and converted into bit stream using window method. Theoretically, this coding method could implement at least 2n−1 (n is the length of bit command stimulus while keeping the ITR the same. This method is suitable to implement stimuli on a monitor and where the frequency and phase could be used to code stimuli is limited as well as implementing portable BCI devices which is not capable of performing complex calculations.

  16. Flipped-Adversarial AutoEncoders

    OpenAIRE

    Zhang, Jiyi; Dang, Hung; Lee, Hwee Kuan; Chang, Ee-Chien

    2018-01-01

    We propose a flipped-Adversarial AutoEncoder (FAAE) that simultaneously trains a generative model G that maps an arbitrary latent code distribution to a data distribution and an encoder E that embodies an "inverse mapping" that encodes a data sample into a latent code vector. Unlike previous hybrid approaches that leverage adversarial training criterion in constructing autoencoders, FAAE minimizes re-encoding errors in the latent space and exploits adversarial criterion in the data space. Exp...

  17. Transfer Pricing - An Innovative Approach

    Directory of Open Access Journals (Sweden)

    Ramona MAXIM

    2017-06-01

    Full Text Available This paper presents transfer pricing and elements of drafting the transfer pricing file by the big companies. The transfer pricing procedure was founded based upon Order no. 442/2016 and the Fiscal Procedure Code and it represents a method upon which the tax base is transferred from a high tax country to a country with low taxation. This legislation outlines the conditions which companies must observe in order to draft the transfer pricing documentation and the significance thresholds. The purpose to draft a transfer pricing file is to reduce the differences between prices and market value and the actual results of company taxation. Economic double taxation occurs when tax authorities apply price adjustments because the company did not respect the principle of market value. Keeping records of transfer pricing and practicing a price aligned to market requirements contribute to an understanding of business development and the creation of appropriate tax planning. Taking into account all these aspects and the fact that any taxpayer is tempted to pay the lowest possible fees, tax havens become an option. In this context we can speak of a tax haven as a loophole in the use of the market price.

  18. Divided attention reduces resistance to distraction at encoding but not retrieval.

    Science.gov (United States)

    Weeks, Jennifer C; Hasher, Lynn

    2017-08-01

    Older adults show implicit memory for previously seen distraction, an effect attributed to poor attentional control. It is unclear whether this effect results from lack of control over encoding during the distraction task, lack of retrieval constraint during the test task, or both. In the present study, we simulated poor distraction control in young adults using divided attention at encoding, at retrieval, at both times, or not at all. The encoding task was a 1-back task on pictures with distracting superimposed letter strings, some of which were words. The retrieval task was a word fragment completion task testing implicit memory for the distracting words. Attention was divided using an auditory odd digit detection task. Dividing attention at encoding, but not at retrieval, resulted in significant priming for distraction, which suggests that control over encoding processes is a primary determinant of distraction transfer in populations with low inhibitory control (e.g. older adults).

  19. Biomolecule-to-fluorescent-color encoder: modulation of fluorescence emission via DNA structural changes

    Science.gov (United States)

    Nishimura, Takahiro; Ogura, Yusuke; Yamada, Kenji; Ohno, Yuko; Tanida, Jun

    2014-01-01

    A biomolecule-to-fluorescent-color (B/F) encoder for optical readout of biomolecular information is proposed. In the B/F encoder, a set of fluorescence wavelengths and their intensity levels are used for coding of a biomolecular signal. A hybridization chain reaction of hairpin DNAs labeled with fluorescent reporters was performed to generate the fluorescence color codes. The fluorescence is modulated via fluorescence resonance energy transfer, which is controlled by DNA structural changes. The results demonstrate that fluorescent color codes can be configured based on two wavelengths and five intensities using the B/F encoder, and the assigned codes can be retrieved via fluorescence measurements. PMID:25071950

  20. Entanglement transfer between bipartite systems

    International Nuclear Information System (INIS)

    Bougouffa, Smail; Ficek, Zbigniew

    2012-01-01

    The problem of a controlled transfer of an entanglement initially encoded into two two-level atoms that are successively sent through two single-mode cavities is investigated. The atoms and the cavity modes form a four-qubit system and we demonstrate the conditions under which the initial entanglement encoded into the atoms can be completely transferred to other pairs of qubits. We find that in the case of non-zero detuning between the atomic transition frequencies and the cavity mode frequencies, no complete transfer of the initial entanglement is possible to any of the other pairs of qubits. In the case of exact resonance and equal coupling strengths of the atoms to the cavity modes, an initial maximally entangled state of the atoms can be completely transferred to the cavity modes. Complete transfer of the entanglement is restricted to the cavity modes, with transfer to the other pairs being limited to 50%. We find that complete transfer of an initial entanglement to other pairs of qubits may take place if the initial state is not the maximally entangled state and the atoms couple to the cavity modes with unequal strengths. Depending on the ratio between the coupling strengths, optimal entanglement can be created between the atoms and one of the cavity modes.

  1. Source Reference File

    Data.gov (United States)

    Social Security Administration — This file contains a national set of names and contact information for doctors, hospitals, clinics, and other facilities (known collectively as sources) from which...

  2. Patient Assessment File (PAF)

    Data.gov (United States)

    Department of Veterans Affairs — The Patient Assessment File (PAF) database compiles the results of the Patient Assessment Instrument (PAI) questionnaire filled out for intermediate care Veterans...

  3. RRB Earnings File (RRBERN)

    Data.gov (United States)

    Social Security Administration — RRBERN contains records for all beneficiaries on the RRB's PSSVES file who's SSNs are validated through the SVES processing. Validated output is processed through...

  4. Tagging, Encoding, and Jones Optimality

    DEFF Research Database (Denmark)

    Danvy, Olivier; Lopez, Pablo E. Martinez

    2003-01-01

    A partial evaluator is said to be Jones-optimal if the result of specializing a self-interpreter with respect to a source program is textually identical to the source program, modulo renaming. Jones optimality has already been obtained if the self-interpreter is untyped. If the selfinterpreter...... is typed, however, residual programs are cluttered with type tags. To obtain the original source program, these tags must be removed. A number of sophisticated solutions have already been proposed. We observe, however, that with a simple representation shift, ordinary partial evaluation is already Jones......-optimal, modulo an encoding. The representation shift amounts to reading the type tags as constructors for higherorder abstract syntax. We substantiate our observation by considering a typed self-interpreter whose input syntax is higher-order. Specializing this interpreter with respect to a source program yields...

  5. 76 FR 62092 - Filing Procedures

    Science.gov (United States)

    2011-10-06

    ... INTERNATIONAL TRADE COMMISSION Filing Procedures AGENCY: International Trade Commission. ACTION: Notice of issuance of Handbook on Filing Procedures. SUMMARY: The United States International Trade Commission (``Commission'') is issuing a Handbook on Filing Procedures to replace its Handbook on Electronic...

  6. Emotional arousal and memory after deep encoding.

    Science.gov (United States)

    Leventon, Jacqueline S; Camacho, Gabriela L; Ramos Rojas, Maria D; Ruedas, Angelica

    2018-05-22

    Emotion often enhances long-term memory. One mechanism for this enhancement is heightened arousal during encoding. However, reducing arousal, via emotion regulation (ER) instructions, has not been associated with reduced memory. In fact, the opposite pattern has been observed: stronger memory for emotional stimuli encoded with an ER instruction to reduce arousal. This pattern may be due to deeper encoding required by ER instructions. In the current research, we examine the effects of emotional arousal and deep-encoding on memory across three studies. In Study 1, adult participants completed a writing task (deep-encoding) for encoding negative, neutral, and positive picture stimuli, whereby half the emotion stimuli had the ER instruction to reduce the emotion. Memory was strong across conditions, and no memory enhancement was observed for any condition. In Study 2, adult participants completed the same writing task as Study 1, as well as a shallow-encoding task for one-third of negative, neutral, and positive trials. Memory was strongest for deep vs. shallow encoding trials, with no effects of emotion or ER instruction. In Study 3, adult participants completed a shallow-encoding task for negative, neutral, and positive stimuli, with findings indicating enhanced memory for negative emotional stimuli. Findings suggest that deep encoding must be acknowledged as a source of memory enhancement when examining manipulations of emotion-related arousal. Copyright © 2018. Published by Elsevier B.V.

  7. NASA ARCH- A FILE ARCHIVAL SYSTEM FOR THE DEC VAX

    Science.gov (United States)

    Scott, P. J.

    1994-01-01

    The function of the NASA ARCH system is to provide a permanent storage area for files that are infrequently accessed. The NASA ARCH routines were designed to provide a simple mechanism by which users can easily store and retrieve files. The user treats NASA ARCH as the interface to a black box where files are stored. There are only five NASA ARCH user commands, even though NASA ARCH employs standard VMS directives and the VAX BACKUP utility. Special care is taken to provide the security needed to insure file integrity over a period of years. The archived files may exist in any of three storage areas: a temporary buffer, the main buffer, and a magnetic tape library. When the main buffer fills up, it is transferred to permanent magnetic tape storage and deleted from disk. Files may be restored from any of the three storage areas. A single file, multiple files, or entire directories can be stored and retrieved. archived entities hold the same name, extension, version number, and VMS file protection scheme as they had in the user's account prior to archival. NASA ARCH is capable of handling up to 7 directory levels. Wildcards are supported. User commands include TEMPCOPY, DISKCOPY, DELETE, RESTORE, and DIRECTORY. The DIRECTORY command searches a directory of savesets covering all three archival areas, listing matches according to area, date, filename, or other criteria supplied by the user. The system manager commands include 1) ARCHIVE- to transfer the main buffer to duplicate magnetic tapes, 2) REPORTto determine when the main buffer is full enough to archive, 3) INCREMENT- to back up the partially filled main buffer, and 4) FULLBACKUP- to back up the entire main buffer. On-line help files are provided for all NASA ARCH commands. NASA ARCH is written in DEC VAX DCL for interactive execution and has been implemented on a DEC VAX computer operating under VMS 4.X. This program was developed in 1985.

  8. Datacube Interoperability, Encoding Independence, and Analytics

    Science.gov (United States)

    Baumann, Peter; Hirschorn, Eric; Maso, Joan

    2017-04-01

    representations. Further, CIS 1.1 offers a unified model for any kind of regular and irregular grids, also allowing sensor models as per SensorML. Encodings include ASCII formats like GML, JSON, RDF as well as binary formats like GeoTIFF, NetCDF, JPEG2000, and GRIB2; further, a container concept allows mixed representations within one coverage file utilizing zip or other convenient package formats. Through the tight integration with the Sensor Web Enablement (SWE), a lossless "transport" from sensor into coverage world is ensured. The corresponding service model of WCS supports datacube operations ranging from simple data extraction to complex ad-hoc analytics with WPCS. Notably, W3C is working has set out on a coverage model as well; it has been designed relatively independently from the abovementioned standards, but there is informal agreement to link it into the CIS universe (which allows for different, yet interchangeable representations). Particularly interesting in the W3C proposal is the detailed semantic modeling of metadata; as CIS 1.1 supports RDF, a tight coupling seems feasible.

  9. FHEO Filed Cases

    Data.gov (United States)

    Department of Housing and Urban Development — The dataset is a list of all the Title VIII fair housing cases filed by FHEO from 1/1/2007 - 12/31/2012 including the case number, case name, filing date, state and...

  10. NMDA receptors and memory encoding.

    Science.gov (United States)

    Morris, Richard G M

    2013-11-01

    It is humbling to think that 30 years have passed since the paper by Collingridge, Kehl and McLennan showing that one of Jeff Watkins most interesting compounds, R-2-amino-5-phosphonopentanoate (d-AP5), blocked the induction of long-term potentiation in vitro at synapses from area CA3 of the hippocampus to CA1 without apparent effect on baseline synaptic transmission (Collingridge et al., 1983). This dissociation was one of the key triggers for an explosion of interest in glutamate receptors, and much has been discovered since that collectively contributes to our contemporary understanding of glutamatergic synapses - their biophysics and subunit composition, of the agonists and antagonists acting on them, and their diverse functions in different networks of the brain and spinal cord. It can be fairly said that Collingridge et al.'s (1983) observation was the stimulus that has led, on the one hand, to structural biological work at the atomic scale describing the key features of NMDA receptors that enables their coincidence function to happen; and, on the other, to work with whole animals investigating the contributions that calcium signalling via this receptor can have on rhythmical activities controlled by spinal circuits, memory encoding in the hippocampus (the topic of this article), visual cortical plasticity, sensitization in pain, and other functions. In this article, I lay out how my then interest in long-term potentiation (LTP) as a model of memory enabled me to recognise the importance of Collingridge et al.'s discovery - and how I and my colleagues endeavoured to take things forward in the area of learning and memory. This is in some respects a personal story, and I tell it as such. The idea that NMDA receptor activation is essential for memory encoding, though not for storage, took time to develop and to be accepted. Along the way, there have been confusions, challenges, and surprises surrounding the idea that activation of NMDA receptors can

  11. Encoder designed to work in harsh environments

    Energy Technology Data Exchange (ETDEWEB)

    Toop, L.

    2007-05-15

    Dynapar has developed the Acuro AX71 absolute encoder for use on offshore or land-based oil rig operations. It provides feedback on the operation of automated systems such as draw works, racking systems, rotary tables and top drives. By ensuring that automated systems function properly, this encoder responds to a need by the oil and gas industry to keep workers safe and improve efficiency, particularly for operations in rugged situations. The encoder provides feedback from motor systems to controllers, giving information about position and speed of downhole drill bits. This newly developed encoder is better than commonly used incremental encoders which are not precise in strong electrical noise environments. Rather, the absolute encoder uses a different method of reporting to the controller. A digital signal is transmitted constantly as the device operates. It is less susceptible to noise issues. It is highly accurate, tolerant of noise and is not affected by power outages. However, the absolute encoder is generally more delicate in drilling applications with high ambient temperatures and shock levels. Dynapar addressed this issue by developing compact stainless steel housing that is useful for corrosion resistance in marine applications. The AX71 absolute encoder can withstand up to 100 G of mechanical shock and ambient temperatures of up to 60 degrees C. The encoder is ATEX certified without barriers, and offers the high resolution feedback of 4,000 counts of multiturn rotation and 16,000 counts of position. 1 fig.

  12. Heat transfer

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Heat transfer. Heat conduction in solid slab. Convective heat transfer. Non-linear temperature. variation due to flow. HEAT FLUX AT SURFACE. conduction/diffusion.

  13. Heat transfer

    International Nuclear Information System (INIS)

    Saad, M.A.

    1985-01-01

    Heat transfer takes place between material systems as a result of a temperature difference. The transmission process involves energy conversions governed by the first and second laws of thermodynamics. The heat transfer proceeds from a high-temperature region to a low-temperature region, and because of the finite thermal potential, there is an increase in entropy. Thermodynamics, however, is concerned with equilibrium states, which includes thermal equilibrium, irrespective of the time necessary to attain these equilibrium states. But heat transfer is a result of thermal nonequilibrium conditions, therefore, the laws of thermodynamics alone cannot describe completely the heat transfer process. In practice, most engineering problems are concerned with the rate of heat transfer rather than the quantity of heat being transferred. Resort then is directed to the particular laws governing the transfer of heat. There are three distinct modes of heat transfer: conduction, convection, and radiation. Although these modes are discussed separately, all three types may occur simultaneously

  14. Transfer Pricing

    DEFF Research Database (Denmark)

    Nielsen, Søren Bo

    2014-01-01

    Against a background of rather mixed evidence about transfer pricing practices in multinational enterprises (MNEs) and varying attitudes on the part of tax authorities, this paper explores how multiple aims in transfer pricing can be pursued across four different transfer pricing regimes. A MNE h...

  15. Coupled generative adversarial stacked Auto-encoder: CoGASA.

    Science.gov (United States)

    Kiasari, Mohammad Ahangar; Moirangthem, Dennis Singh; Lee, Minho

    2018-04-01

    Coupled Generative Adversarial Network (CoGAN) was recently introduced in order to model a joint distribution of a multi modal dataset. The CoGAN model lacks the capability to handle noisy data as well as it is computationally expensive and inefficient for practical applications such as cross-domain image transformation. In this paper, we propose a new method, named the Coupled Generative Adversarial Stacked Auto-encoder (CoGASA), to directly transfer data from one domain to another domain with robustness to noise in the input data as well to as reduce the computation time. We evaluate the proposed model using MNIST and the Large-scale CelebFaces Attributes (CelebA) datasets, and the results demonstrate a highly competitive performance. Our proposed models can easily transfer images into the target domain with minimal effort. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. Arranging and finding folders and files on your Windows 7 computer

    CERN Document Server

    Steps, Studio Visual

    2014-01-01

    If you have lots of documents on your desk, it may prove to be impossible to find the document you are looking for. In order to easily find certain documents, they are often stored in a filing cabinet and arranged in a logical order. The folders on your computer serve the same purpose. They do not just contain files; they can also contain other folders. You can create an unlimited number of folders, and each folder can contain any number of subfolders and files. You can use Windows Explorer, also called the folder window, to work with the files and folders on your computer. You can copy, delete, move, find, and sort files, among other things. Or you can transfer files and folders to a USB stick, an external hard drive, a CD, DVD or Blu-Ray disk. In this practical guide we will show you how to use the folder window, and help you arrange your own files.

  17. The Arabic Diatessaron Project: Digitalizing, Encoding, Lemmatization

    Directory of Open Access Journals (Sweden)

    Giuliano Lancioni

    2016-04-01

    Full Text Available The Arabic Diatessaron Project (henceforth ADP is an international research project in Digital Humanities that aims to collect, digitalise and encode all known manuscripts of the Arabic Diatessaron (henceforth AD, a text that has been relatively neglected in scholarly research. ADP’s final goal is to provide a number of tools that can enable scholars to effectively query, compare and investigate all known variants of the text that will be encoded as far as possible in compliance with the Text Encoding Initiative (TEI guidelines. The paper addresses a number of issues involved in the process of digitalising manuscripts included in the two existing editions (Ciasca 1888 and Marmardji 1935, adding variants in unedited manuscripts, encoding and lemmatising the text. Issues involved in the design of the ADP include presentation of variants, choice of the standard text, applicability of TEI guidelines, automatic translation between different encodings, cross-edition concordances and principles of lemmatisation.

  18. A model for visual memory encoding.

    Directory of Open Access Journals (Sweden)

    Rodolphe Nenert

    Full Text Available Memory encoding engages multiple concurrent and sequential processes. While the individual processes involved in successful encoding have been examined in many studies, a sequence of events and the importance of modules associated with memory encoding has not been established. For this reason, we sought to perform a comprehensive examination of the network for memory encoding using data driven methods and to determine the directionality of the information flow in order to build a viable model of visual memory encoding. Forty healthy controls ages 19-59 performed a visual scene encoding task. FMRI data were preprocessed using SPM8 and then processed using independent component analysis (ICA with the reliability of the identified components confirmed using ICASSO as implemented in GIFT. The directionality of the information flow was examined using Granger causality analyses (GCA. All participants performed the fMRI task well above the chance level (>90% correct on both active and control conditions and the post-fMRI testing recall revealed correct memory encoding at 86.33 ± 5.83%. ICA identified involvement of components of five different networks in the process of memory encoding, and the GCA allowed for the directionality of the information flow to be assessed, from visual cortex via ventral stream to the attention network and then to the default mode network (DMN. Two additional networks involved in this process were the cerebellar and the auditory-insular network. This study provides evidence that successful visual memory encoding is dependent on multiple modules that are part of other networks that are only indirectly related to the main process. This model may help to identify the node(s of the network that are affected by a specific disease processes and explain the presence of memory encoding difficulties in patients in whom focal or global network dysfunction exists.

  19. A model for visual memory encoding.

    Science.gov (United States)

    Nenert, Rodolphe; Allendorfer, Jane B; Szaflarski, Jerzy P

    2014-01-01

    Memory encoding engages multiple concurrent and sequential processes. While the individual processes involved in successful encoding have been examined in many studies, a sequence of events and the importance of modules associated with memory encoding has not been established. For this reason, we sought to perform a comprehensive examination of the network for memory encoding using data driven methods and to determine the directionality of the information flow in order to build a viable model of visual memory encoding. Forty healthy controls ages 19-59 performed a visual scene encoding task. FMRI data were preprocessed using SPM8 and then processed using independent component analysis (ICA) with the reliability of the identified components confirmed using ICASSO as implemented in GIFT. The directionality of the information flow was examined using Granger causality analyses (GCA). All participants performed the fMRI task well above the chance level (>90% correct on both active and control conditions) and the post-fMRI testing recall revealed correct memory encoding at 86.33 ± 5.83%. ICA identified involvement of components of five different networks in the process of memory encoding, and the GCA allowed for the directionality of the information flow to be assessed, from visual cortex via ventral stream to the attention network and then to the default mode network (DMN). Two additional networks involved in this process were the cerebellar and the auditory-insular network. This study provides evidence that successful visual memory encoding is dependent on multiple modules that are part of other networks that are only indirectly related to the main process. This model may help to identify the node(s) of the network that are affected by a specific disease processes and explain the presence of memory encoding difficulties in patients in whom focal or global network dysfunction exists.

  20. Download this PDF file

    African Journals Online (AJOL)

    5,. May. 1923, p. 287. ISouth African Military Schools) p 287. CGS Box 231, File 31/0/2. .... One gains the impression that the sphere .... tions, Anthropology, Sociology and Man Manage- ment. ... of the word, possesses personality and initiative,.

  1. MMLEADS Public Use File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Medicare-Medicaid Linked Enrollee Analytic Data Source (MMLEADS) Public Use File (PUF) contains demographic, enrollment, condition prevalence, utilization, and...

  2. Hospital Service Area File

    Data.gov (United States)

    U.S. Department of Health & Human Services — This file is derived from the calendar year inpatient claims data. The records contain number of discharges, length of stay, and total charges summarized by provider...

  3. Patient Treatment File (PTF)

    Data.gov (United States)

    Department of Veterans Affairs — This database is part of the National Medical Information System (NMIS). The Patient Treatment File (PTF) contains a record for each inpatient care episode provided...

  4. USEEIO Satellite Files

    Data.gov (United States)

    U.S. Environmental Protection Agency — These files contain the environmental data as particular emissions or resources associated with a BEA sectors that are used in the USEEIO model. They are organized...

  5. Provider of Services File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The POS file contains data on characteristics of hospitals and other types of healthcare facilities, including the name and address of the facility and the type of...

  6. Download this PDF file

    African Journals Online (AJOL)

    countries quite a number of distance education institutions and programmes are more likely to be ... The Open University of Tanzania (OUT), (Ministry of Higher Education, Science and ..... (1991) Comic Relief Funding file. BAI, London, 1st ...

  7. Hierarchical control of electron-transfer

    DEFF Research Database (Denmark)

    Westerhoff, Hans V.; Jensen, Peter Ruhdal; Egger, Louis

    1997-01-01

    In this chapter the role of electron transfer in determining the behaviour of the ATP synthesising enzyme in E. coli is analysed. It is concluded that the latter enzyme lacks control because of special properties of the electron transfer components. These properties range from absence of a strong...... back pressure by the protonmotive force on the rate of electron transfer to hierarchical regulation of the expression of the gens that encode the electron transfer proteins as a response to changes in the bioenergetic properties of the cell.The discussion uses Hierarchical Control Analysis...

  8. Grid collector: An event catalog with automated file management

    International Nuclear Information System (INIS)

    Wu, Kesheng; Zhang, Wei-Ming; Sim, Alexander; Gu, Junmin; Shoshani, Arie

    2003-01-01

    High Energy Nuclear Physics (HENP) experiments such as STAR at BNL and ATLAS at CERN produce large amounts of data that are stored as files on mass storage systems in computer centers. In these files, the basic unit of data is an event. Analysis is typically performed on a selected set of events. The files containing these events have to be located, copied from mass storage systems to disks before analysis, and removed when no longer needed. These file management tasks are tedious and time consuming. Typically, all events contained in the files are read into memory before a selection is made. Since the time to read the events dominate the overall execution time, reading the unwanted event needlessly increases the analysis time. The Grid Collector is a set of software modules that works together to address these two issues. It automates the file management tasks and provides ''direct'' access to the selected events for analyses. It is currently integrated with the STAR analysis framework. The users can select events based on tags, such as, ''production date between March 10 and 20, and the number of charged tracks > 100.'' The Grid Collector locates the files containing relevant events, transfers the files across the Grid if necessary, and delivers the events to the analysis code through the familiar iterators. There has been some research efforts to address the file management issues, the Grid Collector is unique in that it addresses the event access issue together with the file management issues. This makes it more useful to a large variety of users

  9. Grid collector: An event catalog with automated file management

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Zhang, Wei-Ming; Sim, Alexander; Gu, Junmin; Shoshani, Arie

    2003-10-17

    High Energy Nuclear Physics (HENP) experiments such as STAR at BNL and ATLAS at CERN produce large amounts of data that are stored as files on mass storage systems in computer centers. In these files, the basic unit of data is an event. Analysis is typically performed on a selected set of events. The files containing these events have to be located, copied from mass storage systems to disks before analysis, and removed when no longer needed. These file management tasks are tedious and time consuming. Typically, all events contained in the files are read into memory before a selection is made. Since the time to read the events dominate the overall execution time, reading the unwanted event needlessly increases the analysis time. The Grid Collector is a set of software modules that works together to address these two issues. It automates the file management tasks and provides ''direct'' access to the selected events for analyses. It is currently integrated with the STAR analysis framework. The users can select events based on tags, such as, ''production date between March 10 and 20, and the number of charged tracks > 100.'' The Grid Collector locates the files containing relevant events, transfers the files across the Grid if necessary, and delivers the events to the analysis code through the familiar iterators. There has been some research efforts to address the file management issues, the Grid Collector is unique in that it addresses the event access issue together with the file management issues. This makes it more useful to a large variety of users.

  10. JENDL Dosimetry File

    International Nuclear Information System (INIS)

    Nakazawa, Masaharu; Iguchi, Tetsuo; Kobayashi, Katsuhei; Iwasaki, Shin; Sakurai, Kiyoshi; Ikeda, Yujiro; Nakagawa, Tsuneo.

    1992-03-01

    The JENDL Dosimetry File based on JENDL-3 was compiled and integral tests of cross section data were performed by the Dosimetry Integral Test Working Group of the Japanese Nuclear Data Committee. Data stored in the JENDL Dosimetry File are the cross sections and their covariance data for 61 reactions. The cross sections were mainly taken from JENDL-3 and the covariances from IRDF-85. For some reactions, data were adopted from other evaluated data files. The data are given in the neutron energy region below 20 MeV in both of point-wise and group-wise files in the ENDF-5 format. In order to confirm reliability of the data, several integral tests were carried out; comparison with the data in IRDF-85 and average cross sections measured in fission neutron fields, fast reactor spectra, DT neutron fields and Li(d, n) neutron fields. As a result, it has been found that the JENDL Dosimetry File gives better results than IRDF-85 but there are some problems to be improved in future. The contents of the JENDL Dosimetry File and the results of the integral tests are described in this report. All of the dosimetry cross sections are shown in a graphical form. (author) 76 refs

  11. JENDL Dosimetry File

    Energy Technology Data Exchange (ETDEWEB)

    Nakazawa, Masaharu; Iguchi, Tetsuo [Tokyo Univ. (Japan). Faculty of Engineering; Kobayashi, Katsuhei [Kyoto Univ., Kumatori, Osaka (Japan). Research Reactor Inst.; Iwasaki, Shin [Tohoku Univ., Sendai (Japan). Faculty of Engineering; Sakurai, Kiyoshi; Ikeda, Yujior; Nakagawa, Tsuneo [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    1992-03-15

    The JENDL Dosimetry File based on JENDL-3 was compiled and integral tests of cross section data were performed by the Dosimetry Integral Test Working Group of the Japanese Nuclear Data Committee. Data stored in the JENDL Dosimetry File are the cross sections and their covariance data for 61 reactions. The cross sections were mainly taken from JENDL-3 and the covariances from IRDF-85. For some reactions, data were adopted from other evaluated data files. The data are given in the neutron energy region below 20 MeV in both of point-wise and group-wise files in the ENDF-5 format. In order to confirm reliability of the data, several integral tests were carried out; comparison with the data in IRDF-85 and average cross sections measured in fission neutron fields, fast reactor spectra, DT neutron fields and Li(d,n) neutron fields. As a result, it has been found that the JENDL Dosimetry File gives better results than IRDF-85 but there are some problems to be improved in future. The contents of the JENDL Dosimetry File and the results of the integral tests are described in this report. All of the dosimetry cross sections are shown in a graphical form.

  12. Transfer Pricing

    DEFF Research Database (Denmark)

    Rohde, Carsten; Rossing, Christian Plesner

    trade internally as the units have to decide what prices should be paid for such inter-unit transfers. One important challenge is to uncover the consequences that different transfer prices have on the willingness in the organizational units to coordinate activities and trade internally. At the same time...... the determination of transfer price will affect the size of the profit or loss in the organizational units and thus have an impact on the evaluation of managers‟ performance. In some instances the determination of transfer prices may lead to a disagreement between coordination of the organizational units...

  13. 78 FR 34090 - Lois Von Morganroth; Shiloh Warm Springs Ranch, LLC; Notice of Application for Transfer of...

    Science.gov (United States)

    2013-06-06

    ... Springs Ranch, LLC (transferee) filed an application for the transfer of license for the L & M Angus Ranch..., Idaho. Applicants seek Commission approval to transfer the license for the L & M Angus Ranch Project...

  14. Encoding entanglement-assisted quantum stabilizer codes

    International Nuclear Information System (INIS)

    Wang Yun-Jiang; Bai Bao-Ming; Li Zhuo; Xiao He-Ling; Peng Jin-Ye

    2012-01-01

    We address the problem of encoding entanglement-assisted (EA) quantum error-correcting codes (QECCs) and of the corresponding complexity. We present an iterative algorithm from which a quantum circuit composed of CNOT, H, and S gates can be derived directly with complexity O(n 2 ) to encode the qubits being sent. Moreover, we derive the number of each gate consumed in our algorithm according to which we can design EA QECCs with low encoding complexity. Another advantage brought by our algorithm is the easiness and efficiency of programming on classical computers. (general)

  15. Reliable file sharing in distributed operating system using web RTC

    Science.gov (United States)

    Dukiya, Rajesh

    2017-12-01

    Since, the evolution of distributed operating system, distributed file system is come out to be important part in operating system. P2P is a reliable way in Distributed Operating System for file sharing. It was introduced in 1999, later it became a high research interest topic. Peer to Peer network is a type of network, where peers share network workload and other load related tasks. A P2P network can be a period of time connection, where a bunch of computers connected by a USB (Universal Serial Bus) port to transfer or enable disk sharing i.e. file sharing. Currently P2P requires special network that should be designed in P2P way. Nowadays, there is a big influence of browsers in our life. In this project we are going to study of file sharing mechanism in distributed operating system in web browsers, where we will try to find performance bottlenecks which our research will going to be an improvement in file sharing by performance and scalability in distributed file systems. Additionally, we will discuss the scope of Web Torrent file sharing and free-riding in peer to peer networks.

  16. Renewal-anomalous-heterogeneous files

    International Nuclear Information System (INIS)

    Flomenbom, Ophir

    2010-01-01

    Renewal-anomalous-heterogeneous files are solved. A simple file is made of Brownian hard spheres that diffuse stochastically in an effective 1D channel. Generally, Brownian files are heterogeneous: the spheres' diffusion coefficients are distributed and the initial spheres' density is non-uniform. In renewal-anomalous files, the distribution of waiting times for individual jumps is not exponential as in Brownian files, yet obeys: ψ α (t)∼t -1-α , 0 2 >, obeys, 2 >∼ 2 > nrml α , where 2 > nrml is the MSD in the corresponding Brownian file. This scaling is an outcome of an exact relation (derived here) connecting probability density functions of Brownian files and renewal-anomalous files. It is also shown that non-renewal-anomalous files are slower than the corresponding renewal ones.

  17. An information retrieval system for research file data

    Science.gov (United States)

    Joan E. Lengel; John W. Koning

    1978-01-01

    Research file data have been successfully retrieved at the Forest Products Laboratory through a high-speed cross-referencing system involving the computer program FAMULUS as modified by the Madison Academic Computing Center at the University of Wisconsin. The method of data input, transfer to computer storage, system utilization, and effectiveness are discussed....

  18. 17 CFR 202.3a - Instructions for filing fees.

    Science.gov (United States)

    2010-04-01

    ... Commission's Web site at http://www.sec.gov for the proper format. (2) Instructions for payment of fees by... facilitate tracing the funds if any problems occur. If a wire transfer of filing fees does not contain the... paragraph (e). A company must update its account and other addresses using the EDGAR Web site. This method...

  19. Chemical Space of DNA-Encoded Libraries.

    Science.gov (United States)

    Franzini, Raphael M; Randolph, Cassie

    2016-07-28

    In recent years, DNA-encoded chemical libraries (DECLs) have attracted considerable attention as a potential discovery tool in drug development. Screening encoded libraries may offer advantages over conventional hit discovery approaches and has the potential to complement such methods in pharmaceutical research. As a result of the increased application of encoded libraries in drug discovery, a growing number of hit compounds are emerging in scientific literature. In this review we evaluate reported encoded library-derived structures and identify general trends of these compounds in relation to library design parameters. We in particular emphasize the combinatorial nature of these libraries. Generally, the reported molecules demonstrate the ability of this technology to afford hits suitable for further lead development, and on the basis of them, we derive guidelines for DECL design.

  20. Encoding information using laguerre gaussian modes

    CSIR Research Space (South Africa)

    Trichili, A

    2015-08-01

    Full Text Available The authors experimentally demonstrate an information encoding protocol using the two degrees of freedom of Laguerre Gaussian modes having different radial and azimuthal components. A novel method, based on digital holography, for information...

  1. FROM CAD MODEL TO 3D PRINT VIA “STL” FILE FORMAT

    Directory of Open Access Journals (Sweden)

    Cătălin IANCU

    2010-06-01

    Full Text Available The paper work presents the STL file format, which is now used for transferring information from CAD software to a 3D printer, for obtaining the solid model in Rapid prototyping and Computer Aided Manufacturing. It’s presented also the STL format structure, its history, limitations and further development, as well as its new version to arrive and other similar file formats. As a conclusion, STL files used to transfer data from CAD package to 3D printers has a series of limitations and therefore new formats will replace it soon.

