WorldWideScience

Sample records for machine code programs

  1. Machine structure oriented control code logic

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2009-01-01

    Control code is a concept that is closely related to a frequently occurring practitioner’s view on what is a program: code that is capable of controlling the behaviour of some machine. We present a logical approach to explain issues concerning control codes that are independent of the details of the

  2. Machines are benchmarked by code, not algorithms

    NARCIS (Netherlands)

    Poss, R.

    2013-01-01

    This article highlights how small modifications to either the source code of a benchmark program or the compilation options may impact its behavior on a specific machine. It argues that for evaluating machines, benchmark providers and users be careful to ensure reproducibility of results based on th

  3. Reusable State Machine Code Generator

    Science.gov (United States)

    Hoffstadt, A. A.; Reyes, C.; Sommer, H.; Andolfato, L.

    2010-12-01

    The State Machine model is frequently used to represent the behaviour of a system, allowing one to express and execute this behaviour in a deterministic way. A graphical representation such as a UML State Chart diagram tames the complexity of the system, thus facilitating changes to the model and communication between developers and domain experts. We present a reusable state machine code generator, developed by the Universidad Técnica Federico Santa María and the European Southern Observatory. The generator itself is based on the open source project architecture, and uses UML State Chart models as input. This allows for a modular design and a clean separation between generator and generated code. The generated state machine code has well-defined interfaces that are independent of the implementation artefacts such as the middle-ware. This allows using the generator in the substantially different observatory software of the Atacama Large Millimeter Array and the ESO Very Large Telescope. A project-specific mapping layer for event and transition notification connects the state machine code to its environment, which can be the Common Software of these projects, or any other project. This approach even allows to automatically create tests for a generated state machine, using techniques from software testing, such as path-coverage.

  4. Reversible machine code and its abstract processor architecture

    DEFF Research Database (Denmark)

    Axelsen, Holger Bock; Glück, Robert; Yokoyama, Tetsuo

    2007-01-01

    A reversible abstract machine architecture and its reversible machine code are presented and formalized. For machine code to be reversible, both the underlying control logic and each instruction must be reversible. A general class of machine instruction sets was proven to be reversible, building ...... on our concept of reversible updates. The presentation is abstract and can serve as a guideline for a family of reversible processor designs. By example, we illustrate programming principles for the abstract machine architecture formalized in this paper....

  5. Automatically-Programed Machine Tools

    Science.gov (United States)

    Purves, L.; Clerman, N.

    1985-01-01

    Software produces cutter location files for numerically-controlled machine tools. APT, acronym for Automatically Programed Tools, is among most widely used software systems for computerized machine tools. APT developed for explicit purpose of providing effective software system for programing NC machine tools. APT system includes specification of APT programing language and language processor, which executes APT statements and generates NC machine-tool motions specified by APT statements.

  6. Automatically-Programed Machine Tools

    Science.gov (United States)

    Purves, L.; Clerman, N.

    1985-01-01

    Software produces cutter location files for numerically-controlled machine tools. APT, acronym for Automatically Programed Tools, is among most widely used software systems for computerized machine tools. APT developed for explicit purpose of providing effective software system for programing NC machine tools. APT system includes specification of APT programing language and language processor, which executes APT statements and generates NC machine-tool motions specified by APT statements.

  7. Editing of EIA coded, numerically controlled, machine tool tapes

    Science.gov (United States)

    Weiner, J. M.

    1975-01-01

    Editing of numerically controlled (N/C) machine tool tapes (8-level paper tape) using an interactive graphic display processor is described. A rapid technique required for correcting production errors in N/C tapes was developed using the interactive text editor on the IMLAC PDS-ID graphic display system and two special programs resident on disk. The correction technique and special programs for processing N/C tapes coded to EIA specifications are discussed.

  8. Reversible machine code and its abstract processor architecture

    DEFF Research Database (Denmark)

    Axelsen, Holger Bock; Glück, Robert; Yokoyama, Tetsuo

    2007-01-01

    A reversible abstract machine architecture and its reversible machine code are presented and formalized. For machine code to be reversible, both the underlying control logic and each instruction must be reversible. A general class of machine instruction sets was proven to be reversible, building...

  9. Parametric programming of CNC machine tools

    Directory of Open Access Journals (Sweden)

    Gołębski Rafał

    2017-01-01

    Full Text Available The article presents the possibilities of parametric programming of CNC machine tools for the SINUMERIK 840D sl control system. The kinds and types of the definition of variables for the control system under discussion described. On the example of the longitudinal cutting cycle, parametric programming possibilities are shown. The program’s code and its implementation in the control system is described in detail. The principle of parametric programming in a high-level language is also explained.

  10. Optimal interference code based on machine learning

    Science.gov (United States)

    Qian, Ye; Chen, Qian; Hu, Xiaobo; Cao, Ercong; Qian, Weixian; Gu, Guohua

    2016-10-01

    In this paper, we analyze the characteristics of pseudo-random code, by the case of m sequence. Depending on the description of coding theory, we introduce the jamming methods. We simulate the interference effect or probability model by the means of MATLAB to consolidate. In accordance with the length of decoding time the adversary spends, we find out the optimal formula and optimal coefficients based on machine learning, then we get the new optimal interference code. First, when it comes to the phase of recognition, this study judges the effect of interference by the way of simulating the length of time over the decoding period of laser seeker. Then, we use laser active deception jamming simulate interference process in the tracking phase in the next block. In this study we choose the method of laser active deception jamming. In order to improve the performance of the interference, this paper simulates the model by MATLAB software. We find out the least number of pulse intervals which must be received, then we can make the conclusion that the precise interval number of the laser pointer for m sequence encoding. In order to find the shortest space, we make the choice of the greatest common divisor method. Then, combining with the coding regularity that has been found before, we restore pulse interval of pseudo-random code, which has been already received. Finally, we can control the time period of laser interference, get the optimal interference code, and also increase the probability of interference as well.

  11. Understanding and Writing G & M Code for CNC Machines

    Science.gov (United States)

    Loveland, Thomas

    2012-01-01

    In modern CAD and CAM manufacturing companies, engineers design parts for machines and consumable goods. Many of these parts are cut on CNC machines. Whether using a CNC lathe, milling machine, or router, the ideas and designs of engineers must be translated into a machine-readable form called G & M Code that can be used to cut parts to precise…

  12. Understanding and Writing G & M Code for CNC Machines

    Science.gov (United States)

    Loveland, Thomas

    2012-01-01

    In modern CAD and CAM manufacturing companies, engineers design parts for machines and consumable goods. Many of these parts are cut on CNC machines. Whether using a CNC lathe, milling machine, or router, the ideas and designs of engineers must be translated into a machine-readable form called G & M Code that can be used to cut parts to precise…

  13. Quantitative information measurement and application for machine component classification codes

    Institute of Scientific and Technical Information of China (English)

    LI Ling-Feng; TAN Jian-rong; LIU Bo

    2005-01-01

    Information embodied in machine component classification codes has internal relation with the probability distribution of the code symbol. This paper presents a model considering codes as information source based on Shannon's information theory. Using information entropy, it preserves the mathematical form and quantitatively measures the information amount of a symbol and a bit in the machine component classification coding system. It also gets the maximum value of information amount and the corresponding coding scheme when the category of symbols is fixed. Samples are given to show how to evaluate the information amount of component codes and how to optimize a coding system.

  14. Machine function based control code algebras

    NARCIS (Netherlands)

    Bergstra, J.A.

    2008-01-01

    Machine functions have been introduced by Earley and Sturgis in [6] in order to provide a mathematical foundation of the use of the T-diagrams proposed by Bratman in [5]. Machine functions describe the operation of a machine at a very abstract level. A theory of hardware and software based on machin

  15. A portable virtual machine target for proof-carrying code

    DEFF Research Database (Denmark)

    Franz, Michael; Chandra, Deepak; Gal, Andreas

    2005-01-01

    Virtual Machines (VMs) and Proof-Carrying Code (PCC) are two techniques that have been used independently to provide safety for (mobile) code. Existing virtual machines, such as the Java VM, have several drawbacks: First, the effort required for safety verification is considerable. Second and mor...... simultaneously providing efficient justin-time compilation and target-machine independence. In particular, our approach reduces the complexity of the required proofs, resulting in fewer proof obligations that need to be discharged at the target machine.......Virtual Machines (VMs) and Proof-Carrying Code (PCC) are two techniques that have been used independently to provide safety for (mobile) code. Existing virtual machines, such as the Java VM, have several drawbacks: First, the effort required for safety verification is considerable. Second and more...... subtly, the need to provide such verification by the code consumer inhibits the amount of optimization that can be performed by the code producer. This in turn makes justin-time compilation surprisingly expensive. Proof-Carrying Code, on the other hand, has its own set of limitations, among which...

  16. On Cascade Source Coding with A Side Information "Vending Machine"

    CERN Document Server

    Ahmadi, Behzad; Choudhuri, Chiranjib; Mitra, Urbashi

    2012-01-01

    The model of a side information "vending machine" accounts for scenarios in which acquiring side information is costly and thus should be done efficiently. In this paper, the three-node cascade source coding problem is studied under the assumption that a side information vending machine is available either at the intermediate or at the end node. In both cases, a single-letter characterization of the available trade-offs among the rate, the distortions in the reconstructions at the intermediate and at the end node, and the cost in acquiring the side information are derived under given conditions.

  17. Index coding via linear programming

    CERN Document Server

    Blasiak, Anna; Lubetzky, Eyal

    2010-01-01

    Index Coding has received considerable attention recently motivated in part by applications such as fast video-on-demand and efficient communication in wireless networks and in part by its connection to Network Coding. The basic setting of Index Coding encodes the side-information relation, the problem input, as an undirected graph and the fundamental parameter is the broadcast rate $\\beta$, the average communication cost per bit for sufficiently long messages (i.e. the non-linear vector capacity). Recent nontrivial bounds on $\\beta$ were derived from the study of other Index Coding capacities (e.g. the scalar capacity $\\beta_1$) by Bar-Yossef et al (FOCS'06), Lubetzky and Stav (FOCS'07) and Alon et al (FOCS'08). However, these indirect bounds shed little light on the behavior of $\\beta$ and its exact value remained unknown for \\emph{any graph} where Index Coding is nontrivial. Our main contribution is a hierarchy of linear programs whose solutions trap $\\beta$ between them. This enables a direct information-...

  18. Applied genetic programming and machine learning

    CERN Document Server

    Iba, Hitoshi; Paul, Topon Kumar

    2009-01-01

    What do financial data prediction, day-trading rule development, and bio-marker selection have in common? They are just a few of the tasks that could potentially be resolved with genetic programming and machine learning techniques. Written by leaders in this field, Applied Genetic Programming and Machine Learning delineates the extension of Genetic Programming (GP) for practical applications. Reflecting rapidly developing concepts and emerging paradigms, this book outlines how to use machine learning techniques, make learning operators that efficiently sample a search space, navigate the searc

  19. Requirements of a Better Secure Program Coding

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2012-01-01

    Full Text Available Secure program coding refers to how manage the risks determined by the security breaches because of the program source code. The papers reviews the best practices must be doing during the software development life cycle for secure software assurance, the methods and techniques used for a secure coding assurance, the most known and common vulnerabilities determined by a bad coding process and how the security risks are managed and mitigated. As a tool of the better secure program coding, the code review process is presented, together with objective measures for code review assurance and estimation of the effort for the code improvement.

  20. CNC LATHE MACHINE PRODUCING NC CODE BY USING DIALOG METHOD

    Directory of Open Access Journals (Sweden)

    Yakup TURGUT

    2004-03-01

    Full Text Available In this study, an NC code generation program utilising Dialog Method was developed for turning centres. Initially, CNC lathes turning methods and tool path development techniques were reviewed briefly. By using geometric definition methods, tool path was generated and CNC part program was developed for FANUC control unit. The developed program made CNC part program generation process easy. The program was developed using BASIC 6.0 programming language while the material and cutting tool database were and supported with the help of ACCESS 7.0.

  1. Compiler design handbook optimizations and machine code generation

    CERN Document Server

    Srikant, YN

    2003-01-01

    The widespread use of object-oriented languages and Internet security concerns are just the beginning. Add embedded systems, multiple memory banks, highly pipelined units operating in parallel, and a host of other advances and it becomes clear that current and future computer architectures pose immense challenges to compiler designers-challenges that already exceed the capabilities of traditional compilation techniques. The Compiler Design Handbook: Optimizations and Machine Code Generation is designed to help you meet those challenges. Written by top researchers and designers from around the

  2. Building a Successful Machine Safeguarding Program

    Energy Technology Data Exchange (ETDEWEB)

    McConnell, S

    2003-03-06

    Safeguarding hazards associated with machines is a goal common to all health and safety professionals. Whether the individual is new to the safety field or has held associated responsibilities for a period of time, safeguarding personnel who work with or around machine tools and equipment should be considered an important aspect of the job. Although significant progress has been made in terms of safeguarding machines since the era prior to the organized safety movement, companies continue to be cited by the Occupational Safety and Health Administration (OSHA) and workers continue to be injured, even killed by machine tools and equipment. In the early 1900s, it was common practice to operate transmission machinery (gears, belts, pulleys, shafting, etc.) completely unguarded. At that time, the countersunk set screw used on shafting had not been invented and projecting set screws were involved in many horrific accidents. Manufacturers built machines with little regard for worker safety. Workers were killed or seriously injured before definitive actions were taken to improve safety in the workplace. Many states adopted legislation aimed at requiring machine guarding and improved injury reduction. The first patent for a machine safeguard was issued in 1868 for a mechanical interlock. Other patents followed. As methods for safeguarding machinery and tools were developed, standards were written and programs were set up to monitor factories for compliance. Many of those standards continue to govern how we protect workers today. It is common to see machine tools built in the forties, fifties and sixties being used in machine shops today. In terms of safeguarding, these machines may be considered poorly designed, improperly safeguarded or simply unguarded. In addition to the potential threat of an OSHA citation, these conditions expose the operator to serious hazards that must be addressed. The safety professional can help line management determine workable solutions for

  3. TIME ANALYSIS ACCORDING TO PART PROGRAMS ON A CNC VERTICAL MACHINING CENTER

    Directory of Open Access Journals (Sweden)

    Ahmet Murat PİNAR

    2002-01-01

    Full Text Available In this study, a program examining the CNC programs in the control unit of Dyna Myte 2900 Vertical Machining Center and calculating the machining time and rapid movement time of the cutting tools has been developed. The workpiece program to be examined is transferred to CNC code editor by the user manually, by a computer file with a diskette, or through hard disk or the machine tool. By examining all the movements of the cutting tools, detailed machining time, rapid movement time or total time is served to the user. So that, an important part of workpiece cost analysis information is provided.

  4. Mississippi Curriculum Framework for Machine Tool Operation/Machine Shop (Program CIP: 48.0503--Machine Shop Assistant). Secondary Programs.

    Science.gov (United States)

    Mississippi Research and Curriculum Unit for Vocational and Technical Education, State College.

    This document, which reflects Mississippi's statutory requirement that instructional programs be based on core curricula and performance-based assessment, contains outlines of the instructional units required in local instructional management plans and daily lesson plans for machine tool operation/machine shop I and II. Presented first are a…

  5. Distinguishing protein-coding from non-coding RNAs through support vector machines.

    Directory of Open Access Journals (Sweden)

    Jinfeng Liu

    2006-04-01

    Full Text Available RIKEN's FANTOM project has revealed many previously unknown coding sequences, as well as an unexpected degree of variation in transcripts resulting from alternative promoter usage and splicing. Ever more transcripts that do not code for proteins have been identified by transcriptome studies, in general. Increasing evidence points to the important cellular roles of such non-coding RNAs (ncRNAs. The distinction of protein-coding RNA transcripts from ncRNA transcripts is therefore an important problem in understanding the transcriptome and carrying out its annotation. Very few in silico methods have specifically addressed this problem. Here, we introduce CONC (for "coding or non-coding", a novel method based on support vector machines that classifies transcripts according to features they would have if they were coding for proteins. These features include peptide length, amino acid composition, predicted secondary structure content, predicted percentage of exposed residues, compositional entropy, number of homologs from database searches, and alignment entropy. Nucleotide frequencies are also incorporated into the method. Confirmed coding cDNAs for eukaryotic proteins from the Swiss-Prot database constituted the set of true positives, ncRNAs from RNAdb and NONCODE the true negatives. Ten-fold cross-validation suggested that CONC distinguished coding RNAs from ncRNAs at about 97% specificity and 98% sensitivity. Applied to 102,801 mouse cDNAs from the FANTOM3 dataset, our method reliably identified over 14,000 ncRNAs and estimated the total number of ncRNAs to be about 28,000.

  6. PENGEMBANGAN PROGRAM APLIKASI ENHANCED MACHINE CONTROL DENGAN PYTHON UNTUK METODE INTERPOLASI NEWTON

    Directory of Open Access Journals (Sweden)

    Alexander Agung Santoso Gunawan

    2012-05-01

    machine is EMC (Enhanced Machine Control and GUI (Graphical User Interface AXIS on the operating system Linux Ubuntu. The Newton interpolation is used to create a curve based on several point determined by user. By converting this curve into G-Code, which could be read by CNC machine, the machine can move according to curve designed by user. This research is an initial study to customize the CNC machine and will continue to fulfill the user needs. This research obtained a program that is able to run well up to 4 input pairs. The higher number inputs will cause the oscillation in the interpolation curve.

  7. Program Design Report of the CNC Machine Tool(II)

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jong Kiun; Youm, K. U.; Kim, K. S.; Lee, I. B.; Yoon, K. B.; Lee, C. K.; Youm, J. H

    2007-06-15

    The application of CNC machine tool being widely expanded according to variety of machine work method and rapid promotion of machine tool, cutting tool, for high speed efficient machine work. In order to conduct of the project of manufacture and maintenance of laboratory equipment, production design and machine work technology are continually developed, especially the application of CNC machine tool is very important for the improvement of productivity, quality and clearing up a manpower shortage. We publish technical report which it includes CNC machine tool program and drawing, it contributes to the systematic development of CNC program design and machine work technology.

  8. Multilanguage parallel programming of heterogeneous machines

    Energy Technology Data Exchange (ETDEWEB)

    Bisiani, R.; Forin, A.

    1988-08-01

    The authors designed and implemented a system, Agora, that supports the development of multilanguage parallel applications for heterogeneous machines. Agora hinges on two ideas: the first one is that shared memory can be a suitable abstraction to program concurrent, multilanguage modules running on heterogeneous machines. The second one is that a shared memory abstraction can efficiently supported across different computer architectures that are not connected by a physical shared memory, for example local are network workstations or ensemble machines. Agora has been in use for more than a year. This paper describes the Agora shared memory and its software implementation on both tightly and loosely coupled architectures. Measurements of the current implementation are also included.

  9. Code-expanded radio access protocol for machine-to-machine communications

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2013-01-01

    The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated...... subframes and orthogonal preambles, the amount of available contention resources is drastically increased, enabling the massive support of Machine-Type Communication users that is beyond the reach of current systems....

  10. Code-expanded radio access protocol for machine-to-machine communications

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2013-01-01

    The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated b...

  11. A Machine Learning Perspective on Predictive Coding with PAQ

    CERN Document Server

    Knoll, Byron

    2011-01-01

    PAQ8 is an open source lossless data compression algorithm that currently achieves the best compression rates on many benchmarks. This report presents a detailed description of PAQ8 from a statistical machine learning perspective. It shows that it is possible to understand some of the modules of PAQ8 and use this understanding to improve the method. However, intuitive statistical explanations of the behavior of other modules remain elusive. We hope the description in this report will be a starting point for discussions that will increase our understanding, lead to improvements to PAQ8, and facilitate a transfer of knowledge from PAQ8 to other machine learning methods, such a recurrent neural networks and stochastic memoizers. Finally, the report presents a broad range of new applications of PAQ to machine learning tasks including language modeling and adaptive text prediction, adaptive game playing, classification, and compression using features from the field of deep learning.

  12. Machine-Learning Algorithms to Code Public Health Spending Accounts.

    Science.gov (United States)

    Brady, Eoghan S; Leider, Jonathon P; Resnick, Beth A; Alfonso, Y Natalia; Bishai, David

    Government public health expenditure data sets require time- and labor-intensive manipulation to summarize results that public health policy makers can use. Our objective was to compare the performances of machine-learning algorithms with manual classification of public health expenditures to determine if machines could provide a faster, cheaper alternative to manual classification. We used machine-learning algorithms to replicate the process of manually classifying state public health expenditures, using the standardized public health spending categories from the Foundational Public Health Services model and a large data set from the US Census Bureau. We obtained a data set of 1.9 million individual expenditure items from 2000 to 2013. We collapsed these data into 147 280 summary expenditure records, and we followed a standardized method of manually classifying each expenditure record as public health, maybe public health, or not public health. We then trained 9 machine-learning algorithms to replicate the manual process. We calculated recall, precision, and coverage rates to measure the performance of individual and ensembled algorithms. Compared with manual classification, the machine-learning random forests algorithm produced 84% recall and 91% precision. With algorithm ensembling, we achieved our target criterion of 90% recall by using a consensus ensemble of ≥6 algorithms while still retaining 93% coverage, leaving only 7% of the summary expenditure records unclassified. Machine learning can be a time- and cost-saving tool for estimating public health spending in the United States. It can be used with standardized public health spending categories based on the Foundational Public Health Services model to help parse public health expenditure information from other types of health-related spending, provide data that are more comparable across public health organizations, and evaluate the impact of evidence-based public health resource allocation.

  13. Towards a universal code formatter through machine learning

    NARCIS (Netherlands)

    Parr, T. (Terence); J.J. Vinju (Jurgen)

    2016-01-01

    textabstractThere are many declarative frameworks that allow us to implement code formatters relatively easily for any specific language, but constructing them is cumbersome. The first problem is that "everybody" wants to format their code differently, leading to either many formatter variants or a

  14. Code-Expanded Random Access for Machine-Type Communications

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Stefanovic, Cedomir

    2012-01-01

    Abstract—The random access methods used for support of machine-type communications (MTC) in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. Motivated by the random access method employed in LTE, we propose...

  15. Human Machine Interface Programming and Testing

    Science.gov (United States)

    Foster, Thomas Garrison

    2013-01-01

    Human Machine Interface (HMI) Programming and Testing is about creating graphical displays to mimic mission critical ground control systems in order to provide NASA engineers with the ability to monitor the health management of these systems in real time. The Health Management System (HMS) is an online interactive human machine interface system that monitors all Kennedy Ground Control Subsystem (KGCS) hardware in the field. The Health Management System is essential to NASA engineers because it allows remote control and monitoring of the health management systems of all the Programmable Logic Controllers (PLC) and associated field devices. KGCS will have equipment installed at the launch pad, Vehicle Assembly Building, Mobile Launcher, as well as the Multi-Purpose Processing Facility. I am designing graphical displays to monitor and control new modules that will be integrated into the HMS. The design of the display screen will closely mimic the appearance and functionality of the actual modules. There are many different field devices used to monitor health management and each device has its own unique set of health management related data, therefore each display must also have its own unique way to display this data. Once the displays are created, the RSLogix5000 application is used to write software that maps all the required data read from the hardware to the graphical display. Once this data is mapped to its corresponding display item, the graphical display and hardware device will be connected through the same network in order to test all possible scenarios and types of data the graphical display was designed to receive. Test Procedures will be written to thoroughly test out the displays and ensure that they are working correctly before being deployed to the field. Additionally, the Kennedy Ground Controls Subsystem's user manual will be updated to explain to the NASA engineers how to use the new module displays.

