WorldWideScience

Sample records for executive codes

  1. Dynamic Reverse Code Generation for Backward Execution

    DEFF Research Database (Denmark)

    Lee, Jooyong

    2007-01-01

    . In this paper, we present a method to generate reverse code, so that backtracking can be performed by executing reverse code. The novelty of our work is that we generate reverse code on-the-fly, while running a debugger, which makes it possible to apply the method even to debugging multi-threaded programs....

  2. Executable Code Recognition in Network Flows Using Instruction Transition Probabilities

    Science.gov (United States)

    Kim, Ikkyun; Kang, Koohong; Choi, Yangseo; Kim, Daewon; Oh, Jintae; Jang, Jongsoo; Han, Kijun

    The ability to recognize quickly inside network flows to be executable is prerequisite for malware detection. For this purpose, we introduce an instruction transition probability matrix (ITPX) which is comprised of the IA-32 instruction sets and reveals the characteristics of executable code's instruction transition patterns. And then, we propose a simple algorithm to detect executable code inside network flows using a reference ITPX which is learned from the known Windows Portable Executable files. We have tested the algorithm with more than thousands of executable and non-executable codes. The results show that it is very promising enough to use in real world.

  3. Code of conduct for non-executive directors and supervisors

    NARCIS (Netherlands)

    Lückerath – Rovers, M.; Bos, de A.

    2011-01-01

    After the corporate scandals at the beginning of the new millennium, corporate governance codes were drafted and implemented in national laws and regulations. Unfortunately, due to an ongoing supply of new financial scandals and societal deceptions, our society increasingly distrusts executive

  4. Provenance metadata gathering and cataloguing of EFIT++ code execution

    Energy Technology Data Exchange (ETDEWEB)

    Lupelli, I., E-mail: ivan.lupelli@ccfe.ac.uk [CCFE, Culham Science Centre, Abingdon, Oxon OX14 3DB (United Kingdom); Muir, D.G.; Appel, L.; Akers, R.; Carr, M. [CCFE, Culham Science Centre, Abingdon, Oxon OX14 3DB (United Kingdom); Abreu, P. [Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal)

    2015-10-15

    Highlights: • An approach for automatic gathering of provenance metadata has been presented. • A provenance metadata catalogue has been created. • The overhead in the code runtime is less than 10%. • The metadata/data size ratio is about ∼20%. • A visualization interface based on Gephi, has been presented. - Abstract: Journal publications, as the final product of research activity, are the result of an extensive complex modeling and data analysis effort. It is of paramount importance, therefore, to capture the origins and derivation of the published data in order to achieve high levels of scientific reproducibility, transparency, internal and external data reuse and dissemination. The consequence of the modern research paradigm is that high performance computing and data management systems, together with metadata cataloguing, have become crucial elements within the nuclear fusion scientific data lifecycle. This paper describes an approach to the task of automatically gathering and cataloguing provenance metadata, currently under development and testing at Culham Center for Fusion Energy. The approach is being applied to a machine-agnostic code that calculates the axisymmetric equilibrium force balance in tokamaks, EFIT++, as a proof of principle test. The proposed approach avoids any code instrumentation or modification. It is based on the observation and monitoring of input preparation, workflow and code execution, system calls, log file data collection and interaction with the version control system. Pre-processing, post-processing, and data export and storage are monitored during the code runtime. Input data signals are captured using a data distribution platform called IDAM. The final objective of the catalogue is to create a complete description of the modeling activity, including user comments, and the relationship between data output, the main experimental database and the execution environment. For an intershot or post-pulse analysis (∼1000

  5. The role of the PIRT process in identifying code improvements and executing code development

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, G.E. [Idaho National Engineering Lab., Idaho Falls, ID (United States); Boyack, B.E. [Los Alamos National Lab., NM (United States)

    1997-07-01

    In September 1988, the USNRC issued a revised ECCS rule for light water reactors that allows, as an option, the use of best estimate (BE) plus uncertainty methods in safety analysis. The key feature of this licensing option relates to quantification of the uncertainty in the determination that an NPP has a {open_quotes}low{close_quotes} probability of violating the safety criteria specified in 10 CFR 50. To support the 1988 licensing revision, the USNRC and its contractors developed the CSAU evaluation methodology to demonstrate the feasibility of the BE plus uncertainty approach. The PIRT process, Step 3 in the CSAU methodology, was originally formulated to support the BE plus uncertainty licensing option as executed in the CSAU approach to safety analysis. Subsequent work has shown the PIRT process to be a much more powerful tool than conceived in its original form. Through further development and application, the PIRT process has shown itself to be a robust means to establish safety analysis computer code phenomenological requirements in their order of importance to such analyses. Used early in research directed toward these objectives, PIRT results also provide the technical basis and cost effective organization for new experimental programs needed to improve the safety analysis codes for new applications. The primary purpose of this paper is to describe the generic PIRT process, including typical and common illustrations from prior applications. The secondary objective is to provide guidance to future applications of the process to help them focus, in a graded approach, on systems, components, processes and phenomena that have been common in several prior applications.

  6. [SUPPORT, CO-OPERATIVE EDUCATION PROGRAMMES, PRAGMATIC CODE OF ETHICS: A CLINICAL APPROACH OF EXECUTIVE TRAINING].

    Science.gov (United States)

    Cabaret, Véronique

    2016-01-01

    This article aims at introducing an educational sequence completed at l'Institut de Formation des Cadres de Santé (IFCS) at the CHRU in Lille in France, entitled "training project and educational project" present in the "training duties" module whose goal is to generate students'knowledge through co-operative education programmes. By creating this innovative sequence, the educational aim is to use the Institut ground as a ground of learning, associated with the various internship grounds, in order to get the most of co-operative education programmes. Besides, in a pragmatic code of ethics in training, the teaching staff draw their inspiration from a clinical approach of executive training: they regard students as true protagonists in a co-operative plan created for them, wishing to design it with them using their words. Thus, students are brought to criticize the IFCS educational project and debate it with the trainers who have built it. Each partner tries to understand the Other, being aware of their being different. By contributing every year to rewriting the educational project which directly concerns them, students build their professional positions as health executives. They play an active role in co-operative education programmes just like IFCS outside partners.

  7. 76 FR 66235 - Bar Code Technologies for Drugs and Biological Products; Retrospective Review Under Executive...

    Science.gov (United States)

    2011-10-26

    ... technology as an alternative to the linear bar code further reduce medication errors in hospitals and health...? 7. For hospitals and other health-care facilities that have adopted bar code technologies using... problems have you experienced with the technology? 8. For hospitals and other health-care facilities that...

  8. mGrid: a load-balanced distributed computing environment for the remote execution of the user-defined Matlab code.

    Science.gov (United States)

    Karpievitch, Yuliya V; Almeida, Jonas S

    2006-03-15

    Matlab, a powerful and productive language that allows for rapid prototyping, modeling and simulation, is widely used in computational biology. Modeling and simulation of large biological systems often require more computational resources then are available on a single computer. Existing distributed computing environments like the Distributed Computing Toolbox, MatlabMPI, Matlab*G and others allow for the remote (and possibly parallel) execution of Matlab commands with varying support for features like an easy-to-use application programming interface, load-balanced utilization of resources, extensibility over the wide area network, and minimal system administration skill requirements. However, all of these environments require some level of access to participating machines to manually distribute the user-defined libraries that the remote call may invoke. mGrid augments the usual process distribution seen in other similar distributed systems by adding facilities for user code distribution. mGrid's client-side interface is an easy-to-use native Matlab toolbox that transparently executes user-defined code on remote machines (i.e. the user is unaware that the code is executing somewhere else). Run-time variables are automatically packed and distributed with the user-defined code and automated load-balancing of remote resources enables smooth concurrent execution. mGrid is an open source environment. Apart from the programming language itself, all other components are also open source, freely available tools: light-weight PHP scripts and the Apache web server. Transparent, load-balanced distribution of user-defined Matlab toolboxes and rapid prototyping of many simple parallel applications can now be done with a single easy-to-use Matlab command. Because mGrid utilizes only Matlab, light-weight PHP scripts and the Apache web server, installation and configuration are very simple. Moreover, the web-based infrastructure of mGrid allows for it to be easily extensible over

  9. mGrid: A load-balanced distributed computing environment for the remote execution of the user-defined Matlab code

    Directory of Open Access Journals (Sweden)

    Almeida Jonas S

    2006-03-01

    Full Text Available Abstract Background Matlab, a powerful and productive language that allows for rapid prototyping, modeling and simulation, is widely used in computational biology. Modeling and simulation of large biological systems often require more computational resources then are available on a single computer. Existing distributed computing environments like the Distributed Computing Toolbox, MatlabMPI, Matlab*G and others allow for the remote (and possibly parallel execution of Matlab commands with varying support for features like an easy-to-use application programming interface, load-balanced utilization of resources, extensibility over the wide area network, and minimal system administration skill requirements. However, all of these environments require some level of access to participating machines to manually distribute the user-defined libraries that the remote call may invoke. Results mGrid augments the usual process distribution seen in other similar distributed systems by adding facilities for user code distribution. mGrid's client-side interface is an easy-to-use native Matlab toolbox that transparently executes user-defined code on remote machines (i.e. the user is unaware that the code is executing somewhere else. Run-time variables are automatically packed and distributed with the user-defined code and automated load-balancing of remote resources enables smooth concurrent execution. mGrid is an open source environment. Apart from the programming language itself, all other components are also open source, freely available tools: light-weight PHP scripts and the Apache web server. Conclusion Transparent, load-balanced distribution of user-defined Matlab toolboxes and rapid prototyping of many simple parallel applications can now be done with a single easy-to-use Matlab command. Because mGrid utilizes only Matlab, light-weight PHP scripts and the Apache web server, installation and configuration are very simple. Moreover, the web

  10. Executing Liveness

    DEFF Research Database (Denmark)

    Soon, Winnie

    2018-01-01

    -actions this thesis examines the complexity of our current computational environment as evident in the increasing use of data queries, the instantaneous transmission of data streams and the seamless running of automated agents. By drawing together the methods of reflexive practice, close reading, iterative trials...... implications of the reading, writing, running and execution of code, which I refer to as ‘reflexive coding practice.’ This methodology provides an applied approach to computational processes, invisible architectures and a means to reflect on cultural issues through experimentation and practice. A materialist...... scales. The analysis and discussion contributes to a widening of critical attention to software (art) studies primarily in terms of its distinct focus on the live dimension of code. Furthermore, it expands the debate in media and performance studies, providing technical description and analysis...

  11. Overview of Code Verification

    Science.gov (United States)

    1983-01-01

    The verified code for the SIFT Executive is not the code that executes on the SIFT system as delivered. The running versions of the SIFT Executive contain optimizations and special code relating to the messy interface to the hardware broadcast interface and to packing of data to conserve space in the store of the BDX930 processors. The running code was in fact developed prior to and without consideration of any mechanical verification. This was regarded as necessary experimentation with the SIFT hardware and special purpose Pascal compiler. The Pascal code sections cover: the selection of a schedule from the global executive broadcast, scheduling, dispatching, three way voting, and error reporting actions of the SIFT Executive. Not included in these sections of Pascal code are: the global executive, five way voting, clock synchronization, interactive consistency, low level broadcasting, and program loading, initialization, and schedule construction.

  12. Symbolic Execution Over Native x86

    Science.gov (United States)

    2012-06-01

    approach for our symbolic execution is just-in-time execution, where there is no apriori knowledge of the program before execution, and calculations are...program would execute on a system. The omniscient view requires apriori knowledge which, in most cases for a given framework, are derived from a...execution engine does not have apriori knowledge of the binary code under test other than what it knows from loading the program into memory. From here

  13. Self-assembled software and method of overriding software execution

    Science.gov (United States)

    Bouchard, Ann M.; Osbourn, Gordon C.

    2013-01-08

    A computer-implemented software self-assembled system and method for providing an external override and monitoring capability to dynamically self-assembling software containing machines that self-assemble execution sequences and data structures. The method provides an external override machine that can be introduced into a system of self-assembling machines while the machines are executing such that the functionality of the executing software can be changed or paused without stopping the code execution and modifying the existing code. Additionally, a monitoring machine can be introduced without stopping code execution that can monitor specified code execution functions by designated machines and communicate the status to an output device.

  14. An Approach to Detect Malicious Behaviors by Evading Stalling Code

    OpenAIRE

    Chao Dai; Xiaonan Liu; Chao You; Yichi Zhang; Jianmin Pang

    2012-01-01

    Since malwares contain stalling codes, malicious behaviors can’t be detected in emulated analysis environment. This paper proposes an approach to detect malicious behaviors by evade stalling codes. First, we executed a malware in the emulated analysis environment, and saved every executed instruction in a trace file; Second, we began to detect stalling codes with the trace file, and constructed stalling code evasive points; At last, we executed the malware again and evade stalling codes with ...

  15. Briefing Executives

    Science.gov (United States)

    2015-09-01

    in order to move forward. You have to report some bad news. Or maybe it is just an information brief to someone with a reputation for asking hard...face value . He or she will undoubtedly have many questions for you to answer and clarify, and, in the end, the executive may decide on a different...misunderstanding, and we were able to move on. Getting up the nerve to push back wasn’t easy—Meyer had a reputation for gruffness and great technical

  16. Electronic Code of Federal Regulations

    Data.gov (United States)

    National Archives and Records Administration — The Electronic Code of Federal Regulations (e-CFR) is the codification of the general and permanent rules published in the Federal Register by the executive...

  17. Mal-Xtract: Hidden Code Extraction using Memory Analysis

    Science.gov (United States)

    Lim, Charles; Syailendra Kotualubun, Yohanes; Suryadi; Ramli, Kalamullah

    2017-01-01

    Software packer has been used effectively to hide the original code inside a binary executable, making it more difficult for existing signature based anti malware software to detect malicious code inside the executable. A new method of written and rewritten memory section is introduced to to detect the exact end time of unpacking routine and extract original code from packed binary executable using Memory Analysis running in an software emulated environment. Our experiment results show that at least 97% of the original code from the various binary executable packed with different software packers could be extracted. The proposed method has also been successfully extracted hidden code from recent malware family samples.

  18. Build and Execute Environment

    Energy Technology Data Exchange (ETDEWEB)

    2017-04-21

    workflows for repeatable and partial re-execution. We will coordinate the physical snapshots of virtual machines with parallel programming constructs, such as barriers, to automate checkpoint and restart. We will also integrate with HPC-specific container runtimes to gain access to accelerators and other specialized hardware to preserve native performance. Containers will link development to continuous integration. When application developers check code in, it will automatically be tested on a suite of different software and hardware architectures.

  19. CSP for Executable Scientific Workflows

    DEFF Research Database (Denmark)

    Friborg, Rune Møllegaard

    This thesis presents CSP as a means of orchestrating the execution of tasks in a scientific workflow. Scientific workflow systems are popular in a wide range of scientific areas, where tasks are organised in directed graphs. Execution of such graphs is handled by the scientific workflow systems...... and the readability of Python source code. Python is a popular programming language in the scientific community, with many scientific libraries (modules) and simple integration to external languages. This thesis presents a PyCSP extended with many new features and a more robust implementation to allow scientific...... applications to run on heterogenous hardware, combining multiple hardware architectures. This is especially important in scientific computing as the performance of computational tasks may be orders of magnitude faster depending on the hardware architecture used. To ensure the robustness of the PyCSP library...

  20. Architectures for Secure Portable Executable Content.

    Science.gov (United States)

    Gritzalis, Stefanos; Aggelis, George; Spinellis, Diomidis

    1999-01-01

    Discusses downloadable executable content, or mobile code, on the World Wide Web; evaluates the security features offered by the Java and Safe-Tcl programming languages; and describes the basic mechanisms of each of the proposed security models. Presents current implementations, as well as upcoming extensions, and evaluates their efficiency and…

  1. Localizing Bugs in Program Executions with Graphical Models

    OpenAIRE

    Dietz, Laura; Dallmeier, Valentin; Zeller, Andreas; Scheffer, Tobias

    2009-01-01

    We devise a graphical model that supports the process of debugging software by guiding developers to code that is likely to contain defects. The model is trained using execution traces of passing test runs; it reflects the distribution over transitional patterns of code positions. Given a failing test case, the model determines the least likely transitional pattern in the execution trace. The model is designed such that Bayesian inference has a closed-form solution. We...

  2. Cyclone Codes

    OpenAIRE

    Schindelhauer, Christian; Jakoby, Andreas; Köhler, Sven

    2016-01-01

    We introduce Cyclone codes which are rateless erasure resilient codes. They combine Pair codes with Luby Transform (LT) codes by computing a code symbol from a random set of data symbols using bitwise XOR and cyclic shift operations. The number of data symbols is chosen according to the Robust Soliton distribution. XOR and cyclic shift operations establish a unitary commutative ring if data symbols have a length of $p-1$ bits, for some prime number $p$. We consider the graph given by code sym...

  3. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  4. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  5. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Sammenfatning af de mest væsentlige pointer fra hovedrapporten: Dokumentation og evaluering af Coding Class......Sammenfatning af de mest væsentlige pointer fra hovedrapporten: Dokumentation og evaluering af Coding Class...

  6. Tandem Mirror Reactor Systems Code (Version I)

    Energy Technology Data Exchange (ETDEWEB)

    Reid, R.L.; Finn, P.A.; Gohar, M.Y.; Barrett, R.J.; Gorker, G.E.; Spampinaton, P.T.; Bulmer, R.H.; Dorn, D.W.; Perkins, L.J.; Ghose, S.

    1985-09-01

    A computer code was developed to model a Tandem Mirror Reactor. Ths is the first Tandem Mirror Reactor model to couple, in detail, the highly linked physics, magnetics, and neutronic analysis into a single code. This report describes the code architecture, provides a summary description of the modules comprising the code, and includes an example execution of the Tandem Mirror Reactor Systems Code. Results from this code for two sensitivity studies are also included. These studies are: (1) to determine the impact of center cell plasma radius, length, and ion temperature on reactor cost and performance at constant fusion power; and (2) to determine the impact of reactor power level on cost.

  7. code {poems}

    Directory of Open Access Journals (Sweden)

    Ishac Bertran

    2012-08-01

    Full Text Available "Exploring the potential of code to communicate at the level of poetry," the code­ {poems} project solicited submissions from code­writers in response to the notion of a poem, written in a software language which is semantically valid. These selections reveal the inner workings, constitutive elements, and styles of both a particular software and its authors.

  8. Tutoring Executives Online

    DEFF Research Database (Denmark)

    Bignoux, Stephane; Sund, Kristian J.

    2016-01-01

    Studies of learning and student satisfaction in the context of online university programs have largely neglected programs catering specifically to business executives. Such executives have typically been away from higher education for a number of years, and have collected substantial practical...... experience in the subject matters they are taught. Their expectations in terms of both content and delivery may therefore be different from non-executive students. We explore perceptions of the quality of tutoring in the context of an online executive MBA program through participant interviews. We find...... that in addition to some of the tutor behaviors already discussed in the literature, executive students look specifically for practical industry knowledge and experience in tutors, when judging how effective a tutor is. This has implications for both the recruitment and training of online executive MBA tutors....

  9. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  10. Detecting Malicious Code by Binary File Checking

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2014-01-01

    Full Text Available The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects. A direct content change is possible when the intruder knows the structural information of the binary file. The paper describes the structural properties of the binary object files, how the content can be controlled by a possible intruder and what the ways to identify malicious code in such kind of files. Because the object files are inputs in linking processes, early detection of the malicious content is crucial to avoid infection of the binary executable files.

  11. Sharing code.

    Science.gov (United States)

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  12. Analog Coding.

    Science.gov (United States)

    CODING, ANALOG SYSTEMS), INFORMATION THEORY, DATA TRANSMISSION SYSTEMS , TRANSMITTER RECEIVERS, WHITE NOISE, PROBABILITY, ERRORS, PROBABILITY DENSITY FUNCTIONS, DIFFERENTIAL EQUATIONS, SET THEORY, COMPUTER PROGRAMS

  13. Clean Code - Why you should care

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    - Martin Fowler Writing code is communication, not solely with the computer that executes it, but also with other developers and with oneself. A developer spends a lot of his working time reading and understanding code that was written by other developers or by himself in the past. The readability of the code plays an important factor for the time to find a bug or add new functionality, which in turn has a big impact on the productivity. Code that is difficult to undestand, hard to maintain and refactor, and offers many spots for bugs to hide is not considered to be "clean code". But what could considered as "clean code" and what are the advantages of a strict application of its guidelines? In this presentation we will take a look on some typical "code smells" and proposed guidelines to improve your coding skills to write cleaner code that is less bug prone and better to maintain.

  14. Divergence coding for convolutional codes

    Directory of Open Access Journals (Sweden)

    Valery Zolotarev

    2017-01-01

    Full Text Available In the paper we propose a new coding/decoding on the divergence principle. A new divergent multithreshold decoder (MTD for convolutional self-orthogonal codes contains two threshold elements. The second threshold element decodes the code with the code distance one greater than for the first threshold element. Errorcorrecting possibility of the new MTD modification have been higher than traditional MTD. Simulation results show that the performance of the divergent schemes allow to approach area of its effective work to channel capacity approximately on 0,5 dB. Note that we include the enough effective Viterbi decoder instead of the first threshold element, the divergence principle can reach more. Index Terms — error-correcting coding, convolutional code, decoder, multithreshold decoder, Viterbi algorithm.

  15. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...... development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech......; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...

  16. A Semantics for Distributed Execution of Statemate

    DEFF Research Database (Denmark)

    Fränzle, Martin; Niehaus, Jürgen; Metzner, Alexander

    2003-01-01

    We present a semantics for the statechart variant implemented in the Statemate product of i-Logix. Our semantics enables distributed code generation for Statemate models in the context of rapid prototyping for embedded control applications. We argue that it seems impossible to efficiently generate...... distributed code using the original Statemate semantics. The new, distributed semantics has the advantages that, first, it enables the generation of efficient distributed code, second, it preserves many aspects of the original semantics for those parts of a model that are not distributed, and third......, the changes made regarding the interaction of distributed model parts are similar to the interaction between the model and its environment in the original semantics, thus giving designers a familiar execution model. The semantics has been implemented in Grace, a framework for rapid prototyping code generation...

  17. Executive functions in synesthesia.

    Science.gov (United States)

    Rouw, Romke; van Driel, Joram; Knip, Koen; Richard Ridderinkhof, K

    2013-03-01

    In grapheme-color synesthesia, a number or letter can evoke two different and possibly conflicting (real and synesthetic) color sensations at the same time. In this study, we investigate the relationship between synesthesia and executive control functions. First, no general skill differences were obtained between synesthetes and non-synesthetes in classic executive control paradigms. Furthermore, classic executive control effects did not interact with synesthetic behavioral effects. Third, we found support for our hypothesis that inhibition of a synesthetic color takes effort and time. Finally, individual differences analyses showed no relationship between the two skills; performance on a 'normal' Stroop task does not predict performance on a synesthetic Stroop task. Across four studies, the current results consistently show no clear relationship between executive control functions and synesthetic behavioral effects. This raises the question of which mechanisms are at play in synesthetic 'management' during the presence of two conflicting (real and synesthetic) sensations. Copyright © 2012 Elsevier Inc. All rights reserved.

  18. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  19. Coding labour

    National Research Council Canada - National Science Library

    McCosker, Anthony; Milne, Esther

    2014-01-01

    ... software. Code encompasses the laws that regulate human affairs and the operation of capital, behavioural mores and accepted ways of acting, but it also defines the building blocks of life as DNA...

  20. Non-executive directors.

    Science.gov (United States)

    2010-03-31

    A new professional networking site has been created for the NHS Alliance's non-executive director network (NEDNET). The website uses OnMedica's professional networking platform to provide a secure online environment in which NEDNET members can share information and best practice. The network aims to help non-executive directors find theirpeers, learn from each other and learn about the latest developments. The website can be found at www.medefero.com/nednet.

  1. 12 CFR 1710.14 - Code of conduct and ethics.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Code of conduct and ethics. 1710.14 Section... Code of conduct and ethics. (a) General. An Enterprise shall establish and administer a written code of conduct and ethics that is reasonably designed to assure the ability of board members, executive officers...

  2. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  3. Executions and scientific anatomy.

    Science.gov (United States)

    Dolezal, Antonín; Jelen, Karel; Stajnrtova, Olga

    2015-12-01

    The very word "anatomy" tells us about this branch's connection with dissection. Studies of anatomy have taken place for approximately 2.300 years already. Anatomy's birthplace lies in Greece and Egypt. Knowledge in this specific field of science was necessary during surgical procedures in ophthalmology and obstetrics. Embalming took place without public disapproval just like autopsies and manipulation with relics. Thus, anatomical dissection became part of later forensic sciences. Anatomical studies on humans themselves, which needed to be compared with the knowledge gained through studying procedures performed on animals, elicited public disapprobation and prohibition. When faced with a shortage of cadavers, anatomists resorted to obtaining bodies of the executed and suicide victims - since torture, public display of the mutilated body, (including anatomical autopsy), were perceived as an intensification of the death penalty. Decapitation and hanging were the main execution methods meted out for death sentences. Anatomists preferred intact bodies for dissection; hence, convicts could thus avoid torture. This paper lists examples of how this process was resolved. It concerns the manners of killing, vivisection on people in the antiquity and middle-ages, experiments before the execution and after, vivifying from seeming death, experiments with galvanizing electricity on fresh cadavers, evaluating of sensibility after guillotine execution, and making perfect anatomical preparations and publications during Nazism from fresh bodies of the executed.

  4. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  5. Network Coding

    Indian Academy of Sciences (India)

    Network coding is a technique to increase the amount of information °ow in a network by mak- ing the key observation that information °ow is fundamentally different from commodity °ow. Whereas, under traditional methods of opera- tion of data networks, intermediate nodes are restricted to simply forwarding their incoming.

  6. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening...... Coding Pirates2. Rapporten er forfattet af Docent i digitale læringsressourcer og forskningskoordinator for forsknings- og udviklingsmiljøet Digitalisering i Skolen (DiS), Mikala Hansbøl, fra Institut for Skole og Læring ved Professionshøjskolen Metropol; og Lektor i læringsteknologi, interaktionsdesign......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017...

  7. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621. Keywords.

  8. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  9. Operations Program Executive

    Science.gov (United States)

    Fague, M. A.

    1982-01-01

    Ground Resource Operations Program executive (GROPE) is control program for binding system of programs into single, easily operated entity. It relieves user from complexity arising from decomposition of large application into number of interacting program units. System simplifies job control, data management, and recordkeeping for interacting programs.

  10. Executions in The Bahamas

    Directory of Open Access Journals (Sweden)

    Lofquist, William Steele

    2010-01-01

    Full Text Available The stories of those who have been executed in the Bahamas are heretofore untold. In telling these stories and in linking them to the changing course of Bahamian history, the present research adds an important dimension to our understanding of Bahamian history and politics. The major theme of this effort is that the changing practice of the death penalty is much more than a consequence of changes in crime. The use of the death penalty parallels the changing interests of colonial rulers, the changing practice of slavery, and the changing role of the Bahamas in colonial and regional affairs. Four distinctive eras of death penalty practice can be identified: (1 the slave era, where executions and commutations were used liberally and with a clear racial patterning; (2 a long era of stable colonialism, a period of marginalization and few executions; (3 an era of unstable colonialism characterized by intensive and efficient use of the death penalty; and (4 the current independence era of high murder rates and equally high impediments to the use of executions.

  11. Healthcare. Executive Summary

    Science.gov (United States)

    Carnevale, Anthony P.; Smith, Nicole; Gulish, Artem; Beach, Bennett H.

    2012-01-01

    This executive summary highlights several findings about healthcare. These are: (1) Healthcare is 18 percent of the U.S. economy, twice as high as in other countries; (2) There are two labor markets in healthcare: high-skill, high-wage professional and technical jobs and low-skill, low-wage support jobs; (3) Demand for postsecondary education in…

  12. Indexing executive compensation contracts

    NARCIS (Netherlands)

    Dittmann, I.; Maug, E.; Spalt, O.G.

    2013-01-01

    We analyze the efficiency of indexing executive pay by calibrating the standard compensation model to a large sample of U.S. CEOs. The benefits from indexing the strike price of options are small, and fully indexing all options would increase compensation costs by 50% for most firms. Indexing has

  13. Leadership and Executive Development.

    Science.gov (United States)

    1997

    This document contains three papers from a symposium on leadership and executive development. "Leading and Managing in a Service Organization: An Examination of Line vs. Staff Effectiveness" (Allan H. Church, Janine Waclawski) presents an analysis of differences in managerial strengths and weaknesses between 45 line managers and 52 human resources…

  14. Editor, Executive and Entrepreneur

    DEFF Research Database (Denmark)

    Bøe-Lillegraven, Tor; Wilberg, Erik

    2016-01-01

    . In this article, we develop and empirically test a set of hypotheses related to ambidexterity, a key example of a paradoxical strategy. Through our analysis of data from a survey of executive leaders, we find a link between organizational ambidexterity and strategic planning, suggesting that the complexities...

  15. China's SOE Executives

    DEFF Research Database (Denmark)

    Brødsgaard, Kjeld Erik; Hubbard, Paul; Cai, Guilong

    2017-01-01

    Drawing on a database tracking the career of 1,250 top Chinese executives from 1,084 publicly-listed state-owned enterprises (SOEs), this article analyzes differences in career incentives for subsidiaries controlled by the central government compared to those controlled by local governments...

  16. Executive functions in synesthesia

    NARCIS (Netherlands)

    Rouw, R.; van Driel, J.; Knip, K.; Ridderinkhof, K.R.

    2013-01-01

    In grapheme-color synesthesia, a number or letter can evoke two different and possibly conflicting (real and synesthetic) color sensations at the same time. In this study, we investigate the relationship between synesthesia and executive control functions. First, no general skill differences were

  17. Writing executable assertions to test flight software

    Science.gov (United States)

    Mahmood, A.; Andrews, D. M.; Mccluskey, E. J.

    1984-01-01

    An executable assertion is a logical statement about the variables or a block of code. If there is no error during execution, the assertion statement results in a true value. Executable assertions can be used for dynamic testing of software. They can be employed for validation during the design phase, and exception and error detection during the operation phase. The present investigation is concerned with the problem of writing executable assertions, taking into account the use of assertions for testing flight software. They can be employed for validation during the design phase, and for exception handling and error detection during the operation phase The digital flight control system and the flight control software are discussed. The considered system provides autopilot and flight director modes of operation for automatic and manual control of the aircraft during all phases of flight. Attention is given to techniques for writing and using assertions to test flight software, an experimental setup to test flight software, and language features to support efficient use of assertions.

  18. Just-in-Time Compilation-Inspired Methodology for Parallelization of Compute Intensive Java Code

    OpenAIRE

    GHULAM MUSTAFA; WAQAR MAHMOOD; MUHAMMAD USMAN GHANI

    2017-01-01

    Compute intensive programs generally consume significant fraction of execution time in a small amount of repetitive code. Such repetitive code is commonly known as hotspot code. We observed that compute intensive hotspots often possess exploitable loop level parallelism. A JIT (Just-in-Time) compiler profiles a running program to identify its hotspots. Hotspots are then translated into native code, for efficient execution. Using similar approach, we propose a methodology to identify hotspots ...

  19. EXECUTIVE FUNCTIONING IN SCHIZOPHRENIA

    Directory of Open Access Journals (Sweden)

    Gricel eOrellana

    2013-06-01

    Full Text Available The executive function (EF is a set of abilities, which allows us to invoke voluntary control of our behavioral responses. These functions enable human beings to develop and carry out plans, make up analogies, obey social rules, solve problems, adapt to unexpected circumstances, do many tasks simultaneously and locate episodes in time and place. EF includes divided attention and sustained attention, working memory, set-shifting, flexibility, planning and the regulation of goal directed behavior and can be defined as a brain function underlying the human faculty to act or think not only in reaction to external events but also in relation with internal goals and states. EF is mostly associated with dorsolateral prefrontal cortex (PFC. Besides EF, PFC is involved in self-regulation of behavior, i.e. the ability to regulate behavior according to internal goals and constraints, particularly in less structured situations. Self-regulation of behavior is subtended by ventral medial /orbital PFC. Impairment of EF is one of the most commonly observed deficits in schizophrenia through the various disease stages. Impairment in tasks measuring conceptualization, planning, cognitive flexibility, verbal fluency, ability to solve complex problems and working memory occur in schizophrenia. Disorders detected by executive tests are consistent with evidence from functional neuroimaging, which have shown PFC dysfunction in patients while performing these kinds of tasks. Schizophrenics also exhibit deficit in odor identifying, decision-making and self-regulation of behavior suggesting dysfunction of the orbital PFC. However, impairment in executive tests is explained by dysfunction of prefronto-striato-thalamic, prefronto-parietal and prefronto-temporal neural networks mainly. Disorders in executive functions may be considered central facts with respect to schizophrenia and it has been suggested that negative symptoms may be explained by that executive dysfunction.

  20. Polar Codes

    Science.gov (United States)

    2014-12-01

    added by the decoder is K/ρ+Td. By the last assumption, Td and Te are both ≤ K/ρ, so the total latency added is between 2K/ρ and 4K /ρ. For example...better resolution near the decision point. Reference [12] showed that in decoding a (1024, 512) polar code, using 6-bit LLRs resulted in per- formance

  1. Providing Virtual Execution Environments: A Twofold Illustration

    CERN Document Server

    Grehant, Xavier

    2008-01-01

    Platform virtualization helps solving major grid computing challenges: share resource with flexible, user-controlled and custom execution environments and in the meanwhile, isolate failures and malicious code. Grid resource management tools will evolve to embrace support for virtual resource. We present two open source projects that transparently supply virtual execution environments. Tycoon has been developed at HP Labs to optimise resource usage in creating an economy where users bid to access virtual machines and compete for CPU cycles. SmartDomains provides a peer-to-peer layer that automates virtual machines deployment using a description language and deployment engine from HP Labs. These projects demonstrate both client-server and peer-to-peer approaches to virtual resource management. The first case makes extensive use of virtual machines features for dynamic resource allocation. The second translates virtual machines capabilities into a sophisticated language where resource management components can b...

  2. High-performing physician executives.

    Science.gov (United States)

    Brown, M; Larson, S R; McCool, B P

    1988-01-01

    Physician leadership extends beyond traditional clinical disciplines to hospital administration, group practice management, health policy making, management of managed care programs, and many business positions. What kind of person makes a good physician executive? What stands out as the most important motivations, attributes, and interests of high-performing physician executives? How does this compare with non-physician health care executives? Such questions have long been high on the agenda of executives in other industries. This article builds on existing formal assessments of leadership attributes of high-performing business, government, and educational executives and on closer examination of health care executives. Previous studies looked at the need for innovative, entrepreneurial, energetic, community-oriented leaders for positions throughout health care. Traits that distinguish excellence and leadership were described by Brown and McCool.* That study characterized successful leaders in terms of physical strengths (high energy, good health, and propensity for hard work), mental strengths (creativity, intuition, and innovation), and organizational strengths (mission orientation, vision, and entrepreneurial spirit). In this investigation, a subset of health care executives, including physician executives, was examined more closely. It was initially assumed that successful physician executives exhibit many of the same positive traits as do nonphysician executives. This assumption was tested with physician leaders in a range of administrative and managerial positions. We also set out to identify key differences between physician and nonphysician executives. Even with our limited exploration, it seems to us that physician executives probably do differ from nonphysician executives.

  3. Convolutional-Code-Specific CRC Code Design

    OpenAIRE

    Lou, Chung-Yu; Daneshrad, Babak; Wesel, Richard D.