  2. Dynamic Non-Hierarchical File Systems for Exascale Storage

    Energy Technology Data Exchange (ETDEWEB)

    Long, Darrell E. [Univ. of California, Santa Cruz, CA (United States); Miller, Ethan L [Univ. of California, Santa Cruz, CA (United States)

    2015-02-24

    appliances. These search applications are often optimized for a single file system, making it difficult to move files and their metadata between file systems. Users have tried to solve this problem in several ways, including the use of separate databases to index file properties, the encoding of file properties into file names, and separately gathering and managing provenance data, but none of these approaches has worked well, either due to limited usefulness or scalability, or both. Our research addressed several key issues: High-performance, real-time metadata harvesting: extracting important attributes from files dynamically and immediately updating indexes used to improve search; Transparent, automatic, and secure provenance capture: recording the data inputs and processing steps used in the production of each file in the system; Scalable indexing: indexes that are optimized for integration with the file system; Dynamic file system structure: our approach provides dynamic directories similar to those in semantic file systems, but these are the native organization rather than a feature grafted onto a conventional system. In addition to these goals, our research effort will include evaluating the impact of new storage technologies on the file system design and performance. In particular, the indexing and metadata harvesting functions can potentially benefit from the performance improvements promised by new storage class memories.

  3. Quantum Logical Operations on Encoded Qubits

    International Nuclear Information System (INIS)

    Zurek, W.H.; Laflamme, R.

    1996-01-01

    We show how to carry out quantum logical operations (controlled-not and Toffoli gates) on encoded qubits for several encodings which protect against various 1-bit errors. This improves the reliability of these operations by allowing one to correct for 1-bit errors which either preexisted or occurred in the course of operation. The logical operations we consider allow one to carry out the vast majority of the steps in the quantum factoring algorithm. copyright 1996 The American Physical Society

  4. Heat Transfer Basics and Practice

    CERN Document Server

    Böckh, Peter

    2012-01-01

    The book provides an easy way to understand the fundamentals of heat transfer. The reader will acquire the ability to design and analyze heat exchangers. Without extensive derivation of the fundamentals, the latest correlations for heat transfer coefficients and their application are discussed. The following topics are presented - Steady state and transient heat conduction - Free and forced convection - Finned surfaces - Condensation and boiling - Radiation - Heat exchanger design - Problem-solving After introducing the basic terminology, the reader is made familiar with the different mechanisms of heat transfer. Their practical application is demonstrated in examples, which are available in the Internet as MathCad files for further use. Tables of material properties and formulas for their use in programs are included in the appendix. This book will serve as a valuable resource for both students and engineers in the industry. The author’s experience indicates that students, after 40 lectures and exercises ...

  5. Computer Independent Data Transfer Device

    Directory of Open Access Journals (Sweden)

    Darshana Rarath

    2017-07-01

    Full Text Available In today’s era, transferring data among distinct storage devices has become one of the tasks which are done most frequently. In order to make data and information omnipresent, it needs to be shared anywhere and anytime. However the reliance of user on a PC or laptop for the same is not efficient. This paper is about the innovative way to overcome this restriction. This paper discusses the development of a portable device with the use of wired and wireless communication applications to share data and information among distinct storage devices without relying on a PC or a laptop. The proposed device is compact, comprises of a touch screen, power source and is capable of transferring all types of files. Hence, it eliminates the dependence on a PC or a laptop for transferring data.

  6. "Transfer Shock" or "Transfer Ecstasy?"

    Science.gov (United States)

    Nickens, John M.

    The alleged characteristic drop in grade point average (GPA) of transfer students and the subsequent rise in GPA was investigated in this study. No statistically significant difference was found in first term junior year GPA between junior college transfers and native Florida State University students after the variance accounted for by the…

  7. ERP Correlates of Encoding Success and Encoding Selectivity in Attention Switching

    Science.gov (United States)

    Yeung, Nick

    2016-01-01

    Long-term memory encoding depends critically on effective processing of incoming information. The degree to which participants engage in effective encoding can be indexed in electroencephalographic (EEG) data by studying event-related potential (ERP) subsequent memory effects. The current study investigated ERP correlates of memory success operationalised with two different measures—memory selectivity and global memory—to assess whether previously observed ERP subsequent memory effects reflect focused encoding of task-relevant information (memory selectivity), general encoding success (global memory), or both. Building on previous work, the present study combined an attention switching paradigm—in which participants were presented with compound object-word stimuli and switched between attending to the object or the word across trials—with a later recognition memory test for those stimuli, while recording their EEG. Our results provided clear evidence that subsequent memory effects resulted from selective attentional focusing and effective top-down control (memory selectivity) in contrast to more general encoding success effects (global memory). Further analyses addressed the question of whether successful encoding depended on similar control mechanisms to those involved in attention switching. Interestingly, differences in the ERP correlates of attention switching and successful encoding, particularly during the poststimulus period, indicated that variability in encoding success occurred independently of prestimulus demands for top-down cognitive control. These results suggest that while effects of selective attention and selective encoding co-occur behaviourally their ERP correlates are at least partly dissociable. PMID:27907075

  8. ProMC: Input-output data format for HEP applications using varint encoding

    Science.gov (United States)

    Chekanov, S. V.; May, E.; Strand, K.; Van Gemmeren, P.

    2014-10-01

    A new data format for Monte Carlo (MC) events, or any structural data, including experimental data, is discussed. The format is designed to store data in a compact binary form using variable-size integer encoding as implemented in the Google's Protocol Buffers package. This approach is implemented in the PROMC library which produces smaller file sizes for MC records compared to the existing input-output libraries used in high-energy physics (HEP). Other important features of the proposed format are a separation of abstract data layouts from concrete programming implementations, self-description and random access. Data stored in PROMC files can be written, read and manipulated in a number of programming languages, such C++, JAVA, FORTRAN and PYTHON.

  9. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    OpenAIRE

    Kuang Tsan Lin; Sheng Lih Yeh

    2014-01-01

    The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matri...

  10. Improving the Calibration of Image Sensors Based on IOFBs, Using Differential Gray-Code Space Encoding

    Directory of Open Access Journals (Sweden)

    Carlos Luna Vázquez

    2012-07-01

    Full Text Available This paper presents a fast calibration method to determine the transfer function for spatial correspondences in image transmission devices with Incoherent Optical Fiber Bundles (IOFBs, by performing a scan of the input, using differential patterns generated from a Gray code (Differential Gray-Code Space Encoding, DGSE. The results demonstrate that this technique provides a noticeable reduction in processing time and better quality of the reconstructed image compared to other, previously employed techniques, such as point or fringe scanning, or even other known space encoding techniques.

  11. Multichannel compressive sensing MRI using noiselet encoding.

    Directory of Open Access Journals (Sweden)

    Kamlesh Pawar

    Full Text Available The incoherence between measurement and sparsifying transform matrices and the restricted isometry property (RIP of measurement matrix are two of the key factors in determining the performance of compressive sensing (CS. In CS-MRI, the randomly under-sampled Fourier matrix is used as the measurement matrix and the wavelet transform is usually used as sparsifying transform matrix. However, the incoherence between the randomly under-sampled Fourier matrix and the wavelet matrix is not optimal, which can deteriorate the performance of CS-MRI. Using the mathematical result that noiselets are maximally incoherent with wavelets, this paper introduces the noiselet unitary bases as the measurement matrix to improve the incoherence and RIP in CS-MRI. Based on an empirical RIP analysis that compares the multichannel noiselet and multichannel Fourier measurement matrices in CS-MRI, we propose a multichannel compressive sensing (MCS framework to take the advantage of multichannel data acquisition used in MRI scanners. Simulations are presented in the MCS framework to compare the performance of noiselet encoding reconstructions and Fourier encoding reconstructions at different acceleration factors. The comparisons indicate that multichannel noiselet measurement matrix has better RIP than that of its Fourier counterpart, and that noiselet encoded MCS-MRI outperforms Fourier encoded MCS-MRI in preserving image resolution and can achieve higher acceleration factors. To demonstrate the feasibility of the proposed noiselet encoding scheme, a pulse sequences with tailored spatially selective RF excitation pulses was designed and implemented on a 3T scanner to acquire the data in the noiselet domain from a phantom and a human brain. The results indicate that noislet encoding preserves image resolution better than Fouirer encoding.

  12. Environmental Baseline File for National Transportation

    International Nuclear Information System (INIS)

    1999-01-01

    This Environmental Baseline File summarizes and consolidates information related to the national-level transportation of commercial spent nuclear fuel. Topics address include: shipments of commercial spent nuclear fuel based on mostly truck and mostly rail shipping scenarios; transportation routing for commercial spent nuclear fuel sites and DOE sites; radionuclide inventories for various shipping container capacities; transportation routing; populations along transportation routes; urbanized area population densities; the impacts of historical, reasonably foreseeable, and general transportation; state-level food transfer factors; Federal Guidance Report No. 11 and 12 radionuclide dose conversion factors; and national average atmospheric conditions

  13. Station Transfers

    Data.gov (United States)

    Department of Homeland Security — ixed rail transit external system transfers for systems within the Continental United States, Alaska, Hawaii, the District of Columbia, and Puerto Rico. The modes of...

  14. Technology transfer

    International Nuclear Information System (INIS)

    1998-01-01

    On the base of technological opportunities and of the environmental target of the various sectors of energy system this paper intend to conjugate the opportunity/objective with economic and social development through technology transfer and information dissemination [it

  15. Formalizing a hierarchical file system

    NARCIS (Netherlands)

    Hesselink, Wim H.; Lali, Muhammad Ikram

    An abstract file system is defined here as a partial function from (absolute) paths to data. Such a file system determines the set of valid paths. It allows the file system to be read and written at a valid path, and it allows the system to be modified by the Unix operations for creation, removal,

  16. Formalizing a Hierarchical File System

    NARCIS (Netherlands)

    Hesselink, Wim H.; Lali, M.I.

    2009-01-01

    In this note, we define an abstract file system as a partial function from (absolute) paths to data. Such a file system determines the set of valid paths. It allows the file system to be read and written at a valid path, and it allows the system to be modified by the Unix operations for removal

  17. Cloud-based uniform ChIP-Seq processing tools for modENCODE and ENCODE.

    Science.gov (United States)

    Trinh, Quang M; Jen, Fei-Yang Arthur; Zhou, Ziru; Chu, Kar Ming; Perry, Marc D; Kephart, Ellen T; Contrino, Sergio; Ruzanov, Peter; Stein, Lincoln D

    2013-07-22

    Funded by the National Institutes of Health (NIH), the aim of the Model Organism ENCyclopedia of DNA Elements (modENCODE) project is to provide the biological research community with a comprehensive encyclopedia of functional genomic elements for both model organisms C. elegans (worm) and D. melanogaster (fly). With a total size of just under 10 terabytes of data collected and released to the public, one of the challenges faced by researchers is to extract biologically meaningful knowledge from this large data set. While the basic quality control, pre-processing, and analysis of the data has already been performed by members of the modENCODE consortium, many researchers will wish to reinterpret the data set using modifications and enhancements of the original protocols, or combine modENCODE data with other data sets. Unfortunately this can be a time consuming and logistically challenging proposition. In recognition of this challenge, the modENCODE DCC has released uniform computing resources for analyzing modENCODE data on Galaxy (https://github.com/modENCODE-DCC/Galaxy), on the public Amazon Cloud (http://aws.amazon.com), and on the private Bionimbus Cloud for genomic research (http://www.bionimbus.org). In particular, we have released Galaxy workflows for interpreting ChIP-seq data which use the same quality control (QC) and peak calling standards adopted by the modENCODE and ENCODE communities. For convenience of use, we have created Amazon and Bionimbus Cloud machine images containing Galaxy along with all the modENCODE data, software and other dependencies. Using these resources provides a framework for running consistent and reproducible analyses on modENCODE data, ultimately allowing researchers to use more of their time using modENCODE data, and less time moving it around.

  18. Long term file migration. Part I: file reference patterns

    International Nuclear Information System (INIS)

    Smith, A.J.

    1978-08-01

    In most large computer installations, files are moved between on-line disk and mass storage (tape, integrated mass storage device) either automatically by the system or specifically at the direction of the user. This is the first of two papers which study the selection of algorithms for the automatic migration of files between mass storage and disk. The use of the text editor data sets at the Stanford Linear Accelerator Center (SLAC) computer installation is examined through the analysis of thirteen months of file reference data. Most files are used very few times. Of those that are used sufficiently frequently that their reference patterns may be examined, about a third show declining rates of reference during their lifetime; of the remainder, very few (about 5%) show correlated interreference intervals, and interreference intervals (in days) appear to be more skewed than would occur with the Bernoulli process. Thus, about two-thirds of all sufficiently active files appear to be referenced as a renewal process with a skewed interreference distribution. A large number of other file reference statistics (file lifetimes, interference distributions, moments, means, number of uses/file, file sizes, file rates of reference, etc.) are computed and presented. The results are applied in the following paper to the development and comparative evaluation of file migration algorithms. 17 figures, 13 tables

  19. Accessing files in an Internet: The Jade file system

    Science.gov (United States)

    Peterson, Larry L.; Rao, Herman C.

    1991-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  20. Accessing files in an internet - The Jade file system

    Science.gov (United States)

    Rao, Herman C.; Peterson, Larry L.

    1993-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  1. Hexagonal pixel detector with time encoded binary readout

    International Nuclear Information System (INIS)

    Hoedlmoser, H.; Varner, G.; Cooney, M.

    2009-01-01

    The University of Hawaii is developing continuous acquisition pixel (CAP) detectors for vertexing applications in lepton colliding experiments such as SuperBelle or ILC. In parallel to the investigation of different technology options such as MAPS or SOI, both analog and binary readout concepts have been tested. First results with a binary readout scheme in which the hit information is time encoded by means of a signal shifting mechanism have recently been published. This paper explains the hit reconstruction for such a binary detector with an emphasis on fake hit reconstruction probabilities in order to evaluate the rate capability in a high background environment such as the planned SuperB factory at KEK. The results show that the binary concept is at least comparable to any analog readout strategy if not better in terms of occupancy. Furthermore, we present a completely new binary readout strategy in which the pixel cells are arranged in a hexagonal grid allowing the use of three independent output directions to reduce reconstruction ambiguities. The new concept uses the same signal shifting mechanism for time encoding, however, in dedicated transfer lines on the periphery of the detector, which enables higher shifting frequencies. Detailed Monte Carlo simulations of full size pixel matrices including hit and BG generation, signal generation, and data reconstruction show that by means of multiple signal transfer lines on the periphery the pixel can be made smaller (higher resolution), the number of output channels and the data volume per triggered event can be reduced dramatically, fake hit reconstruction is lowered to a minimum and the resulting effective occupancies are less than 10 -4 . A prototype detector has been designed in the AMS 0.35μm Opto process and is currently under fabrication.

  2. Noise level and MPEG-2 encoder statistics

    Science.gov (United States)

    Lee, Jungwoo

    1997-01-01

    Most software in the movie and broadcasting industries are still in analog film or tape format, which typically contains random noise that originated from film, CCD camera, and tape recording. The performance of the MPEG-2 encoder may be significantly degraded by the noise. It is also affected by the scene type that includes spatial and temporal activity. The statistical property of noise originating from camera and tape player is analyzed and the models for the two types of noise are developed. The relationship between the noise, the scene type, and encoder statistics of a number of MPEG-2 parameters such as motion vector magnitude, prediction error, and quant scale are discussed. This analysis is intended to be a tool for designing robust MPEG encoding algorithms such as preprocessing and rate control.

  3. Indirect Encoding in Neuroevolutionary Ship Handling

    Directory of Open Access Journals (Sweden)

    Miroslaw Lacki

    2018-03-01

    Full Text Available In this paper the author compares the efficiency of two encoding schemes for artificial intelligence methods used in the neuroevolutionary ship maneuvering system. This may be also be seen as the ship handling system that simulates a learning process of a group of artificial helmsmen - autonomous control units, created with an artificial neural network. The helmsman observes input signals derived form an enfironment and calculates the values of required parameters of the vessel maneuvering in confined waters. In neuroevolution such units are treated as individuals in population of artificial neural networks, which through environmental sensing and evolutionary algorithms learn to perform given task efficiently. The main task of this project is to evolve a population of helmsmen with indirect encoding and compare results of simulation with direct encoding method.

  4. An Information Theoretic Characterisation of Auditory Encoding

    Science.gov (United States)

    Overath, Tobias; Cusack, Rhodri; Kumar, Sukhbinder; von Kriegstein, Katharina; Warren, Jason D; Grube, Manon; Carlyon, Robert P; Griffiths, Timothy D

    2007-01-01

    The entropy metric derived from information theory provides a means to quantify the amount of information transmitted in acoustic streams like speech or music. By systematically varying the entropy of pitch sequences, we sought brain areas where neural activity and energetic demands increase as a function of entropy. Such a relationship is predicted to occur in an efficient encoding mechanism that uses less computational resource when less information is present in the signal: we specifically tested the hypothesis that such a relationship is present in the planum temporale (PT). In two convergent functional MRI studies, we demonstrated this relationship in PT for encoding, while furthermore showing that a distributed fronto-parietal network for retrieval of acoustic information is independent of entropy. The results establish PT as an efficient neural engine that demands less computational resource to encode redundant signals than those with high information content. PMID:17958472

  5. Download this PDF file

    African Journals Online (AJOL)

    1- is gifts' ta5ie" in elist fig'equitable' fees distilition s ... O'." & 1 25; 33i) re...) C SS Sati ri. Southerri'Stillah diffigFiles'f actities s % -- - , a v. & ' " St - a s fit . . . fiji ſti i ...

  6. Challenging Ubiquitous Inverted Files

    NARCIS (Netherlands)

    de Vries, A.P.

    2000-01-01

    Stand-alone ranking systems based on highly optimized inverted file structures are generally considered ‘the’ solution for building search engines. Observing various developments in software and hardware, we argue however that IR research faces a complex engineering problem in the quest for more

  7. The Global File System

    Science.gov (United States)

    Soltis, Steven R.; Ruwart, Thomas M.; OKeefe, Matthew T.

    1996-01-01

    The global file system (GFS) is a prototype design for a distributed file system in which cluster nodes physically share storage devices connected via a network-like fiber channel. Networks and network-attached storage devices have advanced to a level of performance and extensibility so that the previous disadvantages of shared disk architectures are no longer valid. This shared storage architecture attempts to exploit the sophistication of storage device technologies whereas a server architecture diminishes a device's role to that of a simple component. GFS distributes the file system responsibilities across processing nodes, storage across the devices, and file system resources across the entire storage pool. GFS caches data on the storage devices instead of the main memories of the machines. Consistency is established by using a locking mechanism maintained by the storage devices to facilitate atomic read-modify-write operations. The locking mechanism is being prototyped in the Silicon Graphics IRIX operating system and is accessed using standard Unix commands and modules.

  8. Download this PDF file

    African Journals Online (AJOL)

    AJNS WEBMASTERS

    Incidence is higher in the elderly, about 58 per 100,000 per year. Diagnosis of CSDH is still .... in the other two patients was not stated in the case file. Evacuation of the Subdural .... Personal experience in 39 patients. Br J of Neurosurg. 2003 ...

  9. File System Virtual Appliances

    Science.gov (United States)

    2010-05-01

    4 KB of data is read or written, data is copied back and forth using trampoline buffers — pages that are shared during proxy initialization — because...in 2008. CIO Magazine. 104 · File system virtual appliances [64] Megiddo, N. and Modha, D. S. 2003. ARC: A Self-Tuning, Low Over- head Replacement

  10. SLIB77, Source Library Data Compression and File Maintenance System

    International Nuclear Information System (INIS)

    Lunsford, A.

    1989-01-01

    Description of program or function: SLIB77 is a source librarian program designed to maintain FORTRAN source code in a compressed form on magnetic disk. The program was prepared to meet program maintenance requirements for ongoing program development and continual improvement of very large programs involving many programmers from a number of different organizations. SLIB77 automatically maintains in one file the source of the current program as well as all previous modifications. Although written originally for FORTRAN programs, SLIB77 is suitable for use with data files, text files, operating systems, and other programming languages, such as Ada, C and COBOL. It can handle libraries with records of up to 160-characters. Records are grouped into DECKS and assigned deck names by the user. SLIB77 assigns a number to each record in each DECK. Records can be deleted or restored singly or as a group within each deck. Modification records are grouped and assigned modification identification names by the user. The program assigns numbers to each new record within the deck. The program has two modes of execution, BATCH and EDIT. The BATCH mode is controlled by an input file and is used to make changes permanent and create new library files. The EDIT mode is controlled by interactive terminal input and a built-in line editor is used for modification of single decks. Transferring of a library from one computer system to another is accomplished using a Portable Library File created by SLIB77 in a BATCH run

  11. Incremental phonological encoding during unscripted sentence production

    Directory of Open Access Journals (Sweden)

    Florian T Jaeger

    2012-11-01

    Full Text Available We investigate phonological encoding during unscripted sentence production, focusing on the effect of phonological overlap on phonological encoding. Previous work on this question has almost exclusively employed isolated word production or highly scripted multiword production. These studies have led to conflicting results: some studies found that phonological overlap between two words facilitates phonological encoding, while others found inhibitory effects. One worry with many of these paradigms is that they involve processes that are not typical to everyday language use, which calls into question to what extent their findings speak to the architectures and mechanisms underlying language production. We present a paradigm to investigate the consequences of phonological overlap between words in a sentence while leaving speakers much of the lexical and structural choices typical in everyday language use. Adult native speakers of English described events in short video clips. We annotated the presence of disfluencies and the speech rate at various points throughout the sentence, as well as the constituent order. We find that phonological overlap has an inhibitory effect on phonological encoding. Specifically, if adjacent content words share their phonological onset (e.g., hand the hammer, they are preceded by production difficulty, as reflected in fluency and speech rate. We also find that this production difficulty affects speakers’ constituent order preferences during grammatical encoding. We discuss our results and previous works to isolate the properties of other paradigms that resulted in facilitatory or inhibitory results. The data from our paradigm also speak to questions about the scope of phonological planning in unscripted speech and as to whether phonological and grammatical encoding interact.

  12. 11 CFR 100.19 - File, filed or filing (2 U.S.C. 434(a)).

    Science.gov (United States)

    2010-01-01

    ... a facsimile machine or by electronic mail if the reporting entity is not required to file..., including electronic reporting entities, may use the Commission's website's on-line program to file 48-hour... the reporting entity is not required to file electronically in accordance with 11 CFR 104.18. [67 FR...

  13. Evaluated neutronic file for indium

    International Nuclear Information System (INIS)

    Smith, A.B.; Chiba, S.; Smith, D.L.; Meadows, J.W.; Guenther, P.T.; Lawson, R.D.; Howerton, R.J.

    1990-01-01

    A comprehensive evaluated neutronic data file for elemental indium is documented. This file, extending from 10 -5 eV to 20 MeV, is presented in the ENDF/B-VI format, and contains all neutron-induced processes necessary for the vast majority of neutronic applications. In addition, an evaluation of the 115 In(n,n') 116m In dosimetry reaction is presented as a separate file. Attention is given in quantitative values, with corresponding uncertainty information. These files have been submitted for consideration as a part of the ENDF/B-VI national evaluated-file system. 144 refs., 10 figs., 4 tabs

  14. Optical encoder based on a nondiffractive beam

    International Nuclear Information System (INIS)

    Lutenberg, Ariel; Perez-Quintian, Fernando; Rebollo, Maria A.

    2008-01-01

    Optical encoders are used in industrial and laboratory motion equipment to measure rotations and linear displacements. We introduce a design of an optical encoder based on a nondiffractive beam. We expect that the invariant profile and radial symmetry of the nondiffractive beam provide the design with remarkable tolerance to mechanical perturbations. We experimentally demonstrate that the proposed design generates a suitable output sinusoidal signal with low harmonic distortion. Moreover, we present a numerical model of the system based on the angular spectrum approximation whose predictions are in excellent agreement with the experimental results

  15. 47 CFR 1.1102 - Schedule of charges for applications and other filings in the wireless telecommunications services.

    Science.gov (United States)

    2010-10-01

    ...); Consolidate Call Signs (Per Call Sign) (Electronic Filing Required) 601 & 159 335.00 CLD d. Special Temporary Authority (Per Location/Per Frequency) 601 & 159 335.00 CLD e. Special Temporary Authority (Per Location/Per Frequency) (Electronic Filing) 601 & 159 335.00 CLD f. Assignment of License or Transfer of Control; 603...

  16. Neural correlates of the spacing effect in explicit verbal semantic encoding support the deficient-processing theory.

    Science.gov (United States)

    Callan, Daniel E; Schweighofer, Nicolas

    2010-04-01

    Spaced presentations of to-be-learned items during encoding leads to superior long-term retention over massed presentations. Despite over a century of research, the psychological and neural basis of this spacing effect however is still under investigation. To test the hypotheses that the spacing effect results either from reduction in encoding-related verbal maintenance rehearsal in massed relative to spaced presentations (deficient processing hypothesis) or from greater encoding-related elaborative rehearsal of relational information in spaced relative to massed presentations (encoding variability hypothesis), we designed a vocabulary learning experiment in which subjects encoded paired-associates, each composed of a known word paired with a novel word, in both spaced and massed conditions during functional magnetic resonance imaging. As expected, recall performance in delayed cued-recall tests was significantly better for spaced over massed conditions. Analysis of brain activity during encoding revealed that the left frontal operculum, known to be involved in encoding via verbal maintenance rehearsal, was associated with greater performance-related increased activity in the spaced relative to massed condition. Consistent with the deficient processing hypothesis, a significant decrease in activity with subsequent episodes of presentation was found in the frontal operculum for the massed but not the spaced condition. Our results suggest that the spacing effect is mediated by activity in the frontal operculum, presumably by encoding-related increased verbal maintenance rehearsal, which facilitates binding of phonological and word level verbal information for transfer into long-term memory. Copyright 2009 Wiley-Liss, Inc.

  17. Fiber Bragg grating for spectral phase optical code-division multiple-access encoding and decoding

    Science.gov (United States)

    Fang, Xiaohui; Wang, Dong-Ning; Li, Shichen

    2003-08-01

    A new method for realizing spectral phase optical code-division multiple-access (OCDMA) coding based on step chirped fiber Bragg gratings (SCFBGs) is proposed and the corresponding encoder/decoder is presented. With this method, a mapping code is introduced for the m-sequence address code and the phase shift can be inserted into the subgratings of the SCFBG according to the mapping code. The transfer matrix method together with Fourier transform is used to investigate the characteristics of the encoder/decoder. The factors that influence the correlation property of the encoder/decoder, including index modulation and bandwidth of the subgrating, are identified. The system structure is simple and good correlation output can be obtained. The performance of the OCDMA system based on SCFBGs has been analyzed.

  18. 47 CFR 54.902 - Calculation of Interstate Common Line Support for transferred exchanges.

    Science.gov (United States)

    2010-10-01

    ... filed pursuant to § 54.903(a)(4) shall reflect the transfer of exchanges. All post-transaction... transfer of exchanges. All post-transaction Interstate Common Line Support shall be subject to true up by... for transferred exchanges. 54.902 Section 54.902 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...

  19. Program for transfer research and impact studies

    Science.gov (United States)

    Rusnak, J. J.; Freeman, J. E.; Hartley, J. M.; Kottenstette, J. P.; Staskin, E. R.

    1973-01-01

    Research activities conducted under the Program for Transfer Research and Impact Studies (TRIS) during 1972 included: (1) preparation of 10,196 TSP requests for TRIS application analysis; (2) interviews with over 500 individuals concerning the technical, economic, and social impacts of NASA-generated technology; (3) preparation of 38 new technology transfer example files and 101 new transfer cases; and (4) maintenance of a technology transfer library containing more than 2,900 titles. Six different modes of technology utilization are used to illustrate the pervasiveness of the transfer and diffusion of aerospace innovations. These modes also provide a basis for distinguishing the unique characteristics of the NASA Technology Utilization Program. An examination is reported of the ways in which NASA-generated technology is contributing to beneficial social change in five major areas of human concern: health, environment, safety, transportation, and communication.

  20. Technology Transfer

    Science.gov (United States)

    Smith, Nanette R.

    1995-01-01

    The objective of this summer's work was to attempt to enhance Technology Application Group (TAG) ability to measure the outcomes of its efforts to transfer NASA technology. By reviewing existing literature, by explaining the economic principles involved in evaluating the economic impact of technology transfer, and by investigating the LaRC processes our William & Mary team has been able to lead this important discussion. In reviewing the existing literature, we identified many of the metrics that are currently being used in the area of technology transfer. Learning about the LaRC technology transfer processes and the metrics currently used to track the transfer process enabled us to compare other R&D facilities to LaRC. We discuss and diagram impacts of technology transfer in the short run and the long run. Significantly, it serves as the basis for analysis and provides guidance in thinking about what the measurement objectives ought to be. By focusing on the SBIR Program, valuable information regarding the strengths and weaknesses of this LaRC program are to be gained. A survey was developed to ask probing questions regarding SBIR contractors' experience with the program. Specifically we are interested in finding out whether the SBIR Program is accomplishing its mission, if the SBIR companies are providing the needed innovations specified by NASA and to what extent those innovations have led to commercial success. We also developed a survey to ask COTR's, who are NASA employees acting as technical advisors to the SBIR contractors, the same type of questions, evaluating the successes and problems with the SBIR Program as they see it. This survey was developed to be implemented interactively on computer. It is our hope that the statistical and econometric studies that can be done on the data collected from all of these sources will provide insight regarding the direction to take in developing systematic evaluations of programs like the SBIR Program so that they can

  1. Download this PDF file

    African Journals Online (AJOL)

    Each E colicin plasmid encodes a colicin structural gene, an immunity gene and a lysis/release gene in operon (Chak and James, 1984; 1986; Cooper et al., 1986). Immunity protein protects the colicin producing cell against colicins of the same immunity type. Based on the immunity test, E colicins may be divided into colicin ...

  2. Download this PDF file

    African Journals Online (AJOL)

    sunny t

    2015-06-10

    Jun 10, 2015 ... ESTs is a promising strategy for studies in plant molecular biology ... the manual of the SMART cDNA library construction kit (Clontech,. USA). 50% of the .... that the encoded energy production and conversion- related genes ...

  3. RNAi suppressors encoded by pathogenic human viruses

    NARCIS (Netherlands)

    de Vries, Walter; Berkhout, Ben

    2008-01-01

    RNA silencing or RNAi interference (RNAi) serves as an innate antiviral mechanism in plants, fungi and animals. Human viruses, like plant viruses, encode suppressor proteins or RNAs that block or modulate the RNAi pathway. This review summarizes the mechanisms by which pathogenic human viruses

  4. Visual Memory : The Price of Encoding Details

    NARCIS (Netherlands)

    Nieuwenstein, Mark; Kromm, Maria

    2017-01-01

    Studies on visual long-term memory have shown that we have a tremendous capacity for remembering pictures of objects, even at a highly detailed level. What remains unclear, however, is whether encoding objects at such a detailed level comes at any cost. In the current study, we examined how the

  5. Encoders for block-circulant LDPC codes

    Science.gov (United States)

    Divsalar, Dariush (Inventor); Abbasfar, Aliazam (Inventor); Jones, Christopher R. (Inventor); Dolinar, Samuel J. (Inventor); Thorpe, Jeremy C. (Inventor); Andrews, Kenneth S. (Inventor); Yao, Kung (Inventor)

    2009-01-01

    Methods and apparatus to encode message input symbols in accordance with an accumulate-repeat-accumulate code with repetition three or four are disclosed. Block circulant matrices are used. A first method and apparatus make use of the block-circulant structure of the parity check matrix. A second method and apparatus use block-circulant generator matrices.

  6. 47 CFR 11.32 - EAS Encoder.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) Equipment Requirements § 11... operation. (vi) Indicator Display. The encoder shall be provided with a visual and/or aural indicator which... to +50 degrees C and a range of relative humidity of up to 95%. (c) Primary Supply Voltage Variation...

  7. Toward Chemical Implementation of Encoded Combinatorial Libraries

    DEFF Research Database (Denmark)

    Nielsen, John; Janda, Kim D.

    1994-01-01

    The recent application of "combinatorial libraries" to supplement existing drug screening processes might simplify and accelerate the search for new lead compounds or drugs. Recently, a scheme for encoded combinatorial chemistry was put forward to surmount a number of the limitations possessed...

  8. Optimal File-Distribution in Heterogeneous and Asymmetric Storage Networks

    Science.gov (United States)

    Langner, Tobias; Schindelhauer, Christian; Souza, Alexander

    We consider an optimisation problem which is motivated from storage virtualisation in the Internet. While storage networks make use of dedicated hardware to provide homogeneous bandwidth between servers and clients, in the Internet, connections between storage servers and clients are heterogeneous and often asymmetric with respect to upload and download. Thus, for a large file, the question arises how it should be fragmented and distributed among the servers to grant "optimal" access to the contents. We concentrate on the transfer time of a file, which is the time needed for one upload and a sequence of n downloads, using a set of m servers with heterogeneous bandwidths. We assume that fragments of the file can be transferred in parallel to and from multiple servers. This model yields a distribution problem that examines the question of how these fragments should be distributed onto those servers in order to minimise the transfer time. We present an algorithm, called FlowScaling, that finds an optimal solution within running time {O}(m log m). We formulate the distribution problem as a maximum flow problem, which involves a function that states whether a solution with a given transfer time bound exists. This function is then used with a scaling argument to determine an optimal solution within the claimed time complexity.

  9. Technology transfer

    International Nuclear Information System (INIS)

    Boury, C.