  16. Florida Vocational Program Guide for Basic Precision Machining, Precision Machining.

    Science.gov (United States)

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This program guide has been developed to provide information that will be useful to local school district and community college administrators, instructors, program advisory committee members, regional coordinating councils, and others charged with the responsibility of offering vocational education programs in Florida. It identifies the major…

  17. Data calculation program for RELAP 5 code

    Energy Technology Data Exchange (ETDEWEB)

    Silvestre, Larissa J.B.; Sabundjian, Gaiane, E-mail: larissajbs@usp.br, E-mail: gdjian@ipen.br [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil)

    2015-07-01

    As the criteria and requirements for a nuclear power plant are extremely rigid, computer programs for simulation and safety analysis are required for certifying and licensing a plant. Based on this scenario, some sophisticated computational tools have been used such as the Reactor Excursion and Leak Analysis Program (RELAP5), which is the most used code for the thermo-hydraulic analysis of accidents and transients in nuclear reactors. A major difficulty in the simulation using RELAP5 code is the amount of information required for the simulation of thermal-hydraulic accidents or transients. The preparation of the input data leads to a very large number of mathematical operations for calculating the geometry of the components. Therefore, a mathematical friendly preprocessor was developed in order to perform these calculations and prepare RELAP5 input data. The Visual Basic for Application (VBA) combined with Microsoft EXCEL demonstrated to be an efficient tool to perform a number of tasks in the development of the program. Due to the absence of necessary information about some RELAP5 components, this work aims to make improvements to the Mathematic Preprocessor for RELAP5 code (PREREL5). For the new version of the preprocessor, new screens of some components that were not programmed in the original version were designed; moreover, screens of pre-existing components were redesigned to improve the program. In addition, an English version was provided for the new version of the PREREL5. The new design of PREREL5 contributes for saving time and minimizing mistakes made by users of the RELAP5 code. The final version of this preprocessor will be applied to Angra 2. (author)

  18. A Machine Learning Perspective on Predictive Coding with PAQ

    OpenAIRE

    Knoll, Byron; de Freitas, Nando

    2011-01-01

    PAQ8 is an open source lossless data compression algorithm that currently achieves the best compression rates on many benchmarks. This report presents a detailed description of PAQ8 from a statistical machine learning perspective. It shows that it is possible to understand some of the modules of PAQ8 and use this understanding to improve the method. However, intuitive statistical explanations of the behavior of other modules remain elusive. We hope the description in this report will be a sta...

  19. "Source Coding With a Side Information ""Vending Machine"""

    OpenAIRE

    Weissman, Tsachy; Permuter, Haim H.

    2011-01-01

    We study source coding in the presence of side information, when the system can take actions that affect the availability, quality, or nature of the side information. We begin by extending the Wyner-Ziv problem of source coding with decoder side information to the case where the decoder is allowed to choose actions affecting the side information. We then consider the setting where actions are taken by the encoder, based on its observation of the source. Actions may have costs that are commens...

  20. A Quaternary Decision Diagram Machine: Optimization of Its Code

    Science.gov (United States)

    2010-08-01

    2026 IEICE TRANS. INF. & SYST., VOL.E93–D, NO.8 AUGUST 2010 INVITED PAPER Special Section on Multiple-Valued Logic and VLSI Computing A Quaternary...sequentially. A straightforward method to increase the speed is to increase the clock frequency. However, this is 2028 IEICE TRANS. INF. & SYST...reduce the 2030 IEICE TRANS. INF. & SYST., VOL.E93–D, NO.8 AUGUST 2010 Fig. 9 4-address QDD machine. Fig. 10 Branch instruction for 4-address QDD

  1. Accuracy comparison among different machine learning techniques for detecting malicious codes

    Science.gov (United States)

    Narang, Komal

    2016-03-01

    In this paper, a machine learning based model for malware detection is proposed. It can detect newly released malware i.e. zero day attack by analyzing operation codes on Android operating system. The accuracy of Naïve Bayes, Support Vector Machine (SVM) and Neural Network for detecting malicious code has been compared for the proposed model. In the experiment 400 benign files, 100 system files and 500 malicious files have been used to construct the model. The model yields the best accuracy 88.9% when neural network is used as classifier and achieved 95% and 82.8% accuracy for sensitivity and specificity respectively.

  2. Access, Equity, and Opportunity. Women in Machining: A Model Program.

    Science.gov (United States)

    Warner, Heather

    The Women in Machining (WIM) program is a Machine Action Project (MAP) initiative that was developed in response to a local skilled metalworking labor shortage, despite a virtual absence of women and people of color from area shops. The project identified post-war stereotypes and other barriers that must be addressed if women are to have an equal…

  3. Code-Expanded Random Access for Machine-Type Communications

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Stefanovic, Cedomir

    2012-01-01

    a novel approach that is able to sustain a wide random access load range, while preserving the physical layer unchanged and incurring minor changes in the medium access control layer. The proposed scheme increases the amount of available contention resources, without resorting to the increase of system...... of an increased number of MTC users. We present the framework and analysis of the proposed code-expanded random access method and show that our approach supports load regions that are beyond the reach of current systems....

  4. Using machine-coded event data for the micro-level study of political violence

    Directory of Open Access Journals (Sweden)

    Jesse Hammond

    2014-07-01

    Full Text Available Machine-coded datasets likely represent the future of event data analysis. We assess the use of one of these datasets—Global Database of Events, Language and Tone (GDELT—for the micro-level study of political violence by comparing it to two hand-coded conflict event datasets. Our findings indicate that GDELT should be used with caution for geo-spatial analyses at the subnational level: its overall correlation with hand-coded data is mediocre, and at the local level major issues of geographic bias exist in how events are reported. Overall, our findings suggest that due to these issues, researchers studying local conflict processes may want to wait for a more reliable geocoding method before relying too heavily on this set of machine-coded data.

  5. Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

    Directory of Open Access Journals (Sweden)

    Abdulrahman Muthana

    2009-01-01

    Full Text Available Problem statement: How a host (the code consumer can determine with certainty that a downloaded program received from untrusted source (the code producer will maintain the confidentiality of the data it manipulates and it is safe to install and execute. Approach: The approach adopted for verifying that a downloaded program will not leak confidential data to unauthorized parties was based on the concept of Proof-Carrying Code (PCC. A mobile program (in its assembly form was analyzed for information flow security based on the concept of proof-carrying code. The security policy was centered on a type system for analyzing information flows within assembly programs based on the notion of noninterference. Results: A verification tool for verifying assembly programs for information flow security was built. The tool certifies SPARC assembly programs for secure information flow by statically analyzing the program based on the idea of Proof-Carrying Code (PCC. The tool operated directly on the machine-code requiring only the inputs and outputs of the code annotated with security levels. The tool provided a windows user interface enabling the users to control the verification process. The proofs that untrusted program did not leak sensitive information were generated and checked on the host machine and if they are valid, then the untrusted program can be installed and executed safely. Conclusion: By basing proof-carrying code infrastructure on information flow analysis type-system, a sufficient assurance of protecting confidential data manipulated by the mobile program can be obtained. This assurance was come due to the fact that type systems provide a sufficient guarantee of protecting confidentiality.

  6. Machine and Collection Abstractions for User-Implemented Data-Parallel Programming

    Directory of Open Access Journals (Sweden)

    Magne Haveraaen

    2000-01-01

    Full Text Available Data parallelism has appeared as a fruitful approach to the parallelisation of compute-intensive programs. Data parallelism has the advantage of mimicking the sequential (and deterministic structure of programs as opposed to task parallelism, where the explicit interaction of processes has to be programmed. In data parallelism data structures, typically collection classes in the form of large arrays, are distributed on the processors of the target parallel machine. Trying to extract distribution aspects from conventional code often runs into problems with a lack of uniformity in the use of the data structures and in the expression of data dependency patterns within the code. Here we propose a framework with two conceptual classes, Machine and Collection. The Machine class abstracts hardware communication and distribution properties. This gives a programmer high-level access to the important parts of the low-level architecture. The Machine class may readily be used in the implementation of a Collection class, giving the programmer full control of the parallel distribution of data, as well as allowing normal sequential implementation of this class. Any program using such a collection class will be parallelisable, without requiring any modification, by choosing between sequential and parallel versions at link time. Experiments with a commercial application, built using the Sophus library which uses this approach to parallelisation, show good parallel speed-ups, without any adaptation of the application program being needed.

  7. Linear Index Coding via Semidefinite Programming

    CERN Document Server

    Chlamtac, Eden

    2011-01-01

    In the index coding problem, introduced by Birk and Kol (INFOCOM, 1998), the goal is to broadcast an n bit word to n receivers (one bit per receiver), where the receivers have side information represented by a graph G. The objective is to minimize the length of a codeword sent to all receivers which allows each receiver to learn its bit. For linear index coding, the minimum possible length is known to be equal to a graph parameter called minrank (Bar-Yossef et al., FOCS, 2006). We show a polynomial time algorithm that, given an n vertex graph G with minrank k, finds a linear index code for G of length $\\widetilde{O}(n^{f(k)})$, where f(k) depends only on k. For example, for k=3 we obtain f(3) ~ 0.2574. Our algorithm employs a semidefinite program (SDP) introduced by Karger, Motwani and Sudan (J. ACM, 1998) for graph coloring and its refined analysis due to Arora, Chlamtac and Charikar (STOC, 2006). Since the SDP we use is not a relaxation of the minimization problem we consider, a crucial component of our ana...

  8. DESIGNING A G CODE PROGRAMMING LANGUAGE FOR THE REFERENCE POINT SEVEN-SPEED SHAFT

    Directory of Open Access Journals (Sweden)

    VALERIA VICTORIA IOVANOV

    2015-05-01

    Full Text Available A CNC machine makes use of mathematics and various coordinate systems to understand and process the information it receives to determine what to move where and how fast . The most important function of any CNC machine is precise and rigorous control of the motion. All CNC equipment have two or more directions of motion, called axes. CNC machines are driven by computer controlled servo motors and generally guided by a stored program, the type of motion (fast , linear, circular , the moving axes, the distances of motion and the speed of motion ( processing being programmable for most CNC machines .This paper proposes the design and implementation of a G code programming language for the reference point „Seven-speed shaft”, used in all fields, in the motion transmission systems.

  9. Machine Operator Training Program and Curriculum.

    Science.gov (United States)

    St. Cyr, David; And Others

    This curriculum contains materials for use in duplicating the 11-week course for machine operators that was implemented at New Hampshire Vocational-Technical College in Nashua, New Hampshire. Addressed in the course, which is designed to prepare entry-level employees, are the following topics: basic math, blueprint reading, layout tools and…

  10. "Hour of Code": Can It Change Students' Attitudes toward Programming?

    Science.gov (United States)

    Du, Jie; Wimmer, Hayden; Rada, Roy

    2016-01-01

    The Hour of Code is a one-hour introduction to computer science organized by Code.org, a non-profit dedicated to expanding participation in computer science. This study investigated the impact of the Hour of Code on students' attitudes towards computer programming and their knowledge of programming. A sample of undergraduate students from two…

  11. Understanding Notional Machines through Traditional Teaching with Conceptual Contraposition and Program Memory Tracing

    Directory of Open Access Journals (Sweden)

    Jeisson Hidalgo-Céspedes

    2016-08-01

    Full Text Available A correct understanding about how computers run code is mandatory in order to effectively learn to program. Lectures have historically been used in programming courses to teach how computers execute code, and students are assessed through traditional evaluation methods, such as exams. Constructivism learning theory objects to students’ passiveness during lessons, and traditional quantitative methods for evaluating a complex cognitive process such as understanding. Constructivism proposes complimentary techniques, such as conceptual contraposition and colloquies. We enriched lectures of a “Programming II” (CS2 course combining conceptual contraposition with program memory tracing, then we evaluated students’ understanding of programming concepts through colloquies. Results revealed that these techniques applied to the lecture are insufficient to help students develop satisfactory mental models of the C++ notional machine, and colloquies behaved as the most comprehensive traditional evaluations conducted in the course.

  12. Program Optimization Using Abstract State Machines

    Directory of Open Access Journals (Sweden)

    Gabriel SOFONEA

    2006-01-01

    Full Text Available Usually the result code of source code by a compiler is not necessary the best one, and can be improved to run faster or to use less memory. This kind of improvement is done in compiling phase after parsing. Some good techniques in optimization are in folding the constants, elimination of dead code, or improvement of the loops. Here it is considered the runtime overhead and present how can this be improved. The source is specific for objectoriented languages with late binding, where a name of method to be called is bound to method dynamically. It increases the computation time by a cost of traversing the class hierarchy each time a method is called.

  13. OPMILL - MICRO COMPUTER PROGRAMMING ENVIRONMENT FOR CNC MILLING MACHINES THREE AXIS EQUATION PLOTTING CAPABILITIES

    Science.gov (United States)

    Ray, R. B.

    1994-01-01

    OPMILL is a computer operating system for a Kearney and Trecker milling machine that provides a fast and easy way to program machine part manufacture with an IBM compatible PC. The program gives the machinist an "equation plotter" feature which plots any set of equations that define axis moves (up to three axes simultaneously) and converts those equations to a machine milling program that will move a cutter along a defined path. Other supported functions include: drill with peck, bolt circle, tap, mill arc, quarter circle, circle, circle 2 pass, frame, frame 2 pass, rotary frame, pocket, loop and repeat, and copy blocks. The system includes a tool manager that can handle up to 25 tools and automatically adjusts tool length for each tool. It will display all tool information and stop the milling machine at the appropriate time. Information for the program is entered via a series of menus and compiled to the Kearney and Trecker format. The program can then be loaded into the milling machine, the tool path graphically displayed, and tool change information or the program in Kearney and Trecker format viewed. The program has a complete file handling utility that allows the user to load the program into memory from the hard disk, save the program to the disk with comments, view directories, merge a program on the disk with one in memory, save a portion of a program in memory, and change directories. OPMILL was developed on an IBM PS/2 running DOS 3.3 with 1 MB of RAM. OPMILL was written for an IBM PC or compatible 8088 or 80286 machine connected via an RS-232 port to a Kearney and Trecker Data Mill 700/C Control milling machine. It requires a "D:" drive (fixed-disk or virtual), a browse or text display utility, and an EGA or better display. Users wishing to modify and recompile the source code will also need Turbo BASIC, Turbo C, and Crescent Software's QuickPak for Turbo BASIC. IBM PC and IBM PS/2 are registered trademarks of International Business Machines. Turbo

  14. Incremental Code Clone Detection and Elimination for Erlang Programs

    OpenAIRE

    Li, Huiqing; Thompson, Simon

    2011-01-01

    A well-known bad code smell in refactoring and software maintenance is the existence of code clones, which are code fragments that are identical or similar to one another. This paper describes an approach to incrementally detecting 'similar' code based on the notion of least-general common abstraction, or anti-unification, as well as a framework for user-controlled incremental elimination of code clones within the context of Erlang programs. The clone detection algorithm proposed in this pape...

  15. Compiling scheme using abstract state machines

    OpenAIRE

    2003-01-01

    The project investigates the use of Abstract State Machine in the process of computer program compilation. Compilation is to produce machine-code from a source program written in a high-level language. A compiler is a program written for the purpose. Machine-code is the computer-readable representation of sequences of computer instructions. An Abstract State Machine (ASM) is a notional computing machine, developed by Yuri Gurevich, for accurately and easily representing the semantics of...

  16. Predicting and Classifying User Identification Code System Based on Support Vector Machines

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (U ID) code that is the fingerprint for tracking the authorized user. The proposed hiding scheme makes use of a random number generator to scramble two copies of a UID,which will then be hidden in the randomly selected medium frequency coefficients of the host image. The linear support vector machine (SVM) will be used to train classifications by calculating the normalized correlation (NC) for the 2-class UID codes. The trained classifications will be the models used for identifying unreadable UID codes.Experimental results showed that the success of predicting the unreadable UID codes can be increased by applying SVM. The proposed scheme can be used to provide protections to intellectual property rights of digital images and to keep track of users to prevent collaborative piracies.

  17. C4.5 programs for machine learning

    CERN Document Server

    Quinlan, J Ross

    1992-01-01

    Classifier systems play a major role in machine learning and knowledge-based systems, and Ross Quinlan's work on ID3 and C4.5 is widely acknowledged to have made some of the most significant contributions to their development. This book is a complete guide to the C4.5 system as implemented in C for the UNIX environment. It contains a comprehensive guide to the system's use , the source code (about 8,800 lines), and implementation notes. The source code and sample datasets are also available for download (see below). C4.5 starts with large sets of cases belonging to known classes. The cases,

  18. Notional Machines and Introductory Programming Education

    Science.gov (United States)

    Sorva, Juha

    2013-01-01

    This article brings together, summarizes, and comments on several threads of research that have contributed to our understanding of the challenges that novice programmers face when learning about the runtime dynamics of programs and the role of the computer in program execution. More specifically, the review covers the literature on programming…

  19. LPNORM: A linear programming normative analysis code

    Science.gov (United States)

    de Caritat, Patrice; Bloch, John; Hutcheon, Ian

    1994-04-01

    The computer code LPNORM implements the mathematical method of linear programming to calculate the mineralogical makeup of mineral mixtures, such as rock, sediment, or soil samples, from their bulk geochemical composition and from the mineralogical (or geochemical) composition of the contained minerals. This method simultaneously solves the set of linear equations governing the distribution of oxides into these minerals, subject to an objective function and a set of basic constraints. LPNORM allows the user to specify what minerals will be considered for normative analysis, what their composition is (in terms of mineral formula or geochemical composition), and whether to maximize mineral abundances, minimize slack variables (oxides that can not be accounted for), or do both at once in the objective function. Independent knowledge about the abundance of one or several of the minerals in the sample can be entered as additional equality or inequality constraints. Trial-and-error approach enables the user to "optimize" the composition of one or a few of the contained minerals. Results of comparative tests, highlighting the efficiency, as well as the shortcomings, of LPNORM are presented.

  20. Program Guide for Basic Precision Machining 8754000 (IN48.052300) and Precision Machining MTR0470 (IN48.050300).

    Science.gov (United States)

    University of South Florida, Tampa. Dept. of Adult and Vocational Education.

    This competency-based program guide provides course content information and procedures for secondary schools, postsecondary vocational schools, and community colleges in Florida that conduct programs in basic precision machining and precision machining. The first section is on legal authority, which applies to all vocational education programs in…

  1. Joint Machine Learning and Game Theory for Rate Control in High Efficiency Video Coding.

    Science.gov (United States)

    Gao, Wei; Kwong, Sam; Jia, Yuheng

    2017-08-25

    In this paper, a joint machine learning and game theory modeling (MLGT) framework is proposed for inter frame coding tree unit (CTU) level bit allocation and rate control (RC) optimization in High Efficiency Video Coding (HEVC). First, a support vector machine (SVM) based multi-classification scheme is proposed to improve the prediction accuracy of CTU-level Rate-Distortion (R-D) model. The legacy "chicken-and-egg" dilemma in video coding is proposed to be overcome by the learning-based R-D model. Second, a mixed R-D model based cooperative bargaining game theory is proposed for bit allocation optimization, where the convexity of the mixed R-D model based utility function is proved, and Nash bargaining solution (NBS) is achieved by the proposed iterative solution search method. The minimum utility is adjusted by the reference coding distortion and frame-level Quantization parameter (QP) change. Lastly, intra frame QP and inter frame adaptive bit ratios are adjusted to make inter frames have more bit resources to maintain smooth quality and bit consumption in the bargaining game optimization. Experimental results demonstrate that the proposed MLGT based RC method can achieve much better R-D performances, quality smoothness, bit rate accuracy, buffer control results and subjective visual quality than the other state-of-the-art one-pass RC methods, and the achieved R-D performances are very close to the performance limits from the FixedQP method.

  2. Code Component Composition Reuse Is a New Programming Paradigm

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    After describing the characteristics of programming paradigm,this pap er introduces the approach of code component composition reuse in detail, propos es and discusses viewpoint that code component composition reuse is a kind of ne w programming paradigm. This paper also specifies the characteristics of this ne w programming paradigm in detail, and points out some issues that must be resolv ed for using this new programming paradigm.

  3. Model checking abstract state machines with answer set programming

    OpenAIRE

    2006-01-01

    Answer Set Programming (ASP) is a logic programming paradigm that has been shown as a useful tool in various application areas due to its expressive modelling language. These application areas include Bourided Model Checking (BMC). BMC is a verification technique that is recognized for its strong ability of finding errors in computer systems. To apply BMC, a system needs to be modelled in a formal specification language, such as the widely used formalism of Abstract State Machines (ASMs). In ...

  4. Do Code Smells Hamper Novice Programming?

    NARCIS (Netherlands)

    Hermans, F.; Aivaloglou, E.

    2016-01-01

    Recently, block-based programming languages like Alice, Scratch and Blockly have become popular tools for programming education. There is substantial research showing that block-based languages are suitable for early programming education. But can block-based programs be smelly too? And does that ma

  5. Debugging the virtual machine

    Energy Technology Data Exchange (ETDEWEB)

    Miller, P.; Pizzi, R.

    1994-09-02

    A computer program is really nothing more than a virtual machine built to perform a task. The program`s source code expresses abstract constructs using low level language features. When a virtual machine breaks, it can be very difficult to debug because typical debuggers provide only low level machine implementation in formation to the software engineer. We believe that the debugging task can be simplified by introducing aspects of the abstract design into the source code. We introduce OODIE, an object-oriented language extension that allows programmers to specify a virtual debugging environment which includes the design and abstract data types of the virtual machine.

  6. Automatic Coding Rule Conformance Checking Using Logic Programs

    CERN Document Server

    Marpons-Ucero, Guillem; Herranz, Ángel; Fredlund, Lars-Åke; Carro, Manuel; Moreno-Navarro, Juan José

    2007-01-01

    Some approaches to increasing program reliability involve a disciplined use of programming languages so as to minimise the hazards introduced by error-prone features. This is realised by writing code that is constrained to a subset of the a priori admissible programs, and that, moreover, may use only a subset of the language. These subsets are determined by a collection of so-called coding rules.

  7. Teaching the computer to code frames in news: comparing two supervised machine learning approaches to frame analysis

    NARCIS (Netherlands)

    Burscher, B.; Odijk, D.; Vliegenthart, R.; de Rijke, M.; de Vreese, C.H.

    2014-01-01

    We explore the application of supervised machine learning (SML) to frame coding. By automating the coding of frames in news, SML facilitates the incorporation of large-scale content analysis into framing research, even if financial resources are scarce. This furthers a more integrated investigation

  8. Teaching the computer to code frames in news: comparing two supervised machine learning approaches to frame analysis

    NARCIS (Netherlands)

    Burscher, B.; Odijk, D.; Vliegenthart, R.; de Rijke, M.; de Vreese, C.H.

    2014-01-01

    We explore the application of supervised machine learning (SML) to frame coding. By automating the coding of frames in news, SML facilitates the incorporation of large-scale content analysis into framing research, even if financial resources are scarce. This furthers a more integrated investigation

  9. Execution time support for scientific programs on distributed memory machines

    Science.gov (United States)

    Berryman, Harry; Saltz, Joel; Scroggs, Jeffrey

    1990-01-01

    Optimizations are considered that are required for efficient execution of code segments that consists of loops over distributed data structures. The PARTI (Parallel Automated Runtime Toolkit at ICASE) execution time primitives are designed to carry out these optimizations and can be used to implement a wide range of scientific algorithms on distributed memory machines. These primitives allow the user to control array mappings in a way that gives an appearance of shared memory. Computations can be based on a global index set. Primitives are used to carry out gather and scatter operations on distributed arrays. Communications patterns are derived at runtime, and the appropriate send and receive messages are automatically generated.

  10. On the linear programming bound for linear Lee codes.

    Science.gov (United States)

    Astola, Helena; Tabus, Ioan

    2016-01-01

    Based on an invariance-type property of the Lee-compositions of a linear Lee code, additional equality constraints can be introduced to the linear programming problem of linear Lee codes. In this paper, we formulate this property in terms of an action of the multiplicative group of the field [Formula: see text] on the set of Lee-compositions. We show some useful properties of certain sums of Lee-numbers, which are the eigenvalues of the Lee association scheme, appearing in the linear programming problem of linear Lee codes. Using the additional equality constraints, we formulate the linear programming problem of linear Lee codes in a very compact form, leading to a fast execution, which allows to efficiently compute the bounds for large parameter values of the linear codes.