    2015-01-01

    Cyclic redundancy check (CRC) codes check if a codeword is correctly received. This paper presents an algorithm to design CRC codes that are optimized for the code-specific error behavior of a specified feedforward convolutional code. The algorithm utilizes two distinct approaches to computing undetected error probability of a CRC code used with a specific convolutional code. The first approach enumerates the error patterns of the convolutional code and tests if each of them is detectable. Th...

  4. Code generation for large scale applications

    NARCIS (Netherlands)

    Mark, Paul Johannes van der

    2006-01-01

    Efficient execution of large-scale application codes is a primary requirement in many cases. High efficiency can only be achieved by utilizing architecture-independent efficient algorithms and exploiting specific architecture-dependent characteristics of a given computer architecture. However,

  5. What executives should remember.

    Science.gov (United States)

    Drucker, Peter F

    2006-02-01

    In more than 30 essays for Harvard Business Review, Peter Drucker (1909-2005) urged readers to take on the hard work of thinking--always combined, he insisted, with decisive action. He closely analyzed the phenomenon of knowledge work--the growing call for employees who use their minds rather than their hands--and explained how it challenged the conventional wisdom about the way organizations should be run. He was intrigued by employees who knew more about certain subjects than their bosses or colleagues but who still had to cooperate with others in a large organization. As the business world matured in the second half of the twentieth century, executives came to think that they knew how to run companies--and Drucker took it upon himself to poke holes in their assumptions, lest organizations become stale. But he did so sympathetically, operating from the premise that his readers were intelligent, hardworking people of goodwill. Well suited to HBR's format of practical, idea-based essays for executives, his clear-eyed, humanistic writing enriched the magazine time and again. This article is a compilation of the savviest management advice Drucker offered HBR readers over the years--in short, his greatest hits. It revisits the following insightful, influential contributions: "The Theory of the Business" (September-October 1994), "Managing for Business Effectiveness" (May-June 1963), "What Business Can Learn from Nonprofits" (July-August 1989), "The New Society of Organizations" (September-October 1992), "The Information Executives Truly Need" (January-February 1995), "Managing Oneself" (March-April 1999 republished January 2005), "They're Not Employees, They're People" (February 2002), "What Makes an Effective Executive" (June 2004).

  6. INTERNATIONALIZATION OF CHINESE EXECUTIVES

    OpenAIRE

    Lingfang Fayol-Song

    2012-01-01

    Over the last two decades, Chinese nationals have increasingly been employed by multinational companies (MNCs) operating in China taking positions previously occupied by foreign expatriates from investor countries. The development of local managers has therefore become crucial in the field of human resource management because the success of these companies depends greatly upon the ability and competence of their executive management class. The present paper addresses the issue of how to devel...

  7. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  8. Concatenated codes with convolutional inner codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Zyablov, Viktor

    1988-01-01

    The minimum distance of concatenated codes with Reed-Solomon outer codes and convolutional inner codes is studied. For suitable combinations of parameters the minimum distance can be lower-bounded by the product of the minimum distances of the inner and outer codes. For a randomized ensemble...... of concatenated codes a lower bound of the Gilbert-Varshamov type is proved...

  9. 78 FR 37847 - Senior Executive Service (SES) Performance Review Board; Members

    Science.gov (United States)

    2013-06-24

    ... (NARA) Performance Review Board (PRB). The members of the PRB are: Debra Steidel Wall, Deputy Archivist... executive performance. Dated: June 14, 2013. David S. Ferriero, Archivist of the United States. BILLING CODE...

  10. Investigating the effects various compilers have on the electromagnetic signature of a cryptographic executable

    CSIR Research Space (South Africa)

    Frieslaar, Ibraheem

    2017-09-01

    Full Text Available This research investigates changes in the electromagnetic (EM) signatures of a cryptographic binary executable based on compile-time parameters to the GNU and clang compilers. The source code is compiled and executed on the Raspberry Pi 2 which...

  11. Income, neural executive processes, and preschool children's executive control.

    Science.gov (United States)

    Ruberry, Erika J; Lengua, Liliana J; Crocker, Leanna Harris; Bruce, Jacqueline; Upshaw, Michaela B; Sommerville, Jessica A

    2017-02-01

    This study aimed to specify the neural mechanisms underlying the link between low household income and diminished executive control in the preschool period. Specifically, we examined whether individual differences in the neural processes associated with executive attention and inhibitory control accounted for income differences observed in performance on a neuropsychological battery of executive control tasks. The study utilized a sample of preschool-aged children (N = 118) whose families represented the full range of income, with 32% of families at/near poverty, 32% lower income, and 36% middle to upper income. Children completed a neuropsychological battery of executive control tasks and then completed two computerized executive control tasks while EEG data were collected. We predicted that differences in the event-related potential (ERP) correlates of executive attention and inhibitory control would account for income differences observed on the executive control battery. Income and ERP measures were related to performance on the executive control battery. However, income was unrelated to ERP measures. The findings suggest that income differences observed in executive control during the preschool period might relate to processes other than executive attention and inhibitory control.

  12. Executive information system

    Energy Technology Data Exchange (ETDEWEB)

    Vitullo, M.; Winter, C.; Johnson, D.R.

    1984-07-01

    The Executive Information System (EIS) is a computer-based information handling system. The system has been designed and implemented for Energy Conversion and Utilization Technologies to allow program managers easy access and tracking of certain types of reporting at various levels of management interaction, to simplify the handling of program-related data, and to streamline the preparation of reporting documents and responses to requests for information from the program. The EIS is especially useful in assisting DOE program managers in the routine dissemination of reports and information. The characteristics of each component of the EIS are discussed. A user's guide to the EIS is included in this report.

  13. Toward executable scientific publications

    NARCIS (Netherlands)

    Strijkers, R.J.; Cushing, R.; Vasyunin, D.; Laat, C. de; Belloum, A.S.Z.; Meijer, R.J.

    2011-01-01

    Reproducibility of experiments is considered as one of the main principles of the scientific method. Recent developments in data and computation intensive science, i.e. e-Science, and state of the art in Cloud computing provide the necessary components to preserve data sets and re-run code and

  14. The Cheerleaders' Mock Execution

    Science.gov (United States)

    Trujillo-Jenks, Laura

    2011-01-01

    The fervor of student speech is demonstrated through different mediums and venues in public schools. In this case, a new principal encounters the mores of a community that believes in free speech, specifically student free speech. When a pep rally becomes a venue for hate speech, terroristic threats, and profanity, the student code of conduct…

  15. Ensuring that User Defined Code does not See Uninitialized Fields

    DEFF Research Database (Denmark)

    Nielsen, Anders Bach

    2007-01-01

    Initialization of objects is commonly handled by user code, often in special routines known as constructors. This applies even in a virtual machine with multiple concurrent execution engines that all share the same heap. But for a language where run-time values play a role in the type system......, no user defined code can be allowed to use a field before it is initialized. This paper presents an approach which ensures that user code will not see uninitialized fields. It uses a dual-mode execution model to maintain a reasonable level of performance....

  16. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  17. Personality Differences and Executive Compensation

    OpenAIRE

    Robin L. Bartlett; James H. Grant; Timothy I. Miller

    1990-01-01

    When estimating executive compensation structures econometrically, it is incorrect to ignore an executive's personality type. The problem becomes one of identifying managers and leaders. This study asserts that the key to distinguishing these two types of executives is in their personality types as reflected in their willingness to belong to various kinds of clubs. The authors' findings give new life to the debate over the relative importance of profitability versus sales as determinants of e...

  18. Executive Orders-Barack Obama

    Data.gov (United States)

    National Archives and Records Administration — Executive orders are official documents, numbered consecutively, through which the President of the United States manages the operations of the Federal Government....

  19. Code Pulse: Software Assurance (SWA) Visual Analytics for Dynamic Analysis of Code

    Science.gov (United States)

    2014-09-01

    mark different execution sessions with recordings. For example, a “ startup ” recording could be created to mark the startup se- quence of the traced...testing processes. It is an OWASP project and has an active network of security professionals to lean on as it slowly cracks out of its R&D cocoon. Code

  20. Executable Use Cases

    DEFF Research Database (Denmark)

    Jørgensen, Jens Bæk; Bossen, Claus

    2004-01-01

    Many software experts argue that when we design a new system, we should create an explicit description of the environment in which the proposed system is to be used. The argument becomes crucial for pervasive computing, which aims to tightly integrate systems into their environments...... and into the work processes they're to support. However, prototypes typically provide an explicit representation only of the system itself. Executable use cases, on the other hand, can also describe the environment. EUCs are designed to: narrow the gap between informal ideas about requirements and the formalization...... modeling. This article describes a case study in which developers used EUCs to prototype an electronic patient record system for hospitals in Aarhus, Denmark....

  1. Analysis of MELCOR code structure

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dong Ha; Park, Sun Hee

    2000-04-01

    MELCOR executes in two parts. The first is a MELGEN program, in which most of the input is specified, processed, and checked. The second part of MELCOR is the MELCOR program itself, which advances the program through time based on the database generated by MELGEN and any additional MELCOR input. In particular, MELCOR execution involves two steps: (1) a setup mode in MEXSET, during which the database is read from the restart file and any additional input is processed, and (2) a run mode in MEXRUN, which advances the simulation through time, updating the time-dependent portion of the database each cycle. MELGEN and MELCOR share a structured and modular architecture that facilitates the incorporation of additional or altenative phenomenological modes. This structure consists of four primary levels: executive level, database manager routine level, package level, and utility level. MELCOR is composed of 24 different packages, each of which models a different portion of the accident phenomenology or program control. To identify the relation of the MELCOR subroutines with the packages, first two or three letters of the package's name are duplicated in the name of the subroutines. The same rule applies to the naming of the common block. Data flows and the specific subroutines in the MELGEN and MELCOR are analyzed by their functions according to the hierarchy of four levels for model improvement and replacement during the integral code development project.

  2. Execution time support for scientific programs on distributed memory machines

    Science.gov (United States)

    Berryman, Harry; Saltz, Joel; Scroggs, Jeffrey

    1990-01-01

    Optimizations are considered that are required for efficient execution of code segments that consists of loops over distributed data structures. The PARTI (Parallel Automated Runtime Toolkit at ICASE) execution time primitives are designed to carry out these optimizations and can be used to implement a wide range of scientific algorithms on distributed memory machines. These primitives allow the user to control array mappings in a way that gives an appearance of shared memory. Computations can be based on a global index set. Primitives are used to carry out gather and scatter operations on distributed arrays. Communications patterns are derived at runtime, and the appropriate send and receive messages are automatically generated.

  3. Selected Papers: Executive Development and the Federal Executive Institute.

    Science.gov (United States)

    Sherwood, Frank P.

    A collection of papers concerned with the Federal Government's efforts in the area of executive development are presented. The booklet is organized in three parts. The first three essays deal with problems, needs, and theories of executive manpower management. The problems of the Federal Government, as seen from an analysis of a small sample at…

  4. Executive Education: Predicting Student Success in Executive MBA Programs

    Science.gov (United States)

    Siegert, Kara O.

    2008-01-01

    Applicants to executive education programs have increased over recent years. Previous researchers had not thoroughly examined admission procedures related to the selection of applicants. In this study, the author examined common admission requirements that researchers and educators have used to predict success in 22 unique executive education…

  5. Reusable State Machine Code Generator

    Science.gov (United States)

    Hoffstadt, A. A.; Reyes, C.; Sommer, H.; Andolfato, L.

    2010-12-01

    The State Machine model is frequently used to represent the behaviour of a system, allowing one to express and execute this behaviour in a deterministic way. A graphical representation such as a UML State Chart diagram tames the complexity of the system, thus facilitating changes to the model and communication between developers and domain experts. We present a reusable state machine code generator, developed by the Universidad Técnica Federico Santa María and the European Southern Observatory. The generator itself is based on the open source project architecture, and uses UML State Chart models as input. This allows for a modular design and a clean separation between generator and generated code. The generated state machine code has well-defined interfaces that are independent of the implementation artefacts such as the middle-ware. This allows using the generator in the substantially different observatory software of the Atacama Large Millimeter Array and the ESO Very Large Telescope. A project-specific mapping layer for event and transition notification connects the state machine code to its environment, which can be the Common Software of these projects, or any other project. This approach even allows to automatically create tests for a generated state machine, using techniques from software testing, such as path-coverage.

  6. Development and Implementation of a Distributed-Object Job-Execution Environment

    Directory of Open Access Journals (Sweden)

    Rod Fatoohi

    2001-01-01

    Full Text Available This paper describes the development and implementation of a distributed job execution environment for highly iterative jobs. An iterative job is defined here as a binary code that is run multiple times with incremental changes in the input values for each run. An execution environment is a set of resources on a computing platform that can be made available to run the job and hold the output until it is collected. The goal is to design a complete, object-oriented execution system that runs a variety of jobs with minimal changes. Areas of code that are unique to a specific type of job are decoupled from the rest. The system allows for fine-grained job control, timely status notification and dynamic registration and deregistration of execution platforms depending on resources available. Several objected-oriented technologies are employed: Java, CORBA, UML, and software design patterns. The environment has been tested using a simulation code, INS2D.

  7. Executive Compensation: Six Questions That Need Answering

    OpenAIRE

    Abowd, John M.; Kaplan, David S.

    1999-01-01

    In this article, we focus on how recent research advances can be used to address the following six questions: (1) How much does executive compensation cost the firm? (2) How much is executive compensation worth to the recipient? (3) How well does executive compensation work? (4) What are the effects of executive compensation? (5) How much executive compensation is enough? (6) Could executive compensation be improved? We stress the formal link between executive pay and performance that is prov...

  8. Effects of acute laboratory stress on executive functions

    Directory of Open Access Journals (Sweden)

    Katrin eStarcke

    2016-03-01

    Full Text Available Recent research indicates that stress can affect executive functioning. However, previous results are mixed with respect to the direction and size of effects, especially when considering different subcomponents of executive functions. The current study systematically investigates the effects of stress on the five components of executive functions proposed by Smith and Jonides (1999: Attention and inhibition; task management; planning; monitoring; and coding. Healthy participants (N = 40 were either exposed to the computerized version of the Paced Auditory Serial Addition Test as a stressor (N = 20, or to a rest condition (N = 20. Stress reactions were assessed with heart rate and subjective measures. After the experimental manipulation, all participants performed tasks that measure the different executive functions. The manipulation check indicates that stress induction was successful (i.e., the stress group showed a higher heart rate and higher subjective responses than the control group. The main results demonstrate that stressed participants show a poorer performance compared with unstressed participants in all executive subcomponents, with the exception of monitoring. Effect sizes for the tasks that reveal differences between stressed and unstressed participants are high. We conclude that the laboratory stressor used here overall reduced executive functioning.

  9. A competence executive coaching model

    Directory of Open Access Journals (Sweden)

    Pieter Koortzen

    2010-03-01

    Full Text Available Orientation: Psychologists in industry are increasingly required to provide executive coaching services in their organisations or as part of their consulting services. An evaluation of coaching models as well as the development needs of individuals being trained as coaches, both locally and internationally, has led the authors to believe that there is a need for a competence executive coaching model.Research purpose: The purpose of this article is to address the training and development needs of these consulting psychologists by presenting a competence executive coaching model for the planning, implementation and evaluation of executive coaching interventions.Research design, approach and method: The study was conducted while one of the authors was involved in teaching doctoral students in consulting psychology and executive coaching, specifically in the USA. The approach involved a literature review of executive coaching models and a qualitative study using focus groups to develop and evaluate the competence executive coaching model.Main findings: The literature review provided scant evidence of competence executive coaching models and there seems to be a specific need for this in the training of coaches in South Africa. Hence the model that was developed is an attempt to provide trainers with a structured model for the training of coaches.Contribution/value-add: The uniqueness of this competence model is not only described in terms of the six distinct coaching intervention phases, but also the competencies required in each.

  10. Developmental Changes in Executive Functioning

    Science.gov (United States)

    Lee, Kerry; Bull, Rebecca; Ho, Ringo M. H.

    2013-01-01

    Although early studies of executive functioning in children supported Miyake et al.'s (2000) three-factor model, more recent findings supported a variety of undifferentiated or two-factor structures. Using a cohort-sequential design, this study examined whether there were age-related differences in the structure of executive functioning among…

  11. Executive control influences linguistic representations.

    Science.gov (United States)

    Lev-Ari, Shiri; Keysar, Boaz

    2014-02-01

    Although it is known that words acquire their meanings partly from the contexts in which they are used, we proposed that the way in which words are processed can also influence their representation. We further propose that individual differences in the way that words are processed can consequently lead to individual differences in the way that they are represented. Specifically, we showed that executive control influences linguistic representations by influencing the coactivation of competing and reinforcing terms. Consequently, people with poorer executive control perceive the meanings of homonymous terms as being more similar to one another, and those of polysemous terms as being less similar to one another, than do people with better executive control. We also showed that bilinguals with poorer executive control experience greater cross-linguistic interference than do bilinguals with better executive control. These results have implications for theories of linguistic representation and language organization.

  12. Improving performance of single-path code through a time-predictable memory hierarchy

    DEFF Research Database (Denmark)

    Cilku, Bekim; Puffitsch, Wolfgang; Prokesch, Daniel

    2017-01-01

    -predictable memory hierarchy with a prefetcher that exploits the predictability of execution traces in single-path code to speed up code execution. The new memory hierarchy reduces both the cache-miss penalty time and the cache-miss rate on the instruction cache. The benefit of the approach is demonstrated through......Deriving the Worst-Case Execution Time (WCET) of a task is a challenging process, especially for processor architectures that use caches, out-of-order pipelines, and speculative execution. Despite existing contributions to WCET analysis for these complex architectures, there are open problems...

  13. Affine Grassmann codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant

    2010-01-01

    We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes.We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show...

  14. Instituting code blue drills in the OR.

    Science.gov (United States)

    Lanfranchi, Joy A

    2013-04-01

    A code blue in the OR is a low-volume, high-risk event. To be effective during a code blue event, perioperative personnel must be able to properly execute a response plan and perform seldom-used skills and procedures. I developed and implemented a code blue drill educational experience for OR staff members that included a review of code blue policy, how to use a defibrillator, and simulated code blue scenarios. In addition, I worked with educational facilitators to provide an assessment of the personnel who performed the simulated code blue drills to identify key learning opportunities, such as gaps in communication, poor performance of cardiopulmonary resuscitation, ineffective delegation skills, and lack of assertiveness. One month after the educational experience, all team members passed an observed competency for responding to a code blue in a simulation laboratory. These results show the effectiveness of the educational experience as part of the code blue drills program in the hospital's main OR. Copyright © 2013 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  15. Trichomoniasis: evaluation to execution.

    Science.gov (United States)

    Harp, Djana F; Chowdhury, Indrajit

    2011-07-01

    Trichomoniasis is the most common sexually transmitted disease, caused by a motile flagellate non-invasive parasitic protozoan, Trichomonas vaginalis (T. vaginalis). More than 160 million people worldwide are annually infected by this protozoan. T. vaginalis occupies an extracellular niche in the complex human genito-urinary environment (vagina, cervix, penis, prostate gland, and urethra) to survive, multiply and evade host defenses. T. vaginalis (strain G3) has a ∼160 megabase genome with 60,000 genes, the largest number of genes ever identified in protozoans. The T. vaginalis genome is a highly conserved gene family that encodes a massive proteome with one of the largest coding (expressing ∼4000 genes) capacities in the trophozoite stage, and helps T. vaginalis to adapt and survive in diverse environment. Based on recent developments in the field, we review T. vaginalis structure, patho-mechanisms, parasitic virulence, and advances in diagnosis and therapeutics. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  16. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is propose...... including an outer BCH code correcting a few bit errors.......The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  17. Generation of Java code from Alvis model

    Science.gov (United States)

    Matyasik, Piotr; Szpyrka, Marcin; Wypych, Michał

    2015-12-01

    Alvis is a formal language that combines graphical modelling of interconnections between system entities (called agents) and a high level programming language to describe behaviour of any individual agent. An Alvis model can be verified formally with model checking techniques applied to the model LTS graph that represents the model state space. This paper presents transformation of an Alvis model into executable Java code. Thus, the approach provides a method of automatic generation of a Java application from formally verified Alvis model.

  18. Caltech campus executive LDRD.

    Energy Technology Data Exchange (ETDEWEB)

    Shepodd, Timothy J.; Knudsen, Tamara

    2013-01-01

    merely help execute the chosen action.

  19. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  20. Generalized concatenated quantum codes

    Science.gov (United States)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng, Bei

    2009-05-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  1. Executive Orders from 1994-2013

    Data.gov (United States)

    National Archives and Records Administration — The President of the United States manages the operations of the Executive branch of Government through Executive orders. After the President signs an Executive...

  2. Usefulness of Executive Development Programs to Corporate Executives

    OpenAIRE

    Raval, Vishvesh; Vyas, Khyati; Raval, Brahmaghosh

    2013-01-01

    India has been in centre stage of developing economies and commends high respect in knowledge based industries India has opened it economy to international competition and Indian products now compete with best products of the world. Indian promoters have realized that human resource is basic for future success. Dynamic managements have started training their executives to best practices with view to improve system efficiencies. Executive Development Programs are backbone of such training and...

  3. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  4. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  5. Television and children's executive function.

    Science.gov (United States)

    Lillard, Angeline S; Li, Hui; Boguszewski, Katie

    2015-01-01

    Children spend a lot of time watching television on its many platforms: directly, online, and via videos and DVDs. Many researchers are concerned that some types of television content appear to negatively influence children's executive function. Because (1) executive function predicts key developmental outcomes, (2) executive function appears to be influenced by some television content, and (3) American children watch large quantities of television (including the content of concern), the issues discussed here comprise a crucial public health issue. Further research is needed to reveal exactly what television content is implicated, what underlies television's effect on executive function, how long the effect lasts, and who is affected. © 2015 Elsevier Inc. All rights reserved.

  6. Executive Schedule C System (ESCS)

    Data.gov (United States)

    Office of Personnel Management — Used to store information on Federal employees in the Senior Executive Service (SES) and appointed employees in the Schedule C System. Every four years, just after...

  7. Retrenchment. How nurse executives cope.

    Science.gov (United States)

    Feldman, J; Daly-Gawenda, D

    1985-06-01

    Changing economic, technicologic, and political conditions have created the need for readjustments in the number of nursing personnel employed by hospitals. The authors examined how nurse executives conducted themselves and managed their personnel during layoffs.

  8. Discussion on LDPC Codes and Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  9. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  10. Algebraic geometric codes

    Science.gov (United States)

    Shahshahani, M.

    1991-01-01

    The performance characteristics are discussed of certain algebraic geometric codes. Algebraic geometric codes have good minimum distance properties. On many channels they outperform other comparable block codes; therefore, one would expect them eventually to replace some of the block codes used in communications systems. It is suggested that it is unlikely that they will become useful substitutes for the Reed-Solomon codes used by the Deep Space Network in the near future. However, they may be applicable to systems where the signal to noise ratio is sufficiently high so that block codes would be more suitable than convolutional or concatenated codes.

  11. The interactive roles of parenting, emotion regulation and executive functioning in moral reasoning during middle childhood.

    Science.gov (United States)

    Hinnant, J Benjamin; Nelson, Jackie A; O'Brien, Marion; Keane, Susan P; Calkins, Susan D

    2013-01-01

    We examined mother-child co-operative behaviour, children's emotion regulation and executive function, as well as combinations of these factors, as predictors of moral reasoning in 89 10-year-old children. Dyadic co-operation was coded from videotaped observations of laboratory puzzle and speech tasks. Emotion regulation was derived from maternal report, and executive functioning was assessed with the Tower of London task. Moral reasoning was coded during mother-child conversations about morally ambiguous, peer-conflict situations. Two significant interactions indicated that children from more co-operative dyads who also had higher executive function skills had higher moral reasoning scores than other children, and children lower in both emotion regulation and executive function had lower moral reasoning scores than other children. The results contribute to the literature on the multiple and interactive levels of influence on moral reasoning in childhood.

  12. Monomial-like codes

    CERN Document Server

    Martinez-Moro, Edgar; Ozbudak, Ferruh; Szabo, Steve

    2010-01-01

    As a generalization of cyclic codes of length p^s over F_{p^a}, we study n-dimensional cyclic codes of length p^{s_1} X ... X p^{s_n} over F_{p^a} generated by a single "monomial". Namely, we study multi-variable cyclic codes of the form in F_{p^a}[x_1...x_n] / . We call such codes monomial-like codes. We show that these codes arise from the product of certain single variable codes and we determine their minimum Hamming distance. We determine the dual of monomial-like codes yielding a parity check matrix. We also present an alternative way of constructing a parity check matrix using the Hasse derivative. We study the weight hierarchy of certain monomial like codes. We simplify an expression that gives us the weight hierarchy of these codes.

  13. Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations

    Science.gov (United States)

    Gschwind, Michael K

    2013-07-23

    Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.

  14. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  15. Towards provably correct code generation for a hard real-time programming language

    DEFF Research Database (Denmark)

    Fränzle, Martin; Müller-Olm, Markus

    1994-01-01

    This paper sketches a hard real-time programming language featuring operators for expressing timeliness requirements in an abstract, implementation-independent way and presents parts of the design and verification of a provably correct code generator for that language. The notion of implementatio...... correctness used as an implicit specification of the code generator pays attention to timeliness requirements. Hence, formal verification of the code generator design is a guarantee of meeting all deadlines when executing generated code....

  16. Automatic Code Generation for Instrument Flight Software

    Science.gov (United States)

    Wagstaff, Kiri L.; Benowitz, Edward; Byrne, D. J.; Peters, Ken; Watney, Garth

    2008-01-01

    Automatic code generation can be used to convert software state diagrams into executable code, enabling a model- based approach to software design and development. The primary benefits of this process are reduced development time and continuous consistency between the system design (statechart) and its implementation. We used model-based design and code generation to produce software for the Electra UHF radios that is functionally equivalent to software that will be used by the Mars Reconnaissance Orbiter (MRO) and the Mars Science Laboratory to communicate with each other. The resulting software passed all of the relevant MRO flight software tests, and the project provides a useful case study for future work in model-based software development for flight software systems.

  17. Binary CFG Rebuilt of Self-Modifying Codes

    Science.gov (United States)

    2016-10-03

    often observed in a heterogeneous system , e.g., Java web applications querying external SQL servers. In the symbolic execution, this observation enables...including 2 from Google). We are proposing the next NII Shonan meeting opportunity “ Binary code analysis and applications to computer security” on... binary CFG rebuilt, NII Shonan meeting No.65 “Low level code analysis and applications to computer security”, March 2-5 2015. e) Unpublished draft

  18. Supramodal Executive Control of Attention

    Directory of Open Access Journals (Sweden)

    ALFREDO eSPAGNA

    2015-02-01

    Full Text Available The human attentional system can be subdivided into three functional networks of alerting, orienting, and executive control. Although these networks have been extensively studied in the visuospatial modality, whether the same mechanisms are deployed across different sensory modalities remains unclear. In this study we used the attention network test for visuospatial modality, in addition to two auditory variants with spatial and frequency manipulations to examine cross-modal correlations between network functions. Results showed that among the visual and auditory tasks the effects of executive control, but not effects of alerting and orienting were significantly correlated. These findings suggest that while alerting and orienting functions rely more upon modality specific processes, the executive control of attention coordinates complex behavior via supramodal mechanisms.

  19. EFFECTIVE PROCEDURES FOR EXECUTIVE'S PREPARATION

    Directory of Open Access Journals (Sweden)

    Elisabet Martínez Mondéjar

    2014-05-01

    The aim of this article is to present methodological procedure that facilitates the executives  work with teachers that are preparing themselves to by promoting post from their  workplace from  a manual directed towards counseling executives  on how to develop the focalization, the selection and the evaluation and promotion of its teachers that are preparing themselves to by promoting post  from the work system itself  of the different levels of management from the University of Pedagogical Sciences " Felix Varela Morales " of Villa Clara.

  20. ADAMS executive and operating system

    Science.gov (United States)

    Pittman, W. D.

    1981-01-01

    The ADAMS Executive and Operating System, a multitasking environment under which a variety of data reduction, display and utility programs are executed, a system which provides a high level of isolation between programs allowing them to be developed and modified independently, is described. The Airborne Data Analysis/Monitor System (ADAMS) was developed to provide a real time data monitoring and analysis capability onboard Boeing commercial airplanes during flight testing. It inputs sensor data from an airplane performance data by applying transforms to the collected sensor data, and presents this data to test personnel via various display media. Current utilization and future development are addressed.

  1. A solution for automatic parallelization of sequential assembly code

    Directory of Open Access Journals (Sweden)

    Kovačević Đorđe

    2013-01-01

    Full Text Available Since modern multicore processors can execute existing sequential programs only on a single core, there is a strong need for automatic parallelization of program code. Relying on existing algorithms, this paper describes one new software solution tool for parallelization of sequential assembly code. The main goal of this paper is to develop the parallelizator which reads sequential assembler code and at the output provides parallelized code for MIPS processor with multiple cores. The idea is the following: the parser translates assembler input file to program objects suitable for further processing. After that the static single assignment is done. Based on the data flow graph, the parallelization algorithm separates instructions on different cores. Once sequential code is parallelized by the parallelization algorithm, registers are allocated with the algorithm for linear allocation, and the result at the end of the program is distributed assembler code on each of the cores. In the paper we evaluate the speedup of the matrix multiplication example, which was processed by the parallelizator of assembly code. The result is almost linear speedup of code execution, which increases with the number of cores. The speed up on the two cores is 1.99, while on 16 cores the speed up is 13.88.

  2. TIPONLINE Code Table

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Coded items are entered in the tiponline data entry program. The codes and their explanations are necessary in order to use the data

  3. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  4. Maybe it's not Python that sucks, maybe it's my code

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Did you know that in Python integers from -5 to 257 are preallocated? Reusing them 1000 times, instead of allocating memory for a bigger integer, saves a whopping 1 millisecond of code's execution time! Isn't that thrilling? Well, before you get that crazy, learn some basic performance tricks that you can start using today.

  5. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of ROC...

  6. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  7. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  8. Execution Plans for Cyber Foraging

    DEFF Research Database (Denmark)

    Kristensen, Mads Darø

    2008-01-01

    of remote execution. Working with large, atomic tasks has some limitations, e. g., with regards to mobility and efficient use of remote resources. In order to dynamically allocate available resources in a manner most suitable for a given job, a task can be broken down into sub-tasks and services...... description language and the associated scheduler....

  9. The Procions` code; Le code Procions

    Energy Technology Data Exchange (ETDEWEB)

    Deck, D.; Samba, G.

    1994-12-19

    This paper presents a new code to simulate plasmas generated by inertial confinement. This multi-kinds kinetic code is done with no angular approximation concerning ions and will work in plan and spherical geometry. First, the physical model is presented, using Fokker-Plank. Then, the numerical model is introduced in order to solve the Fokker-Plank operator under the Rosenbluth form. At the end, several numerical tests are proposed. (TEC). 17 refs., 27 figs.

  10. Executive and Language Control in the Multilingual Brain

    Directory of Open Access Journals (Sweden)

    Anthony Pak-Hin Kong

    2014-01-01

    Full Text Available Neuroimaging studies suggest that the neural network involved in language control may not be specific to bi-/multilingualism but is part of a domain-general executive control system. We report a trilingual case of a Cantonese (L1, English (L2, and Mandarin (L3 speaker, Dr. T, who sustained a brain injury at the age of 77 causing lesions in the left frontal lobe and in the left temporo-parietal areas resulting in fluent aphasia. Dr. T’s executive functions were impaired according to a modified version of the Stroop color-word test and the Wisconsin Card Sorting Test performance was characterized by frequent perseveration errors. Dr. T demonstrated pathological language switching and mixing across her three languages. Code switching in Cantonese was more prominent in discourse production than confrontation naming. Our case suggests that voluntary control of spoken word production in trilingual speakers shares neural substrata in the frontobasal ganglia system with domain-general executive control mechanisms. One prediction is that lesions to such a system would give rise to both pathological switching and impairments of executive functions in trilingual speakers.

  11. Mining dynamic noteworthy functions in software execution sequences.

    Science.gov (United States)

    Zhang, Bing; Huang, Guoyan; Wang, Yuqian; He, Haitao; Ren, Jiadong

    2017-01-01

    As the quality of crucial entities can directly affect that of software, their identification and protection become an important premise for effective software development, management, maintenance and testing, which thus contribute to improving the software quality and its attack-defending ability. Most analysis and evaluation on important entities like codes-based static structure analysis are on the destruction of the actual software running. In this paper, from the perspective of software execution process, we proposed an approach to mine dynamic noteworthy functions (DNFM)in software execution sequences. First, according to software decompiling and tracking stack changes, the execution traces composed of a series of function addresses were acquired. Then these traces were modeled as execution sequences and then simplified so as to get simplified sequences (SFS), followed by the extraction of patterns through pattern extraction (PE) algorithm from SFS. After that, evaluating indicators inner-importance and inter-importance were designed to measure the noteworthiness of functions in DNFM algorithm. Finally, these functions were sorted by their noteworthiness. Comparison and contrast were conducted on the experiment results from two traditional complex network-based node mining methods, namely PageRank and DegreeRank. The results show that the DNFM method can mine noteworthy functions in software effectively and precisely.

  12. Assessment of Recovery of Damages in the New Romanian Civil Code

    Directory of Open Access Journals (Sweden)

    Ion Țuțuianu

    2016-01-01

    Full Text Available AbstractThe subject’s approach is required also because, once adopted the New Civil Code, it acquired a new juridical frame, but also a new perspective. A common law creditor who does not obtain the direct execution  of his obligation is entitled to be compensated for the damage caused by the non-execution  with an amount of money which is equivalent to the benefit that the exact, total, and duly execution  of the obligation would have brought the creditor.Keywords:  interest, damages, civil code, juridical responsibility

  13. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  14. A Survey of New Trends in Symbolic Execution for Software Testing and Analysis

    Science.gov (United States)

    Pasareanu, Corina S.; Visser, Willem

    2009-01-01

    Symbolic execution is a well-known program analysis technique which represents values of program inputs with symbolic values instead of concrete (initialized) data and executes the program by manipulating program expressions involving the symbolic values. Symbolic execution has been proposed over three decades ago but recently it has found renewed interest in the research community, due in part to the progress in decision procedures, availability of powerful computers and new algorithmic developments. We provide a survey of some of the new research trends in symbolic execution, with particular emphasis on applications to test generation and program analysis. We first describe an approach that handles complex programming constructs such as input data structures, arrays, as well as multi-threading. We follow with a discussion of abstraction techniques that can be used to limit the (possibly infinite) number of symbolic configurations that need to be analyzed for the symbolic execution of looping programs. Furthermore, we describe recent hybrid techniques that combine concrete and symbolic execution to overcome some of the inherent limitations of symbolic execution, such as handling native code or availability of decision procedures for the application domain. Finally, we give a short survey of interesting new applications, such as predictive testing, invariant inference, program repair, analysis of parallel numerical programs and differential symbolic execution.

  15. GAMER: GPU-accelerated Adaptive MEsh Refinement code

    Science.gov (United States)

    Schive, Hsi-Yu; Tsai, Yu-Chih; Chiueh, Tzihong

    2016-12-01

    GAMER (GPU-accelerated Adaptive MEsh Refinement) serves as a general-purpose adaptive mesh refinement + GPU framework and solves hydrodynamics with self-gravity. The code supports adaptive mesh refinement (AMR), hydrodynamics with self-gravity, and a variety of GPU-accelerated hydrodynamic and Poisson solvers. It also supports hybrid OpenMP/MPI/GPU parallelization, concurrent CPU/GPU execution for performance optimization, and Hilbert space-filling curve for load balance. Although the code is designed for simulating galaxy formation, it can be easily modified to solve a variety of applications with different governing equations. All optimization strategies implemented in the code can be inherited straightforwardly.