    1986-01-01

    This paper emphasizes in the specific areas of design, engineering and component production. This paper presents what Framatome has to offer in these areas and its export oriented philosophy. Then, a typical example of this technology transfer philosophy is the collaboration with the South Korean firm, Korea Heavy Industries Corporation (KHIC) for the supply of KNU 9 and KNU 10 power stations

  10. Download this PDF file

    African Journals Online (AJOL)

    Mr Olusoji

    The climax of the process of in-vitro fertilization (IVF) is the stage of embryo transfer. Difficulty in embryo transfer is recognised as one of the fae.lOrs militating against successful outcome. The clicnt was a 38 year old business woman who required in-vitro fertilization on account of tubal factor and male factor infcrtllity.

  11. Download this PDF file

    African Journals Online (AJOL)

    place by H atomes transfer to the DPPH radical,. Structural differencies of chemical compounds bear- ing the transferable hydrogen atome and present in each extract may reasonably explain the varied be- haviour of the extracts as suggested by Brand-. Williams et al., (1995) when analysing the antiradicalar efficacy of 20 ...

  12. Estimating Time To Complete for ATLAS data transfers

    CERN Document Server

    Bogado Garcia, Joaquin Ignacio; The ATLAS collaboration; Monticelli, Fernando

    2018-01-01

    Transfer Time To Complete (T³C) is a new extension for the data management system Rucio that allows to make predictions about the duration of a file transfer. The extension has a modular architecture which allows to make predictions based on simple to more sophisticated models, depending on available data and computation power. The ability to predict file transfer times with reasonable accuracy provides a tool for better transfer scheduling  and thus reduces both the load on storage systems and the associated networks. The accuracy of the model requires fine tuning for its parameters on a link basis. As the underlying infrastructure varies depending on the source and destination of the transfer, the parameters modelling the network between these sites will also be studied.

  13. File: International bilateral relations

    International Nuclear Information System (INIS)

    Feltin, Ch.; Rabouhams, J.; Bravo, X.; Rousseau, M.; Le Breton, S.; Saint Raymond, Ph.; Brigaud, O.; Pertuis, V.; McNair, J.; Sayers, M.R.; Bye, R.; Scherrer, J.

    1998-01-01

    Since its creation in 1973, the Authority of Safety was assigned missions in the international field with following objectives: to develop information exchanges with its foreign counterpart, to make know and to explain the French approach and practice; to give to concerned countries the useful information on french nuclear facilities situated near the border; This file shows with some examples, how bilateral relations allow to fill up these objectives and how the French Authority got the foreign experience. (N.C.)

  14. Temperature increases on the external root surface during endodontic treatment using single file systems.

    Science.gov (United States)

    Özkocak, I; Taşkan, M M; Gökt Rk, H; Aytac, F; Karaarslan, E Şirin

    2015-01-01

    The aim of this study is to evaluate increases in temperature on the external root surface during endodontic treatment with different rotary systems. Fifty human mandibular incisors with a single root canal were selected. All root canals were instrumented using a size 20 Hedstrom file, and the canals were irrigated with 5% sodium hypochlorite solution. The samples were randomly divided into the following three groups of 15 teeth: Group 1: The OneShape Endodontic File no.: 25; Group 2: The Reciproc Endodontic File no.: 25; Group 3: The WaveOne Endodontic File no.: 25. During the preparation, the temperature changes were measured in the middle third of the roots using a noncontact infrared thermometer. The temperature data were transferred from the thermometer to the computer and were observed graphically. Statistical analysis was performed using the Kruskal-Wallis analysis of variance at a significance level of 0.05. The increases in temperature caused by the OneShape file system were lower than those of the other files (P file showed the highest temperature increases. However, there were no significant differences between the Reciproc and WaveOne files. The single file rotary systems used in this study may be recommended for clinical use.

  15. PFS: a distributed and customizable file system

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.

    1996-01-01

    In this paper we present our ongoing work on the Pegasus File System (PFS), a distributed and customizable file system that can be used for off-line file system experiments and on-line file system storage. PFS is best described as an object-oriented component library from which either a true file

  16. Huygens file service and storage architecture

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.; Stabell-Kulo, Tage; Stabell-Kulo, Tage

    1993-01-01

    The Huygens file server is a high-performance file server which is able to deliver multi-media data in a timely manner while also providing clients with ordinary “Unix” like file I/O. The file server integrates client machines, file servers and tertiary storage servers in the same storage

  17. Huygens File Service and Storage Architecture

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.; Stabell-Kulo, Tage; Stabell-Kulo, Tage

    1993-01-01

    The Huygens file server is a high-performance file server which is able to deliver multi-media data in a timely manner while also providing clients with ordinary “Unix” like file I/O. The file server integrates client machines, file servers and tertiary storage servers in the same storage

  18. 78 FR 75554 - Combined Notice of Filings

    Science.gov (United States)

    2013-12-12

    ...-000. Applicants: Young Gas Storage Company, Ltd. Description: Young Fuel Reimbursement Filing to be.... Protests may be considered, but intervention is necessary to become a party to the proceeding. eFiling is... qualifying facilities filings can be found at: http://www.ferc.gov/docs-filing/efiling/filing-req.pdf . For...

  19. 12 CFR 5.4 - Filing required.

    Science.gov (United States)

    2010-01-01

    ... CORPORATE ACTIVITIES Rules of General Applicability § 5.4 Filing required. (a) Filing. A depository institution shall file an application or notice with the OCC to engage in corporate activities and... advise an applicant through a pre-filing communication to send the filing or submission directly to the...

  20. A Method for Transferring Photoelectric Photometry Data from Apple II+ to IBM PC

    Science.gov (United States)

    Powell, Harry D.; Miller, James R.; Stephenson, Kipp

    1989-06-01

    A method is presented for transferring photoelectric photometry data files from an Apple II computer to an IBM PC computer in a form which is compatible with the AAVSO Photoelectric Photometry data collection process.

  1. The Galley Parallel File System

    Science.gov (United States)

    Nieuwejaar, Nils; Kotz, David

    1996-01-01

    Most current multiprocessor file systems are designed to use multiple disks in parallel, using the high aggregate bandwidth to meet the growing I/0 requirements of parallel scientific applications. Many multiprocessor file systems provide applications with a conventional Unix-like interface, allowing the application to access multiple disks transparently. This interface conceals the parallelism within the file system, increasing the ease of programmability, but making it difficult or impossible for sophisticated programmers and libraries to use knowledge about their I/O needs to exploit that parallelism. In addition to providing an insufficient interface, most current multiprocessor file systems are optimized for a different workload than they are being asked to support. We introduce Galley, a new parallel file system that is intended to efficiently support realistic scientific multiprocessor workloads. We discuss Galley's file structure and application interface, as well as the performance advantages offered by that interface.

  2. Public Key Infrastructure (PKI) enhanced file transfer over secure ...

    African Journals Online (AJOL)

    user

    arises from the problem of rendezvous, and solved by asserting that in any pair of communicating applications, one side must start execution and wait (indefinitely) for the other side to connect. Applications that initiate communication is called clients, and a server is one that wait for incoming communication request from ...

  3. Special file on Biogas. The progressive transfer towards biomethane

    International Nuclear Information System (INIS)

    Mary, Olivier; Petitot, Pauline; Signoret, Stephane; Cygler, Clement; Schlienger, Marc

    2017-01-01

    A first article notices that, due to a late implementation of regulatory evolutions, biogas injection has a more dynamic development than biogas-based electricity production. Representatives of industrial actors (Clarke Energy, Eneria, France Biomethane) outline the importance of product quality and of bio-methane injection projects, comment the current development context, identify some remaining deadlocks for the biomethane sector. Works performed by GRTgaz to accept gas from renewable origin and to adapt installations are commented. An article presents a cryogenic technology used by Waga Energy to transform biogas produced by non-dangerous waste storage installations into injectable methane. An overview of the status and development of the European biogas and biomethane sectors is proposed. The perspective of a Europe of biomethane is then discussed, and is said to depend on two issued to be addressed at the European level: digestate acknowledgement, and guarantees of origin. An article presents the activities of a company (CAM Energie Service) which provides support services for a whole methanization project, and proposes an innovating technique: the continuous dry methanization. The next article discusses the development of solid methanization technology and of its sector. Whereas methanization are a matter of concern regarding risks of fire and explosion, an interview discusses the possibilities of composite flexible membranes to cover biomethane tanks

  4. An Intensional Concurrent Faithful Encoding of Turing Machines

    Directory of Open Access Journals (Sweden)

    Thomas Given-Wilson

    2014-10-01

    Full Text Available The benchmark for computation is typically given as Turing computability; the ability for a computation to be performed by a Turing Machine. Many languages exploit (indirect encodings of Turing Machines to demonstrate their ability to support arbitrary computation. However, these encodings are usually by simulating the entire Turing Machine within the language, or by encoding a language that does an encoding or simulation itself. This second category is typical for process calculi that show an encoding of lambda-calculus (often with restrictions that in turn simulates a Turing Machine. Such approaches lead to indirect encodings of Turing Machines that are complex, unclear, and only weakly equivalent after computation. This paper presents an approach to encoding Turing Machines into intensional process calculi that is faithful, reduction preserving, and structurally equivalent. The encoding is demonstrated in a simple asymmetric concurrent pattern calculus before generalised to simplify infinite terms, and to show encodings into Concurrent Pattern Calculus and Psi Calculi.

  5. Technology transfer

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    Illustrated by the example of the FRG's nuclear energy exports, it is shown that the nuclear technology transfer leads to new dimensions of intergovernmental relations, which hold within themselves on account of multiple state-to-state, scientific, industrial and - last but not least - personal contacts the chance of far-reaching friendships between countries and people. If the chance is taken, this can also be seen as an important contribution towards maintaining the peace. (orig.) [de

  6. Temporal information encoding in dynamic memristive devices

    Energy Technology Data Exchange (ETDEWEB)

    Ma, Wen; Chen, Lin; Du, Chao; Lu, Wei D., E-mail: wluee@eecs.umich.edu [Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, Michigan 48109 (United States)

    2015-11-09

    We show temporal and frequency information can be effectively encoded in memristive devices with inherent short-term dynamics. Ag/Ag{sub 2}S/Pd based memristive devices with low programming voltage (∼100 mV) were fabricated and tested. At weak programming conditions, the devices exhibit inherent decay due to spontaneous diffusion of the Ag atoms. When the devices were subjected to pulse train inputs emulating different spiking patterns, the switching probability distribution function diverges from the standard Poisson distribution and evolves according to the input pattern. The experimentally observed switching probability distributions and the associated cumulative probability functions can be well-explained using a model accounting for the short-term decay effects. Such devices offer an intriguing opportunity to directly encode neural signals for neural information storage and analysis.

  7. DNA-Encoded Dynamic Combinatorial Chemical Libraries.

    Science.gov (United States)

    Reddavide, Francesco V; Lin, Weilin; Lehnert, Sarah; Zhang, Yixin

    2015-06-26

    Dynamic combinatorial chemistry (DCC) explores the thermodynamic equilibrium of reversible reactions. Its application in the discovery of protein binders is largely limited by difficulties in the analysis of complex reaction mixtures. DNA-encoded chemical library (DECL) technology allows the selection of binders from a mixture of up to billions of different compounds; however, experimental results often show low a signal-to-noise ratio and poor correlation between enrichment factor and binding affinity. Herein we describe the design and application of DNA-encoded dynamic combinatorial chemical libraries (EDCCLs). Our experiments have shown that the EDCCL approach can be used not only to convert monovalent binders into high-affinity bivalent binders, but also to cause remarkably enhanced enrichment of potent bivalent binders by driving their in situ synthesis. We also demonstrate the application of EDCCLs in DNA-templated chemical reactions. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  8. Storing data encoded DNA in living organisms

    Science.gov (United States)

    Wong,; Pak C. , Wong; Kwong K. , Foote; Harlan, P [Richland, WA

    2006-06-06

    Current technologies allow the generation of artificial DNA molecules and/or the ability to alter the DNA sequences of existing DNA molecules. With a careful coding scheme and arrangement, it is possible to encode important information as an artificial DNA strand and store it in a living host safely and permanently. This inventive technology can be used to identify origins and protect R&D investments. It can also be used in environmental research to track generations of organisms and observe the ecological impact of pollutants. Today, there are microorganisms that can survive under extreme conditions. As well, it is advantageous to consider multicellular organisms as hosts for stored information. These living organisms can provide as memory housing and protection for stored data or information. The present invention provides well for data storage in a living organism wherein at least one DNA sequence is encoded to represent data and incorporated into a living organism.

  9. Bacillus caldolyticus prs gene encoding phosphoribosyldiphosphate synthase

    DEFF Research Database (Denmark)

    Krath, Britta N.; Hove-Jensen, Bjarne

    1996-01-01

    The prs gene, encoding phosphoribosyl-diphosphate (PRPP) synthase, as well as the flanking DNA sequences were cloned and sequenced from the Gram-positive thermophile, Bacillus caldolyticus. Comparison with the homologous sequences from the mesophile, Bacillus subtilis, revealed a gene (gca......D) encoding N-acetylglucosamine-l-phosphate uridyltransferase upstream of prs, and a gene homologous to ctc downstream of prs. cDNA synthesis with a B. caldolyticus gcaD-prs-ctc-specified mRNA as template, followed by amplification utilising the polymerase chain reaction indicated that the three genes are co......-transcribed. Comparison of amino acid sequences revealed a high similarity among PRPP synthases across a wide phylogenetic range. An E. coli strain harbouring the B. caldolyticus prs gene in a multicopy plasmid produced PRPP synthase activity 33-fold over the activity of a haploid B. caldolyticus strain. B. caldolyticus...

  10. Nucleic acid compositions and the encoding proteins

    Science.gov (United States)

    Preston, III, James F.; Chow, Virginia; Nong, Guang; Rice, John D.; St. John, Franz J.

    2014-09-02

    The subject invention provides at least one nucleic acid sequence encoding an aldouronate-utilization regulon isolated from Paenibacillus sp. strain JDR-2, a bacterium which efficiently utilizes xylan and metabolizes aldouronates (methylglucuronoxylosaccharides). The subject invention also provides a means for providing a coordinately regulated process in which xylan depolymerization and product assimilation are coupled in Paenibacillus sp. strain JDR-2 to provide a favorable system for the conversion of lignocellulosic biomass to biobased products. Additionally, the nucleic acid sequences encoding the aldouronate-utilization regulon can be used to transform other bacteria to form organisms capable of producing a desired product (e.g., ethanol, 1-butanol, acetoin, 2,3-butanediol, 1,3-propanediol, succinate, lactate, acetate, malate or alanine) from lignocellulosic biomass.

  11. Asymmetric synthesis using chiral-encoded metal

    Science.gov (United States)

    Yutthalekha, Thittaya; Wattanakit, Chularat; Lapeyre, Veronique; Nokbin, Somkiat; Warakulwit, Chompunuch; Limtrakul, Jumras; Kuhn, Alexander

    2016-08-01

    The synthesis of chiral compounds is of crucial importance in many areas of society and science, including medicine, biology, chemistry, biotechnology and agriculture. Thus, there is a fundamental interest in developing new approaches for the selective production of enantiomers. Here we report the use of mesoporous metal structures with encoded geometric chiral information for inducing asymmetry in the electrochemical synthesis of mandelic acid as a model molecule. The chiral-encoded mesoporous metal, obtained by the electrochemical reduction of platinum salts in the presence of a liquid crystal phase and the chiral template molecule, perfectly retains the chiral information after removal of the template. Starting from a prochiral compound we demonstrate enantiomeric excess of the (R)-enantiomer when using (R)-imprinted electrodes and vice versa for the (S)-imprinted ones. Moreover, changing the amount of chiral cavities in the material allows tuning the enantioselectivity.

  12. Transfer Zymography.

    Science.gov (United States)

    Pan, Daniel; Wilson, Karl A; Tan-Wilson, Anna

    2017-01-01

    The technique described here, transfer zymography, was developed to overcome two limitations of conventional zymography. When proteolytic enzymes are resolved by nonreducing SDS-PAGE into a polyacrylamide gel with copolymerized protein substrate, the presence of the protein substrate can result in anomalous, often slower, migration of the protease and an estimated mass higher than its actual mass. A further drawback is that the presence of a high background of substrate protein interferes with proteomic analysis of the protease band by excision, tryptic digestion, and LC-MS/MS analysis. In transfer zymography, the proteolytic enzymes are resolved by conventional nonreducing SDS-PAGE, without protein substrate in the gel. The proteins in the resolving gel are then electrophoretically transferred to a receiving gel that contains the protein substrate, by a process similar to western blotting. The receiving gel is then processed in a manner similar to conventional zymography. SDS is removed by Triton X-100 and incubated in conditions suitable for the proteolytic activity. After protein staining, followed by destaining, bands representing regions with active protease are visualized as clear bands in a darkly stained background. For proteomic analysis, electrophoresis is carried out simultaneously on a second resolving gel, and the bands corresponding to the clear regions in the receiving gel after zymogram development are excised for proteomic analysis.

  13. Optimal Achievable Encoding for Brain Machine Interface

    Science.gov (United States)

    2017-12-22

    dictionary-based encoding approach to translate a visual image into sequential patterns of electrical stimulation in real time , in a manner that...including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and...networks, and by applying linear decoding to complete recorded populations of retinal ganglion cells for the first time . Third, we developed a greedy

  14. Encoded libraries of chemically modified peptides.

    Science.gov (United States)

    Heinis, Christian; Winter, Greg

    2015-06-01

    The use of powerful technologies for generating and screening DNA-encoded protein libraries has helped drive the development of proteins as pharmaceutical ligands. However the development of peptides as pharmaceutical ligands has been more limited. Although encoded peptide libraries are typically several orders of magnitude larger than classical chemical libraries, can be more readily screened, and can give rise to higher affinity ligands, their use as pharmaceutical ligands is limited by their intrinsic properties. Two of the intrinsic limitations include the rotational flexibility of the peptide backbone and the limited number (20) of natural amino acids. However these limitations can be overcome by use of chemical modification. For example, the libraries can be modified to introduce topological constraints such as cyclization linkers, or to introduce new chemical entities such as small molecule ligands, fluorophores and photo-switchable compounds. This article reviews the chemistry involved, the properties of the peptide ligands, and the new opportunities offered by chemical modification of DNA-encoded peptide libraries. Copyright © 2015. Published by Elsevier Ltd.

  15. Encoding and decoding messages with chaotic lasers

    International Nuclear Information System (INIS)

    Alsing, P.M.; Gavrielides, A.; Kovanis, V.; Roy, R.; Thornburg, K.S. Jr.

    1997-01-01

    We investigate the structure of the strange attractor of a chaotic loss-modulated solid-state laser utilizing return maps based on a combination of intensity maxima and interspike intervals, as opposed to those utilizing Poincare sections defined by the intensity maxima of the laser (I=0,Ie<0) alone. We find both experimentally and numerically that a simple, intrinsic relationship exists between an intensity maximum and the pair of preceding and succeeding interspike intervals. In addition, we numerically investigate encoding messages on the output of a chaotic transmitter laser and its subsequent decoding by a similar receiver laser. By exploiting the relationship between the intensity maxima and the interspike intervals, we demonstrate that the method utilized to encode the message is vital to the system close-quote s ability to hide the signal from unwanted deciphering. In this work alternative methods are studied in order to encode messages by modulating the magnitude of pumping of the transmitter laser and also by driving its loss modulation with more than one frequency. copyright 1997 The American Physical Society

  16. Systematic pseudopotentials from reference eigenvalue sets for DFT calculations: Pseudopotential files

    Directory of Open Access Journals (Sweden)

    Pablo Rivero

    2015-06-01

    Full Text Available We present in this article a pseudopotential (PP database for DFT calculations in the context of the SIESTA code [1–3]. Comprehensive optimized PPs in two formats (psf files and input files for ATM program are provided for 20 chemical elements for LDA and GGA exchange-correlation potentials. Our data represents a validated database of PPs for SIESTA DFT calculations. Extensive transferability tests guarantee the usefulness of these PPs.

  17. Download this PDF file

    African Journals Online (AJOL)

    Nekky Umera

    International transfer pricing issues are the subject of this paper. The huge ... collection process given the vulnerability of subsidiary's country in loosing revenue. ..... diversification has created a need and opportunity for foreign exchange risk.

  18. Download this PDF file

    African Journals Online (AJOL)

    performs two main tasks as follows”: The first is being bothered only about the study .... wide variety of practical uses of linguistic theory and methodology in fields as varied as .... be transferred. Reacting to this view, Anozie (2007) quotes Bell.

  19. Download this PDF file

    African Journals Online (AJOL)

    Nassiri P

    Estimation of the Sensitivity to Heat Stress in the Outdoor Workers at Risk. .... health department of Health Ministry, and students who were ..... comfort. Each type of cloth affects heat transfer from the human and the environment by mechanisms ...

  20. Download this PDF file

    African Journals Online (AJOL)

    compared with theoretical data calculated from an ionic solvation model. ... chemistry and biology have been fully described in several review articles [3,4]. The transfer ... important physical properties of the liquid are compared with those of 1 ...

  1. Download this PDF file

    African Journals Online (AJOL)

    Marinda

    evidence of pulmonary oedema, hepatomegaly or peripheral oedema. The electrocardiogram ... intravenous line was secured. Her oxygen saturation on ... epidural catheter was removed and the patient was transferred to the general ward.

  2. Download this PDF file

    African Journals Online (AJOL)

    Fr. Ikenga

    petroleum (which includes gas) in Nigeria is regulated by law. ..... issued by the Minister of Petroleum under the Oil Pipelines Act.34 The oil pipeline ..... and materials and to promote transfer of technology and skill to Nigerians in the Industry.

  3. Download this PDF file

    African Journals Online (AJOL)

    2011-06-15

    Jun 15, 2011 ... memory and can be more easily recalled by the learner.3 However, in ... technology constraints involving the blog and the internet connection ... These elements include motivation, reinforcement, retention and transfer- ence.

  4. Download this PDF file

    African Journals Online (AJOL)

    DR. AMINU

    TOTAL CAROTENOIDS, TOCOPHEROLS AND FREE FATTY ACIDS LEVELS ... Acid(FFA) levels of oils produced from small scale mills and to evaluate their ..... and lipid contents in muscle of atlantic Salmo. Salar, transferred to seawater as.

  5. Download this PDF file

    African Journals Online (AJOL)

    PROF. MADUKWE

    2008-07-23

    Jul 23, 2008 ... Creative Commons User Licence: CC BY-NC-ND .... described as stopping bad from occurrence. ... CRIN Geographical Information System (GIS) generated land use/ land cover .... content and mode of the information transfer.

  6. Download this PDF file

    African Journals Online (AJOL)

    Preferred Customer

    surfaces that can promote efficient electron transfer process in solar energy ... that many of the key limitations to new energy conversion technology results from a ... This provides for the direct wiring of the SC-NP to the transparent bottom.

  7. DataNet: A flexible metadata overlay over file resources

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    Managing and sharing data stored in files results in a challenge due to data amounts produced by various scientific experiments [1]. While solutions such as Globus Online [2] focus on file transfer and synchronization, in this work we propose an additional layer of metadata over file resources which helps to categorize and structure the data, as well as to make it efficient in integration with web-based research gateways. A basic concept of the proposed solution [3] is a data model consisting of entities built from primitive types such as numbers, texts and also from files and relationships among different entities. This allows for building complex data structure definitions and mix metadata and file data into a single model tailored for a given scientific field. A data model becomes actionable after being deployed as a data repository which is done automatically by the proposed framework by using one of the available PaaS (platform-as-a-service) platforms and is exposed to the world as a REST service, which...

  8. 75 FR 51994 - Combined Notice of Filings

    Science.gov (United States)

    2010-08-24

    ...: Panther Interstate Pipeline Energy, LLC. Description: Panther Interstate Pipeline Energy, LLC submits tariff filing per 154.203: Panther Baseline eTariff Filing to be effective 8/ 12/2010. Filed Date: 08/13...

  9. Bacteriophage-encoded shiga toxin gene in atypical bacterial host

    Directory of Open Access Journals (Sweden)

    Casas Veronica

    2011-07-01

    Full Text Available Abstract Background Contamination from fecal bacteria in recreational waters is a major health concern since bacteria capable of causing human disease can be found in animal feces. The Dog Beach area of Ocean Beach in San Diego, California is a beach prone to closures due to high levels of fecal indicator bacteria (FIB. A potential source of these FIB could be the canine feces left behind by owners who do not clean up after their pets. We tested this hypothesis by screening the DNA isolated from canine feces for the bacteriophage-encoded stx gene normally found in the virulent strains of the fecal bacterium Escherichia coli. Results Twenty canine fecal samples were collected, processed for total and bacterial fraction DNA, and screened by PCR for the stx gene. The stx gene was detected in the total and bacterial fraction DNA of one fecal sample. Bacterial isolates were then cultivated from the stx-positive fecal sample. Eighty nine of these canine fecal bacterial isolates were screened by PCR for the stx gene. The stx gene was detected in five of these isolates. Sequencing and phylogenetic analyses of 16S rRNA gene PCR products from the canine fecal bacterial isolates indicated that they were Enterococcus and not E. coli. Conclusions The bacteriophage-encoded stx gene was found in multiple species of bacteria cultivated from canine fecal samples gathered at the shoreline of the Dog Beach area of Ocean Beach in San Diego, California. The canine fecal bacteria carrying the stx gene were not the typical E. coli host and were instead identified through phylogenetic analyses as Enterococcus. This suggests a large degree of horizontal gene transfer of exotoxin genes in recreational waters.

  10. 76 FR 52323 - Combined Notice of Filings; Filings Instituting Proceedings

    Science.gov (United States)

    2011-08-22

    .... Applicants: Young Gas Storage Company, Ltd. Description: Young Gas Storage Company, Ltd. submits tariff..., but intervention is necessary to become a party to the proceeding. The filings are accessible in the.... More detailed information relating to filing requirements, interventions, protests, and service can be...

  11. Distributing File-Based Data to Remote Sites Within the BABAR Collaboration

    International Nuclear Information System (INIS)

    Gowdy, Stephen J.

    2002-01-01

    BABAR [1] uses two formats for its data: Objectivity database and root [2] files. This poster concerns the distribution of the latter--for Objectivity data see [3]. The BABAR analysis data is stored in root files--one per physics run and analysis selection channel--maintained in a large directory tree. Currently BABAR has more than 4.5 TBytes in 200,000 root files. This data is (mostly) produced at SLAC, but is required for analysis at universities and research centers throughout the us and Europe. Two basic problems confront us when we seek to import bulk data from slac to an institute's local storage via the network. We must determine which files must be imported (depending on the local site requirements and which files have already been imported), and we must make the optimum use of the network when transferring the data. Basic ftp-like tools (ftp, scp, etc) do not attempt to solve the first problem. More sophisticated tools like rsync [4], the widely-used mirror/synchronization program, compare local and remote file systems, checking for changes (based on file date, size and, if desired, an elaborate checksum) in order to only copy new or modified files. However rsync allows for only limited file selection. Also when, as in BABAR, an extremely large directory structure must be scanned, rsync can take several hours just to determine which files need to be copied. Although rsync (and scp) provides on-the-fly compression, it does not allow us to optimize the network transfer by using multiple streams, adjusting the tcp window size, or separating encrypted authentication from unencrypted data channels

  12. Distributing file-based data to remote sites within the BABAR collaboration

    International Nuclear Information System (INIS)

    Adye, T.; Dorigo, A.; Forti, A.; Leonardi, E.

    2001-01-01

    BABAR uses two formats for its data: Objectivity database and ROOT files. This poster concerns the distribution of the latter--for Objectivity data see. The BABAR analysis data is stored in ROOT files--one per physics run and analysis selection channel-maintained in a large directory tree. Currently BABAR has more than 4.5 TBytes in 200,00- ROOT files. This data is (mostly) produced at SLAC, but is required for analysis at universities and research centres throughout the US and Europe. Two basic problems confront us when we seek to import bulk data from SLAC to an institute's local storage via the network. We must determine which files must be imported (depending on the local site requirements and which files have already been imported), and the authors must make the optimum use of the network when transferring the data. Basic ftp-like tools (ftp, scp, etc) do not attempt to solve the first problem. More sophisticated tools like rsync, the widely-used mirror/synchronisation program, compare local and remote file systems, checking for changes (based on file date, size and, if desired, an elaborate checksum) in order to only copy new or modified files. However rsync allows for only limited file selection. Also when, as in BABAR, an extremely large directory structure must be scanned, rsync can take several hours just to determine which files need to be copied. Although rsync (and scp) provides on-the-fly compression, it does not allow us to optimise the network transfer by using multiple streams, adjusting the TCP window size, or separating encrypted authentication from unencrypted data channels

  13. The DNA Files

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-06-09

    The DNA Files is a radio documentary which disseminates genetics information over public radio. The documentaries explore subjects which include the following: How genetics affects society. How human life began and how it evolved. Could new prenatal genetic tests hold the key to disease prevention later in life? Would a national genetic data base sacrifice individual privacy? and Should genes that may lead to the cure for cancer be privately owned? This report serves as a project update for the second quarter of 1998. It includes the spring/summer 1998 newsletter, the winter 1998 newsletter, the program clock, and the latest flyer.

  14. High Throughput WAN Data Transfer with Hadoop-based Storage

    Science.gov (United States)

    Amin, A.; Bockelman, B.; Letts, J.; Levshina, T.; Martin, T.; Pi, H.; Sfiligoi, I.; Thomas, M.; Wüerthwein, F.

    2011-12-01

    Hadoop distributed file system (HDFS) is becoming more popular in recent years as a key building block of integrated grid storage solution in the field of scientific computing. Wide Area Network (WAN) data transfer is one of the important data operations for large high energy physics experiments to manage, share and process datasets of PetaBytes scale in a highly distributed grid computing environment. In this paper, we present the experience of high throughput WAN data transfer with HDFS-based Storage Element. Two protocols, GridFTP and fast data transfer (FDT), are used to characterize the network performance of WAN data transfer.

  15. High Throughput WAN Data Transfer with Hadoop-based Storage

    International Nuclear Information System (INIS)

    Amin, A; Thomas, M; Bockelman, B; Letts, J; Martin, T; Pi, H; Sfiligoi, I; Wüerthwein, F; Levshina, T

    2011-01-01

    Hadoop distributed file system (HDFS) is becoming more popular in recent years as a key building block of integrated grid storage solution in the field of scientific computing. Wide Area Network (WAN) data transfer is one of the important data operations for large high energy physics experiments to manage, share and process datasets of PetaBytes scale in a highly distributed grid computing environment. In this paper, we present the experience of high throughput WAN data transfer with HDFS-based Storage Element. Two protocols, GridFTP and fast data transfer (FDT), are used to characterize the network performance of WAN data transfer.

  16. Derived virtual devices: a secure distributed file system mechanism

    Science.gov (United States)

    VanMeter, Rodney; Hotz, Steve; Finn, Gregory

    1996-01-01

    This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.

  17. Facilitating Transfers

    DEFF Research Database (Denmark)

    Kjær, Poul F.

    to specific logics of temporalisation and spatial expansion of a diverse set of social processes in relation to, for example, the economy, politics, science and the mass media. On this background, the paper will more concretely develop a conceptual framework for classifying different contextual orders...... that the essential functional and normative purpose of regulatory governance is to facilitate, stabilise and justify the transfer of condensed social components (such as economic capital and products, political decisions, legal judgements, religious beliefs and scientific knowledge) from one social contexts...

  18. Earnings Public-Use File, 2006

    Data.gov (United States)

    Social Security Administration — Social Security Administration released Earnings Public-Use File (EPUF) for 2006. File contains earnings information for individuals drawn from a systematic random...

  19. Software for Managing Personal Files.

    Science.gov (United States)

    Lundeen, Gerald

    1989-01-01

    Discusses the special characteristics of personal file management software and compares four microcomputer software packages: Notebook II with Bibliography and Convert, Pro-Cite with Biblio-Links, askSam, and Reference Manager. Each package is evaluated in terms of the user interface, file maintenance, retrieval capabilities, output, and…

  20. Mixed-Media File Systems

    NARCIS (Netherlands)

    Bosch, H.G.P.

    1999-01-01

    This thesis addresses the problem of implementing mixed-media storage systems. In this work a mixed-media file system is defined to be a system that stores both conventional (best-effort) file data and real-time continuous-media data. Continuous-media data is usually bulky, and servers storing and

  1. Radionuclide transfer

    International Nuclear Information System (INIS)

    Gerber, G.B.

    1993-01-01

    The research project described here had the aim to obtain further information on the transfer of nuclides during pregnancy and lactation. The tests were carried out in mini-pigs and rats receiving unchanging doses of radionuclides with the food. The following findings were revealed for the elements examined: Fe, Se, Cs and Zn were characterized by very high transfer levels in the mother, infant and foetus. A substantial uptake by the mother alone was observed for Co, Ag and Mn. The uptake by the foetus and infant here was 1 to 10 times lower. A preferential concentration in certain tissues was seen for Sr and Tc; the thyroid levels of Tc were about equally high in mothers and infants, while Sr showed less accumulation in the maternal bone. The lanthanide group of substances (Ce, Eu and Gd as well as Y and Ru) were only taken up to a very limited extent. The uptake of the examined radionuclides (Fe, Co, Ag, Ce) with the food ingested was found here to be ten times greater in rats as compared to mini-pigs. This showed that great caution must be observed, if the behaviour of radionuclides in man is extrapolated from relevant data obtained in rodents. (orig./MG) [de

  2. Storing files in a parallel computing system using list-based index to identify replica files

    Science.gov (United States)

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Zhang, Zhenhua; Grider, Gary

    2015-07-21

    Improved techniques are provided for storing files in a parallel computing system using a list-based index to identify file replicas. A file and at least one replica of the file are stored in one or more storage nodes of the parallel computing system. An index for the file comprises at least one list comprising a pointer to a storage location of the file and a storage location of the at least one replica of the file. The file comprises one or more of a complete file and one or more sub-files. The index may also comprise a checksum value for one or more of the file and the replica(s) of the file. The checksum value can be evaluated to validate the file and/or the file replica(s). A query can be processed using the list.

  3. Design and creation of a direct access nuclear data file

    International Nuclear Information System (INIS)

    Charpentier, P.