  11. Code Development and Analysis Program: developmental checkout of the BEACON/MOD2A code. [PWR

    Energy Technology Data Exchange (ETDEWEB)

    Ramsthaler, J. A.; Lime, J. F.; Sahota, M. S.

    1978-12-01

    A best-estimate transient containment code, BEACON, is being developed by EG and G Idaho, Inc. for the Nuclear Regulatory Commission's reactor safety research program. This is an advanced, two-dimensional fluid flow code designed to predict temperatures and pressures in a dry PWR containment during a hypothetical loss-of-coolant accident. The most recent version of the code, MOD2A, is presently in the final stages of production prior to being released to the National Energy Software Center. As part of the final code checkout, seven sample problems were selected to be run with BEACON/MOD2A.

  12. Brain cells in the avian 'prefrontal cortex' code for features of slot-machine-like gambling.

    Directory of Open Access Journals (Sweden)

    Damian Scarf

    Full Text Available Slot machines are the most common and addictive form of gambling. In the current study, we recorded from single neurons in the 'prefrontal cortex' of pigeons while they played a slot-machine-like task. We identified four categories of neurons that coded for different aspects of our slot-machine-like task. Reward-Proximity neurons showed a linear increase in activity as the opportunity for a reward drew near. I-Won neurons fired only when the fourth stimulus of a winning (four-of-a-kind combination was displayed. I-Lost neurons changed their firing rate at the presentation of the first nonidentical stimulus, that is, when it was apparent that no reward was forthcoming. Finally, Near-Miss neurons also changed their activity the moment it was recognized that a reward was no longer available, but more importantly, the activity level was related to whether the trial contained one, two, or three identical stimuli prior to the display of the nonidentical stimulus. These findings not only add to recent neurophysiological research employing simulated gambling paradigms, but also add to research addressing the functional correspondence between the avian NCL and primate PFC.

  13. Fast Program Codes Dissemination for Smart Wireless Software Defined Networks

    Directory of Open Access Journals (Sweden)

    Xiao Liu

    2016-01-01

    Full Text Available In smart wireless software defined networks (WSDNs, sensor nodes are deployed in the monitored area to sense data. In order to increase the flexibility of WSDNs configuration, sensor nodes use programmable technology. Thus, programming and software engineering that integrate Internet of Things (IoT lead to a smart world. Due to the large capacity of program codes and the limited energy of wireless network, only a subset of nodes is selected to spread program codes, and the remaining nodes are in sleep status to save energy. In this paper, a fast program codes dissemination (FPCD scheme for smart wireless software defined networking is proposed; many nodes in the area far from the sink will be selected to spread program codes; those areas have much energy left, while the area near the sink chooses less number of active nodes to spread program codes to save energy. Thus, FPCD scheme can reduce delay for spreading program codes while retaining network lifetime. The theoretical analysis and experimental results show that our approach can reduce transmission delay by 10.76%–105.791% while retaining network lifetime compares with previous broadcast schemes.

  14. Expanding Dress Code Requirements in the Doctor of Pharmacy Program

    National Research Council Canada - National Science Library

    Cynthia A Naughton

    2017-01-01

    "1 We initiated this article to address both the potential advantages and disadvantages to implementing a dress code to facilitate a discussion surrounding this topic and to assist programs that might...

  15. Expanding Dress Code Requirements in the Doctor of Pharmacy Program

    National Research Council Canada - National Science Library

    Naughton, Cynthia A; Schweiger, Teresa A; Angelo, Lauren B; Lea Bonner, C; Dhing, Conrad W; Farley, Joel F

    2016-01-01

    ... is not applied consistently during the didactic portion of students' education. There are arguments for and against the adoption of a professional dress code throughout the entire doctor of pharmacy program, including the classroom setting...

  16. Argonne Code Center: compilation of program abstracts

    Energy Technology Data Exchange (ETDEWEB)

    Butler, M.K.; DeBruler, M.; Edwards, H.S.; Harrison, C. Jr.; Hughes, C.E.; Jorgensen, R.; Legan, M.; Menozzi, T.; Ranzini, L.; Strecok, A.J.

    1977-08-01

    This publication is the eleventh supplement to, and revision of, ANL-7411. It contains additional abstracts and revisions to some earlier abstracts and other pages. Sections of the complete document ANL-7411 are as follows: preface, history and acknowledgements, abstract format, recommended program package contents, program classification guide and thesaurus, and the abstract collection. (RWR)

  17. Argonne Code Center: compilation of program abstracts

    Energy Technology Data Exchange (ETDEWEB)

    Butler, M.K.; DeBruler, M.; Edwards, H.S.

    1976-08-01

    This publication is the tenth supplement to, and revision of, ANL-7411. It contains additional abstracts and revisions to some earlier abstracts and other pages. Sections of the document are as follows: preface; history and acknowledgements; abstract format; recommended program package contents; program classification guide and thesaurus; and abstract collection. (RWR)

  18. SEQassembly: A Practical Tools Program for Coding Sequences Splicing

    Science.gov (United States)

    Lee, Hongbin; Yang, Hang; Fu, Lei; Qin, Long; Li, Huili; He, Feng; Wang, Bo; Wu, Xiaoming

    CDS (Coding Sequences) is a portion of mRNA sequences, which are composed by a number of exon sequence segments. The construction of CDS sequence is important for profound genetic analysis such as genotyping. A program in MATLAB environment is presented, which can process batch of samples sequences into code segments under the guide of reference exon models, and splice these code segments of same sample source into CDS according to the exon order in queue file. This program is useful in transcriptional polymorphism detection and gene function study.

  19. PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODES

    Directory of Open Access Journals (Sweden)

    Denys Samoilenko

    2016-06-01

    Full Text Available Purpose: One of the most actual trends in program code protection is code marking. The problem consists in creation of some digital “watermarks” which allow distinguishing different copies of the same program codes. Such marks could be useful for authority protection, for code copies numbering, for program propagation monitoring, for information security proposes in client-server communication processes. Methods: We used the methods of digital steganography adopted for program codes as text objects. The same-shape symbols method was transformed to same-semantic element method due to codes features which makes them different from ordinary texts. We use dynamic principle of marks forming making codes similar to be polymorphic. Results: We examined the combinatorial capacity of permutations possible in program codes. As a result it was shown that the set of 5-7 polymorphic variables is suitable for the most modern network applications. Marks creation and restoration algorithms where proposed and discussed. The main algorithm is based on full and partial permutations in variables names and its declaration order. Algorithm for partial permutation enumeration was optimized for calculation complexity. PHP code fragments which realize the algorithms were listed. Discussion: Methodic proposed in the work allows distinguishing of each client-server connection. In a case if a clone of some network resource was found the methodic could give information about included marks and thereby data on IP, date and time, authentication information of client copied the resource. Usage of polymorphic stego-watermarks should improve information security indexes in network communications.

  20. Latex Dipping Machine PLC Control and Its Programming

    Directory of Open Access Journals (Sweden)

    Yimin Zhang

    2012-10-01

    Full Text Available Latex dipping machine is based on a latex patent products new-production condom and the development of the machine. The latex dipping agencies combined with production condom mechanism. First it realized a 3-dimensional accurate localization system using stepping motors. SIMATIC S7-200 series programmable controller, motion module EM253 and stepping motor are tied in wedlock to realize allocation of 3-dimension of X axis and Y axis and Z axis. Through the PTO pulse of Siemens S7-200 PLC controller and combined with the use of EM253 module, through the mould precise control programming soak glue and roll edge to achieve the control mold of rotation and swinging the uniform distributed latex. And the system has applied successfully in foreign-funded enterprise of Singapore.

  1. Channel Efficiency with Security Enhancement for Remote Condition Monitoring of Multi Machine System Using Hybrid Huffman Coding

    Science.gov (United States)

    Datta, Jinia; Chowdhuri, Sumana; Bera, Jitendranath

    2016-12-01

    This paper presents a novel scheme of remote condition monitoring of multi machine system where a secured and coded data of induction machine with different parameters is communicated between a state-of-the-art dedicated hardware Units (DHU) installed at the machine terminal and a centralized PC based machine data management (MDM) software. The DHUs are built for acquisition of different parameters from the respective machines, and hence are placed at their nearby panels in order to acquire different parameters cost effectively during their running condition. The MDM software collects these data through a communication channel where all the DHUs are networked using RS485 protocol. Before transmitting, the parameter's related data is modified with the adoption of differential pulse coded modulation (DPCM) and Huffman coding technique. It is further encrypted with a private key where different keys are used for different DHUs. In this way a data security scheme is adopted during its passage through the communication channel in order to avoid any third party attack into the channel. The hybrid mode of DPCM and Huffman coding is chosen to reduce the data packet length. A MATLAB based simulation and its practical implementation using DHUs at three machine terminals (one healthy three phase, one healthy single phase and one faulty three phase machine) proves its efficacy and usefulness for condition based maintenance of multi machine system. The data at the central control room are decrypted and decoded using MDM software. In this work it is observed that Chanel efficiency with respect to different parameter measurements has been increased very much.

  2. Epigenetic Codes Programing Class Switch Recombination

    Science.gov (United States)

    Vaidyanathan, Bharat; Chaudhuri, Jayanta

    2015-01-01

    Class switch recombination imparts B cells with a fitness-associated adaptive ­advantage during a humoral immune response by using a precision-tailored DNA excision and ligation process to swap the default constant region gene of the antibody with a new one that has unique effector functions. This secondary diversification of the antibody repertoire is a hallmark of the adaptability of B cells when confronted with environmental and pathogenic challenges. Given that the nucleotide sequence of genes during class switching remains unchanged (genetic constraints), it is logical and necessary therefore, to integrate the adaptability of B cells to an epigenetic state, which is dynamic and can be heritably modulated before, after, or even during an antibody-dependent immune response. Epigenetic regulation encompasses heritable changes that affect function (phenotype) without altering the sequence information embedded in a gene, and include histone, DNA and RNA modifications. Here, we review current literature on how B cells use an epigenetic code language as a means to ensure antibody plasticity in light of pathogenic insults. PMID:26441954

  3. Epigenetic codes programming class switch recombination

    Directory of Open Access Journals (Sweden)

    Bharat eVaidyanathan

    2015-09-01

    Full Text Available Class switch recombination imparts B cells with a fitness-associated adaptive advantage during a humoral immune response by using a precision-tailored DNA excision and ligation process to swap the default constant region gene of the antibody with a new one that has unique effector functions. This secondary diversification of the antibody repertoire is a hallmark of the adaptability of B cells when confronted with environmental and pathogenic challenges. Given that the nucleotide sequence of genes during class switching remains unchanged (genetic constraints, it is logical and necessary therefore, to integrate the adaptability of B cells to an epigenetic state, which is dynamic and can be heritably modulated before, after or even during an antibody-dependent immune response. Epigenetic regulation encompasses heritable changes that affect function (phenotype without altering the sequence information embedded in a gene, and include histone, DNA and RNA modifications. Here, we review current literature on how B cells use an epigenetic code language as a means to ensure antibody plasticity in light of pathogenic insults.

  4. Epigenetic Codes Programing Class Switch Recombination.

    Science.gov (United States)

    Vaidyanathan, Bharat; Chaudhuri, Jayanta

    2015-01-01

    Class switch recombination imparts B cells with a fitness-associated adaptive -advantage during a humoral immune response by using a precision-tailored DNA excision and ligation process to swap the default constant region gene of the antibody with a new one that has unique effector functions. This secondary diversification of the antibody repertoire is a hallmark of the adaptability of B cells when confronted with environmental and pathogenic challenges. Given that the nucleotide sequence of genes during class switching remains unchanged (genetic constraints), it is logical and necessary therefore, to integrate the adaptability of B cells to an epigenetic state, which is dynamic and can be heritably modulated before, after, or even during an antibody-dependent immune response. Epigenetic regulation encompasses heritable changes that affect function (phenotype) without altering the sequence information embedded in a gene, and include histone, DNA and RNA modifications. Here, we review current literature on how B cells use an epigenetic code language as a means to ensure antibody plasticity in light of pathogenic insults.

  5. Machine medical ethics

    CERN Document Server

    Pontier, Matthijs

    2015-01-01

    The essays in this book, written by researchers from both humanities and sciences, describe various theoretical and experimental approaches to adding medical ethics to a machine in medical settings. Medical machines are in close proximity with human beings, and getting closer: with patients who are in vulnerable states of health, who have disabilities of various kinds, with the very young or very old, and with medical professionals. In such contexts, machines are undertaking important medical tasks that require emotional sensitivity, knowledge of medical codes, human dignity, and privacy. As machine technology advances, ethical concerns become more urgent: should medical machines be programmed to follow a code of medical ethics? What theory or theories should constrain medical machine conduct? What design features are required? Should machines share responsibility with humans for the ethical consequences of medical actions? How ought clinical relationships involving machines to be modeled? Is a capacity for e...

  6. Dynamically Translating Binary Code for Multi-Threaded Programs Using Shared Code Cache

    Institute of Scientific and Technical Information of China (English)

    Chia-Lun Liu; Jiunn-Yeu Chen; Wuu Yang; Wei-Chung Hsu

    2014-01-01

    mc2llvm is a process-level ARM-to-x86 binary translator developed in our lab in the past several years. Currently, it is able to emulate single-threaded programs. We extend mc2llvm to emulate multi-threaded programs. Our main task is to reconstruct its architecture for multi-threaded programs. Register mapping, code cache management, and address mapping in mc2llvm have all been modified. In addition, to further speed up the emulation, we collect hot paths, aggressively optimize and generate code for them at run time. Additional threads are used to alleviate the overhead. Thus, when the same hot path is walked through again, the corresponding optimized native code will be executed instead. In our experiments, our system is 8.8X faster than QEMU (quick emulator) on average when emulating the specified benchmarks with 8 guest threads.

  7. Machine Learning: developing an image recognition program : with Python, Scikit Learn and OpenCV

    OpenAIRE

    Nguyen, Minh

    2016-01-01

    Machine Learning is one of the most debated topic in computer world these days, especially after the first Computer Go program has beaten human Go world champion. Among endless application of Machine Learning, image recognition, which problem is processing enormous amount of data from dynamic input. This thesis will present the basic concept of Machine Learning, Machine Learning algorithms, Python programming language and Scikit Learn – a simple and efficient tool for data analysis in P...

  8. Molecular Programming Pseudo-code Representation to Molecular Electronics

    OpenAIRE

    2010-01-01

    This research paper is proposing the idea of pseudo code representation to molecular programming used in designing molecular electronics devices. Already the schematic representation of logical gates like AND, OR, NOT etc.from molecular diodes or resonant tunneling diode are available. This paper is setting a generic pseudo code model so that various logic gates can be formulated. These molecular diodes have designed from organic molecules or Bio-molecules. Our focus is on to give a scenario ...

  9. Expanding Dress Code Requirements in the Doctor of Pharmacy Program

    OpenAIRE

    Naughton, Cynthia A.; Schweiger, Teresa A.; Angelo, Lauren B.; Lea Bonner, C.; Dhing, Conrad W.; Farley, Joel F.

    2016-01-01

    Although the use of a professional dress code is standard practice across colleges and schools of pharmacy during introductory and advanced pharmacy practice experiences, requiring professional attire is not applied consistently during the didactic portion of students’ education. There are arguments for and against the adoption of a professional dress code throughout the entire doctor of pharmacy program, including the classroom setting. Given uncertainty regarding the potential benefits and ...

  10. Automatic Multi-GPU Code Generation applied to Simulation of Electrical Machines

    CERN Document Server

    Rodrigues, Antonio Wendell De Oliveira; Dekeyser, Jean-Luc; Menach, Yvonnick Le

    2011-01-01

    The electrical and electronic engineering has used parallel programming to solve its large scale complex problems for performance reasons. However, as parallel programming requires a non-trivial distribution of tasks and data, developers find it hard to implement their applications effectively. Thus, in order to reduce design complexity, we propose an approach to generate code for hybrid architectures (e.g. CPU + GPU) using OpenCL, an open standard for parallel programming of heterogeneous systems. This approach is based on Model Driven Engineering (MDE) and the MARTE profile, standard proposed by Object Management Group (OMG). The aim is to provide resources to non-specialists in parallel programming to implement their applications. Moreover, thanks to model reuse capacity, we can add/change functionalities or the target architecture. Consequently, this approach helps industries to achieve their time-to-market constraints and confirms by experimental tests, performance improvements using multi-GPU environmen...

  11. Distributed and Cascade Lossy Source Coding with a Side Information "Vending Machine"

    CERN Document Server

    Ahmadi, Behzad

    2011-01-01

    Source coding with a side information "vending machine" is a recently proposed framework in which the statistical relationship between the side information and the source, instead of being given and fixed as in the classical Wyner-Ziv problem, can be controlled by the decoder. This control action is selected by the decoder based on the message encoded by the source node. Unlike conventional settings, the message can thus carry not only information about the source to be reproduced at the decoder, but also control information aimed at improving the quality of the side information. In this paper, the single-letter characterization of the trade-offs between rate, distortion and cost associated with the control actions is extended from the previously studied point-to-point set-up to two basic multiterminal models. First, a distributed source coding model is studied, in which an arbitrary number of encoders communicate over rate-limited links to a decoder, whose side information can be controlled. The control acti...

  12. Expanding Dress Code Requirements in the Doctor of Pharmacy Program.

    Science.gov (United States)

    Naughton, Cynthia A; Schweiger, Teresa A; Angelo, Lauren B; Lea Bonner, C; Dhing, Conrad W; Farley, Joel F

    2016-06-25

    Although the use of a professional dress code is standard practice across colleges and schools of pharmacy during introductory and advanced pharmacy practice experiences, requiring professional attire is not applied consistently during the didactic portion of students' education. There are arguments for and against the adoption of a professional dress code throughout the entire doctor of pharmacy program, including the classroom setting. Given uncertainty regarding the potential benefits and challenges that may arise from adopting a professional dress code in the didactic portion of a student pharmacist's education, it is perhaps not surprising that programs adopt disparate policies regarding its use. This exploration was conducted as part of a series of debates held in conjunction with the American Association of Colleges of Pharmacy's (AACP) Academic Leadership Fellows Program (ALFP) and was presented at the 2015 AACP Interim Meeting on February 7, 2015.

  13. Implementing Scientific Simulation Codes Highly Tailored for Vector Architectures Using Custom Configurable Computing Machines

    Science.gov (United States)

    Rutishauser, David

    2006-01-01

    The motivation for this work comes from an observation that amidst the push for Massively Parallel (MP) solutions to high-end computing problems such as numerical physical simulations, large amounts of legacy code exist that are highly optimized for vector supercomputers. Because re-hosting legacy code often requires a complete re-write of the original code, which can be a very long and expensive effort, this work examines the potential to exploit reconfigurable computing machines in place of a vector supercomputer to implement an essentially unmodified legacy source code. Custom and reconfigurable computing resources could be used to emulate an original application's target platform to the extent required to achieve high performance. To arrive at an architecture that delivers the desired performance subject to limited resources involves solving a multi-variable optimization problem with constraints. Prior research in the area of reconfigurable computing has demonstrated that designing an optimum hardware implementation of a given application under hardware resource constraints is an NP-complete problem. The premise of the approach is that the general issue of applying reconfigurable computing resources to the implementation of an application, maximizing the performance of the computation subject to physical resource constraints, can be made a tractable problem by assuming a computational paradigm, such as vector processing. This research contributes a formulation of the problem and a methodology to design a reconfigurable vector processing implementation of a given application that satisfies a performance metric. A generic, parametric, architectural framework for vector processing implemented in reconfigurable logic is developed as a target for a scheduling/mapping algorithm that maps an input computation to a given instance of the architecture. This algorithm is integrated with an optimization framework to arrive at a specification of the architecture parameters

  14. Linear-programming Decoding of Non-binary Linear Codes

    CERN Document Server

    Flanagan, Mark F; Byrne, Eimear; Greferath, Marcus

    2007-01-01

    We develop a framework for linear-programming (LP) decoding of non-binary linear codes over rings. We prove that the resulting LP decoder has the `maximum likelihood certificate' property, and we show that the decoder output is the lowest cost pseudocodeword. Equivalence between pseudocodewords of the linear program and pseudocodewords of graph covers is proved. LP decoding performance is illustrated for the (11,6,5) ternary Golay code with ternary PSK modulation over AWGN, and in this case it is shown that the LP decoder performance is comparable to codeword-error-rate-optimum hard-decision based decoding.

  15. Forming Teams for Teaching Programming based on Static Code Analysis

    CERN Document Server

    Arosemena-Trejos, Davis; Clunie, Clifton

    2012-01-01

    The use of team for teaching programming can be effective in the classroom because it helps students to generate and acquire new knowledge in less time, but these groups to be formed without taking into account some respects, may cause an adverse effect on the teaching-learning process. This paper proposes a tool for the formation of team based on the semantics of source code (SOFORG). This semantics is based on metrics extracted from the preferences, styles and good programming practices. All this is achieved through a static analysis of code that each student develops. In this way, you will have a record of students with the information extracted; it evaluates the best formation of teams in a given course. The team's formations are based on programming styles, skills, pair programming or with leader.

  16. Forming Teams for Teaching Programming based on Static Code Analysis

    Directory of Open Access Journals (Sweden)

    Davis Arosemena-Trejos

    2012-03-01

    Full Text Available The use of team for teaching programming can be effective in the classroom because it helps students to generate and acquire new knowledge in less time, but these groups to be formed without taking into account some respects, may cause an adverse effect on the teaching-learning process. This paper proposes a tool for the formation of team based on the semantics of source code (SOFORG. This semantics is based on metrics extracted from the preferences, styles and good programming practices. All this is achieved through a static analysis of code that each student develops. In this way, you will have a record of students with the information extracted; it evaluates the best formation of teams in a given course. The team€™s formations are based on programming styles, skills, pair programming or with leader.

  17. The Fast Scattering Code (FSC): Validation Studies and Program Guidelines

    Science.gov (United States)

    Tinetti, Ana F.; Dunn, Mark H.

    2011-01-01

    The Fast Scattering Code (FSC) is a frequency domain noise prediction program developed at the NASA Langley Research Center (LaRC) to simulate the acoustic field produced by the interaction of known, time harmonic incident sound with bodies of arbitrary shape and surface impedance immersed in a potential flow. The code uses the equivalent source method (ESM) to solve an exterior 3-D Helmholtz boundary value problem (BVP) by expanding the scattered acoustic pressure field into a series of point sources distributed on a fictitious surface placed inside the actual scatterer. This work provides additional code validation studies and illustrates the range of code parameters that produce accurate results with minimal computational costs. Systematic noise prediction studies are presented in which monopole generated incident sound is scattered by simple geometric shapes - spheres (acoustically hard and soft surfaces), oblate spheroids, flat disk, and flat plates with various edge topologies. Comparisons between FSC simulations and analytical results and experimental data are presented.

  18. Machine-vision-based bar code scanning for long-range applications

    Science.gov (United States)

    Banta, Larry E.; Pertl, Franz A.; Rosenecker, Charles; Rosenberry-Friend, Kimberly A.