  16. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  17. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  18. On the relationship between the execution, perception, and imagination of action.

    Science.gov (United States)

    Wong, Lokman; Manson, Gerome A; Tremblay, Luc; Welsh, Timothy N

    2013-11-15

    Humans can perform, perceive, and imagine voluntary movement. Numerous investigations of these abilities have employed variants of goal-directed aiming tasks because the Fitts's law equation reliably captures the mathematical relationship between movement time (MT) and accuracy requirements. The emergence of Fitts's speed-accuracy relationship during movement execution, perception, and imagination has led to the suggestion that these processes rely on common neural codes. This common coding account is based on the notion that the neural codes used to generate an action are tightly bound to the codes that represent the perceptual consequences of that action. It is suggested that during action imagination and perception the bound codes are activated offline through an action simulation. The present study provided a comprehensive testing of this common coding hypothesis by examining the characteristics of the Fitts relationship in movement execution, perception, and imagination within the same individuals. Participants were required to imagine and perceive reciprocal aiming movements with varying accuracy requirements before and after actually executing the movements. Consistent with the common coding account, the Fitts relationship was observed in all conditions. Critically, the slopes of the regression lines across tasks were not different suggesting that the core of the speed-accuracy trade-off was consistent across conditions. In addition, it was found that incidental limb position variability scaled to the amplitude of imagined movements. This motor overflow suggests motor system activation during action imagination. Overall, the results support the hypothesis that action execution, perception, and imagination rely on a common coding system. Copyright © 2013 Elsevier B.V. All rights reserved.

  19. 77 FR 39143 - Executive Branch Qualified Trusts

    Science.gov (United States)

    2012-07-02

    ... executive branch qualified trust, an entity must meet the strict requirements for independence set forth in... this subpart. A parent or guardian may execute the umbrella trust agreement on behalf of a required...

  20. Executive functioning in highly talented soccer players

    NARCIS (Netherlands)

    Verburgh, L.; Scherder, E.J.A.; van Lange, P.A.M.; Oosterlaan, J.

    2014-01-01

    Executive functions might be important for successful performance in sports, particularly in team sports requiring quick anticipation and adaptation to continuously changing situations in the field. The executive functions motor inhibition, attention and visuospatial working memory were examined in

  1. Litigation to execution in legal labour relationships. Study case

    Directory of Open Access Journals (Sweden)

    Dragos Lucian Radulescu

    2016-06-01

    Full Text Available Enforced execution is the legal way by which the Creditor under an enforceable order protects his rights by resorting to coercive force of the state. When the Debtor does not comply voluntarily, the Creditor may appeal to the Bailiff to commence the enforced execution in all manner prescribed by law. Of course, the start of compulsory execution is limited by the conditions of admissibility imperatively specified in the law, principally the condition to exist an enforceable order owned by the Creditor. Regarding the order to be enforced, it can be represented either by an enforceable or final judgement, with provisional enforcement or any other document that can be enforced. Procedurally, the provisions of Art.712 of the Civil Procedure Code allow the introduction by a Creditor who has a litigation to execution against the execution itself, against the Closures issued by the Bailiff, and against any other act of enforcement. Jurisdiction of the Court in this matter will be of the Executor Court or the Court in whose district the Debtor is situated, on the date of the appeal. The appeal of the Debtor questions the Parties not only over the acts of execution because the appeal is also allowed over the explanations relative to the meaning, scope or application of the enforceable order, but in the conditions limited by the legal nature of this order. Thus, according to the law when enforceable order is not issued by a Court or Arbitration may be invoked before an Executor Court including reasons of fact or law which could not be discussed during an earlier trial, in the first instance or in an appeal. Basically, if enforced execution is under an enforceable order that is not from a Court, these reasons can be invoked when there is no other processual mean for its abolition. There also can be submitted a complaint against the Closure by which was upheld the appeal for an enforced execution, and the act of execution concerning the division of the

  2. PREREM: an interactive data preprocessing code for INREM II. Part I: user's manual. Part II: code structure

    Energy Technology Data Exchange (ETDEWEB)

    Ryan, M.T.; Fields, D.E.

    1981-05-01

    PREREM is an interactive computer code developed as a data preprocessor for the INREM-II (Killough, Dunning, and Pleasant, 1978a) internal dose program. PREREM is intended to provide easy access to current and self-consistent nuclear decay and radionuclide-specific metabolic data sets. Provision is made for revision of metabolic data, and the code is intended for both production and research applications. Documentation for the code is in two parts. Part I is a user's manual which emphasizes interpretation of program prompts and choice of user input. Part II stresses internal structure and flow of program control and is intended to assist the researcher who wishes to revise or modify the code or add to its capabilities. PREREM is written for execution on a Digital Equipment Corporation PDP-10 System and much of the code will require revision before it can be run on other machines. The source program length is 950 lines (116 blocks) and computer core required for execution is 212 K bytes. The user must also have sufficient file space for metabolic and S-factor data sets. Further, 64 100 K byte blocks of computer storage space are required for the nuclear decay data file. Computer storage space must also be available for any output files produced during the PREREM execution. 9 refs., 8 tabs.

  3. Outplacement service for the nurse executive.

    Science.gov (United States)

    Kangery, R; Freund, C M

    1984-01-01

    Outplacement service (OPS) is a human resource service provided by organizations to terminated executives. In addition to assisting organizations with the mechanics of the termination process, OPS helps terminated executives cope with the trauma of job loss and find new employment. Given the frequent involvement of nurse executives in termination decisions and the risk of termination inherent in their own positions, nurse executives have a vested interest in OPS policies and programs.

  4. Executive Information Systems' Multidimensional Models

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available Executive Information Systems are design to improve the quality of strategic level of management in organization through a new type of technology and several techniques for extracting, transforming, processing, integrating and presenting data in such a way that the organizational knowledge filters can easily associate with this data and turn it into information for the organization. These technologies are known as Business Intelligence Tools. But in order to build analytic reports for Executive Information Systems (EIS in an organization we need to design a multidimensional model based on the business model from the organization. This paper presents some multidimensional models that can be used in EIS development and propose a new model that is suitable for strategic business requests.

  5. What makes an effective executive.

    Science.gov (United States)

    Drucker, Peter F

    2004-06-01

    An effective executive does not need to be a leader in the typical sense of the word. Peter Drucker, the author of more than two dozen HBR articles, says some of the best business and nonprofit CEOs he has worked with over his 65-year consulting career were not stereotypical leaders. They ranged from extroverted to nearly reclusive, from easygoing to controlling, from generous to parsimonious. What made them all effective is that they followed the same eight practices: They asked, "What needs to be done?" They also asked, "What is right for the enterprise?" They developed action plans. They took responsibility for decisions. They took responsibility for communicating. They were focused on opportunities rather than problems. They ran productive meetings. And they thought and said "we" rather than "I." The first two practices provided them with the knowledge they needed. The next four helped them convert this knowledge into effective action, for knowledge is useless to executives until it has been translated into deeds. The last two ensured that the whole organization felt responsible and accountable. Effective executives know that they have authority only because they have the trust of the organization. This means they must think of the needs and opportunities of the organization before they think of their own needs and opportunities. The author also suggests a ninth practice that's so important, he elevates it to the level of a rule: Listen first, speak last. The demand for effective executives is much too great to be satisfied by those few people who are simply born to lead. Effectiveness is a discipline. And, like every discipline, it can be learned and must be earned.

  6. Financial accounting for radiology executives.

    Science.gov (United States)

    Seidmann, Abraham; Mehta, Tushar

    2005-03-01

    The authors review the role of financial accounting information from the perspective of a radiology executive. They begin by introducing the role of pro forma statements. They discuss the fundamental concepts of accounting, including the matching principle and accrual accounting. The authors then explore the use of financial accounting information in making investment decisions in diagnostic medical imaging. The paper focuses on critically evaluating the benefits and limitations of financial accounting for decision making in a radiology practice.

  7. FORTRAN Automated Code Evaluation System (faces) system documentation, version 2, mod 0. [error detection codes/user manuals (computer programs)

    Science.gov (United States)

    1975-01-01

    A system is presented which processes FORTRAN based software systems to surface potential problems before they become execution malfunctions. The system complements the diagnostic capabilities of compilers, loaders, and execution monitors rather than duplicating these functions. Also, it emphasizes frequent sources of FORTRAN problems which require inordinate manual effort to identify. The principle value of the system is extracting small sections of unusual code from the bulk of normal sequences. Code structures likely to cause immediate or future problems are brought to the user's attention. These messages stimulate timely corrective action of solid errors and promote identification of 'tricky' code. Corrective action may require recoding or simply extending software documentation to explain the unusual technique.

  8. 45 CFR 1700.5 - Executive Director.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Executive Director. 1700.5 Section 1700.5 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL COMMISSION ON LIBRARIES AND INFORMATION SCIENCE ORGANIZATION AND FUNCTIONS § 1700.5 Executive Director. (a) The Executive Director serves...

  9. An Execution Algorithm for UML Activity Graphs

    NARCIS (Netherlands)

    Eshuis, H.; Wieringa, Roelf J.; Gogolla, Martin; Kobryn, Cris

    2001-01-01

    We present a real-time execution semantics for UML activity graphs that is intended for workflow modelling. The semantics is defined in terms of execution algorithms that define how components of a workflow system execute an activity graph. The semantics stays close to the semantics of UML state

  10. Assessing Executive Functioning: A Pragmatic Review

    Science.gov (United States)

    Hass, Michael R.; Patterson, Ashlea; Sukraw, Jocelyn; Sullivan, Brianna M.

    2014-01-01

    Despite the common usage of the term "executive functioning" in neuropsychology, several aspects of this concept remain unsettled. In this paper, we will address some of the issues surrounding the notion of executive functioning and how an understanding of executive functioning and its components might assist school-based practitioners…

  11. Executive Functions in Savant Artists with Autism

    Science.gov (United States)

    Crane, Laura; Pring, Linda; Ryder, Nicola; Hermelin, Beate

    2011-01-01

    Although executive functions have been widely studied in individuals with autism spectrum disorders (ASD), there have been no direct empirical studies of executive abilities in savants with ASD. This study assessed three facets of executive ability (fluency, perseveration and monitoring) in savant artists with ASD, compared to non-talented adults…

  12. Real-time executives for microprocessors

    NARCIS (Netherlands)

    Linden, F. van der; Wilson, I.

    1980-01-01

    Principles of real-time executives for microcomputer systems are discussed, together with some secondary functions. Salient features and limitations of three commercially available executives for 8080/5 and Z80 systems are described. An example is given illustrating the use of an executive in a

  13. Executable choreographies applied in OPERANDO

    Directory of Open Access Journals (Sweden)

    Sinica Alboaie

    2016-12-01

    Full Text Available The objective of this paper is to present the software architecture used for the OPERANDO privacy platform, funded by the European Union in a Horizon 2020 project. For integration, OPERANDO is using SwarmESB, an open source Enterprise Service Bus (ESB based on executable choreographies. In this paper we are presenting the concept of service transformations, presented as a bridge between the world of REST web services and the world of services implemented with executable choreographies. These transformations are improving the heterogeneity aspects when we are analysing SwarmESB as a distributed system. Five types of transformations that have been analysed and implemented as open source software have been integrated. This proposal is shaped around a common language capable of expressing all these five transformation types we have identified working for OPERANDO. Therefore, the Domain Specific Language proposed, renders the essential elements for transformations among functions, web services and executable choreographies. This unification will trigger a quantitative effect on the productivity of the teams creating or integrating web services in a federated service bus environment which is a key architectural component in the future Internet-of-Things and cloud systems.

  14. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  15. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded......We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  16. Counting, enumerating and sampling of execution plans in a cost-based query optimizer

    NARCIS (Netherlands)

    F. Waas; C.A. Galindo-Legaria

    1999-01-01

    textabstractTesting an SQL database system by running large sets of deterministic or stochastic SQL statements is common practice in commercial database development. However, code defects often remain undetected as the query optimizer's choice of an execution plan is not only depending on

  17. Counting, Enumerating and Sampling of Execution Plans in a Cost-Based Query Optimizer

    NARCIS (Netherlands)

    F. Waas; C.A. Galindo-Legaria

    2000-01-01

    textabstractTesting an SQL database system by running large sets of deterministic or stochastic SQL statements is common practice in commercial database development. However, code defects often remain undetected as the query optimizer's choice of an execution plan is not only depending on the query

  18. 77 FR 75702 - Supplemental Identification Information for 1 Individual Designated Pursuant to Executive Order...

    Science.gov (United States)

    2012-12-21

    ... title 3, United States Code. In the Order, the President declared a national emergency to address the... Lebanon or Its Democratic Processes and Institutions.'' DATES: The publishing of updated identification... issued Executive Order 13441 (the ``Order'') pursuant to the International Emergency Economic Powers Act...

  19. Phonological coding during reading

    Science.gov (United States)

    Leinenger, Mallorie

    2014-01-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early (pre-lexical) or that phonological codes come online late (post-lexical)) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eyetracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model (Van Order, 1987), dual-route model (e.g., Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001), parallel distributed processing model (Seidenberg & McClelland, 1989)) are discussed. PMID:25150679

  20. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  1. Improved side information generation for distributed video coding

    DEFF Research Database (Denmark)

    Huang, Xin; Forchhammer, Søren

    2008-01-01

    As a new coding paradigm, distributed video coding (DVC) deals with lossy source coding using side information to exploit the statistics at the decoder to reduce computational demands at the encoder. The performance of DVC highly depends on the quality of side information. With a better side...... information generation method, fewer bits will be requested from the encoder and more reliable decoded frames will be obtained. In this paper, a side information generation method is introduced to further improve the rate-distortion (RD) performance of transform domain distributed video coding. This algorithm...... consists of a variable block size based Y, U and V component motion estimation and an adaptive weighted overlapped block motion compensation (OBMC). The proposal is tested and compared with the results of an executable DVC codec released by DISCOVER group (DIStributed COding for Video sERvices). RD...

  2. On the linear programming bound for linear Lee codes.

    Science.gov (United States)

    Astola, Helena; Tabus, Ioan

    2016-01-01

    Based on an invariance-type property of the Lee-compositions of a linear Lee code, additional equality constraints can be introduced to the linear programming problem of linear Lee codes. In this paper, we formulate this property in terms of an action of the multiplicative group of the field [Formula: see text] on the set of Lee-compositions. We show some useful properties of certain sums of Lee-numbers, which are the eigenvalues of the Lee association scheme, appearing in the linear programming problem of linear Lee codes. Using the additional equality constraints, we formulate the linear programming problem of linear Lee codes in a very compact form, leading to a fast execution, which allows to efficiently compute the bounds for large parameter values of the linear codes.

  3. A Case for Dynamic Reverse-code Generation

    DEFF Research Database (Denmark)

    Lee, Jooyong

    2007-01-01

    . These implementations, however, inherently do not scale. As has often been said, the ultimate solution for backtracking is to use reverse code: executing the reverse code restores the previous states of a program. In our earlier work, we presented a method to generate reverse code on the fly while running a debugger....... This article presents a case study of dynamic reverse-code generation. We compare the memory usage of various backtracking methods in a simple but nontrivial example, a bounded-buffer program. In the case of non-deterministic programs such as this bounded-buffer program, our dynamic reverse-code generation can...... outperform the existing backtracking methods in terms of memory efficiency...

  4. The executive interview as a screening test for executive dysfunction in patients with mild dementia

    DEFF Research Database (Denmark)

    Stokholm, Jette; Vogel, Asmus; Gade, Anders

    2005-01-01

    To validate the Executive Interview (EXIT25) as a screening instrument for executive cognitive dysfunction in patients with mild dementia.......To validate the Executive Interview (EXIT25) as a screening instrument for executive cognitive dysfunction in patients with mild dementia....

  5. How Executive Coaches Assess and Develop Emotional Intelligence in the Executive Suite

    Science.gov (United States)

    McNevin, Mary

    2010-01-01

    This qualitative research study explores the connections between executive coaching and emotional intelligence (EI) when working with senior level executives. The focus is on coaching the senior executives (chief executive officer, chief financial officer, senior vice-presidents) of companies of over $1 billion dollars in revenue. Since research…

  6. The Best Practices of Executive Coaches with C-Level Executives

    Science.gov (United States)

    Francis, Thomas E.

    2011-01-01

    This dissertation explored the Best Practices of Executive Coaches who coach C-Level Executives. The set of best practices developed was differentiated from best practices as applied with middle-manager executive clients. C-level executives were deemed to have a role within the organization with unusual influence and complexity and thus worthy of…

  7. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  8. Decoding of Cyclic Codes,

    Science.gov (United States)

    INFORMATION THEORY, *DECODING), (* DATA TRANSMISSION SYSTEMS , DECODING), STATISTICAL ANALYSIS, STOCHASTIC PROCESSES, CODING, WHITE NOISE, NUMBER THEORY, CORRECTIONS, BINARY ARITHMETIC, SHIFT REGISTERS, CONTROL SYSTEMS, USSR

  9. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  10. Diameter Perfect Lee Codes

    CERN Document Server

    Horak, Peter

    2011-01-01

    Lee codes have been intensively studied for more than 40 years. Interest in these codes has been triggered by the Golomb-Welch conjecture on the existence of perfect error-correcting Lee codes. In this paper we deal with the existence and enumeration of diameter perfect Lee codes. As main results we determine all q for which there exists a linear diameter-4 perfect Lee code of word length n over Z_{q}, and prove that for each n\\geq3 there are unaccountably many diameter-4 perfect Lee codes of word length n over Z. This is in a strict contrast with perfect error-correcting Lee codes of word length n over Z as there is a unique such code for n=3, and its is conjectured that this is always the case when 2n+1 is a prime. Diameter perfect Lee codes will be constructed by an algebraic construction that is based on a group homomorphism. This will allow us to design an efficient algorithm for their decoding.

  11. Expander chunked codes

    Science.gov (United States)

    Tang, Bin; Yang, Shenghao; Ye, Baoliu; Yin, Yitong; Lu, Sanglu

    2015-12-01

    Chunked codes are efficient random linear network coding (RLNC) schemes with low computational cost, where the input packets are encoded into small chunks (i.e., subsets of the coded packets). During the network transmission, RLNC is performed within each chunk. In this paper, we first introduce a simple transfer matrix model to characterize the transmission of chunks and derive some basic properties of the model to facilitate the performance analysis. We then focus on the design of overlapped chunked codes, a class of chunked codes whose chunks are non-disjoint subsets of input packets, which are of special interest since they can be encoded with negligible computational cost and in a causal fashion. We propose expander chunked (EC) codes, the first class of overlapped chunked codes that have an analyzable performance, where the construction of the chunks makes use of regular graphs. Numerical and simulation results show that in some practical settings, EC codes can achieve rates within 91 to 97 % of the optimum and outperform the state-of-the-art overlapped chunked codes significantly.

  12. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  13. Insertion of operation-and-indicate instructions for optimized SIMD code

    Science.gov (United States)

    Eichenberger, Alexander E; Gara, Alan; Gschwind, Michael K

    2013-06-04

    Mechanisms are provided for inserting indicated instructions for tracking and indicating exceptions in the execution of vectorized code. A portion of first code is received for compilation. The portion of first code is analyzed to identify non-speculative instructions performing designated non-speculative operations in the first code that are candidates for replacement by replacement operation-and-indicate instructions that perform the designated non-speculative operations and further perform an indication operation for indicating any exception conditions corresponding to special exception values present in vector register inputs to the replacement operation-and-indicate instructions. The replacement is performed and second code is generated based on the replacement of the at least one non-speculative instruction. The data processing system executing the compiled code is configured to store special exception values in vector output registers, in response to a speculative instruction generating an exception condition, without initiating exception handling.

  14. On {\\sigma}-LCD codes

    OpenAIRE

    Carlet, Claude; Mesnager, Sihem; Tang, Chunming; Qi, Yanfeng

    2017-01-01

    Linear complementary pairs (LCP) of codes play an important role in armoring implementations against side-channel attacks and fault injection attacks. One of the most common ways to construct LCP of codes is to use Euclidean linear complementary dual (LCD) codes. In this paper, we first introduce the concept of linear codes with $\\sigma$ complementary dual ($\\sigma$-LCD), which includes known Euclidean LCD codes, Hermitian LCD codes, and Galois LCD codes. As Euclidean LCD codes, $\\sigma$-LCD ...

  15. Single-instruction multiple-data execution

    CERN Document Server

    Hughes, Christopher J

    2015-01-01

    Having hit power limitations to even more aggressive out-of-order execution in processor cores, many architects in the past decade have turned to single-instruction-multiple-data (SIMD) execution to increase single-threaded performance. SIMD execution, or having a single instruction drive execution of an identical operation on multiple data items, was already well established as a technique to efficiently exploit data parallelism. Furthermore, support for it was already included in many commodity processors. However, in the past decade, SIMD execution has seen a dramatic increase in the set of

  16. Static Code Analysis: A Systematic Literature Review and an Industrial Survey

    OpenAIRE

    Ilyas, Bilal; Elkhalifa, Islam

    2016-01-01

    Context: Static code analysis is a software verification technique that refers to the process of examining code without executing it in order to capture defects in the code early, avoiding later costly fixations. The lack of realistic empirical evaluations in software engineering has been identified as a major issue limiting the ability of research to impact industry and in turn preventing feedback from industry that can improve, guide and orient research. Studies emphasized rigor and relevan...

  17. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  18. Error Correcting Codes

    Indian Academy of Sciences (India)

    be fixed to define codes over such domains). New decoding schemes that take advantage of such connections can be devised. These may soon show up in a technique called code division multiple access (CDMA) which is proposed as a basis for digital cellular communication. CDMA provides a facility for many users to ...

  19. Codes of Conduct

    Science.gov (United States)

    Million, June

    2004-01-01

    Most schools have a code of conduct, pledge, or behavioral standards, set by the district or school board with the school community. In this article, the author features some schools that created a new vision of instilling code of conducts to students based on work quality, respect, safety and courtesy. She suggests that communicating the code…

  20. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March 1997 pp 33-47. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/002/03/0033-0047 ...

  1. Code Generation = A* + BURS

    NARCIS (Netherlands)

    Nymeyer, Albert; Katoen, Joost P.; Westra, Ymte; Alblas, H.; Gyimóthy, Tibor

    1996-01-01

    A system called BURS that is based on term rewrite systems and a search algorithm A* are combined to produce a code generator that generates optimal code. The theory underlying BURS is re-developed, formalised and explained in this work. The search algorithm uses a cost heuristic that is derived

  2. Dress Codes for Teachers?

    Science.gov (United States)

    Million, June

    2004-01-01

    In this article, the author discusses an e-mail survey of principals from across the country regarding whether or not their school had a formal staff dress code. The results indicate that most did not have a formal dress code, but agreed that professional dress for teachers was not only necessary, but showed respect for the school and had a…

  3. Informal control code logic

    NARCIS (Netherlands)

    Bergstra, J.A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical

  4. Interleaved Product LDPC Codes

    OpenAIRE

    Baldi, Marco; Cancellieri, Giovanni; Chiaraluce, Franco

    2011-01-01

    Product LDPC codes take advantage of LDPC decoding algorithms and the high minimum distance of product codes. We propose to add suitable interleavers to improve the waterfall performance of LDPC decoding. Interleaving also reduces the number of low weight codewords, that gives a further advantage in the error floor region.

  5. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alexandre

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  6. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 1. Error Correcting Codes The Hamming Codes. Priti Shankar. Series Article Volume 2 Issue 1 January ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  7. Automatic generation of executable communication specifications from parallel applications

    Energy Technology Data Exchange (ETDEWEB)

    Pakin, Scott [Los Alamos National Laboratory; Wu, Xing [NCSU; Mueller, Frank [NCSU

    2011-01-19

    Portable parallel benchmarks are widely used and highly effective for (a) the evaluation, analysis and procurement of high-performance computing (HPC) systems and (b) quantifying the potential benefits of porting applications for new hardware platforms. Yet, past techniques to synthetically parameterized hand-coded HPC benchmarks prove insufficient for today's rapidly-evolving scientific codes particularly when subject to multi-scale science modeling or when utilizing domain-specific libraries. To address these problems, this work contributes novel methods to automatically generate highly portable and customizable communication benchmarks from HPC applications. We utilize ScalaTrace, a lossless, yet scalable, parallel application tracing framework to collect selected aspects of the run-time behavior of HPC applications, including communication operations and execution time, while abstracting away the details of the computation proper. We subsequently generate benchmarks with identical run-time behavior from the collected traces. A unique feature of our approach is that we generate benchmarks in CONCEPTUAL, a domain-specific language that enables the expression of sophisticated communication patterns using a rich and easily understandable grammar yet compiles to ordinary C + MPI. Experimental results demonstrate that the generated benchmarks are able to preserve the run-time behavior - including both the communication pattern and the execution time - of the original applications. Such automated benchmark generation is particularly valuable for proprietary, export-controlled, or classified application codes: when supplied to a third party. Our auto-generated benchmarks ensure performance fidelity but without the risks associated with releasing the original code. This ability to automatically generate performance-accurate benchmarks from parallel applications is novel and without any precedence, to our knowledge.

  8. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... . . . . . . . . . . . . . . . . . . . . . . . 171 4.9 Codes form order domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4.10 One-point geometric Goppa codes . . . . . . . . . . . . . . . . . . . . . . . . 176 4.11 Bibliographical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 References...

  9. Quantum Synchronizable Codes From Quadratic Residue Codes and Their Supercodes

    OpenAIRE

    Xie, Yixuan; Yuan, Jinhong; Fujiwara, Yuichiro

    2014-01-01

    Quantum synchronizable codes are quantum error-correcting codes designed to correct the effects of both quantum noise and block synchronization errors. While it is known that quantum synchronizable codes can be constructed from cyclic codes that satisfy special properties, only a few classes of cyclic codes have been proved to give promising quantum synchronizable codes. In this paper, using quadratic residue codes and their supercodes, we give a simple construction for quantum synchronizable...

  10. Cracking the Gender Codes

    DEFF Research Database (Denmark)

    Rennison, Betina Wolfgang

    2016-01-01

    Why do men continue to fill most of the senior executive positions and seats in the board of directors in Western corporations? Almost everyone agrees that diversity is good, many women are coming down the pipeline, and companies, states and international organizations and institutions have done ...

  11. A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs

    Directory of Open Access Journals (Sweden)

    Jooyong Yi

    2013-09-01

    Full Text Available Backtracking (i.e., reverse execution helps the user of a debugger to naturally think backwards along the execution path of a program, and thinking backwards makes it easy to locate the origin of a bug. So far backtracking has been implemented mostly by state saving or by checkpointing. These implementations, however, inherently do not scale. Meanwhile, a more recent backtracking method based on reverse-code generation seems promising because executing reverse code can restore the previous states of a program without state saving. In the literature, there can be found two methods that generate reverse code: (a static reverse-code generation that pre-generates reverse code through static analysis before starting a debugging session, and (b dynamic reverse-code generation that generates reverse code by applying dynamic analysis on the fly during a debugging session. In particular, we espoused the latter one in our previous work to accommodate non-determinism of a program caused by e.g., multi-threading. To demonstrate the usefulness of our dynamic reverse-code generation, this article presents a case study of various backtracking methods including ours. We compare the memory usage of various backtracking methods in a simple but nontrivial example, a bounded-buffer program. In the case of non-deterministic programs such as this bounded-buffer program, our dynamic reverse-code generation outperforms the existing backtracking methods in terms of memory efficiency.

  12. Warhead Monitoring Planning and Execution

    Energy Technology Data Exchange (ETDEWEB)

    Nakae, L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-12-05

    The Warhead Measurement Campaign is a multi-laboratory project lead by the Los Alamos National Laboratory. The project will measure several items of the US nuclear weapons stockpile with a wide range of radiation detection systems. This report provides a brief summary of those LLNL executed activities for the Warhead Measurement Campaign from FY11 through FY16. A more detailed description of all of LLNL’s activiites for the WMC will be presented in the final report of a follow-on project, , LA17-V-Wx.

  13. WEBSITE EXECUTION OF CAD MODULES

    Directory of Open Access Journals (Sweden)

    A. A. Lyalinsky

    2013-01-01

    Full Text Available Web-based interface of modules that are part of the computer-aided design system in microelectronics is considered. The influence of several factors (available computer  memory, maximum allowed run time, degree of homogeneity of the software on the structure of the created system is investigated. Synchronous and asynchronous variants of interaction between control and executive parts are described. References on the systems that allow an access to applications in CAD microelectronics and are based on the principles discussed in this article are given.

  14. System architectures for PROLOG execution

    Science.gov (United States)

    Gooley, Markian M.; Wah, Benjamin W.

    1988-01-01

    The principal features of PROLOG are reviewed with particular reference to the use of the language in the development of expert systems. Attention is given to the language syntax, data structures and recursion, constructs that alter control, predicates that modify the database, predicates for input and output, and metalogical predicates. The parts of the Warren Abstract Machine are then described, and it is shown how it executes programs. Parallel architectures proposed for expert systems are examined, and the principal varieties of parallelism available in PROLOG and examples of architectures exploiting them are discussed.

  15. Popular Sentiments and Public Executions

    Directory of Open Access Journals (Sweden)

    Gail Marshall

    2011-09-01

    Full Text Available This paper examines Dickens’s descriptions of public executions in his letters and early journalism as a context in which to read the final scene of 'A Tale of Two Cities' (1859. It argues that despite his traumatised responses to public hangings, Dickens is able to use the site of the scaffold to articulate some fundamental human fears and dispositions. The paper compares Dickens’s response to the horrors of the French Revolution with Carlyle’s, and shows throughout how Dickens firmly repudiates Trollope's somewhat rueful dismissal of him as ‘Mr Popular Sentiment’.

  16. Cracking the code of change.

    Science.gov (United States)

    Beer, M; Nohria, N

    2000-01-01

    Today's fast-paced economy demands that businesses change or die. But few companies manage corporate transformations as well as they would like. The brutal fact is that about 70% of all change initiatives fail. In this article, authors Michael Beer and Nitin Nohria describe two archetypes--or theories--of corporate transformation that may help executives crack the code of change. Theory E is change based on economic value: shareholder value is the only legitimate measure of success, and change often involves heavy use of economic incentives, layoffs, downsizing, and restructuring. Theory O is change based on organizational capability: the goal is to build and strengthen corporate culture. Most companies focus purely on one theory or the other, or haphazardly use a mix of both, the authors say. Combining E and O is directionally correct, they contend, but it requires a careful, conscious integration plan. Beer and Nohria present the examples of two companies, Scott Paper and Champion International, that used a purely E or purely O strategy to create change--and met with limited levels of success. They contrast those corporate transformations with that of UK-based retailer ASDA, which has successfully embraced the paradox between the opposing theories of change and integrated E and O. The lesson from ASDA? To thrive and adapt in the new economy, companies must make sure the E and O theories of business change are in sync at their own organizations.

  17. CHEETAH: A next generation thermochemical code

    Energy Technology Data Exchange (ETDEWEB)

    Fried, L.; Souers, P.

    1994-11-01

    CHEETAH is an effort to bring the TIGER thermochemical code into the 1990s. A wide variety of improvements have been made in Version 1.0. We have improved the robustness and ease of use of TIGER. All of TIGER`s solvers have been replaced by new algorithms. We find that CHEETAH solves a wider variety of problems with no user intervention (e.g. no guesses for the C-J state) than TIGER did. CHEETAH has been made simpler to use than TIGER; typical use of the code occurs with the new standard run command. CHEETAH will make the use of thermochemical codes more attractive to practical explosive formulators. We have also made an extensive effort to improve over the results of TIGER. CHEETAH`s version of the BKW equation of state (BKWC) is able to accurately reproduce energies from cylinder tests; something that other BKW parameter sets have been unable to do. Calculations performed with BKWC execute very quickly; typical run times are under 10 seconds on a workstation. In the future we plan to improve the underlying science in CHEETAH. More accurate equations of state will be used in the gas and the condensed phase. A kinetics capability will be added to the code that will predict reaction zone thickness. Further ease of use features will eventually be added; an automatic formulator that adjusts concentrations to match desired properties is planned.

  18. The psychiatrist's dilemma: a conflict of roles in legal executions.

    Science.gov (United States)

    Freedman, A M; Halpern, A L

    1999-10-01

    In the United States, a critical controversy is taking place in regard to psychiatrists' and other physicians' participation in legal executions. Under pressure from the criminal justice system and legislatures to expedite executions, some forensic psychiatrists have succeeded in loosening traditional prohibitions against such participation. Further, there has been a weakening of the prohibition against treatment designed to facilitate immediate execution of those condemned to death. The rationale offered for these departures from current psychiatric ethical codes is the novel notion that when a psychiatrist acts in the court or criminal justice situation, that individual is no longer a psychiatrist and is not bound by psychiatric ethics. Rather, the forensic psychiatrist, termed a 'forensicist', serves as an assistant in the 'administration of justice' or 'an agent of the State' and thus works in a different ethical framework from the ordinary psychiatrist. This justification has similarities to the rationale offered by physicians involved in human experiments and other criminal acts in Nazi Germany, as well as psychiatrists in the former Soviet Union who explained their involvement in psychiatric abuse as a result of being agents of the State and thus not responsible for carrying out orders. Clearly, this controversy could be eliminated by a campaign for the abolition of capital punishment, characterised by the American Psychiatric Association as 'anachronistic, brutalizing [and] ineffective'. Such a campaign should serve as a call for psychiatrists and other physicians to join in the struggle to uphold ethical and moral principles.

  19. The volunteer activities of healthcare executives.

    Science.gov (United States)

    Weil, Peter A; Kimball, Peter A

    2010-01-01

    The role requirements of healthcare executives have received considerable attention from researchers; however, the volunteer efforts of executives have not been examined. This study investigates the relationship between an executive's position in the organizational hierarchy and his or her propensity to volunteer in general and to volunteer for the executive's professional society in particular. The study found that nearly all executives volunteered for some organization, but the type of work they performed was associated with their position level. For example, more than 90 percent of chief executive officers (CEOs) served on a board or a committee compared with less than half of mid-level executives. Also, more CEOs than lower-level executives were involved in fund-raising, setting professional standards, and testifying to legislatures. In general, we suggest that CEOs commit to volunteering, which facilitates their ability to achieve and retain their high-level position, recognition, and rewards. Fewer than half of the executives surveyed had volunteered for the American College of Healthcare Executives (ACHE), their professional society; the most common reasons given for not volunteering were lack of awareness of volunteer opportunities or not being asked to volunteer. Those that had volunteered for ACHE were primarily motivated by altruistic motives, such as the desire to help others, feelings of compassion for people in need, or the desire to do something for the profession. Career advancement was deemed to be a less important motivator in volunteering for ACHE. However, mid-level executives rated these motives more highly than did senior-level executives and CEOs. Because of the creation of local ACHE chapters, many more opportunities will become available for healthcare executives to volunteer for their professional society in the future.

  20. Pyramid image codes

    Science.gov (United States)

    Watson, Andrew B.

    1990-01-01

    All vision systems, both human and machine, transform the spatial image into a coded representation. Particular codes may be optimized for efficiency or to extract useful image features. Researchers explored image codes based on primary visual cortex in man and other primates. Understanding these codes will advance the art in image coding, autonomous vision, and computational human factors. In cortex, imagery is coded by features that vary in size, orientation, and position. Researchers have devised a mathematical model of this transformation, called the Hexagonal oriented Orthogonal quadrature Pyramid (HOP). In a pyramid code, features are segregated by size into layers, with fewer features in the layers devoted to large features. Pyramid schemes provide scale invariance, and are useful for coarse-to-fine searching and for progressive transmission of images. The HOP Pyramid is novel in three respects: (1) it uses a hexagonal pixel lattice, (2) it uses oriented features, and (3) it accurately models most of the prominent aspects of primary visual cortex. The transform uses seven basic features (kernels), which may be regarded as three oriented edges, three oriented bars, and one non-oriented blob. Application of these kernels to non-overlapping seven-pixel neighborhoods yields six oriented, high-pass pyramid layers, and one low-pass (blob) layer.