    1981-06-01

    General considerations on the structure of instructions and files are reviewed. Design, organization and mode of use of the different files: instruction file, index files, inverted files, automatic analysis and inquiry programs are examined [fr

  4. Modifier Genes for Mouse Phosphatidylinositol Transfer Protein alpha (vibrator) That Bypass Juvenile Lethality

    NARCIS (Netherlands)

    Concepcion, Dorothy; Johannes, Frank; Lo, Yuan Hung; Yao, Jay; Fong, Jerry; Hamilton, Bruce A.

    Phosphatidylinositol transfer proteins (PITPs) mediate lipid signaling and membrane trafficking in eukaryotic cells. Loss-of-function mutations of the gene encoding PITP alpha in mice result in a range of dosage-sensitive phenotypes, including neurological dysfunction, neurodegeneration, and

  5. 2D Barcode for DNA Encoding

    OpenAIRE

    Elena Purcaru; Cristian Toma

    2011-01-01

    The paper presents a solution for endcoding/decoding DNA information in 2D barcodes. First part focuses on the existing techniques and symbologies in 2D barcodes field. The 2D barcode PDF417 is presented as starting point. The adaptations and optimizations on PDF417 and on DataMatrix lead to the solution - DNA2DBC - DeoxyriboNucleic Acid Two Dimensional Barcode. The second part shows the DNA2DBC encoding/decoding process step by step. In conclusions are enumerated the most important features ...

  6. Dual beam encoded extended fractional Fourier transform security ...

    Indian Academy of Sciences (India)

    This paper describes a simple method for making dual beam encoded extended fractional Fourier transform (EFRT) security holograms. The hologram possesses different stages of encoding so that security features are concealed and remain invisible to the counterfeiter. These concealed and encoded anticounterfeit ...

  7. Optimal higher-order encoder time-stamping

    NARCIS (Netherlands)

    Merry, R.J.E.; Molengraft, van de M.J.G.; Steinbuch, M.

    2013-01-01

    Optical incremental encoders are used to measure the position of motion control systems. The accuracy of the position measurement is determined and bounded by the number of slits on the encoder. The position measurement is affected by quantization errors and encoder imperfections. In this paper, an

  8. Encoding of electrophysiology and other signals in MR images

    DEFF Research Database (Denmark)

    Hanson, Lars G; Lund, Torben E; Hanson, Christian G

    2007-01-01

    to the "magstripe" technique used for encoding of soundtracks in motion pictures, the electrical signals are in this way encoded as artifacts appearing in the MR images or spectra outside the region of interest. The encoded signals are subsequently reconstructed from the signal recorded by the scanner. RESULTS...

  9. Facilitating Transfers

    DEFF Research Database (Denmark)

    Kjær, Poul F.

    2018-01-01

    Departing from the paradox that globalisation has implied an increase, rather than a decrease, in contextual diversity, this paper re-assesses the function, normative purpose and location of Regulatory Governance Frameworks in world society. Drawing on insights from sociology of law and world...... society studies, the argument advanced is that Regulatory Governance Frameworks are oriented towards facilitating transfers of condensed social components, such as economic capital and products, legal acts, political decisions and scientific knowledge, from one legally-constituted normative order, i.......e. contextual setting, to another. Against this background, it is suggested that Regulatory Governance Frameworks can be understood as schemes which act as ‘rites of passage’ aimed at providing legal stabilisation to social processes characterised by liminality, i.e ambiguity, hybridity and in-betweenness....

  10. V123 Beam Synchronous Encoder Module

    International Nuclear Information System (INIS)

    Kerner, T.; Conkling, C. R.; Oerter, B.

    1999-01-01

    The V123 Synchronous Encoder Module transmits events to distributed trigger modules and embedded decoders around the RHIC rings where they are used to provide beam instrumentation triggers [1,2,3]. The RHIC beam synchronous event link hardware is mainly comprised of three VMEbus board designs, the central input modules (V201), and encoder modules (V123), and the distributed trigger modules (V124). Two beam synchronous links, one for each ring, are distributed via fiberoptic and fanned out via twisted wire pair cables. The V123 synchronizes with the RF system clock derived from the beam bucket frequency and a revolution fiducial pulse. The RF system clock is used to create the beam synchronous event link carrier and events are synchronized with the rotation fiducial. A low jitter RF clock is later recovered from this carrier by phase lock loops in the trigger modules. Prioritized hardware and software triggers fill up to 15 beam event code transmission slots per revolution while tracking the ramping RF acceleration frequency and storage frequency. The revolution fiducial event is always the first event transmitted which is used to synchronize the firing of the abort kicker and to locate the first bucket for decoders distributed about the ring

  11. Place field assembly distribution encodes preferred locations.

    Directory of Open Access Journals (Sweden)

    Omar Mamad

    2017-09-01

    Full Text Available The hippocampus is the main locus of episodic memory formation and the neurons there encode the spatial map of the environment. Hippocampal place cells represent location, but their role in the learning of preferential location remains unclear. The hippocampus may encode locations independently from the stimuli and events that are associated with these locations. We have discovered a unique population code for the experience-dependent value of the context. The degree of reward-driven navigation preference highly correlates with the spatial distribution of the place fields recorded in the CA1 region of the hippocampus. We show place field clustering towards rewarded locations. Optogenetic manipulation of the ventral tegmental area demonstrates that the experience-dependent place field assembly distribution is directed by tegmental dopaminergic activity. The ability of the place cells to remap parallels the acquisition of reward context. Our findings present key evidence that the hippocampal neurons are not merely mapping the static environment but also store the concurrent context reward value, enabling episodic memory for past experience to support future adaptive behavior.

  12. How can survival processing improve memory encoding?

    Science.gov (United States)

    Luo, Meng; Geng, Haiyan

    2013-11-01

    We investigated the psychological mechanism of survival processing advantage from the perspective of false memory in two experiments. Using a DRM paradigm in combination with analysis based on signal detection theory, we were able to separately examine participants' utilization of verbatim representation and gist representation. Specifically, in Experiment 1, participants rated semantically related words in a survival scenario for a survival condition but rated pleasantness of words in the same DRM lists for a non-survival control condition. The results showed that participants demonstrated more gist processing in the survival condition than in the pleasantness condition; however, the degree of item-specific processing in the two encoding conditions did not significantly differ. In Experiment 2, the control task was changed to a category rating task, in which participants were asked to make category ratings of words in the category lists. We found that the survival condition involved more item-specific processing than did the category condition, but we found no significant difference between the two encoding conditions at the level of gist processing. Overall, our study demonstrates that survival processing can simultaneously promote gist and item-specific representations. When the control tasks only promoted either item-specific representation or gist representation, memory advantages of survival processing occurred.

  13. Negative base encoding in optical linear algebra processors

    Science.gov (United States)

    Perlee, C.; Casasent, D.

    1986-01-01

    In the digital multiplication by analog convolution algorithm, the bits of two encoded numbers are convolved to form the product of the two numbers in mixed binary representation; this output can be easily converted to binary. Attention is presently given to negative base encoding, treating base -2 initially, and then showing that the negative base system can be readily extended to any radix. In general, negative base encoding in optical linear algebra processors represents a more efficient technique than either sign magnitude or 2's complement encoding, when the additions of digitally encoded products are performed in parallel.

  14. Download this PDF file

    African Journals Online (AJOL)

    Muiruri

    aid in order to stabilize" a patient suffering from an. "emergency medical .... health care for the poor the patient dumping dilemma. Bright Young ... Transfers involving mental health care. ... Close follow up with weekly X-rays for the first three weeks is ... 86(6): 848-855. Stimson, B.B. A Manual of Fractures and Dislocations,.

  15. Download this PDF file

    African Journals Online (AJOL)

    Patient lives in a remote village having frequent exposure to dogs and their faeces through vegetables and direct contact. On examination, patient had mild pallor, ... test for hydatid disease was negative. The patient was transferred to the Surgery department. At exploratory laparotomy, peritoneal cavity was found filled with.

  16. Download this PDF file

    African Journals Online (AJOL)

    THERMAL ANALYSIS OF SOLAR DRYERS. Abebayehu Assefa. Mechanical Engineering Department .... convective heat transfer coefficients, these sets of differential equations are non-linear. An integration ... "'-and the volwne expansion coefficient pas: ~ = 2. T°' + T.,,. 1be overall emittance€,, for the absorber plate and the ...

  17. Download this PDF file

    African Journals Online (AJOL)

    The aim of organizing these courses included; (a) to improve performance of resident doctors in the examinations; (b) for uniformity of knowledge transferred to residents. The examiners observed poor performance among candidates and nonuniformity in the teaching and knowledge transmitted to the residents; (c) for ...

  18. Download this PDF file

    African Journals Online (AJOL)

    Dr Tanya du Plessis

    MONITORING, INTERCEPTION AND BIG BOSS IN THE WORKPLACE: IS THE .... Internet. If an employee fails to comply with these rules it will, in principle, be open .... of the transfer of information in the form of data, text or visual images, and it ... monitors the traffic on a telecommunication system is covered by section 2 of.

  19. Download this PDF file

    African Journals Online (AJOL)

    SAM

    r: 4E2A612496. 5. 015 n the copyrigh cademicjourn. Research ficatio on in c er resis on1, T. M. K ..... whitefly (A. socialis) infestation, a fundamental part of our ..... by high-throughput sequencing systems and transfers them for. BLAST alignment against a database of choice, followed by Ka/Ks analysis of ... ed in Namiko.

  20. Download this PDF file

    African Journals Online (AJOL)

    Proff.Adewunmi

    Results: XML induced vasoconstrictions in rat aortic rings with or without endothelium. .... After transferring the proteins onto polyvinylidene fluoride membranes, the blotting was performed at 200 V, 300 mA for 45 min. .... [Effect of Xinmailong on hypoxia-inducible factor-1alpha expression in neonatal rats with asphyxia].

  1. Download this PDF file

    African Journals Online (AJOL)

    USER

    insemination and embryo transfer in small ... ovulation rate, average litter size, resorption rate, conception rate and embryo ... Pregnancy rate (%) ... Table I: Effects of synchronization protocolon oestrus response of yankasa sheep (mean ± sem) ... gonadotrophin releasing Hormone (GnRH) 30 .... time artificial insemination.

  2. Download this PDF file

    African Journals Online (AJOL)

    The salt coated samples were transferred to silica boats and dried in a hot air oven at 110° for 2 hr. The oxidation experiments were .... This liquid phase, when in contact with AlSI-303 alloy, attacks the Cro, film on the alloy surface: ... Materials. Chemistry-III, Ed. Munir, Z.A.; Cubicciotti, D., The Electrochem. Soc.,. Pennington: ...

  3. Download this PDF file

    African Journals Online (AJOL)

    user

    Post injection foot drop constitutes 7.6% of paediatric orthopaedic pathology seen in our unit. ... The purpose of this paper is to outline our outcome and technique of anterior transfer of the .... after intramuscular injection, J Bone joint. Surg (Br.) ...

  4. Download this PDF file

    African Journals Online (AJOL)

    Administrator

    state of hemorrhagic shock following primary postpartum hemorrhage of 4hours duration. She had earlier delivered in a traditional birth attendance (TBA) clinic, from where she was transferred to our unit. The only significant finding in her medical history is that she was a known hypertensive, diagnosed 3years earlier.

  5. Powering physics data transfers with FDT

    International Nuclear Information System (INIS)

    Maxa, Zdenek; Kcira, Dorian; Legrand, Iosif; Mughal, Azher; Thomas, Michael; Voicu, Ramiro; Ahmed, Badar

    2011-01-01

    We present a data transfer system for the grid environment built on top of the open source FDT tool (Fast Data Transfer) developed by Caltech in collaboration with the National University of Science and Technology (Pakistan). The enhancement layer above FDT consists of a client program - fdtcp (FDT copy) and a fdtd service (FDT daemon). This pair of components allows for GSI authenticated data transfers and offers to the user (or data movement production service) interface analogous to grid middle-ware data transfer services - SRM (i.e. srmcp) or GridFTP (i.e. globus-url-copy). fdtcp/fdtd enables third-party, batched file transfers. An important aspect is monitoring by means of the MonALISA active monitoring light-weight library ApMon, providing real-time monitoring and arrival time estimates as well as powerful troubleshooting mechanism. The actual transfer is carried out by the FDT application, an efficient application capable of reading and writing at disk speed over wide area networks. FDT's excellent performance was demonstrated e.g. during SuperComputing 2009 Bandwidth Challenge. We also discuss the storage technology interface layer, specifically focusing on the open source Hadoop distributed file system (HDFS), presenting the recently developed FDT-HDFS sequential write adapter. The integration with CMS PhEDEx is described as well. The PhEDEx project (Physics Experiment Data Export) is responsible for facilitating large-scale CMS data transfers across the grid. Ongoing and future development involves interfacing with next generation network services developed by OGF NSI-WG, GLIF and DICE groups, allowing for network resource reservation and scheduling.

  6. Efficient visibility encoding for dynamic illumination in direct volume rendering.

    Science.gov (United States)

    Kronander, Joel; Jönsson, Daniel; Löw, Joakim; Ljung, Patric; Ynnerman, Anders; Unger, Jonas

    2012-03-01

    We present an algorithm that enables real-time dynamic shading in direct volume rendering using general lighting, including directional lights, point lights, and environment maps. Real-time performance is achieved by encoding local and global volumetric visibility using spherical harmonic (SH) basis functions stored in an efficient multiresolution grid over the extent of the volume. Our method enables high-frequency shadows in the spatial domain, but is limited to a low-frequency approximation of visibility and illumination in the angular domain. In a first pass, level of detail (LOD) selection in the grid is based on the current transfer function setting. This enables rapid online computation and SH projection of the local spherical distribution of visibility information. Using a piecewise integration of the SH coefficients over the local regions, the global visibility within the volume is then computed. By representing the light sources using their SH projections, the integral over lighting, visibility, and isotropic phase functions can be efficiently computed during rendering. The utility of our method is demonstrated in several examples showing the generality and interactive performance of the approach.

  7. Virtual file system for PSDS

    Science.gov (United States)

    Runnels, Tyson D.

    1993-01-01

    This is a case study. It deals with the use of a 'virtual file system' (VFS) for Boeing's UNIX-based Product Standards Data System (PSDS). One of the objectives of PSDS is to store digital standards documents. The file-storage requirements are that the files must be rapidly accessible, stored for long periods of time - as though they were paper, protected from disaster, and accumulative to about 80 billion characters (80 gigabytes). This volume of data will be approached in the first two years of the project's operation. The approach chosen is to install a hierarchical file migration system using optical disk cartridges. Files are migrated from high-performance media to lower performance optical media based on a least-frequency-used algorithm. The optical media are less expensive per character stored and are removable. Vital statistics about the removable optical disk cartridges are maintained in a database. The assembly of hardware and software acts as a single virtual file system transparent to the PSDS user. The files are copied to 'backup-and-recover' media whose vital statistics are also stored in the database. Seventeen months into operation, PSDS is storing 49 gigabytes. A number of operational and performance problems were overcome. Costs are under control. New and/or alternative uses for the VFS are being considered.

  8. Performance studies and improvements of CMS distributed data transfers

    International Nuclear Information System (INIS)

    Bonacorsi, D; Flix, J; Kaselis, R; Magini, N; Letts, J; Sartirana, A

    2012-01-01

    CMS computing needs reliable, stable and fast connections among multi-tiered distributed infrastructures. CMS experiment relies on File Transfer Services (FTS) for data distribution, a low level data movement service responsible for moving sets of files from one site to another, while allowing participating sites to control the network resource usage. FTS servers are provided by Tier-0 and Tier-1 centers and used by all the computing sites in CMS, subject to established CMS and sites setup policies, including all the virtual organizations making use of the Grid resources at the site, and properly dimensioned to satisfy all the requirements for them. Managing the service efficiently needs good knowledge of the CMS needs for all kind of transfer routes, and the sharing and interference with other VOs using the same FTS transfer managers. This contribution deals with a complete revision of all FTS servers used by CMS, customizing the topologies and improving their setup in order to keep CMS transferring data to the desired levels, as well as performance studies for all kind of transfer routes, including overheads measurements introduced by SRM servers and storage systems, FTS server misconfigurations and identification of congested channels, historical transfer throughputs per stream, file-latency studies,… This information is retrieved directly from the FTS servers through the FTS Monitor webpages and conveniently archived for further analysis. The project provides an interface for all these values, to ease the analysis of the data.

  9. PKA spectrum file

    Energy Technology Data Exchange (ETDEWEB)

    Kawai, M. [Toshiba Corp., Kawasaki, Kanagawa (Japan). Nuclear Engineering Lab.

    1997-03-01

    In the Japanese Nuclear Data Committee, the PKA/KERMA file containing PKA spectra, KERMA factors and DPA cross sections in the energy range between 10{sup -5} eV and 50 MeV is being prepared from the evaluated nuclear data. The processing code ESPERANT was developed to calculate quantities of PKA, KERMA and DPA from evaluated nuclear data for medium and heavy elements by using the effective single particle emission approximation (ESPEA). For light elements, the PKA spectra are evaluated by the SCINFUL/DDX and EXIFON codes, simultaneously with other neutron cross sections. The DPA cross sections due to charged particle emitted from light elements are evaluated for high neutron energy above 20 MeV. (author)

  10. Bulk Data Movement for Climate Dataset: Efficient Data Transfer Management with Dynamic Transfer Adjustment

    International Nuclear Information System (INIS)

    Sim, Alexander; Balman, Mehmet; Williams, Dean; Shoshani, Arie; Natarajan, Vijaya

    2010-01-01

    Many scientific applications and experiments, such as high energy and nuclear physics, astrophysics, climate observation and modeling, combustion, nano-scale material sciences, and computational biology, generate extreme volumes of data with a large number of files. These data sources are distributed among national and international data repositories, and are shared by large numbers of geographically distributed scientists. A large portion of data is frequently accessed, and a large volume of data is moved from one place to another for analysis and storage. One challenging issue in such efforts is the limited network capacity for moving large datasets to explore and manage. The Bulk Data Mover (BDM), a data transfer management tool in the Earth System Grid (ESG) community, has been managing the massive dataset transfers efficiently with the pre-configured transfer properties in the environment where the network bandwidth is limited. Dynamic transfer adjustment was studied to enhance the BDM to handle significant end-to-end performance changes in the dynamic network environment as well as to control the data transfers for the desired transfer performance. We describe the results from the BDM transfer management for the climate datasets. We also describe the transfer estimation model and results from the dynamic transfer adjustment.

  11. Structural Encoding of Static Single Assignment Form

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian; Franz, Michael

    2005-01-01

    Static Single Assignment (SSA) form is often used as an intermediate representation during code optimization in Java Virtual Machines. Recently, SSA has successfully been used for bytecode verification. However, constructing SSA at the code consumer is costly. SSAbased mobile code transport formats...... Java bytecode. While the resulting bytecode sequence can still be directly executed by traditional Virtual Machines, our novel VM can infer SSA form and confirm its safety with virtually no overhead....... have been shown to eliminate this cost by shifting SSA creation to the code producer. These new formats, however, are not backward compatible with the established Java class-file format. We propose a novel approach to transport SSA information implicitly through structural code properties of standard...

  12. SXT/R391 Integrative and Conjugative Elements (ICEs) Encode a Novel 'Trap-Door' Strategy for Mobile Element Escape.

    Science.gov (United States)

    Ryan, Michael P; Armshaw, Patricia; Pembroke, J Tony

    2016-01-01

    Integrative conjugative elements (ICEs) are a class of bacterial mobile elements that have the ability to mediate their own integration, excision, and transfer from one host genome to another by a mechanism of site-specific recombination, self-circularisation, and conjugative transfer. Members of the SXT/R391 ICE family of enterobacterial mobile genetic elements display an unusual UV-inducible sensitization function which results in stress induced killing of bacterial cells harboring the ICE. This sensitization has been shown to be associated with a stress induced overexpression of a mobile element encoded conjugative transfer gene, orf43, a traV homolog. This results in cell lysis and release of a circular form of the ICE. Induction of this novel system may allow transfer of an ICE, enhancing its survival potential under conditions not conducive to conjugative transfer.

  13. SXT/R391 ICE elements encode a novel ‘trap-door’ strategy for mobile element escape

    Directory of Open Access Journals (Sweden)

    Michael P Ryan

    2016-05-01

    Full Text Available Integrative Conjugative Elements (ICEs are a class of bacterial mobile elements that have the ability to mediate their own integration, excision and transfer from one host genome to another by a mechanism of site-specific recombination, self-circularisation and conjugative transfer. Members of the SXT/R391 ICE family of enterobacterial mobile genetic elements display an unusual UV-inducible sensitisation function which results in stress induced killing of bacterial cells harbouring the ICE. This sensitisation has been shown to be associated with a stress induced overexpression of a mobile element encoded conjugative transfer gene, orf43, a traV homolog. This results in cell lysis and release of a circular form of the ICE. Induction of this novel system may allow transfer of an ICE, enhancing its survival potential under conditions not conducive to conjugative transfer.

  14. 5 CFR 1203.13 - Filing pleadings.

    Science.gov (United States)

    2010-01-01

    ... delivery, by facsimile, or by e-filing in accordance with § 1201.14 of this chapter. If the document was... submitted by e-filing, it is considered to have been filed on the date of electronic submission. (e... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Filing pleadings. 1203.13 Section 1203.13...

  15. 12 CFR 16.33 - Filing fees.

    Science.gov (United States)

    2010-01-01

    ... Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITIES OFFERING DISCLOSURE RULES § 16.33 Filing fees. (a) Filing fees must accompany certain filings made under the provisions of this part... Comptroller of the Currency Fees published pursuant to § 8.8 of this chapter. (b) Filing fees must be paid by...

  16. 77 FR 13587 - Combined Notice of Filings

    Science.gov (United States)

    2012-03-07

    .... Applicants: Transcontinental Gas Pipe Line Company. Description: Annual Electric Power Tracker Filing... Company. Description: 2012 Annual Fuel and Electric Power Reimbursement to be effective 4/1/2012. Filed... submits tariff filing per 154.403: Storm Surcharge 2012 to be effective 4/1/2012. Filed Date: 3/1/12...

  17. 75 FR 4689 - Electronic Tariff Filings

    Science.gov (United States)

    2010-01-29

    ... elements ``are required to properly identify the nature of the tariff filing, organize the tariff database... (or other pleading) and the Type of Filing code chosen will be resolved in favor of the Type of Filing...'s wish expressed in its transmittal letter or in other pleadings, the Commission may not review a...

  18. Encoding circuit for transform coding of a picture signal and decoding circuit for encoding said signal

    NARCIS (Netherlands)

    1991-01-01

    Encoding circuit for transforming a picture signal into blocks of, for example, 8*8 coefficients, in which each block of coefficients is read motion-adaptively. In the case of motion within a sub-picture, the block of coefficients is read in such an order that the obtained series of coefficients

  19. Video encoder/decoder for encoding/decoding motion compensated images

    NARCIS (Netherlands)

    1996-01-01

    Video encoder and decoder, provided with a motion compensator for motion-compensated video coding or decoding in which a picture is coded or decoded in blocks in alternately horizontal and vertical steps. The motion compensator is provided with addressing means (160) and controlled multiplexers

  20. Detecting Malicious Code by Binary File Checking

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2014-01-01

    Full Text Available The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects. A direct content change is possible when the intruder knows the structural information of the binary file. The paper describes the structural properties of the binary object files, how the content can be controlled by a possible intruder and what the ways to identify malicious code in such kind of files. Because the object files are inputs in linking processes, early detection of the malicious content is crucial to avoid infection of the binary executable files.

  1. Agrobacterium T-DNA-encoded protein Atu6002 interferes with the host auxin response

    Science.gov (United States)

    Lacroix, Benoît; Gizatullina, Diana I.; Babst, Benjamin A.; Gifford, Andrew N.; Citovsky, Vitaly

    2013-01-01

    Summary Several genes in the Agrobacterium tumefaciens transferred (T) DNA encode proteins that are involved in developmental alterations leading to the formation of tumors in infected plants. We investigated the role of the protein encoded by the Atu6002 gene, the function of which is completely unknown. The Atu6002 expression occurs in Agrobacterium-induced tumors, and is also activated upon activation of plant cell division by growth hormones. Within the expressing plant cells, the Atu6002 protein is targeted to the plasma membrane. Interestingly, constitutive ectopic expression of Atu6002 in transgenic tobacco plants lead to a severe developmental phenotype characterized by stunted growth, shorter internodes, lanceolate leaves, increased branching, and modified flower morphology. These Atu6002-expressing plants also displayed impaired response to auxin. However, auxin cellular uptake and polar transport were not significantly inhibited in these plants, suggesting that Atu6002 interferes with auxin perception or signaling pathways. PMID:24128370

  2. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    Directory of Open Access Journals (Sweden)

    Kuang Tsan Lin

    2014-01-01

    Full Text Available The Rivest-Shamir-Adleman (RSA encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.

  3. Brain Circuits Encoding Reward from Pain Relief.

    Science.gov (United States)

    Navratilova, Edita; Atcherley, Christopher W; Porreca, Frank

    2015-11-01

    Relief from pain in humans is rewarding and pleasurable. Primary rewards, or reward-predictive cues, are encoded in brain reward/motivational circuits. While considerable advances have been made in our understanding of reward circuits underlying positive reinforcement, less is known about the circuits underlying the hedonic and reinforcing actions of pain relief. We review findings from electrophysiological, neuroimaging, and behavioral studies supporting the concept that the rewarding effect of pain relief requires opioid signaling in the anterior cingulate cortex (ACC), activation of midbrain dopamine neurons, and the release of dopamine in the nucleus accumbens (NAc). Understanding of circuits that govern the reward of pain relief may allow the discovery of more effective and satisfying therapies for patients with acute or chronic pain.

  4. Premotor and Motor Cortices Encode Reward.

    Directory of Open Access Journals (Sweden)

    Pavan Ramkumar

    Full Text Available Rewards associated with actions are critical for motivation and learning about the consequences of one's actions on the world. The motor cortices are involved in planning and executing movements, but it is unclear whether they encode reward over and above limb kinematics and dynamics. Here, we report a categorical reward signal in dorsal premotor (PMd and primary motor (M1 neurons that corresponds to an increase in firing rates when a trial was not rewarded regardless of whether or not a reward was expected. We show that this signal is unrelated to error magnitude, reward prediction error, or other task confounds such as reward consumption, return reach plan, or kinematic differences across rewarded and unrewarded trials. The availability of reward information in motor cortex is crucial for theories of reward-based learning and motivational influences on actions.

  5. Radiofrequency encoded angular-resolved light scattering

    DEFF Research Database (Denmark)

    Buckley, Brandon W.; Akbari, Najva; Diebold, Eric D.

    2015-01-01

    The sensitive, specific, and label-free classification of microscopic cells and organisms is one of the outstanding problems in biology. Today, instruments such as the flow cytometer use a combination of light scatter measurements at two distinct angles to infer the size and internal complexity...... of cells at rates of more than 10,000 per second. However, by examining the entire angular light scattering spectrum it is possible to classify cells with higher resolution and specificity. Current approaches to performing these angular spectrum measurements all have significant throughput limitations...... Encoded Angular-resolved Light Scattering (REALS), this technique multiplexes angular light scattering in the radiofrequency domain, such that a single photodetector captures the entire scattering spectrum from a particle over approximately 100 discrete incident angles on a single shot basis. As a proof...

  6. Endogenous opioids encode relative taste preference.

    Science.gov (United States)

    Taha, Sharif A; Norsted, Ebba; Lee, Lillian S; Lang, Penelope D; Lee, Brian S; Woolley, Joshua D; Fields, Howard L

    2006-08-01

    Endogenous opioid signaling contributes to the neural control of food intake. Opioid signaling is thought to regulate palatability, the reward value of a food item as determined by orosensory cues such as taste and texture. The reward value of a food reflects not only these sensory properties but also the relative value of competing food choices. In the present experiment, we used a consummatory contrast paradigm to manipulate the relative value of a sucrose solution for two groups of rats. Systemic injection of the nonspecific opioid antagonist naltrexone suppressed sucrose intake; for both groups, however, this suppression was selective, occurring only for the relatively more valuable sucrose solution. Our results indicate that endogenous opioid signaling contributes to the encoding of relative reward value.

  7. Measurement strategy for spatially encoded photonic qubits

    International Nuclear Information System (INIS)

    Solis-Prosser, M. A.; Neves, L.

    2010-01-01

    We propose a measurement strategy which can, probabilistically, reproduce the statistics of any observable for spatially encoded photonic qubits. It comprises the implementation of a two-outcome positive operator-valued measure followed by a detection in a fixed transverse position, making the displacement of the detection system unnecessary, unlike previous methods. This strategy generalizes a scheme recently demonstrated by one of us and co-workers, restricted to measurement of observables with equatorial eigenvectors only. The method presented here can be implemented with the current technology of programmable multipixel liquid-crystal displays. In addition, it can be straightforwardly extended to high-dimensional qudits and may be a valuable tool in optical implementations of quantum information protocols with spatial qubits and qudits.

  8. 77 FR 74839 - Combined Notice of Filings

    Science.gov (United States)

    2012-12-18

    ..., LP. Description: National Grid LNG, LP submits tariff filing per 154.203: Adoption of NAESB Version 2... with Order to Amend NAESB Version 2.0 Filing to be effective 12/1/2012. Filed Date: 12/11/12. Accession...: Refile to comply with Order on NAESB Version 2.0 Filing to be effective 12/1/2012. Filed Date: 12/11/12...

  9. The File System Interface is an Anachronism

    OpenAIRE

    Ellard, Daniel

    2003-01-01

    Contemporary file systems implement a set of abstractions and semantics that are suboptimal for many (if not most) purposes. The philosophy of using the simple mechanisms of the file system as the basis for a vast array of higher-level mechanisms leads to inefficient and incorrect implementations. We propose several extensions to the canonical file system model, including explicit support for lock files, indexed files, and resource forks, and the benefit of session semantics for write updates...

  10. MPEG-1 low-cost encoder solution

    Science.gov (United States)

    Grueger, Klaus; Schirrmeister, Frank; Filor, Lutz; von Reventlow, Christian; Schneider, Ulrich; Mueller, Gerriet; Sefzik, Nicolai; Fiedrich, Sven

    1995-02-01

    A solution for real-time compression of digital YCRCB video data to an MPEG-1 video data stream has been developed. As an additional option, motion JPEG and video telephone streams (H.261) can be generated. For MPEG-1, up to two bidirectional predicted images are supported. The required computational power for motion estimation and DCT/IDCT, memory size and memory bandwidth have been the main challenges. The design uses fast-page-mode memory accesses and requires only one single 80 ns EDO-DRAM with 256 X 16 organization for video encoding. This can be achieved only by using adequate access and coding strategies. The architecture consists of an input processing and filter unit, a memory interface, a motion estimation unit, a motion compensation unit, a DCT unit, a quantization control, a VLC unit and a bus interface. For using the available memory bandwidth by the processing tasks, a fixed schedule for memory accesses has been applied, that can be interrupted for asynchronous events. The motion estimation unit implements a highly sophisticated hierarchical search strategy based on block matching. The DCT unit uses a separated fast-DCT flowgraph realized by a switchable hardware unit for both DCT and IDCT operation. By appropriate multiplexing, only one multiplier is required for: DCT, quantization, inverse quantization, and IDCT. The VLC unit generates the video-stream up to the video sequence layer and is directly coupled with an intelligent bus-interface. Thus, the assembly of video, audio and system data can easily be performed by the host computer. Having a relatively low complexity and only small requirements for DRAM circuits, the developed solution can be applied to low-cost encoding products for consumer electronics.

  11. 76 FR 10925 - Bio-Life Labs, Inc., BSI2000, Inc., Calais Resources, Inc., EGX Funds Transfer, Inc., Great...

    Science.gov (United States)

    2011-02-28

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Bio-Life Labs, Inc., BSI2000, Inc., Calais Resources, Inc., EGX Funds Transfer, Inc., Great Western Land Recreation, Inc. (a/k/a Great Western Land and... securities of Bio-Life Labs, Inc. because it has not filed any periodic reports since the period ended March...

  12. Heat transfer: Pittsburgh 1987

    International Nuclear Information System (INIS)

    Lyczkowski, R.W.

    1987-01-01

    This book contains papers divided among the following sections: Process Heat Transfer; Thermal Hydraulics and Phase Change Phenomena; Analysis of Multicomponent Multiphase Flow and Heat Transfer; Heat Transfer in Advanced Reactors; General Heat Transfer in Solar Energy; Numerical Simulation of Multiphase Flow and Heat Transfer; High Temperature Heat Transfer; Heat Transfer Aspects of Severe Reactor Accidents; Hazardous Waste On-Site Disposal; and General Papers

  13. WLCG transfers dashboard: a unified monitoring tool for heterogeneous data transfers

    International Nuclear Information System (INIS)

    Andreeva, J; Beche, A; Saiz, P; Tuckett, D; Belov, S; Kadochnikov, I

    2014-01-01

    The Worldwide LHC Computing Grid provides resources for the four main virtual organizations. Along with data processing, data distribution is the key computing activity on the WLCG infrastructure. The scale of this activity is very large, the ATLAS virtual organization (VO) alone generates and distributes more than 40 PB of data in 100 million files per year. Another challenge is the heterogeneity of data transfer technologies. Currently there are two main alternatives for data transfers on the WLCG: File Transfer Service and XRootD protocol. Each LHC VO has its own monitoring system which is limited to the scope of that particular VO. There is a need for a global system which would provide a complete cross-VO and cross-technology picture of all WLCG data transfers. We present a unified monitoring tool – WLCG Transfers Dashboard – where all the VOs and technologies coexist and are monitored together. The scale of the activity and the heterogeneity of the system raise a number of technical challenges. Each technology comes with its own monitoring specificities and some of the VOs use several of these technologies. This paper describes the implementation of the system with particular focus on the design principles applied to ensure the necessary scalability and performance, and to easily integrate any new technology providing additional functionality which might be specific to that technology.

  14. WLCG Transfers Dashboard: a Unified Monitoring Tool for Heterogeneous Data Transfers

    Science.gov (United States)

    Andreeva, J.; Beche, A.; Belov, S.; Kadochnikov, I.; Saiz, P.; Tuckett, D.