    1998-10-01

    Bar code labeling of products has become almost universal in most industries. However, in the steel industry, problems with high temperatures, harsh physical environments and the large sizes of the products and material handling equipment have slowed implementation of bar code based systems in the hot end of the mill. Typical laser-based bar code scanners have maximum scan distances of only 15 feet or so. Longer distance models have been developed which require the use of retro reflective paper labels, but the labels must be very large, are expensive, and cannot stand the heat and physical abuse of the steel mill environment. Furthermore, it is often difficult to accurately point a hand held scanner at targets in bright sunlight or at long distances. An automated product tag reading system based on CCD cameras and computer image processing has been developed by West Virginia University, and demonstrated at the Weirton Steel Corporation. The system performs both the pointing and reading functions. A video camera is mounted on a pan/tilt head, and connected to a personal computer through a frame grabber board. The computer analyzes the images, and can identify product ID tags in a wide-angle scene. It controls the camera to point at each tag and zoom for a closeup picture. The closeups are analyzed and the program need both a barcode and the corresponding alphanumeric code on the tag. This paper describes the camera pointing and bar-code reading functions of the algorithm. A companion paper describes the OCR functions.

  19. Annual Coded Wire Program Missing Production Groups, 1996 Annual Report.

    Energy Technology Data Exchange (ETDEWEB)

    Pastor, S.M. [Fish and Wildlife Service, Vancouver, WA (United States). Columbia River Fisheries Program Office

    1997-07-01

    In 1989 the Bonneville Power Administration (BPA) began funding the evaluation of production groups of juvenile anadromous fish not being coded-wire tagged for other programs. These groups were the ``Missing Production Groups``. Production fish released by the US Fish and Wildlife Service (USFWS) without representative coded-wire tags during the 1980`s are indicated as blank spaces on the survival graphs in this report. The objectives of the ``Missing Production Groups`` program are: to estimate the total survival of each production group, to estimate the contribution of each production group to various fisheries, and to prepare an annual report for all USFWS hatcheries in the Columbia River basin. Coded-wire tag recovery information will be used to evaluate the relative success of individual brood stocks. This information can also be used by salmon harvest managers to develop plans to allow the harvest of excess hatchery fish while protecting threatened, endangered, or other stocks of concern.

  20. Linear programming bounds for unitary space time codes

    CERN Document Server

    Creignou, Jean

    2008-01-01

    The linear programming method is applied to the space $\\U_n(\\C)$ of unitary matrices in order to obtain bounds for codes relative to the diversity sum and the diversity product. Theoretical and numerical results improving previously known bounds are derived.

  1. A new method for species identification via protein-coding and non-coding DNA barcodes by combining machine learning with bioinformatic methods.

    Directory of Open Access Journals (Sweden)

    Ai-bing Zhang

    Full Text Available Species identification via DNA barcodes is contributing greatly to current bioinventory efforts. The initial, and widely accepted, proposal was to use the protein-coding cytochrome c oxidase subunit I (COI region as the standard barcode for animals, but recently non-coding internal transcribed spacer (ITS genes have been proposed as candidate barcodes for both animals and plants. However, achieving a robust alignment for non-coding regions can be problematic. Here we propose two new methods (DV-RBF and FJ-RBF to address this issue for species assignment by both coding and non-coding sequences that take advantage of the power of machine learning and bioinformatics. We demonstrate the value of the new methods with four empirical datasets, two representing typical protein-coding COI barcode datasets (neotropical bats and marine fish and two representing non-coding ITS barcodes (rust fungi and brown algae. Using two random sub-sampling approaches, we demonstrate that the new methods significantly outperformed existing Neighbor-joining (NJ and Maximum likelihood (ML methods for both coding and non-coding barcodes when there was complete species coverage in the reference dataset. The new methods also out-performed NJ and ML methods for non-coding sequences in circumstances of potentially incomplete species coverage, although then the NJ and ML methods performed slightly better than the new methods for protein-coding barcodes. A 100% success rate of species identification was achieved with the two new methods for 4,122 bat queries and 5,134 fish queries using COI barcodes, with 95% confidence intervals (CI of 99.75-100%. The new methods also obtained a 96.29% success rate (95%CI: 91.62-98.40% for 484 rust fungi queries and a 98.50% success rate (95%CI: 96.60-99.37% for 1094 brown algae queries, both using ITS barcodes.

  2. Translocation Properties of Primitive Molecular Machines and Their Relevance to the Structure of the Genetic Code

    CERN Document Server

    Aldana, M; Larralde, H; Martínez-Mekler, G; Aldana, Maximino; Cocho, Germinal; Larralde, Hernan; Martinez-Mekler, Gustavo

    2002-01-01

    We address the question, related with the origin of the genetic code, of why are there three bases per codon in the translation to protein process. As a followup to our previous work, we approach this problem by considering the translocation properties of primitive molecular machines, which capture basic features of ribosomal/messenger RNA interactions, while operating under prebiotic conditions. Our model consists of a short one-dimensional chain of charged particles(rRNA antecedent) interacting with a polymer (mRNA antecedent) via electrostatic forces. The chain is subject to external forcing that causes it to move along the polymer which is fixed in a quasi one dimensional geometry. Our numerical and analytic studies of statistical properties of random chain/polymer potentials suggest that, under very general conditions, a dynamics is attained in which the chain moves along the polymer in steps of three monomers. By adjusting the model in order to consider present day genetic sequences, we show that the ab...

  3. Techniques of Program Code Obfuscation for Secure Software

    Directory of Open Access Journals (Sweden)

    Marius Popa

    2011-12-01

    Full Text Available The paper investigates the most common obfuscation techniques for software program source code. Engineering elements of the compiling and interpreting processes are presented form the most widely used programming language based on Java Development Kit and .NET Framework. The reverse engineering of software is implemented on taking into account the architectures of the software development platforms used by the most part of software developers. The engineering elements of these architectures facilitate understanding and production of data exchange, disassembling and decompiling. The last ones are essential tools to implement the reverse engineering of software. In order to prevent unauthorized disclosure of software engineering techniques, techniques of the source code obfuscation are used. On the other hand, the reverse engineering of software is used in critical software fields like antivirus program development.

  4. A Parallel Vector Machine for the PM Programming Language

    Science.gov (United States)

    Bellerby, Tim

    2016-04-01

    PM is a new programming language which aims to make the writing of computational geoscience models on parallel hardware accessible to scientists who are not themselves expert parallel programmers. It is based around the concept of communicating operators: language constructs that enable variables local to a single invocation of a parallelised loop to be viewed as if they were arrays spanning the entire loop domain. This mechanism enables different loop invocations (which may or may not be executing on different processors) to exchange information in a manner that extends the successful Communicating Sequential Processes idiom from single messages to collective communication. Communicating operators avoid the additional synchronisation mechanisms, such as atomic variables, required when programming using the Partitioned Global Address Space (PGAS) paradigm. Using a single loop invocation as the fundamental unit of concurrency enables PM to uniformly represent different levels of parallelism from vector operations through shared memory systems to distributed grids. This paper describes an implementation of PM based on a vectorised virtual machine. On a single processor node, concurrent operations are implemented using masked vector operations. Virtual machine instructions operate on vectors of values and may be unmasked, masked using a Boolean field, or masked using an array of active vector cell locations. Conditional structures (such as if-then-else or while statement implementations) calculate and apply masks to the operations they control. A shift in mask representation from Boolean to location-list occurs when active locations become sufficiently sparse. Parallel loops unfold data structures (or vectors of data structures for nested loops) into vectors of values that may additionally be distributed over multiple computational nodes and then split into micro-threads compatible with the size of the local cache. Inter-node communication is accomplished using

  5. System on Programable Chip for Performance Estimation of Loom Machine

    CERN Document Server

    Singh, Gurpreet; S, Surekha K; Pujari, S

    2012-01-01

    System on programmable chip for the performance estimation of loom machine, which calculates the efficiency and meter count for weaved cloth automatically. Also it calculates the efficiency of loom machine. Previously the same was done using manual process which was not efficient. This article is intended for loom machines which are not modern.

  6. System on Programable Chip for Performance Estimation of Loom Machine

    Directory of Open Access Journals (Sweden)

    Gurpreet Singh

    2012-03-01

    Full Text Available System on programmable chip for the performance estimation of loom machine, which calculates the efficiency and meter count for weaved cloth automatically. Also it calculates the efficiency of loom machine. Previously the same was done using manual process which was not efficient. This article is intended for loom machines which are not modern.

  7. Small machine tools for small workpieces final report of the DFG priority program 1476

    CERN Document Server

    Sanders, Adam

    2017-01-01

    This contributed volume presents the research results of the program “Small machine tools for small work pieces” (SPP 1476), funded by the German Research Society (DFG). The book contains the final report of the priority program, presenting novel approached for size-adapted, reconfigurable micro machine tools. The target audience primarily comprises research experts and practitioners in the field of micro machine tools, but the book may also be beneficial for graduate students.

  8. ADIFOR–Generating Derivative Codes from Fortran Programs

    Directory of Open Access Journals (Sweden)

    Christian Bischof

    1992-01-01

    Full Text Available The numerical methods employed in the solution of many scientific computing problems require the computation of derivatives of a function f Rn→Rm. Both the accuracy and the computational requirements of the derivative computation are usually of critical importance for the robustness and speed of the numerical solution. Automatic Differentiation of FORtran (ADIFOR is a source transformation tool that accepts Fortran 77 code for the computation of a function and writes portable Fortran 77 code for the computation of the derivatives. In contrast to previous approaches, ADIFOR views automatic differentiation as a source transformation problem. ADIFOR employs the data analysis capabilities of the ParaScope Parallel Programming Environment, which enable us to handle arbitrary Fortran 77 codes and to exploit the computational context in the computation of derivatives. Experimental results show that ADIFOR can handle real-life codes and that ADIFOR-generated codes are competitive with divided-difference approximations of derivatives. In addition, studies suggest that the source transformation approach to automatic differentiation may improve the time to compute derivatives by orders of magnitude.

  9. An Evaluation and Comparison of Three Nonlinear Programming Codes

    Science.gov (United States)

    1976-03-01

    sixth problem was selected from the Himmelblau collection [Ref. 11] and the remaining two were adaptations cf an inventory model and an entropy model...both require utilization of the main nonlinear codes with their high core and corresponding time requirements. Himmelblau estimated preparation times...Nonlinear Program mincf Moclel for "Determining a Huni/Eions ITix, By R*.J. CTasen, E.¥.Graves ana J.Y7 Iu, 3arch 1974. 11. Himmelblau . D.M., Applied

  10. Investigate Methods to Decrease Compilation Time-AX-Program Code Group Computer Science R& D Project

    Energy Technology Data Exchange (ETDEWEB)

    Cottom, T

    2003-06-11

    Large simulation codes can take on the order of hours to compile from scratch. In Kull, which uses generic programming techniques, a significant portion of the time is spent generating and compiling template instantiations. I would like to investigate methods that would decrease the overall compilation time for large codes. These would be methods which could then be applied, hopefully, as standard practice to any large code. Success is measured by the overall decrease in wall clock time a developer spends waiting for an executable. Analyzing the make system of a slow to build project can benefit all developers on the project. Taking the time to analyze the number of processors used over the life of the build and restructuring the system to maximize the parallelization can significantly reduce build times. Distributing the build across multiple machines with the same configuration can increase the number of available processors for building and can help evenly balance the load. Becoming familiar with compiler options can have its benefits as well. The time improvements of the sum can be significant. Initial compilation time for Kull on OSF1 was {approx} 3 hours. Final time on OSF1 after completion is 16 minutes. Initial compilation time for Kull on AIX was {approx} 2 hours. Final time on AIX after completion is 25 minutes. Developers now spend 3 hours less waiting for a Kull executable on OSF1, and 2 hours less on AIX platforms. In the eyes of many Kull code developers, the project was a huge success.

  11. A Dynamic Programming Approach To Length-Limited Huffman Coding

    CERN Document Server

    Golin, Mordecai

    2008-01-01

    The ``state-of-the-art'' in Length Limited Huffman Coding algorithms is the $\\Theta(ND)$-time, $\\Theta(N)$-space one of Hirschberg and Larmore, where $D\\le N$ is the length restriction on the code. This is a very clever, very problem specific, technique. In this note we show that there is a simple Dynamic-Programming (DP) method that solves the problem with the same time and space bounds. The fact that there was an $\\Theta(ND)$ time DP algorithm was previously known; it is a straightforward DP with the Monge property (which permits an order of magnitude speedup). It was not interesting, though, because it also required $\\Theta(ND)$ space. The main result of this paper is the technique developed for reducing the space. It is quite simple and applicable to many other problems modeled by DPs with the Monge property. We illustrate this with examples from web-proxy design and wireless mobile paging.

  12. The use of machine learning with signal- and NLP processing of source code to detect and classify vulnerabilities and weaknesses with MARFCAT

    CERN Document Server

    Mokhov, Serguei A

    2010-01-01

    We present a machine learning approach to static code analysis for weaknesses related to security and others with the open-source MARF framework and its application to for the NIST's SATE 2010 static analysis tool exhibition workshop.

  13. High explosive programmed burn in the FLAG code

    Energy Technology Data Exchange (ETDEWEB)

    Mandell, D.; Burton, D.; Lund, C.

    1998-02-01

    The models used to calculate the programmed burn high-explosive lighting times for two- and three-dimensions in the FLAG code are described. FLAG uses an unstructured polyhedra grid. The calculations were compared to exact solutions for a square in two dimensions and for a cube in three dimensions. The maximum error was 3.95 percent in two dimensions and 4.84 percent in three dimensions. The high explosive lighting time model described has the advantage that only one cell at a time needs to be considered.

  14. Implications of the Turing machine model of computation for processor and programming language design

    Science.gov (United States)

    Hunter, Geoffrey

    2004-01-01

    ; it may be allocated as its execution commences, and deallocated as its execution terminates, and if the amount of this local memory is not known until just before execution commencement, then it is essential that it be allocated dynamically as the first action of its execution. This dynamically allocated/deallocated storage of each subprogram"s intermediate values, conforms with the stack discipline; i.e. last allocated = first to be deallocated, an incidental benefit of which is automatic overlaying of variables. This stack-based dynamic memory allocation was a semantic implication of the nested block structure that originated in the ALGOL-60 programming language. AGLOL-60 was a TM language, because the amount of memory allocated on subprogram (block/procedure) entry (for arrays, etc) was computable at execution time. A more general requirement of a Turing machine process is for code generation at run-time; this mandates access to the source language processor (compiler/interpretor) during execution of the process. This fundamental aspect of computer science is important to the future of system design, because it has been overlooked throughout the 55 years since modern computing began in 1048. The popular computer systems of this first half-century of computing were constrained by compile-time (or even operating system boot-time) memory allocation, and were thus limited to executing FA processes. The practical effect was that the distinction between the data-invariant program and its variable data was blurred; programmers had to make trial and error executions, modifying the program"s compile-time constants (array dimensions) to iterate towards the values required at run-time by the data being processed. This era of trial and error computing still persists; it pervades the culture of current (2003) computing practice.

  15. Complementary Machine Intelligence and Human Intelligence in Virtual Teaching Assistant for Tutoring Program Tracing

    Science.gov (United States)

    Chou, Chih-Yueh; Huang, Bau-Hung; Lin, Chi-Jen

    2011-01-01

    This study proposes a virtual teaching assistant (VTA) to share teacher tutoring tasks in helping students practice program tracing and proposes two mechanisms of complementing machine intelligence and human intelligence to develop the VTA. The first mechanism applies machine intelligence to extend human intelligence (teacher answers) to evaluate…

  16. Standards, building codes, and certification programs for solar technology applicatons

    Energy Technology Data Exchange (ETDEWEB)

    Riley, J. D.; Odland, R.; Barker, H.

    1979-07-01

    This report is a primer on solar standards development. It explains the development of standards, building code provisions, and certification programs and their relationship to the emerging solar technologies. These areas are important in the commercialization of solar technology because they lead to the attainment of two goals: the development of an industry infrastructure and consumer confidence. Standards activities in the four phases of the commercialization process (applied research, development, introduction, and diffusion) are discussed in relation to institutional issues. Federal policies have been in operation for a number of years to accelerate the development process for solar technology. These policies are discussed in light of the Office of Management and Budget (OMB) Circular on federal interaction with the voluntary consensus system, and in light of current activities of DOE, HUD, and other interested federal agencies. The appendices cover areas of specific interest to different audiences: activities on the state and local level; and standards, building codes, and certification programs for specific technologies. In addition, a contract for the development of a model solar document let by DOE to a model consortium is excerpted in the Appendix.

  17. AZOrange - High performance open source machine learning for QSAR modeling in a graphical programming environment

    Directory of Open Access Journals (Sweden)

    Stålring Jonna C

    2011-07-01

    Full Text Available Abstract Background Machine learning has a vast range of applications. In particular, advanced machine learning methods are routinely and increasingly used in quantitative structure activity relationship (QSAR modeling. QSAR data sets often encompass tens of thousands of compounds and the size of proprietary, as well as public data sets, is rapidly growing. Hence, there is a demand for computationally efficient machine learning algorithms, easily available to researchers without extensive machine learning knowledge. In granting the scientific principles of transparency and reproducibility, Open Source solutions are increasingly acknowledged by regulatory authorities. Thus, an Open Source state-of-the-art high performance machine learning platform, interfacing multiple, customized machine learning algorithms for both graphical programming and scripting, to be used for large scale development of QSAR models of regulatory quality, is of great value to the QSAR community. Results This paper describes the implementation of the Open Source machine learning package AZOrange. AZOrange is specially developed to support batch generation of QSAR models in providing the full work flow of QSAR modeling, from descriptor calculation to automated model building, validation and selection. The automated work flow relies upon the customization of the machine learning algorithms and a generalized, automated model hyper-parameter selection process. Several high performance machine learning algorithms are interfaced for efficient data set specific selection of the statistical method, promoting model accuracy. Using the high performance machine learning algorithms of AZOrange does not require programming knowledge as flexible applications can be created, not only at a scripting level, but also in a graphical programming environment. Conclusions AZOrange is a step towards meeting the needs for an Open Source high performance machine learning platform, supporting the

  18. Joint FAM/Line Management Assessment Report on LLNL Machine Guarding Safety Program

    Energy Technology Data Exchange (ETDEWEB)

    Armstrong, J. J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-07-19

    The LLNL Safety Program for Machine Guarding is implemented to comply with requirements in the ES&H Manual Document 11.2, "Hazards-General and Miscellaneous," Section 13 Machine Guarding (Rev 18, issued Dec. 15, 2015). The primary goal of this LLNL Safety Program is to ensure that LLNL operations involving machine guarding are managed so that workers, equipment and government property are adequately protected. This means that all such operations are planned and approved using the Integrated Safety Management System to provide the most cost effective and safest means available to support the LLNL mission.

  19. Nonlinear programming for classification problems in machine learning

    Science.gov (United States)

    Astorino, Annabella; Fuduli, Antonio; Gaudioso, Manlio

    2016-10-01

    We survey some nonlinear models for classification problems arising in machine learning. In the last years this field has become more and more relevant due to a lot of practical applications, such as text and web classification, object recognition in machine vision, gene expression profile analysis, DNA and protein analysis, medical diagnosis, customer profiling etc. Classification deals with separation of sets by means of appropriate separation surfaces, which is generally obtained by solving a numerical optimization model. While linear separability is the basis of the most popular approach to classification, the Support Vector Machine (SVM), in the recent years using nonlinear separating surfaces has received some attention. The objective of this work is to recall some of such proposals, mainly in terms of the numerical optimization models. In particular we tackle the polyhedral, ellipsoidal, spherical and conical separation approaches and, for some of them, we also consider the semisupervised versions.

  20. On Coding the States of Sequential Machines with the Use of Partition Pairs

    DEFF Research Database (Denmark)

    Zahle, Torben U.

    1966-01-01

    This article introduces a new technique of making state assignment for sequential machines. The technique is in line with the approach used by Hartmanis [l], Stearns and Hartmanis [3], and Curtis [4]. It parallels the work of Dolotta and McCluskey [7], although it was developed independently...

  1. High Performance Computing of Three-Dimensional Finite Element Codes on a 64-bit Machine

    Directory of Open Access Journals (Sweden)

    M.P Raju

    2012-01-01

    Full Text Available Three dimensional Navier-Stokes finite element formulations require huge computational power in terms of memory and CPU time. Recent developments in sparse direct solvers have significantly reduced the memory and computational time of direct solution methods. The objective of this study is twofold. First is to evaluate the performance of various state-of-the-art sequential sparse direct solvers in the context of finite element formulation of fluid flow problems. Second is to examine the merit in upgrading from 32 bit machine to a 64 bit machine with larger RAM capacity in terms of its capacity to solve larger problems. The choice of a direct solver is dependent on its computational time and its in-core memory requirements. Here four different solvers, UMFPACK, MUMPS, HSL_MA78 and PARDISO are compared. The performances of these solvers with respect to the computational time and memory requirements on a 64-bit windows server machine with 16GB RAM is evaluated.

  2. Monte Carlo simulation of a multi-leaf collimator design for telecobalt machine using BEAMnrc code

    Directory of Open Access Journals (Sweden)

    Ayyangar Komanduri

    2010-01-01

    Full Text Available This investigation aims to design a practical multi-leaf collimator (MLC system for the cobalt teletherapy machine and check its radiation properties using the Monte Carlo (MC method. The cobalt machine was modeled using the BEAMnrc Omega-Beam MC system, which could be freely downloaded from the website of the National Research Council (NRC, Canada. Comparison with standard depth dose data tables and the theoretically modeled beam showed good agreement within 2%. An MLC design with low melting point alloy (LMPA was tested for leakage properties of leaves. The LMPA leaves with a width of 7 mm and height of 6 cm, with tongue and groove of size 2 mm wide by 4 cm height, produced only 4% extra leakage compared to 10 cm height tungsten leaves. With finite 60 Co source size, the interleaf leakage was insignificant. This analysis helped to design a prototype MLC as an accessory mount on a cobalt machine. The complete details of the simulation process and analysis of results are discussed.

  3. Automatic Parallelization Tool: Classification of Program Code for Parallel Computing

    Directory of Open Access Journals (Sweden)

    Mustafa Basthikodi

    2016-04-01

    Full Text Available Performance growth of single-core processors has come to a halt in the past decade, but was re-enabled by the introduction of parallelism in processors. Multicore frameworks along with Graphical Processing Units empowered to enhance parallelism broadly. Couples of compilers are updated to developing challenges forsynchronization and threading issues. Appropriate program and algorithm classifications will have advantage to a great extent to the group of software engineers to get opportunities for effective parallelization. In present work we investigated current species for classification of algorithms, in that related work on classification is discussed along with the comparison of issues that challenges the classification. The set of algorithms are chosen which matches the structure with different issues and perform given task. We have tested these algorithms utilizing existing automatic species extraction toolsalong with Bones compiler. We have added functionalities to existing tool, providing a more detailed characterization. The contributions of our work include support for pointer arithmetic, conditional and incremental statements, user defined types, constants and mathematical functions. With this, we can retain significant data which is not captured by original speciesof algorithms. We executed new theories into the device, empowering automatic characterization of program code.

  4. Recent Progress in a Beam-Beam Simulation Code for Circular Hadron Machines

    Energy Technology Data Exchange (ETDEWEB)

    Kabel, Andreas; /SLAC; Fischer, Wolfram; /Brookhaven; Sen, Tanaji; /Fermilab

    2007-09-10

    While conventional tracking codes can readily provide higher-order optical quantities and give an estimate of dynamic apertures, they are unable to provide directly measurable quantities such as lifetimes and loss rates. The particle tracking framework Plibb aims at modeling a storage ring with sufficient accuracy and a sufficiently high number of turns and in the presence of beam-beam interactions to allow for an estimate of these quantities. We provide a description of new features of the codes; we also describe a novel method of treating chromaticity in ring sections in a symplectic fashion.