  1. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  2. The Application of the PEBBED Code Suite to the PBMR-400 Coupled Code Benchmark - FY 2006 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    2006-09-01

    This document describes the recent developments of the PEBBED code suite and its application to the PBMR-400 Coupled Code Benchmark. This report addresses an FY2006 Level 2 milestone under the NGNP Design and Evaluation Methods Work Package. The milestone states "Complete a report describing the results of the application of the integrated PEBBED code package to the PBMR-400 coupled code benchmark". The report describes the current state of the PEBBED code suite, provides an overview of the Benchmark problems to which it was applied, discusses the code developments achieved in the past year, and states some of the results attained. Results of the steady state problems generated by the PEBBED fuel management code compare favorably to the preliminary results generated by codes from other participating institutions and to similar non-Benchmark analyses. Partial transient analysis capability has been achieved through the acquisition of the NEM-THERMIX code from Penn State University. Phase I of the task has been achieved through the development of a self-consistent set of tools for generating cross sections for design and transient analysis and in the successful execution of the steady state benchmark exercises.

  3. Executive Functions in Developmental Dyslexia

    Directory of Open Access Journals (Sweden)

    Pamela eVarvara

    2014-03-01

    Full Text Available The present study was aimed at investigating different aspects of Executive Functions (EF in children with Developmental Dyslexia (DD.A neuropsychological battery tapping verbal fluency, spoonerism, attention, verbal shifting, short-term and working memory was used to assess 60 children with DD and 65 with typical reading abilities.Compared to their controls, children with DD showed deficits in several EF domains such as verbal categorical and phonological fluency, visual-spatial and auditory attention, spoonerism, verbal and visual short-term memory, and verbal working memory. Moreover, exploring predictive relationships between EF measures and reading, we found that spoonerism abilities better explained word and non-word reading deficits. Although to a lesser extent, auditory and visual-spatial attention also explained the increased percentage of variance related to reading deficit.EF deficits found in DD are interpreted as an expression of a deficient functioning of the Central Executive System and are discussed in the context of the recent temporal sampling theory.

  4. Execute-Only Attacks against Execute-Only Defenses

    Science.gov (United States)

    2016-02-18

    webservers, the attack vectors that can be used to cause memory corruption in databases are not obvious. These systems usually serve as back-ends to public...attacks that have been widely used to bypass randomization-based memory corruption defenses. A recent technique, Readactor, provides one of the... corruption defenses with various impacts. We analyze the prevalence of opportunities for such attacks in popular code bases and build two proof-of-concept

  5. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  6. Quantum coding theorems

    Science.gov (United States)

    Holevo, A. S.

    1998-12-01

    ContentsI. IntroductionII. General considerations § 1. Quantum communication channel § 2. Entropy bound and channel capacity § 3. Formulation of the quantum coding theorem. Weak conversionIII. Proof of the direct statement of the coding theorem § 1. Channels with pure signal states § 2. Reliability function § 3. Quantum binary channel § 4. Case of arbitrary states with bounded entropyIV. c-q channels with input constraints § 1. Coding theorem § 2. Gauss channel with one degree of freedom § 3. Classical signal on quantum background noise Bibliography

  7. Executable research compendia in geoscience research infrastructures

    Science.gov (United States)

    Nüst, Daniel

    2017-04-01

    From generation through analysis and collaboration to communication, scientific research requires the right tools. Scientists create their own software using third party libraries and platforms. Cloud computing, Open Science, public data infrastructures, and Open Source enable scientists with unprecedented opportunites, nowadays often in a field "Computational X" (e.g. computational seismology) or X-informatics (e.g. geoinformatics) [0]. This increases complexity and generates more innovation, e.g. Environmental Research Infrastructures (environmental RIs [1]). Researchers in Computational X write their software relying on both source code (e.g. from https://github.com) and binary libraries (e.g. from package managers such as APT, https://wiki.debian.org/Apt, or CRAN, https://cran.r-project.org/). They download data from domain specific (cf. https://re3data.org) or generic (e.g. https://zenodo.org) data repositories, and deploy computations remotely (e.g. European Open Science Cloud). The results themselves are archived, given persistent identifiers, connected to other works (e.g. using https://orcid.org/), and listed in metadata catalogues. A single researcher, intentionally or not, interacts with all sub-systems of RIs: data acquisition, data access, data processing, data curation, and community support [3]. To preserve computational research [3] proposes the Executable Research Compendium (ERC), a container format closing the gap of dependency preservation by encapsulating the runtime environment. ERCs and RIs can be integrated for different uses: (i) Coherence: ERC services validate completeness, integrity and results (ii) Metadata: ERCs connect the different parts of a piece of research and faciliate discovery (iii) Exchange and Preservation: ERC as usable building blocks are the shared and archived entity (iv) Self-consistency: ERCs remove dependence on ephemeral sources (v) Execution: ERC services create and execute a packaged analysis but integrate with

  8. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  9. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  10. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  11. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  12. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    , in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded......The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered...... as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  13. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  14. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  15. A simple hypothesis of executive function

    OpenAIRE

    Bruno eKopp

    2012-01-01

    Executive function is traditionally conceptualized as a set of abilities required to guide behavior toward goals. Here, an integrated theoretical framework for executive function is developed which has its roots in the notion of hierarchical mental models. Further following Duncan (2010a,b), executive function is construed as a hierarchical recursive system of test-operation-test-exit units (Miller, Galanter, and Pribram, 1960). Importantly, it is shown that this framework can be used to mode...

  16. A simple hypothesis of executive function

    OpenAIRE

    Kopp, Bruno

    2012-01-01

    Executive function is traditionally conceptualized as a set of abilities required to guide behavior toward goals. Here, an integrated theoretical framework for executive function is developed which has its roots in the notion of hierarchical mental models. Further following Duncan (2010a,b), executive function is construed as a hierarchical recursive system of test-operation-test-exit units (Miller et al., 1960). Importantly, it is shown that this framework can be used to model the main regio...

  17. OPTIMAL PRICING OF EXECUTIVE MBA PROGRAMS

    OpenAIRE

    Francis Petit

    2010-01-01

    The purpose of this research is to determine the most strategic tuition pricing strategy that can be utilized by senior management in Business Schools when pricing Executive MBA Programs. To determine this information, the state of the Executive MBA market and three pricing strategies were reviewed in detail and an analysis ensued on the viability and applicability of each strategy for pricing Executive MBA Programs. The main findings of this study indicate that the Value Based pricing model ...

  18. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  19. Code de conduite

    International Development Research Centre (IDRC) Digital Library (Canada)

    irocca

    son point de vue, dans un esprit d'accueil et de respect. NOTRE CODE DE CONDUITE. Le CRDI s'engage à adopter un comportement conforme aux normes d'éthique les plus strictes dans toutes ses activités. Le Code de conduite reflète notre mission, notre philosophie en matière d'emploi et les résultats des discussions ...

  20. TECATE - a code for anisotropic thermoelasticity in high-average-power laser technology. Phase 1 final report

    Energy Technology Data Exchange (ETDEWEB)

    Gelinas, R.J.; Doss, S.K.; Carlson, N.N.

    1985-01-01

    This report describes a totally Eulerian code for anisotropic thermoelasticity (code name TECATE) which may be used in evaluations of prospective crystal media for high-average-power lasers. The present TECATE code version computes steady-state distributions of material temperatures, stresses, strains, and displacement fields in 2-D slab geometry. Numerous heat source and coolant boundary condition options are available in the TECATE code for laser design considerations. Anisotropic analogues of plane stress and plane strain evaluations can be executed for any and all crystal symmetry classes. As with all new and/or large physics codes, it is likely that some code imperfections will emerge at some point in time.

  1. Open Coding Descriptions

    Directory of Open Access Journals (Sweden)

    Barney G. Glaser, PhD, Hon PhD

    2016-12-01

    Full Text Available Open coding is a big source of descriptions that must be managed and controlled when doing GT research. The goal of generating a GT is to generate an emergent set of concepts and their properties that fit and work with relevancy to be integrated into a theory. To achieve this goal, the researcher begins his research with open coding, that is coding all his data in every possible way. The consequence of this open coding is a multitude of descriptions for possible concepts that often do not fit in the emerging theory. Thus in this case the researcher ends up with many irrelevant descriptions for concepts that do not apply. To dwell on descriptions for inapplicable concepts ruins the GT theory as it starts. It is hard to stop. Confusion easily sets in. Switching the study to a QDA is a simple rescue. Rigorous focusing on emerging concepts is vital before being lost in open coding descriptions. It is important, no matter how interesting the description may become. Once a core is possible, selective coding can start which will help control against being lost in multiple descriptions.

  2. Executive Orders-William J. Clinton

    Data.gov (United States)

    National Archives and Records Administration — Executive orders are official documents, numbered consecutively, through which the President of the United States manages the operations of the Federal Government....

  3. Executive Orders-George W. Bush

    Data.gov (United States)

    National Archives and Records Administration — Executive orders are official documents, numbered consecutively, through which the President of the United States manages the operations of the Federal Government....

  4. A simple hypothesis of executive function.

    Science.gov (United States)

    Kopp, Bruno

    2012-01-01

    Executive function is traditionally conceptualized as a set of abilities required to guide behavior toward goals. Here, an integrated theoretical framework for executive function is developed which has its roots in the notion of hierarchical mental models. Further following Duncan (2010a,b), executive function is construed as a hierarchical recursive system of test-operation-test-exit units (Miller et al., 1960). Importantly, it is shown that this framework can be used to model the main regional prefrontal syndromes, which are characterized by apathetic, disinhibited and dysexecutive cognition, and behavior, respectively. Implications of these considerations for the neuropsychological assessment of executive function are discussed.

  5. A simple hypothesis of executive function

    Directory of Open Access Journals (Sweden)

    Bruno eKopp

    2012-06-01

    Full Text Available Executive function is traditionally conceptualized as a set of abilities required to guide behavior toward goals. Here, an integrated theoretical framework for executive function is developed which has its roots in the notion of hierarchical mental models. Further following Duncan (2010a,b, executive function is construed as a hierarchical recursive system of test-operation-test-exit units (Miller, Galanter, and Pribram, 1960. Importantly, it is shown that this framework can be used to model the main regional prefrontal syndromes, which are characterized by apathetic, disinhibited and dysexecutive cognition and behavior, respectively. Implications of these considerations for the neuropsychological assessment of executive function are discussed.

  6. EMI Execution Service (EMI-ES) Specification

    CERN Document Server

    Schuller, B

    2010-01-01

    This document provides the interface specification, including related data models such as state model, activity description, resource and activity information, of an execution service, matching the needs of the EMI production middleware stack composed of ARC, gLite and UNICORE components. This service therefore is referred to as the EMI Execution Service (or “ES” for short). This document is a continuation of the work previously know as the GENEVA, then AGU (“ARC, gLite UNICORE”), then PGI execution service. As a starting point, the v0.42 of the “PGI Execution Service Specification” (doc15839) was used.

  7. Advanced Fuels Campaign Execution Plan

    Energy Technology Data Exchange (ETDEWEB)

    Kemal Pasamehmetoglu

    2010-10-01

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the “Grand Challenge” for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  8. Advanced Fuels Campaign Execution Plan

    Energy Technology Data Exchange (ETDEWEB)

    Kemal Pasamehmetoglu

    2011-09-01

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  9. Sequentially Executed Model Evaluation Framework

    Energy Technology Data Exchange (ETDEWEB)

    2015-10-20

    Provides a message passing framework between generic input, model and output drivers, and specifies an API for developing such drivers. Also provides batch and real-time controllers which step the model and I/O through the time domain (or other discrete domain), and sample I/O drivers. This is a library framework, and does not, itself, solve any problems or execute any modeling. The SeMe framework aids in development of models which operate on sequential information, such as time-series, where evaluation is based on prior results combined with new data for this iteration. Has applications in quality monitoring, and was developed as part of the CANARY-EDS software, where real-time water quality data is being analyzed for anomalies.

  10. Directed Hidden-Code Extractor for Environment-Sensitive Malwares

    Science.gov (United States)

    Jia, Chunfu; Wang, Zhi; Lu, Kai; Liu, Xinhai; Liu, Xin

    Malware writers often use packing technique to hide malicious payload. A number of dynamic unpacking tools are.designed in order to identify and extract the hidden code in the packed malware. However, such unpacking methods.are all based on a highly controlled environment that is vulnerable to various anti-unpacking techniques. If execution.environment is suspicious, malwares may stay inactive for a long time or stop execution immediately to evade.detection. In this paper, we proposed a novel approach that automatically reasons about the environment requirements.imposed by malware, then directs a unpacking tool to change the controlled environment to extract the hide code at.the new environment. The experimental results show that our approach significantly increases the resilience of the.traditional unpacking tools to environment-sensitive malware.

  11. Execution time supports for adaptive scientific algorithms on distributed memory machines

    Science.gov (United States)

    Berryman, Harry; Saltz, Joel; Scroggs, Jeffrey

    1990-01-01

    Optimizations are considered that are required for efficient execution of code segments that consists of loops over distributed data structures. The PARTI (Parallel Automated Runtime Toolkit at ICASE) execution time primitives are designed to carry out these optimizations and can be used to implement a wide range of scientific algorithms on distributed memory machines. These primitives allow the user to control array mappings in a way that gives an appearance of shared memory. Computations can be based on a global index set. Primitives are used to carry out gather and scatter operations on distributed arrays. Communications patterns are derived at runtime, and the appropriate send and receive messages are automatically generated.

  12. Creating Java to Native Code Interfaces with Janet

    Directory of Open Access Journals (Sweden)

    Marian Bubak

    2001-01-01

    Full Text Available Java is growing in appropriateness and usability for high performance computing. With this increasing adoption, issues relating to combining Java with existing codes in other languages become more important. The Java Native Interface (JNI API is portable but too inconvenient to be used directly owing to its low-level API. This paper presents Janet — a highly expressive Java language extension and preprocessing tool that enables convenient integration of native code with Java programs. The Janet methodology overcomes some of the limitations of JNI and generates Java programs that execute with little or no degradation despite the flexibility and generality of the interface.

  13. Machine Code Verification of a Tiny ARM Hypervisor

    OpenAIRE

    Dam, Mads; Guanciale, Roberto; Nemati, Hamed

    2013-01-01

    Hypervisors are low level execution platforms that provideisolated partitions on shared resources, allowing to design se-cure systems without using dedicated hardware devices. Akey requirement of this kind of solution is the formal verifi-cation of the software trusted computing base, preferably atthe binary level. We accomplish a detailed verification of anARMv7 tiny hypervisor, proving its correctness at the ma-chine code level. We present our verification strategy, whichmixes the usage of ...

  14. The Theoretical Basis of the Code 50 Nuclear Exchange Model

    Science.gov (United States)

    1971-09-01

    allocation. The various components of this part of Coce 50 are Code 50, the main executive program; GENX and DATAX, the input routines; STRIKE, a secondary...the data input subroutines, GENX and DATAX. These read in informa- tion and also compute some parameters such as the number of weapon and target...INPUT ( GENX , DATAX) 11 SINGLE SHOT KILL PROBABILITY CALCULATION (SSKCALC) ANOTHER YES CASE? A (EXEC) SET UP FOR NEXT NO STRIKE (EXEC) INTERIM PROCESSING

  15. Executive function and coping in stroke survivors.

    Science.gov (United States)

    Kegel, Jessica; Dux, Moira; Macko, Richard

    2014-01-01

    Stroke is a leading cause of disability and sequelae may include physical, emotional, and cognitive impairments. The methods employed to cope with distress, both emotional and cognitive, have not been evaluated in individuals post-stroke. However, research in traumatic brain injury (TBI) suggests that executive function is positively correlated with adaptive coping and negatively correlated with maladaptive coping strategies (Krpan et al., 2007). Examination of these constructs post-stroke may assist with enriching our understanding of cognitive and emotional symptomatology and optimize rehabilitation strategies. The present study aimed to assess the association between executive function and coping strategies in a sample of chronic stroke survivors. The researchers hypothesized that executive function would be positively correlated with adaptive coping strategies and negatively correlated with maladaptive coping strategies. Fifteen stroke survivors were administered a battery of cognitive tests assessing executive function and also completed the Ways of Coping Questionnaire (WAYS), a self-report coping measure. Analyses indicated that executive function deficits were related to increased avoidant coping. Contrary to expectations, executive function was not significantly related to active coping. In addition, post hoc analyses revealed that executive function was a significant predictor of avoidant coping after controlling for demographics. Our data, in accordance with prior work in TBI, suggests that executive function and aspects of coping are associated. Rehabilitation strategies that improve executive function may also lead to utilization of adaptive coping strategies. Research has shown that aerobic exercise increases activation in the frontal lobe and improves executive function (Colcombe & Kramer, 2003; Colcombe et al., 2004). Future studies should examine whether aerobic exercise positively affects executive function and coping in stroke survivors.

  16. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  17. 3 CFR 13490 - Executive Order 13490 of January 21, 2009. Ethics Commitments by Executive Branch Personnel

    Science.gov (United States)

    2010-01-01

    ... official or non-career Senior Executive Service appointee for the remainder of the Administration. “6...-Presidential appointee, non-career appointee in the Senior Executive Service (or other SES-type system), and... of every executive agency shall, in consultation with the Director of the Office of Government Ethics...

  18. Code blue: seizures.

    Science.gov (United States)

    Hoerth, Matthew T; Drazkowski, Joseph F; Noe, Katherine H; Sirven, Joseph I

    2011-06-01

    Eyewitnesses frequently perceive seizures as life threatening. If an event occurs on the hospital premises, a "code blue" can be called which consumes considerable resources. The purpose of this study was to determine the frequency and characteristics of code blue calls for seizures and seizure mimickers. A retrospective review of a code blue log from 2001 through 2008 identified 50 seizure-like events, representing 5.3% of all codes. Twenty-eight (54%) occurred in inpatients; the other 22 (44%) events involved visitors or employees on the hospital premises. Eighty-six percent of the events were epileptic seizures. Seizure mimickers, particularly psychogenic nonepileptic seizures, were more common in the nonhospitalized group. Only five (17.9%) inpatients had a known diagnosis of epilepsy, compared with 17 (77.3%) of the nonhospitalized patients. This retrospective survey provides insights into how code blues are called on hospitalized versus nonhospitalized patients for seizure-like events. Copyright © 2011. Published by Elsevier Inc.

  19. Error coding simulations

    Science.gov (United States)

    Noble, Viveca K.

    1993-11-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  20. Twisted Reed-Solomon Codes

    DEFF Research Database (Denmark)

    Beelen, Peter; Puchinger, Sven; Rosenkilde ne Nielsen, Johan

    2017-01-01

    We present a new general construction of MDS codes over a finite field Fq. We describe two explicit subclasses which contain new MDS codes of length at least q/2 for all values of q ≥ 11. Moreover, we show that most of the new codes are not equivalent to a Reed-Solomon code.......We present a new general construction of MDS codes over a finite field Fq. We describe two explicit subclasses which contain new MDS codes of length at least q/2 for all values of q ≥ 11. Moreover, we show that most of the new codes are not equivalent to a Reed-Solomon code....

  1. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  2. Manufacturer Identification Code (MID) - ACE

    Data.gov (United States)

    Department of Homeland Security — The ACE Manufacturer Identification Code (MID) application is used to track and control identifications codes for manufacturers. A manufacturer is identified on an...

  3. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  4. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  5. 32 CFR 724.702 - Executive management.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Executive management. 724.702 Section 724.702 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Organization of the Naval Discharge Review Board § 724.702 Executive management. The...

  6. Understanding the Executive Functioning Heterogeneity in Schizophrenia

    Science.gov (United States)

    Raffard, Stephane; Bayard, Sophie

    2012-01-01

    Schizophrenia is characterized by heterogeneous brain abnormalities involving cerebral regions implied in the executive functioning. The dysexecutive syndrome is one of the most prominent and functionally cognitive features of schizophrenia. Nevertheless, it is not clear to what extend executive deficits are heterogeneous in schizophrenia…

  7. Conceptualization and Operationalization of Executive Function

    Science.gov (United States)

    Baggetta, Peter; Alexander, Patricia A.

    2016-01-01

    Executive function is comprised of different behavioral and cognitive elements and is considered to play a significant role in learning and academic achievement. Educational researchers frequently study the construct. However, because of its complexity functionally, the research on executive function can at times be both confusing and…

  8. Execution Time Estimation for Workflow Scheduling

    NARCIS (Netherlands)

    Chirkin, A.M.; Belloum, A..S.Z.; Kovalchuk, S.V.; Makkes, M.X.

    2014-01-01

    Estimation of the execution time is an important part of the workflow scheduling problem. The aim of this paper is to highlight common problems in estimating the workflow execution time and propose a solution that takes into account the complexity and the randomness of the workflow components and

  9. Execution time estimation for workflow scheduling

    NARCIS (Netherlands)

    Chirkin, A.M.; Belloum, A.S.Z.; Kovalchuk, S.V.; Makkes, M.X.; Melnik, M.A.; Visheratin, A.A.; Nasonov, D.A.

    2017-01-01

    Estimation of the execution time is an important part of the workflow scheduling problem. The aim of this paper is to highlight common problems in estimating the workflow execution time and propose a solution that takes into account the complexity and the stochastic aspects of the workflow

  10. Neural modeling of prefrontal executive function

    Energy Technology Data Exchange (ETDEWEB)

    Levine, D.S. [Univ. of Texas, Arlington, TX (United States)

    1996-12-31

    Brain executive function is based in a distributed system whereby prefrontal cortex is interconnected with other cortical. and subcortical loci. Executive function is divided roughly into three interacting parts: affective guidance of responses; linkage among working memory representations; and forming complex behavioral schemata. Neural network models of each of these parts are reviewed and fit into a preliminary theoretical framework.

  11. Predictors for the Effects of Televised Executions.

    Science.gov (United States)

    McEnteer, James B.

    This paper discusses the controversy that has traditionally surrounded the issue of capital punishment. When a Texas television reporter sought permission to televise the execution of a convicted murderer by lethal injection in 1983, arguments were advanced both for and against televising executions. A recent poll shows that 84% of Americans…

  12. Helping Behavior in Executives' Global Networks

    DEFF Research Database (Denmark)

    Miller, Stewart; Mors, Marie Louise; McDonald, Michael

    2014-01-01

    Drawing on research on helping behavior in networks at the upper echelons, we develop and test theory about helping behavior in senior executive networks. We examine the location and relational dependence of the network contact. Our results reveal that executives are more likely to perceive insid...

  13. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  14. [Executive function and behavior in university drinkers].

    Science.gov (United States)

    Salcedo Palacios, Dii Dayana; Ramírez Nova, Yeimy Johanna; Acosta Barreto, María Rocío

    2015-01-01

    Establish the profile of executive function and behavior in fifty consumers of alcohol are located in a high-risk level according to the Alcohol Use Disorders Identification Test (AUDIT) and which belong to different universities in the city of Bogota. Was used analytical transverse design, and were taken as study variables executive function (inhibition, monitoring, sequencing, planning, cognitive flexibility, working memory, attentional control, categorization and concept formation) and executive behavior (decision making, impulse control, emotional feedback, empathy and theory of mind). Results showed that there is a greater number of cognitive domains of executive function involved in contrast to those of executive behavior. Such is for inhibition, sequencing, attention control (processing speed), categorization, cognitive flexibility, self monitoring and planning. Copyright © 2014 Asociación Colombiana de Psiquiatría. Publicado por Elsevier España. All rights reserved.

  15. Executive function, episodic memory, and Medicare expenditures.

    Science.gov (United States)

    Bender, Alex C; Austin, Andrea M; Grodstein, Francine; Bynum, Julie P W

    2017-07-01

    We examined the relationship between health care expenditures and cognition, focusing on differences across cognitive systems defined by global cognition, executive function, or episodic memory. We used linear regression models to compare annual health expenditures by cognitive status in 8125 Nurses' Health Study participants who completed a cognitive battery and were enrolled in Medicare parts A and B. Adjusting for demographics and comorbidity, executive impairment was associated with higher total annual expenditures of $1488 per person (P memory impairment was found. Expenditures exhibited a linear relationship with executive function, but not episodic memory ($584 higher for every 1 standard deviation decrement in executive function; P losses in executive function may be effective in reducing costly services. Copyright © 2017 the Alzheimer's Association. Published by Elsevier Inc. All rights reserved.

  16. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes...

  17. Code of Medical Ethics

    Directory of Open Access Journals (Sweden)

    . SZD-SZZ

    2017-03-01

    Full Text Available Te Code was approved on December 12, 1992, at the 3rd regular meeting of the General Assembly of the Medical Chamber of Slovenia and revised on April 24, 1997, at the 27th regular meeting of the General Assembly of the Medical Chamber of Slovenia. The Code was updated and harmonized with the Medical Association of Slovenia and approved on October 6, 2016, at the regular meeting of the General Assembly of the Medical Chamber of Slovenia.

  18. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause/receive inter......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause...

  19. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  20. Investigating executive functions in children with severe speech and movement disorders using structured tasks

    Directory of Open Access Journals (Sweden)

    Kristine eStadskleiv

    2014-09-01

    Full Text Available Executive functions are the basis for goal-directed activity and include planning, monitoring, and inhibition, and language seems to play a role in the development of these functions. There is a tradition of studying executive function in both typical and atypical populations, and the present study investigates executive functions in children with severe speech and motor impairments who are communicating using communication aids with graphic symbols, letters and/or words. There are few neuropsychological studies of children in this group and little is known about their cognitive functioning, including executive functions. It was hypothesized that aided communication would tax executive functions more than speech. 29 children using communication aids and 27 naturally speaking children participated. Structured tasks resembling everyday activities, where the action goals had to be reached through communication with a partner, were used to get information about executive functions. The children a directed the partner to perform actions like building a Lego tower from a model the partner could not see and b gave information about an object without naming it to a person who had to guess what object it was. The executive functions of planning, monitoring and impulse control were coded from the children’s on-task behavior. Both groups solved most of the tasks correctly, indicating that aided communicators are able to use language to direct another person to do a complex set of actions. Planning and lack of impulsivity was positively related to task success in both groups. The aided group completed significantly fewer tasks, spent longer time and showed more variation in performance than the comparison group. The aided communicators scored lower on planning and showed more impulsivity than the comparison group, while both groups showed an equal degree of monitoring of the work progress. The results are consistent with the hypothesis that aided language

  1. The Relationship Between Working Memory Capacity and Executive Functioning: Evidence for a Common Executive Attention Construct

    Science.gov (United States)

    McCabe, David P.; Roediger, Henry L.; McDaniel, Mark A.; Balota, David A.; Hambrick, David Z.

    2010-01-01

    Attentional control has been conceptualized as executive functioning by neuropsychologists and as working memory capacity by experimental psychologists. We examined the relationship between these constructs using a factor analytic approach in an adult lifespan sample. Several tests of working memory capacity and executive function were administered to over 200 subjects between the ages of 18-90 years old, along with tests of processing speed and episodic memory. The correlation between working memory capacity and executive functioning constructs was very strong (r = .97), but correlations between these constructs and processing speed were considerably weaker (r's ≈ .79). Controlling for working memory capacity or executive function eliminated age effects on episodic memory, and working memory capacity or executive function accounted for variance in episodic memory beyond that accounted for by processing speed. We conclude that tests of working memory capacity and executive function share a common underlying executive attention component that is strongly predictive of higher-level cognition. PMID:20230116

  2. The multidimensional self-adaptive grid code, SAGE

    Science.gov (United States)

    Davies, Carol B.; Venkatapathy, Ethiraj

    1992-01-01

    This report describes the multidimensional self-adaptive grid code SAGE. A two-dimensional version of this code was described in an earlier report by the authors. The formulation of the multidimensional version is described in the first section of this document. The second section is presented in the form of a user guide that explains the input and execution of the code and provides many examples. Successful application of the SAGE code in both two and three dimensions for the solution of various flow problems has proven the code to be robust, portable, and simple to use. Although the basic formulation follows the method of Nakahashi and Deiwert, many modifications have been made to facilitate the use of the self-adaptive grid method for complex grid structures. Modifications to the method and the simplified input options make this a flexible and user-friendly code. The new SAGE code can accommodate both two-dimensional and three-dimensional flow problems.

  3. Overview of the ArbiTER edge plasma eigenvalue code

    Science.gov (United States)

    Baver, Derek; Myra, James; Umansky, Maxim

    2011-10-01

    The Arbitrary Topology Equation Reader, or ArbiTER, is a flexible eigenvalue solver that is currently under development for plasma physics applications. The ArbiTER code builds on the equation parser framework of the existing 2DX code, extending it to include a topology parser. This will give the code the capability to model problems with complicated geometries (such as multiple X-points and scrape-off layers) or model equations with arbitrary numbers of dimensions (e.g. for kinetic analysis). In the equation parser framework, model equations are not included in the program's source code. Instead, an input file contains instructions for building a matrix from profile functions and elementary differential operators. The program then executes these instructions in a sequential manner. These instructions may also be translated into analytic form, thus giving the code transparency as well as flexibility. We will present an overview of how the ArbiTER code is to work, as well as preliminary results from early versions of this code. Work supported by the U.S. DOE.

  4. Ptolemy Coding Style

    Science.gov (United States)

    2014-09-05

    because this would combine Ptolemy II with the GPL’d code and thus encumber Ptolemy II with the GPL. Another GNU license is the GNU Library General...permission on the source.eecs.berkeley.edu repositories, then use your local repository. bash-3.2$ svn co svn+ ssh ://source.eecs.berkeley.edu/chess

  5. Error Correcting Codes

    Indian Academy of Sciences (India)

    The images, which came from Oailleo's flyby of the moon on June 26-27. 1996 are reported to be 20 times better than those obtained from the Voyager. Priti Shankar .... a systematic way. Thus was born a brand new field,which has since been ..... mathematically oriented, compact book on coding, containing a few topics not ...

  6. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  7. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  8. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  9. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 1; Issue 10. Error Correcting Codes How Numbers Protect Themselves. Priti Shankar. Series Article Volume 1 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  10. Video Coding for ESL.

    Science.gov (United States)

    King, Kevin

    1992-01-01

    Coding tasks, a valuable technique for teaching English as a Second Language, are presented that enable students to look at patterns and structures of marital communication as well as objectively evaluate the degree of happiness or distress in the marriage. (seven references) (JL)

  11. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  12. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Computer Science and. Automation, liSe. Their research addresses various aspects of algebraic and combinatorial coding theory. 1 low Density Parity Check ..... lustrating how the variable Xd is decoded. As mentioned earlier, this algorithm runs iteratively. To start with, in the first iteration, only bits in the first level of the ...

  13. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives...

  14. Student Dress Codes.

    Science.gov (United States)

    Uerling, Donald F.

    School officials see a need for regulations that prohibit disruptive and inappropriate forms of expression and attire; students see these regulations as unwanted restrictions on their freedom. This paper reviews court litigation involving constitutional limitations on school authority, dress and hair codes, state law constraints, and school…

  15. Dress Codes and Uniforms.

    Science.gov (United States)

    Lumsden, Linda; Miller, Gabriel

    2002-01-01

    Students do not always make choices that adults agree with in their choice of school dress. Dress-code issues are explored in this Research Roundup, and guidance is offered to principals seeking to maintain a positive school climate. In "Do School Uniforms Fit?" Kerry White discusses arguments for and against school uniforms and summarizes the…

  16. Dress Codes. Legal Brief.

    Science.gov (United States)

    Zirkel, Perry A.

    2000-01-01

    As illustrated by two recent decisions, the courts in the past decade have demarcated wide boundaries for school officials considering dress codes, whether in the form of selective prohibitions or required uniforms. Administrators must warn the community, provide legitimate justification and reasonable clarity, and comply with state law. (MLH)

  17. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    titled 'A Mathematical Theory of Communication' in the Bell Systems Technical Journal in 1948. The paper set up a ... 'existential' result but nota 'constructive' one. The construction of such a code evolved from the work ... several papers on hyperbolic geometry. He shifted to the Department of Pure Mathematics at Calcutta.

  18. Cracking the Codes

    Science.gov (United States)

    Heathcote, Dorothy

    1978-01-01

    Prescribes an attitude that teachers can take to help students "crack the code" of a dramatic work, combining a flexible teaching strategy, the suspension of beliefs or preconceived notions about the work, focusing on the drams's text, and choosing a reading strategy appropriate to the dramatic work. (RL)

  19. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  20. Coded SQUID arrays

    NARCIS (Netherlands)

    Podt, M.; Weenink, J.; Weenink, J.; Flokstra, Jakob; Rogalla, Horst

    2001-01-01

    We report on a superconducting quantum interference device (SQUID) system to read out large arrays of cryogenic detectors. In order to reduce the number of SQUIDs required for an array of these detectors, we used code-division multiplexing. This simplifies the electronics because of a significantly

  1. Execution of OPS5 production systems on a massively parallel machine

    Energy Technology Data Exchange (ETDEWEB)

    Hillyer, B.K.; Shaw, D.E.

    1986-06-01

    In this paper, the authors describe an algorithm for executing production systems expressed in the OPS5 language on a massively parallel multiple-SIMD machine called NON-VON, portions of which are currently under construction at Columbia University. The algorithm, a parallel adaptation of Forgy's Rete Match, has been implemented and tested on an instruction-level simulator. They present a detailed performance analysis, based on the implemented code, for the averaged characteristics of six production systems having an average of 910 inference rules each. The analysis predicts an execution rate of more than 850 production firings per second using hardware comparable in cost to a VAX 11/780. By way of comparison, a LISP-based OPS5 interpreter running on a VAX 11/780 typically fires 1 to 5 rules per second, while a Bliss-based interpreter executes 5 to 12 rules per second.

  2. Reed-Solomon convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Schmale, W

    2005-01-01

    In this paper we will introduce a specific class of cyclic convolutional codes. The construction is based on Reed-Solomon block codes. The algebraic parameters as well as the distance of these codes are determined. This shows that some of these codes are optimal or near optimal.

  3. Causation, constructors and codes.

    Science.gov (United States)

    Hofmeyr, Jan-Hendrik S

    2017-09-13

    Relational biology relies heavily on the enriched understanding of causal entailment that Robert Rosen's formalisation of Aristotle's four causes has made possible, although to date efficient causes and the rehabilitation of final cause have been its main focus. Formal cause has been paid rather scant attention, but, as this paper demonstrates, is crucial to our understanding of many types of processes, not necessarily biological. The graph-theoretic relational diagram of a mapping has played a key role in relational biology, and the first part of the paper is devoted to developing an explicit representation of formal cause in the diagram and how it acts in combination with efficient cause to form a mapping. I then use these representations to show how Von Neumann's universal constructor can be cast into a relational diagram in a way that avoids the logical paradox that Rosen detected in his own representation of the constructor in terms of sets and mappings. One aspect that was absent from both Von Neumann's and Rosen's treatments was the necessity of a code to translate the description (the formal cause) of the automaton to be constructed into the construction process itself. A formal definition of codes in general, and organic codes in particular, allows the relational diagram to be extended so as to capture this translation of formal cause into process. The extended relational diagram is used to exemplify causal entailment in a diverse range of processes, such as enzyme action, construction of automata, communication through the Morse code, and ribosomal polypeptide synthesis through the genetic code. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. Autism Spectrum Disorder and intact executive functioning.