    2014-06-01

    The Worldwide LHC Computing Grid provides resources for the four main virtual organizations. Along with data processing, data distribution is the key computing activity on the WLCG infrastructure. The scale of this activity is very large, the ATLAS virtual organization (VO) alone generates and distributes more than 40 PB of data in 100 million files per year. Another challenge is the heterogeneity of data transfer technologies. Currently there are two main alternatives for data transfers on the WLCG: File Transfer Service and XRootD protocol. Each LHC VO has its own monitoring system which is limited to the scope of that particular VO. There is a need for a global system which would provide a complete cross-VO and cross-technology picture of all WLCG data transfers. We present a unified monitoring tool - WLCG Transfers Dashboard - where all the VOs and technologies coexist and are monitored together. The scale of the activity and the heterogeneity of the system raise a number of technical challenges. Each technology comes with its own monitoring specificities and some of the VOs use several of these technologies. This paper describes the implementation of the system with particular focus on the design principles applied to ensure the necessary scalability and performance, and to easily integrate any new technology providing additional functionality which might be specific to that technology.

  15. Nuclear fuel pellet transfer escalator

    International Nuclear Information System (INIS)

    Huggins, T.B. Sr.; Roberts, E.; Edmunds, M.O.

    1991-01-01

    This patent describes a nuclear fuel pellet escalator for loading nuclear fuel pellets into a sintering boat. It comprises a generally horizontally-disposed pellet transfer conveyor for moving pellets in single file fashion from a receiving end to a discharge end thereof, the conveyor being mounted about an axis at its receiving end for pivotal movement to generally vertically move its discharge end toward and away from a sintering boat when placed below the discharge end of the conveyor, the conveyor including an elongated arm swingable vertically about the axis and having an elongated channel recessed below an upper side of the arm and extending between the receiving and discharge ends of the conveyor; a pellet dispensing chute mounted to the arm of the conveyor at the discharge end thereof and extending therebelow such that the chute is carried at the discharge end of the conveyor for generally vertical movement therewith toward and away from the sintering boat

  16. Curved canals: Ancestral files revisited

    Directory of Open Access Journals (Sweden)

    Jain Nidhi

    2008-01-01

    Full Text Available The aim of this article is to provide an insight into different techniques of cleaning and shaping of curved root canals with hand instruments. Although a plethora of root canal instruments like ProFile, ProTaper, LightSpeed ® etc dominate the current scenario, the inexpensive conventional root canal hand files such as K-files and flexible files can be used to get optimum results when handled meticulously. Special emphasis has been put on the modifications in biomechanical canal preparation in a variety of curved canal cases. This article compiles a series of clinical cases of root canals with curvatures in the middle and apical third and with S-shaped curvatures that were successfully completed by employing only conventional root canal hand instruments.

  17. Value Modifier Public Use File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Center for Medicare (CM) has created a standard analytical file intended to promote transparency. For each Value Modifier performance year, CM will publish a...

  18. Cytoscape file of chemical networks

    Data.gov (United States)

    U.S. Environmental Protection Agency — The maximum connectivity scores of pairwise chemical conditions summarized from Cmap results in a file with Cytoscape format (http://www.cytoscape.org/). The figures...

  19. File: nuclear safety and transparency

    International Nuclear Information System (INIS)

    Martinez, J.P.; Etchegoyen, A.; Jeandron, C.

    2001-01-01

    Several experiences of nuclear safety and transparency are related in this file. Public information, access to documents, transparency in nuclear regulation are such subjects developed in this debate. (N.C.)

  20. Physician Compare National Downloadable File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Physician Compare National Downloadable File is organized at the individual eligible professional level; each line is unique at the professional/enrollment...

  1. Registering Researchers in Authority Files

    NARCIS (Netherlands)

    Altman, M.; Conlon, M.; Cristan, A.L.; Dawson, L.; Dunham, J.; Hickey, T.; Hook, D.; Horstmann, W.; MacEwan, A.; Schreur, P.; Smart, L.; Smith-Yoshimura, K.; Wacker, M.; Woutersen, S.

    2014-01-01

    Registering researchers in some type of authority file or identifier system has become more compelling as both institutions and researchers recognize the need to compile their scholarly output. The report presents functional requirements and recommendations for six stakeholders: researchers,

  2. Health Topic XML File Description

    Science.gov (United States)

    ... this page: https://medlineplus.gov/xmldescription.html Health Topic XML File Description: MedlinePlus To use the sharing ... information categories assigned. Example of a Full Health Topic Record A record for a MedlinePlus health topic ...

  3. Download this PDF file

    African Journals Online (AJOL)

    HP

    Results: The ion-pair complex of DX and MO obeyed Beer's law in the range of 2 - 20 g mL-1 of DX with a correlation coefficient of 0.998. Recovery was good, with a relative standard deviation .... and transferred into a 50 mL volumetric flask. The volume was made up to mark with alcohol, shaken well and filtered through ...

  4. 78 FR 56224 - Hydro Nelson, Ltd.; Hydro-WM, LLC; Notice of Transfer of Exemption

    Science.gov (United States)

    2013-09-12

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Project No. 3401-049] Hydro Nelson, Ltd.; Hydro-WM, LLC; Notice of Transfer of Exemption 1. By documentation filed July 8, 2013 and supplemented... Hydro-WM, LLC. The project is located on the Rockfish River in Nelson County, Virginia. The transfer of...

  5. 76 FR 13000 - Transfer of Commercial First-Class Mail Parcels to Competitive Product List

    Science.gov (United States)

    2011-03-09

    ...: On February 24, 2011, the United States Postal Service[supreg] filed with the Postal Regulatory Commission a Request of the United States Postal Service to transfer commercial First-Class Mail Parcels from... POSTAL SERVICE Transfer of Commercial First-Class Mail Parcels to Competitive Product List AGENCY...

  6. 75 FR 52378 - Transfer of Commercial Standard Mail Parcels to Competitive Product List

    Science.gov (United States)

    2010-08-25

    ..., 2010, the United States Postal Service[reg] filed with the Postal Regulatory Commission a Request of the United States Postal Service to transfer commercial Standard Mail Parcels from the Mail... POSTAL SERVICE Transfer of Commercial Standard Mail Parcels to Competitive Product List AGENCY...

  7. 76 FR 49462 - Newfound Hydroelectric Company, KTZ Hydro, LLC; Notice of Application for Transfer of License...

    Science.gov (United States)

    2011-08-10

    ... Hydroelectric Company, KTZ Hydro, LLC; Notice of Application for Transfer of License, and Soliciting Comments and Motions To Intervene On July 25, 2011, Newfound Hydroelectric Company (transferor) and KTZ Hydro, LLC (transferee) filed an application for transfer of license for the Newfound Hydroelectric Project...

  8. 25 CFR 11.907 - Transfer to Court of Indian Offenses.

    Science.gov (United States)

    2010-04-01

    ....907 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Children's Court § 11.907 Transfer to Court of Indian Offenses. (a) The presenting officer or the minor may file a petition requesting the children's court to transfer the minor to...

  9. 78 FR 69663 - Jonathan and Jayne Chase Troy Mills Hydroelectric Inc.; Notice of Transfer of Exemption

    Science.gov (United States)

    2013-11-20

    ... Jayne Chase Troy Mills Hydroelectric Inc.; Notice of Transfer of Exemption 1. By letter filed October 15, 2013, Jonathan Chase informed the Commission that the exemption from licensing for the Troy Hydroelectric Project, FERC No. 13381, originally issued December 2, 2011,\\1\\ has been transferred to Troy Mills...

  10. Modular verification of chemical reaction network encodings via serializability analysis

    Science.gov (United States)

    Lakin, Matthew R.; Stefanovic, Darko; Phillips, Andrew

    2015-01-01

    Chemical reaction networks are a powerful means of specifying the intended behaviour of synthetic biochemical systems. A high-level formal specification, expressed as a chemical reaction network, may be compiled into a lower-level encoding, which can be directly implemented in wet chemistry and may itself be expressed as a chemical reaction network. Here we present conditions under which a lower-level encoding correctly emulates the sequential dynamics of a high-level chemical reaction network. We require that encodings are transactional, such that their execution is divided by a “commit reaction” that irreversibly separates the reactant-consuming phase of the encoding from the product-generating phase. We also impose restrictions on the sharing of species between reaction encodings, based on a notion of “extra tolerance”, which defines species that may be shared between encodings without enabling unwanted reactions. Our notion of correctness is serializability of interleaved reaction encodings, and if all reaction encodings satisfy our correctness properties then we can infer that the global dynamics of the system are correct. This allows us to infer correctness of any system constructed using verified encodings. As an example, we show how this approach may be used to verify two- and four-domain DNA strand displacement encodings of chemical reaction networks, and we generalize our result to the limit where the populations of helper species are unlimited. PMID:27325906

  11. Overview and Status of the Ceph File System

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    The Ceph file system (CephFS) is the POSIX-compatible distributed file system running on top of Ceph's powerful and stable object store. This presentation will give a general introduction of CephFS and detail the recent work the Ceph team has done to improve its stability and usability. In particular, we will cover directory fragmentation, multiple active metadata servers, and directory subtree pinning to metadata servers, features slated for stability in the imminent Luminous release. This talk will also give an overview of how we are measuring performance of multiple active metadata servers using large on-demand cloud deployments. The results will highlight how CephFS distributes metadata load across metadata servers to achieve scaling. About the speaker Patrick Donnelly is a software engineer at Red Hat, Inc. currently working on the Ceph distributed file system. In 2016 he completed his Ph.D. in computer science at the University of Notre Dame with a dissertation on the topic of file transfer management...

  12. JNDC FP decay data file

    International Nuclear Information System (INIS)

    Yamamoto, Tohru; Akiyama, Masatsugu

    1981-02-01

    The decay data file for fission product nuclides (FP DECAY DATA FILE) has been prepared for summation calculation of the decay heat of fission products. The average energies released in β- and γ-transitions have been calculated with computer code PROFP. The calculated results and necessary information have been arranged in tabular form together with the estimated results for 470 nuclides of which decay data are not available experimentally. (author)

  13. Specifying a Realistic File System

    Directory of Open Access Journals (Sweden)

    Sidney Amani

    2015-11-01

    Full Text Available We present the most interesting elements of the correctness specification of BilbyFs, a performant Linux flash file system. The BilbyFs specification supports asynchronous writes, a feature that has been overlooked by several file system verification projects, and has been used to verify the correctness of BilbyFs's fsync( C implementation. It makes use of nondeterminism to be concise and is shallowly-embedded in higher-order logic.

  14. 76 FR 43679 - Filing via the Internet; Notice of Additional File Formats for efiling

    Science.gov (United States)

    2011-07-21

    ... list of acceptable file formats the four-character file extensions for Microsoft Office 2007/2010... files from Office 2007 or Office 2010 in an Office 2003 format prior to submission. Dated: July 15, 2011...

  15. SCALCE: boosting sequence compression algorithms using locally consistent encoding.

    Science.gov (United States)

    Hach, Faraz; Numanagic, Ibrahim; Alkan, Can; Sahinalp, S Cenk

    2012-12-01

    provides up to 2.01 times better compression while improving the running time by a factor of 5.17. SCALCE also provides the option to compress the quality scores as well as the read names, in addition to the reads themselves. This is achieved by compressing the quality scores through order-3 Arithmetic Coding (AC) and the read names through gzip through the reordering SCALCE provides on the reads. This way, in comparison with gzip compression of the unordered FASTQ files (including reads, read names and quality scores), SCALCE (together with gzip and arithmetic encoding) can provide up to 3.34 improvement in the compression rate and 1.26 improvement in running time. Our algorithm, SCALCE (Sequence Compression Algorithm using Locally Consistent Encoding), is implemented in C++ with both gzip and bzip2 compression options. It also supports multithreading when gzip option is selected, and the pigz binary is available. It is available at http://scalce.sourceforge.net. fhach@cs.sfu.ca or cenk@cs.sfu.ca Supplementary data are available at Bioinformatics online.

  16. COMBINE archive and OMEX format: one file to share all information to reproduce a modeling project.

    Science.gov (United States)

    Bergmann, Frank T; Adams, Richard; Moodie, Stuart; Cooper, Jonathan; Glont, Mihai; Golebiewski, Martin; Hucka, Michael; Laibe, Camille; Miller, Andrew K; Nickerson, David P; Olivier, Brett G; Rodriguez, Nicolas; Sauro, Herbert M; Scharm, Martin; Soiland-Reyes, Stian; Waltemath, Dagmar; Yvon, Florent; Le Novère, Nicolas

    2014-12-14

    With the ever increasing use of computational models in the biosciences, the need to share models and reproduce the results of published studies efficiently and easily is becoming more important. To this end, various standards have been proposed that can be used to describe models, simulations, data or other essential information in a consistent fashion. These constitute various separate components required to reproduce a given published scientific result. We describe the Open Modeling EXchange format (OMEX). Together with the use of other standard formats from the Computational Modeling in Biology Network (COMBINE), OMEX is the basis of the COMBINE Archive, a single file that supports the exchange of all the information necessary for a modeling and simulation experiment in biology. An OMEX file is a ZIP container that includes a manifest file, listing the content of the archive, an optional metadata file adding information about the archive and its content, and the files describing the model. The content of a COMBINE Archive consists of files encoded in COMBINE standards whenever possible, but may include additional files defined by an Internet Media Type. Several tools that support the COMBINE Archive are available, either as independent libraries or embedded in modeling software. The COMBINE Archive facilitates the reproduction of modeling and simulation experiments in biology by embedding all the relevant information in one file. Having all the information stored and exchanged at once also helps in building activity logs and audit trails. We anticipate that the COMBINE Archive will become a significant help for modellers, as the domain moves to larger, more complex experiments such as multi-scale models of organs, digital organisms, and bioengineering.

  17. 17 CFR 240.17Ad-18 - Year 2000 Reports to be made by certain transfer agents.

    Science.gov (United States)

    2010-04-01

    ... non-bank transfer agent must file Part I of Form TA-Y2K (§ 249.619 of this chapter) with the Commission describing the transfer agent's preparation for Year 2000 Problems. Part I of Form TA-Y2K shall be filed no later than August 31, 1998, and April 30, 1999. Part I of Form TA-Y2K shall reflect the...

  18. Energy conservation via heat transfer enhancement. Quarterly progress report, January 1-March 31, 1979

    Energy Technology Data Exchange (ETDEWEB)

    Bergles, A.E.; Junkhan, G.H.; Webb, R.L.

    1979-06-01

    This report for the first quarter of 1979 summarizes visits and contacts relative to the theory and practice of heat transfer enhancement. The Technical Literature File and Manufacturers' File were expanded, and the initial Patent Technology Information File was completed. Application studies on enhancement of waste heat recuperators and laminar internal flow heat transfer are described. A comprehensive bibliography on laminar flow enhancement is included. The Technology study on performance of internally finned tubes is complete. New data for the heat transfer and friction characteristics of internally finned tubes will be analyzed to develop rationally based correlations. An assessment of natural convection from rough surfaces was performed. Major effort was directed toward planning of the Research Workshop on Energy Conservation Through Enhanced Heat Transfer. The Workshop, scheduled for May 24 and May 25, 1979 in Chicago, will be co-sponsored by NSF.

  19. Optimization of routing strategies for data transfer in peer-to-peer networks

    International Nuclear Information System (INIS)

    Morioka, Atsushi; Igarashi, Akito

    2014-01-01

    Since peer-to-peer file-sharing systems have become familiar recently, the information traffic in the networks is increasing. Therefore it causes various traffic problems in peer-to-peer networks. In this paper, we model some features of the peer-to-peer networks, and investigate the traffic problems. Peer-to-peer networks have two notable characters. One is that each peer frequently searches for a file and download it from a peer who has the requested file. To decide whether a peer has the requested file or not in modelling of the search and download process, we introduce file-parameter P j , which expresses the amount of files stored in peer j. It is assumed that if P j is large, peer j has many files and can meet other peers' requests with high probability. The other character is that peers leave and join into the network repeatedly. Many researchers address traffic problems of data transfer in computer communication networks. To our knowledge, however, no reports focus on those in peer-to-peer networks whose topology changes with time. For routing paths of data transfer, generally, the shortest paths are used in usual computer networks. In this paper, we introduce a new optimal routing strategy which uses weights of peers to avoid traffic congestion. We find that the new routing strategy is superior to the shortest path strategy in terms of congestion frequency in data transfer

  20. Survey on Security Issues in File Management in Cloud Computing Environment

    Science.gov (United States)

    Gupta, Udit

    2015-06-01

    Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks. The privacy of users data is maintained by data centers around the world and hence it has become feasible to operate on that data from lightweight portable devices. But with ease of processing comes the security aspect of the data. One such security aspect is secure file transfer either internally within cloud or externally from one cloud network to another. File management is central to cloud computing and it is paramount to address the security concerns which arise out of it. This survey paper aims to elucidate the various protocols which can be used for secure file transfer and analyze the ramifications of using each protocol.

  1. Encoding plaintext by Fourier transform hologram in double random phase encoding using fingerprint keys

    Science.gov (United States)

    Takeda, Masafumi; Nakano, Kazuya; Suzuki, Hiroyuki; Yamaguchi, Masahiro

    2012-09-01

    It has been shown that biometric information can be used as a cipher key for binary data encryption by applying double random phase encoding. In such methods, binary data are encoded in a bit pattern image, and the decrypted image becomes a plain image when the key is genuine; otherwise, decrypted images become random images. In some cases, images decrypted by imposters may not be fully random, such that the blurred bit pattern can be partially observed. In this paper, we propose a novel bit coding method based on a Fourier transform hologram, which makes images decrypted by imposters more random. Computer experiments confirm that the method increases the randomness of images decrypted by imposters while keeping the false rejection rate as low as in the conventional method.

  2. Encoding plaintext by Fourier transform hologram in double random phase encoding using fingerprint keys

    International Nuclear Information System (INIS)

    Takeda, Masafumi; Nakano, Kazuya; Suzuki, Hiroyuki; Yamaguchi, Masahiro

    2012-01-01

    It has been shown that biometric information can be used as a cipher key for binary data encryption by applying double random phase encoding. In such methods, binary data are encoded in a bit pattern image, and the decrypted image becomes a plain image when the key is genuine; otherwise, decrypted images become random images. In some cases, images decrypted by imposters may not be fully random, such that the blurred bit pattern can be partially observed. In this paper, we propose a novel bit coding method based on a Fourier transform hologram, which makes images decrypted by imposters more random. Computer experiments confirm that the method increases the randomness of images decrypted by imposters while keeping the false rejection rate as low as in the conventional method. (paper)

  3. Technology transfer at NASA - A librarian's view

    Science.gov (United States)

    Buchan, Ronald L.

    1991-01-01

    The NASA programs, publications, and services promoting the transfer and utilization of aerospace technology developed by and for NASA are briefly surveyed. Topics addressed include the corporate sources of NASA technical information and its interest for corporate users of information services; the IAA and STAR abstract journals; NASA/RECON, NTIS, and the AIAA Aerospace Database; the RECON Space Commercialization file; the Computer Software Management and Information Center file; company information in the RECON database; and services to small businesses. Also discussed are the NASA publications Tech Briefs and Spinoff, the Industrial Applications Centers, NASA continuing bibliographies on management and patent abstracts (indexed using the NASA Thesaurus), the Index to NASA News Releases and Speeches, and the Aerospace Research Information Network (ARIN).

  4. Transfection of tumor-infiltrating T cells with mRNA encoding CXCR2

    DEFF Research Database (Denmark)

    Idorn, Manja; thor Straten, Eivind Per; Svane, Inge Marie

    2016-01-01

    Adoptive T-cell therapy based on the infusion of patient’s own immune cells after ex vivo culturing is among the most potent forms of personalized treatment among recent clinical developments for the treatment of cancer. However, despite high rates of successful initial clinical responses, only...... infused T cells migrating to the tumor and the clinical response, but also that only a small fraction of adoptively transferred Tcells reach the tumor site. In this chapter, we describe a protocol for transfection of TILs with mRNA encoding the chemokine receptor CXCR2 transiently redirecting...

  5. Geometric data transfer between CAD systems: solid models

    DEFF Research Database (Denmark)

    Kroszynski, Uri; Palstroem, Bjarne; Trostmann, Erik

    1989-01-01

    The first phase of the ESPRIT project CAD*I resulted in a specification for the exchange of solid models as well as in some pilot implementations of processors based on this specification. The authors summarize the CAD*I approach, addressing the structure of neutral files for solids, entities......, and attributes supporting three kinds of representations: facilities for the transfer of parametric designs; referencing library components; and other general mechanisms. They also describe the current state of the specification and processor implementations and include an example of a CAD*I neutral file....... Results from cycle and intersystem solid model transfer tests are presented, showing the practicality of the CAD*I proposal. B-rep model transfer results are discussed in some detail. The relationship of this work to standardization efforts is outlined...

  6. 21 CFR 516.163 - Change in ownership of an index file.

    Science.gov (United States)

    2010-04-01

    ... (CONTINUED) ANIMAL DRUGS, FEEDS, AND RELATED PRODUCTS NEW ANIMAL DRUGS FOR MINOR USE AND MINOR SPECIES Index of Legally Marketed Unapproved New Animal Drugs for Minor Species § 516.163 Change in ownership of an... owner shall submit in writing to FDA a statement that all rights in the index file have been transferred...

  7. 77 FR 1114 - Self-Regulatory Organizations; Chicago Mercantile Exchange, Inc.; Notice of Filing and Order...

    Science.gov (United States)

    2012-01-09

    ... intention to file such proceeding [for bankruptcy]. Nothing in this Rule shall limit or negate any other..., existing trades may be transferred either on the books of a clearing member or from one clearing member to... trades either on the books of the same clearing member, or from the books of one clearing member to the...

  8. Painless File Extraction: The A(rc)--Z(oo) of Internet Archive Formats.

    Science.gov (United States)

    Simmonds, Curtis

    1993-01-01

    Discusses extraction programs needed to postprocess software downloaded from the Internet that has been archived and compressed for the purposes of storage and file transfer. Archiving formats for DOS, Macintosh, and UNIX operating systems are described; and cross-platform compression utilities are explained. (LRW)

  9. Source-constrained retrieval influences the encoding of new information.

    Science.gov (United States)

    Danckert, Stacey L; MacLeod, Colin M; Fernandes, Myra A

    2011-11-01

    Jacoby, Shimizu, Daniels, and Rhodes (Psychonomic Bulletin & Review, 12, 852-857, 2005) showed that new words presented as foils among a list of old words that had been deeply encoded were themselves subsequently better recognized than new words presented as foils among a list of old words that had been shallowly encoded. In Experiment 1, by substituting a deep-versus-shallow imagery manipulation for the levels-of-processing manipulation, we demonstrated that the effect is robust and that it generalizes, also occurring with a different type of encoding. In Experiment 2, we provided more direct evidence for context-related encoding during tests of deeply encoded words, showing enhanced priming for foils presented among deeply encoded targets when participants made the same deep-encoding judgments on those items as had been made on the targets during study. In Experiment 3, we established that the findings from Experiment 2 are restricted to this specific deep judgment task and are not a general consequence of these foils being associated with deeply encoded items. These findings provide support for the source-constrained retrieval hypothesis of Jacoby, Shimizu, Daniels, and Rhodes: New information can be influenced by how surrounding items are encoded and retrieved, as long as the surrounding items recruit a coherent mode of processing.

  10. Exploring the influence of encoding format on subsequent memory.

    Science.gov (United States)

    Turney, Indira C; Dennis, Nancy A; Maillet, David; Rajah, M Natasha

    2017-05-01

    Distinctive encoding is greatly influenced by gist-based processes and has been shown to suffer when highly similar items are presented in close succession. Thus, elucidating the mechanisms underlying how presentation format affects gist processing is essential in determining the factors that influence these encoding processes. The current study utilised multivariate partial least squares (PLS) analysis to identify encoding networks directly associated with retrieval performance in a blocked and intermixed presentation condition. Subsequent memory analysis for successfully encoded items indicated no significant differences between reaction time and retrieval performance and presentation format. Despite no significant behavioural differences, behaviour PLS revealed differences in brain-behaviour correlations and mean condition activity in brain regions associated with gist-based vs. distinctive encoding. Specifically, the intermixed format encouraged more distinctive encoding, showing increased activation of regions associated with strategy use and visual processing (e.g., frontal and visual cortices, respectively). Alternatively, the blocked format exhibited increased gist-based processes, accompanied by increased activity in the right inferior frontal gyrus. Together, results suggest that the sequence that information is presented during encoding affects the degree to which distinctive encoding is engaged. These findings extend our understanding of the Fuzzy Trace Theory and the role of presentation format on encoding processes.

  11. Transfer and Social Practice.

    Science.gov (United States)

    Billett, Stephen

    1998-01-01

    Transfer involves disembodying knowledge and transferring it for use in different contexts. Vocational knowledge arises in communities of practice, and difficulties arise in transferring it from one distinct community, such as a workplace, to another, such as a classroom. (SK)

  12. Temporal encoding in a nervous system.

    Directory of Open Access Journals (Sweden)

    Zane N Aldworth

    2011-05-01

    Full Text Available We examined the extent to which temporal encoding may be implemented by single neurons in the cercal sensory system of the house cricket Acheta domesticus. We found that these neurons exhibit a greater-than-expected coding capacity, due in part to an increased precision in brief patterns of action potentials. We developed linear and non-linear models for decoding the activity of these neurons. We found that the stimuli associated with short-interval patterns of spikes (ISIs of 8 ms or less could be predicted better by second-order models as compared to linear models. Finally, we characterized the difference between these linear and second-order models in a low-dimensional subspace, and showed that modification of the linear models along only a few dimensions improved their predictive power to parity with the second order models. Together these results show that single neurons are capable of using temporal patterns of spikes as fundamental symbols in their neural code, and that they communicate specific stimulus distributions to subsequent neural structures.

  13. Chaotic digital communication by encoding initial conditions.

    Science.gov (United States)

    Xiaofeng, Gong; Xingang, Wang; Meng, Zhan; Lai, C H

    2004-06-01

    We investigate the possibility to improve the noise performance of a chaotic digital communication scheme by utilizing further dynamical information. We show that by encoding the initial information of the chaotic carrier according to the transmitting bits, extra redundance can be introduced into the segments of chaotic signals corresponding to the consecutive bits. Such redundant information can be exploited effectively at the receiver end to improve the noise performance of the system. Compared to other methods (e.g., differential chaos shift keying), straightforward application of the proposed modulation/demodulation scheme already provides significant performance gain in the low signal-to-noise ratio (SNR) region. Furthermore, maximum likelihood precleaning procedure based on the Viterbi algorithm can be applied before the demodulation step to overcome the performance degradation in the high SNR region. The study indicates that it is possible to improve the noise performance of the chaotic digital communication scheme if further dynamics information is added to the system. (c) 2004 American Institute of Physics

  14. Peafowl antipredator calls encode information about signalers.

    Science.gov (United States)

    Yorzinski, Jessica L

    2014-02-01

    Animals emit vocalizations that convey information about external events. Many of these vocalizations, including those emitted in response to predators, also encode information about the individual that produced the call. The relationship between acoustic features of antipredator calls and information relating to signalers (including sex, identity, body size, and social rank) were examined in peafowl (Pavo cristatus). The "bu-girk" antipredator calls of male and female peafowl were recorded and 20 acoustic parameters were automatically extracted from each call. Both the bu and girk elements of the antipredator call were individually distinctive and calls were classified to the correct signaler with over 90% and 70% accuracy in females and males, respectively. Females produced calls with a higher fundamental frequency (F0) than males. In both females and males, body size was negatively correlated with F0. In addition, peahen rank was related to the duration, end mean frequency, and start harmonicity of the bu element. Peafowl antipredator calls contain detailed information about the signaler and can potentially be used by receivers to respond to dangerous situations.

  15. Dynamical encoding of looming, receding, and focussing

    Science.gov (United States)

    Longtin, Andre; Clarke, Stephen Elisha; Maler, Leonard; CenterNeural Dynamics Collaboration

    This talk will discuss a non-conventional neural coding task that may apply more broadly to many senses in higher vertebrates. We ask whether and how a non-visual sensory system can focus on an object. We present recent experimental and modeling work that shows how the early sensory circuitry of electric sense can perform such neuronal focusing that is manifested behaviorally. This sense is the main one used by weakly electric fish to navigate, locate prey and communicate in the murky waters of their natural habitat. We show that there is a distance at which the Fisher information of a neuron's response to a looming and receding object is maximized, and that this distance corresponds to a behaviorally relevant one chosen by these animals. Strikingly, this maximum occurs at a bifurcation between tonic firing and bursting. We further discuss how the invariance of this distance to signal attributes can arise, a process that first involves power-law spike frequency adaptation. The talk will also highlight the importance of expanding the classic dual neural encoding of contrast using ON and OFF cells in the context of looming and receding stimuli. The authors acknowledge support from CIHR and NSERC.

  16. International technology transfer

    International Nuclear Information System (INIS)

    Kwon, Won Gi

    1991-11-01

    This book introduces technology progress and economic growth, theoretical consideration of technology transfer, policy and mechanism on technology transfer of a developed country and a developing country, reality of international technology transfer technology transfer and industrial structure in Asia and the pacific region, technology transfer in Russia, China and Eastern Europe, cooperation of science and technology for development of Northeast Asia and strategy of technology transfer of Korea.

  17. Technology transfer by multinationals

    OpenAIRE

    Kostyantyn Zuzik

    2003-01-01

    The paper analyses the issue of technology transfer by multinational corporations. The following questions are explored: (a) world market of technologies, the role of MNCs (b) Choice of the technology transfer mode, Dunning's OLI-theory as a factor of the choice of the mode of transfer (c) measurement and profitability of technology transfer (d) transfer of technology through partnerships, JVs, alliances and through M&As (e) aspects of technology transfer by services multinationals. Paper uti...

  18. PFS: a distributed and customizable file system

    OpenAIRE

    Bosch, H.G.P.; Mullender, Sape J.

    1996-01-01

    In this paper we present our ongoing work on the Pegasus File System (PFS), a distributed and customizable file system that can be used for off-line file system experiments and on-line file system storage. PFS is best described as an object-oriented component library from which either a true file system or a file-system simulator can be constructed. Each of the components in the library is easily replaced by another implementation to accommodate a wide range of applications.

  19. Beyond initial encoding: Measures of the post-encoding status of memory traces predict long-term recall in infancy

    OpenAIRE

    Pathman, Thanujeni; Bauer, Patricia J.

    2012-01-01

    The first years of life are witness to rapid changes in long-term recall ability. In the present research, we contributed to explanation of the changes by testing the absolute and relative contributions to long-term recall of encoding and post-encoding processes. Using elicited imitation, we sampled the status of 16-, 20-, and 24-month-old infants’ memory representations at various time points after experience of events. In Experiment 1, infants were tested immediately, 1 week after encoding,...

  20. Monitoring data transfer latency in CMS computing operations

    CERN Document Server

    Bonacorsi, D; Magini, N; Sartirana, A; Taze, M; Wildish, T

    2015-01-01

    During the first LHC run, the CMS experiment collected tens of Petabytes of collision and simulated data, which need to be distributed among dozens of computing centres with low latency in order to make efficient use of the resources. While the desired level of throughput has been successfully achieved, it is still common to observe transfer workflows that cannot reach full completion in a timely manner due to a small fraction of stuck files which require operator intervention.For this reason, in 2012 the CMS transfer management system, PhEDEx, was instrumented with a monitoring system to measure file transfer latencies, and to predict the completion time for the transfer of a data set. The operators can detect abnormal patterns in transfer latencies while the transfer is still in progress, and monitor the long-term performance of the transfer infrastructure to plan the data placement strategy.Based on the data collected for one year with the latency monitoring system, we present a study on the different fact...

  1. You can go your own way: effectiveness of participant-driven versus experimenter-driven processing strategies in memory training and transfer.

    Science.gov (United States)

    Flegal, Kristin E; Lustig, Cindy

    2016-07-01

    Cognitive training programs that instruct specific strategies frequently show limited transfer. Open-ended approaches can achieve greater transfer, but may fail to benefit many older adults due to age deficits in self-initiated processing. We examined whether a compromise that encourages effort at encoding without an experimenter-prescribed strategy might yield better results. Older adults completed memory training under conditions that either (1) mandated a specific strategy to increase deep, associative encoding, (2) attempted to suppress such encoding by mandating rote rehearsal, or (3) encouraged time and effort toward encoding but allowed for strategy choice. The experimenter-enforced associative encoding strategy succeeded in creating integrated representations of studied items, but training-task progress was related to pre-existing ability. Independent of condition assignment, self-reported deep encoding was associated with positive training and transfer effects, suggesting that the most beneficial outcomes occur when environmental support guiding effort is provided but participants generate their own strategies.

  2. Stress as a mnemonic filter: Interactions between medial temporal lobe encoding processes and post-encoding stress.

    Science.gov (United States)

    Ritchey, Maureen; McCullough, Andrew M; Ranganath, Charan; Yonelinas, Andrew P

    2017-01-01

    Acute stress has been shown to modulate memory for recently learned information, an effect attributed to the influence of stress hormones on medial temporal lobe (MTL) consolidation processes. However, little is known about which memories will be affected when stress follows encoding. One possibility is that stress interacts with encoding processes to selectively protect memories that had elicited responses in the hippocampus and amygdala, two MTL structures important for memory formation. There is limited evidence for interactions between encoding processes and consolidation effects in humans, but recent studies of consolidation in rodents have emphasized the importance of encoding "tags" for determining the impact of consolidation manipulations on memory. Here, we used functional magnetic resonance imaging in humans to test the hypothesis that the effects of post-encoding stress depend on MTL processes observed during encoding. We found that changes in stress hormone levels were associated with an increase in the contingency of memory outcomes on hippocampal and amygdala encoding responses. That is, for participants showing high cortisol reactivity, memories became more dependent on MTL activity observed during encoding, thereby shifting the distribution of recollected events toward those that had elicited relatively high activation. Surprisingly, this effect was generally larger for neutral, compared to emotionally negative, memories. The results suggest that stress does not uniformly enhance memory, but instead selectively preserves memories tagged during encoding, effectively acting as mnemonic filter. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  3. Search the SEC website for the latest EDGAR filings

    Data.gov (United States)

    Securities and Exchange Commission — This listing contains the most recent filings for the current official filing date (including filings made after the 5:30pm deadline on the previous filing day)....