  5. INL Experimental Program Roadmap for Thermal Hydraulic Code Validation

    Energy Technology Data Exchange (ETDEWEB)

    Glenn McCreery; Hugh McIlroy

    2007-09-01

    Advanced computer modeling and simulation tools and protocols will be heavily relied on for a wide variety of system studies, engineering design activities, and other aspects of the Next Generation Nuclear Power (NGNP) Very High Temperature Reactor (VHTR), the DOE Global Nuclear Energy Partnership (GNEP), and light-water reactors. The goal is for all modeling and simulation tools to be demonstrated accurate and reliable through a formal Verification and Validation (V&V) process, especially where such tools are to be used to establish safety margins and support regulatory compliance, or to design a system in a manner that reduces the role of expensive mockups and prototypes. Recent literature identifies specific experimental principles that must be followed in order to insure that experimental data meet the standards required for a “benchmark” database. Even for well conducted experiments, missing experimental details, such as geometrical definition, data reduction procedures, and manufacturing tolerances have led to poor Benchmark calculations. The INL has a long and deep history of research in thermal hydraulics, especially in the 1960s through 1980s when many programs such as LOFT and Semiscle were devoted to light-water reactor safety research, the EBRII fast reactor was in operation, and a strong geothermal energy program was established. The past can serve as a partial guide for reinvigorating thermal hydraulic research at the laboratory. However, new research programs need to fully incorporate modern experimental methods such as measurement techniques using the latest instrumentation, computerized data reduction, and scaling methodology. The path forward for establishing experimental research for code model validation will require benchmark experiments conducted in suitable facilities located at the INL. This document describes thermal hydraulic facility requirements and candidate buildings and presents examples of suitable validation experiments related

  6. Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming

    Science.gov (United States)

    Hattingh, Frederik; Buitendag, Albertus A. K.; van der Walt, Jacobus S.

    2013-01-01

    The transfer and teaching of programming and programming related skills has become, increasingly difficult on an undergraduate level over the past years. This is partially due to the number of programming languages available as well as access to readily available source code over the Web. Source code plagiarism is common practice amongst many…

  7. The Live Coding of Slub - Art Oriented Programming as Media Critique

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    will analyze and discuss code as the artist's material. In particular, it will focus one particular artistic code-praxis: the Live Coding performances of Slub (programming computer music live, visually showing the coding) The artists Alex McLean and Adrian Ward (aka Slub) along with Geoff Cox declare: "art...... will raise the question of whether listening to the code (at a non-textual level) may provide an embodied experience of data-processing. The performance can be regarded as a collective appreciation of the code artist as a musician using code as his/her instrument, interchanging data and process live....

  8. US Accelerator R&D Program Toward Intensity Frontier Machines

    Energy Technology Data Exchange (ETDEWEB)

    Shiltsev, Vladimir [Fermilab

    2016-09-15

    The 2014 P5 report indicated the accelerator-based neutrino and rare decay physics research as a centerpiece of the US domestic HEP program. Operation, upgrade and development of the accelerators for the near-term and longer-term particle physics program at the Intensity Frontier face formidable challenges. Here we discuss key elements of the accelerator physics and technology R&D program toward future multi-MW proton accelerators.

  9. Expanding Dress Code Requirements in the Doctor of Pharmacy Program

    National Research Council Canada - National Science Library

    Naughton, Cynthia A; Schweiger, Teresa A; Angelo, Lauren B; Lea Bonner, C; Dhing, Conrad W; Farley, Joel F

    2016-01-01

    Although the use of a professional dress code is standard practice across colleges and schools of pharmacy during introductory and advanced pharmacy practice experiences, requiring professional attire...

  10. Analysis of image content recognition algorithm based on sparse coding and machine learning

    Science.gov (United States)

    Xiao, Yu

    2017-03-01

    This paper presents an image classification algorithm based on spatial sparse coding model and random forest. Firstly, SIFT feature extraction of the image; and then use the sparse encoding theory to generate visual vocabulary based on SIFT features, and using the visual vocabulary of SIFT features into a sparse vector; through the combination of regional integration and spatial sparse vector, the sparse vector gets a fixed dimension is used to represent the image; at last random forest classifier for image sparse vectors for training and testing, using the experimental data set for standard test Caltech-101 and Scene-15. The experimental results show that the proposed algorithm can effectively represent the features of the image and improve the classification accuracy. In this paper, we propose an innovative image recognition algorithm based on image segmentation, sparse coding and multi instance learning. This algorithm introduces the concept of multi instance learning, the image as a multi instance bag, sparse feature transformation by SIFT images as instances, sparse encoding model generation visual vocabulary as the feature space is mapped to the feature space through the statistics on the number of instances in bags, and then use the 1-norm SVM to classify images and generate sample weights to select important image features.

  11. lncRScan-SVM: A Tool for Predicting Long Non-Coding RNAs Using Support Vector Machine.

    Science.gov (United States)

    Sun, Lei; Liu, Hui; Zhang, Lin; Meng, Jia

    2015-01-01

    Functional long non-coding RNAs (lncRNAs) have been bringing novel insight into biological study, however it is still not trivial to accurately distinguish the lncRNA transcripts (LNCTs) from the protein coding ones (PCTs). As various information and data about lncRNAs are preserved by previous studies, it is appealing to develop novel methods to identify the lncRNAs more accurately. Our method lncRScan-SVM aims at classifying PCTs and LNCTs using support vector machine (SVM). The gold-standard datasets for lncRScan-SVM model training, lncRNA prediction and method comparison were constructed according to the GENCODE gene annotations of human and mouse respectively. By integrating features derived from gene structure, transcript sequence, potential codon sequence and conservation, lncRScan-SVM outperforms other approaches, which is evaluated by several criteria such as sensitivity, specificity, accuracy, Matthews correlation coefficient (MCC) and area under curve (AUC). In addition, several known human lncRNA datasets were assessed using lncRScan-SVM. LncRScan-SVM is an efficient tool for predicting the lncRNAs, and it is quite useful for current lncRNA study.

  12. Directly Generating the NC Machining Program from AutoCAD Graph

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    One kind of auto-programming method directly gener at ing the NC machining program by AutoCAD graph is discussed in this article. Firs tly, the article discusses the open type graphic interface of AutoCAD. Then the graphic export among the AutoCAD, the adding of process information and the data storage, as well as technology of generating NC program has been introduced . Finally, a NC auto-programming system GAPS based on AutoCAD graph is develope d. The tendency of auto-programming is graphic auto-pro...

  13. Polytope Representations for Linear-Programming Decoding of Non-Binary Linear Codes

    CERN Document Server

    Skachek, Vitaly; Byrne, Eimear; Greferath, Marcus

    2007-01-01

    In previous work, we demonstrated how decoding of a non-binary linear code could be formulated as a linear-programming problem. In this paper, we study different polytopes for use with linear-programming decoding, and show that for many classes of codes these polytopes yield a complexity advantage for decoding. These representations lead to polynomial-time decoders for a wide variety of classical non-binary linear codes.

  14. Understanding Notional Machines through Traditional Teaching with Conceptual Contraposition and Program Memory Tracing

    OpenAIRE

    Jeisson Hidalgo-Céspedes; Gabriela Marín-Raventós; Vladimir Lara-Villagrán

    2016-01-01

    A correct understanding about how computers run code is mandatory in order to effectively learn to program. Lectures have historically been used in programming courses to teach how computers execute code, and students are assessed through traditional evaluation methods, such as exams. Constructivism learning theory objects to students’ passiveness during lessons, and traditional quantitative methods for evaluating a complex cognitive process such as understanding. Constructivism proposes comp...

  15. Programming and machining of complex parts based on CATIA solid modeling

    Science.gov (United States)

    Zhu, Xiurong

    2017-09-01

    The complex parts of the use of CATIA solid modeling programming and simulation processing design, elaborated in the field of CNC machining, programming and the importance of processing technology. In parts of the design process, first make a deep analysis on the principle, and then the size of the design, the size of each chain, connected to each other. After the use of backstepping and a variety of methods to calculate the final size of the parts. In the selection of parts materials, careful study, repeated testing, the final choice of 6061 aluminum alloy. According to the actual situation of the processing site, it is necessary to make a comprehensive consideration of various factors in the machining process. The simulation process should be based on the actual processing, not only pay attention to shape. It can be used as reference for machining.

  16. A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs

    Directory of Open Access Journals (Sweden)

    Jooyong Yi

    2013-09-01

    Full Text Available Backtracking (i.e., reverse execution helps the user of a debugger to naturally think backwards along the execution path of a program, and thinking backwards makes it easy to locate the origin of a bug. So far backtracking has been implemented mostly by state saving or by checkpointing. These implementations, however, inherently do not scale. Meanwhile, a more recent backtracking method based on reverse-code generation seems promising because executing reverse code can restore the previous states of a program without state saving. In the literature, there can be found two methods that generate reverse code: (a static reverse-code generation that pre-generates reverse code through static analysis before starting a debugging session, and (b dynamic reverse-code generation that generates reverse code by applying dynamic analysis on the fly during a debugging session. In particular, we espoused the latter one in our previous work to accommodate non-determinism of a program caused by e.g., multi-threading. To demonstrate the usefulness of our dynamic reverse-code generation, this article presents a case study of various backtracking methods including ours. We compare the memory usage of various backtracking methods in a simple but nontrivial example, a bounded-buffer program. In the case of non-deterministic programs such as this bounded-buffer program, our dynamic reverse-code generation outperforms the existing backtracking methods in terms of memory efficiency.

  17. Learning Computer Programming: Implementing a Fractal in a Turing Machine

    Science.gov (United States)

    Pereira, Hernane B. de B.; Zebende, Gilney F.; Moret, Marcelo A.

    2010-01-01

    It is common to start a course on computer programming logic by teaching the algorithm concept from the point of view of natural languages, but in a schematic way. In this sense we note that the students have difficulties in understanding and implementation of the problems proposed by the teacher. The main idea of this paper is to show that the…

  18. In Vitro Evaluation of a Program for Machine-Aided Indexing.

    Science.gov (United States)

    Jacquemin, Christian; Daille, Beatrice; Royaute, Jean; Polanco, Xavier

    2002-01-01

    Presents the human evaluation of ILIAD, a program for machine-aided indexing that was designed to assist expert librarians in computer-aided indexing and document analysis. Topics include controlled indexing and free indexing; natural language and concept-based information retrieval; evaluation methodology; syntactic variations; and a comparison…

  19. THE WORLD OF TEACHING MACHINES, PROGRAMED LEARNING AND SELF-INSTRUCTIONAL DEVICES.

    Science.gov (United States)

    FOLTZ, CHARLES I.

    TEACHING MACHINES HAVE SEVERAL ADVANTAGES--TIME IS SAVED, CORRECT RESPONSE IS REINFORCED IMMEDIATELY, AND STUDENTS ARE NOT PUBLICLY CONFRONTED WITH FAILURE. THERE ARE TWO APPROACHES TO THE PROGRAMED INSTRUCTION INTRINSIC TO THEIR USE--ONE (THE SKINNER METHOD) IS BASED ON FILLING IN BLANK SPACES, THE OTHER (THE CROWDER METHOD) EMPLOYS…

  20. Convex quadratic programming relaxations for parallel machine scheduling with controllable processing times subject to release times

    Institute of Scientific and Technical Information of China (English)

    ZHANG Feng; CHEN Feng; TANG Guochun

    2004-01-01

    Scheduling unrelated parallel machines with controllable processing times subject to release times is investigated. Based on the convex quadratic programming relaxation and the randomized rounding strategy, a 2-approximation algorithm is obtained for a special case with the all-or-none property and then a 3-approximation algorithm is presented for general problem.

  1. New residential construction compliance: Evaluation of the Washington State Energy Code program

    Energy Technology Data Exchange (ETDEWEB)

    Warwick, W.M.; Lee, A.D.; Sandahl, L.J.; Durfee, D.L.; Richman, E.E.

    1993-07-01

    This report describes the Pacific Northwest Laboratory`s (PNL`s) evaluation of the Washington State Energy Code Program (WSECP). In 1990, the Washington State Legislature passed a residential energy efficiency code to be effective July 1, 1992. Bonneville supported passage and implementation of the code to ensure that new residences in the State of Washington were as energy efficient as economically feasible. The Washington State Energy Office (WSEO) is conducting the WSECP for Bonneville to support code implementation. This support takes several forms, including providing training to code enforcement officials, technical support both in the field and through telephone ``hot lines,`` and computerized tools to review house plans for code compliance. WSEO began implementing the WSECP in 1992, prior to the effective date of the new code. This first phase of the WSECP was the subject of an earlier process evaluation conducted by PNL. From that evaluation PNL found that most new homes being built immediately after the code went into effect were ``grand-fathered`` under the old code. The training program for the new code was in place and sessions were being attended by the jurisdictions but it was too early to determine if the training was effective in improving code compliance and easing the transition to the new energy code. That is the subject of this evaluation.

  2. The Live Coding of Slub - Art Oriented Programming as Media Critique

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    's materiality/text. (Cramer 2003) The paper will then propose that object of art oriented programming – in an avant-garde perspective – must be to recuperate an interchangeability of data and processing. How? The particularity of Live Coding does not rely on the magical expression – but nor does it rely...... on the code/material/text itself (as one might say is the case in some code-art). It relies on the nature of code to do something – as if it was magic: in the performative aspect of the code. Relying on performance theory (Austin, Carlson) the paper will demonstrate how the computer in the Live Coding......Computer art is often associated with computer-generated expressions (digital audio/images in music, video, stage design, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated code, etc.). This paper...

  3. TWO-DIMENSION CODE RECOGNITION BASED ON MACHINE VISION%基于机器视觉的2D码识别

    Institute of Scientific and Technical Information of China (English)

    常晓玮

    2014-01-01

    According to components detection of the auto parts supply chain,put forward a kind code recognition method for DataMatrix code,PDF41 7 code,and QR code based on machine vision.The method of obtaining image firstly,and then using the image denoising technique to the image acquired with a 2D code processing,and then select different processing methods according to the 2D code can effectively identify these three 2D codes.The experimental result shows that the proposed approach is feasible and effective and can recognize DataMatrix code,PDF41 7 code,QR code real -timely.%针对汽车生产中零部件供应环节的部件检测应用,提出一种基于机器视觉的DataMatrix码、PDF417码、QR码识别方法。本方法利用图像获取、图像去噪等技术对获取的具有2D码的图像进行处理,然后根据2D码选取不同的处理方法,能有效识别以上三种2D码。实验结果表明该方法是可行的,能实时识别DataMatrix码、PDF417码、QR码。

  4. Program Suite for Conceptual Designing of Parallel Mechanism-Based Robots and Machine Tools

    Directory of Open Access Journals (Sweden)

    Slobodan Tabaković

    2013-06-01

    This paper describes the categorization of criteria for the conceptual design of parallel mechanism‐based robots or machine tools, resulting from workspace analysis as well as the procedure of their defining. Furthermore, it also presents the designing methodology that was implemented into the program for the creation of a robot or machine tool space model and the optimization of the resulting solution. For verification of the criteria and the programme suite, three common (conceptually different mechanisms with a similar mechanical structure and kinematic characteristics were used.

  5. Detecting plagiarism in program code and free text

    OpenAIRE

    Bandelj, Anej

    2014-01-01

    Lately we often hear allegations that a certain work is a plagiarism, hence I decided to describe this area in detail in my diploma thesis. First I define what precisely the term plagiarism means, in which areas it is present, how to limit it, and how to utilize software for its detection. I delve into the utility of software which detects details in source code and text documents. Such software does not determine plagiarism itself, but rather indicates the percentage of text or source code s...

  6. Smiles: a fortran-77 program for sequential machine interpreted lineament extraction using digital images

    Science.gov (United States)

    Raghavan, Venkatesh; Wadatsumu, Kiyoshi; Masumoto, Shinji

    1994-03-01

    A FORTRAN-77 program Sequential Machine Interpreted Lineament Extraction System (SMILES) is presented, which is useful for automatic and manual extraction of lineament information from digital images. The SMILES is a stand-alone package composed of several modules which perform the function of image display, lineament information extraction, data management, output generation, and preliminary analysis. The program architecture and application results are described. The program has been tested using LANDSAT MSS data of southwestern Japan. The Directional Segment Detection Algorithm (DSDA) also has been applied to shaded relief maps generated from digital elevation data of the same area. Interpretation of aerial photograph stereo pairs reveals that the machine interpreted features show photogeological expressions that are characteristic of geologic lineaments.

  7. An improved method for identification of small non-coding RNAs in bacteria using support vector machine

    Science.gov (United States)

    Barman, Ranjan Kumar; Mukhopadhyay, Anirban; Das, Santasabuj

    2017-04-01

    Bacterial small non-coding RNAs (sRNAs) are not translated into proteins, but act as functional RNAs. They are involved in diverse biological processes like virulence, stress response and quorum sensing. Several high-throughput techniques have enabled identification of sRNAs in bacteria, but experimental detection remains a challenge and grossly incomplete for most species. Thus, there is a need to develop computational tools to predict bacterial sRNAs. Here, we propose a computational method to identify sRNAs in bacteria using support vector machine (SVM) classifier. The primary sequence and secondary structure features of experimentally-validated sRNAs of Salmonella Typhimurium LT2 (SLT2) was used to build the optimal SVM model. We found that a tri-nucleotide composition feature of sRNAs achieved an accuracy of 88.35% for SLT2. We validated the SVM model also on the experimentally-detected sRNAs of E. coli and Salmonella Typhi. The proposed model had robustly attained an accuracy of 81.25% and 88.82% for E. coli K-12 and S. Typhi Ty2, respectively. We confirmed that this method significantly improved the identification of sRNAs in bacteria. Furthermore, we used a sliding window-based method and identified sRNAs from complete genomes of SLT2, S. Typhi Ty2 and E. coli K-12 with sensitivities of 89.09%, 83.33% and 67.39%, respectively.

  8. Program Code Generator for Cardiac Electrophysiology Simulation with Automatic PDE Boundary Condition Handling.

    Science.gov (United States)

    Punzalan, Florencio Rusty; Kunieda, Yoshitoshi; Amano, Akira

    2015-01-01

    Clinical and experimental studies involving human hearts can have certain limitations. Methods such as computer simulations can be an important alternative or supplemental tool. Physiological simulation at the tissue or organ level typically involves the handling of partial differential equations (PDEs). Boundary conditions and distributed parameters, such as those used in pharmacokinetics simulation, add to the complexity of the PDE solution. These factors can tailor PDE solutions and their corresponding program code to specific problems. Boundary condition and parameter changes in the customized code are usually prone to errors and time-consuming. We propose a general approach for handling PDEs and boundary conditions in computational models using a replacement scheme for discretization. This study is an extension of a program generator that we introduced in a previous publication. The program generator can generate code for multi-cell simulations of cardiac electrophysiology. Improvements to the system allow it to handle simultaneous equations in the biological function model as well as implicit PDE numerical schemes. The replacement scheme involves substituting all partial differential terms with numerical solution equations. Once the model and boundary equations are discretized with the numerical solution scheme, instances of the equations are generated to undergo dependency analysis. The result of the dependency analysis is then used to generate the program code. The resulting program code are in Java or C programming language. To validate the automatic handling of boundary conditions in the program code generator, we generated simulation code using the FHN, Luo-Rudy 1, and Hund-Rudy cell models and run cell-to-cell coupling and action potential propagation simulations. One of the simulations is based on a published experiment and simulation results are compared with the experimental data. We conclude that the proposed program code generator can be used to

  9. Program Code Generator for Cardiac Electrophysiology Simulation with Automatic PDE Boundary Condition Handling.

    Directory of Open Access Journals (Sweden)

    Florencio Rusty Punzalan

    Full Text Available Clinical and experimental studies involving human hearts can have certain limitations. Methods such as computer simulations can be an important alternative or supplemental tool. Physiological simulation at the tissue or organ level typically involves the handling of partial differential equations (PDEs. Boundary conditions and distributed parameters, such as those used in pharmacokinetics simulation, add to the complexity of the PDE solution. These factors can tailor PDE solutions and their corresponding program code to specific problems. Boundary condition and parameter changes in the customized code are usually prone to errors and time-consuming. We propose a general approach for handling PDEs and boundary conditions in computational models using a replacement scheme for discretization. This study is an extension of a program generator that we introduced in a previous publication. The program generator can generate code for multi-cell simulations of cardiac electrophysiology. Improvements to the system allow it to handle simultaneous equations in the biological function model as well as implicit PDE numerical schemes. The replacement scheme involves substituting all partial differential terms with numerical solution equations. Once the model and boundary equations are discretized with the numerical solution scheme, instances of the equations are generated to undergo dependency analysis. The result of the dependency analysis is then used to generate the program code. The resulting program code are in Java or C programming language. To validate the automatic handling of boundary conditions in the program code generator, we generated simulation code using the FHN, Luo-Rudy 1, and Hund-Rudy cell models and run cell-to-cell coupling and action potential propagation simulations. One of the simulations is based on a published experiment and simulation results are compared with the experimental data. We conclude that the proposed program code

  10. Developing molecular dynamics simulation codes using mixed language programming

    Energy Technology Data Exchange (ETDEWEB)

    DeBoni, T.; Feo, J.T. [Lawrence Livermore National Lab., CA (United States); Caffey, H.; Hausheer, F. [BioNumerik Pharmaceuticals, Inc., San Antonio, TX (United States)

    1994-05-01

    We describe our experiences parallelizing a large-scale scientific application to model systems of discrete particles. We describe the approach and tasks undertaken to parallelize this application using two different programming paradigms: imperative and functional. The objectives of both exercises were to maximize performance, parallelism and portability, and to minimize program development costs. We believe this study reveals an important relationship between conventional and novel parallel programming paradigms, and identifies important attributes that novel paradigms must have to gain wide acceptance.

  11. Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments

    Science.gov (United States)

    Kermek, Dragutin; Novak, Matija

    2016-01-01

    In programming courses there are various ways in which students attempt to cheat. The most commonly used method is copying source code from other students and making minimal changes in it, like renaming variable names. Several tools like Sherlock, JPlag and Moss have been devised to detect source code plagiarism. However, for larger student…

  12. Concept of automatic programming of NC machine for metal plate cutting by genetic algorithm method

    Directory of Open Access Journals (Sweden)

    B. Vaupotic

    2005-12-01

    Full Text Available Purpose: In this paper the concept of automatic programs of the NC machine for metal plate cutting by genetic algorithm method has been presented.Design/methodology/approach: The paper was limited to automatic creation of NC programs for two-dimensional cutting of material by means of adaptive heuristic search algorithms.Findings: Automatic creation of NC programs in laser cutting of materials combines the CAD concepts, the recognition of features and creation and optimization of NC programs. The proposed intelligent system is capable to recognize automatically the nesting of products in the layout, to determine the incisions and sequences of cuts forming the laid out products. Position of incisions is determined at the relevant places on the cut. The system is capable to find the shortest path between individual cuts and to record the NC program.Research limitations/implications: It would be appropriate to orient future researches towards conceiving an improved system for three-dimensional cutting with optional determination of positions of incisions, with the capability to sense collisions and with optimization of the speed and acceleration during cutting.Practical implications: The proposed system assures automatic preparation of NC program without NC programer.Originality/value: The proposed concept shows a high degree of universality, efficiency and reliability and it can be simply adapted to other NC-machines.

  13. Molecular dynamics simulation on a network of workstations using a machine-independent parallel programming language.

    OpenAIRE

    1991-01-01

    Molecular dynamics simulations investigate local and global motion in molecules. Several parallel computing approaches have been taken to attack the most computationally expensive phase of molecular simulations, the evaluation of long range interactions. This paper develops a straightforward but effective algorithm for molecular dynamics simulations using the machine-independent parallel programming language, Linda. The algorithm was run both on a shared memory parallel computer and on a netw...

  14. Costing Generated Runtime Execution Plans for Large-Scale Machine Learning Programs

    OpenAIRE

    Boehm, Matthias

    2015-01-01

    Declarative large-scale machine learning (ML) aims at the specification of ML algorithms in a high-level language and automatic generation of hybrid runtime execution plans ranging from single node, in-memory computations to distributed computations on MapReduce (MR) or similar frameworks like Spark. The compilation of large-scale ML programs exhibits many opportunities for automatic optimization. Advanced cost-based optimization techniques require---as a fundamental precondition---an accurat...