    Science.gov (United States)

    Ferrara, R; Ansermet, F; Massoni, F; Petrone, L; Onofri, E; Ricci, P; Archer, T; Ricci, S

    2016-01-01

    Earliest notions concerning autism (Autism Spectrum Disorders, ASD) describe the disturbance in executive functioning. Despite altered definition, executive functioning, expressed as higher cognitive skills required complex behaviors linked to the prefrontal cortex, are defective in autism. Specific difficulties in children presenting autism or verbal disabilities at executive functioning levels have been identified. Nevertheless, the developmental deficit of executive functioning in autism is highly diversified with huge individual variation and may even be absent. The aim of the present study to examine the current standing of intact executive functioning intact in ASD. Analysis of ASD populations, whether high-functioning, Asperger's or autism Broad Phenotype, studied over a range of executive functions including response inhibition, planning, cognitive flexibility, cognitive inhibition, and alerting networks indicates an absence of damage/impairment compared to the typically-developed normal control subjects. These findings of intact executive functioning in ASD subjects provide a strong foundation on which to construct applications for growth environments and the rehabilitation of autistic subjects.

  5. Nurse executive transformational leadership and organizational commitment.

    Science.gov (United States)

    Leach, Linda Searle

    2005-05-01

    To investigate the relationship between nurse executive leadership and organizational commitment among nurses in acute care hospitals. A key challenge for organizations is to maximize the contributions of all workers by cultivating their commitment. Nurse leaders are in a position to influence organizational commitment among nurses. The theoretical constructs underlying this study are the transformational leadership theory and the Etzioni's organizational theory. A cross-sectional, field survey of nurse executives, nurse managers, and staff nurses was conducted to assess nurse executive transformational and transactional leadership and their relationship to organizational commitment. Hypotheses were tested using correlational analysis, and univariate statistics were used to describe the sample. An inverse relationship between nurse executive transformational and transactional leadership and alienative (highly negative) organizational commitment was statistically significant. A positive association was demonstrated between nurse executive leadership and nurse manager leadership. This study supports the effect of nurse executive leadership on nurse manager leadership and on organizational commitment among nurses despite role distance. To the extent that transformational leadership is present, alienative organizational commitment is reduced. This relationship shows the importance of nurse executive leadership in organizational involvement among nurses in the dynamic context of contemporary hospital settings.

  6. Essential idempotents and simplex codes

    Directory of Open Access Journals (Sweden)

    Gladys Chalom

    2017-01-01

    Full Text Available We define essential idempotents in group algebras and use them to prove that every mininmal abelian non-cyclic code is a repetition code. Also we use them to prove that every minimal abelian code is equivalent to a minimal cyclic code of the same length. Finally, we show that a binary cyclic code is simplex if and only if is of length of the form $n=2^k-1$ and is generated by an essential idempotent.

  7. Coding Theory and Projective Spaces

    Science.gov (United States)

    Silberstein, Natalia

    2008-05-01

    The projective space of order n over a finite field F_q is a set of all subspaces of the vector space F_q^{n}. In this work, we consider error-correcting codes in the projective space, focusing mainly on constant dimension codes. We start with the different representations of subspaces in the projective space. These representations involve matrices in reduced row echelon form, associated binary vectors, and Ferrers diagrams. Based on these representations, we provide a new formula for the computation of the distance between any two subspaces in the projective space. We examine lifted maximum rank distance (MRD) codes, which are nearly optimal constant dimension codes. We prove that a lifted MRD code can be represented in such a way that it forms a block design known as a transversal design. The incidence matrix of the transversal design derived from a lifted MRD code can be viewed as a parity-check matrix of a linear code in the Hamming space. We find the properties of these codes which can be viewed also as LDPC codes. We present new bounds and constructions for constant dimension codes. First, we present a multilevel construction for constant dimension codes, which can be viewed as a generalization of a lifted MRD codes construction. This construction is based on a new type of rank-metric codes, called Ferrers diagram rank-metric codes. Then we derive upper bounds on the size of constant dimension codes which contain the lifted MRD code, and provide a construction for two families of codes, that attain these upper bounds. We generalize the well-known concept of a punctured code for a code in the projective space to obtain large codes which are not constant dimension. We present efficient enumerative encoding and decoding techniques for the Grassmannian. Finally we describe a search method for constant dimension lexicodes.

  8. Executive demand highest in marketing, information systems.

    Science.gov (United States)

    Gifford, R D; Davidson, N

    1985-04-16

    The overall comparison of senior executive demand shows that corporate CEOs see a greater need for senior managers during the next year, but both groups concur on the need for more senior executives in the long term. Although the CEOs agree on the increase in demand in marketing/sales and information systems/data processing during each time frame, hospital CEOs will require fewer senior executives in general management and their corporate peer call for fewer planning/corporate development professionals, reflecting the respective changes occurring in both sectors surveyed.

  9. Social inappropriateness, executive control, and aging.

    Science.gov (United States)

    Henry, Julie D; von Hippel, William; Baynes, Kate

    2009-03-01

    Age-related deficits in executive control might lead to socially inappropriate behavior if they compromise the ability to withhold inappropriate responses. Consistent with this possibility, older adults in the current study showed greater social inappropriateness than younger adults--as rated by their peers--and this effect was mediated by deficits in executive control as well as deficits in general cognitive ability. Older adults also responded with greater social inappropriateness to a provocative event in the laboratory, but this effect was unrelated to executive functioning or general cognitive ability. These findings suggest that changes in both social and cognitive factors are important in understanding age-related changes in social behavior.

  10. EMI Execution Service Specification 1.0

    CERN Document Server

    Schuller, B. (JUELICH); Smirnova, O (Lund University); Konstantinov, A. (Oslo University); Skou Andersen, M. (University of Copenhagen); Riedel, M. (JUELICH); Memon, A.S. (JUELICH); Memon, M.S. (JUELICH); Zangrando, L. (INFN); Sgaravatto, M. (INFN); Frizziero, E. (INFN)

    2010-01-01

    This document provides the interface specification, including related data models such as state model, activity description, resource and activity information, of an execution service, matching the needs of the EMI production middleware stack composed of ARC, gLite and UNICORE components. This service therefore is referred to as the EMI Execution Service (or “ES” for short). This document is a continuation of the work previously known as the GENEVA, then AGU (“ARC, gLite UNICORE”), then PGI execution service.

  11. Executive Gender, Competitive Pressures, and Corporate Performance

    DEFF Research Database (Denmark)

    Amore, Mario Daniele; Garofalo, Orsola

    2016-01-01

    We investigate whether the gender of top executives influences a firm’s reaction to competitive pressures. Our empirical approach is based on policy changes that varied the exposure of US banks to competition during the late 1990s. Results suggest that while banks with female executives experience...... significantly higher financial performance under low competition, they tend to underperform when competition increases. At the same time, we find that the presence of female leaders improves the capital stability of banks subject to greater competition. Overall, our study highlights strong interactions between...... executive gender and market structures in the determination of business outcomes....

  12. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...

  13. An Efficient Platform for the Automatic Extraction of Patterns in Native Code

    Directory of Open Access Journals (Sweden)

    Javier Escalada

    2017-01-01

    Full Text Available Different software tools, such as decompilers, code quality analyzers, recognizers of packed executable files, authorship analyzers, and malware detectors, search for patterns in binary code. The use of machine learning algorithms, trained with programs taken from the huge number of applications in the existing open source code repositories, allows finding patterns not detected with the manual approach. To this end, we have created a versatile platform for the automatic extraction of patterns from native code, capable of processing big binary files. Its implementation has been parallelized, providing important runtime performance benefits for multicore architectures. Compared to the single-processor execution, the average performance improvement obtained with the best configuration is 3.5 factors over the maximum theoretical gain of 4 factors.

  14. For Better or for Worse? Positive and Negative Parental Influences on Young Children's Executive Function

    OpenAIRE

    Hughes, Claire Helene; Devine, Rory Thomas

    2017-01-01

    Despite rapidly growing research on parental influences on children's executive function (EF), the uniqueness and specificity of parental predictors and links between adult EF and parenting remain unexamined. This 13-month longitudinal study of 117 parent–child dyads (60 boys; Mage at Time 1 = 3.94 years, SD = 0.53) included detailed observational coding of parent–child interactions and assessed adult and child EF and child verbal ability (VA). Supporting a differentiated view of parental inf...

  15. Non-executive directors in the profit and non-profit sector : A different approach towards governance?

    NARCIS (Netherlands)

    Lückerath – Rovers, M.; Bos, de A.; Quadackers, L.M.

    2009-01-01

    After the recent scandals and the introduction of new corporate governance codes, non-executive directors (NED's) and supervisors have started playing an increasingly important role in providing the ‘checks and balances’ of organizations. Little is known about the way in which NED's fulfill their

  16. Parental Guidance and Children's Executive Function: Working Memory and Planning as Moderators during Joint Problem-Solving

    Science.gov (United States)

    Eason, Sarah H.; Ramani, Geetha B.

    2017-01-01

    Cognitive aspects of children's executive function (EF) were examined as moderators of the effectiveness of parental guidance on children's learning. Thirty-two 5-year-old children and their parents were observed during joint problem-solving. Forms of guidance geared towards cognitive assistance were coded as directive or elaborative, and…

  17. A Fault-oblivious Extreme-scale Execution Environment

    Energy Technology Data Exchange (ETDEWEB)

    Sadayappan, Ponnuswamy [The Ohio State Univ., Columbus, OH (United States)

    2016-08-31

    Exascale computing systems will provide a thousand-fold increase in parallelism and a proportional increase in failure rate relative to today's machines. Systems software for exascale machines must provide the infrastructure to support existing applications while simultaneously enabling efficient execution of new programming models that naturally express dynamic, adaptive, irregular computation; coupled simulations; and massive data analysis in a highly unreliable hardware environment with billions of threads of execution. We propose a new approach to the data and work distribution model provided by system software based on the unifying formalism of an abstract file system. The proposed hierarchical data model provides simple, familiar visibility and access to data structures through the file system hierarchy, while providing fault tolerance through selective redundancy. The hierarchical task model features work queues whose form and organization are represented as file system objects. Data and work are both first class entities. By exposing the relationships between data and work to the runtime system, information is available to optimize execution time and provide fault tolerance. The data distribution scheme provides replication (where desirable and possible) for fault tolerance and efficiency, and it is hierarchical to make it possible to take advantage of locality. The user, tools, and applications, including legacy applications, can interface with the data, work queues, and one another through the abstract file model. This runtime environment will provide multiple interfaces to support traditional Message Passing Interface applications, languages developed under DARPA's High Productivity Computing Systems program, as well as other, experimental programming models. We will validate our runtime system with pilot codes on existing platforms and will use simulation to validate for exascale-class platforms. In this final report, we summarize research

  18. Pegasys: software for executing and integrating analyses of biological sequences.

    Science.gov (United States)

    Shah, Sohrab P; He, David Y M; Sawkins, Jessica N; Druce, Jeffrey C; Quon, Gerald; Lett, Drew; Zheng, Grace X Y; Xu, Tao; Ouellette, B F Francis

    2004-04-19

    We present Pegasys--a flexible, modular and customizable software system that facilitates the execution and data integration from heterogeneous biological sequence analysis tools. The Pegasys system includes numerous tools for pair-wise and multiple sequence alignment, ab initio gene prediction, RNA gene detection, masking repetitive sequences in genomic DNA as well as filters for database formatting and processing raw output from various analysis tools. We introduce a novel data structure for creating workflows of sequence analyses and a unified data model to store its results. The software allows users to dynamically create analysis workflows at run-time by manipulating a graphical user interface. All non-serial dependent analyses are executed in parallel on a compute cluster for efficiency of data generation. The uniform data model and backend relational database management system of Pegasys allow for results of heterogeneous programs included in the workflow to be integrated and exported into General Feature Format for further analyses in GFF-dependent tools, or GAME XML for import into the Apollo genome editor. The modularity of the design allows for new tools to be added to the system with little programmer overhead. The database application programming interface allows programmatic access to the data stored in the backend through SQL queries. The Pegasys system enables biologists and bioinformaticians to create and manage sequence analysis workflows. The software is released under the Open Source GNU General Public License. All source code and documentation is available for download at http://bioinformatics.ubc.ca/pegasys/.

  19. Hardware-Assisted System for Program Execution Security of SOC

    Directory of Open Access Journals (Sweden)

    Wang Xiang

    2016-01-01

    Full Text Available With the rapid development of embedded systems, the systems’ security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus. In addition, with the rapid growth in the number of embedded systems and wide application, followed embedded hardware attacks are also increasing. This paper presents a new hardware assisted security mechanism to protect the program’s code and data, monitoring its normal execution. The mechanism mainly monitors three types of information: the start/end address of the program of basic blocks; the lightweight hash value in basic blocks and address of the next basic block. These parameters are extracted through additional tools running on PC. The information will be stored in the security module. During normal program execution, the security module is designed to compare the real-time state of program with the information in the security module. If abnormal, it will trigger the appropriate security response, suspend the program and jump to the specified location. The module has been tested and validated on the SOPC with OR1200 processor. The experimental analysis shows that the proposed mechanism can defence a wide range of common software and physical attacks with low performance penalties and minimal overheads.

  20. Entanglement-assisted quantum MDS codes constructed from negacyclic codes

    Science.gov (United States)

    Chen, Jianzhang; Huang, Yuanyuan; Feng, Chunhui; Chen, Riqing

    2017-12-01

    Recently, entanglement-assisted quantum codes have been constructed from cyclic codes by some scholars. However, how to determine the number of shared pairs required to construct entanglement-assisted quantum codes is not an easy work. In this paper, we propose a decomposition of the defining set of negacyclic codes. Based on this method, four families of entanglement-assisted quantum codes constructed in this paper satisfy the entanglement-assisted quantum Singleton bound, where the minimum distance satisfies q+1 ≤ d≤ n+2/2. Furthermore, we construct two families of entanglement-assisted quantum codes with maximal entanglement.

  1. Coding vs non-coding: Translatability of short ORFs found in putative non-coding transcripts.

    Science.gov (United States)

    Kageyama, Yuji; Kondo, Takefumi; Hashimoto, Yoshiko

    2011-11-01

    Genome analysis has identified a number of putative non-protein-coding transcripts that do not contain ORFs longer than 100 codons. Although evidence strongly suggests that non-coding RNAs are important in a variety of biological phenomena, the discovery of small peptide-coding mRNAs confirms that some transcripts that have been assumed to be non-coding actually have coding potential. Their abundance and importance in biological phenomena makes the sorting of non-coding RNAs from small peptide-coding mRNAs a key issue in functional genomics. However, validating the coding potential of small peptide-coding RNAs is complicated, because their ORF sequences are usually too short for computational analysis. In this review, we discuss computational and experimental methods for validating the translatability of these non-coding RNAs. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  2. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well...... as conceptions of good governance from other international organizations. While values converge, they are balanced and communicated differently, and seem to some extent to be translated into the national cultures. The set of global public values derived from this analysis include public interest, regime dignity...

  3. Synthetic histone code.

    Science.gov (United States)

    Fischle, Wolfgang; Mootz, Henning D; Schwarzer, Dirk

    2015-10-01

    Chromatin is the universal template of genetic information in all eukaryotic cells. This complex of DNA and histone proteins not only packages and organizes genomes but also regulates gene expression. A multitude of posttranslational histone modifications and their combinations are thought to constitute a code for directing distinct structural and functional states of chromatin. Methods of protein chemistry, including protein semisynthesis, amber suppression technology, and cysteine bioconjugation, have enabled the generation of so-called designer chromatin containing histones in defined and homogeneous modification states. Several of these approaches have matured from proof-of-concept studies into efficient tools and technologies for studying the biochemistry of chromatin regulation and for interrogating the histone code. We summarize pioneering experiments and recent developments in this exciting field of chemical biology. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. Efficient convolutional sparse coding

    Science.gov (United States)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  5. 40 CFR 68.155 - Executive summary.

    Science.gov (United States)

    2010-07-01

    ...) CHEMICAL ACCIDENT PREVENTION PROVISIONS Risk Management Plan § 68.155 Executive summary. The owner or... prevention program and chemical-specific prevention steps; (d) The five-year accident history; (e) The...

  6. Nurse Executive Role Socialization and Occupational Image.

    Science.gov (United States)

    Krugman, Mary Elizabeth

    1990-01-01

    The effects of educational and experiential variables on occupational image were explored through a survey of 640 nurse executives (386 responses). Early socialization as a nurse seems to remain a constant and institutional management climate is another important variable. (JOW)

  7. How to Evaluate Executive Outplacement Services.

    Science.gov (United States)

    Branham, F. Leigh

    1983-01-01

    Discusses ways to evaluate outplacement services that are designed to provide displaced executives with skills assessment, resume development, interview preparation, a place from which to work, and continued training and counseling to ensure a smooth career transition. (JOW)

  8. Local Governments (Executive Offices) Sector (NAICS 921110)

    Science.gov (United States)

    EPA regulatory information for government executive offices, including state implementation plans (SIPs), local emergency planning under EPCRA, drinking water treatment, water supply security, and compliance assistance for boiler & combustion regulations.

  9. 45 beacon: Keith Seitter, Deputy Executive Director

    National Research Council Canada - National Science Library

    Rachel Thomas-Medwid

    2003-01-01

    ... should be open to exploring them. Such an opportunity presented itself to Seitter a little over a decade ago when Richard Hallgren, then executive director of the AMS, asked Seitter to take a leave of absence from his faculty...

  10. Executive Compensation as an Agency Problem

    National Research Council Canada - National Science Library

    Arye Bebchuk, Lucian; Fried, Jesse M

    2003-01-01

    .... Under this approach, the design of executive compensation is viewed not only as an instrument for addressing the agency problem between managers and shareholders but also as part of the agency problem itself...

  11. Executive Coaching Practices in the Adult Workplace

    Science.gov (United States)

    Campone, Francine

    2015-01-01

    This chapter provides an overview of key principles and practices in executive coaching. Coaching is discussed as a reflective learning opportunity and offers the theoretical grounding, strategies, and case studies for each of four key elements of a coaching engagement.

  12. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  13. Hydra Code Release

    OpenAIRE

    Couchman, H. M. P.; Pearce, F. R.; Thomas, P. A.

    1996-01-01

    Comment: A new version of the AP3M-SPH code, Hydra, is now available as a tar file from the following sites; http://coho.astro.uwo.ca/pub/hydra/hydra.html , http://star-www.maps.susx.ac.uk/~pat/hydra/hydra.html . The release now also contains a cosmological initial conditions generator, documentation, an installation guide and installation tests. A LaTex version of the documentation is included here

  14. Adaptive Hybrid Picture Coding.

    Science.gov (United States)

    1983-02-05

    process, namely displacement or motion detection and estimation. DWSPLACEENT AD MOTION Simply stated, motion is defined to be a time series of spatial...regressive model in that the prediction is made with respect to a time series . That is future values of a time series are to be predicted on...B8 - 90. Robbins, John D., and Netravali, Arun N., "Interframe Telivision Coding Using Movement Compensation," Internation Conference on

  15. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  16. Code Modernization of VPIC

    Science.gov (United States)

    Bird, Robert; Nystrom, David; Albright, Brian

    2017-10-01

    The ability of scientific simulations to effectively deliver performant computation is increasingly being challenged by successive generations of high-performance computing architectures. Code development to support efficient computation on these modern architectures is both expensive, and highly complex; if it is approached without due care, it may also not be directly transferable between subsequent hardware generations. Previous works have discussed techniques to support the process of adapting a legacy code for modern hardware generations, but despite the breakthroughs in the areas of mini-app development, portable-performance, and cache oblivious algorithms the problem still remains largely unsolved. In this work we demonstrate how a focus on platform agnostic modern code-development can be applied to Particle-in-Cell (PIC) simulations to facilitate effective scientific delivery. This work builds directly on our previous work optimizing VPIC, in which we replaced intrinsic based vectorisation with compile generated auto-vectorization to improve the performance and portability of VPIC. In this work we present the use of a specialized SIMD queue for processing some particle operations, and also preview a GPU capable OpenMP variant of VPIC. Finally we include a lessons learnt. Work performed under the auspices of the U.S. Dept. of Energy by the Los Alamos National Security, LLC Los Alamos National Laboratory under contract DE-AC52-06NA25396 and supported by the LANL LDRD program.

  17. Topological Code Autotune

    Directory of Open Access Journals (Sweden)

    Austin G. Fowler

    2012-10-01

    Full Text Available Many quantum systems are being investigated in the hope of building a large-scale quantum computer. All of these systems suffer from decoherence, resulting in errors during the execution of quantum gates. Quantum error correction enables reliable quantum computation given unreliable hardware. Unoptimized topological quantum error correction (TQEC, while still effective, performs very suboptimally, especially at low error rates. Hand optimizing the classical processing associated with a TQEC scheme for a specific system to achieve better error tolerance can be extremely laborious. We describe a tool, Autotune, capable of performing this optimization automatically, and give two highly distinct examples of its use and extreme outperformance of unoptimized TQEC. Autotune is designed to facilitate the precise study of real hardware running TQEC, with every quantum gate having a realistic, physics-based error model.

  18. The Design of a Best Execution Market

    OpenAIRE

    Budimir, Miroslav; Holtmann, Carsten V.; Neumann, Dirk G.

    2000-01-01

    The notion of best execution on securities markets is manifold. Best execution has different meanings to different market participants, therefore, it is difficult to find a unique market structure that meets this requirements for all the participants. Traditional market structures are either static or flexible, meaning that an individual market participant has no influence regarding the concrete market structure’s characteristics, like e. g. the price discovery mechanism, trading f...

  19. Executive Compensation and Misconduct: Environmental Harm

    OpenAIRE

    Minor, Dylan Blu

    2016-01-01

    We explore the relationship between managerial incentives and misconduct using the setting of environmental harm. We find that high powered executive compensation can increase the odds of environmental law-breaking by 40-60% and the magnitude of environmental harm by over 100%. We document similar results for the setting of executive compensation and illegal financial accounting. Finally, we outline some managerial and policy implications to blunt these adverse incentive effects.

  20. Marketing the Masters of Executive Management program

    OpenAIRE

    Barrera, Mark A.; Karriker, Timothy W.

    2007-01-01

    MBA Professional Report The purpose of this MBA project was to review the current Masters of Executive Management education curriculum at NPS. An internal analysis of the current program was conducted to fully understand the strategic goals of the program and the existing curriculum. An environmental scan of current and potential military customers was conducted to assess requirements for junior executive education and determine whether the MEM program corresponds with these requiremen...

  1. The assessment of executive functioning in children

    OpenAIRE

    Henry, L.; Bettenay, C.

    2010-01-01

    Background: Executive functioning is increasingly seen as incorporating several component sub-skills and clinical assessments should reflect this complexity. \\ud \\ud Method: Tools for assessing executive functioning in children are reviewed within five key areas, across verbal and visuospatial abilities, with emphasis on batteries of tests. \\ud \\ud Results: There are many appropriate tests for children, although the choice is more limited for those under the age of 8 years. \\ud \\ud Conclusion...

  2. Empowering Muslim Women Though Executive Coaching & Mentoring

    OpenAIRE

    Fadila Grine

    2014-01-01

    This paper examines the role and effect of executive coaching and mentoring on the empowerment of Muslim women and enhancing their levels of contribution. It further substantiates the manner in which executive coaching can accommodate both the nature and needs of Muslim women while further unleashing her respective talents, creativity and skills. The study further highlights the role and significance of coaching in spheres relevant to family, as well as social and career development. This stu...

  3. Management report of the executive board 2005

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This 2005 report of the executive board of the group AREVA provides information on the following five topics: 1 - asset of financial position and performance with the human resources and the environmental report. 2 - general information on the company and share capital. 3 - the regulated agreements. 4 - information regarding executive management and supervisory bodies. 5 - annual general meeting of shareholders of may 2, 2006 and financial statements and notes. (A.L.B.)

  4. Executive Compensation as an Agency Problem

    OpenAIRE

    Lucian A. Bebchuk; Fried, Jesse M.

    2003-01-01

    This paper provides an overview of the main theoretical elements and empirical underpinnings of a "managerial power" approach to executive compensation. Under this approach, the design of executive compensation is viewed not only as an instrument for addressing the agency problem between managers and shareholders but also as part of the agency problem itself. Boards of publicly traded companies with dispersed ownership, we argue, cannot be expected to bargain at arm's length with managers. As...

  5. Executive dysfunction, brain aging, and political leadership.

    Science.gov (United States)

    Fisher, Mark; Franklin, David L; Post, Jerrold M

    2014-01-01

    Decision-making is an essential component of executive function, and a critical skill of political leadership. Neuroanatomic localization studies have established the prefrontal cortex as the critical brain site for executive function. In addition to the prefrontal cortex, white matter tracts as well as subcortical brain structures are crucial for optimal executive function. Executive function shows a significant decline beginning at age 60, and this is associated with age-related atrophy of prefrontal cortex, cerebral white matter disease, and cerebral microbleeds. Notably, age-related decline in executive function appears to be a relatively selective cognitive deterioration, generally sparing language and memory function. While an individual may appear to be functioning normally with regard to relatively obvious cognitive functions such as language and memory, that same individual may lack the capacity to integrate these cognitive functions to achieve normal decision-making. From a historical perspective, global decline in cognitive function of political leaders has been alternatively described as a catastrophic event, a slowly progressive deterioration, or a relatively episodic phenomenon. Selective loss of executive function in political leaders is less appreciated, but increased utilization of highly sensitive brain imaging techniques will likely bring greater appreciation to this phenomenon. Former Israeli Prime Minister Ariel Sharon was an example of a political leader with a well-described neurodegenerative condition (cerebral amyloid angiopathy) that creates a neuropathological substrate for executive dysfunction. Based on the known neuroanatomical and neuropathological changes that occur with aging, we should probably assume that a significant proportion of political leaders over the age of 65 have impairment of executive function.

  6. Statistical Symbolic Execution with Informed Sampling

    Science.gov (United States)

    Filieri, Antonio; Pasareanu, Corina S.; Visser, Willem; Geldenhuys, Jaco

    2014-01-01

    Symbolic execution techniques have been proposed recently for the probabilistic analysis of programs. These techniques seek to quantify the likelihood of reaching program events of interest, e.g., assert violations. They have many promising applications but have scalability issues due to high computational demand. To address this challenge, we propose a statistical symbolic execution technique that performs Monte Carlo sampling of the symbolic program paths and uses the obtained information for Bayesian estimation and hypothesis testing with respect to the probability of reaching the target events. To speed up the convergence of the statistical analysis, we propose Informed Sampling, an iterative symbolic execution that first explores the paths that have high statistical significance, prunes them from the state space and guides the execution towards less likely paths. The technique combines Bayesian estimation with a partial exact analysis for the pruned paths leading to provably improved convergence of the statistical analysis. We have implemented statistical symbolic execution with in- formed sampling in the Symbolic PathFinder tool. We show experimentally that the informed sampling obtains more precise results and converges faster than a purely statistical analysis and may also be more efficient than an exact symbolic analysis. When the latter does not terminate symbolic execution with informed sampling can give meaningful results under the same time and memory limits.

  7. Prison brain? Executive dysfunction in prisoners

    Science.gov (United States)

    Meijers, Jesse; Harte, Joke M.; Jonker, Frank A.; Meynen, Gerben

    2015-01-01

    A better understanding of the functioning of the brain, particularly executive functions, of the prison population could aid in reducing crime rates through the reduction of recidivism rates. Indeed, reoffending appears to be related to executive dysfunction and it is known that executive functions are crucial for self-regulation. In the current paper, studies to executive functions in regular adult prisoners compared to non-offender controls were reviewed. Seven studies were found. Specific executive functions were found to be impaired in the general prison population, i.e., attention and set-shifting, as well as in separate subgroups of violent (i.e., set-shifting and working memory) and non-violent offenders (i.e., inhibition, working memory and problem solving). We conclude that the limited number of studies is remarkable, considering the high impact of this population on society and elaborate on the implications of these specific impairments that were found. Further empirical research is suggested, measuring executive functioning within subjects over time for a group of detainees as well as a control group. PMID:25688221

  8. Metacognition and executive functioning in Elementary School

    Directory of Open Access Journals (Sweden)

    Trinidad García

    Full Text Available This study analyzes differences in metacognitive skills and executive functioning between two groups of students (10-12 years with different levels of metacognitive knowledge (high n = 50, low n = 64. Groups were established based on students' score on a test of knowledge of strategy use. Metacognitive skills were assessed by means of self-report. Students reported the frequency with which they applied these strategies during the phases of planning, execution, and evaluation of learning. Information about student executive functioning was provided by families and teachers, who completed two parallel forms of a behavior rating scale. The results indicated that: a the group with high levels of metacognitive knowledge reported using their metacognitive skills more frequently than their peers in the other group. These differences were statistically significant in the phases of planning and execution; b both family and teachers informed of better levels of executive functioning in the students with high metacognitive knowledge. Statistically significant differences were found in planning, functional memory, focus, and sustained attention. These results show the existence of an association between different levels of metacognitive knowledge, and differences in metacognitive skills and executive functions, and suggest the need to emphasize this set of variables in order to encourage students to acquire increasing levels of control over their learning process.

  9. On Some Ternary LCD Codes

    OpenAIRE

    Darkunde, Nitin S.; Patil, Arunkumar R.

    2018-01-01

    The main aim of this paper is to study $LCD$ codes. Linear code with complementary dual($LCD$) are those codes which have their intersection with their dual code as $\\{0\\}$. In this paper we will give rather alternative proof of Massey's theorem\\cite{8}, which is one of the most important characterization of $LCD$ codes. Let $LCD[n,k]_3$ denote the maximum of possible values of $d$ among $[n,k,d]$ ternary $LCD$ codes. In \\cite{4}, authors have given upper bound on $LCD[n,k]_2$ and extended th...

  10. Design of convolutional tornado code

    Science.gov (United States)

    Zhou, Hui; Yang, Yao; Gao, Hongmin; Tan, Lu

    2017-09-01

    As a linear block code, the traditional tornado (tTN) code is inefficient in burst-erasure environment and its multi-level structure may lead to high encoding/decoding complexity. This paper presents a convolutional tornado (cTN) code which is able to improve the burst-erasure protection capability by applying the convolution property to the tTN code, and reduce computational complexity by abrogating the multi-level structure. The simulation results show that cTN code can provide a better packet loss protection performance with lower computation complexity than tTN code.

  11. Allele coding in genomic evaluation

    DEFF Research Database (Denmark)

    Standen, Ismo; Christensen, Ole Fredslund

    2011-01-01

    this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. \\paragraph*{Results:} Theoretical derivations showed that parameter...... coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being the best. \\paragraph*{Conclusions:} Different allele coding methods lead to the same inference in the marker-based and equivalent models when a fixed...

  12. Polynomial weights and code constructions.

    Science.gov (United States)

    Massey, J. L.; Costello, D. J., Jr.; Justesen, J.

    1973-01-01

    Study of certain polynomials with the 'weight-retaining' property that any linear combination of these polynomials with coefficients in a general finite field has Hamming weight at least as great as that of the minimum-degree polynomial included. This fundamental property is used in applications to Reed-Muller codes, a new class of 'repeated-root' binary cyclic codes, two new classes of binary convolutional codes derived from binary cyclic codes, and two new classes of binary convolutional codes derived from Reed-Solomon codes.

  13. The multidimensional Self-Adaptive Grid code, SAGE, version 2

    Science.gov (United States)

    Davies, Carol B.; Venkatapathy, Ethiraj

    1995-01-01

    This new report on Version 2 of the SAGE code includes all the information in the original publication plus all upgrades and changes to the SAGE code since that time. The two most significant upgrades are the inclusion of a finite-volume option and the ability to adapt and manipulate zonal-matching multiple-grid files. In addition, the original SAGE code has been upgraded to Version 1.1 and includes all options mentioned in this report, with the exception of the multiple grid option and its associated features. Since Version 2 is a larger and more complex code, it is suggested (but not required) that Version 1.1 be used for single-grid applications. This document contains all the information required to run both versions of SAGE. The formulation of the adaption method is described in the first section of this document. The second section is presented in the form of a user guide that explains the input and execution of the code. The third section provides many examples. Successful application of the SAGE code in both two and three dimensions for the solution of various flow problems has proven the code to be robust, portable, and simple to use. Although the basic formulation follows the method of Nakahashi and Deiwert, many modifications have been made to facilitate the use of the self-adaptive grid method for complex grid structures. Modifications to the method and the simple but extensive input options make this a flexible and user-friendly code. The SAGE code can accommodate two-dimensional and three-dimensional, finite-difference and finite-volume, single grid, and zonal-matching multiple grid flow problems.

  14. Runtime Detection of C-Style Errors in UPC Code

    Energy Technology Data Exchange (ETDEWEB)

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  15. Construction of new quantum MDS codes derived from constacyclic codes

    Science.gov (United States)

    Taneja, Divya; Gupta, Manish; Narula, Rajesh; Bhullar, Jaskaran

    Obtaining quantum maximum distance separable (MDS) codes from dual containing classical constacyclic codes using Hermitian construction have paved a path to undertake the challenges related to such constructions. Using the same technique, some new parameters of quantum MDS codes have been constructed here. One set of parameters obtained in this paper has achieved much larger distance than work done earlier. The remaining constructed parameters of quantum MDS codes have large minimum distance and were not explored yet.

  16. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  17. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  18. New Code Matched Interleaver for Turbo Codes with Short Frames

    Directory of Open Access Journals (Sweden)

    LAZAR, G. A.

    2010-02-01

    Full Text Available Turbo codes are a parallel concatenation of two or more convolutional codes, separated by interleavers, therefore their performance is not influenced just by the constituent encoders, but also by the interleaver. For short frame turbo codes, the selection of a proper interleaver becomes critical. This paper presents a new algorithm of obtaining a code matched interleaver leading to a very high minimum distance and improved performance.

  19. The St.Gallen Executive Education Report 2016: Linking Strategy to Executive Learning and Development Effectiveness

    OpenAIRE

    Ruigrok, Winfried; Guttmann, Georg

    2016-01-01

    Many large companies have claimed that people are their greatest asset. A new study by the University of St.Gallen shows that while senior managers rank executive Learning & Development (L&D) among the most critical success factors for long-term success, the vast majority of them consider executive L&D to be ineffective in their own firms. The second edition of the St.Gallen Executive Education Report (SEER) analyses what sets firms with high executive L&D effectiveness apart from less succes...

  20. Code Flows : Visualizing Structural Evolution of Source Code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual

  1. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    P. C. Catherine. K. M. S Soyjaudah. Department of Electrical and Electronics Engineering ... in the 1960's, Gallager in his PhD thesis worked on low-density parity-check (LDPC) codes (Gallager 1963). ..... In any case however, it is hoped that the ideas behind TG codes will help in the development of future intelligent coding ...

  2. Code flows : Visualizing structural evolution of source code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual

  3. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    This work proposes a blend of the two technologies, yielding a code that we nicknamed Turbo-Gallager or TG Code. The code has additional “intelligence” compared to its parents. It detects and corrects the so-called “undetected errors” and recovers from individual decoder failure by making use of a network of decoders.

  4. Micromagnetic Code Development of Advanced Magnetic Structures Final Report CRADA No. TC-1561-98

    Energy Technology Data Exchange (ETDEWEB)

    Cerjan, Charles J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Shi, Xizeng [Read-Rite Corporation, Fremont, CA (United States)

    2017-11-09

    The specific goals of this project were to: Further develop the previously written micromagnetic code DADIMAG (DOE code release number 980017); Validate the code. The resulting code was expected to be more realistic and useful for simulations of magnetic structures of specific interest to Read-Rite programs. We also planned to further the code for use in internal LLNL programs. This project complemented LLNL CRADA TC-840-94 between LLNL and Read-Rite, which allowed for simulations of the advanced magnetic head development completed under the CRADA. TC-1561-98 was effective concurrently with LLNL non-exclusive copyright license (TL-1552-98) to Read-Rite for DADIMAG Version 2 executable code.