  4. Building a parallel file system simulator

    International Nuclear Information System (INIS)

    Molina-Estolano, E; Maltzahn, C; Brandt, S A; Bent, J

    2009-01-01

    Parallel file systems are gaining in popularity in high-end computing centers as well as commercial data centers. High-end computing systems are expected to scale exponentially and to pose new challenges to their storage scalability in terms of cost and power. To address these challenges scientists and file system designers will need a thorough understanding of the design space of parallel file systems. Yet there exist few systematic studies of parallel file system behavior at petabyte- and exabyte scale. An important reason is the significant cost of getting access to large-scale hardware to test parallel file systems. To contribute to this understanding we are building a parallel file system simulator that can simulate parallel file systems at very large scale. Our goal is to simulate petabyte-scale parallel file systems on a small cluster or even a single machine in reasonable time and fidelity. With this simulator, file system experts will be able to tune existing file systems for specific workloads, scientists and file system deployment engineers will be able to better communicate workload requirements, file system designers and researchers will be able to try out design alternatives and innovations at scale, and instructors will be able to study very large-scale parallel file system behavior in the class room. In this paper we describe our approach and provide preliminary results that are encouraging both in terms of fidelity and simulation scalability.

  5. Olfactory bulb encoding during learning under anaesthesia

    Directory of Open Access Journals (Sweden)

    Alister U Nicol

    2014-06-01

    Full Text Available Neural plasticity changes within the olfactory bulb are important for olfactory learning, although how neural encoding changes support new associations with specific odours and whether they can be investigated under anaesthesia, remain unclear. Using the social transmission of food preference olfactory learning paradigm in mice in conjunction with in vivo microdialysis sampling we have shown firstly that a learned preference for a scented food odour smelled on the breath of a demonstrator animal occurs under isofluorane anaesthesia. Furthermore, subsequent exposure to this cued odour under anaesthesia promotes the same pattern of increased release of glutamate and GABA in the olfactory bulb as previously found in conscious animals following olfactory learning, and evoked GABA release was positively correlated with the amount of scented food eaten. In a second experiment, multiarray (24 electrodes electrophysiological recordings were made from olfactory bulb mitral cells under isofluorane anaesthesia before, during and after a novel scented food odour was paired with carbon disulfide. Results showed significant increases in overall firing frequency to the cued-odour during and after learning and decreases in response to an uncued odour. Analysis of patterns of changes in individual neurons revealed that a substantial proportion (>50% of them significantly changed their response profiles during and after learning with most of those previously inhibited becoming excited. A large number of cells exhibiting no response to the odours prior to learning were either excited or inhibited afterwards. With the uncued odour many previously responsive cells became unresponsive or inhibited. Learning associated changes only occurred in the posterior part of the olfactory bulb. Thus olfactory learning under anaesthesia promotes extensive, but spatially distinct, changes in mitral cell networks to both cued and uncued odours as well as in evoked glutamate and

  6. Encoding and Decoding Models in Cognitive Electrophysiology

    Directory of Open Access Journals (Sweden)

    Christopher R. Holdgraf

    2017-09-01

    Full Text Available Cognitive neuroscience has seen rapid growth in the size and complexity of data recorded from the human brain as well as in the computational tools available to analyze this data. This data explosion has resulted in an increased use of multivariate, model-based methods for asking neuroscience questions, allowing scientists to investigate multiple hypotheses with a single dataset, to use complex, time-varying stimuli, and to study the human brain under more naturalistic conditions. These tools come in the form of “Encoding” models, in which stimulus features are used to model brain activity, and “Decoding” models, in which neural features are used to generated a stimulus output. Here we review the current state of encoding and decoding models in cognitive electrophysiology and provide a practical guide toward conducting experiments and analyses in this emerging field. Our examples focus on using linear models in the study of human language and audition. We show how to calculate auditory receptive fields from natural sounds as well as how to decode neural recordings to predict speech. The paper aims to be a useful tutorial to these approaches, and a practical introduction to using machine learning and applied statistics to build models of neural activity. The data analytic approaches we discuss may also be applied to other sensory modalities, motor systems, and cognitive systems, and we cover some examples in these areas. In addition, a collection of Jupyter notebooks is publicly available as a complement to the material covered in this paper, providing code examples and tutorials for predictive modeling in python. The aim is to provide a practical understanding of predictive modeling of human brain data and to propose best-practices in conducting these analyses.

  7. Stereoscopic radiographic images with gamma source encoding

    International Nuclear Information System (INIS)

    Strocovsky, S.G.; Otero, D

    2012-01-01

    Conventional radiography with X-ray tube has several drawbacks, as the compromise between the size of the focal spot and the fluence. The finite dimensions of the focal spot impose a limit to the spatial resolution. Gamma radiography uses gamma-ray sources which surpass in size, portability and simplicity to X-ray tubes. However, its low intrinsic fluence forces to use extended sources that also degrade the spatial resolution. In this work, we show the principles of a new radiographic technique that overcomes the limitations associated with the finite dimensions of X-ray sources, and that offers additional benefits to conventional techniques. The new technique called coding source imaging (CSI), is based on the use of extended sources, edge-encoding of radiation and differential detection. The mathematical principles and the method of images reconstruction with the new proposed technique are explained in the present work. Analytical calculations were made to determine the maximum spatial resolution and the variables on which it depends. The CSI technique was tested by means of Monte Carlo simulations with sets of spherical objects. We show that CSI has stereoscopic capabilities and it can resolve objects smaller than the source size. The CSI decoding algorithm reconstructs simultaneously four different projections from the same object, while conventional radiography produces only one projection per acquisition. Projections are located in separate image fields on the detector plane. Our results show it is possible to apply an extremely simple radiographic technique with extended sources, and get 3D information of the attenuation coefficient distribution for simple geometry objects in a single acquisition. The results are promising enough to evaluate the possibility of future research with more complex objects typical of medical diagnostic radiography and industrial gamma radiography (author)

  8. The Expression of Genes Encoding Secreted Proteins in Medicago truncatula A17 Inoculated Roots

    Directory of Open Access Journals (Sweden)

    LUCIA KUSUMAWATI

    2013-09-01

    Full Text Available Subtilisin-like serine protease (MtSBT, serine carboxypeptidase (MtSCP, MtN5, non-specific lipid transfer protein (MtnsLTP, early nodulin2-like protein (MtENOD2-like, FAD-binding domain containing protein (MtFAD-BP1, and rhicadhesin receptor protein (MtRHRE1 were among 34 proteins found in the supernatant of M. truncatula 2HA and sickle cell suspension cultures. This study investigated the expression of genes encoding those proteins in roots and developing nodules. Two methods were used: quantitative real time RT-PCR and gene expression analysis (with promoter:GUS fusion in roots. Those proteins are predicted as secreted proteins which is indirectly supported by the findings that promoter:GUS fusions of six of the seven genes encoding secreted proteins were strongly expressed in the vascular bundle of transgenic hairy roots. All six genes have expressed in 14-day old nodule. The expression levels of the selected seven genes were quantified in Sinorhizobium-inoculated and control plants using quantitative real time RT-PCR. In conclusion, among seven genes encoding secreted proteins analyzed, the expression level of only one gene, MtN5, was up-regulated significantly in inoculated root segments compared to controls. The expression of MtSBT1, MtSCP1, MtnsLTP, MtFAD-BP1, MtRHRE1 and MtN5 were higher in root tip than in other tissues examined.

  9. Staphylococcal SCCmec elements encode an active MCM-like helicase and thus may be replicative

    Energy Technology Data Exchange (ETDEWEB)

    Mir-Sanchis, Ignacio; Roman, Christina A.; Misiura, Agnieszka; Pigli, Ying Z.; Boyle-Vavra, Susan; Rice , Phoebe A. (UC)

    2016-08-29

    Methicillin-resistant Staphylococcus aureus (MRSA) is a public-health threat worldwide. Although the mobile genomic island responsible for this phenotype, staphylococcal cassette chromosome (SCC), has been thought to be nonreplicative, we predicted DNA-replication-related functions for some of the conserved proteins encoded by SCC. We show that one of these, Cch, is homologous to the self-loading initiator helicases of an unrelated family of genomic islands, that it is an active 3'-to-5' helicase and that the adjacent ORF encodes a single-stranded DNA–binding protein. Our 2.9-Å crystal structure of intact Cch shows that it forms a hexameric ring. Cch, like the archaeal and eukaryotic MCM-family replicative helicases, belongs to the pre–sensor II insert clade of AAA+ ATPases. Additionally, we found that SCC elements are part of a broader family of mobile elements, all of which encode a replication initiator upstream of their recombinases. Replication after excision would enhance the efficiency of horizontal gene transfer.

  10. Cyanobacterial flv4-2 Operon-Encoded Proteins Optimize Light Harvesting and Charge Separation in Photosystem II.

    Science.gov (United States)

    Chukhutsina, Volha; Bersanini, Luca; Aro, Eva-Mari; van Amerongen, Herbert

    2015-05-01

    Photosystem II (PSII) complexes drive the water-splitting reaction necessary to transform sunlight into chemical energy. However, too much light can damage and disrupt PSII. In cyanobacteria, the flv4-2 operon encodes three proteins (Flv2, Flv4, and Sll0218), which safeguard PSII activity under air-level CO2 and in high light conditions. However, the exact mechanism of action of these proteins has not been clarified yet. We demonstrate that the PSII electron transfer properties are influenced by the flv4-2 operon-encoded proteins. Accelerated secondary charge separation kinetics was observed upon expression/overexpression of the flv4-2 operon. This is likely induced by docking of the Flv2/Flv4 heterodimer in the vicinity of the QB pocket of PSII, which, in turn, increases the QB redox potential and consequently stabilizes forward electron transfer. The alternative electron transfer route constituted by Flv2/Flv4 sequesters electrons from QB(-) guaranteeing the dissipation of excess excitation energy in PSII under stressful conditions. In addition, we demonstrate that in the absence of the flv4-2 operon-encoded proteins, about 20% of the phycobilisome antenna becomes detached from the reaction centers, thus decreasing light harvesting. Phycobilisome detachment is a consequence of a decreased relative content of PSII dimers, a feature observed in the absence of the Sll0218 protein. Copyright © 2015 The Author. Published by Elsevier Inc. All rights reserved.

  11. The role of depth of encoding in attentional capture

    NARCIS (Netherlands)

    Sasin, Edyta; Nieuwenstein, Mark; Johnson, Addie

    2015-01-01

    The aim of the current study was to examine whether depth of encoding influences attentional capture by recently attended objects. In Experiment 1, participants first had to judge whether a word referred to a living or a nonliving thing (deep encoding condition) or whether the word was written in

  12. Encoding Effects on First-Graders' Use of Manipulatives

    Science.gov (United States)

    Osana, Helena P.; Przednowek, Katarzyna; Cooperman, Allyson; Adrien, Emmanuelle

    2018-01-01

    The effects of prior encodings of manipulatives (red and blue plastic chips) on children's ability to use them as representations of quantity were tested. First graders (N = 73) were assigned to four conditions in which the encoding of plastic chips was experimentally manipulated. All children then participated in an addition activity that relied…

  13. The Contribution of Encoding and Retrieval Processes to Proactive Interference

    Science.gov (United States)

    Kliegl, Oliver; Pastötter, Bernhard; Bäuml, Karl-Heinz T.

    2015-01-01

    Proactive interference (PI) refers to the finding that memory for recently studied (target) material can be impaired by the prior study of other (nontarget) material. Previous accounts of PI differed in whether they attributed PI to impaired retrieval or impaired encoding. Here, we suggest an integrated encoding-retrieval account, which assigns a…

  14. Evaluation of color encodings for high dynamic range pixels

    Science.gov (United States)

    Boitard, Ronan; Mantiuk, Rafal K.; Pouli, Tania

    2015-03-01

    Traditional Low Dynamic Range (LDR) color spaces encode a small fraction of the visible color gamut, which does not encompass the range of colors produced on upcoming High Dynamic Range (HDR) displays. Future imaging systems will require encoding much wider color gamut and luminance range. Such wide color gamut can be represented using floating point HDR pixel values but those are inefficient to encode. They also lack perceptual uniformity of the luminance and color distribution, which is provided (in approximation) by most LDR color spaces. Therefore, there is a need to devise an efficient, perceptually uniform and integer valued representation for high dynamic range pixel values. In this paper we evaluate several methods for encoding colour HDR pixel values, in particular for use in image and video compression. Unlike other studies we test both luminance and color difference encoding in a rigorous 4AFC threshold experiments to determine the minimum bit-depth required. Results show that the Perceptual Quantizer (PQ) encoding provides the best perceptual uniformity in the considered luminance range, however the gain in bit-depth is rather modest. More significant difference can be observed between color difference encoding schemes, from which YDuDv encoding seems to be the most efficient.

  15. Interaction Between Encoding and Retrieval Operations in Cued Recall

    Science.gov (United States)

    Fisher, Ronald P.; Craik, Fergus I. M.

    1977-01-01

    Three experiments are described in which the qualitative nature of memorial processing was manipulated at both input (encoding) and output (retrieval). As in earlier research, it was found that retention levels were highest when the same type of information was used as a retrieval cue. Concludes that the notions of encoding specificity and depth…

  16. On The Designed And Constructed Feedback Shift-Register Encoder

    African Journals Online (AJOL)

    An encoder capable of cyclical shifting of data, and which can therefore be used for Bose-Chaudhuri and Hocquenghem (BCH) coding, has been designed and constructed using discrete components. It comprises basically four bistable multivibrators and an exclusive-OR device. On completion, the encoder performed ...

  17. Distinctiveness of Encoding and Memory for Learning Tasks.

    Science.gov (United States)

    Glover, John A.; And Others

    1982-01-01

    A distinctiveness of encoding hypothesis, as applied to the facilitative effects that higher order objectives have on readers' prose recall, was evaluated in three experiments. Results suggest that distinctiveness of encoding may offer a theoretical basis for the effects of adjunct aids as well as a guide to their construction. (Author/GK)

  18. Decoding and Encoding Facial Expressions in Preschool-Age Children.

    Science.gov (United States)

    Zuckerman, Miron; Przewuzman, Sylvia J.

    1979-01-01

    Preschool-age children drew, decoded, and encoded facial expressions depicting five different emotions. Accuracy of drawing, decoding and encoding each of the five emotions was consistent across the three tasks; decoding ability was correlated with drawing ability among female subjects, but neither of these abilities was correlated with encoding…

  19. On The Designed And Constructed Feedback Shift-Register Encoder

    African Journals Online (AJOL)

    Information transmission in noisy channels can be achieved with vanishingly small probability of error by proper coding of the information as long as the encoding rate is less than the channel capacity. An encoder capable of cyclical shifting of data, and which can therefore be used for Bose-Chaudhuri and Hocquenghem ...

  20. Chronic Condition Public Use File (PUF)

    Data.gov (United States)

    U.S. Department of Health & Human Services — This release contains the Chronic Conditions Public Use Files (PUF) with information from Medicare claims. The CMS Chronic Conditions PUF is an aggregated file in...

  1. Improving File System Performance by Striping

    Science.gov (United States)

    Lam, Terance L.; Kutler, Paul (Technical Monitor)

    1998-01-01

    This document discusses the performance and advantages of striped file systems on the SGI AD workstations. Performance of several striped file system configurations are compared and guidelines for optimal striping are recommended.

  2. 47 CFR 1.1704 - Station files.

    Science.gov (United States)

    2010-10-01

    ... System (COALS) § 1.1704 Station files. Applications, notifications, correspondence, electronic filings... Television Relay Service (CARS) are maintained by the Commission in COALS and the Public Reference Room...

  3. source files for manuscript in tex format

    Data.gov (United States)

    U.S. Environmental Protection Agency — Source tex files used to create the manuscript including original figure files and raw data used in tables and inline text. This dataset is associated with the...

  4. 75 FR 66748 - Notice of Baseline Filings

    Science.gov (United States)

    2010-10-29

    ...- 000] Notice of Baseline Filings October 22, 2010. ONEOK Gas Transportation, L.L.C Docket No. PR11-68... above submitted a revised baseline filing of their Statement of Operating Conditions for services...

  5. Physician-Supplier Procedure Summary Master File

    Data.gov (United States)

    U.S. Department of Health & Human Services — This file is a 100 percent summary of all Part B Carrier and DMERC Claims processed through the Common Working File and stored in the National Claims History...

  6. Data_files_Reyes_EHP_phthalates

    Data.gov (United States)

    U.S. Environmental Protection Agency — The file contains three files in comma separated values (.csv) format. “Reyes_EHP_Phthalates_US_metabolites.csv” contains information about the National Health and...

  7. Ambulance Reasonable Charge Public Use Files

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Ambulance Reasonable Charge public use files for calendar years (CY) 2003 through 2005 are located in the Downloads section below. These public use files are...

  8. Grammatical constraints on phonological encoding in speech production.

    Science.gov (United States)

    Heller, Jordana R; Goldrick, Matthew

    2014-12-01

    To better understand the influence of grammatical encoding on the retrieval and encoding of phonological word-form information during speech production, we examine how grammatical class constraints influence the activation of phonological neighbors (words phonologically related to the target--e.g., MOON, TWO for target TUNE). Specifically, we compare how neighbors that share a target's grammatical category (here, nouns) influence its planning and retrieval, assessed by picture naming latencies, and phonetic encoding, assessed by word productions in picture names, when grammatical constraints are strong (in sentence contexts) versus weak (bare naming). Within-category (noun) neighbors influenced planning time and phonetic encoding more strongly in sentence contexts. This suggests that grammatical encoding constrains phonological processing; the influence of phonological neighbors is grammatically dependent. Moreover, effects on planning times could not fully account for phonetic effects, suggesting that phonological interaction affects articulation after speech onset. These results support production theories integrating grammatical, phonological, and phonetic processes.

  9. Convolutional over Recurrent Encoder for Neural Machine Translation

    Directory of Open Access Journals (Sweden)

    Dakwale Praveen

    2017-06-01

    Full Text Available Neural machine translation is a recently proposed approach which has shown competitive results to traditional MT approaches. Standard neural MT is an end-to-end neural network where the source sentence is encoded by a recurrent neural network (RNN called encoder and the target words are predicted using another RNN known as decoder. Recently, various models have been proposed which replace the RNN encoder with a convolutional neural network (CNN. In this paper, we propose to augment the standard RNN encoder in NMT with additional convolutional layers in order to capture wider context in the encoder output. Experiments on English to German translation demonstrate that our approach can achieve significant improvements over a standard RNN-based baseline.

  10. Improved entropy encoding for high efficient video coding standard

    Directory of Open Access Journals (Sweden)

    B.S. Sunil Kumar

    2018-03-01

    Full Text Available The High Efficiency Video Coding (HEVC has better coding efficiency, but the encoding performance has to be improved to meet the growing multimedia applications. This paper improves the standard entropy encoding by introducing the optimized weighing parameters, so that higher rate of compression can be accomplished over the standard entropy encoding. The optimization is performed using the recently introduced firefly algorithm. The experimentation is carried out using eight benchmark video sequences and the PSNR for varying rate of data transmission is investigated. Comparative analysis based on the performance statistics is made with the standard entropy encoding. From the obtained results, it is clear that the originality of the decoded video sequence is preserved far better than the proposed method, though the compression rate is increased. Keywords: Entropy, Encoding, HEVC, PSNR, Compression

  11. Review of Random Phase Encoding in Volume Holographic Storage

    Directory of Open Access Journals (Sweden)

    Wei-Chia Su

    2012-09-01

    Full Text Available Random phase encoding is a unique technique for volume hologram which can be applied to various applications such as holographic multiplexing storage, image encryption, and optical sensing. In this review article, we first review and discuss diffraction selectivity of random phase encoding in volume holograms, which is the most important parameter related to multiplexing capacity of volume holographic storage. We then review an image encryption system based on random phase encoding. The alignment of phase key for decryption of the encoded image stored in holographic memory is analyzed and discussed. In the latter part of the review, an all-optical sensing system implemented by random phase encoding and holographic interconnection is presented.

  12. 49 CFR 564.5 - Information filing; agency processing of filings.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Information filing; agency processing of filings... HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REPLACEABLE LIGHT SOURCE INFORMATION (Eff. until 12-01-12) § 564.5 Information filing; agency processing of filings. (a) Each manufacturer...

  13. Cut-and-Paste file-systems: integrating simulators and file systems

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.

    1995-01-01

    We have implemented an integrated and configurable file system called the Pegasus filesystem (PFS) and a trace-driven file-system simulator called Patsy. Patsy is used for off-line analysis of file-systemalgorithms, PFS is used for on-line file-systemdata storage. Algorithms are first analyzed in

  14. Cut-and-Paste file-systems : integrating simulators and file systems

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.

    1996-01-01

    We have implemented an integrated and configurable file system called the PFS and a trace-driven file-system simulator called Patsy. Patsy is used for off-line analysis of file-system algorithms, PFS is used for on-line file-system data storage. Algorithms are first analyzed in Patsy and when we are

  15. The Crystallographic Information File (CIF

    Directory of Open Access Journals (Sweden)

    I D Brown

    2006-11-01

    Full Text Available The Crystallographic Information File (CIF, owned by the International Union of Crystallography, is a file structure based on tag-value ASCII pairs with tags defined in machine-readable dictionaries. The crystallographic community publishes and archives large quantities of numeric information generated by crystal structure determinations, and CIF's acceptance was assured by its adoption as the submission format for Acta Crystallographica and by the obvious needs of the community. CIF's strength lies in its dictionaries, which define most of the concepts of crystallography; its weakness is the difficulty of writing software that exploits its full potential.

  16. FileMaker Pro 9

    CERN Document Server

    Coffey, Geoff

    2007-01-01

    FileMaker Pro 9: The Missing Manual is the clear, thorough and accessible guide to the latest version of this popular desktop database program. FileMaker Pro lets you do almost anything with the information you give it. You can print corporate reports, plan your retirement, or run a small country -- if you know what you're doing. This book helps non-technical folks like you get in, get your database built, and get the results you need. Pronto.The new edition gives novices and experienced users the scoop on versions 8.5 and 9. It offers complete coverage of timesaving new features such as the Q

  17. 12 CFR 1780.9 - Filing of papers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Filing of papers. 1780.9 Section 1780.9 Banks... papers. (a) Filing. Any papers required to be filed shall be addressed to the presiding officer and filed... Director or the presiding officer. All papers filed by electronic media shall also concurrently be filed in...

  18. 77 FR 35371 - Combined Notice of Filings #1

    Science.gov (United States)

    2012-06-13

    .... Applicants: Duke Energy Miami Fort, LLC. Description: MBR Filing to be effective 10/1/2012. Filed Date: 6/5...-000. Applicants: Duke Energy Piketon, LLC. Description: MBR Filing to be effective 10/1/2012. Filed...-1959-000. Applicants: Duke Energy Stuart, LLC. Description: MBR Filing to be effective 10/1/2012. Filed...

  19. 76 FR 63291 - Combined Notice Of Filings #1

    Science.gov (United States)

    2011-10-12

    ... filing per 35: MBR Tariff to be effective 9/23/2011. Filed Date: 09/23/2011. Accession Number: 20110923.... submits tariff filing per 35: MBR Tariff to be effective 9/23/2011. Filed Date: 09/23/2011. Accession.... submits tariff filing per 35: MBR Tariff to be effective 9/23/2011. Filed Date: 09/23/2011. Accession...

  20. Protecting your files on the DFS file system

    CERN Multimedia

    Computer Security Team

    2011-01-01

    The Windows Distributed File System (DFS) hosts user directories for all NICE users plus many more data.    Files can be accessed from anywhere, via a dedicated web portal (http://cern.ch/dfs). Due to the ease of access to DFS with in CERN it is of utmost importance to properly protect access to sensitive data. As the use of DFS access control mechanisms is not obvious to all users, passwords, certificates or sensitive files might get exposed. At least this happened in past to the Andrews File System (AFS) - the Linux equivalent to DFS) - and led to bad publicity due to a journalist accessing supposedly "private" AFS folders (SonntagsZeitung 2009/11/08). This problem does not only affect the individual user but also has a bad impact on CERN's reputation when it comes to IT security. Therefore, all departments and LHC experiments agreed recently to apply more stringent protections to all DFS user folders. The goal of this data protection policy is to assist users in pro...

  1. Protecting your files on the AFS file system

    CERN Multimedia

    2011-01-01

    The Andrew File System is a world-wide distributed file system linking hundreds of universities and organizations, including CERN. Files can be accessed from anywhere, via dedicated AFS client programs or via web interfaces that export the file contents on the web. Due to the ease of access to AFS it is of utmost importance to properly protect access to sensitive data in AFS. As the use of AFS access control mechanisms is not obvious to all users, passwords, private SSH keys or certificates have been exposed in the past. In one specific instance, this also led to bad publicity due to a journalist accessing supposedly "private" AFS folders (SonntagsZeitung 2009/11/08). This problem does not only affect the individual user but also has a bad impact on CERN's reputation when it comes to IT security. Therefore, all departments and LHC experiments agreed in April 2010 to apply more stringent folder protections to all AFS user folders. The goal of this data protection policy is to assist users in...

  2. Cryogenic heat transfer

    CERN Document Server

    Barron, Randall F

    2016-01-01

    Cryogenic Heat Transfer, Second Edition continues to address specific heat transfer problems that occur in the cryogenic temperature range where there are distinct differences from conventional heat transfer problems. This updated version examines the use of computer-aided design in cryogenic engineering and emphasizes commonly used computer programs to address modern cryogenic heat transfer problems. It introduces additional topics in cryogenic heat transfer that include latent heat expressions; lumped-capacity transient heat transfer; thermal stresses; Laplace transform solutions; oscillating flow heat transfer, and computer-aided heat exchanger design. It also includes new examples and homework problems throughout the book, and provides ample references for further study.

  3. High performance multiple stream data transfer

    International Nuclear Information System (INIS)

    Rademakers, F.; Saiz, P.

    2001-01-01

    The ALICE detector at LHC (CERN), will record raw data at a rate of 1.2 Gigabytes per second. Trying to analyse all this data at CERN will not be feasible. As originally proposed by the MONARC project, data collected at CERN will be transferred to remote centres to use their computing infrastructure. The remote centres will reconstruct and analyse the events, and make available the results. Therefore high-rate data transfer between computing centres (Tiers) will become of paramount importance. The authors will present several tests that have been made between CERN and remote centres in Padova (Italy), Torino (Italy), Catania (Italy), Lyon (France), Ohio (United States), Warsaw (Poland) and Calcutta (India). These tests consisted, in a first stage, of sending raw data from CERN to the remote centres and back, using a ftp method that allows connections of several streams at the same time. Thanks to these multiple streams, it is possible to increase the rate at which the data is transferred. While several 'multiple stream ftp solutions' already exist, the authors' method is based on a parallel socket implementation which allows, besides files, also objects (or any large message) to be send in parallel. A prototype will be presented able to manage different transfers. This is the first step of a system to be implemented that will be able to take care of the connections with the remote centres to exchange data and monitor the status of the transfer

  4. On Data Transfers Over Wide-Area Dedicated Connections

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Liu, Qiang [ORNL

    2018-01-01

    Dedicated wide-area network connections are employed in big data and high-performance computing scenarios, since the absence of cross-traffic promises to make it easier to analyze and optimize data transfers over them. However, nonlinear transport dynamics and end-system complexity due to multi-core hosts and distributed file systems make these tasks surprisingly challenging. We present an overview of methods to analyze memory and disk file transfers using extensive measurements over 10 Gbps physical and emulated connections with 0–366 ms round trip times (RTTs). For memory transfers, we derive performance profiles of TCP and UDT throughput as a function of RTT, which show concave regions in contrast to entirely convex regions predicted by previous models. These highly desirable concave regions can be expanded by utilizing large buffers and more parallel flows. We also present Poincar´e maps and Lyapunov exponents of TCP and UDT throughputtraces that indicate complex throughput dynamics. For disk file transfers, we show that throughput can be optimized using a combination of parallel I/O and network threads under direct I/O mode. Our initial throughput measurements of Lustre filesystems mounted over long-haul connections using LNet routers show convex profiles indicative of I/O limits.

  5. 77 FR 60418 - Combined Notice of Filings

    Science.gov (United States)

    2012-10-03

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings Take notice that the Commission has received the following Natural Gas Pipeline Rate and Refund Report filings...-1064-000. Applicants: Venice Gathering System, L.L.C. Description: NAESB 2.0 Compliance Filing to be...

  6. 77 FR 27221 - Combined Notice of Filings

    Science.gov (United States)

    2012-05-09

    ... Generator Status of Minonk Wind, LLC. Filed Date: 4/19/12. Accession Number: 20120419-5196. Comments Due: 5... Self-Certification of Exempt Wholesale Generator Status of Senate Wind, LLC. Filed Date: 4/19/12... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings Take notice...

  7. 77 FR 23474 - Combined Notice of Filings

    Science.gov (United States)

    2012-04-19

    ...: Young Gas Storage Company, Ltd. Description: EBB Notice Categories to be effective 5/15/2012. Filed Date... intervention is necessary to become a party to the proceeding. Filings in Existing Proceedings Docket Numbers... requirements, interventions, protests, and service can be found at: http://www.ferc.gov/docs-filing/efiling...

  8. 76 FR 80921 - Combined Notice of Filings

    Science.gov (United States)

    2011-12-27

    .... Comments Due: 5 p.m. ET 12/27/11. Docket Numbers: RP12-243-000. Applicants: Young Gas Storage Company, Ltd... considered, but intervention is necessary to become a party to the proceeding. The filings are accessible in... can be found at: http://www.ferc.gov/docs-filing/efiling/filing-req.pdf . For other information, call...

  9. 78 FR 13050 - Combined Notice of Filings

    Science.gov (United States)

    2013-02-26

    ... be considered, but intervention is necessary to become a party to the proceeding. Filings in Existing Proceedings Docket Numbers: RP13-106-002. Applicants: Young Gas Storage Company, Ltd. Description: Young NAESB..., protests, and service can be found at: http://www.ferc.gov/docs-filing/efiling/filing-req.pdf . For other...

  10. Beyond Initial Encoding: Measures of the Post-Encoding Status of Memory Traces Predict Long-Term Recall during Infancy

    Science.gov (United States)

    Pathman, Thanujeni; Bauer, Patricia J.

    2013-01-01

    The first years of life are witness to rapid changes in long-term recall ability. In the current research we contributed to an explanation of the changes by testing the absolute and relative contributions to long-term recall of encoding and post-encoding processes. Using elicited imitation, we sampled the status of 16-, 20-, and 24-month-old…

  11. Can natural selection encode Bayesian priors?

    Science.gov (United States)

    Ramírez, Juan Camilo; Marshall, James A R

    2017-08-07

    The evolutionary success of many organisms depends on their ability to make decisions based on estimates of the state of their environment (e.g., predation risk) from uncertain information. These decision problems have optimal solutions and individuals in nature are expected to evolve the behavioural mechanisms to make decisions as if using the optimal solutions. Bayesian inference is the optimal method to produce estimates from uncertain data, thus natural selection is expected to favour individuals with the behavioural mechanisms to make decisions as if they were computing Bayesian estimates in typically-experienced environments, although this does not necessarily imply that favoured decision-makers do perform Bayesian computations exactly. Each individual should evolve to behave as if updating a prior estimate of the unknown environment variable to a posterior estimate as it collects evidence. The prior estimate represents the decision-maker's default belief regarding the environment variable, i.e., the individual's default 'worldview' of the environment. This default belief has been hypothesised to be shaped by natural selection and represent the environment experienced by the individual's ancestors. We present an evolutionary model to explore how accurately Bayesian prior estimates can be encoded genetically and shaped by natural selection when decision-makers learn from uncertain information. The model simulates the evolution of a population of individuals that are required to estimate the probability of an event. Every individual has a prior estimate of this probability and collects noisy cues from the environment in order to update its prior belief to a Bayesian posterior estimate with the evidence gained. The prior is inherited and passed on to offspring. Fitness increases with the accuracy of the posterior estimates produced. Simulations show that prior estimates become accurate over evolutionary time. In addition to these 'Bayesian' individuals, we also

  12. Analysis of Heat Transfer

    International Nuclear Information System (INIS)

    2003-08-01

    This book deals with analysis of heat transfer which includes nonlinear analysis examples, radiation heat transfer, analysis of heat transfer in ANSYS, verification of analysis result, analysis of heat transfer of transition with automatic time stepping and open control, analysis of heat transfer using arrangement of ANSYS, resistance of thermal contact, coupled field analysis such as of thermal-structural interaction, cases of coupled field analysis, and phase change.

  13. Mutagenesis in sequence encoding of human factor VII for gene therapy of hemophilia

    Directory of Open Access Journals (Sweden)

    B Kazemi

    2009-12-01

    Full Text Available "nBackground: Current treatment of hemophilia which is one of the most common bleeding disorders, involves replacement therapy using concentrates of FVIII and FIX .However, these concentrates have been associated with viral infections and thromboembolic complications and development of antibodies. "nThe use of recombinant human factor VII (rhFVII is effective  for the treatment of patients with  hemophilia A or B, who develop antibodies ( referred as inhibitors against  replacement therapy , because it induces coagulation independent of FVIII and FIX. However, its short half-life and high cost have limited its use. One potential solution to this problem may be the use of FVIIa gene transfer, which would attain continuing therapeutic levels of expression from a single injection. The aim of this study was to engineer a novel hFVII (human FVII gene containing a cleavage site for the intracellular protease and furin, by PCR mutagenesis "nMethods: The sequence encoding light and heavy chains of hFVII, were amplified by using hFVII/pTZ57R and specific primers, separately. The PCR products were cloned in pTZ57R vector. "nResults and discussion: Cloning was confirmed by restriction analysis or PCR amplification using specific primers and plasmid universal primers. Mutagenesis of sequence encoding light and heavy chain was confirmed by restriction enzyme. "nConclusion: In the present study, it was provided recombinant plasmids based on mutant form of DNA encoding light and heavy chains.  Joining mutant form of DNA encoding light chain with mutant heavy chain led to a new variant of hFVII. This variant can be activated by furin and an increase in the proportion of activated form of FVII. This mutant form of hFVII may be used for gene therapy of hemophilia.