  15. International Code Assessment and Applications Program: Summary of code assessment studies concerning RELAP5/MOD2, RELAP5/MOD3, and TRAC-B. International Agreement Report

    Energy Technology Data Exchange (ETDEWEB)

    Schultz, R.R. [EG and G Idaho, Inc., Idaho Falls, ID (United States)

    1993-12-01

    Members of the International Code Assessment Program (ICAP) have assessed the US Nuclear Regulatory Commission (USNRC) advanced thermal-hydraulic codes over the past few years in a concerted effort to identify deficiencies, to define user guidelines, and to determine the state of each code. The results of sixty-two code assessment reviews, conducted at INEL, are summarized. Code deficiencies are discussed and user recommended nodalizations investigated during the course of conducting the assessment studies and reviews are listed. All the work that is summarized was done using the RELAP5/MOD2, RELAP5/MOD3, and TRAC-B codes.

  16. CONTU revisited: the case against copyright protection for computer programs in machine-readable form.

    Science.gov (United States)

    Samuelson, P

    1984-09-01

    Professor Samuelson casts a critical eye on the Final Report of the National Commission on New Technological Uses of Copyrighted Works (CONTU) which recommended that copyright protection be extended to machine-readable versions of computer programs. CONTU appears to have misunderstood computer technology and misinterpreted copyright tradition in two significant respects. The Commission failed to take into account the historical importance of disclosure of the contents of protected works as a fundamental goal of both the copyright and patent laws. It also erroneously opined that the utilitarian character of a work was no bar to its copyrightability when both the statute and the case law make clear that utilitarian works are not copyrightable. Since computer programs in machine-readable forms do not disclose their contents and are inherently utilitarian, copyright protection for them is inappropriate. Congress acted on CONTU's recommendation without understanding the significance of these conceptual flaws. Professor Samuelson recommends the creation of a new form of intellectual property law specifically designed for machine-readable programs.

  17. Use of Data to Develop a Code Blue Training Program

    Science.gov (United States)

    2017-01-28

    basic journal publishing charges (to include costs fo r tables and black and white photos). We cannot pay for reprints. If you are 59 MOW staff member...SGS R&D: Tri-Service Nursing Research Program (TSNRP); Defense Medical Research & Development Program (DMRDP): NIH: Congressionally Directed...JO days before fina l clearance is required to publish/present your materials. If you have any questions or concerns, please contact the S9 CRD

  18. Rapid Prediction of Bacterial Heterotrophic Fluxomics Using Machine Learning and Constraint Programming

    Science.gov (United States)

    Wu, Stephen Gang; Wang, Yuxuan; Jiang, Wu; Oyetunde, Tolutola; Yao, Ruilian; Zhang, Xuehong; Shimizu, Kazuyuki; Tang, Yinjie J.; Bao, Forrest Sheng

    2016-01-01

    13C metabolic flux analysis (13C-MFA) has been widely used to measure in vivo enzyme reaction rates (i.e., metabolic flux) in microorganisms. Mining the relationship between environmental and genetic factors and metabolic fluxes hidden in existing fluxomic data will lead to predictive models that can significantly accelerate flux quantification. In this paper, we present a web-based platform MFlux (http://mflux.org) that predicts the bacterial central metabolism via machine learning, leveraging data from approximately 100 13C-MFA papers on heterotrophic bacterial metabolisms. Three machine learning methods, namely Support Vector Machine (SVM), k-Nearest Neighbors (k-NN), and Decision Tree, were employed to study the sophisticated relationship between influential factors and metabolic fluxes. We performed a grid search of the best parameter set for each algorithm and verified their performance through 10-fold cross validations. SVM yields the highest accuracy among all three algorithms. Further, we employed quadratic programming to adjust flux profiles to satisfy stoichiometric constraints. Multiple case studies have shown that MFlux can reasonably predict fluxomes as a function of bacterial species, substrate types, growth rate, oxygen conditions, and cultivation methods. Due to the interest of studying model organism under particular carbon sources, bias of fluxome in the dataset may limit the applicability of machine learning models. This problem can be resolved after more papers on 13C-MFA are published for non-model species. PMID:27092947

  19. Rapid Prediction of Bacterial Heterotrophic Fluxomics Using Machine Learning and Constraint Programming.

    Directory of Open Access Journals (Sweden)

    Stephen Gang Wu

    2016-04-01

    Full Text Available 13C metabolic flux analysis (13C-MFA has been widely used to measure in vivo enzyme reaction rates (i.e., metabolic flux in microorganisms. Mining the relationship between environmental and genetic factors and metabolic fluxes hidden in existing fluxomic data will lead to predictive models that can significantly accelerate flux quantification. In this paper, we present a web-based platform MFlux (http://mflux.org that predicts the bacterial central metabolism via machine learning, leveraging data from approximately 100 13C-MFA papers on heterotrophic bacterial metabolisms. Three machine learning methods, namely Support Vector Machine (SVM, k-Nearest Neighbors (k-NN, and Decision Tree, were employed to study the sophisticated relationship between influential factors and metabolic fluxes. We performed a grid search of the best parameter set for each algorithm and verified their performance through 10-fold cross validations. SVM yields the highest accuracy among all three algorithms. Further, we employed quadratic programming to adjust flux profiles to satisfy stoichiometric constraints. Multiple case studies have shown that MFlux can reasonably predict fluxomes as a function of bacterial species, substrate types, growth rate, oxygen conditions, and cultivation methods. Due to the interest of studying model organism under particular carbon sources, bias of fluxome in the dataset may limit the applicability of machine learning models. This problem can be resolved after more papers on 13C-MFA are published for non-model species.

  20. Rapid Prediction of Bacterial Heterotrophic Fluxomics Using Machine Learning and Constraint Programming.

    Science.gov (United States)

    Wu, Stephen Gang; Wang, Yuxuan; Jiang, Wu; Oyetunde, Tolutola; Yao, Ruilian; Zhang, Xuehong; Shimizu, Kazuyuki; Tang, Yinjie J; Bao, Forrest Sheng

    2016-04-01

    13C metabolic flux analysis (13C-MFA) has been widely used to measure in vivo enzyme reaction rates (i.e., metabolic flux) in microorganisms. Mining the relationship between environmental and genetic factors and metabolic fluxes hidden in existing fluxomic data will lead to predictive models that can significantly accelerate flux quantification. In this paper, we present a web-based platform MFlux (http://mflux.org) that predicts the bacterial central metabolism via machine learning, leveraging data from approximately 100 13C-MFA papers on heterotrophic bacterial metabolisms. Three machine learning methods, namely Support Vector Machine (SVM), k-Nearest Neighbors (k-NN), and Decision Tree, were employed to study the sophisticated relationship between influential factors and metabolic fluxes. We performed a grid search of the best parameter set for each algorithm and verified their performance through 10-fold cross validations. SVM yields the highest accuracy among all three algorithms. Further, we employed quadratic programming to adjust flux profiles to satisfy stoichiometric constraints. Multiple case studies have shown that MFlux can reasonably predict fluxomes as a function of bacterial species, substrate types, growth rate, oxygen conditions, and cultivation methods. Due to the interest of studying model organism under particular carbon sources, bias of fluxome in the dataset may limit the applicability of machine learning models. This problem can be resolved after more papers on 13C-MFA are published for non-model species.

  1. Lex genetica: the law and ethics of programming biological code.

    Science.gov (United States)

    Burk, Dan L

    2002-01-01

    Recent advances in genetic engineering now allow the design of programmable biological artifacts. Such programming may include usage constraints that will alter the balance of ownership and control for biotechnology products. Similar changes have been analyzed in the context of digital content management systems, and while this previous work is useful in analyzing issues related to biological programming, the latter technology presents new conceptual problems that require more comprehensive evaluation of the interplay between law and technologically embedded values. In particular, the ability to embed contractual terms in technological artifacts now requires a re-examination of disclosure and consent in transactions involving such artifacts.

  2. COMPARATIVE RESEARCH REGARDING THE DESIGN AND THE DEVELOPMENT OF THE G CODE PROGRAMMING LANGUAGE BETWEEN CASE R290-02IS AND THE CLASSIC VERSION, CONSTITUENTS OF THE GARLAND PRODUCT C3G 1200, 1400, 1600

    Directory of Open Access Journals (Sweden)

    Valeria Victoria IOVANOV

    2014-05-01

    Full Text Available A CNC machine makes use of mathematics and various coordinate systems to understand and process the information it receives to determine what to move where and how fast . The most important function of any CNC machine is precise and rigorous control of the movement. All CNC equipment have two or more directions of motion, called axes. CNC machines are driven by computer controlled servo motors and generally guided by a stored program, the type of movement (fast , linear, circular , the moving axes, the distances of movement and the speed of movement ( processing being programmable for most CNC machines . This paper proposes the design and implementation of a G code programming language for the reference point Case R290 - 02IS the short version compared to the classical part of the garland product C3G 1200,1400,1600 , reference points used in all fields that use conveyors .

  3. Code Development and Analysis Program: cladding mechanical limits (CMLIMT)

    Energy Technology Data Exchange (ETDEWEB)

    Hagrman, D. L.

    1979-05-01

    Revised models are described for cladding mechanical limits. The update incorporates important new data from several Nuclear Regulatory Commission and German experimental programs and defines a single physically reasonable failure criterion for cladding under tensile stress. Alternate simplified expressions are also derived for use in obtaining estimates of typical cladding shape after burst.

  4. Remodularizing Java Programs for Improved Locality of Feature Implementations in Source Code

    DEFF Research Database (Denmark)

    Olszak, Andrzej; Jørgensen, Bo Nørregaard

    2011-01-01

    Explicit traceability between features and source code is known to help programmers to understand and modify programs during maintenance tasks. However, the complex relations between features and their implementations are not evident from the source code of object-oriented Java programs....... Consequently, the implementations of individual features are difficult to locate, comprehend, and modify in isolation. In this paper, we present a novel remodularization approach that improves the representation of features in the source code of Java programs. Both forward- and reverse restructurings...... are supported through on-demand bidirectional restructuring between feature-oriented and object-oriented decompositions. The approach includes a feature location phase based of tracing program execution, a feature representation phase that reallocates classes into a new package structure based on single...

  5. Fabrication of Machined and Shrink Fitted Impactor; Composite Liners for the Los Alamos HEDP Program

    Energy Technology Data Exchange (ETDEWEB)

    Randolph, B.

    1999-10-19

    Composite liners have been fabricated for the Los Alamos liner driven HEDP experiments using impactors formed by physical vapor deposition (PVD), electroplating, machining and shrink fitting. Chemical vapor deposition (CVD) has been proposed for some ATLAS liner applications. This paper describes the processes used to fabricate machined and shrink fitted impactors which have been used for copper impactors in 1100 aluminum liners and 6061 T-6 aluminum impactors in 1100 aluminum liners. The most successful processes have been largely empirically developed and rely upon a combination of shrink fitted and light press fitting. The processes used to date will be described along with some considerations for future composite liners requirements in the HEDP Program.

  6. A Generic Top-Down Dynamic-Programming Approach to Prefix-Free Coding

    CERN Document Server

    Golin, Mordecai; Yu, Jiajin

    2008-01-01

    Given a probability distribution over a set of n words to be transmitted, the Huffman Coding problem is to find a minimal-cost prefix free code for transmitting those words. The basic Huffman coding problem can be solved in O(n log n) time but variations are more difficult. One of the standard techniques for solving these variations utilizes a top-down dynamic programming approach. In this paper we show that this approach is amenable to dynamic programming speedup techniques, permitting a speedup of an order of magnitude for many algorithms in the literature for such variations as mixed radix, reserved length and one-ended coding. These speedups are immediate implications of a general structural property that permits batching together the calculation of many DP entries.

  7. Identification and Analysis of Critical Gaps in Nuclear Fuel Cycle Codes Required by the SINEMA Program

    Energy Technology Data Exchange (ETDEWEB)

    Adrian Miron; Joshua Valentine; John Christenson; Majd Hawwari; Santosh Bhatt; Mary Lou Dunzik-Gougar: Michael Lineberry

    2009-10-01

    The current state of the art in nuclear fuel cycle (NFC) modeling is an eclectic mixture of codes with various levels of applicability, flexibility, and availability. In support of the advanced fuel cycle systems analyses, especially those by the Advanced Fuel Cycle Initiative (AFCI), Unviery of Cincinnati in collaboration with Idaho State University carried out a detailed review of the existing codes describing various aspects of the nuclear fuel cycle and identified the research and development needs required for a comprehensive model of the global nuclear energy infrastructure and the associated nuclear fuel cycles. Relevant information obtained on the NFC codes was compiled into a relational database that allows easy access to various codes' properties. Additionally, the research analyzed the gaps in the NFC computer codes with respect to their potential integration into programs that perform comprehensive NFC analysis.

  8. STUDY OF CODING GENERATOR BASED ON IN-SYSTEM PROGRAMMING TECHNIQUE AND DEVICES

    Institute of Scientific and Technical Information of China (English)

    Liu Duren; Jin Yajing; Ren Zhichun

    2002-01-01

    This paper presents a design of coding waveform generator controlled by microcomputer or single-chip microcomputer and realizes arbitrary coding waveform combination based on In-system programming(ISP) technique and High Density Programmable Logic Deivce (HDPLD),and using latch register, control counter and easily expanded PS (Parallel in & Serial out) shift register array. This scheme can overcome some shortcomings in past schemes, so that hardware design can be realized by means of software.

  9. Fast and intuitive programming of adaptive laser cutting of lace enabled by machine vision

    Science.gov (United States)

    Vaamonde, Iago; Souto-López, Álvaro; García-Díaz, Antón

    2015-07-01

    A machine vision system has been developed, validated, and integrated in a commercial laser robot cell. It permits an offline graphical programming of laser cutting of lace. The user interface allows loading CAD designs and aligning them with images of lace pieces. Different thread widths are discriminated to generate proper cutting program templates. During online operation, the system aligns CAD models of pieces and lace images, pre-checks quality of lace cuts and adapts laser parameters to thread widths. For pieces detected with the required quality, the program template is adjusted by transforming the coordinates of every trajectory point. A low-cost lace feeding system was also developed for demonstration of full process automation.

  10. Annual Coded Wire Tag Program; Washington Missing Production Groups, 1998 Annual Report.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, James; Fuss, Howard J. (Washington Department of Fish and Wildlife, Olympia, WA)

    1999-10-01

    The Bonneville Power Administration (BPA) funds the ``Annual Coded Wire Tag Program--Missing Production Groups for Columbia River Hatcheries'' project. The WDFW project has three main objectives: (1) coded-wire tag at least one production group of each species at each Columbia Basin hatchery to enable evaluation of survival and catch distribution over time, (2) recover coded-wire tags from the snouts of fish tagged under objective 1 and estimate survival, contribution, and stray rates for each group, and (3) report the findings under objective 2 for all broods of chinook, and coho released from WDFW Columbia Basin hatcheries.

  11. Annual Coded Wire Tag Program; Oregon Stock Assessment, Annual Report 2002.

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Mark; Mallette, Christine; Murray, William

    2003-03-01

    This annual report is in fulfillment of contract obligations with Bonneville Power Administration which is the funding source for the Oregon Department of Fish and Wildlife project 'Annual Stock Assessment - Coded Wire Tag Program (ODFW)'. Results for the 2002 contract period: Objective 1 - Over 1 million juvenile salmon were coded-wire by this program (Table 1). This accounted for about 20% of the fish ODFW coded-wire tagged in 2002 for release in the Columbia Basin; Objective 2 - ODFW recovered and processed over 50,000 snouts collected from coded-wire tagged fish (Table 2); Objective 3 - The survival data summarized below includes results for coded-wire groups funded by this program as well as coded-wire groups funded from other sources; Objective 4 - The last returns of experimental groups of coho marked with VIE tags occurred in 2002 at Sandy Hatchery. This sampling showed that 26 of 67 jack coho and 1 of 2,223 adult coho VIE marked as juveniles retained the VIE mark as adults.

  12. Similarity Detection of Python Program Code%Python程序代码相似度检测

    Institute of Scientific and Technical Information of China (English)

    赵明洪; 张太红; 王正敏

    2014-01-01

    Code plagiarism is usually a kind of cheating in program language courses. When teaching programming, it is very important to detect program code plagiarism and verify programming creativity of students. Combined with attribute counting and structural property measuring techniques of code similarity detection, proposes a code similarity detection method applied to Python program. Such method can calculate similarities between students' Python program course work efficiently.%代码剽窃是程序语言课程中经常出现的一种作弊行为,严重破坏正常的教学秩序。检测剽窃的程序代码、验证学生程序作业的原创性在程序语言教学中就尤为重要。结合程序代码相似度检测技术中的属性计数技术和结构度量技术,提出一种适用于Python程序的相似度检测方法,该方法能够有效地计算出学生Python程序作业之间的相似度。

  13. A Coding Scheme Development Methodology Using Grounded Theory For Qualitative Analysis Of Pair Programming

    Directory of Open Access Journals (Sweden)

    Stephan Salinger

    2008-01-01

    Full Text Available A number of quantitative studies of pair programming (the practice of two programmers working together using just one computer have partially conflicting results. Qualitative studies are needed to explain what is really going on. We support such studies by taking a grounded theory (GT approach for deriving a coding scheme for the objective conceptual description of specific pair programming sessions independent of a particular research goal. The present article explains why our initial attempts at using GT failed and describes how to avoid these difficulties by a predetermined perspective on the data, concept naming rules, an analysis results metamodel, and pair coding. These practices may be helpful in all GT situations, particularly those involving very rich data such as video data. We illustrate the operation and usefulness of these practices by real examples derived from our coding work and present a few preliminary hypotheses regarding pair programming that have surfaced.

  14. Ways to increase the effectiveness of using computers and machine programs

    Energy Technology Data Exchange (ETDEWEB)

    Bulgakov, R.T.; Bagautdinov, G.M.; Kovalenko, Yu.M.

    1979-01-01

    An analysis is conducted of the statistical data about the operation of the computers of the computer center of the Tatar Scientific Research and Design Institute for Oil. Exposing the reasons which impact on the effectiveness of the use of the computers and the machine programs through an expert questionnaire, an ''effectiveness tree'' is compiled. Formulated are organizational measures for the executor (the computer center), the user and management and the senior leadership, which are required in order to successfully use the computers.

  15. Using RNA as Molecular Code for Programming Cellular Function.

    Science.gov (United States)

    Kushwaha, Manish; Rostain, William; Prakash, Satya; Duncan, John N; Jaramillo, Alfonso

    2016-08-19

    RNA is involved in a wide-range of important molecular processes in the cell, serving diverse functions: regulatory, enzymatic, and structural. Together with its ease and predictability of design, these properties can lead RNA to become a useful handle for biological engineers with which to control the cellular machinery. By modifying the many RNA links in cellular processes, it is possible to reprogram cells toward specific design goals. We propose that RNA can be viewed as a molecular programming language that, together with protein-based execution platforms, can be used to rewrite wide ranging aspects of cellular function. In this review, we catalogue developments in the use of RNA parts, methods, and associated computational models that have contributed to the programmability of biology. We discuss how RNA part repertoires have been combined to build complex genetic circuits, and review recent applications of RNA-based parts and circuitry. We explore the future potential of RNA engineering and posit that RNA programmability is an important resource for firmly establishing an era of rationally designed synthetic biology.

  16. Delay-Aware Program Codes Dissemination Scheme in Internet of Everything

    Directory of Open Access Journals (Sweden)

    Yixuan Xu

    2016-01-01

    Full Text Available Due to recent advancements in big data, connection technologies, and smart devices, our environment is transforming into an “Internet of Everything” (IoE environment. These smart devices can obtain new or special functions by reprogramming: upgrade their soft systems through receiving new version of program codes. However, bulk codes dissemination suffers from large delay, energy consumption, and number of retransmissions because of the unreliability of wireless links. In this paper, a delay-aware program dissemination (DAPD scheme is proposed to disseminate program codes with fast, reliable, and energy-efficient style. We observe that although total energy is limited in wireless sensor network, there exists residual energy in nodes deployed far from the base station. Therefore, DAPD scheme improves the performance of bulk codes dissemination through the following two aspects. (1 Due to the fact that a high transmitting power can significantly improve the quality of wireless links, transmitting power of sensors with more residual energy is enhanced to improve link quality. (2 Due to the fact that performance of correlated dissemination tends to degrade in a highly dynamic environment, link correlation is autonomously updated in DAPD during codes dissemination to maintain improvements brought by correlated dissemination. Theoretical analysis and experimental results show that, compared with previous work, DAPD scheme improves the dissemination performance in terms of completion time, transmission cost, and the efficiency of energy utilization.

  17. An object-oriented extension for debugging the virtual machine

    Energy Technology Data Exchange (ETDEWEB)

    Pizzi, R.G. Jr. [California Univ., Davis, CA (United States)

    1994-12-01

    A computer is nothing more then a virtual machine programmed by source code to perform a task. The program`s source code expresses abstract constructs which are compiled into some lower level target language. When a virtual machine breaks, it can be very difficult to debug because typical debuggers provide only low-level target implementation information to the software engineer. We believe that the debugging task can be simplified by introducing aspects of the abstract design and data into the source code. We introduce OODIE, an object-oriented extension to programming languages that allows programmers to specify a virtual environment by describing the meaning of the design and data of a virtual machine. This specification is translated into symbolic information such that an augmented debugger can present engineers with a programmable debugging environment specifically tailored for the virtual machine that is to be debugged.

  18. Annual Coded Wire Tag Program; Oregon Stock Assessment, 2001 Annual Report.

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Mark; Mallette, Christine; Murray, William

    2002-03-01

    This annual report is in fulfillment of contract obligations with Bonneville Power Administration which is the funding source for the Oregon Department of Fish and Wildlife project 'Annual Stock Assessment - Coded Wire Tag Program (ODFW)'. Results for the 2001 contract period: Objective 1--Over 1 million juvenile salmon were coded-wire by this program (Table 1); Objective 2--ODFW recovered and processed over 40,000 snout collected from coded-wire tagged fish (Table 2); Objective 3--Survival data is summarized below; Objective 4--The last group of VIE tagged coho was released in 2001 and returning coho were samples at Sandy Hatchery. This sampling showed only 1 of 1,160 returning coho VIE marked as juveniles retained the VIE mark as adults.

  19. Multistep Linear Programming Approaches for Decoding Low-Density Parity-Check Codes

    Institute of Scientific and Technical Information of China (English)

    LIU Haiyang; MA Lianrong; CHEN Jie

    2009-01-01

    The problem of improving the performance of linear programming (LP) decoding of low-density padty-check (LDPC) codes is considered in this paper. A multistep linear programming (MLP) algorithm was developed for decoding LDPC codes that includes a slight increase in computational complexity. The MLP decoder adaptively adds new constraints which are compatible with a selected check node to refine the re-sults when an error is reported by the odginal LP decoder. The MLP decoder result is shown to have the maximum-likelihood (ML) certificate property. Simulations with moderate block length LDPC codes suggest that the MLP decoder gives better performance than both the odginal LP decoder and the conventional sum-product (SP) decoder.

  20. Proof-Carrying Code with Correct Compilers

    Science.gov (United States)

    Appel, Andrew W.

    2009-01-01

    In the late 1990s, proof-carrying code was able to produce machine-checkable safety proofs for machine-language programs even though (1) it was impractical to prove correctness properties of source programs and (2) it was impractical to prove correctness of compilers. But now it is practical to prove some correctness properties of source programs, and it is practical to prove correctness of optimizing compilers. We can produce more expressive proof-carrying code, that can guarantee correctness properties for machine code and not just safety. We will construct program logics for source languages, prove them sound w.r.t. the operational semantics of the input language for a proved-correct compiler, and then use these logics as a basis for proving the soundness of static analyses.