  5. The discrete-dipole-approximation code ADDA: capabilities and known limitations

    NARCIS (Netherlands)

    Yurkin, M.A.; Hoekstra, A.G.

    2011-01-01

    The open-source code ADDA is described, which implements the discrete dipole approximation (DDA), a method to simulate light scattering by finite 3D objects of arbitrary shape and composition. Besides standard sequential execution, ADDA can run on a multiprocessor distributed-memory system,

  6. (Submitted) Scalable quantum circuit and control for a superconducting surface code

    NARCIS (Netherlands)

    Versluis, R.; Poletto, S.; Khammassi, N.; Haider, N.; Michalak, D.J.; Bruno, A.; Bertels, K.; DiCarlo, L.

    2016-01-01

    We present a scalable scheme for executing the error-correction cycle of a monolithic surface-code fabric composed of fast-flux-tuneable transmon qubits with nearest-neighbor coupling. An eight-qubit unit cell forms the basis for repeating both the quantum hardware and coherent control, enabling

  7. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  8. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  9. Executive Control of Attention in Narcolepsy

    Science.gov (United States)

    Bayard, Sophie; Croisier Langenier, Muriel; Cochen De Cock, Valérie; Scholz, Sabine; Dauvilliers, Yves

    2012-01-01

    Background Narcolepsy with cataplexy (NC) is a disabling sleep disorder characterized by early loss of hypocretin neurons that project to areas involved in the attention network. We characterized the executive control of attention in drug-free patients with NC to determine whether the executive deficits observed in patients with NC are specific to the disease itself or whether they reflect performance changes due to the severity of excessive daytime sleepiness. Methodology Twenty-two patients with NC compared to 22 patients with narcolepsy without cataplexy (NwC) matched for age, gender, intellectual level, objective daytime sleepiness and number of sleep onset REM periods (SOREMPs) were studied. Thirty-two matched healthy controls were included. All participants underwent a standardized interview, completed questionnaires, and neuropsychological tests. All patients underwent a polysomnography followed by multiple sleep latency tests (MSLT), with neuropsychological evaluation performed the same day between MSLT sessions. Principal Findings Irrespective of diagnosis, patients reported higher self-reported attentional complaints associated with the intensity of depressive symptoms. Patients with NC performed slower and more variably on simple reaction time tasks than patients with NwC, who did not differ from controls. Patients with NC and NwC generally performed slower, reacted more variably, and made more errors than controls on executive functioning tests. Individual profile analyses showed a clear heterogeneity of the severity of executive deficit. This severity was related to objective sleepiness, higher number of SOREMPs on the MSLT, and lower intelligence quotient. The nature and severity of the executive deficits were unrelated to NC and NwC diagnosis. Conclusions We demonstrated that drug-free patients with NC and NwC complained of attention deficit, with altered executive control of attention being explained by the severity of objective sleepiness and

  10. Executive control of attention in narcolepsy.

    Directory of Open Access Journals (Sweden)

    Sophie Bayard

    Full Text Available BACKGROUND: Narcolepsy with cataplexy (NC is a disabling sleep disorder characterized by early loss of hypocretin neurons that project to areas involved in the attention network. We characterized the executive control of attention in drug-free patients with NC to determine whether the executive deficits observed in patients with NC are specific to the disease itself or whether they reflect performance changes due to the severity of excessive daytime sleepiness. METHODOLOGY: Twenty-two patients with NC compared to 22 patients with narcolepsy without cataplexy (NwC matched for age, gender, intellectual level, objective daytime sleepiness and number of sleep onset REM periods (SOREMPs were studied. Thirty-two matched healthy controls were included. All participants underwent a standardized interview, completed questionnaires, and neuropsychological tests. All patients underwent a polysomnography followed by multiple sleep latency tests (MSLT, with neuropsychological evaluation performed the same day between MSLT sessions. PRINCIPAL FINDINGS: Irrespective of diagnosis, patients reported higher self-reported attentional complaints associated with the intensity of depressive symptoms. Patients with NC performed slower and more variably on simple reaction time tasks than patients with NwC, who did not differ from controls. Patients with NC and NwC generally performed slower, reacted more variably, and made more errors than controls on executive functioning tests. Individual profile analyses showed a clear heterogeneity of the severity of executive deficit. This severity was related to objective sleepiness, higher number of SOREMPs on the MSLT, and lower intelligence quotient. The nature and severity of the executive deficits were unrelated to NC and NwC diagnosis. CONCLUSIONS: We demonstrated that drug-free patients with NC and NwC complained of attention deficit, with altered executive control of attention being explained by the severity of objective

  11. The path of code linting

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  12. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  13. Authorship Attribution of Source Code

    Science.gov (United States)

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  14. Coded nanoscale self-assembly

    Indian Academy of Sciences (India)

    the number of starting particles. Figure 6. Coded self-assembly results in specific shapes. When the con- stituent particles are coded to only combine in a certain defined rules, it al- ways manages to generate the same shape. The simplest case of linear coding with multiseed option is presented here. in place the resultant ...

  15. Strongly-MDS convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Rosenthal, J; Smarandache, R

    Maximum-distance separable (MDS) convolutional codes have the property that their free distance is maximal among all codes of the same rate and the same degree. In this paper, a class of MDS convolutional codes is introduced whose column distances reach the generalized Singleton bound at the

  16. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...

  17. Coding Issues in Grounded Theory

    Science.gov (United States)

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  18. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  19. Time-Varying Space-Only Codes for Coded MIMO

    CERN Document Server

    Duyck, Dieter; Takawira, Fambirai; Boutros, Joseph J; Moeneclaey, Marc

    2012-01-01

    Multiple antenna (MIMO) devices are widely used to increase reliability and information bit rate. Optimal error rate performance (full diversity and large coding gain), for unknown channel state information at the transmitter and for maximal rate, can be achieved by approximately universal space-time codes, but comes at a price of large detection complexity, infeasible for most practical systems. We propose a new coded modulation paradigm: error-correction outer code with space-only but time-varying precoder (as inner code). We refer to the latter as Ergodic Mutual Information (EMI) code. The EMI code achieves the maximal multiplexing gain and full diversity is proved in terms of the outage probability. Contrary to most of the literature, our work is not based on the elegant but difficult classical algebraic MIMO theory. Instead, the relation between MIMO and parallel channels is exploited. The theoretical proof of full diversity is corroborated by means of numerical simulations for many MIMO scenarios, in te...

  20. 8 CFR 1003.0 - Executive Office for Immigration Review.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Executive Office for Immigration Review. 1003.0 Section 1003.0 Aliens and Nationality EXECUTIVE OFFICE FOR IMMIGRATION REVIEW, DEPARTMENT OF JUSTICE GENERAL PROVISIONS EXECUTIVE OFFICE FOR IMMIGRATION REVIEW § 1003.0 Executive Office for...

  1. 5 CFR 412.401 - Continuing executive development.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Continuing executive development. 412.401... SUPERVISORY, MANAGEMENT, AND EXECUTIVE DEVELOPMENT Executive Development § 412.401 Continuing executive development. (a) Each agency must establish a program or programs for the continuing development of its senior...

  2. 17 CFR 229.402 - (Item 402) Executive compensation.

    Science.gov (United States)

    2010-04-01

    ... (xv) The role of executive officers in determining executive compensation. Instructions to Item 402(b... executive officer during the fiscal year covered (column (c)); (iv) The dollar value of bonus (cash and non... election of a named executive officer under which stock, equity-based or other forms of non-cash...

  3. Genetic code for sine

    Science.gov (United States)

    Abdullah, Alyasa Gan; Wah, Yap Bee

    2015-02-01

    The computation of the approximate values of the trigonometric sines was discovered by Bhaskara I (c. 600-c.680), a seventh century Indian mathematician and is known as the Bjaskara's I's sine approximation formula. The formula is given in his treatise titled Mahabhaskariya. In the 14th century, Madhava of Sangamagrama, a Kerala mathematician astronomer constructed the table of trigonometric sines of various angles. Madhava's table gives the measure of angles in arcminutes, arcseconds and sixtieths of an arcsecond. The search for more accurate formulas led to the discovery of the power series expansion by Madhava of Sangamagrama (c.1350-c. 1425), the founder of the Kerala school of astronomy and mathematics. In 1715, the Taylor series was introduced by Brook Taylor an English mathematician. If the Taylor series is centered at zero, it is called a Maclaurin series, named after the Scottish mathematician Colin Maclaurin. Some of the important Maclaurin series expansions include trigonometric functions. This paper introduces the genetic code of the sine of an angle without using power series expansion. The genetic code using square root approach reveals the pattern in the signs (plus, minus) and sequence of numbers in the sine of an angle. The square root approach complements the Pythagoras method, provides a better understanding of calculating an angle and will be useful for teaching the concepts of angles in trigonometry.

  4. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  5. [Executive functions and high intellectual capacity].

    Science.gov (United States)

    Sastre-Riba, S; Viana-Saenz, L

    2016-01-01

    High intellectual capacity is a process in development in which the executive functions (inhibition, working memory and flexibility) play a role in the optimal manifestation of their potential. To explore the effectiveness of executive functioning among the profiles of high capacity giftedness and (convergent or divergent) talent. The study examines 78 children with high intellectual capacity aged 8-15 years with profiles of giftedness (n = 21), convergent talent (n = 39) or divergent talent (n = 18). A series of tests were administered including the Battery of Differential and General Aptitudes or the Differential Aptitude Test (depending on the age) and the Torrance Test of Creative Thinking, as well as the Wisconsin Card Sorting Test, the Corsi Test and the Go-No Go Test by means of the Psychology Experiment Building Language platform. A multivariate analysis of variance was performed to determine the relationship between executive function and intellectual profile. Significant differences are obtained between the profiles studied and the executive functions of flexibility and inhibition, but not in working memory. Working memory is similar across the profiles studied, but the complex profile of giftedness displays better executive functioning, with greater flexibility and inhibition than talent, especially of the convergent type.

  6. Musical expertise, bilingualism, and executive functioning.

    Science.gov (United States)

    Bialystok, Ellen; Depape, Anne-Marie

    2009-04-01

    The authors investigated whether intensive musical experience leads to enhancements in executive processing, as has been shown for bilingualism. Young adults who were bilinguals, musical performers (instrumentalists or vocalists), or neither completed 3 cognitive measures and 2 executive function tasks based on conflict. Both executive function tasks included control conditions that assessed performance in the absence of conflict. All participants performed equivalently for the cognitive measures and the control conditions of the executive function tasks, but performance diverged in the conflict conditions. In a version of the Simon task involving spatial conflict between a target cue and its position, bilinguals and musicians outperformed monolinguals, replicating earlier research with bilinguals. In a version of the Stroop task involving auditory and linguistic conflict between a word and its pitch, the musicians performed better than the other participants. Instrumentalists and vocalists did not differ on any measure. Results demonstrate that extended musical experience enhances executive control on a nonverbal spatial task, as previously shown for bilingualism, but also enhances control in a more specialized auditory task, although the effect of bilingualism did not extend to that domain. (c) 2009 APA, all rights reserved.

  7. Building the blocks of executive functioning: differentiating early developing processes contributing to executive functioning skills

    NARCIS (Netherlands)

    Mandell, D.J.; Ward, S.E.

    2011-01-01

    The neural processes that underlie executive function begin to develop in infancy. However, it is unclear how the behavior manifested by these processes are related or if they can be differentiated early in development. This study seeks to examine early emerging executive functioning skills in

  8. Executive functioning in college students: Evaluation of the Dutch Executive Function Index (EFI-NL)

    NARCIS (Netherlands)

    Janssen, G.T.L.; Mey, H.R.A. de; Egger, J.I.M.

    2009-01-01

    The Executive Function Index (EFI) is a short self-report questionnaire for the assessment of executive functions (EF) as encountered in daily life. The aim of the present study is to examine the psychometric properties of the Dutch version of the EFI (EFI-NL) in a college student sample (N = 376).

  9. Two-terminal video coding.

    Science.gov (United States)

    Yang, Yang; Stanković, Vladimir; Xiong, Zixiang; Zhao, Wei

    2009-03-01

    Following recent works on the rate region of the quadratic Gaussian two-terminal source coding problem and limit-approaching code designs, this paper examines multiterminal source coding of two correlated, i.e., stereo, video sequences to save the sum rate over independent coding of both sequences. Two multiterminal video coding schemes are proposed. In the first scheme, the left sequence of the stereo pair is coded by H.264/AVC and used at the joint decoder to facilitate Wyner-Ziv coding of the right video sequence. The first I-frame of the right sequence is successively coded by H.264/AVC Intracoding and Wyner-Ziv coding. An efficient stereo matching algorithm based on loopy belief propagation is then adopted at the decoder to produce pixel-level disparity maps between the corresponding frames of the two decoded video sequences on the fly. Based on the disparity maps, side information for both motion vectors and motion-compensated residual frames of the right sequence are generated at the decoder before Wyner-Ziv encoding. In the second scheme, source splitting is employed on top of classic and Wyner-Ziv coding for compression of both I-frames to allow flexible rate allocation between the two sequences. Experiments with both schemes on stereo video sequences using H.264/AVC, LDPC codes for Slepian-Wolf coding of the motion vectors, and scalar quantization in conjunction with LDPC codes for Wyner-Ziv coding of the residual coefficients give a slightly lower sum rate than separate H.264/AVC coding of both sequences at the same video quality.

  10. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  11. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  12. Approach to the development of a multiplatform code for numerical simulation of compressible flows

    Science.gov (United States)

    Kashkovsky, A. V.; Shershnev, A. A.; Kudryavtsev, A. N.; Khotyanovsky, D. V.

    2017-10-01

    The possibility of adaptation of a Multi-GPU, CUDA-based code for parallel computations on CPUs with the OpenMP technology is considered. By applying macros of the preprocessor of the C++ language and compiler options, the source code can be translated the GPU/CUDA, CPU/OpenMP, and Xeon Phi/OpenMP executable files. The operability of this technology is illustrated by an example of adaptation of the HyCFS code. The computational efficiency for various platforms is compared.

  13. Scaling Concolic Execution of Binary Programs for Security Applications

    Science.gov (United States)

    2013-08-01

    execution. We also study unexplored applications of concolic execution in security-related problems such as malware genealogy and protocol model inference...tions of concolic execution. We also study unexplored applications of con- colic execution in security-related problems such as malware genealogy and...discovery and signature generation. We then study further unexplored uses of concolic execution in security-related problems such as malware genealogy

  14. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory text to algebraic coding theory. In the first chapter, you'll gain inside knowledge of coding fundamentals, which is essential for a deeper understanding of state-of-the-art coding systems. This book is a quick reference for those who are unfamiliar with this topic, as well as for use with specific applications such as cryptography and communication. Linear error-correcting block codes through elementary principles span eleven chapters of the text. Cyclic codes, some finite field algebra, Goppa codes, algebraic decoding algorithms, and applications in public-key cryptography and secret-key cryptography are discussed, including problems and solutions at the end of each chapter. Three appendices cover the Gilbert bound and some related derivations, a derivation of the Mac- Williams' identities based on the probability of undetected error, and two important tools for algebraic decoding-namely, the finite field Fourier transform and the Euclidean algorithm f...

  15. Chief nurse executives need contemporary informatics competencies.

    Science.gov (United States)

    Simpson, Roy L

    2013-01-01

    Using the Informatics Organizing Research Model (Effken, 2003) to add context to the information gleaned from ethnographic interviews of seven chief nurse executives (CNEs) currently leading integrated delivery systems, the author concluded nurse executives can no longer depend exclusively on American Organization of Nurse Executives (AONE) competencies as they outsource their responsibility for information technology knowledge to nurse informaticians, chief information officers, and physicians. Although AONE sets out a specific list of recommended information technology competencies for system CNEs, innovative nursing practice demands a more strategic, broader level of knowledge. This broader competency centers on the reality of CNEs being charged with creating and implementing a patient-centered vision that drives health care organizations' investment in technology. A new study identifies and validates the gaps between selected CNEs' self-identified informatics competencies and those set out by AONE (Simpson, 2012).

  16. Career Patterns of Supply Chain Executives

    DEFF Research Database (Denmark)

    Flöthmann, Christoph; Hoberg, Kai

    2017-01-01

    This exploratory study analyzes the careers of 307 supply chain executives (SCEs). Motivated by career theory, our findings create new knowledge about the educational backgrounds and career paths that lead to SCE positions. Based on an optimal matching analysis, we are able to distinguish among six...... career patterns for SCEs. They differ in terms of the individuals' previous professional experience, educational background, and the time they needed to arrive in an executive position. By characterizing the backgrounds and career paths of SCEs, we show that supply chain management (SCM) is truly a cross......-functional profession. Our findings suggest that previous staff responsibility appears to be a more important hiring criterion than extensive SCM experience. While 56% of the executives had prior staff responsibility, only 12% of the cumulated careers were actually spent inside the SCM function....

  17. Longitudinal antecedents of executive function in preschoolers.

    Science.gov (United States)

    Conway, Anne; Stifter, Cynthia A

    2012-01-01

    Despite an extensive history underscoring the role of social processes and child contributions to the development of executive functions (C. Lewis & J. Carpendale, 2009; L. S. Vygotsky, 1987), research on these relations is sparse. To address this gap, 68 mother-child dyads were examined to determine whether maternal attention-directing behaviors (attention maintaining, attention redirection) and toddlers' temperament predicted executive processes during preschool (mean age = 4.5 years, SD = 0.46)-delay and conflict inhibition. Maternal attention maintaining was associated with high levels of conflict inhibition for inhibited and exuberant children, whereas attention redirection was associated with low levels of delay and conflict inhibition for inhibited children. Therefore, maternal attention-directing behaviors may enhance the development of executive functions but only for children with inhibited and exuberant temperaments. © 2012 The Authors. Child Development © 2012 Society for Research in Child Development, Inc.

  18. Empowering Muslim Women Though Executive Coaching & Mentoring

    Directory of Open Access Journals (Sweden)

    Fadila Grine

    2014-06-01

    Full Text Available This paper examines the role and effect of executive coaching and mentoring on the empowerment of Muslim women and enhancing their levels of contribution. It further substantiates the manner in which executive coaching can accommodate both the nature and needs of Muslim women while further unleashing her respective talents, creativity and skills. The study further highlights the role and significance of coaching in spheres relevant to family, as well as social and career development. This study highlights the use of the strategic technique for personal and leadership development set to explore talents, leaders and implicit abilities. Moreover, it exhibits the flexibility of self-coaching and its appropriateness for Muslim women, especially concerning self-development, which in turn influences social and institutional development. This inquiry highlights a number of practical results which emphasizes the viability and efficacy of executive coaching on personal and institutional levels as far as the making of better world for Muslim women is concerned.

  19. Execution Models for Choreographies and Cryptoprotocols

    Directory of Open Access Journals (Sweden)

    Marco Carbone

    2010-02-01

    Full Text Available A choreography describes a transaction in which several principals interact. Since choreographies frequently describe business processes affecting substantial assets, we need a security infrastructure in order to implement them safely. As part of a line of work devoted to generating cryptoprotocols from choreographies, we focus here on the execution models suited to the two levels. We give a strand-style semantics for choreographies, and propose a special execution model in which choreography-level messages are faithfully delivered exactly once. We adapt this model to handle multiparty protocols in which some participants may be compromised. At level of cryptoprotocols, we use the standard Dolev-Yao execution model, with one alteration. Since many implementations use a "nonce cache" to discard multiply delivered messages, we provide a semantics for at-most-once delivery.

  20. Peripheral coding of taste

    Science.gov (United States)

    Liman, Emily R.; Zhang, Yali V.; Montell, Craig

    2014-01-01

    Five canonical tastes, bitter, sweet, umami (amino acid), salty and sour (acid) are detected by animals as diverse as fruit flies and humans, consistent with a near universal drive to consume fundamental nutrients and to avoid toxins or other harmful compounds. Surprisingly, despite this strong conservation of basic taste qualities between vertebrates and invertebrates, the receptors and signaling mechanisms that mediate taste in each are highly divergent. The identification over the last two decades of receptors and other molecules that mediate taste has led to stunning advances in our understanding of the basic mechanisms of transduction and coding of information by the gustatory systems of vertebrates and invertebrates. In this review, we discuss recent advances in taste research, mainly from the fly and mammalian systems, and we highlight principles that are common across species, despite stark differences in receptor types. PMID:24607224

  1. Code des baux 2018

    CERN Document Server

    Vial-Pedroletti, Béatrice; Kendérian, Fabien; Chavance, Emmanuelle; Coutan-Lapalus, Christelle

    2017-01-01

    Le code des baux 2018 vous offre un contenu extrêmement pratique, fiable et à jour au 1er août 2017. Cette 16e édition intègre notamment : le décret du 27 juillet 2017 relatif à l’évolution de certains loyers dans le cadre d’une nouvelle location ou d’un renouvellement de bail, pris en application de l’article 18 de la loi n° 89-462 du 6 juillet 1989 ; la loi du 27 janvier 2017 relative à l’égalité et à la citoyenneté ; la loi du 9 décembre 2016 relative à la transparence, à la lutte contre la corruption et à la modernisation de la vie économique ; la loi du 18 novembre 2016 de modernisation de la justice du xxie siècle

  2. [Neural codes for perception].

    Science.gov (United States)

    Romo, R; Salinas, E; Hernández, A; Zainos, A; Lemus, L; de Lafuente, V; Luna, R

    This article describes experiments designed to show the neural codes associated with the perception and processing of tactile information. The results of these experiments have shown the neural activity correlated with tactile perception. The neurones of the primary somatosensory cortex (S1) represent the physical attributes of tactile perception. We found that these representations correlated with tactile perception. By means of intracortical microstimulation we demonstrated the causal relationship between S1 activity and tactile perception. In the motor areas of the frontal lobe is to be found the connection between sensorial and motor representation whilst decisions are being taken. S1 generates neural representations of the somatosensory stimuli which seen to be sufficient for tactile perception. These neural representations are subsequently processed by central areas to S1 and seem useful in perception, memory and decision making.

  3. Code-labelling

    DEFF Research Database (Denmark)

    Spangsberg, Thomas Hvid; Brynskov, Martin

    in programming education collected in an Action Research cycle. The results support the use of a structural approach to teaching programming to this target audience; particularly, the translation-grammar method seems to integrate well with programming education. The paper also explores the potential underlying......The code-labelling exercise is an attempt to apply natural language education techniques for solving the challenge of teaching introductory programming to non-STEM novices in higher education. This paper presents findings from a study exploring the use of natural language teaching techniques...... reasons. It seems the exercise invokes an assimilation of student's existing cognitive schemata and supports a deep-learning experience. The exercise is an invitation to other teachers to create further iterations to improve their own teaching. It also seeks to enrich the portfolio of teaching activities...

  4. Transionospheric Propagation Code (TIPC)

    Science.gov (United States)

    Roussel-Dupre, Robert; Kelley, Thomas A.

    1990-10-01

    The Transionospheric Propagation Code is a computer program developed at Los Alamos National Lab to perform certain tasks related to the detection of VHF signals following propagation through the ionosphere. The code is written in FORTRAN 77, runs interactively and was designed to be as machine independent as possible. A menu format in which the user is prompted to supply appropriate parameters for a given task has been adopted for the input while the output is primarily in the form of graphics. The user has the option of selecting from five basic tasks, namely transionospheric propagation, signal filtering, signal processing, delta times of arrival (DTOA) study, and DTOA uncertainty study. For the first task a specified signal is convolved against the impulse response function of the ionosphere to obtain the transionospheric signal. The user is given a choice of four analytic forms for the input pulse or of supplying a tabular form. The option of adding Gaussian-distributed white noise of spectral noise to the input signal is also provided. The deterministic ionosphere is characterized to first order in terms of a total electron content (TEC) along the propagation path. In addition, a scattering model parameterized in terms of a frequency coherence bandwidth is also available. In the second task, detection is simulated by convolving a given filter response against the transionospheric signal. The user is given a choice of a wideband filter or a narrowband Gaussian filter. It is also possible to input a filter response. The third task provides for quadrature detection, envelope detection, and three different techniques for time-tagging the arrival of the transionospheric signal at specified receivers. The latter algorithms can be used to determine a TEC and thus take out the effects of the ionosphere to first order. Task four allows the user to construct a table of DTOAs vs TECs for a specified pair of receivers.

  5. Galois LCD Codes over Finite Fields

    OpenAIRE

    Liu, Xiusheng; Fan, Yun; Liu, Hualu

    2017-01-01

    In this paper, we study the complementary dual codes in more general setting (which are called Galois LCD codes) by a uniform method. A necessary and sufficient condition for linear codes to be Galois LCD codes is determined, and constacyclic codes to be Galois LCD codes are characterized. Some illustrative examples which constacyclic codes are Galois LCD MDS codes are provided as well. In particular, we study Hermitian LCD constacyclic codes. Finally, we present a construction of a class of ...

  6. Quantum Quasi-Cyclic LDPC Codes

    OpenAIRE

    Hagiwara, Manabu; Imai, Hideki

    2007-01-01

    In this paper, a construction of a pair of "regular" quasi-cyclic LDPC codes as ingredient codes for a quantum error-correcting code is proposed. That is, we find quantum regular LDPC codes with various weight distributions. Furthermore our proposed codes have lots of variations for length, code rate. These codes are obtained by a descrete mathematical characterization for model matrices of quasi-cyclic LDPC codes. Our proposed codes achieve a bounded distance decoding (BDD) bound, or known a...

  7. Investigating executive functions in children with severe speech and movement disorders using structured tasks.

    Science.gov (United States)

    Stadskleiv, Kristine; von Tetzchner, Stephen; Batorowicz, Beata; van Balkom, Hans; Dahlgren-Sandberg, Annika; Renner, Gregor

    2014-01-01

    Executive functions are the basis for goal-directed activity and include planning, monitoring, and inhibition, and language seems to play a role in the development of these functions. There is a tradition of studying executive function in both typical and atypical populations, and the present study investigates executive functions in children with severe speech and motor impairments who are communicating using communication aids with graphic symbols, letters, and/or words. There are few neuropsychological studies of children in this group and little is known about their cognitive functioning, including executive functions. It was hypothesized that aided communication would tax executive functions more than speech. Twenty-nine children using communication aids and 27 naturally speaking children participated. Structured tasks resembling everyday activities, where the action goals had to be reached through communication with a partner, were used to get information about executive functions. The children (a) directed the partner to perform actions like building a Lego tower from a model the partner could not see and (b) gave information about an object without naming it to a person who had to guess what object it was. The executive functions of planning, monitoring, and impulse control were coded from the children's on-task behavior. Both groups solved most of the tasks correctly, indicating that aided communicators are able to use language to direct another person to do a complex set of actions. Planning and lack of impulsivity was positively related to task success in both groups. The aided group completed significantly fewer tasks, spent longer time and showed more variation in performance than the comparison group. The aided communicators scored lower on planning and showed more impulsivity than the comparison group, while both groups showed an equal degree of monitoring of the work progress. The results are consistent with the hypothesis that aided language tax

  8. Enhancing Writing through Strengthened Executive Function

    Directory of Open Access Journals (Sweden)

    Russell Jay Hendel

    2014-10-01

    Full Text Available We explore aspects of essay writing requiring high-level organizational capacity and executive function. The literature supports the approach that specific and focused writing-skill mastery leads to reduced anxiety and increased self-efficacy which correlates with improved writing skills. Although essay writing is a complex multi-dimensional task, two particular strategies, tree-diagram and reference methods, specifically address the organizational skills characteristic of executive function. The tree and reference methods presented in this paper address the flow of information, not content, and consequently, the methods presented in this paper apply to mathematics and English as well as to K-12 and college level.

  9. Reconfigurable manufacturing execution system for pipe cutting

    Science.gov (United States)

    Yin, Y. H.; Xie, J. Y.

    2011-08-01

    This article presents a reconfigurable manufacturing execution system (RMES) filling the gap between enterprise resource planning and resource layer for pipe-cutting production with mass customisation and rapid adaptation to dynamic market, which consists of planning and scheduling layer and executive control layer. Starting from customer's task and process requirements, the cutting trajectories are planned under generalised mathematical model able to reconfigure in accordance with various intersecting types' joint, and all tasks are scheduled by nesting algorithm to maximise the utilisation rate of rough material. This RMES for pipe cutting has been effectively implemented in more than 100 companies.

  10. LDGM Codes for Channel Coding and Joint Source-Channel Coding of Correlated Sources

    Directory of Open Access Journals (Sweden)

    Javier Garcia-Frias

    2005-05-01

    Full Text Available We propose a coding scheme based on the use of systematic linear codes with low-density generator matrix (LDGM codes for channel coding and joint source-channel coding of multiterminal correlated binary sources. In both cases, the structures of the LDGM encoder and decoder are shown, and a concatenated scheme aimed at reducing the error floor is proposed. Several decoding possibilities are investigated, compared, and evaluated. For different types of noisy channels and correlation models, the resulting performance is very close to the theoretical limits.

  11. Executive functioning: a scoping review of the occupational therapy literature.

    Science.gov (United States)

    Cramm, Heidi A; Krupa, Terry M; Missiuna, Cheryl A; Lysaght, Rosemary M; Parker, Kevin H

    2013-06-01

    Increasingly recognized as an important factor in the performance of complex, goal-directed tasks, executive functioning is understood in different ways across disciplines. The aim was to explore the ways in which executive functioning is conceptualized, discussed, described, and implied in the occupational therapy literature. A scoping review of the occupational therapy literature was conducted following Levac, Colquhoun, and O'Brien's (2010) recommended methodology. Executive functioning is described both as a set of performance component skills or processes and as the executive occupational performance inherent in complex occupations. Executive functioning is implicit in occupational performance and engagement, and some health conditions seem to be commonly associated with impaired executive functioning. Assessing executive functioning requires dynamic occupation- and performance-based assessment. Interventions targeting executive functioning are grounded in metacognitive approaches. Executive functioning is a complex construct that is conceptualized with considerable variance within the occupational therapy literature, creating barriers to effective service delivery.

  12. Study of Dependencies in Executions of E-Contract Activities

    Science.gov (United States)

    Vidyasankar, K.; Krishna, P. Radha; Karlapalem, Kamalakar

    An e-contract is a contract modeled, specified, executed, controlled and monitored by a software system. A contract is a legal agreement involving parties, activities, clauses and payments. The goals of an e-contract include precise specification of the activities of the contract, mapping them into deployable workflows, and providing transactional support in their execution. Activities in a contract are generally complex and interdependent. They may be executed by different parties autonomously and in a loosely coupled fashion. They differ from database transactions in many ways: (i) Different successful executions are possible for an activity; (ii) Unsuccessful executions may be compensated or re-executed to get different results; (iii) Whether an execution is successful or not may not be known until after several subsequent activities are executed, and so it may be compensated and/or re-executed at different times relative to the execution of other activities; (iv) Compensation or re-execution of an activity may require compensation or re-execution of several other activities; etc. In this paper, we study the interdependencies between the executions of e-contract activities. This study will be helpful in monitoring behavioral conditions stated in an e-contracts during its execution.

  13. Pegasys: software for executing and integrating analyses of biological sequences

    Directory of Open Access Journals (Sweden)

    Lett Drew

    2004-04-01

    Full Text Available Abstract Background We present Pegasys – a flexible, modular and customizable software system that facilitates the execution and data integration from heterogeneous biological sequence analysis tools. Results The Pegasys system includes numerous tools for pair-wise and multiple sequence alignment, ab initio gene prediction, RNA gene detection, masking repetitive sequences in genomic DNA as well as filters for database formatting and processing raw output from various analysis tools. We introduce a novel data structure for creating workflows of sequence analyses and a unified data model to store its results. The software allows users to dynamically create analysis workflows at run-time by manipulating a graphical user interface. All non-serial dependent analyses are executed in parallel on a compute cluster for efficiency of data generation. The uniform data model and backend relational database management system of Pegasys allow for results of heterogeneous programs included in the workflow to be integrated and exported into General Feature Format for further analyses in GFF-dependent tools, or GAME XML for import into the Apollo genome editor. The modularity of the design allows for new tools to be added to the system with little programmer overhead. The database application programming interface allows programmatic access to the data stored in the backend through SQL queries. Conclusions The Pegasys system enables biologists and bioinformaticians to create and manage sequence analysis workflows. The software is released under the Open Source GNU General Public License. All source code and documentation is available for download at http://bioinformatics.ubc.ca/pegasys/.

  14. ATDM LANL FleCSI: Topology and Execution Framework

    Energy Technology Data Exchange (ETDEWEB)

    Bergen, Benjamin Karl [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-11-06

    FleCSI is a compile-time configurable C++ framework designed to support multi-physics application development. As such, FleCSI attempts to provide a very general set of infrastructure design patterns that can be specialized and extended to suit the needs of a broad variety of solver and data requirements. This means that FleCSI is potentially useful to many different ECP projects. Current support includes multidimensional mesh topology, mesh geometry, and mesh adjacency information, n-dimensional hashed-tree data structures, graph partitioning interfaces, and dependency closures (to identify data dependencies between distributed-memory address spaces). FleCSI introduces a functional programming model with control, execution, and data abstractions that are consistent with state-of-the-art task-based runtimes such as Legion and Charm++. The model also provides support for fine-grained, data-parallel execution with backend support for runtimes such as OpenMP and C++17. The FleCSI abstraction layer provides the developer with insulation from the underlying runtimes, while allowing support for multiple runtime systems, including conventional models like asynchronous MPI. The intent is to give developers a concrete set of user-friendly programming tools that can be used now, while allowing flexibility in choosing runtime implementations and optimizations that can be applied to architectures and runtimes that arise in the future. This project is essential to the ECP Ristra Next-Generation Code project, part of ASC ATDM, because it provides a hierarchically parallel programming model that is consistent with the design of modern system architectures, but which allows for the straightforward expression of algorithmic parallelism in a portably performant manner.

  15. Derivatives and the non-executive director

    NARCIS (Netherlands)

    van der Nat, M.; Buckley, A.A.

    2003-01-01

    Do non-executive directors have the wherewithal to overview a corporation's integrity, quality of performance and management in the area of derivatives policy? In a survey of the understanding and monitoring of derivatives in a small sample of quoted companies, we found disturbing levels of

  16. Exergaming immediately enhances children's executive function.

    Science.gov (United States)

    Best, John R

    2012-09-01

    The current study examined an important aspect of experience--physical activity--that may contribute to children's executive function. The design attempted to tease apart 2 important aspects of children's exercise by examining the separate and combined effects of acute physical activity and cognitive engagement on an aspect of children's executive functioning. In a 2 × 2 within-subject experimental design, children (N = 33, 6 to 10 years old) completed activities that varied systematically in both physical activity (physically active video games versus sedentary video activities) and cognitive engagement (challenging and interactive video games versus repetitive video activities). Cognitive functioning, including executive function, was assessed after each activity by a modified flanker task (Rueda et al., 2004). Whereas cognitive engagement had no effect on any aspect of task performance, physical activity (i.e., exergaming) enhanced children's speed to resolve interference from conflicting visuospatial stimuli. Age comparisons indicated improvements with age in the accuracy of resolving interference and in overall response time. The results extend past research by showing more precisely how physical activity influences executive function and how this effect differs from the improvements that occur with development. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  17. Helping Behavior in Multinational Executive Networks

    DEFF Research Database (Denmark)

    Mors, Marie Louise; Miller, Stewart; McDonald, Michael

    This study develops a framework that draws upon the socio-psychology and network literatures to explain helping behavior in an executive’s multinational network. Focusing on executives' perceptions of willingness to help, we examine network structure (geographic and organizational boundaries...... for the role of network structural characteristics in that organizational boundaries rather than geographic boundaries influence perceived helping behavior....

  18. Federal Executives: Initial Reactions to Change.

    Science.gov (United States)

    Lynn, Naomi B.; Vaden, Richard E.