  14. 33 CFR 148.246 - When is a document considered filed and where should I file it?

    Science.gov (United States)

    2010-07-01

    ... filed and where should I file it? 148.246 Section 148.246 Navigation and Navigable Waters COAST GUARD... Formal Hearings § 148.246 When is a document considered filed and where should I file it? (a) If a document to be filed is submitted by mail, it is considered filed on the date it is postmarked. If a...

  15. Catching errors with patient-specific pretreatment machine log file analysis.

    Science.gov (United States)

    Rangaraj, Dharanipathy; Zhu, Mingyao; Yang, Deshan; Palaniswaamy, Geethpriya; Yaddanapudi, Sridhar; Wooten, Omar H; Brame, Scott; Mutic, Sasa

    2013-01-01

    A robust, efficient, and reliable quality assurance (QA) process is highly desired for modern external beam radiation therapy treatments. Here, we report the results of a semiautomatic, pretreatment, patient-specific QA process based on dynamic machine log file analysis clinically implemented for intensity modulated radiation therapy (IMRT) treatments delivered by high energy linear accelerators (Varian 2100/2300 EX, Trilogy, iX-D, Varian Medical Systems Inc, Palo Alto, CA). The multileaf collimator machine (MLC) log files are called Dynalog by Varian. Using an in-house developed computer program called "Dynalog QA," we automatically compare the beam delivery parameters in the log files that are generated during pretreatment point dose verification measurements, with the treatment plan to determine any discrepancies in IMRT deliveries. Fluence maps are constructed and compared between the delivered and planned beams. Since clinical introduction in June 2009, 912 machine log file analyses QA were performed by the end of 2010. Among these, 14 errors causing dosimetric deviation were detected and required further investigation and intervention. These errors were the result of human operating mistakes, flawed treatment planning, and data modification during plan file transfer. Minor errors were also reported in 174 other log file analyses, some of which stemmed from false positives and unreliable results; the origins of these are discussed herein. It has been demonstrated that the machine log file analysis is a robust, efficient, and reliable QA process capable of detecting errors originating from human mistakes, flawed planning, and data transfer problems. The possibility of detecting these errors is low using point and planar dosimetric measurements. Copyright © 2013 American Society for Radiation Oncology. Published by Elsevier Inc. All rights reserved.

  16. Beyond a Terabyte File System

    Science.gov (United States)

    Powers, Alan K.

    1994-01-01

    The Numerical Aerodynamics Simulation Facility's (NAS) CRAY C916/1024 accesses a "virtual" on-line file system, which is expanding beyond a terabyte of information. This paper will present some options to fine tuning Data Migration Facility (DMF) to stretch the online disk capacity and explore the transitions to newer devices (STK 4490, ER90, RAID).

  17. Remote file inquiry (RFI) system

    Science.gov (United States)

    1975-01-01

    System interrogates and maintains user-definable data files from remote terminals, using English-like, free-form query language easily learned by persons not proficient in computer programming. System operates in asynchronous mode, allowing any number of inquiries within limitation of available core to be active concurrently.

  18. Analyzing data files in SWAN

    CERN Document Server

    Gajam, Niharika

    2016-01-01

    Traditionally analyzing data happens via batch-processing and interactive work on the terminal. The project aims to provide another way of analyzing data files: A cloud-based approach. It aims to make it a productive and interactive environment through the combination of FCC and SWAN software.

  19. Log files for testing usability

    NARCIS (Netherlands)

    Klein Teeselink, G.; Siepe, A.H.M.; Pijper, de J.R.

    1999-01-01

    The aim of this study is to gain insight in the usefulness of log file analysis as a method to evaluate the usability of individual interface components and their influence on the usability of the overall user interface. We selected a music player as application, with four different interfaces and

  20. Nuclear Structure References (NSR) file

    International Nuclear Information System (INIS)

    Ewbank, W.B.

    1978-08-01

    The use of the Nuclear Structure References file by the Nuclear Data Project at ORNL is described. Much of the report concerns format information of interest only to those preparing input to the system or otherwise needing detailed knowledge of its internal structure. 17 figures

  1. High-Efficient Parallel CAVLC Encoders on Heterogeneous Multicore Architectures

    Directory of Open Access Journals (Sweden)

    H. Y. Su

    2012-04-01

    Full Text Available This article presents two high-efficient parallel realizations of the context-based adaptive variable length coding (CAVLC based on heterogeneous multicore processors. By optimizing the architecture of the CAVLC encoder, three kinds of dependences are eliminated or weaken, including the context-based data dependence, the memory accessing dependence and the control dependence. The CAVLC pipeline is divided into three stages: two scans, coding, and lag packing, and be implemented on two typical heterogeneous multicore architectures. One is a block-based SIMD parallel CAVLC encoder on multicore stream processor STORM. The other is a component-oriented SIMT parallel encoder on massively parallel architecture GPU. Both of them exploited rich data-level parallelism. Experiments results show that compared with the CPU version, more than 70 times of speedup can be obtained for STORM and over 50 times for GPU. The implementation of encoder on STORM can make a real-time processing for 1080p @30fps and GPU-based version can satisfy the requirements for 720p real-time encoding. The throughput of the presented CAVLC encoders is more than 10 times higher than that of published software encoders on DSP and multicore platforms.

  2. An asynchronous writing method for restart files in the gysela code in prevision of exascale systems*

    Directory of Open Access Journals (Sweden)

    Thomine O.

    2013-12-01

    Full Text Available The present work deals with an optimization procedure developed in the full-f global GYrokinetic SEmi-LAgrangian code (GYSELA. Optimizing the writing of the restart files is necessary to reduce the computing impact of crashes. These files require a very large memory space, and particularly so for very large mesh sizes. The limited bandwidth of the data pipe between the comput- ing nodes and the storage system induces a non-scalable part in the GYSELA code, which increases with the mesh size. Indeed the transfer time of RAM to data depends linearly on the files size. The necessity of non synchronized writing-in-file procedure is therefore crucial. A new GYSELA module has been developed. This asynchronous procedure allows the frequent writ- ing of the restart files, whilst preventing a severe slowing down due to the limited writing bandwidth. This method has been improved to generate a checksum control of the restart files, and automatically rerun the code in case of a crash for any cause.

  3. Extreme expansion of NBS-encoding genes in Rosaceae.

    Science.gov (United States)

    Jia, YanXiao; Yuan, Yang; Zhang, Yanchun; Yang, Sihai; Zhang, Xiaohui

    2015-05-03

    Nucleotide binding site leucine-rich repeats (NBS-LRR) genes encode a large class of disease resistance (R) proteins in plants. Extensive studies have been carried out to identify and investigate NBS-encoding gene families in many important plant species. However, no comprehensive research into NBS-encoding genes in the Rosaceae has been performed. In this study, five whole-genome sequenced Rosaceae species, including apple, pear, peach, mei, and strawberry, were analyzed to investigate the evolutionary pattern of NBS-encoding genes and to compare them to those of three Cucurbitaceae species, cucumber, melon, and watermelon. Considerable differences in the copy number of NBS-encoding genes were observed between Cucurbitaceae and Rosaceae species. In Rosaceae species, a large number and a high proportion of NBS-encoding genes were observed in peach (437, 1.52%), mei (475, 1.51%), strawberry (346, 1.05%) and pear (617, 1.44%), and apple contained a whopping 1303 (2.05%) NBS-encoding genes, which might be the highest number of R-genes in all of these reported diploid plant. However, no more than 100 NBS-encoding genes were identified in Cucurbitaceae. Many more species-specific gene families were classified and detected with the signature of positive selection in Rosaceae species, especially in the apple genome. Taken together, our findings indicate that NBS-encoding genes in Rosaceae, especially in apple, have undergone extreme expansion and rapid adaptive evolution. Useful information was provided for further research on the evolutionary mode of disease resistance genes in Rosaceae crops.

  4. Thought probes during prospective memory encoding: Evidence for perfunctory processes

    Science.gov (United States)

    McDaniel, Mark A.; Dasse, Michelle N.; Lee, Ji hae; Kurinec, Courtney A.; Tami, Claudina; Krueger, Madison L.

    2018-01-01

    For nearly 50 years, psychologists have studied prospective memory, or the ability to execute delayed intentions. Yet, there remains a gap in understanding as to whether initial encoding of the intention must be elaborative and strategic, or whether some components of successful encoding can occur in a perfunctory, transient manner. In eight studies (N = 680), we instructed participants to remember to press the Q key if they saw words representing fruits (cue) during an ongoing lexical decision task. They then typed what they were thinking and responded whether they encoded fruits as a general category, as specific exemplars, or hardly thought about it at all. Consistent with the perfunctory view, participants often reported mind wandering (42.9%) and hardly thinking about the prospective memory task (22.5%). Even though participants were given a general category cue, many participants generated specific category exemplars (34.5%). Bayesian analyses of encoding durations indicated that specific exemplars came to mind in a perfunctory manner rather than via strategic, elaborative mechanisms. Few participants correctly guessed the research hypotheses and changing from fruit category cues to initial-letter cues eliminated reports of specific exemplar generation, thereby arguing against demand characteristics in the thought probe procedure. In a final experiment, encoding duration was unrelated to prospective memory performance; however, specific-exemplar encoders outperformed general-category encoders with no ongoing task monitoring costs. Our findings reveal substantial variability in intention encoding, and demonstrate that some components of prospective memory encoding can be done “in passing.” PMID:29874277

  5. Latency Performance of Encoding with Random Linear Network Coding

    DEFF Research Database (Denmark)

    Nielsen, Lars; Hansen, René Rydhof; Lucani Rötter, Daniel Enrique

    2018-01-01

    the encoding process can be parallelized based on system requirements to reduce data access time within the system. Using a counting argument, we focus on predicting the effect of changes of generation (number of original packets) and symbol size (number of bytes per data packet) configurations on the encoding...... latency on full vector and on-the-fly algorithms. We show that the encoding latency doubles when either the generation size or the symbol size double and confirm this via extensive simulations. Although we show that the theoretical speed gain of on-the-fly over full vector is two, our measurements show...

  6. Wavelength-encoded OCDMA system using opto-VLSI processors.

    Science.gov (United States)

    Aljada, Muhsen; Alameh, Kamal

    2007-07-01

    We propose and experimentally demonstrate a 2.5 Gbits/sper user wavelength-encoded optical code-division multiple-access encoder-decoder structure based on opto-VLSI processing. Each encoder and decoder is constructed using a single 1D opto-very-large-scale-integrated (VLSI) processor in conjunction with a fiber Bragg grating (FBG) array of different Bragg wavelengths. The FBG array spectrally and temporally slices the broadband input pulse into several components and the opto-VLSI processor generates codewords using digital phase holograms. System performance is measured in terms of the autocorrelation and cross-correlation functions as well as the eye diagram.

  7. Wavelength-encoded OCDMA system using opto-VLSI processors

    Science.gov (United States)

    Aljada, Muhsen; Alameh, Kamal

    2007-07-01

    We propose and experimentally demonstrate a 2.5 Gbits/sper user wavelength-encoded optical code-division multiple-access encoder-decoder structure based on opto-VLSI processing. Each encoder and decoder is constructed using a single 1D opto-very-large-scale-integrated (VLSI) processor in conjunction with a fiber Bragg grating (FBG) array of different Bragg wavelengths. The FBG array spectrally and temporally slices the broadband input pulse into several components and the opto-VLSI processor generates codewords using digital phase holograms. System performance is measured in terms of the autocorrelation and cross-correlation functions as well as the eye diagram.

  8. A Metadata-Rich File System

    Energy Technology Data Exchange (ETDEWEB)

    Ames, S; Gokhale, M B; Maltzahn, C

    2009-01-07

    Despite continual improvements in the performance and reliability of large scale file systems, the management of file system metadata has changed little in the past decade. The mismatch between the size and complexity of large scale data stores and their ability to organize and query their metadata has led to a de facto standard in which raw data is stored in traditional file systems, while related, application-specific metadata is stored in relational databases. This separation of data and metadata requires considerable effort to maintain consistency and can result in complex, slow, and inflexible system operation. To address these problems, we have developed the Quasar File System (QFS), a metadata-rich file system in which files, metadata, and file relationships are all first class objects. In contrast to hierarchical file systems and relational databases, QFS defines a graph data model composed of files and their relationships. QFS includes Quasar, an XPATH-extended query language for searching the file system. Results from our QFS prototype show the effectiveness of this approach. Compared to the defacto standard, the QFS prototype shows superior ingest performance and comparable query performance on user metadata-intensive operations and superior performance on normal file metadata operations.

  9. Expert Performance Transfer: Making Knowledge Transfer Count

    International Nuclear Information System (INIS)

    Turner, C.L.; Braudt, T.E.

    2011-01-01

    'Knowledge Transfer' is a high-priority imperative as the nuclear industry faces the combined effects of an aging workforce and economic pressures to do more with less. Knowledge Transfer is only a part of the solution to these challenges, however. The more compelling and immediate need faced by industry is Accomplishment Transfer, or the transference of the applied knowledge necessary to assure optimal performance transfer from experienced, high-performing staff to inexperienced staff. A great deal of industry knowledge and required performance information has been documented in the form of procedures. Often under-appreciated either as knowledge stores or as drivers of human performance, procedures, coupled with tightly-focused and effective training, are arguably the most effective influences on human and plant performance. (author)

  10. Deceit: A flexible distributed file system

    Science.gov (United States)

    Siegel, Alex; Birman, Kenneth; Marzullo, Keith

    1989-01-01

    Deceit, a distributed file system (DFS) being developed at Cornell, focuses on flexible file semantics in relation to efficiency, scalability, and reliability. Deceit servers are interchangeable and collectively provide the illusion of a single, large server machine to any clients of the Deceit service. Non-volatile replicas of each file are stored on a subset of the file servers. The user is able to set parameters on a file to achieve different levels of availability, performance, and one-copy serializability. Deceit also supports a file version control mechanism. In contrast with many recent DFS efforts, Deceit can behave like a plain Sun Network File System (NFS) server and can be used by any NFS client without modifying any client software. The current Deceit prototype uses the ISIS Distributed Programming Environment for all communication and process group management, an approach that reduces system complexity and increases system robustness.

  11. 77 FR 73654 - Eau Galle Renewable Energy Company, Eau Galle Hydro, LLC; Notice of Transfer of Exemption

    Science.gov (United States)

    2012-12-11

    ... Renewable Energy Company, Eau Galle Hydro, LLC; Notice of Transfer of Exemption 1. By letter filed October 12, 2012, Eau Galle Renewable Energy Company informed the Commission that its exemption from... transferred to Eau Galle Renewable Energy Company by letter.\\2\\ The project is located on the Eau Galle River...

  12. Waste Transfer Stations

    DEFF Research Database (Denmark)

    Christensen, Thomas Højlund

    2011-01-01

    tion and transport is usually the most costly part of any waste management system; and when waste is transported over a considerable distance or for a long time, transferring the waste from the collection vehicles to more efficient transportation may be economically beneficial. This involves...... a transfer station where the transfer takes place. These stations may also be accessible by private people, offering flexibility to the waste system, including facilities for bulky waste, household hazardous waste and recyclables. Waste transfer may also take place on the collection route from small...... describes the main features of waste transfer stations, including some considerations about the economical aspects on when transfer is advisable....

  13. High Performance Data Transfer for Distributed Data Intensive Sciences

    Energy Technology Data Exchange (ETDEWEB)

    Fang, Chin [Zettar Inc., Mountain View, CA (United States); Cottrell, R ' Les' A. [SLAC National Accelerator Lab., Menlo Park, CA (United States); Hanushevsky, Andrew B. [SLAC National Accelerator Lab., Menlo Park, CA (United States); Kroeger, Wilko [SLAC National Accelerator Lab., Menlo Park, CA (United States); Yang, Wei [SLAC National Accelerator Lab., Menlo Park, CA (United States)

    2017-03-06

    We report on the development of ZX software providing high performance data transfer and encryption. The design scales in: computation power, network interfaces, and IOPS while carefully balancing the available resources. Two U.S. patent-pending algorithms help tackle data sets containing lots of small files and very large files, and provide insensitivity to network latency. It has a cluster-oriented architecture, using peer-to-peer technologies to ease deployment, operation, usage, and resource discovery. Its unique optimizations enable effective use of flash memory. Using a pair of existing data transfer nodes at SLAC and NERSC, we compared its performance to that of bbcp and GridFTP and determined that they were comparable. With a proof of concept created using two four-node clusters with multiple distributed multi-core CPUs, network interfaces and flash memory, we achieved 155Gbps memory-to-memory over a 2x100Gbps link aggregated channel and 70Gbps file-to-file with encryption over a 5000 mile 100Gbps link.

  14. Emotion experienced during encoding enhances odor retrieval cue effectiveness.

    Science.gov (United States)

    Herz, R S

    1997-01-01

    Emotional potentiation may be a key variable in the formation of odor-associated memory. Two experiments were conducted in which a distinctive ambient odor was present or absent during encoding and retrieval sessions and subjects were in an anxious or neutral mood during encoding. Subjects' mood at retrieval was not manipulated. The laboratory mood induction used in Experiment 1 suggested that anxiety might increase the effectiveness of an odor retrieval cue. This trend was confirmed in Experiment 2 by capturing a naturally stressful situation. Subjects who had an ambient odor cue available and were in a preexam state during encoding recalled more words than subjects in any other group. These data are evidence that heightened emotion experienced during encoding with an ambient odor can enhance the effectiveness of an odor as a cue to memory.

  15. Color Image Authentication and Recovery via Adaptive Encoding

    Directory of Open Access Journals (Sweden)

    Chun-Hung Chen

    2014-01-01

    Full Text Available We describe an authentication and recovery scheme for color image protection based on adaptive encoding. The image blocks are categorized based on their contents and different encoding schemes are applied according to their types. Such adaptive encoding results in better image quality and more robust image authentication. The approximations of the luminance and chromatic channels are carefully calculated, and for the purpose of reducing the data size, differential coding is used to encode the channels with variable size according to the characteristic of the block. The recovery data which represents the approximation and the detail of the image is embedded for data protection. The necessary data is well protected by using error correcting coding and duplication. The experimental results demonstrate that our technique is able to identify and localize image tampering, while preserving high quality for both watermarked and recovered images.

  16. Suppressors of RNA silencing encoded by tomato leaf curl ...

    Indian Academy of Sciences (India)

    2013-01-06

    Jan 6, 2013 ... Virus encoded RNA-silencing suppressors (RSSs) are the key components evolved by the viruses to ... severe disease symptom in the host (Briddon et al. ..... Voinnet O 2001 RNA silencing as a plant immune system against.

  17. Two Genes Encoding Uracil Phosphoribosyltransferase Are Present in Bacillus subtilis

    DEFF Research Database (Denmark)

    Martinussen, Jan; Glaser, Philippe; Andersen, Paal S.

    1995-01-01

    Uracil phosphoribosyltransferase (UPRTase) catalyzes the key reaction in the salvage of uracil in many microorganisms. Surprisingly, two genes encoding UPRTase activity were cloned from Bacillus subtilis by complementation of an Escherichia coli mutant. The genes were sequenced, and the putative...

  18. What is a "good" encoding of guarded choice?

    DEFF Research Database (Denmark)

    Nestmann, Uwe

    2000-01-01

    into the latter that preserves divergence-freedom and symmetries. This paper argues that there are nevertheless "good" encodings between these calculi. In detail, we present a series of encodings for languages with (1) input-guarded choice, (2) both input and output-guarded choice, and (3) mixed-guarded choice......, and investigate them with respect to compositionality and divergence-freedom. The first and second encoding satisfy all of the above criteria, but various "good" candidates for the third encoding-inspired by an existing distributed implementation-invalidate one or the other criterion, While essentially confirming...... Palamidessi's result, our study suggests that the combination of strong compositionality and divergence-freedom is too strong for more practical purposes. (C) 2000 Academic Press....

  19. Cloning, sequencing and expression of cDNA encoding growth ...

    Indian Academy of Sciences (India)

    Unknown

    of medicine, animal husbandry, fish farming and animal ..... northern pike (Esox lucius) growth hormone; Mol. Mar. Biol. ... prolactin 1-luciferase fusion gene in African catfish and ... 1988 Cloning and sequencing of cDNA that encodes goat.

  20. Noise and neuronal populations conspire to encode simple waveforms reliably

    Science.gov (United States)

    Parnas, B. R.

    1996-01-01

    Sensory systems rely on populations of neurons to encode information transduced at the periphery into meaningful patterns of neuronal population activity. This transduction occurs in the presence of intrinsic neuronal noise. This is fortunate. The presence of noise allows more reliable encoding of the temporal structure present in the stimulus than would be possible in a noise-free environment. Simulations with a parallel model of signal processing at the auditory periphery have been used to explore the effects of noise and a neuronal population on the encoding of signal information. The results show that, for a given set of neuronal modeling parameters and stimulus amplitude, there is an optimal amount of noise for stimulus encoding with maximum fidelity.

  1. Universal Quantum Computing with Arbitrary Continuous-Variable Encoding.

    Science.gov (United States)

    Lau, Hoi-Kwan; Plenio, Martin B

    2016-09-02

    Implementing a qubit quantum computer in continuous-variable systems conventionally requires the engineering of specific interactions according to the encoding basis states. In this work, we present a unified formalism to conduct universal quantum computation with a fixed set of operations but arbitrary encoding. By storing a qubit in the parity of two or four qumodes, all computing processes can be implemented by basis state preparations, continuous-variable exponential-swap operations, and swap tests. Our formalism inherits the advantages that the quantum information is decoupled from collective noise, and logical qubits with different encodings can be brought to interact without decoding. We also propose a possible implementation of the required operations by using interactions that are available in a variety of continuous-variable systems. Our work separates the "hardware" problem of engineering quantum-computing-universal interactions, from the "software" problem of designing encodings for specific purposes. The development of quantum computer architecture could hence be simplified.

  2. Toward a Better Compression for DNA Sequences Using Huffman Encoding.

    Science.gov (United States)

    Al-Okaily, Anas; Almarri, Badar; Al Yami, Sultan; Huang, Chun-Hsi

    2017-04-01

    Due to the significant amount of DNA data that are being generated by next-generation sequencing machines for genomes of lengths ranging from megabases to gigabases, there is an increasing need to compress such data to a less space and a faster transmission. Different implementations of Huffman encoding incorporating the characteristics of DNA sequences prove to better compress DNA data. These implementations center on the concepts of selecting frequent repeats so as to force a skewed Huffman tree, as well as the construction of multiple Huffman trees when encoding. The implementations demonstrate improvements on the compression ratios for five genomes with lengths ranging from 5 to 50 Mbp, compared with the standard Huffman tree algorithm. The research hence suggests an improvement on all such DNA sequence compression algorithms that use the conventional Huffman encoding. The research suggests an improvement on all DNA sequence compression algorithms that use the conventional Huffman encoding. Accompanying software is publicly available (AL-Okaily, 2016 ).

  3. Polypeptides having catalase activity and polynucleotides encoding same

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Ye; Duan, Junxin; Zhang, Yu; Tang, Lan

    2017-05-02

    Provided are isolated polypeptides having catalase activity and polynucleotides encoding the polypeptides. Also provided are nucleic acid constructs, vectors and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides.

  4. Cloning, expression and characterisation of a novel gene encoding ...

    African Journals Online (AJOL)

    微软用户

    2012-01-12

    Jan 12, 2012 ... ... characterisation of a novel gene encoding a chemosensory protein from Bemisia ... The genomic DNA sequence comparisons revealed a 1490 bp intron ... have several conserved sequence motifs, including the. N-terminal ...

  5. Multiple-stage pure phase encoding with biometric information

    Science.gov (United States)

    Chen, Wen

    2018-01-01

    In recent years, many optical systems have been developed for securing information, and optical encryption/encoding has attracted more and more attention due to the marked advantages, such as parallel processing and multiple-dimensional characteristics. In this paper, an optical security method is presented based on pure phase encoding with biometric information. Biometric information (such as fingerprint) is employed as security keys rather than plaintext used in conventional optical security systems, and multiple-stage phase-encoding-based optical systems are designed for generating several phase-only masks with biometric information. Subsequently, the extracted phase-only masks are further used in an optical setup for encoding an input image (i.e., plaintext). Numerical simulations are conducted to illustrate the validity, and the results demonstrate that high flexibility and high security can be achieved.

  6. Polypeptides having xylanase activity and polynucleotides encoding same

    Energy Technology Data Exchange (ETDEWEB)

    Spodsberg, Nikolaj

    2018-02-06

    The present invention relates to isolated polypeptides having xylanase activity and polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods of producing and using the polypeptides.

  7. 76 FR 61351 - Combined Notice of Filings #1

    Science.gov (United States)

    2011-10-04

    ... MBR Baseline Tariff Filing to be effective 9/22/2011. Filed Date: 09/22/2011. Accession Number... submits tariff filing per 35.1: ECNY MBR Re-File to be effective 9/22/2011. Filed Date: 09/22/2011... Industrial Energy Buyers, LLC submits tariff filing per 35.1: NYIEB MBR Re-File to be effective 9/22/2011...

  8. Data Encoding using Periodic Nano-Optical Features

    Science.gov (United States)

    Vosoogh-Grayli, Siamack

    Successful trials have been made through a designed algorithm to quantize, compress and optically encode unsigned 8 bit integer values in the form of images using Nano optical features. The periodicity of the Nano-scale features (Nano-gratings) have been designed and investigated both theoretically and experimentally to create distinct states of variation (three on states and one off state). The use of easy to manufacture and machine readable encoded data in secured authentication media has been employed previously in bar-codes for bi-state (binary) models and in color barcodes for multiple state models. This work has focused on implementing 4 states of variation for unit information through periodic Nano-optical structures that separate an incident wavelength into distinct colors (variation states) in order to create an encoding system. Compared to barcodes and magnetic stripes in secured finite length storage media the proposed system encodes and stores more data. The benefits of multiple states of variation in an encoding unit are 1) increased numerically representable range 2) increased storage density and 3) decreased number of typical set elements for any ergodic or semi-ergodic source that emits these encoding units. A thorough investigation has targeted the effects of the use of multi-varied state Nano-optical features on data storage density and consequent data transmission rates. The results show that use of Nano-optical features for encoding data yields a data storage density of circa 800 Kbits/in2 via the implementation of commercially available high resolution flatbed scanner systems for readout. Such storage density is far greater than commercial finite length secured storage media such as Barcode family with maximum practical density of 1kbits/in2 and highest density magnetic stripe cards with maximum density circa 3 Kbits/in2. The numerically representable range of the proposed encoding unit for 4 states of variation is [0 255]. The number of

  9. Advance Pricing Agreements and Double Taxation – Key Concepts in the Context of Transfer Pricing

    Directory of Open Access Journals (Sweden)

    Ignat (Neacsu Ioana

    2017-01-01

    Results show that an APA presents more advantages than a transfer pricing file, but its disadvantages (regarding the cost and the period of time needed for the issuance have a big impact on the business of a company and determine most of the taxpayers to choose a transfer pricing documentation file rather than to apply for an APPA. The results of this research also show that countries which have concluded a big number of Double Tax Treaties tends to grant much more APAs compared with the other category of countries where the number of Double Tax Treaties is smaller.

  10. Quantum information transfer between topological and conventional charge qubits

    International Nuclear Information System (INIS)

    Li Jun; Zou Yan

    2016-01-01

    We propose a scheme to realize coherent quantum information transfer between topological and conventional charge qubits. We first consider a hybrid system where a quantum dot (QD) is tunnel-coupled to a semiconductor Majorana-hosted nanowire (MNW) via using gated control as a switch, the information encoded in the superposition state of electron empty and occupied state can be transferred to each other through choosing the proper interaction time to make measurements. Then we consider another system including a double QDs and a pair of parallel MNWs, it is shown that the entanglement information transfer can be realized between the two kinds of systems. We also realize long distance quantum information transfer between two quantum dots separated by an MNW, by making use of the nonlocal fermionic level formed with the pared Majorana feimions (MFs) emerging at the two ends of the MNW. Furthermore, we analyze the teleportationlike electron transfer phenomenon predicted by Tewari et al. [Phys. Rev. Lett. 100, 027001 (2008)] in our considered system. Interestingly, we find that this phenomenon exactly corresponds to the case that the information encoded in one QD just returns back to its original place during the dynamical evolution of the combined system from the perspective of quantum state transfer. (paper)

  11. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    OpenAIRE

    Gao, Yuan; Liu, Pengyu; Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content ...

  12. Security enhanced BioEncoding for protecting iris codes

    Science.gov (United States)

    Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya

    2011-06-01

    Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.

  13. Theory of multisource crosstalk reduction by phase-encoded statics

    KAUST Repository

    Schuster, Gerard T.

    2011-03-01

    Formulas are derived that relate the strength of the crosstalk noise in supergather migration images to the variance of time, amplitude and polarity shifts in encoding functions. A supergather migration image is computed by migrating an encoded supergather, where the supergather is formed by stacking a large number of encoded shot gathers. Analysis reveals that for temporal source static shifts in each shot gather, the crosstalk noise is exponentially reduced with increasing variance of the static shift and the square of source frequency. This is not too surprising because larger time shifts lead to less correlation between traces in different shot gathers, and so should tend to reduce the crosstalk noise. Analysis also reveals that combining both polarity and time statics is a superior encoding strategy compared to using either polarity statics or time statics alone. Signal-to-noise (SNR) estimates show that for a standard migration image and for an image computed by migrating a phase-encoded supergather; here, G is the number of traces in a shot gather, I is the number of stacking iterations in the supergather and S is the number of encoded/blended shot gathers that comprise the supergather. If the supergather can be uniformly divided up into Q unique sub-supergathers, then the resulting SNR of the final image is, which means that we can enhance image quality but at the expense of Q times more cost. The importance of these formulas is that they provide a precise understanding between different phase encoding strategies and image quality. Finally, we show that iterative migration of phase-encoded supergathers is a special case of passive seismic interferometry. We suggest that the crosstalk noise formulas can be helpful in designing optimal strategies for passive seismic interferometry and efficient extraction of Green\\'s functions from simulated supergathers. © 2011 The Authors Geophysical Journal International © 2011 RAS.

  14. Encoding and Retrieval Interference in Sentence Comprehension: Evidence from Agreement

    Directory of Open Access Journals (Sweden)

    Sandra Villata

    2018-01-01

    Full Text Available Long-distance verb-argument dependencies generally require the integration of a fronted argument when the verb is encountered for sentence interpretation. Under a parsing model that handles long-distance dependencies through a cue-based retrieval mechanism, retrieval is hampered when retrieval cues also resonate with non-target elements (retrieval interference. However, similarity-based interference may also stem from interference arising during the encoding of elements in memory (encoding interference, an effect that is not directly accountable for by a cue-based retrieval mechanism. Although encoding and retrieval interference are clearly distinct at the theoretical level, it is difficult to disentangle the two on empirical grounds, since encoding interference may also manifest at the retrieval region. We report two self-paced reading experiments aimed at teasing apart the role of each component in gender and number subject-verb agreement in Italian and English object relative clauses. In Italian, the verb does not agree in gender with the subject, thus providing no cue for retrieval. In English, although present tense verbs agree in number with the subject, past tense verbs do not, allowing us to test the role of number as a retrieval cue within the same language. Results from both experiments converge, showing similarity-based interference at encoding, and some evidence for an effect at retrieval. After having pointed out the non-negligible role of encoding in sentence comprehension, and noting that Lewis and Vasishth’s (2005 ACT-R model of sentence processing, the most fully developed cue-based retrieval approach to sentence processing does not predict encoding effects, we propose an augmentation of this model that predicts these effects. We then also propose a self-organizing sentence processing model (SOSP, which has the advantage of accounting for retrieval and encoding interference with a single mechanism.

  15. Encoding and Retrieval Interference in Sentence Comprehension: Evidence from Agreement

    Science.gov (United States)

    Villata, Sandra; Tabor, Whitney; Franck, Julie

    2018-01-01

    Long-distance verb-argument dependencies generally require the integration of a fronted argument when the verb is encountered for sentence interpretation. Under a parsing model that handles long-distance dependencies through a cue-based retrieval mechanism, retrieval is hampered when retrieval cues also resonate with non-target elements (retrieval interference). However, similarity-based interference may also stem from interference arising during the encoding of elements in memory (encoding interference), an effect that is not directly accountable for by a cue-based retrieval mechanism. Although encoding and retrieval interference are clearly distinct at the theoretical level, it is difficult to disentangle the two on empirical grounds, since encoding interference may also manifest at the retrieval region. We report two self-paced reading experiments aimed at teasing apart the role of each component in gender and number subject-verb agreement in Italian and English object relative clauses. In Italian, the verb does not agree in gender with the subject, thus providing no cue for retrieval. In English, although present tense verbs agree in number with the subject, past tense verbs do not, allowing us to test the role of number as a retrieval cue within the same language. Results from both experiments converge, showing similarity-based interference at encoding, and some evidence for an effect at retrieval. After having pointed out the non-negligible role of encoding in sentence comprehension, and noting that Lewis and Vasishth’s (2005) ACT-R model of sentence processing, the most fully developed cue-based retrieval approach to sentence processing does not predict encoding effects, we propose an augmentation of this model that predicts these effects. We then also propose a self-organizing sentence processing model (SOSP), which has the advantage of accounting for retrieval and encoding interference with a single mechanism. PMID:29403414

  16. Molecular cloning and functional analysis of the gene encoding ...

    African Journals Online (AJOL)

    Here we report for the first time the cloning of a full-length cDNA encoding GGPPS (Jc-GGPPS) from Jatropha curcas L. The full-length cDNA was 1414 base pair (bp), with an 1110-bp open reading frame (ORF) encoding a 370- amino-acids polypeptide. Bioinformatic analysis revealed that Jc-GGPPS is a member of the ...

  17. Universal Quantum Computing with Arbitrary Continuous-Variable Encoding

    OpenAIRE

    Lau, Hoi-Kwan; Plenio, Martin B.