  1. The Teaching of the Code of Ethics and Standard Practices for Texas Educator Preparation Programs

    Science.gov (United States)

    Davenport, Marvin; Thompson, J. Ray; Templeton, Nathan R.

    2015-01-01

    The purpose of this descriptive quantitative research study was to answer three basic informational questions: (1) To what extent ethics training, as stipulated in Texas Administrative Code Chapter 247, was included in the EPP curriculum; (2) To what extent Texas public universities with approved EPP programs provided faculty opportunities for…

  2. DISCRETE DYNAMIC MODEL OF BEVEL GEAR – VERIFICATION THE PROGRAM SOURCE CODE FOR NUMERICAL SIMULATION

    Directory of Open Access Journals (Sweden)

    Krzysztof TWARDOCH

    2014-06-01

    Full Text Available In the article presented a new model of physical and mathematical bevel gear to study the influence of design parameters and operating factors on the dynamic state of the gear transmission. Discusses the process of verifying proper operation of copyright calculation program used to determine the solutions of the dynamic model of bevel gear. Presents the block diagram of a computing algorithm that was used to create a program for the numerical simulation. The program source code is written in an interactive environment to perform scientific and engineering calculations, MATLAB

  3. Development of An Automatic Verification Program for Thermal-hydraulic System Codes

    Energy Technology Data Exchange (ETDEWEB)

    Lee, J. Y.; Ahn, K. T.; Ko, S. H.; Kim, Y. S.; Kim, D. W. [Pusan National University, Busan (Korea, Republic of); Suh, J. S.; Cho, Y. S.; Jeong, J. J. [System Engineering and Technology Co., Daejeon (Korea, Republic of)

    2012-05-15

    As a project activity of the capstone design competitive exhibition, supported by the Education Center for Green Industry-friendly Fusion Technology (GIFT), we have developed a computer program which can automatically perform non-regression test, which is needed repeatedly during a developmental process of a thermal-hydraulic system code, such as the SPACE code. A non-regression test (NRT) is an approach to software testing. The purpose of the non-regression testing is to verify whether, after updating a given software application (in this case, the code), previous software functions have not been compromised. The goal is to prevent software regression, whereby adding new features results in software bugs. As the NRT is performed repeatedly, a lot of time and human resources will be needed during the development period of a code. It may cause development period delay. To reduce the cost and the human resources and to prevent wasting time, non-regression tests need to be automatized. As a tool to develop an automatic verification program, we have used Visual Basic for Application (VBA). VBA is an implementation of Microsoft's event-driven programming language Visual Basic 6 and its associated integrated development environment, which are built into most Microsoft Office applications (In this case, Excel)

  4. Mixed Integer Linear Programming based machine learning approach identifies regulators of telomerase in yeast.

    Science.gov (United States)

    Poos, Alexandra M; Maicher, André; Dieckmann, Anna K; Oswald, Marcus; Eils, Roland; Kupiec, Martin; Luke, Brian; König, Rainer

    2016-06-02

    Understanding telomere length maintenance mechanisms is central in cancer biology as their dysregulation is one of the hallmarks for immortalization of cancer cells. Important for this well-balanced control is the transcriptional regulation of the telomerase genes. We integrated Mixed Integer Linear Programming models into a comparative machine learning based approach to identify regulatory interactions that best explain the discrepancy of telomerase transcript levels in yeast mutants with deleted regulators showing aberrant telomere length, when compared to mutants with normal telomere length. We uncover novel regulators of telomerase expression, several of which affect histone levels or modifications. In particular, our results point to the transcription factors Sum1, Hst1 and Srb2 as being important for the regulation of EST1 transcription, and we validated the effect of Sum1 experimentally. We compiled our machine learning method leading to a user friendly package for R which can straightforwardly be applied to similar problems integrating gene regulator binding information and expression profiles of samples of e.g. different phenotypes, diseases or treatments.

  5. Mixed Integer Linear Programming based machine learning approach identifies regulators of telomerase in yeast

    Science.gov (United States)

    Poos, Alexandra M.; Maicher, André; Dieckmann, Anna K.; Oswald, Marcus; Eils, Roland; Kupiec, Martin; Luke, Brian; König, Rainer

    2016-01-01

    Understanding telomere length maintenance mechanisms is central in cancer biology as their dysregulation is one of the hallmarks for immortalization of cancer cells. Important for this well-balanced control is the transcriptional regulation of the telomerase genes. We integrated Mixed Integer Linear Programming models into a comparative machine learning based approach to identify regulatory interactions that best explain the discrepancy of telomerase transcript levels in yeast mutants with deleted regulators showing aberrant telomere length, when compared to mutants with normal telomere length. We uncover novel regulators of telomerase expression, several of which affect histone levels or modifications. In particular, our results point to the transcription factors Sum1, Hst1 and Srb2 as being important for the regulation of EST1 transcription, and we validated the effect of Sum1 experimentally. We compiled our machine learning method leading to a user friendly package for R which can straightforwardly be applied to similar problems integrating gene regulator binding information and expression profiles of samples of e.g. different phenotypes, diseases or treatments. PMID:26908654

  6. On Pseudocodewords and Decision Regions of Linear Programming Decoding of HDPC Codes

    CERN Document Server

    Lifshitz, Asi

    2011-01-01

    In this paper we explore the decision regions of Linear Programming (LP) decoding. We compare the decision regions of an LP decoder, a Belief Propagation (BP) decoder and the optimal Maximum Likelihood (ML) decoder. We study the effect of minimal-weight pseudocodewords on LP decoding. We present global optimization as a method for finding the minimal pseudoweight of a given code as well as the number of minimal-weight generators. We present a complete pseudoweight distribution for the [24; 12; 8] extended Golay code, and provide justifications of why the pseudoweight distribution alone cannot be used for obtaining a tight upper bound on the error probability.

  7. Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language

    Directory of Open Access Journals (Sweden)

    Arnon Hershkovitz

    2015-09-01

    Full Text Available In recent years, schools (as well as universities have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features, based on common standards for software quality (PEP 8 and security (derived from CERT Secure Coding Standards. We use a multi-view, data-driven approach, by (a using hierarchical clustering to bottom-up partition the population into groups based on their code-related features and (b building a decision tree model that predicts whether a student or a teacher wrote a given code (resulting with a LOOCV kappa of 0.751. Overall, our findings suggest that the teachers’ codes have a better quality than the students’ – with a sub-group of the teachers, mostly males, demonstrate better coding than their peers and the students – and that the students’ codes are slightly better secured than the teachers’ codes (although both populations show very low security levels. The findings imply that teachers might benefit from their prior knowledge and experience, but also emphasize the lack of continuous involvement of some of the teachers with code-writing. Therefore, findings shed light on computer science teachers as lifelong learners. Findings also highlight the difference between quality and security in today’s programming paradigms. Implications for these findings are discussed.

  8. Prediction of Student Dropout in E-Learning Program Through the Use of Machine Learning Method

    Directory of Open Access Journals (Sweden)

    Mingjie Tan

    2015-02-01

    Full Text Available The high rate of dropout is a serious problem in E-learning program. Thus it has received extensive concern from the education administrators and researchers. Predicting the potential dropout students is a workable solution to prevent dropout. Based on the analysis of related literature, this study selected student’s personal characteristic and academic performance as input attributions. Prediction models were developed using Artificial Neural Network (ANN, Decision Tree (DT and Bayesian Networks (BNs. A large sample of 62375 students was utilized in the procedures of model training and testing. The results of each model were presented in confusion matrix, and analyzed by calculating the rates of accuracy, precision, recall, and F-measure. The results suggested all of the three machine learning methods were effective in student dropout prediction, and DT presented a better performance. Finally, some suggestions were made for considerable future research.

  9. Molecular dynamics simulation on a network of workstations using a machine-independent parallel programming language.

    Science.gov (United States)

    Shifman, M A; Windemuth, A; Schulten, K; Miller, P L

    1992-04-01

    Molecular dynamics simulations investigate local and global motion in molecules. Several parallel computing approaches have been taken to attack the most computationally expensive phase of molecular simulations, the evaluation of long range interactions. This paper reviews these approaches and develops a straightforward but effective algorithm using the machine-independent parallel programming language, Linda. The algorithm was run both on a shared memory parallel computer and on a network of high performance Unix workstations. Performance benchmarks were performed on both systems using two proteins. This algorithm offers a portable cost-effective alternative for molecular dynamics simulations. In view of the increasing numbers of networked workstations, this approach could help make molecular dynamics simulations more easily accessible to the research community.

  10. Source Code Prioritization Using Forward Slicing for Exposing Critical Elements in a Program

    Institute of Scientific and Technical Information of China (English)

    Mitrabinda Ray; Kanhaiya lal Kumawat; Durga Prasad Mohapatra

    2011-01-01

    Even after thorough testing, a few bugs still remain in a program with moderate complexity. These residual bugs are randomly distributed throughout the code. We have noticed that bugs in some parts of a program cause frequent and severe failures compared to those in other parts. Then, it is necessary to take a decision about what to test more and what to test less within the testing budget. It is possible to prioritize the methods and classes of an object-oriented program according to their potential to cause failures. For this, we propose a program metric called influence metric to find the influence of a program element on the source code. First, we represent the source code into an intermediate graph called extended system dependence graph. Then, forward slicing is applied on a node of the graph to get the influence of that node. The influence metric for a method m in a program shows the number of statements of the program which directly or indirectly use the result produced by method m. We compute the influence metric for a class c based on the influence metric of all its methods. As influence metric is computed statically, it does not show the expected behavior of a class at run time. It is already known that faults in highly executed parts tend to more failures. Therefore, we have considered operational profile to find the average execution time of a class in a system. Then, classes are prioritized in the source code based on influence metric and average execution time. The priority of an element indicates the potential of the element to cause failures. Once all program elements have been prioritized, the testing effort can be apportioned so that the elements causing frequent failures will be tested thoroughly. We have conducted experiments for two well-known case studies -- Library Management System and Trading Automation System -- and successfully identified critical elements in the source code of each case study. We have also conducted experiments to

  11. A program for undergraduate research into the mechanisms of sensory coding and memory decay

    Energy Technology Data Exchange (ETDEWEB)

    Calin-Jageman, R J

    2010-09-28

    This is the final technical report for this DOE project, entitltled "A program for undergraduate research into the mechanisms of sensory coding and memory decay". The report summarizes progress on the three research aims: 1) to identify phyisological and genetic correlates of long-term habituation, 2) to understand mechanisms of olfactory coding, and 3) to foster a world-class undergraduate neuroscience program. Progress on the first aim has enabled comparison of learning-regulated transcripts across closely related learning paradigms and species, and results suggest that only a small core of transcripts serve truly general roles in long-term memory. Progress on the second aim has enabled testing of several mutant phenotypes for olfactory behaviors, and results show that responses are not fully consistent with the combinitoral coding hypothesis. Finally, 14 undergraduate students participated in this research, the neuroscience program attracted extramural funding, and we completed a successful summer program to enhance transitions for community-college students into 4-year colleges to persue STEM fields.

  12. Programming Methods and Application for Numerical Control Machining%数控加工编程方法及应用

    Institute of Scientific and Technical Information of China (English)

    贾利晓; 黄广霞

    2015-01-01

    Programming is the base of numerical control machining and choosing a suitable programming method is fundamental for improving working efficiency . The three programming methods were illustrated in this paper and it was indicated that manual programming is mainly suitable for machining the parts which have simple profiles because of their less calculation and their shorter program; automatic programming is mainly suitable for machining the parts which have complicated profiles and have fussy process because of its powerful digital processing function and its convenient error correction function , parametric programming which makes the manual programming more simple and more facility .%数控编程是数控加工的基础,选择合适的编程方法是提高加工效率根本方法.本文通过对三种常用编程方法的进行论述和对比,指出手工编程主要用于加工形状简单、计算量小,程序较短的零件;自动编程由于具有数字处理能力强、方便纠错和自检等优点,主要加工用于形状复杂、工艺繁琐的零件;参数化编程使手工编程得到简化,更加便于使用.

  13. Two-Level Semantics and Code Generation

    DEFF Research Database (Denmark)

    Nielson, Flemming; Nielson, Hanne Riis

    1988-01-01

    not absolutely necessary for describing the input-output semantics of programming languages, it is necessary when issues such as data flow analysis and code generation are considered. For an example stack-machine, the authors show how to generate code for the run-time computations and still perform the compile......-time computations. Using an example, it is argued that compiler-tricks such as the use of activation records suggest how to cope with certain syntactic restrictions in the metalanguage. The correctness of the code generation is proved using Kripke-like relations and using a modified machine that can be made to loop...

  14. Annual Coded Wire Tag Program; Washington Missing Production Groups, 1997 Annual Report.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, James; Fuss, Howard J.; Ashbrook, Charmane (Washington of Fish and Wildlife, Olympia, WA)

    1998-10-01

    The Bonneville Power Administration (BPA) funds the ''Annual Coded Wire Tag Program - Missing Production Groups for Columbia River Hatcheries'' project. The Washington Department of Fish and Wildlife (WDFW), Oregon Department of Fish and Wildlife (ODFW) and the United States Fish and Wildlife Service (USFWS) all operate salmon and steelhead rearing programs in the Columbia River basin. The intent of the funding is to coded-wire tag at least one production group of each species at each Columbia Basin hatchery to provide a holistic assessment of survival and catch distribution over time and to meet various measures of the Northwest Power Planning Councils (NWPPC) Fish and Wildlife Program. The WDFW project has three main objectives: (1) coded-wire tag at least one production group of each species at each Columbia Basin hatchery to enable evaluation of survival and catch distribution over time, (2) recover coded-wire tags from the snouts of fish tagged under objective 1 and estimate survival, contribution, and stray rates for each group, and (3) report the findings under objective 2 for all broods of chinook, and coho released from WDFW Columbia Basin hatcheries. Objective 1 for FY-97 was met with few modifications to the original FY-97 proposal. Under Objective 2, snouts containing coded-wire tags that were recovered during FY-97 were decoded. Under Objective 3, survival, contribution and stray rate estimates for the 1991-96 broods of chinook and 1993-96 broods of coho have not been made because recovery data for 1996-97 fisheries and escapement are preliminary. This report summarizes recovery information through 1995.

  15. Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments

    Directory of Open Access Journals (Sweden)

    Dragutin KERMEK

    2016-04-01

    Full Text Available In programming courses there are various ways in which students attempt to cheat. The most commonly used method is copying source code from other students and making minimal changes in it, like renaming variable names. Several tools like Sherlock, JPlag and Moss have been devised to detect source code plagiarism. However, for larger student assignments and projects that involve a lot of source code files these tools are not so effective. Also, issues may occur when source code is given to students in class so they can copy it. In such cases these tools do not provide satisfying results and reports. In this study, we present an improved process model for plagiarism detection when multiple student files exist and allowed source code is present. In the research in this paper we use the Sherlock detection tool, although the presented process model can be combined with any plagiarism detection engine. The proposed model is tested on assignments in three courses in two subsequent academic years.

  16. Electrical utility generating system reliability analysis code, SYSREL. Social cost studies program

    Energy Technology Data Exchange (ETDEWEB)

    Hub, K.; Conley, L.; Buehring, W.; Rowland, B.; Stephenson, M.

    1975-09-01

    The system reliability code, SYSREL, is a system planning tool that can be used to assess the reliability and economic performance of alternative expansion patterns of electric utility generation systems. Given input information such as capacity, forced-outage rate, number of weeks of annual scheduled maintenance, and economic data for individual units along with the expected load characteristics, the code produces estimates of the mean time between system failures, required reserve capacity to meet a specified system-failure-frequency criterion, expected energy generation from each unit, and system energy cost. The categories of calculations performed by the code are maintenance scheduling, reliability, capacity requirement, energy production allocation, and energy cost. The code is designed to examine alternative generating units and system expansion patterns based on the constraints and general economic conditions imposed by the investigator. The computer running time to execute a study is short and many system alternatives can be examined at a relatively low cost. The report contains a technical description of the code, list of input data requirements, program listing, sample execution, and parameter studies. (auth)

  17. Responding to the Effects of Extreme Heat: Baltimore City's Code Red Program.

    Science.gov (United States)

    Martin, Jennifer L

    2016-01-01

    Heat response plans are becoming increasingly more common as US cities prepare for heat waves and other effects of climate change. Standard elements of heat response plans exist, but plans vary depending on geographic location and distribution of vulnerable populations. Because heat events vary over time and affect populations differently based on vulnerability, it is difficult to compare heat response plans and evaluate responses to heat events. This article provides an overview of the Baltimore City heat response plan, the Code Red program, and discusses the city's response to the 2012 Ohio Valley/Mid Atlantic Derecho, a complex heat event. Challenges with and strategies for evaluating the program are reviewed and shared.

  18. NC automatic programming system for wire-cutting machine based on Visual Basic%基于Visual Basic开发的数控线切割自动编程系统

    Institute of Scientific and Technical Information of China (English)

    耿雷; 韩建勇; 任凤国

    2001-01-01

    This paper introduces a NC automatic programming system for wire-cutting machine based on Visual Basic.This system can transform DXF drawing file that is drawed and taked out under AutoCAD plant to NC code program that is used by NC wire-cutting machines.NC code programs generated in this system can be transferred to machine by disk or via RS232 communitcation interface.%介绍了在Visual Basic环境下开发的一个具有Windows支持界面的数控线切割自动编程系统。该系统可以将由AutoCAD绘制并导出的DXF图形交互文件转化成数控线切割加工所用的NC代码程序。生成的加工程序可以通过磁盘或RS232通讯接口,输送给数控线切割机床进行加工。

  19. Dynamic parameters’ identification for the feeding system of computer numerical control machine tools stimulated by G-code

    Directory of Open Access Journals (Sweden)

    Guangsheng Chen

    2015-08-01

    Full Text Available This study proposed a dynamic parameters’ identification method for the feeding system of computer numerical control machine tools based on internal sensor. A simplified control model and linear identification model of the feeding system were established, in which the input and output signals are from sensors embedded in computer numerical control machine tools, and the dynamic parameters of the feeding system, including the equivalent inertia, equivalent damping, worktable damping, and the overall stiffness of the mechanical system, were solved by the least square method. Using the high-order Taylor expansion, the nonlinear Stribeck friction model was linearized and the parameters of the Stribeck friction model were obtained by the same way. To verify the validity and effectiveness of the identification method, identification experiments, circular motion testing, and simulations were conducted. The results obtained were stable and suggested that inertia and damping identification experiments converged fast. Stiffness identification experiments showed some deviation from simulation due to the influences of geometric error and nonlinear of stiffness. However, the identification results were still of reference significance and the method is convenient, effective, and suited for industrial condition.

  20. DEVELOPMENT OF A COMPUTER PROGRAM TO SUPPORT AN EFFICIENT NON-REGRESSION TEST OF A THERMAL-HYDRAULIC SYSTEM CODE

    Directory of Open Access Journals (Sweden)

    JUN YEOB LEE

    2014-10-01

    Full Text Available During the development process of a thermal-hydraulic system code, a non-regression test (NRT must be performed repeatedly in order to prevent software regression. The NRT process, however, is time-consuming and labor-intensive. Thus, automation of this process is an ideal solution. In this study, we have developed a program to support an efficient NRT for the SPACE code and demonstrated its usability. This results in a high degree of efficiency for code development. The program was developed using the Visual Basic for Applications and designed so that it can be easily customized for the NRT of other computer codes.

  1. Annual Coded Wire Tag Program; Missing Production Groups, 1996 Annual Report.

    Energy Technology Data Exchange (ETDEWEB)

    Pastor, Stephen M.

    1997-01-01

    In 1989 the Bonneville Power Administration (BPA) began funding the evaluation of production groups of juvenile anadromous fish not being coded-wire tagged for other programs. These groups were the ''Missing Production Groups''. Production fish released by the U.S. Fish and Wildlife Service (USFWS) without representative coded-wire tags during the 1980's are indicated as blank spaces on the survival graphs in this report. The objectives of the ''Missing Production Groups'' program are: (1) to estimate the total survival of each production group, (2) to estimate the contribution of each production group to various fisheries, and (3) to prepare an annual report for all USFWS hatcheries in the Columbia River basin. Coded-wire tag recovery information will be used to evaluate the relative success of individual brood stocks. This information can also be used by salmon harvest managers to develop plans to allow the harvest of excess hatchery fish while protecting threatened, endangered, or other stocks of concern. In order to meet these objectives, a minimum of one marked group of fish is necessary for each production release. The level of marking varies according to location, species, and age at release. In general, 50,000 fish are marked with a coded-wire tag (CWT) to represent each production release group at hatcheries below John Day Dam. More than 100,000 fish per group are usually marked at hatcheries above John Day Dam. All fish release information, including marked/unmarked ratios, is reported to the Pacific States Marine Fisheries Commission (PSMFC). Fish recovered in the various fisheries or at the hatcheries are sampled to recover coded-wire tags. This recovery information is also reported to PSMFC.

  2. Processing Code and Maintenance and Safety Operation for CNC Machining Center%CNC加工中心加工守则及维护保养与安全操作

    Institute of Scientific and Technical Information of China (English)

    罗昊

    2012-01-01

    介绍了CNC加工中心加工工艺守则,CNC加工中心保养规程,以及CNC加工中心安全技术操作规程。希望对CNC加工人员有一些帮助。%This paper Introduced the CNC machining center processing code, CNC machining center maintenance procedures, as well as CNC machining center safe technical operation rules. Hoped it has some helps for to CNC processing person.

  3. QCD on the connection machine: beyond LISP

    Science.gov (United States)

    Brickner, Ralph G.; Baillie, Clive F.; Johnsson, S. Lennart

    1991-04-01

    We report on the status of code development for a simulation of quantum chromodynamics (QCD) with dynamical Wilson fermions on the Connection Machine model CM-2. Our original code, written in Lisp, gave performance in the near-GFLOPS range. We have rewritten the most time-consuming parts of the code in the low-level programming systems CMIS, including the matrix multiply and the communication. Current versions of the code run at approximately 3.6 GFLOPS for the fermion matrix inversion, and we expect the next version to reach or exceed 5 GFLOPS.

  4. Application of distance-coded reference measuring system on rotary swivel drive of the 3D laser cutting machine%距离编码测量装置在三维激光切割机上的应用

    Institute of Scientific and Technical Information of China (English)

    翟东升; 钟昇; 洪超

    2013-01-01

    The application method of distance-coded reference measuring system on rotary swivel drive of the 3D laser cutting machine has been introduced in the text. The above method and conclusion provide reference for the application of distance-coded reference measuring system on other machine tools.%本文主要介绍带距离编码参考点标记的测量装置在三维激光切割机旋转机构上的应用方法,可为距离编码测量装置的应用提供参考.

  5. Annual Stock Assessment - CWT [Coded Wire Tag program] (USFWS), Annual Report 2007.

    Energy Technology Data Exchange (ETDEWEB)

    Pastor, Stephen M. [U.S. Fish and Wildlife Service, Columbia River Fisheries Program Office

    2009-07-21

    In 1989 the Bonneville Power Administration (BPA) began funding the evaluation of production groups of juvenile anadromous fish not being coded-wire tagged for other programs. These groups were the 'Missing Production Groups'. Production fish released by the U.S. Fish and Wildlife Service (FWS) without representative coded-wire tags during the 1980s are indicated as blank spaces on the survival graphs in this report. This program is now referred to as 'Annual Stock Assessment - CWT'. The objectives of the 'Annual Stock Assessment' program are to: (1) estimate the total survival of each production group, (2) estimate the contribution of each production group to fisheries, and (3) prepare an annual report for USFWS hatcheries in the Columbia River basin. Coded-wire tag recovery information will be used to evaluate the relative success of individual brood stocks. This information can also be used by salmon harvest managers to develop plans to allow the harvest of excess hatchery fish while protecting threatened, endangered, or other stocks of concern. All fish release information, including marked/unmarked ratios, is reported to the Pacific States Marine Fisheries Commission (PSMFC). Fish recovered in the various fisheries or at the hatcheries are sampled to recover coded-wire tags. This recovery information is also reported to PSMFC. This report has been prepared annually starting with the report labeled 'Annual Report 1994'. Although the current report has the title 'Annual Report 2007', it was written in fall of 2008 using data available from RMIS that same year, and submitted as final in January 2009. The main objective of the report is to evaluate survival of groups which have been tagged under this ongoing project.