    1980-01-01

    The main concern of those federal executives surveyed before implementation of the Civil Service Reform Act of 1978 was that the reform would introduce politics into the civil service. Those surveyed also were concerned about affirmative action, bureaucratic image, bonuses, cronyism, managerial power, pay, performance evaluations, and unions.…

  19. The Lisbon Strategy's Empowerment of Core Executives

    DEFF Research Database (Denmark)

    Borrás, Susana; Peters, B. Guy

    2011-01-01

    advancing (further) centralization and politicization in national patterns of EU policy co-ordination, empowering core executives. The Lisbon Strategy's ideational elements (‘grand’ goals and politically visible targets) as well as organizational requirements (Spring Council, national programming and annual...

  20. Validating Avionics Conceptual Architectures with Executable Specifications

    Directory of Open Access Journals (Sweden)

    Nils Fischer

    2012-08-01

    Full Text Available Current avionics systems specifications, developed after conceptual design, have a high degree of uncertainty. Since specifications are not sufficiently validated in the early development process and no executable specification exists at aircraft level, system designers cannot evaluate the impact of their design decisions at aircraft or aircraft application level. At the end of the development process of complex systems, e. g. aircraft, an average of about 65 per cent of all specifications have to be changed because they are incorrect, incomplete or too vaguely described. In this paper, a model-based design methodology together with a virtual test environment is described that makes complex high level system specifications executable and testable during the very early levels of system design. An aircraft communication system and its system context is developed to demonstrate the proposed early validation methodology. Executable specifications for early conceptual system architectures enable system designers to couple functions, architecture elements, resources and performance parameters, often called non-functional parameters. An integrated executable specification at Early Conceptual Architecture Level is developed and used to determine the impact of different system architecture decisions on system behavior and overall performance.

  1. Minutes of Midyear Executive Board Meeting.

    Science.gov (United States)

    Counseling Psychologist, 1994

    1994-01-01

    Presents minutes of midyear executive board meeting of American Psychological Association's Division 17, Counseling Psychology. Reviews standing committee reports from education and training, ethics and cultural diversity, hospitality suite, independent practice, membership, nominations, professional affairs, program committee, scientific affairs,…

  2. Promoting Corporate Enterprise: Marketing the Executive MBA.

    Science.gov (United States)

    Van Doren, Doris C.; And Others

    1986-01-01

    More than 100 Executive Masters of Business Administration programs exist, and new ones are being developed. How these programs operate and where they fit in with the growth in business education are discussed. Program practices, screening applications, promotion, programs structure, understanding market changes, and providing a quality faculty…

  3. Culture, Executive Function, and Social Understanding

    Science.gov (United States)

    Lewis, Charlie; Koyasu, Masuo; Oh, Seungmi; Ogawa, Ayako; Short, Benjamin; Huang, Zhao

    2009-01-01

    Much of the evidence from the West has shown links between children's developing self-control (executive function), their social experiences, and their social understanding (Carpendale & Lewis, 2006, chapters 5 and 6), across a range of cultures including China. This chapter describes four studies conducted in three Oriental cultures,…

  4. Adaptive Test Case Execution in Practice

    NARCIS (Netherlands)

    J.R. Calamé (Jens)

    2007-01-01

    htmlabstractBehavior-oriented Adaptation in Testing (BAiT) is a toolset, which supports test generation and execution for deterministic and nondeterministic systems with data. It covers the generation of test cases from a (formal) system specification and test purposes, the identification and

  5. Intergenerational Transmission of Neuropsychological Executive Functioning

    Science.gov (United States)

    Jester, Jennifer M.; Nigg, Joel T.; Puttler, Leon I.; Long, Jeffrey C.; Fitzgerald, Hiram E.; Zucker, Robert A.

    2009-01-01

    Relationships between parent and child executive functioning were examined, controlling for the critical potential confound of IQ, in a family study involving 434 children (130 girls and 304 boys) and 376 parents from 204 community recruited families at high risk for the development of substance use disorder. Structural equation modeling found…

  6. Inspiration, perspiration, and execution: An innovator's perspective.

    Science.gov (United States)

    Makower, Josh

    2017-05-01

    Josh Makower, MD, is a General Partner at New Enterprise Associates, Consulting Professor of Medicine at Stanford University Medical School, Co-Founder of Stanford's Biodesign Innovation Program, and Founder and Executive Chairman of the medical device incubator, ExploraMed Development, LLC. Copyright © 2016 Elsevier Inc. All rights reserved.

  7. REALISING THE POTENTIAL OF MANUFACTURING EXECUTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    L. Van Dyk

    2012-01-01

    Full Text Available

    ENGLISH ABSTRACT: The term Manufacturing Execution System (MES was created by Advanced Manufacturing Research (AMR in 1990 to describe a suite of software products, which enables the execution of manufacturing through the integration of the plann ing and control systems of an enterprise. The evolution of Manufacturing Execution Systems is a result of the evolution of manufacturing strategies, manufacturing planning and control systems , as well as the evolution of information technology. In this article this evolution is investigated, current business models are evaluated and an MES Function Matrix is proposed to address inadequacies of these models .

    AFRIKAANSE OPSOMMING: Die term Vervaardigingsuitvoeringstelsels ("Manufacturing Execution System" - MES is in 1990 deur Advanced Manufacturing Research (AMR geskep om die stel sagtewareprodukte te beskryf, wat die uitvoering van vervaardigingsplanne moontlik maak deur die integrasie van die beplanning- en beheerstelsels van 'n ondememing. Die evolusie van MES is die resultaat van die ontwikkeling van vervaardigingstrategiee, vervaardingsbeplanning- en beheerstelsels, asook die ontwikkeling van inligtingstegnologie. In hierdie artikel word die evolusie van MES ondersoek, besigheidsmodelle word geevalueer en 'n MES Funksie Matriks word voorgestel om leemtes ten opsigte van hierdie modelle te identifiseer.

  8. Space history, space policy, and executive leadership

    Science.gov (United States)

    Kraemer, Sylvia K.

    1993-01-01

    A lecture that attempts to establish the role of space historians in formulating space policy is presented. The discussion focusses on two adages and their relevance to space policy. The adages are as follows: 'write about what you know;' and 'good managers do things right; good executives do the right things.'

  9. The executive MBA in information security

    CERN Document Server

    Trinckes, John J

    2009-01-01

    Supplying a complete overview of the concepts executives need to know, this book provides the tools needed to ensure your organization has an effective information security management program in place. It also includes a ready-to use security framework for developing workable programs and supplies proven tips for avoiding common pitfalls.

  10. Hawaii energy strategy: Executive summary, October 1995

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-10-01

    This is an executive summary to a report on the Hawaii Energy Strategy Program. The topics of the report include the a description of the program including an overview, objectives, policy statement and purpose and objectives; energy strategy policy development; energy strategy projects; current energy situation; modeling Hawaii`s energy future; energy forecasts; reducing energy demand; scenario assessment, and recommendations.

  11. Benchmarking Tokamak edge modelling codes

    Science.gov (United States)

    Contributors To The Efda-Jet Work Programme; Coster, D. P.; Bonnin, X.; Corrigan, G.; Kirnev, G. S.; Matthews, G.; Spence, J.; Contributors to the EFDA-JET work programme

    2005-03-01

    Tokamak edge modelling codes are in widespread use to interpret and understand existing experiments, and to make predictions for future machines. Little direct benchmarking has been done between the codes, and the users of the codes have tended to concentrate on different experimental machines. An important validation step is to compare the codes for identical scenarios. In this paper, two of the major edge codes, SOLPS (B2.5-Eirene) and EDGE2D-NIMBUS are benchmarked against each other. A set of boundary conditions, transport coefficients, etc. for a JET plasma were chosen, and the two codes were run on the same grid. Initially, large differences were seen in the resulting plasmas. These differences were traced to differing physics assumptions with respect to the parallel heat flux limits. Once these were switched off in SOLPS, or implemented and switched on in EDGE2D-NIMBUS, the remaining differences were small.

  12. The Continual Intercomparison of Radiation Codes: Results from Phase I

    Science.gov (United States)

    Oreopoulos, Lazaros; Mlawer, Eli; Delamere, Jennifer; Shippert, Timothy; Cole, Jason; Iacono, Michael; Jin, Zhonghai; Li, Jiangnan; Manners, James; Raisanen, Petri; hide

    2011-01-01

    The computer codes that calculate the energy budget of solar and thermal radiation in Global Climate Models (GCMs), our most advanced tools for predicting climate change, have to be computationally efficient in order to not impose undue computational burden to climate simulations. By using approximations to gain execution speed, these codes sacrifice accuracy compared to more accurate, but also much slower, alternatives. International efforts to evaluate the approximate schemes have taken place in the past, but they have suffered from the drawback that the accurate standards were not validated themselves for performance. The manuscript summarizes the main results of the first phase of an effort called "Continual Intercomparison of Radiation Codes" (CIRC) where the cases chosen to evaluate the approximate models are based on observations and where we have ensured that the accurate models perform well when compared to solar and thermal radiation measurements. The effort is endorsed by international organizations such as the GEWEX Radiation Panel and the International Radiation Commission and has a dedicated website (i.e., http://circ.gsfc.nasa.gov) where interested scientists can freely download data and obtain more information about the effort's modus operandi and objectives. In a paper published in the March 2010 issue of the Bulletin of the American Meteorological Society only a brief overview of CIRC was provided with some sample results. In this paper the analysis of submissions of 11 solar and 13 thermal infrared codes relative to accurate reference calculations obtained by so-called "line-by-line" radiation codes is much more detailed. We demonstrate that, while performance of the approximate codes continues to improve, significant issues still remain to be addressed for satisfactory performance within GCMs. We hope that by identifying and quantifying shortcomings, the paper will help establish performance standards to objectively assess radiation code quality

  13. Low complexity hevc intra coding

    OpenAIRE

    Ruiz Coll, José Damián

    2016-01-01

    Over the last few decades, much research has focused on the development and optimization of video codecs for media distribution to end-users via the Internet, broadcasts or mobile networks, but also for videoconferencing and for the recording on optical disks for media distribution. Most of the video coding standards for delivery are characterized by using a high efficiency hybrid schema, based on inter-prediction coding for temporal picture decorrelation, and intra-prediction coding for spat...

  14. IRIG Serial Time Code Formats

    Science.gov (United States)

    2016-08-01

    and G. It should be noted that this standard reflects the present state of the art in serial time code formatting and is not intended to constrain...separation for visual resolution. The LSB occurs first except for the fractional seconds subword that follows the day-of-year subword. The BCD TOY code...and P6 to complete the BCD time code word. An index marker occurs between the decimal digits in each subword to provide separation for visual

  15. Error correcting coding for OTN

    DEFF Research Database (Denmark)

    Justesen, Jørn; Larsen, Knud J.; Pedersen, Lars A.

    2010-01-01

    Forward error correction codes for 100 Gb/s optical transmission are currently receiving much attention from transport network operators and technology providers. We discuss the performance of hard decision decoding using product type codes that cover a single OTN frame or a small number...... of such frames. In particular we argue that a three-error correcting BCH is the best choice for the component code in such systems....

  16. Indices for Testing Neural Codes

    OpenAIRE

    Jonathan D. Victor; Nirenberg, Sheila

    2008-01-01

    One of the most critical challenges in systems neuroscience is determining the neural code. A principled framework for addressing this can be found in information theory. With this approach, one can determine whether a proposed code can account for the stimulus-response relationship. Specifically, one can compare the transmitted information between the stimulus and the hypothesized neural code with the transmitted information between the stimulus and the behavioral response. If the former is ...

  17. Evaluating Open-Source Full-Text Search Engines for Matching ICD-10 Codes.

    Science.gov (United States)

    Jurcău, Daniel-Alexandru; Stoicu-Tivadar, Vasile

    2016-01-01

    This research presents the results of evaluating multiple free, open-source engines on matching ICD-10 diagnostic codes via full-text searches. The study investigates what it takes to get an accurate match when searching for a specific diagnostic code. For each code the evaluation starts by extracting the words that make up its text and continues with building full-text search queries from the combinations of these words. The queries are then run against all the ICD-10 codes until a match indicates the code in question as a match with the highest relative score. This method identifies the minimum number of words that must be provided in order for the search engines choose the desired entry. The engines analyzed include a popular Java-based full-text search engine, a lightweight engine written in JavaScript which can even execute on the user's browser, and two popular open-source relational database management systems.

  18. A sparse octree gravitational N-body code that runs entirely on the GPU processor

    Science.gov (United States)

    Bédorf, Jeroen; Gaburov, Evghenii; Portegies Zwart, Simon

    2012-04-01

    We present the implementation and performance of a new gravitational N-body tree-code that is specifically designed for the graphics processing unit (GPU).The code is publicly available at: http://castle.strw.leidenuniv.nl/software.html.1 All parts of the tree-code algorithm are executed on the GPU. We present algorithms for parallel construction and traversing of sparse octrees. These algorithms are implemented in CUDA and tested on NVIDIA GPUs, but they are portable to OpenCL and can easily be used on many-core devices from other manufacturers. This portability is achieved by using general parallel-scan and sort methods. The gravitational tree-code outperforms tuned CPU code during the tree-construction and shows a performance improvement of more than a factor 20 overall, resulting in a processing rate of more than 2.8 million particles per second.

  19. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-04-11

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaickingand 4D light field view synthesis.

  20. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  1. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-12-01

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high-dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaicing and 4D light field view synthesis.

  2. Executive functioning in highly talented soccer players.

    Directory of Open Access Journals (Sweden)

    Lot Verburgh

    Full Text Available Executive functions might be important for successful performance in sports, particularly in team sports requiring quick anticipation and adaptation to continuously changing situations in the field. The executive functions motor inhibition, attention and visuospatial working memory were examined in highly talented soccer players. Eighty-four highly talented youth soccer players (mean age 11.9, and forty-two age-matched amateur soccer players (mean age 11.8 in the age range 8 to 16 years performed a Stop Signal task (motor inhibition, the Attention Network Test (alerting, orienting, and executive attention and a visuospatial working memory task. The highly talented soccer players followed the talent development program of the youth academy of a professional soccer club and played at the highest national soccer competition for their age. The amateur soccer players played at a regular soccer club in the same geographical region as the highly talented soccer players and play in a regular regional soccer competition. Group differences were tested using analyses of variance. The highly talented group showed superior motor inhibition as measured by stop signal reaction time (SSRT on the Stop Signal task and a larger alerting effect on the Attention Network Test, indicating an enhanced ability to attain and maintain an alert state. No group differences were found for orienting and executive attention and visuospatial working memory. A logistic regression model with group (highly talented or amateur as dependent variable and executive function measures that significantly distinguished between groups as predictors showed that these measures differentiated highly talented soccer players from amateur soccer players with 89% accuracy. Highly talented youth soccer players outperform youth amateur players on suppressing ongoing motor responses and on the ability to attain and maintain an alert state; both may be essential for success in soccer.

  3. Executive functioning in highly talented soccer players.

    Science.gov (United States)

    Verburgh, Lot; Scherder, Erik J A; van Lange, Paul A M; Oosterlaan, Jaap

    2014-01-01

    Executive functions might be important for successful performance in sports, particularly in team sports requiring quick anticipation and adaptation to continuously changing situations in the field. The executive functions motor inhibition, attention and visuospatial working memory were examined in highly talented soccer players. Eighty-four highly talented youth soccer players (mean age 11.9), and forty-two age-matched amateur soccer players (mean age 11.8) in the age range 8 to 16 years performed a Stop Signal task (motor inhibition), the Attention Network Test (alerting, orienting, and executive attention) and a visuospatial working memory task. The highly talented soccer players followed the talent development program of the youth academy of a professional soccer club and played at the highest national soccer competition for their age. The amateur soccer players played at a regular soccer club in the same geographical region as the highly talented soccer players and play in a regular regional soccer competition. Group differences were tested using analyses of variance. The highly talented group showed superior motor inhibition as measured by stop signal reaction time (SSRT) on the Stop Signal task and a larger alerting effect on the Attention Network Test, indicating an enhanced ability to attain and maintain an alert state. No group differences were found for orienting and executive attention and visuospatial working memory. A logistic regression model with group (highly talented or amateur) as dependent variable and executive function measures that significantly distinguished between groups as predictors showed that these measures differentiated highly talented soccer players from amateur soccer players with 89% accuracy. Highly talented youth soccer players outperform youth amateur players on suppressing ongoing motor responses and on the ability to attain and maintain an alert state; both may be essential for success in soccer.

  4. Unraveling Executive Functioning in Dual Diagnosis.

    Science.gov (United States)

    Duijkers, Judith C L M; Vissers, Constance Th W M; Egger, Jos I M

    2016-01-01

    In mental health, the term dual-diagnosis is used for the co-occurrence of Substance Use Disorder (SUD) with another mental disorder. These co-occurring disorders can have a shared cause, and can cause/intensify each other's expression. Forming a threat to health and society, dual-diagnosis is associated with relapses in addiction-related behavior and a destructive lifestyle. This is due to a persistent failure to control impulses and the maintaining of inadequate self-regulatory behavior in daily life. Thus, several aspects of executive functioning like inhibitory, shifting and updating processes seem impaired in dual-diagnosis. Executive (dys-)function is currently even seen as a shared underlying key component of most mental disorders. However, the number of studies on diverse aspects of executive functioning in dual-diagnosis is limited. In the present review, a systematic overview of various aspects of executive functioning in dual-diagnosis is presented, striving for a prototypical profile of patients with dual-diagnosis. Looking at empirical results, inhibitory and shifting processes appear to be impaired for SUD combined with schizophrenia, bipolar disorder or cluster B personality disorders. Studies involving updating process tasks for dual-diagnosis were limited. More research that zooms in to the full diversity of these executive functions is needed in order to strengthen these findings. Detailed insight in the profile of strengths and weaknesses that underlies one's behavior and is related to diagnostic classifications, can lead to tailor-made assessment and indications for treatment, pointing out which aspects need attention and/or training in one's self-regulative abilities.

  5. Executive Functioning in Highly Talented Soccer Players

    Science.gov (United States)

    Verburgh, Lot; Scherder, Erik J. A.; van Lange, Paul A.M.; Oosterlaan, Jaap

    2014-01-01

    Executive functions might be important for successful performance in sports, particularly in team sports requiring quick anticipation and adaptation to continuously changing situations in the field. The executive functions motor inhibition, attention and visuospatial working memory were examined in highly talented soccer players. Eighty-four highly talented youth soccer players (mean age 11.9), and forty-two age-matched amateur soccer players (mean age 11.8) in the age range 8 to 16 years performed a Stop Signal task (motor inhibition), the Attention Network Test (alerting, orienting, and executive attention) and a visuospatial working memory task. The highly talented soccer players followed the talent development program of the youth academy of a professional soccer club and played at the highest national soccer competition for their age. The amateur soccer players played at a regular soccer club in the same geographical region as the highly talented soccer players and play in a regular regional soccer competition. Group differences were tested using analyses of variance. The highly talented group showed superior motor inhibition as measured by stop signal reaction time (SSRT) on the Stop Signal task and a larger alerting effect on the Attention Network Test, indicating an enhanced ability to attain and maintain an alert state. No group differences were found for orienting and executive attention and visuospatial working memory. A logistic regression model with group (highly talented or amateur) as dependent variable and executive function measures that significantly distinguished between groups as predictors showed that these measures differentiated highly talented soccer players from amateur soccer players with 89% accuracy. Highly talented youth soccer players outperform youth amateur players on suppressing ongoing motor responses and on the ability to attain and maintain an alert state; both may be essential for success in soccer. PMID:24632735

  6. The FLUKA code: an overview

    Energy Technology Data Exchange (ETDEWEB)

    Ballarini, F [University of Pavia and INFN (Italy); Battistoni, G [University of Milan and INFN (Italy); Campanella, M; Carboni, M; Cerutti, F [University of Milan and INFN (Italy); Empl, A [University of Houston, Houston (United States); Fasso, A [SLAC, Stanford (United States); Ferrari, A [CERN, CH-1211 Geneva (Switzerland); Gadioli, E [University of Milan and INFN (Italy); Garzelli, M V [University of Milan and INFN (Italy); Lantz, M [University of Milan and INFN (Italy); Liotta, M [University of Pavia and INFN (Italy); Mairani, A [University of Pavia and INFN (Italy); Mostacci, A [Laboratori Nazionali di Frascati, INFN (Italy); Muraro, S [University of Milan and INFN (Italy); Ottolenghi, A [University of Pavia and INFN (Italy); Pelliccioni, M [Laboratori Nazionali di Frascati, INFN (Italy); Pinsky, L [University of Houston, Houston (United States); Ranft, J [Siegen University, Siegen (Germany); Roesler, S [CERN, CH-1211 Geneva (Switzerland); Sala, P R [University of Milan and INFN (Italy); Scannicchio, D [University of Pavia and INFN (Italy); Trovati, S [University of Pavia and INFN (Italy); Villari, R; Wilson, T [Johnson Space Center, NASA (United States); Zapp, N [Johnson Space Center, NASA (United States); Vlachoudis, V [CERN, CH-1211 Geneva (Switzerland)

    2006-05-15

    FLUKA is a multipurpose Monte Carlo code which can transport a variety of particles over a wide energy range in complex geometries. The code is a joint project of INFN and CERN: part of its development is also supported by the University of Houston and NASA. FLUKA is successfully applied in several fields, including but not only, particle physics, cosmic ray physics, dosimetry, radioprotection, hadron therapy, space radiation, accelerator design and neutronics. The code is the standard tool used at CERN for dosimetry, radioprotection and beam-machine interaction studies. Here we give a glimpse into the code physics models with a particular emphasis to the hadronic and nuclear sector.

  7. The FLUKA Code: an Overview

    Energy Technology Data Exchange (ETDEWEB)

    Ballarini, F.; Battistoni, G.; Campanella, M.; Carboni, M.; Cerutti, F.; Empl, A.; Fasso, A.; Ferrari, A.; Gadioli, E.; Garzelli, M.V.; Lantz, M.; Liotta, M.; Mairani,; Mostacci, A.; Muraro, S.; Ottolenghi, A.; Pelliccioni, M.; Pinsky, L.; Ranft, J.; Roesler, S.; Sala, P.R.; /Milan U. /INFN, Milan /Pavia U. /INFN, Pavia /CERN /Siegen U.

    2005-11-09

    FLUKA is a multipurpose Monte Carlo code which can transport a variety of particles over a wide energy range in complex geometries. The code is a joint project of INFN and CERN: part of its development is also supported by the University of Houston and NASA. FLUKA is successfully applied in several fields, including but not only, particle physics, cosmic ray physics, dosimetry, radioprotection, hadron therapy, space radiation, accelerator design and neutronics. The code is the standard tool used at CERN for dosimetry, radioprotection and beam-machine interaction studies. Here we give a glimpse into the code physics models with a particular emphasis to the hadronic and nuclear sector.

  8. Understanding perception through neural "codes".

    Science.gov (United States)

    Freeman, Walter J

    2011-07-01

    A major challenge for cognitive scientists is to deduce and explain the neural mechanisms of the rapid transposition between stimulus energy and recalled memory-between the specific (sensation) and the generic (perception)-in both material and mental aspects. Researchers are attempting three explanations in terms of neural codes. The microscopic code: cellular neurobiologists correlate stimulus properties with the rates and frequencies of trains of action potentials induced by stimuli and carried by topologically organized axons. The mesoscopic code: cognitive scientists formulate symbolic codes in trains of action potentials from feature-detector neurons of phonemes, lines, odorants, vibrations, faces, etc., that object-detector neurons bind into representations of stimuli. The macroscopic code: neurodynamicists extract neural correlates of stimuli and associated behaviors in spatial patterns of oscillatory fields of dendritic activity, which self-organize and evolve on trajectories through high-dimensional brain state space. This multivariate code is expressed in landscapes of chaotic attractors. Unlike other scientific codes, such as DNA and the periodic table, these neural codes have no alphabet or syntax. They are epistemological metaphors that experimentalists need to measure neural activity and engineers need to model brain functions. My aim is to describe the main properties of the macroscopic code and the grand challenge it poses: how do very large patterns of textured synchronized oscillations form in cortex so quickly? © 2010 IEEE

  9. Programming Entity Framework Code First

    CERN Document Server

    Lerman, Julia

    2011-01-01

    Take advantage of the Code First data modeling approach in ADO.NET Entity Framework, and learn how to build and configure a model based on existing classes in your business domain. With this concise book, you'll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration. Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you're working with an exis

  10. High Order Modulation Protograph Codes

    Science.gov (United States)

    Nguyen, Thuy V. (Inventor); Nosratinia, Aria (Inventor); Divsalar, Dariush (Inventor)

    2014-01-01

    Digital communication coding methods for designing protograph-based bit-interleaved code modulation that is general and applies to any modulation. The general coding framework can support not only multiple rates but also adaptive modulation. The method is a two stage lifting approach. In the first stage, an original protograph is lifted to a slightly larger intermediate protograph. The intermediate protograph is then lifted via a circulant matrix to the expected codeword length to form a protograph-based low-density parity-check code.

  11. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  12. The FLUKA code: an overview

    Science.gov (United States)

    Ballarini, F.; Battistoni, G.; Campanella, M.; Carboni, M.; Cerutti, F.; Empl, A.; Fassò, A.; Ferrari, A.; Gadioli, E.; Garzelli, M. V.; Lantz, M.; Liotta, M.; Mairani, A.; Mostacci, A.; Muraro, S.; Ottolenghi, A.; Pelliccioni, M.; Pinsky, L.; Ranft, J.; Roesler, S.; Sala, P. R.; Scannicchio, D.; Trovati, S.; Villari, R.; Wilson, T.; Zapp, N.; Vlachoudis, V.

    2006-05-01

    FLUKA is a multipurpose MonteCarlo code which can transport a variety of particles over a wide energy range in complex geometries. The code is a joint project of INFN and CERN: part of its development is also supported by the University of Houston and NASA. FLUKA is successfully applied in several fields, including but not only, particle physics, cosmic ray physics, dosimetry, radioprotection, hadron therapy, space radiation, accelerator design and neutronics. The code is the standard tool used at CERN for dosimetry, radioprotection and beam-machine interaction studies. Here we give a glimpse into the code physics models with a particular emphasis to the hadronic and nuclear sector.

  13. Golay and other box codes

    Science.gov (United States)

    Solomon, G.

    1992-01-01

    The (24,12;8) extended Golay Code can be generated as a 6x4 binary matrix from the (15,11;3) BCH-Hamming Code, represented as a 5 x 3 matrix, by adding a row and a column, both of odd or even parity. The odd-parity case provides the additional 12th dimension. Furthermore, any three columns and five rows of the 6 x 4 Golay form a BCH-Hamming (15,11;3) Code. Similarly a (80,58;8) code can be generated as a 10 x 8 binary matrix from the (63,57;3) BCH-Hamming Code represented as a 9 x 7 matrix by adding a row and a column both of odd and even parity. Furthermore, any seven columns along with the top nine rows is a BCH-Hamming (63,57;3) Code. A (80,40;16) 10 x 8 matrix binary code with weight structure identical to the extended (80,40;16) Quadratic Residue Code is generated from a (63,39;7) binary cyclic code represented as a 9 x 7 matrix, by adding a row and a column, both of odd or even parity.

  14. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four...... are optimal or best known for their parameters. In chapter five we study some graph codes with Reed–Solomon component codes. The underlying graph is well known and widely used for its good characteristics. This helps us to compute the dimension of the graph codes. We also introduce a combinatorial concept...... related to the iterative encoding of graph codes with MDS component code. The last chapter deals with affine Grassmann codes and Grassmann codes. We begin with some previously known codes and prove that they are also Tanner codes of the incidence graph of the point–line partial geometry...

  15. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  16. Petascale electronic structure code with a new parallel eigensolver

    Science.gov (United States)

    Briggs, Emil; Lu, Wenchang; Hodak, Miroslav; Li, Yan; Kelley, Ct; Bernholc, Jerzy

    2015-03-01

    We describe recent developments within the Real Space Multigrid (RMG) electronic structure code. RMG uses real-space grids, a multigrid pre-conditioner, and subspace diagonalization to solve the Kohn-Sham equations. It is designed for use on massively parallel computers and has shown excellent scalability and performance, reaching 6.5 PFLOPS on 18k Cray compute nodes with 288k CPU cores and 18k GPUs. For large problems, the diagonalization becomes computationally dominant and a novel, highly parallel eigensolver was developed that makes efficient use of a large number of nodes. Test results for a range of problem sizes are presented, which execute up to 3.5 times faster than standard eigensolvers such as Scalapack. RMG is now an open source code, running on Linux, Windows and MacIntosh systems. It may be downloaded at .

  17. Operation executive freedom : following the executive's fiduciary obligation from Manges to Magruder in mineral leasing

    National Research Council Canada - National Science Library

    Fowles, John B

    2004-01-01

    .... This comment examines the expansion of fiduciary duties in the mineral estate in a bid at reestablishing the executive mineral interest holder's freedom of contract when leasing with third parties...

  18. Allele coding in genomic evaluation

    Directory of Open Access Journals (Sweden)

    Christensen Ole F

    2011-06-01

    Full Text Available Abstract Background Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. Results Theoretical derivations showed that parameter estimates and estimated marker effects in marker-based models are the same irrespective of the allele coding, provided that the model has a fixed general mean. For the equivalent models, the same results hold, even though different allele coding methods lead to different genomic relationship matrices. Calculated genomic breeding values are independent of allele coding when the estimate of the general mean is included into the values. Reliabilities of estimated genomic breeding values calculated using elements of the inverse of the coefficient matrix depend on the allele coding because different allele coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being

  19. Civil Code, 11 December 1987.

    Science.gov (United States)

    1988-01-01

    Article 162 of this Mexican Code provides, among other things, that "Every person has the right freely, responsibly, and in an informed fashion to determine the number and spacing of his or her children." When a marriage is involved, this right is to be observed by the spouses "in agreement with each other." The civil codes of the following states contain the same provisions: 1) Baja California (Art. 159 of the Civil Code of 28 April 1972 as revised in Decree No. 167 of 31 January 1974); 2) Morelos (Art. 255 of the Civil Code of 26 September 1949 as revised in Decree No. 135 of 29 December 1981); 3) Queretaro (Art. 162 of the Civil Code of 29 December 1950 as revised in the Act of 9 January 1981); 4) San Luis Potosi (Art. 147 of the Civil Code of 24 March 1946 as revised in 13 June 1978); Sinaloa (Art. 162 of the Civil Code of 18 June 1940 as revised in Decree No. 28 of 14 October 1975); 5) Tamaulipas (Art. 146 of the Civil Code of 21 November 1960 as revised in Decree No. 20 of 30 April 1975); 6) Veracruz-Llave (Art. 98 of the Civil Code of 1 September 1932 as revised in the Act of 30 December 1975); and 7) Zacatecas (Art. 253 of the Civil Code of 9 February 1965 as revised in Decree No. 104 of 13 August 1975). The Civil Codes of Puebla and Tlaxcala provide for this right only in the context of marriage with the spouses in agreement. See Art. 317 of the Civil Code of Puebla of 15 April 1985 and Article 52 of the Civil Code of Tlaxcala of 31 August 1976 as revised in Decree No. 23 of 2 April 1984. The Family Code of Hidalgo requires as a formality of marriage a certification that the spouses are aware of methods of controlling fertility, responsible parenthood, and family planning. In addition, Article 22 the Civil Code of the Federal District provides that the legal capacity of natural persons is acquired at birth and lost at death; however, from the moment of conception the individual comes under the protection of the law, which is valid with respect to the

  20. Error coding simulations in C

    Science.gov (United States)

    Noble, Viveca K.

    1994-10-01

    When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.

  1. Asymmetric Quantum Codes on Toric Surfaces

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    2017-01-01

    Asymmetric quantum error-correcting codes are quantum codes defined over biased quantum channels: qubit-flip and phase-shift errors may have equal or different probabilities. The code construction is the Calderbank-Shor-Steane construction based on two linear codes. We present families of toric...... surfaces, toric codes and associated asymmetric quantum error-correcting codes....

  2. LFSC - Linac Feedback Simulation Code

    Energy Technology Data Exchange (ETDEWEB)

    Ivanov, Valentin; /Fermilab

    2008-05-01

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  3. Code & order in polygonal billiards

    OpenAIRE

    Bobok, Jozef; Troubetzkoy, Serge

    2011-01-01

    Two polygons $P,Q$ are code equivalent if there are billiard orbits $u,v$ which hit the same sequence of sides and such that the projections of the orbits are dense in the boundaries $\\partial P, \\partial Q$. Our main results show when code equivalent polygons have the same angles, resp. are similar, resp. affinely similar.

  4. Distributed space-time coding

    CERN Document Server

    Jing, Yindi

    2014-01-01

    Distributed Space-Time Coding (DSTC) is a cooperative relaying scheme that enables high reliability in wireless networks. This brief presents the basic concept of DSTC, its achievable performance, generalizations, code design, and differential use. Recent results on training design and channel estimation for DSTC and the performance of training-based DSTC are also discussed.

  5. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions with a ...

  6. NETWORK CODING BY BEAM FORMING

    DEFF Research Database (Denmark)

    2013-01-01

    Network coding by beam forming in networks, for example, in single frequency networks, can provide aid in increasing spectral efficiency. When network coding by beam forming and user cooperation are combined, spectral efficiency gains may be achieved. According to certain embodiments, a method...

  7. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  8. Squares of Random Linear Codes

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego

    2015-01-01

    Given a linear code $C$, one can define the $d$-th power of $C$ as the span of all componentwise products of $d$ elements of $C$. A power of $C$ may quickly fill the whole space. Our purpose is to answer the following question: does the square of a code ``typically'' fill the whole space? We give...

  9. Interleaver Design for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl; Zyablov, Viktor

    1997-01-01

    By a combination of construction and random search based on a careful analysis of the low weight words and the distance properties of the component codes, it is possible to find interleavers for turbo coding with a high minimum distance. We have designed a block interleaver with permutations...

  10. Flow Analysis of Code Customizations

    DEFF Research Database (Denmark)

    Hessellund, Anders; Sestoft, Peter

    2008-01-01

    Inconsistency between metadata and code customizations is a major concern in modern, configurable enterprise systems. The increasing reliance on metadata, in the form of XML files, and code customizations, in the form of Java files, has led to a hybrid development platform. The expected consisten...

  11. Recommendations for ECG diagnostic coding

    NARCIS (Netherlands)

    Bonner, R.E.; Caceres, C.A.; Cuddy, T.E.; Meijler, F.L.; Milliken, J.A.; Rautaharju, P.M.; Robles de Medina, E.O.; Willems, J.L.; Wolf, H.K.; Working Group 'Diagnostic Codes'

    1978-01-01

    The Oxford dictionary defines code as "a body of laws so related to each other as to avoid inconsistency and overlapping". It is obvious that natural language with its high degree of ambiguity does not qualify as a code in the sense of this definition. Everyday experiences provide ample evidence

  12. 75 FR 62591 - Performance Review Board, Senior Executive Service (SES)

    Science.gov (United States)

    2010-10-12

    ... Diversity and Equal Opportunity, NASA Headquarters; Assistant Administrator for Human Capital Management...; Executive Secretary, Director, Workforce Management and Development Division, NASA Headquarters; Associate..., Deputy Administrator, NASA Headquarters; Chair, Executive Resources Board, NASA Headquarters; Chair, NASA...

  13. Executive functions as predictors of math learning disabilities

    NARCIS (Netherlands)

    Toll, S.W.M.; van der Ven, S.H.G.; Kroesbergen, E.H.; van Luit, J.E.H.