    2016-01-01

    Implementing a qubit quantum computer in continuous-variable systems conventionally requires the engineering of specific interactions according to the encoding basis states. In this work, we present a unified formalism to conduct universal quantum computation with a fixed set of operations but arbitrary encoding. By storing a qubit in the parity of two or four qumodes, all computing processes can be implemented by basis state preparations, continuous-variable exponential-swap operations, and ...

  18. Convective heat transfer

    CERN Document Server

    Kakac, Sadik; Pramuanjaroenkij, Anchasa

    2014-01-01

    Intended for readers who have taken a basic heat transfer course and have a basic knowledge of thermodynamics, heat transfer, fluid mechanics, and differential equations, Convective Heat Transfer, Third Edition provides an overview of phenomenological convective heat transfer. This book combines applications of engineering with the basic concepts of convection. It offers a clear and balanced presentation of essential topics using both traditional and numerical methods. The text addresses emerging science and technology matters, and highlights biomedical applications and energy technologies. What’s New in the Third Edition: Includes updated chapters and two new chapters on heat transfer in microchannels and heat transfer with nanofluids Expands problem sets and introduces new correlations and solved examples Provides more coverage of numerical/computer methods The third edition details the new research areas of heat transfer in microchannels and the enhancement of convective heat transfer with nanofluids....

  19. Encoding specificity manipulations do affect retrieval from memory.

    Science.gov (United States)

    Zeelenberg, René

    2005-05-01

    In a recent article, P.A. Higham (2002) [Strong cues are not necessarily weak: Thomson and Tulving (1970) and the encoding specificity principle revisited. Memory &Cognition, 30, 67-80] proposed a new way to analyze cued recall performance in terms of three separable aspects of memory (retrieval, monitoring, and report bias) by comparing performance under both free-report and forced-report instructions. He used this method to derive estimates of these aspects of memory in an encoding specificity experiment similar to that reported by D.M. Thomson and E. Tulving (1970) [Associative encoding and retrieval: weak and strong cues. Journal of Experimental Psychology, 86, 255-262]. Under forced-report instructions, the encoding specificity manipulation did not affect performance. Higham concluded that the manipulation affected monitoring and report bias, but not retrieval. I argue that this interpretation of the results is problematic because the Thomson and Tulving paradigm is confounded, and show in three experiments using a more appropriate design that encoding specificity manipulations do affect performance in forced-report cued recall. Because in Higham's framework forced-report performance provides a measure of retrieval that is uncontaminated by monitoring and report bias it is concluded that encoding specificity manipulations do affect retrieval from memory.

  20. Aerobic Exercise During Encoding Impairs Hippocampus-Dependent Memory.

    Science.gov (United States)

    Soga, Keishi; Kamijo, Keita; Masaki, Hiroaki

    2017-08-01

    We investigated how aerobic exercise during encoding affects hippocampus-dependent memory through a source memory task that assessed hippocampus-independent familiarity and hippocampus-dependent recollection processes. Using a within-participants design, young adult participants performed a memory-encoding task while performing a cycling exercise or being seated. The subsequent retrieval phase was conducted while sitting on a chair. We assessed behavioral and event-related brain potential measures of familiarity and recollection processes during the retrieval phase. Results indicated that source accuracy was lower for encoding with exercise than for encoding in the resting condition. Event-related brain potential measures indicated that the parietal old/new effect, which has been linked to recollection processing, was observed in the exercise condition, whereas it was absent in the rest condition, which is indicative of exercise-induced hippocampal activation. These findings suggest that aerobic exercise during encoding impairs hippocampus-dependent memory, which may be attributed to inefficient source encoding during aerobic exercise.

  1. Low Complexity HEVC Encoder for Visual Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhaoqing Pan

    2015-12-01

    Full Text Available Visual sensor networks (VSNs can be widely applied in security surveillance, environmental monitoring, smart rooms, etc. However, with the increased number of camera nodes in VSNs, the volume of the visual information data increases significantly, which becomes a challenge for storage, processing and transmitting the visual data. The state-of-the-art video compression standard, high efficiency video coding (HEVC, can effectively compress the raw visual data, while the higher compression rate comes at the cost of heavy computational complexity. Hence, reducing the encoding complexity becomes vital for the HEVC encoder to be used in VSNs. In this paper, we propose a fast coding unit (CU depth decision method to reduce the encoding complexity of the HEVC encoder for VSNs. Firstly, the content property of the CU is analyzed. Then, an early CU depth decision method and a low complexity distortion calculation method are proposed for the CUs with homogenous content. Experimental results show that the proposed method achieves 71.91% on average encoding time savings for the HEVC encoder for VSNs.

  2. Introduction to heat transfer

    CERN Document Server

    SUNDÉN, B

    2012-01-01

    Presenting the basic mechanisms for transfer of heat, Introduction to Heat Transfer gives a deeper and more comprehensive view than existing titles on the subject. Derivation and presentation of analytical and empirical methods are provided for calculation of heat transfer rates and temperature fields as well as pressure drop. The book covers thermal conduction, forced and natural laminar and turbulent convective heat transfer, thermal radiation including participating media, condensation, evaporation and heat exchangers.

  3. Electrostatically driven resonance energy transfer in “cationic” biocompatible indium phosphide quantum dots† †Electronic supplementary information (ESI) available: Detailed experimental methods, the synthesis and characterization of QDs, bioimaging, stability studies, control experiments, and the calculation of various parameters involved in the resonance energy transfer process etc. See DOI: 10.1039/c7sc00592j Click here for additional data file.

    Science.gov (United States)

    Devatha, Gayathri; Roy, Soumendu; Rao, Anish; Mallick, Abhik; Basu, Sudipta

    2017-01-01

    Indium Phosphide Quantum Dots (InP QDs) have emerged as an alternative to toxic metal ion based QDs in nanobiotechnology. The ability to generate cationic surface charge, without compromising stability and biocompatibility, is essential in realizing the full potential of InP QDs in biological applications. We have addressed this challenge by developing a place exchange protocol for the preparation of cationic InP/ZnS QDs. The quaternary ammonium group provides the much required permanent positive charge and stability to InP/ZnS QDs in biofluids. The two important properties of QDs, namely bioimaging and light induced resonance energy transfer, are successfully demonstrated in cationic InP/ZnS QDs. The low cytotoxicity and stable photoluminescence of cationic InP/ZnS QDs inside cells make them ideal candidates as optical probes for cellular imaging. An efficient resonance energy transfer (E ∼ 60%) is observed, under physiological conditions, between the cationic InP/ZnS QD donor and anionic dye acceptor. A large bimolecular quenching constant along with a linear Stern–Volmer plot confirms the formation of a strong ground state complex between the cationic InP/ZnS QDs and the anionic dye. Control experiments prove the role of electrostatic attraction in driving the light induced interactions, which can rightfully form the basis for future nano-bio studies between cationic InP/ZnS QDs and anionic biomolecules. PMID:28626557

  4. Transfer Pricing Documentation - A Current Issue

    Directory of Open Access Journals (Sweden)

    Violeta Isai

    2016-07-01

    Full Text Available Rather quick development of the business environment has led to the implementation of legislative measures to meet the requirements and amendments thereto. With the adoption of the Fiscal Procedure Code and Order no. 442/2016 were founded transfer pricing procedures, denoting a means of making taxable transfer of a high tax country to a low tax country. These laws have laid down conditions that must be met and materiality thresholds that must take into account the taxpayer to draft transfer pricing documentation file. The aim of these measures is to reduce the differences between the prices charged by the related parts and the market value and also to actual results of company taxation. The tax authorities are entitled to apply price adjustments when it is not the principle of market value, which entail economic double taxation. Application and dossier preparation of transfer pricing contribute to a collective vision on the market in which the company operates, understanding how business development and, not least, the creation of an appropriate fiscal planning.

  5. Computer Forensics Method in Analysis of Files Timestamps in Microsoft Windows Operating System and NTFS File System

    Directory of Open Access Journals (Sweden)

    Vesta Sergeevna Matveeva

    2013-02-01

    Full Text Available All existing file browsers displays 3 timestamps for every file in file system NTFS. Nowadays there are a lot of utilities that can manipulate temporal attributes to conceal the traces of file using. However every file in NTFS has 8 timestamps that are stored in file record and used in detecting the fact of attributes substitution. The authors suggest a method of revealing original timestamps after replacement and automated variant of it in case of a set of files.

  6. DICOM supported sofware configuration by XML files

    International Nuclear Information System (INIS)

    LucenaG, Bioing Fabian M; Valdez D, Andres E; Gomez, Maria E; Nasisi, Oscar H

    2007-01-01

    A method for the configuration of informatics systems that provide support to DICOM standards using XML files is proposed. The difference with other proposals is base on that this system does not code the information of a DICOM objects file, but codes the standard itself in an XML file. The development itself is the format for the XML files mentioned, in order that they can support what DICOM normalizes for multiple languages. In this way, the same configuration file (or files) can be use in different systems. Jointly the XML configuration file generated, we wrote also a set of CSS and XSL files. So the same file can be visualized in a standard browser, as a query system of DICOM standard, emerging use, that did not was a main objective but brings a great utility and versatility. We exposed also some uses examples of the configuration file mainly in relation with the load of DICOM information objects. Finally, at the conclusions we show the utility that the system has already provided when the edition of DICOM standard changes from 2006 to 2007

  7. Panorama 98. 16 thematic files

    International Nuclear Information System (INIS)

    Anon.

    1998-01-01

    Under the 'Panorama 98' title, the Institut Francais du Petrole (IFP) has organized an international colloquium on the most recent events and the foreseeable perspectives in the domain of hydrocarbons. 16 technical and economical documentation files were given to the participants. This paper presents a synthesis of the content of these files: the oil offer and demand, the worldwide petroleum activity, the recent oil and gas discoveries, the stakes of the oil and gas perspectives in the North Sea, the US renewal in the Gulf of Mexico, the exploitation of heavy and extra-heavy crudes in Venezuela, the Asian oil rise, the limits of oil recovery efficiency, the oil markets, the international overview of the natural gas industry, the perspectives of the LNG market, the recent evolution and the perspectives of the European refining activities, the oil companies in 1997, the future of marketing, the trends of European automotive industry, and the scientific certitudes and uncertainties about urban pollution. (J.S.)

  8. The Mycobacterium tuberculosis Rv2540c DNA sequence encodes a bifunctional chorismate synthase

    Directory of Open Access Journals (Sweden)

    Santos Diógenes S

    2008-04-01

    Full Text Available Abstract Background The emergence of multi- and extensively-drug resistant Mycobacterium tuberculosis strains has created an urgent need for new agents to treat tuberculosis (TB. The enzymes of shikimate pathway are attractive targets to the development of antitubercular agents because it is essential for M. tuberculosis and is absent from humans. Chorismate synthase (CS is the seventh enzyme of this route and catalyzes the NADH- and FMN-dependent synthesis of chorismate, a precursor of aromatic amino acids, naphthoquinones, menaquinones, and mycobactins. Although the M. tuberculosis Rv2540c (aroF sequence has been annotated to encode a chorismate synthase, there has been no report on its correct assignment and functional characterization of its protein product. Results In the present work, we describe DNA amplification of aroF-encoded CS from M. tuberculosis (MtCS, molecular cloning, protein expression, and purification to homogeneity. N-terminal amino acid sequencing, mass spectrometry and gel filtration chromatography were employed to determine identity, subunit molecular weight and oligomeric state in solution of homogeneous recombinant MtCS. The bifunctionality of MtCS was determined by measurements of both chorismate synthase and NADH:FMN oxidoreductase activities. The flavin reductase activity was characterized, showing the existence of a complex between FMNox and MtCS. FMNox and NADH equilibrium binding was measured. Primary deuterium, solvent and multiple kinetic isotope effects are described and suggest distinct steps for hydride and proton transfers, with the former being more rate-limiting. Conclusion This is the first report showing that a bacterial CS is bifunctional. Primary deuterium kinetic isotope effects show that C4-proS hydrogen is being transferred during the reduction of FMNox by NADH and that hydride transfer contributes significantly to the rate-limiting step of FMN reduction reaction. Solvent kinetic isotope effects and

  9. Computerized index for teaching files

    International Nuclear Information System (INIS)

    Bramble, J.M.

    1989-01-01

    A computerized index can be used to retrieve cases from a teaching file that have radiographic findings similar to an unknown case. The probability that a user will review cases with a correct diagnosis was estimated with use of radiographic findings of arthritis in hand radiographs of 110 cases from a teaching file. The nearest-neighbor classification algorithm was used as a computer index to 110 cases of arthritis. Each case was treated as an unknown and inputted to the computer index. The accuracy of the computer index in retrieving cases with the same diagnosis (including rheumatoid arthritis, gout, psoriatic arthritis, inflammatory osteoarthritis, and pyrophosphate arthropathy) was measured. A Bayes classifier algorithm was also tested on the same database. Results are presented. The nearest-neighbor algorithm was 83%. By comparison, the estimated accuracy of the Bayes classifier algorithm was 78%. Conclusions: A computerized index to a teaching file based on the nearest-neighbor algorithm should allow the user to review cases with the correct diagnosis of an unknown case, by entering the findings of the unknown case

  10. Least-squares reverse time migration of marine data with frequency-selection encoding

    KAUST Repository

    Dai, Wei; Huang, Yunsong; Schuster, Gerard T.

    2013-01-01

    The phase-encoding technique can sometimes increase the efficiency of the least-squares reverse time migration (LSRTM) by more than one order of magnitude. However, traditional random encoding functions require all the encoded shots to share

  11. Encoding and recall of finger sequences in experienced pianists compared with musically naïve controls: a combined behavioral and functional imaging study.

    Science.gov (United States)

    Pau, S; Jahn, G; Sakreida, K; Domin, M; Lotze, M

    2013-01-01

    Long-term intensive sensorimotor training alters functional representation of the motor and sensory system and might even result in structural changes. However, there is not much knowledge about how previous training impacts learning transfer and functional representation. We tested 14 amateur pianists and 15 musically naïve participants in a short-term finger sequence training procedure, differing considerably from piano playing and measured associated functional representation with functional magnetic resonance imaging. The conditions consisted of encoding a finger sequence indicated by hand symbols ("sequence encoding") and subsequently replaying the sequence from memory, both with and without auditory feedback ("sequence retrieval"). Piano players activated motor areas and the mirror neuron system more strongly than musically naïve participants during encoding. When retrieving the sequence, musically naïve participants showed higher activation in similar brain areas. Thus, retrieval activations of naïve participants were comparable to encoding activations of piano players, who during retrieval performed the sequences more accurately despite lower motor activations. Interestingly, both groups showed primary auditory activation even during sequence retrieval without auditory feedback, supporting previous reports about coactivation of the auditory cortex after learned association with motor performance. When playing with auditory feedback, only pianists lateralized to the left auditory cortex. During encoding activation in left primary somatosensory cortex in the height of the finger representations had a predictive value for increased motor performance later on (error rates). Contrarily, decreased performance was associated with increased visual cortex activation during encoding. Our study extends previous reports about training transfer of motor knowledge resulting in superior training effects in musicians. Performance increase went along with activity in

  12. Intramolecular Energy Transfer, Charge Transfer & Hydrogen Bond

    Indian Academy of Sciences (India)

    Ultrafast Dynamics of Chemical Reactions in Condensed Phase: Intramolecular Energy Transfer, Charge Transfer & Hydrogen Bond · PowerPoint Presentation · Slide 3 · Slide 4 · Slide 5 · Slide 6 · Slide 7 · Slide 8 · Slide 9 · Slide 10 · Slide 11 · Slide 12 · Slide 13 · Slide 14 · Slide 15 · Slide 16 · Slide 17 · Slide 18 · Slide 19.

  13. Small file aggregation in a parallel computing system

    Science.gov (United States)

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Grider, Gary; Zhang, Jingwang

    2014-09-02

    Techniques are provided for small file aggregation in a parallel computing system. An exemplary method for storing a plurality of files generated by a plurality of processes in a parallel computing system comprises aggregating the plurality of files into a single aggregated file; and generating metadata for the single aggregated file. The metadata comprises an offset and a length of each of the plurality of files in the single aggregated file. The metadata can be used to unpack one or more of the files from the single aggregated file.

  14. Heat transfer system

    Science.gov (United States)

    Not Available

    1980-03-07

    A heat transfer system for a nuclear reactor is described. Heat transfer is accomplished within a sealed vapor chamber which is substantially evacuated prior to use. A heat transfer medium, which is liquid at the design operating temperatures, transfers heat from tubes interposed in the reactor primary loop to spaced tubes connected to a steam line for power generation purposes. Heat transfer is accomplished by a two-phase liquid-vapor-liquid process as used in heat pipes. Condensible gases are removed from the vapor chamber through a vertical extension in open communication with the chamber interior.

  15. Fuel transfer machine

    International Nuclear Information System (INIS)

    Bernstein, I.

    1978-01-01

    A nuclear fuel transfer machine for transferring fuel assemblies through the fuel transfer tube of a nuclear power generating plant containment structure is described. A conventional reversible drive cable is attached to the fuel transfer carriage to drive it horizontally through the tube. A shuttle carrying a sheave at each end is arranged in parallel with the carriage to also travel into the tube. The cable cooperating with the sheaves permit driving a relatively short fuel transfer carriage a large distance without manually installing sheaves or drive apparatus in the tunnel. 8 claims, 3 figures

  16. Electron transfer reactions

    CERN Document Server

    Cannon, R D

    2013-01-01

    Electron Transfer Reactions deals with the mechanisms of electron transfer reactions between metal ions in solution, as well as the electron exchange between atoms or molecules in either the gaseous or solid state. The book is divided into three parts. Part 1 covers the electron transfer between atoms and molecules in the gas state. Part 2 tackles the reaction paths of oxidation states and binuclear intermediates, as well as the mechanisms of electron transfer. Part 3 discusses the theories and models of the electron transfer process; theories and experiments involving bridged electron transfe

  17. Flat Files - JSNP | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available switchLanguage; BLAST Search Image Search Home About Archive Update History Data ... Data file File name: jsnp_flat_files File URL: ftp://ftp.biosciencedbc.jp/archiv...his Database Database Description Download License Update History of This Database Site Policy | Contact Us Flat Files - JSNP | LSDB Archive ...

  18. 10 CFR 110.89 - Filing and service.

    Science.gov (United States)

    2010-01-01

    ...: Rulemakings and Adjudications Staff or via the E-Filing system, following the procedure set forth in 10 CFR 2.302. Filing by mail is complete upon deposit in the mail. Filing via the E-Filing system is completed... residence with some occupant of suitable age and discretion; (2) Following the requirements for E-Filing in...

  19. 49 CFR 1104.6 - Timely filing required.

    Science.gov (United States)

    2010-10-01

    ... offers next day delivery to Washington, DC. If the e-filing option is chosen (for those pleadings and documents that are appropriate for e-filing, as determined by reference to the information on the Board's Web site), then the e-filed pleading or document is timely filed if the e-filing process is completed...

  20. 12 CFR 908.25 - Filing of papers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Filing of papers. 908.25 Section 908.25 Banks... RULES OF PRACTICE AND PROCEDURE IN HEARINGS ON THE RECORD General Rules § 908.25 Filing of papers. (a) Filing. Any papers required to be filed shall be addressed to the presiding officer and filed with the...

  1. 47 CFR 61.14 - Method of filing publications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Method of filing publications. 61.14 Section 61...) TARIFFS Rules for Electronic Filing § 61.14 Method of filing publications. (a) Publications filed... date of a publication received by the Electronic Tariff Filing System will be determined by the date...

  2. 29 CFR 1981.103 - Filing of discrimination complaint.

    Science.gov (United States)

    2010-07-01

    ... constitute the violations. (c) Place of filing. The complaint should be filed with the OSHA Area Director... or she has been discriminated against by an employer in violation of the Act may file, or have filed..., but may be filed with any OSHA officer or employee. Addresses and telephone numbers for these...

  3. 77 FR 28592 - Combined Notice of Filings #1

    Science.gov (United States)

    2012-05-15

    ...: Middletown MBR Application to be effective 5/8/2012. Filed Date: 5/7/12. Accession Number: 20120507-5128..., LLC. Description: Southern Energy Initial MBR Filing to be effective 5/ 7/2012. Filed Date: 5/8/12... Company submits tariff filing per 35.37: MBR Triennial Filing--1st Rev MBR to be effective 9/30/2010...

  4. 77 FR 66458 - Combined Notice of Filings #1

    Science.gov (United States)

    2012-11-05

    ... Service Company of Colorado. Description: 2012--10--26 PSCo MBR Filing to be effective 12/26/ 2012. Filed...--SPS MBR Filing to be effective 12/26/2012. Filed Date: 10/26/12. Accession Number: 20121026-5123...: Revised Application for MBR Authorization to be effective 10/16/2012. Filed Date: 10/25/12. Accession...

  5. 75 FR 66075 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-10-27

    ....12: Baseline MBR Concurrence to be effective 10/8/2010. Filed Date: 10/19/2010. Accession Number... Company submits tariff filing per 35.12: Baseline MBR Concurrence to be effective 10/8/2010. Filed Date... Power Company submits tariff filing per 35.12: Baseline MBR Concurrence to be effective 10/8/2010. Filed...

  6. Transfer function combinations

    KAUST Repository

    Zhou, Liang; Schott, Mathias; Hansen, Charles

    2012-01-01

    Direct volume rendering has been an active area of research for over two decades. Transfer function design remains a difficult task since current methods, such as traditional 1D and 2D transfer functions, are not always effective for all data sets. Various 1D or 2D transfer function spaces have been proposed to improve classification exploiting different aspects, such as using the gradient magnitude for boundary location and statistical, occlusion, or size metrics. In this paper, we present a novel transfer function method which can provide more specificity for data classification by combining different transfer function spaces. In this work, a 2D transfer function can be combined with 1D transfer functions which improve the classification. Specifically, we use the traditional 2D scalar/gradient magnitude, 2D statistical, and 2D occlusion spectrum transfer functions and combine these with occlusion and/or size-based transfer functions to provide better specificity. We demonstrate the usefulness of the new method by comparing to the following previous techniques: 2D gradient magnitude, 2D occlusion spectrum, 2D statistical transfer functions and 2D size based transfer functions. © 2012 Elsevier Ltd.

  7. Heat transfer enhancement

    International Nuclear Information System (INIS)

    Hasatani, Masanobu; Itaya, Yoshinori

    1985-01-01

    In order to develop energy-saving techniques and new energy techniques, and also most advanced techniques by making industrial equipment with high performance, heat transfer performance frequently becomes an important problem. In addition, the improvement of conventional heat transfer techniques and the device of new heat transfer techniques are often required. It is most proper that chemical engineers engage in the research and development for enhancing heat transfer. The research and development for enhancing heat transfer are important to heighten heat exchange efficiency or to cool equipment for preventing overheat in high temperature heat transfer system. In this paper, the techniques of enhancing radiative heat transfer and the improvement of radiative heat transfer characteristics are reported. Radiative heat transfer is proportional to fourth power of absolute temperature, and it does not require any heat transfer medium, but efficient heat-radiation converters are necessary. As the techniques of enhancing radiative heat transfer, the increase of emission and absorption areas, the installation of emissive structures and the improvement of radiative characteristics are discussed. (Kako, I.)

  8. Transfer function combinations

    KAUST Repository

    Zhou, Liang

    2012-10-01

    Direct volume rendering has been an active area of research for over two decades. Transfer function design remains a difficult task since current methods, such as traditional 1D and 2D transfer functions, are not always effective for all data sets. Various 1D or 2D transfer function spaces have been proposed to improve classification exploiting different aspects, such as using the gradient magnitude for boundary location and statistical, occlusion, or size metrics. In this paper, we present a novel transfer function method which can provide more specificity for data classification by combining different transfer function spaces. In this work, a 2D transfer function can be combined with 1D transfer functions which improve the classification. Specifically, we use the traditional 2D scalar/gradient magnitude, 2D statistical, and 2D occlusion spectrum transfer functions and combine these with occlusion and/or size-based transfer functions to provide better specificity. We demonstrate the usefulness of the new method by comparing to the following previous techniques: 2D gradient magnitude, 2D occlusion spectrum, 2D statistical transfer functions and 2D size based transfer functions. © 2012 Elsevier Ltd.

  9. Quantum control mechanism analysis through field based Hamiltonian encoding

    International Nuclear Information System (INIS)

    Mitra, Abhra; Rabitz, Herschel

    2006-01-01

    Optimal control of quantum dynamics in the laboratory is proving to be increasingly successful. The control fields can be complex, and the mechanisms by which they operate have often remained obscure. Hamiltonian encoding (HE) has been proposed as a method for understanding mechanisms in quantum dynamics. In this context mechanism is defined in terms of the dominant quantum pathways leading to the final state of the controlled system. HE operates by encoding a special modulation into the Hamiltonian and decoding its signature in the dynamics to determine the dominant pathway amplitudes. Earlier work encoded the modulation directly into the Hamiltonian operators. This present work introduces the alternative scheme of field based HE, where the modulation is encoded into the control field and not directly into the Hamiltonian operators. This distinct form of modulation yields a new perspective on mechanism and is computationally faster than the earlier approach. Field based encoding is also an important step towards a laboratory based algorithm for HE as it is the only form of encoding that may be experimentally executed. HE is also extended to cover systems with noise and uncertainty and finally, a hierarchical algorithm is introduced to reveal mechanism in a stepwise fashion of ever increasing detail as desired. This new hierarchical algorithm is an improvement over earlier approaches to HE where the entire mechanism was determined in one stroke. The improvement comes from the use of less complex modulation schemes, which leads to fewer evaluations of Schroedinger's equation. A number of simulations are presented on simple systems to illustrate the new field based encoding technique for mechanism assessment

  10. Dynamic Information Encoding With Dynamic Synapses in Neural Adaptation

    Science.gov (United States)

    Li, Luozheng; Mi, Yuanyuan; Zhang, Wenhao; Wang, Da-Hui; Wu, Si

    2018-01-01

    Adaptation refers to the general phenomenon that the neural system dynamically adjusts its response property according to the statistics of external inputs. In response to an invariant stimulation, neuronal firing rates first increase dramatically and then decrease gradually to a low level close to the background activity. This prompts a question: during the adaptation, how does the neural system encode the repeated stimulation with attenuated firing rates? It has been suggested that the neural system may employ a dynamical encoding strategy during the adaptation, the information of stimulus is mainly encoded by the strong independent spiking of neurons at the early stage of the adaptation; while the weak but synchronized activity of neurons encodes the stimulus information at the later stage of the adaptation. The previous study demonstrated that short-term facilitation (STF) of electrical synapses, which increases the synchronization between neurons, can provide a mechanism to realize dynamical encoding. In the present study, we further explore whether short-term plasticity (STP) of chemical synapses, an interaction form more common than electrical synapse in the cortex, can support dynamical encoding. We build a large-size network with chemical synapses between neurons. Notably, facilitation of chemical synapses only enhances pair-wise correlations between neurons mildly, but its effect on increasing synchronization of the network can be significant, and hence it can serve as a mechanism to convey the stimulus information. To read-out the stimulus information, we consider that a downstream neuron receives balanced excitatory and inhibitory inputs from the network, so that the downstream neuron only responds to synchronized firings of the network. Therefore, the response of the downstream neuron indicates the presence of the repeated stimulation. Overall, our study demonstrates that STP of chemical synapse can serve as a mechanism to realize dynamical neural

  11. Making benefit transfers work

    DEFF Research Database (Denmark)

    Bateman, I.J.; Brouwer, R.; Ferrini, S.

    We develop and test guidance principles for benefits transfers. These argue that when transferring across relatively similar sites, simple mean value transfers are to be preferred but that when sites are relatively dissimilar then value function transfers will yield lower errors. The paper also...... provides guidance on the appropriate specification of transferable value functions arguing that these should be developed from theoretical rather than ad-hoc statistical principles. These principles are tested via a common format valuation study of water quality improvements across five countries. Results...... support our various hypotheses providing a set of principles for future transfer studies. The application also considers new ways of incorporating distance decay, substitution and framing effects within transfers and presents a novel water quality ladder....

  12. Evaluated nuclear data file of Th-232

    International Nuclear Information System (INIS)

    Meadows, J.; Poenitz, W.; Smith, A.; Smith, D.; Whalen, J.; Howerton, R.

    1977-09-01

    An evaluated nuclear data file for thorium is described. The file extends over the energy range 0.049 (i.e., the inelastic-scattering threshold) to 20.0 MeV and is formulated within the framework of the ENDF system. The input data base, the evaluation procedures and judgments, and ancillary experiments carried out in conjunction with the evaluation are outlined. The file includes: neutron total cross sections, neutron scattering processes, neutron radiative capture cross sections, fission cross sections, (n;2n) and (n;3n) processes, fission properties (e.g., nu-bar and delayed neutron emission) and photon production processes. Regions of uncertainty are pointed out particularly where new measured results would be of value. The file is extended to thermal energies using previously reported resonance evaluations thereby providing a complete file for neutronic calculations. Integral data tests indicated that the file was suitable for neutronic calculations in the MeV range

  13. Flexibility and Performance of Parallel File Systems

    Science.gov (United States)

    Kotz, David; Nieuwejaar, Nils

    1996-01-01

    As we gain experience with parallel file systems, it becomes increasingly clear that a single solution does not suit all applications. For example, it appears to be impossible to find a single appropriate interface, caching policy, file structure, or disk-management strategy. Furthermore, the proliferation of file-system interfaces and abstractions make applications difficult to port. We propose that the traditional functionality of parallel file systems be separated into two components: a fixed core that is standard on all platforms, encapsulating only primitive abstractions and interfaces, and a set of high-level libraries to provide a variety of abstractions and application-programmer interfaces (API's). We present our current and next-generation file systems as examples of this structure. Their features, such as a three-dimensional file structure, strided read and write interfaces, and I/O-node programs, are specifically designed with the flexibility and performance necessary to support a wide range of applications.

  14. Storage of sparse files using parallel log-structured file system

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary; Torres, Aaron

    2017-11-07

    A sparse file is stored without holes by storing a data portion of the sparse file using a parallel log-structured file system; and generating an index entry for the data portion, the index entry comprising a logical offset, physical offset and length of the data portion. The holes can be restored to the sparse file upon a reading of the sparse file. The data portion can be stored at a logical end of the sparse file. Additional storage efficiency can optionally be achieved by (i) detecting a write pattern for a plurality of the data portions and generating a single patterned index entry for the plurality of the patterned data portions; and/or (ii) storing the patterned index entries for a plurality of the sparse files in a single directory, wherein each entry in the single directory comprises an identifier of a corresponding sparse file.

  15. File Type Identification of File Fragments using Longest Common Subsequence (LCS)

    Science.gov (United States)

    Rahmat, R. F.; Nicholas, F.; Purnamawati, S.; Sitompul, O. S.

    2017-01-01

    Computer forensic analyst is a person in charge of investigation and evidence tracking. In certain cases, the file needed to be presented as digital evidence was deleted. It is difficult to reconstruct the file, because it often lost its header and cannot be identified while being restored. Therefore, a method is required for identifying the file type of file fragments. In this research, we propose Longest Common Subsequences that consists of three steps, namely training, testing and validation, to identify the file type from file fragments. From all testing results we can conlude that our proposed method works well and achieves 92.91% of accuracy to identify the file type of file fragment for three data types.

  16. Scaling CMS data transfer system for LHC start-up

    International Nuclear Information System (INIS)

    Tuura, L; Bockelman, B; Bonacorsi, D; Egeland, R; Feichtinger, D; Metson, S; Rehn, J

    2008-01-01

    The CMS experiment will need to sustain uninterrupted high reliability, high throughput and very diverse data transfer activities as the LHC operations start. PhEDEx, the CMS data transfer system, will be responsible for the full range of the transfer needs of the experiment. Covering the entire spectrum is a demanding task: from the critical high-throughput transfers between CERN and the Tier-1 centres, to high-scale production transfers among the Tier-1 and Tier-2 centres, to managing the 24/7 transfers among all the 170 institutions in CMS and to providing straightforward access to handful of files to individual physicists. In order to produce the system with confirmed capability to meet the objectives, the PhEDEx data transfer system has undergone rigourous development and numerous demanding scale tests. We have sustained production transfers exceeding 1 PB/month for several months and have demonstrated core system capacity several orders of magnitude above expected LHC levels. We describe the level of scalability reached, and how we got there, with focus on the main insights into developing a robust, lock-free and scalable distributed database application, the validation stress test methods we have used, and the development and testing tools we found practically useful

  17. 77 FR 68171 - Self-Regulatory Organizations; NASDAQ OMX BX, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2012-11-15

    ..., fingerprint card and a combined payment of fees to FINRA. Through the CRD system, FINRA maintains the... and U5. As such, the Exchange is adopting the identical fee for FINRA's review of a Form BD submitted..., the proposed initial/transfer registration, disclosure filing, and fingerprint fees would become...

  18. Creating and Viewing HTML Files with Python

    Directory of Open Access Journals (Sweden)

    William J. Turkel

    2012-07-01

    Full Text Available This lesson uses Python to create and view an HTML file. If you write programs that output HTML, you can use any browser to look at your results. This is especially convenient if your program is automatically creating hyperlinks or graphic entities like charts and diagrams. Here you will learn how to create HTML files with Python scripts, and how to use Python to automatically open an HTML file in Firefox.

  19. Analyzing Android Browser Apps for file:// Vulnerabilities

    OpenAIRE

    Wu, Daoyuan; Chang, Rocky K. C.

    2014-01-01

    Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a browser app. In this paper, we identify four types of attacks in Android, collectively known as FileCross, that exploits the vulnerable file:// to obtain users' private files, such as cookies, bookmarks, and browsing histories. We design an automated s...

  20. Algorithms and file structures for computational geometry

    International Nuclear Information System (INIS)

    Hinrichs, K.; Nievergelt, J.

    1983-01-01

    Algorithms for solving geometric problems and file structures for storing large amounts of geometric data are of increasing importance in computer graphics and computer-aided design. As examples of recent progress in computational geometry, we explain plane-sweep algorithms, which solve various topological and geometric problems efficiently; and we present the grid file, an adaptable, symmetric multi-key file structure that provides efficient access to multi-dimensional data along any space dimension. (orig.)