    2011-01-01

    In the past years, an increasing number of studies have investigated executive functions as predictors of individual differences in mathematical abilities. The present longitudinal study was designed to investigate whether the executive functions shifting, inhibition, and working memory differ

  14. Goal-Oriented Autonomic Business Process Modelling and Execution

    OpenAIRE

    Greenwood, Dominic; Ghizzioli, Roberto

    2009-01-01

    This chapter has introduced a novel, industry-proven BPMS employing a goal-oriented approach to modelling and executing agile business processes. We have demonstrated that this is an inherently flexible approach, allowing processes to be designed and executed

  15. Reliability-Based Code Calibration

    DEFF Research Database (Denmark)

    Faber, M.H.; Sørensen, John Dalsgaard

    2003-01-01

    The present paper addresses fundamental concepts of reliability based code calibration. First basic principles of structural reliability theory are introduced and it is shown how the results of FORM based reliability analysis may be related to partial safety factors and characteristic values....... Thereafter the code calibration problem is presented in its principal decision theoretical form and it is discussed how acceptable levels of failure probability (or target reliabilities) may be established. Furthermore suggested values for acceptable annual failure probabilities are given for ultimate...... and serviceability limit states. Finally the paper describes the Joint Committee on Structural Safety (JCSS) recommended procedure - CodeCal - for the practical implementation of reliability based code calibration of LRFD based design codes....

  16. What Froze the Genetic Code?

    Science.gov (United States)

    Ribas de Pouplana, Lluís; Torres, Adrian Gabriel; Rafels-Ybern, Àlbert

    2017-04-05

    The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  17. What Froze the Genetic Code?

    Directory of Open Access Journals (Sweden)

    Lluís Ribas de Pouplana

    2017-04-01

    Full Text Available The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  18. Tristan code and its application

    Science.gov (United States)

    Nishikawa, K.-I.

    Since TRISTAN: The 3-D Electromagnetic Particle Code was introduced in 1990, it has been used for many applications including the simulations of global solar windmagnetosphere interaction. The most essential ingridients of this code have been published in the ISSS-4 book. In this abstract we describe some of issues and an application of this code for the study of global solar wind-magnetosphere interaction including a substorm study. The basic code (tristan.f) for the global simulation and a local simulation of reconnection with a Harris model (issrec2.f) are available at http:/www.physics.rutger.edu/˜kenichi. For beginners the code (isssrc2.f) with simpler boundary conditions is suitable to start to run simulations. The future of global particle simulations for a global geospace general circulation (GGCM) model with predictive capability (for Space Weather Program) is discussed.

  19. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...... steps, conventionally performed at the video encoder side, to the decoder side. Emerging applications such as wireless visual sensor networks and wireless video surveillance all require lightweight video encoding with high coding efficiency and error-resilience. The video data of DVC schemes differ from...... the assumptions of SW and WZ distributed coding, e.g. by being correlated in time and nonstationary. Improving the efficiency of DVC coding is challenging. This paper presents some selected techniques to address the DVC challenges. Focus is put on pin-pointing how the decoder steps are modified to provide...

  20. Non-Protein Coding RNAs

    CERN Document Server

    Walter, Nils G; Batey, Robert T

    2009-01-01

    This book assembles chapters from experts in the Biophysics of RNA to provide a broadly accessible snapshot of the current status of this rapidly expanding field. The 2006 Nobel Prize in Physiology or Medicine was awarded to the discoverers of RNA interference, highlighting just one example of a large number of non-protein coding RNAs. Because non-protein coding RNAs outnumber protein coding genes in mammals and other higher eukaryotes, it is now thought that the complexity of organisms is correlated with the fraction of their genome that encodes non-protein coding RNAs. Essential biological processes as diverse as cell differentiation, suppression of infecting viruses and parasitic transposons, higher-level organization of eukaryotic chromosomes, and gene expression itself are found to largely be directed by non-protein coding RNAs. The biophysical study of these RNAs employs X-ray crystallography, NMR, ensemble and single molecule fluorescence spectroscopy, optical tweezers, cryo-electron microscopy, and ot...

  1. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  2. Orthogonality of binary codes derived from Reed-Solomon codes

    Science.gov (United States)

    Retter, Charles T.

    1991-07-01

    A simple method is developed for determining the orthogonality of binary codes derived from Reed-Solomon codes and other cyclic codes of length (2 exp m) - 1 over GF(2 exp m) for m bits. Depending on the spectra of the codes, it is sufficient to test a small number of single-frequency pairs for orthogonality, and a pair of bases may be tested in each case simply by summing the appropriate powers of elements of the dual bases. This simple test can be used to find self-orthogonal codes. For even values of m, the author presents a technique that can be used to choose a basis that produces a self-orthogonal, doubly-even code in certain cases, particularly when m is highly composite. If m is a power of 2, this technique can be used to find self-dual bases for GF(2 exp m). Although the primary emphasis is on testing for self orthogonality, the fundamental theorems presented apply also to the orthogonality of two different codes.

  3. Just-in-Time Compilation-Inspired Methodology for Parallelization of Compute Intensive Java Code

    Directory of Open Access Journals (Sweden)

    GHULAM MUSTAFA

    2017-01-01

    Full Text Available Compute intensive programs generally consume significant fraction of execution time in a small amount of repetitive code. Such repetitive code is commonly known as hotspot code. We observed that compute intensive hotspots often possess exploitable loop level parallelism. A JIT (Just-in-Time compiler profiles a running program to identify its hotspots. Hotspots are then translated into native code, for efficient execution. Using similar approach, we propose a methodology to identify hotspots and exploit their parallelization potential on multicore systems. Proposed methodology selects and parallelizes each DOALL loop that is either contained in a hotspot method or calls a hotspot method. The methodology could be integrated in front-end of a JIT compiler to parallelize sequential code, just before native translation. However, compilation to native code is out of scope of this work. As a case study, we analyze eighteen JGF (Java Grande Forum benchmarks to determine parallelization potential of hotspots. Eight benchmarks demonstrate a speedup of up to 7.6x on an 8-core system

  4. Agreement Liberty Principle in Case of Contractual Commitments Execution

    OpenAIRE

    Kiseleva, Ekaterina V

    2016-01-01

    In this article author on the basis of the analysis of decisions of the supreme courts content of a liberty principle of the agreement reveals. The author showed an agreement liberty principle role in case of execution of contractual commitments. Author emphasizes long nature of a liberty principle of the agreement. In conclusion author notes that fair execution, non-execution or termination of the contract represent implementation of a liberty principle of the agreement as both execution, an...

  5. A new Executive Committee for 2013

    CERN Multimedia

    Staff Association

    2012-01-01

    The Staff Council met Tuesday, December 4th in an ordinary session. In agreement with the Statutes of the CERN Staff Association the Staff Council had to elect the Executive Committee for  2013. As there were no elections to the Staff Council this year, Michel Goossens, outgoing president and unique candidate for that fonction, presented a list for the Executive Committee which is quite similar to that of 2012. Some people change functions: Céline Grobon becomes Vice-President, Marcel Aymon Secretary, and Lawrence Faisandel Treasurer. Philippe Trilhe is the new departmental delegate to EN Department. There are also three new coordinators for standing committees: Frédéric Galleazzi, Juan Jose Perez Garcia, and Yves Sillanoli. Michel then presented the 2013 programme to the Staff Council. At the end of his presentation Michel thanked all Staff Council delegates for their dedication and motivation throughout the year. He particularly thanked Marcel Aymon, one of the ...

  6. Early executive function predicts reasoning development.

    Science.gov (United States)

    Richland, Lindsey E; Burchinal, Margaret R

    2013-01-01

    Analogical reasoning is a core cognitive skill that distinguishes humans from all other species and contributes to general fluid intelligence, creativity, and adaptive learning capacities. Yet its origins are not well understood. In the study reported here, we analyzed large-scale longitudinal data from the Study of Early Child Care and Youth Development to test predictors of growth in analogical-reasoning skill from third grade to adolescence. Our results suggest an integrative resolution to the theoretical debate regarding contributory factors arising from smaller-scale, cross-sectional experiments on analogy development. Children with greater executive-function skills (both composite and inhibitory control) and vocabulary knowledge in early elementary school displayed higher scores on a verbal analogies task at age 15 years, even after adjusting for key covariates. We posit that knowledge is a prerequisite to analogy performance, but strong executive-functioning resources during early childhood are related to long-term gains in fundamental reasoning skills.

  7. The executive leader in the postcrisis era

    Directory of Open Access Journals (Sweden)

    Bazarov, Tahir Y.

    2013-06-01

    Full Text Available This article describes psychological challenges that executive leaders of companies face nowadays. The study of the social context is based on changes that took place with the development of information technologies. The analysis touches upon such phenomena as virtualization, involvement in the external sociocommunicative environment, and the emergence of multiple identity. It is suggested that in order to adapt to changing conditions one should follow the path of self-development—in particular, to develop attention, imagination, and willpower. In connection with the traits generally attributed to executive leaders, the article emphasizes self-adjustment; common sense as an integral part of intuition, emotions, and imagination; and the readiness to make choices in fifty-fifty situations.

  8. THE SECRETARY EXECUTIVE PROFESSIONALS UPON INTERNATIONAL RELATIONSHIPS

    Directory of Open Access Journals (Sweden)

    Suzana Helena Strate Bonzanini

    2011-04-01

    Full Text Available Nowadays people need to follow the speed of changes that happen around the world. Taking that into consideration, the present study aims at studying, analyzing, and verifying possibilities of improvement in the University Institutions, through the optimization of the tasks performed by the Executive Secretary Professional, in order to meet one of the objectives of the Institutions, that is to promote the Academic Exchange of students and professors for cultural, technical, and scientific growth. Therefore, the study focuses on globalization and internationalization, specifically in the scope of University Institutions. The Executive Secretary background, his/her present profile, and new functions his/her performs in the organizations, are pointed out the role as mediator. Regarding the International Relations topic, address the cultural differences.

  9. Development of the Executive Personal Finance Scale.

    Science.gov (United States)

    Spinella, Marcello; Yang, Bijou; Lester, David

    2007-03-01

    There is accumulating evidence that prefrontal systems play an important role in management of personal finances, based on studies using clinical populations, functional neuroimaging, and both subjective and objective neuropsychological measures. This study developed the Executive Personal Finance Scale (EPFS) as a specific self-rating measure of executive aspects of personal money management. The resulting 20-item scale had good reliability and showed four factors: impulse control, organization, planning, and motivational drive. Validity was evidenced by correlations with income, credit card debt, and investments. The EPFS also showed logical correlations with compulsive buying and money attitudes. Second-order factor analysis of the EPFS and other scales revealed two higher-order factors of personal finance: cognitive (e.g., planning, organizing) and emotional (e.g., anxiety, impulse-spending, prestige). The EPFS shows good psychometric properties, is easy to use, and will make a convenient complement to other research methodologies exploring the neural basis of personal finance management.

  10. Development of an integrated thermal-hydraulics capability incorporating RELAP5 and PANTHER neutronics code

    Energy Technology Data Exchange (ETDEWEB)

    Page, R.; Jones, J.R.

    1997-07-01

    Ensuring that safety analysis needs are met in the future is likely to lead to the development of new codes and the further development of existing codes. It is therefore advantageous to define standards for data interfaces and to develop software interfacing techniques which can readily accommodate changes when they are made. Defining interface standards is beneficial but is necessarily restricted in application if future requirements are not known in detail. Code interfacing methods are of particular relevance with the move towards automatic grid frequency response operation where the integration of plant dynamic, core follow and fault study calculation tools is considered advantageous. This paper describes the background and features of a new code TALINK (Transient Analysis code LINKage program) used to provide a flexible interface to link the RELAP5 thermal hydraulics code with the PANTHER neutron kinetics and the SIBDYM whole plant dynamic modelling codes used by Nuclear Electric. The complete package enables the codes to be executed in parallel and provides an integrated whole plant thermal-hydraulics and neutron kinetics model. In addition the paper discusses the capabilities and pedigree of the component codes used to form the integrated transient analysis package and the details of the calculation of a postulated Sizewell `B` Loss of offsite power fault transient.

  11. Overview of Particle and Heavy Ion Transport Code System PHITS

    Science.gov (United States)

    Sato, Tatsuhiko; Niita, Koji; Matsuda, Norihiro; Hashimoto, Shintaro; Iwamoto, Yosuke; Furuta, Takuya; Noda, Shusaku; Ogawa, Tatsuhiko; Iwase, Hiroshi; Nakashima, Hiroshi; Fukahori, Tokio; Okumura, Keisuke; Kai, Tetsuya; Chiba, Satoshi; Sihver, Lembit

    2014-06-01

    A general purpose Monte Carlo Particle and Heavy Ion Transport code System, PHITS, is being developed through the collaboration of several institutes in Japan and Europe. The Japan Atomic Energy Agency is responsible for managing the entire project. PHITS can deal with the transport of nearly all particles, including neutrons, protons, heavy ions, photons, and electrons, over wide energy ranges using various nuclear reaction models and data libraries. It is written in Fortran language and can be executed on almost all computers. All components of PHITS such as its source, executable and data-library files are assembled in one package and then distributed to many countries via the Research organization for Information Science and Technology, the Data Bank of the Organization for Economic Co-operation and Development's Nuclear Energy Agency, and the Radiation Safety Information Computational Center. More than 1,000 researchers have been registered as PHITS users, and they apply the code to various research and development fields such as nuclear technology, accelerator design, medical physics, and cosmic-ray research. This paper briefly summarizes the physics models implemented in PHITS, and introduces some important functions useful for specific applications, such as an event generator mode and beam transport functions.

  12. Lethal injection for execution: chemical asphyxiation?

    OpenAIRE

    Zimmers, Teresa A.; Jonathan Sheldon; Lubarsky, David A; Francisco López-Muñoz; Linda Waterman; Richard Weisman; Koniaris, Leonidas G.

    2007-01-01

    Editors' Summary Background. Lethal injection is a common form of execution in a number of countries, most prominently the US and China. The protocols currently used in the US contain three drugs: an ultrashort-acting barbiturate, thiopental (which acts as an anesthetic, but does not have any analgesic effect); a neuromuscular blocker, pancuronium bromide (which causes muscle paralysis); and an electrolyte, potassium chloride (which stops the heart from beating). Each of these drugs on its ow...

  13. Photic memory for executive brain responses

    OpenAIRE

    Chellappa,Sarah Laxhmi; Ly, Julien; Meyer, Christelle; Balteau, Evelyne; Degueldre, Christian; Luxen, André; Phillips, Christophe; Cooper, Howard,; Vandewalle, Gilles

    2014-01-01

    Light is a powerful stimulant for human alertness and cognition that can be easily administered to improve performance or counteract the negative impact of sleepiness, even during the day. Here, we show that prior exposure to longer wavelength light (orange), relative to shorter wavelength (blue), enhances the subsequent impact of light on executive brain responses. These findings emphasize the importance of light for human cognitive brain function and constitute compelling evidence in favor ...

  14. Execution monitoring for a mobile robot system

    Science.gov (United States)

    Miller, David P.

    1990-01-01

    Due to sensor errors, uncertainty, incomplete knowledge, and a dynamic world, robot plans will not always be executed exactly as planned. This paper describes an implemented robot planning system that enhances the traditional sense-think-act cycle in ways that allow the robot system monitor its behavior and react in emergencies in real-time. A proposal on how robot systems can completely break away from the traditional three-step cycle is also made.

  15. Current State of Dental Education: Executive Summary.

    Science.gov (United States)

    Formicola, Allan J

    2017-08-01

    This executive summary for Section 1 of the "Advancing Dental Education in the 21(st) Century" project provides a composite picture of information from 12 background articles on the current state of dental education in the United States. The summary includes the following topics: the current status of the dental curriculum, the implications of student debt and dental school finances, the expansion of enrollment, student diversity, pre- and postdoctoral education, safety net status of dental school clinics, and trends in faculty.

  16. Getting the right grasp on executive function

    Directory of Open Access Journals (Sweden)

    Claudia L R Gonzalez

    2014-04-01

    Full Text Available Executive Function (EF refers to important socio-emotional and cognitive skills that are known to be highly correlated with both academic and life success. EF is a blanket term that is considered to include self-regulation, working memory, and planning. Recent studies have shown a relationship between EF and motor control. The emergence of motor control coincides with that of EF, hence understanding the relationship between these two domains could have significant implications for early detection and remediation of later EF deficits. The purpose of the current study was to investigate this relationship in young children. This study incorporated the Behavioural Rating Inventory of Executive Function (BRIEF and two motor assessments with a focus on precision grasping to test this hypothesis. The BRIEF is comprised of two indices of EF: 1 the Behavioral Regulation Index (BRI containing three subscales: Inhibit, Shift, and Emotional Control; 2 the Metacognition Index (MI containing five subscales: Initiate, Working Memory, Plan/Organize, Organization of Materials, and Monitor. A global executive composite (GEC is derived from the two indices. In this study, right-handed children aged 5-6 and 9-10 were asked to: grasp-to-construct (Lego® models; and grasp-to-place (wooden blocks, while their parents completed the BRIEF questionnaire. Analysis of results indicated significant correlations between the strength of right hand preference for grasping and numerous elements of the BRIEF including the BRI, MI, and GEC. Specifically, the more the right hand was used for grasping the better the EF ratings. In addition, patterns of space-use correlated with the GEC in several subscales of the BRIEF. Finally and remarkably, the results also showed a reciprocal relationship between hand and space use for grasping and EF. These findings are discussed with respect to: 1 the developmental overlap of motor and executive functions; 2 detection of EF deficits through

  17. Cognitive programs: Software for attention's executive

    Directory of Open Access Journals (Sweden)

    John K Tsotsos

    2014-11-01

    Full Text Available What are the computational tasks that an executive controller for visual attention must solve? This question is posed in the context of the Selective Tuning model of attention. The range of required computations go beyond top-down bias signals or region-of-interest determinations, and must deal with overt and covert fixations, process timing and synchronization, information routing, memory, matching control to task, spatial localization, priming, and coordination of bottom-up with top-down information. During task execution, results must be monitored to ensure the expected results. This description includes the kinds of elements that are common in the control of any kind of complex machine or system. We seek a mechanistic integration of the above, in other words, algorithms that accomplish control. Such algorithms operate on representations, transforming a representation of one kind into another, which then forms the input to yet another algorithm. Cognitive Programs (CPs are hypothesized to capture exactly such representational transformations via stepwise sequences of operations. CPs, an updated and modernized offspring of Ullman's Visual Routines, impose an algorithmic structure to the set of attentional functions and play a role in the overall shaping of attentional modulation of the visual system so that it provides its best performance. This requires that we consider the visual system as a dynamic, yet general-purpose processor tuned to the task and input of the moment. This differs dramatically from the almost universal cognitive and computational views, which regard vision as a passively observing module to which simple questions about percepts can be posed, regardless of task. Differing from Visual Routines, CPs explicitly involve the critical elements of Visual Task Executive, Visual Attention Executive, and Visual Working Memory. Cognitive Programs provide the software that directs the actions of the Selective Tuning model of visual

  18. Ease: a real-time multitasking executive

    OpenAIRE

    Doyle, David

    1996-01-01

    Ease the real time multitasking executive described m this thesis is designed for embedded systems with particular emphasis on DSP motor control applications. Ease provides an application software interface to the underlying hardware and encourages an object oriented programming approach which inherently enhances software integrity, maintainability and dependability in the potentially chaotic real time environment. Its focus is to tackle the undesirable aspects of real time programming an...

  19. Materials Selection for Sustainable Executive Aircraft Interiors

    OpenAIRE

    Santos,Celise Villa dos; Leiva,Daniel Rodrigo; Costa,Fábio Rodrigues; Gregolin,José Angelo Rodrigues

    2016-01-01

    This study proposes a methodological guide to explore and select materials for executive aircraft interiors, contributing toward a perspective of materials requirements, indicators and strategies to design more environmentally sustainable products. This was motivated by the signs from the aviation industry to reduce its environmental impact and the permanent need to push for cost efficiency. The guide includes a schedule framework of materials requirements for sustainable design, and also aer...

  20. Nursing leadership education: an innovative executive solution.

    Science.gov (United States)

    Brooks, Beth A; Crawford, Lynda H; Nicklas, Gervaise E; Soldwisch, Sandie

    2014-12-01

    As nursing leaders retire from the nursing workforce, too few nurses are preparing to replace them. The barriers to obtaining the educational credentials necessary to take this important step in a leadership career can appear insurmountable because of cost and time restraints. The authors present an executive format master of science program whose delivery method and content align with the professional and personal needs of emerging nurse leaders.

  1. 48 CFR 552.270-3 - Parties To Execute Lease.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Parties To Execute Lease. 552.270-3 Section 552.270-3 Federal Acquisition Regulations System GENERAL SERVICES ADMINISTRATION... Parties To Execute Lease. As prescribed in 570.602, insert the following provision: Parties To Execute...

  2. 8 CFR 3.0 - Executive Office for Immigration Review

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Executive Office for Immigration Review 3.0... IMMIGRATION REVIEW § 3.0 Executive Office for Immigration Review Regulations of the Executive Office for Immigration Review relating to the adjudication of immigration matters before immigration judges (referred to...

  3. Executive Function and Reading Comprehension: A Meta-Analytic Review

    Science.gov (United States)

    Follmer, D. Jake

    2018-01-01

    This article presents a meta-analytic review of the relation between executive function and reading comprehension. Results (N = 6,673) supported a moderate positive association between executive function and reading comprehension (r = 0.36). Moderator analyses suggested that correlations between executive function and reading comprehension did not…

  4. 76 FR 29013 - Senior Executive Service; Performance Review Board; Members

    Science.gov (United States)

    2011-05-19

    ... COMMISSION Senior Executive Service; Performance Review Board; Members AGENCY: National Capital Planning Commission. ACTION: Notice of Members of Senior Executive Service Performance Review Board SUMMARY: Section... assigned to individual members of the agency's Senior Executive Service. The PRB established for the...

  5. 78 FR 28243 - Senior Executive Service; Performance Review Board; Members

    Science.gov (United States)

    2013-05-14

    ... COMMISSION Senior Executive Service; Performance Review Board; Members AGENCY: National Capital Planning Commission. ACTION: Notice of Members of Senior Executive Service Performance Review Board. SUMMARY: Section... assigned to individual members of the agency's Senior Executive Service. The PRB established for the...

  6. Executive dysfunction in late-onset depression.

    Science.gov (United States)

    Pisljar, Marko; Pirtosek, Z; Repovs, G; Grgic, M

    2008-06-01

    Depression in the elderly is frequently accompanied by cognitive impairment. Executive dysfunction, including disturbances in planning, sequencing, organizing and abstracting has been reported in late-onset depression. They were found to be associated with relapse and recurrence of geriatric major depression and with residual depressive symptoms. A group of patients with late-onset depression, compared with age matched healthy volunteers, were assessed for deficits in executive functioning. We used the computer version of Stroop Color-Word test enabling more detailed reaction time analysis. Severity of depression was evaluated with Hamilton depression rating scale and Geriatric depression scale. The preliminary results of a study show that patients with late-onset depression have increased absolute reaction times in Stroop colour-word test. Significant differences in the magnitude of individual interference effects pointing towards a characteristic change in attentional processes in depressed patients. The preliminary results of a study comparing a group of elderly depressed patients with a control group of older healthy volunteers confirm changes in executive functions.

  7. Executive roundtable II. Talking about quality.

    Science.gov (United States)

    Barry, D R; O'Leary, D S; Labovitz, G; Harper, D L; Sennett, C; Lord, J T; Jones, J J; Wright, J

    1997-01-01

    In the last issue of Healthcare Executive, we introduced the first in a two-part series on quality in healthcare. The series, which is predicated on a five-hour roundtable discussion among eight healthcare leaders, was moderated by Thomas C. Dolan, Ph.D., FACHE, CAE, ACHE's president and chief executive officer, and jointly sponsored by ACHE and the Bayer Quality Network, an educational forum for sharing innovative and effective continuous quality improvement methods with healthcare executives. In Part I, participants spoke about current issues as they relate to quality. They discussed the reliability of existing quality data and expressed a need for more practical indicators and measurement systems. The consumer mindset was discussed, as leaders debated the value of customer satisfaction surveys and ways to create more realistic consumer expectations. In terms of employers and third parties, participants suggested tailoring quality information and presenting it in a simplified fashion. Finally, leaders emphasized the need for better performance information, as well as the use of outcomes data for both educational and quality improvement purposes. In Part II, the dialogue remains compelling. Participants cover new ground as they talk about the role of accreditors in regulating quality, of governance teams and senior management in creating an organizational culture to support quality, and of physicians in attracting both business partners and patients based on quality. Following is the second in our two-part series.

  8. Can Rhesus Monkey Learn Executive Attention?

    Directory of Open Access Journals (Sweden)

    Jessica Bramlett-Parker

    2016-06-01

    Full Text Available A growing body of data indicates that, compared to humans, rhesus monkeys perform poorly on tasks that assess executive attention, or voluntary control over selection for processing, particularly under circumstances in which attention is attracted elsewhere by competing stimulus control. In the human-cognition literature, there are hotly active debates about whether various competencies such as executive attention, working memory capacity, and fluid intelligence can be improved through training. In the current study, rhesus monkeys (Macaca mulatta completed an attention-training intervention including several inhibitory-control tasks (a Simon task, numerical Stroop task, global/local interference task, and a continuous performance task to determine whether generalized improvements would be observed on a version of the Attention Network Test (ANT of controlled attention, which was administered before and after the training intervention. Although the animals demonstrated inhibition of prepotent responses and improved in executive attention with practice, this improvement did not generalize to the ANT at levels consistently better than were observed for control animals. Although these findings fail to encourage the possibility that species differences in cognitive competencies can be ameliorated through training, they do advance our understanding of the competition between stimulus-control and cognitive-control in performance by nonhuman and human primates.

  9. Sense-making by clinical and non-clinical executive directors within new governance arrangements.

    Science.gov (United States)

    Storey, John; Holti, Richard

    2009-01-01

    The purpose of this paper is to explore the various ways in which clinical executive directors and non-clinical executive directors are interpreting and responding to the extensive reforms and restructuring in the UK health service. The paper draws upon detailed research in two very large teaching hospital organizations in order to understand how actors crucial to the delivery of this vision are responding. Schedule-structured interviews with executive directors were conducted, recorded, transcribed and coded. The clinical and non-clinical directors of these organizations engaged in a process of active sense-making are found, which is leading to significant changes to the service and also changes to identity. The clinical directors are revealing a willingness to assume accountability for devolved profit centres in their service lines. The non-clinical directors are supportive of this idea in broad terms but are cautious about releasing "too much" central control. The paper is based on just two case studies and the analyses are made through the perspectives of the executive teams in each case. Changes to healthcare environments of this kind are occurring in many countries, but such is the extent and intensity of these changes in the UK that the government's aspiration is high--it sees this set of reforms leading to a peerless world class health service. The way in which the actors make sense of and navigate their way through the cross cutting principles and the layered reforms is a critical issue. There have been few systematic studies of the practical reality involved in the enactment of profit centre and service line management initiatives in acute hospital settings and the ways these are understood and negotiated at executive team level.

  10. 75 FR 55574 - Joint Public Roundtable on Swap Execution Facilities and Security-Based Swap Execution Facilities

    Science.gov (United States)

    2010-09-13

    ... COMMISSION SECURITIES AND EXCHANGE COMMISSION Joint Public Roundtable on Swap Execution Facilities and Security-Based Swap Execution Facilities AGENCY: Commodity Futures Trading Commission (``CFTC'') and Securities and Exchange Commission (``SEC'') (each, an ``Agency,'' and collectively, the ``Agencies...

  11. Executive Competencies of Nurses within the Veterans Health Administration: Comparison of Current and Future Nurse Executive Views

    National Research Council Canada - National Science Library

    Sutto, Natalie B

    2006-01-01

    ...). Using the Delphi method for executive decision-making, 144 current nurse executives, as well as 168 nurses identified for potential selection to this position, judged the relative importance of SKAs...

  12. An Analysis of the Air War College’s Executive Health and Fitness Assessment Program.

    Science.gov (United States)

    1985-05-01

    1.6335 60 1.7782 77 1.8865 (SOURC;E: Naval Health Research Center, San Diego, Calitornia) 30 BIBLIOGRAPHY 1. Castelli, W. P. " Epedemiology of Coronary...1% AIR WAR COLLEGE RESEARCH REPORT No. AU-AWC-85-057 0AN ANALYSIS OF THE AIR WAR COLLEGE’S EXECUTIVE HEALTH AND FITNESS ASSESSMENT PROGRAM In I...COVERED 14. DATE OF REPORT (Yr., Mo., Day) 15. PAGE COUNT Research FROM TO May 1985 132 16. SUPPLEMENTARY NOTATION S COSATI CODES 18. SUBJECT TERMS

  13. Executive pay trends and golden parachute tax: a collision on the horizon.

    Science.gov (United States)

    Johnson, David G

    2004-01-01

    Ironically, many corporations will likely discover that tying equity-based executive compensation more closely to performance will cost millions of dollars when there is a merger or acquisition. The reason: Internal Revenue Code Section 280G, which is designed to discourage "excess" parachute payments, often assesses a significantly higher toll on performance-based compensation than on time-vested equity payments. There is no magic remedy, but advance planning can often help mitigate the impact. This article describes the dilemma and suggests several approaches to the challenge.

  14. The ZPIC educational code suite

    Science.gov (United States)

    Calado, R.; Pardal, M.; Ninhos, P.; Helm, A.; Mori, W. B.; Decyk, V. K.; Vieira, J.; Silva, L. O.; Fonseca, R. A.

    2017-10-01

    Particle-in-Cell (PIC) codes are used in almost all areas of plasma physics, such as fusion energy research, plasma accelerators, space physics, ion propulsion, and plasma processing, and many other areas. In this work, we present the ZPIC educational code suite, a new initiative to foster training in plasma physics using computer simulations. Leveraging on our expertise and experience from the development and use of the OSIRIS PIC code, we have developed a suite of 1D/2D fully relativistic electromagnetic PIC codes, as well as 1D electrostatic. These codes are self-contained and require only a standard laptop/desktop computer with a C compiler to be run. The output files are written in a new file format called ZDF that can be easily read using the supplied routines in a number of languages, such as Python, and IDL. The code suite also includes a number of example problems that can be used to illustrate several textbook and advanced plasma mechanisms, including instructions for parameter space exploration. We also invite contributions to this repository of test problems that will be made freely available to the community provided the input files comply with the format defined by the ZPIC team. The code suite is freely available and hosted on GitHub at https://github.com/zambzamb/zpic. Work partially supported by PICKSC.

  15. ETR/ITER systems code

    Energy Technology Data Exchange (ETDEWEB)

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.; Bulmer, R.H.; Busigin, A.; DuBois, P.F.; Fenstermacher, M.E.; Fink, J.; Finn, P.A.; Galambos, J.D.; Gohar, Y.; Gorker, G.E.; Haines, J.R.; Hassanein, A.M.; Hicks, D.R.; Ho, S.K.; Kalsi, S.S.; Kalyanam, K.M.; Kerns, J.A.; Lee, J.D.; Miller, J.R.; Miller, R.L.; Myall, J.O.; Peng, Y-K.M.; Perkins, L.J.; Spampinato, P.T.; Strickler, D.J.; Thomson, S.L.; Wagner, C.E.; Willms, R.S.; Reid, R.L. (ed.)

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs.

  16. The Flutter Shutter Code Calculator

    Directory of Open Access Journals (Sweden)

    Yohann Tendero

    2015-08-01

    Full Text Available The goal of the flutter shutter is to make uniform motion blur invertible, by a"fluttering" shutter that opens and closes on a sequence of well chosen sub-intervals of the exposure time interval. In other words, the photon flux is modulated according to a well chosen sequence calledflutter shutter code. This article provides a numerical method that computes optimal flutter shutter codes in terms of mean square error (MSE. We assume that the observed objects follow a known (or learned random velocity distribution. In this paper, Gaussian and uniform velocity distributions are considered. Snapshots are also optimized taking the velocity distribution into account. For each velocity distribution, the gain of the optimal flutter shutter code with respectto the optimal snapshot in terms of MSE is computed. This symmetric optimization of theflutter shutter and of the snapshot allows to compare on an equal footing both solutions, i.e. camera designs. Optimal flutter shutter codes are demonstrated to improve substantially the MSE compared to classic (patented or not codes. A numerical method that permits to perform a reverse engineering of any existing (patented or not flutter shutter codes is also describedand an implementation is given. In this case we give the underlying velocity distribution fromwhich a given optimal flutter shutter code comes from. The combination of these two numerical methods furnishes a comprehensive study of the optimization of a flutter shutter that includes a forward and a backward numerical solution.

  17. Surface code implementation of block code state distillation

    Science.gov (United States)

    Fowler, Austin G.; Devitt, Simon J.; Jones, Cody

    2013-01-01

    State distillation is the process of taking a number of imperfect copies of a particular quantum state and producing fewer better copies. Until recently, the lowest overhead method of distilling states produced a single improved |A〉 state given 15 input copies. New block code state distillation methods can produce k improved |A〉 states given 3k + 8 input copies, potentially significantly reducing the overhead associated with state distillation. We construct an explicit surface code implementation of block code state distillation and quantitatively compare the overhead of this approach to the old. We find that, using the best available techniques, for parameters of practical interest, block code state distillation does not always lead to lower overhead, and, when it does, the overhead reduction is typically less than a factor of three. PMID:23736868

  18. Executive functioning in pre-school children with autism spectrum disorders: The relationship between executive functioning and language

    OpenAIRE

    Linnerud, Ida Cathrine Wang

    2014-01-01

    Background: Executive function difficulties are prevalent in children with autism spectrum disorders (ASD) and there are several indications of a modifying relationship between executive functions and language in children. However, there is limited research on the relationship between executive functioning and language in young children with ASD. The current study compared real-world executive functioning between groups of children with ASD, language disorders (LD), and typical development (T...

  19. Code-Mixing and Code Switchingin The Process of Learning

    Directory of Open Access Journals (Sweden)

    Diyah Atiek Mustikawati

    2016-09-01

    Full Text Available This study aimed to describe a form of code switching and code mixing specific form found in the teaching and learning activities in the classroom as well as determining factors influencing events stand out that form of code switching and code mixing in question.Form of this research is descriptive qualitative case study which took place in Al Mawaddah Boarding School Ponorogo. Based on the analysis and discussion that has been stated in the previous chapter that the form of code mixing and code switching learning activities in Al Mawaddah Boarding School is in between the use of either language Java language, Arabic, English and Indonesian, on the use of insertion of words, phrases, idioms, use of nouns, adjectives, clauses, and sentences. Code mixing deciding factor in the learning process include: Identification of the role, the desire to explain and interpret, sourced from the original language and its variations, is sourced from a foreign language. While deciding factor in the learning process of code, includes: speakers (O1, partners speakers (O2, the presence of a third person (O3, the topic of conversation, evoke a sense of humour, and just prestige. The significance of this study is to allow readers to see the use of language in a multilingual society, especially in AL Mawaddah boarding school about the rules and characteristics variation in the language of teaching and learning activities in the classroom. Furthermore, the results of this research will provide input to the ustadz / ustadzah and students in developing oral communication skills and the effectiveness of teaching and learning strategies in boarding schools.

  20. Lossless Coding with Generalised Criteria

    CERN Document Server

    Charalambous, Charalambos D; Rezaei, Farzad

    2011-01-01

    This paper presents prefix codes which minimize various criteria constructed as a convex combination of maximum codeword length and average codeword length or maximum redundancy and average redundancy, including a convex combination of the average of an exponential function of the codeword length and the average redundancy. This framework encompasses as a special case several criteria previously investigated in the literature, while relations to universal coding is discussed. The coding algorithm derived is parametric resulting in re-adjusting the initial source probabilities via a weighted probability vector according to a merging rule. The level of desirable merging has implication in applications where the maximum codeword length is bounded.