  6. Optimization of Electrical Discharge Machining Characteristics of SiCp/LM25 Al Composites Using Goal Programming

    Institute of Scientific and Technical Information of China (English)

    R.Karthikeyan; S. Raju; R.S.Naagarazan; B. C. Pai

    2001-01-01

    In the present study an effort has been made to optimize the machining conditions for electric discharge machining of LM25 Al (7 Si, 0.33 Mg, 0.3 Mn, 0.5 Fe, 0.1 Cu, 0.1 Ni,.2 Ti) reinforced with green bonded SiC particles with approximate size of 25 μm. Polynomial models were developed for the various EDM characteristics such as metal removal rate, tool wear rate and surface roughness in terms of the process parameters such as volume fraction of SiC, current and pulse time. The models were used to optimize the EDM characteristics using nonlinear goal programming.

  7. Towards Preserving Model Coverage and Structural Code Coverage

    Directory of Open Access Journals (Sweden)

    Raimund Kirner

    2009-01-01

    Full Text Available Embedded systems are often used in safety-critical environments. Thus, thorough testing of them is mandatory. To achieve a required structural code-coverage criteria it is beneficial to derive the test data at a higher program-representation level than machine code. Higher program-representation levels include, beside the source-code level, languages of domain-specific modeling environments with automatic code generation. For a testing framework with automatic generation of test data this will enable high retargetability of the framework. In this article we address the challenge of ensuring that the structural code coverage achieved at a higher program representation level is preserved during the code generations and code transformations down to machine code. We define the formal properties that have to be fullfilled by a code transformation to guarantee preservation of structural code coverage. Based on these properties we discuss how to preserve code coverage achieved at source-code level. Additionally, we discuss how structural code coverage at model level could be preserved. The results presented in this article are aimed toward the integration of support for preserving structural code coverage into compilers and code generators.

  8. Potential use of bar codes to implement automated dispensing quality assurance programs.

    Science.gov (United States)

    Hokanson, J A; Keith, M R; Guernsey, B G; Grudzien, R R; Doutré, W H; Luttman, D J; Trachtenberg, M C

    1985-05-01

    Bar code-based systems have automated many counting, tracking, and sorting functions in health care delivery services. We designed and briefly tested the feasibility of a bar code-based dispensing quality assurance system for a hospital outpatient pharmacy. The use of bar codes to verify the identity of the dispensed product required an extra few seconds processing time for each prescription but did not increase markedly the processing time when compared to a control period. In addition to verifying product identity, the system checked the manufacture's expiration date to reduce the risk of delivering outdated medications to the patient. The on-site test period for this feasibility model was relatively short (one week) and no actual dispensing errors were detected. However, when the system was presented with 100 different prescription forms containing 50 randomly sequenced, precontrived dispensing errors, the system identified all medication errors and outdated products. As shown in other studies, bar code-based systems have the potential to capture information not effectively recorded using manual methods. We suggest they should be considered by pharmacists interested in automating inventory management and work flow functions or establishing automated dispensing quality assurance programs.

  9. 2005 Mississippi Curriculum Framework: Secondary Machine Tool Operation. (Program CIP: 48.0503 - Machine Shop Technology/Assistant)

    Science.gov (United States)

    Gorman, Nathan; Parker, Ronald; Lurie, Charles; Maples, Thomas

    2005-01-01

    Secondary vocational-technical education programs in Mississippi are faced with many challenges resulting from sweeping educational reforms at the national and state levels. Schools and teachers are increasingly being held accountable for providing true learning activities to every student in the classroom. This accountability is measured through…

  10. On Pseudocodewords and Improved Union Bound of Linear Programming Decoding of HDPC Codes

    CERN Document Server

    Gidon, Ohad

    2012-01-01

    In this paper, we present an improved union bound on the Linear Programming (LP) decoding performance of the binary linear codes transmitted over an additive white Gaussian noise channels. The bounding technique is based on the second-order of Bonferroni-type inequality in probability theory, and it is minimized by Prim's minimum spanning tree algorithm. The bound calculation needs the fundamental cone generators of a given parity-check matrix rather than only their weight spectrum, but involves relatively low computational complexity. It is targeted to high-density parity-check codes, where the number of their generators is extremely large and these generators are spread densely in the Euclidean space. We explore the generator density and make a comparison between different parity-check matrix representations. That density effects on the improvement of the proposed bound over the conventional LP union bound. The paper also presents a complete pseudo-weight distribution of the fundamental cone generators for ...

  11. Development of a model of machine hand eye coordination and program specifications for a topological machine vision system

    Science.gov (United States)

    1972-01-01

    A unified approach to computer vision and manipulation is developed which is called choreographic vision. In the model, objects to be viewed by a projected robot in the Viking missions to Mars are seen as objects to be manipulated within choreographic contexts controlled by a multimoded remote, supervisory control system on Earth. A new theory of context relations is introduced as a basis for choreographic programming languages. A topological vision model is developed for recognizing objects by shape and contour. This model is integrated with a projected vision system consisting of a multiaperture image dissector TV camera and a ranging laser system. System program specifications integrate eye-hand coordination and topological vision functions and an aerospace multiprocessor implementation is described.

  12. Development of Client-Server Application by Using UDP Socket Programming for Remotely Monitoring CNC Machine Environment in Fixture Process

    Directory of Open Access Journals (Sweden)

    Darmawan Darmawan

    2016-08-01

    Full Text Available The use of computer technology in manufacturing industries can improve manufacturing flexibility significantly, especially in manufacturing processes; many software applications have been utilized to improve machining performance. However, none of them has discussed the abilities to perform direct machining. In this paper, an integrated system for remote operation and monitoring of Computer Numerical Control (CNC machines is put into consideration. The integrated system includes computerization, network technology, and improved holding mechanism. The work proposed by this research is mainly on the software development for such integrated system. It uses Java three-dimensional (3D programming and Virtual Reality Modeling Language (VRML at the client side for visualization of machining environment. This research is aimed at developing a control system to remotely operate and monitor a self-reconfiguration fixture mechanism of a CNC milling machine through internet connection and integration of Personal Computer (PC-based CNC controller, a server side, a client side and CNC milling. The performance of the developed system was evaluated by testing with one type of common protocols particularly User Datagram Protocol (UDP.  Using UDP, the developed system requires 3.9 seconds to complete the close clamping, less than 1 second to release the clamping and it can deliver 463 KiloByte.

  13. Apparatus, Method, and Computer Program for a Resolution-Enhanced Pseudo-Noise Code Technique

    Science.gov (United States)

    Li, Steven X. (Inventor)

    2015-01-01

    An apparatus, method, and computer program for a resolution enhanced pseudo-noise coding technique for 3D imaging is provided. In one embodiment, a pattern generator may generate a plurality of unique patterns for a return to zero signal. A plurality of laser diodes may be configured such that each laser diode transmits the return to zero signal to an object. Each of the return to zero signal includes one unique pattern from the plurality of unique patterns to distinguish each of the transmitted return to zero signals from one another.

  14. Discussion of programming of CNC machine tool%数控机床程序编制探讨

    Institute of Scientific and Technical Information of China (English)

    徐晓东

    2013-01-01

      手工编程是指由人工来完成数控机床程序编制各个阶段的工作,这种方法比较简单,易掌握,适应性大,因而目前仍被广泛的应用与各类数控机床的编程。自动编程又称为计算机辅助编程,自动编程使得一些计算繁琐、手工编程困难或无法编出的程序能够顺利地完成。%Manual programming completes any stage of programming of CNC machine tool by manual, this method is relatively simple and easy to master and greatly adaptable and therefore is still widely used for programming of CNC ma-chine tool . Automatic programming also known as computer-aided programming that successfully completes some cocka-mamie calculations and the program that is difficult or unable to complete by manual programming.

  15. Euler Technology Assessment program for preliminary aircraft design employing SPLITFLOW code with Cartesian unstructured grid method

    Science.gov (United States)

    Finley, Dennis B.

    1995-01-01

    This report documents results from the Euler Technology Assessment program. The objective was to evaluate the efficacy of Euler computational fluid dynamics (CFD) codes for use in preliminary aircraft design. Both the accuracy of the predictions and the rapidity of calculations were to be assessed. This portion of the study was conducted by Lockheed Fort Worth Company, using a recently developed in-house Cartesian-grid code called SPLITFLOW. The Cartesian grid technique offers several advantages for this study, including ease of volume grid generation and reduced number of cells compared to other grid schemes. SPLITFLOW also includes grid adaptation of the volume grid during the solution convergence to resolve high-gradient flow regions. This proved beneficial in resolving the large vortical structures in the flow for several configurations examined in the present study. The SPLITFLOW code predictions of the configuration forces and moments are shown to be adequate for preliminary design analysis, including predictions of sideslip effects and the effects of geometry variations at low and high angles of attack. The time required to generate the results from initial surface definition is on the order of several hours, including grid generation, which is compatible with the needs of the design environment.

  16. Alpal, a Program to Generate Physics Simulation Codes from Natural Descriptions

    Science.gov (United States)

    Cook, G. O.

    A Livermore Physics Applications Language (ALPAL), a new computer language, is described. ALPAL is a tool that generates a Fortran code module from a natural description of a physics model. This capability gives the computational physicist a significant productivity boost. While ALPAL is a working computer program, significant additions are being made to it. Some of the factors that make ALPAL an important tool are: first, it eliminates many sources of errors; second, it permits building program modules with far greater speed than is otherwise possible; third, it provides a means of specifying many numerical algorithms; and fourth, it is a language that is close to a journal-style presentation of physics models and numerical methods for solving them. In sum, ALPAL is designed to magnify the abilities and creativity of computational physicists.

  17. How effectively do you function in a cardiac arrest? A creative program approach to code skills.

    Science.gov (United States)

    Rivera, T M; Gabriel, S

    1995-01-01

    Novice and experienced nurses are consistently concerned about their knowledge, skills and abilities to function appropriately in arrest situations. The clinical teachers at Mount Sinai Hospital in Toronto have established an innovative, creative, practical and cost-effective workshop that addresses nurses' code skills. The 500 evaluations received from nurses who have attended the workshops show the program is a resounding success. The 4-hour workshop concentrates on the nurses' role during cardiac arrests in four key areas: leadership, drug administration, suctioning, and airway management. The program is complete with goals and objectives, props, specific evaluation forms, and a take-home examination. The hands-on component of the workshop allows the application of new information under close observation and supervision of knowledgeable and skilled clinical teachers.

  18. The NATA code: Theory and analysis, volume 1. [user manuals (computer programming) - gas dynamics, wind tunnels

    Science.gov (United States)

    Bade, W. L.; Yos, J. M.

    1975-01-01

    A computer program for calculating quasi-one-dimensional gas flow in axisymmetric and two-dimensional nozzles and rectangular channels is presented. Flow is assumed to start from a state of thermochemical equilibrium at a high temperature in an upstream reservoir. The program provides solutions based on frozen chemistry, chemical equilibrium, and nonequilibrium flow with finite reaction rates. Electronic nonequilibrium effects can be included using a two-temperature model. An approximate laminar boundary layer calculation is given for the shear and heat flux on the nozzle wall. Boundary layer displacement effects on the inviscid flow are considered also. Chemical equilibrium and transport property calculations are provided by subroutines. The code contains precoded thermochemical, chemical kinetic, and transport cross section data for high-temperature air, CO2-N2-Ar mixtures, helium, and argon. It provides calculations of the stagnation conditions on axisymmetric or two-dimensional models, and of the conditions on the flat surface of a blunt wedge. The primary purpose of the code is to describe the flow conditions and test conditions in electric arc heated wind tunnels.

  19. Annual Coded Wire Tag Program; Washington Missing Production Groups, 1994 Annual Report.

    Energy Technology Data Exchange (ETDEWEB)

    Fuss, Howard J.; Ashbrook, Charmane; Doty, Daniel (Washington Department of Fish and Wildlife, Olympia, WA)

    1994-12-01

    The Bonneville Power Administration (BPA) funds the ``Annual Coded Wire Tag Program -- Missing Production Groups for Columbia River Hatcheries`` project. The Washington Department of Fish and Wildlife (WDFW) [formerly the Washington Department of Fisheries (WDF) and the Washington Department of Wildlife (WDW)], Oregon Department of Fish and Wildlife (ODFW) and the United States Fish and Wildlife Service (USFWS) all operate salmon and steelhead rearing programs in the Columbia River basin. The intent of the funding is to coded-wire tag at least one production group of each species at each Columbia Basin hatchery to provide a holistic assessment of survival and catch distribution over time. Data generated by this project contributes to WDFW`s obligations for representative tagging under the Endangered. Species Act (ESA) permit for operating Columbia Basin facilities. WDFW facilities operating outside the Snake River basin are required to have a Section 10, ``Incidental Take`` permit. Consistent with special conditions within this permit, WDFW has now reached it`s objective to tag representative groups from all WDFW Columbia Basin releases.

  20. Optimization technique of wavefront coding system based on ZEMAX externally compiled programs

    Science.gov (United States)

    Han, Libo; Dong, Liquan; Liu, Ming; Zhao, Yuejin; Liu, Xiaohua

    2016-10-01

    Wavefront coding technique as a means of athermalization applied to infrared imaging system, the design of phase plate is the key to system performance. This paper apply the externally compiled programs of ZEMAX to the optimization of phase mask in the normal optical design process, namely defining the evaluation function of wavefront coding system based on the consistency of modulation transfer function (MTF) and improving the speed of optimization by means of the introduction of the mathematical software. User write an external program which computes the evaluation function on account of the powerful computing feature of the mathematical software in order to find the optimal parameters of phase mask, and accelerate convergence through generic algorithm (GA), then use dynamic data exchange (DDE) interface between ZEMAX and mathematical software to realize high-speed data exchanging. The optimization of the rotational symmetric phase mask and the cubic phase mask have been completed by this method, the depth of focus increases nearly 3 times by inserting the rotational symmetric phase mask, while the other system with cubic phase mask can be increased to 10 times, the consistency of MTF decrease obviously, the maximum operating temperature of optimized system range between -40°-60°. Results show that this optimization method can be more convenient to define some unconventional optimization goals and fleetly to optimize optical system with special properties due to its externally compiled function and DDE, there will be greater significance for the optimization of unconventional optical system.

  1. Machining of Multi axis NC Machine tool based on PowerMILL Automatic Programming%基于PowerMILL自动编程的多轴数控机床加工

    Institute of Scientific and Technical Information of China (English)

    刘敏

    2016-01-01

    It introduces the automatic programming technology and the application of multi axis CNC machining automatic programming technology. Taking the impeller model as an example, It uses PowerMILL for automatic programming, and the parts for CNC machining. Finally, the automatic programming technology can improve the efficiency of multi axis machining.%本文介绍了自动编程技术的产生,阐述了多轴数控机床加工时自动编程技术的应用。以叶轮模型为例,利用PowerMILL进行自动编程,并对零件进行数控加工。最终得出自动编程技术可以提高多轴加工的效率。

  2. Aspects regarding the aided programming of the electroerosion machine ROBOFIL 310

    Directory of Open Access Journals (Sweden)

    Ioan Mocian

    2011-12-01

    Full Text Available This paper presents the solutions to some practical issues regarding the design of technologies with the wire electroerosion numerical command machine ROBOFIL 310, produced by the Swiss manufacturer Charmilles. As part of the study an AutoCAD application was designed using Visual Basic and the .NET platform, aimed at helping the designer identify the minimum radius of a contour before sending it to the machine

  3. Findings From the National Machine Guarding Program: Safety Climate, Hazard Assessment, and Safety Leadership in Small Metal Fabrication Businesses.

    Science.gov (United States)

    Parker, David L; Yamin, Samuel; Xi, Min; Gordon, Robert; Most, Ivan; Stanley, Rod

    2017-09-19

    This manuscript assesses safety climate data from the National Machine Guarding Program (NMGP)-a nationwide intervention to improve machine safety. Baseline safety climate surveys were completed by 2161 employees and 341 owners or managers at 115 businesses. A separate onsite audit of safety management practices and machine guarding equipment was conducted at each business. Safety climate measures were not correlated with machine guarding or safety management practices. The presence of a safety committee was correlated with higher scores on the safety management audit when contrasted with those without one. The presence of a safety committee is easily assessed and provides a basis on which to make recommendations with regard to how it functions. Measures of safety climate fail to provide actionable information. Future research on small manufacturing firms should emphasize the presence of an employee-management safety committee.This is an open access article distributed under the terms of the Creative Commons Attribution-Non Commercial-No Derivatives License 4.0 (CCBY-NC-ND), where it is permissible to download and share the work provided it is properly cited. The work cannot be changed in any way or used commercially without permission from the journal. http://creativecommons.org/licenses/by-nc-nd/4.0.

  4. Tourist Affiliate Program while Using Online Booking System with Possibility of Entering B2B Code

    Directory of Open Access Journals (Sweden)

    Slivar Iva

    2008-01-01

    Full Text Available Affiliate marketing programs are one of the most powerful tools for online marketing since the merchant presenting a product or a service decides on the commissioning model and the commission is granted only if the desired results have been reached. Affiliate marketing is based offline as much as tourism itself and it relies on the commission that tourist companies pay to their partners (affiliates who bring new guests. This paper will present the basics of how online affiliate programs work, benefits they bring and steps for their further implementation. It will explain in detail how to establish an affiliate program for dynamic web pages which use online booking system platforms that offer a possibility of entering a B2B code. Special attention will be paid to SEO (Search Engine Optimisation. It will also present results of a research on Croatian hotels web pages and the implementation of the online booking system and affiliate programs. Having in mind the insufficient deployment of online potentials, the aim of the paper is to stress the need for setting up an effective method of monitoring changes and updates in the online world as well as implementing new promotional possibilities, all aimed at increasing sales. The goal of the paper is to explore advantages and disadvantages of the affiliate program as a new sales channel and promote the possibility to implement it in one of the biggest Croatian hotel companies, Maistra d.d. Rovinj. Along with methods of data acquiring and different techniques of creative thinking, the following scientific research methods were also used: statistic, historic, descriptive, comparison, interview, analysis and synthesis, induction and deduction.

  5. The Milling Assistant, Case-Based Reasoning, and machining strategy: A report on the development of automated numerical control programming systems at New Mexico State University

    Energy Technology Data Exchange (ETDEWEB)

    Burd, W. [Sandia National Labs., Albuquerque, NM (United States); Culler, D.; Eskridge, T.; Cox, L.; Slater, T. [New Mexico State Univ., Las Cruces, NM (United States)

    1993-08-01

    The Milling Assistant (MA) programming system demonstrates the automated development of tool paths for Numerical Control (NC) machine tools. By integrating a Case-Based Reasoning decision processor with a commercial CAD/CAM software, intelligent tool path files for milled and point-to-point features can be created. The operational system is capable of reducing the time required to program a variety of parts and improving product quality by collecting and utilizing ``best of practice`` machining strategies.

  6. A Global View Programming Abstraction for Transitioning MPI Codes to PGAS Languages

    Energy Technology Data Exchange (ETDEWEB)

    Mintz, Tiffany M [ORNL; Hernandez, Oscar R [ORNL; Bernholdt, David E [ORNL

    2014-01-01

    The multicore generation of scientific high performance computing has provided a platform for the realization of Exascale computing, and has also underscored the need for new paradigms in coding parallel applications. The current standard for writing parallel applications requires programmers to use languages designed for sequential execution. These languages have abstractions that only allow programmers to operate on the process centric local view of data. To provide suitable languages for parallel execution, many research efforts have designed languages based on the Partitioned Global Address Space (PGAS) programming model. Chapel is one of the more recent languages to be developed using this model. Chapel supports multithreaded execution with high-level abstractions for parallelism. With Chapel in mind, we have developed a set of directives that serve as intermediate expressions for transitioning scientific applications from languages designed for sequential execution to PGAS languages like Chapel that are being developed with parallelism in mind.

  7. A Hypervelocity Experimental Research Database (HERD): Support for the Wright Laboratory Armament Directorate Code Validation Program (COVAL)

    Science.gov (United States)

    Mullin, Scott A.; Anderson, Charles E., Jr.; Hertel, Eugene S., Jr.; Hunt, Ronald D.

    The Hypervelocity Experimental Research Database (HERD) described in this paper was developed to aid researchers with code validation for impacts that occur at velocities faster than the testable regime. Codes of concern include both hydrocodes and fast-running analytical or semi-empirical models used to predict the impact phenomenology and damage that results to projectiles and targets. There are several well documented experimental programs that can serve as benchmarks for code validation; these are identified and described. Recommendations for further experimentation (a canonical problem) to provide validation data are also discussed.

  8. Mathematical programming approach to multidimensional mechanism design for single machine scheduling

    NARCIS (Netherlands)

    Duives, Jelle; Uetz, Marc

    2011-01-01

    We consider an optimal mechanism design problem for single machine scheduling that has been proposed by Heydenreich et al. in 2008. There, an example was presented to show that the 2-dimensional mechanism design problem does not satisfy a condition called IIA - independence of irrelevant alternative

  9. NC-code post-processor for 4-axis machining center based on NX of FANUC system%基于NX的FANUC系统四轴加工中心后置处理器构建

    Institute of Scientific and Technical Information of China (English)

    谭大庆

    2013-01-01

      A customized NC-code post-processor,based on the universal template of NX post-processor, is designed to meet the standards of 4-axis machining center equipped with FANUC CNC system.%  使用NX后置处理构建器通用模板的基础上,设计符合FANUC数控系统四轴加工中心要求的专用后置处理器。

  10. Whole Language versus Code-Based Skills and Interactional Patterns in Singapore's Early Literacy Program

    Science.gov (United States)

    Vaish, Viniti

    2014-01-01

    This paper analyzes whole language and code-based skills approaches in early literacy and the specific patterns of interaction present in both approaches. Nineteen hours of video data were coded to analyze the nature of whole language versus code-based skills instruction and document the allocation of time spent on each approach in a reading…

  11. Capture and coding of industry and occupation measures: Findings from eight National Program of Cancer Registries states.

    Science.gov (United States)

    Freeman, MaryBeth B; Pollack, Lori A; Rees, Judy R; Johnson, Christopher J; Rycroft, Randi K; Rousseau, David L; Hsieh, Mei-Chin

    2017-08-01

    Although data on industry and occupation (I&O) are important for understanding cancer risks, obtaining standardized data is challenging. This study describes the capture of specific I&O text and the ability of a web-based tool to translate text into standardized codes. Data on 62 525 cancers cases received from eight National Program of Cancer Registries (NPCR) states were submitted to a web-based coding tool developed by the National Institute for Occupational Safety and Health for translation into standardized I&O codes. We determined the percentage of sufficiently analyzable codes generated by the tool. Using the web-based coding tool on data obtained from chart abstraction, the NPCR cancer registries achieved between 48% and 75% autocoding, but only 12-57% sufficiently analyzable codes. The ability to explore associations between work-related exposures and cancer is limited by current capture and coding of I&O data. Increased training of providers and registrars, as well as software enhancements, will improve the utility of I&O data. © 2017 Wiley Periodicals, Inc.

  12. 76 FR 13101 - Building Energy Codes Program: Presenting and Receiving Comments to DOE Proposed Changes to the...

    Science.gov (United States)

    2011-03-10

    ... Part 430 Building Energy Codes Program: Presenting and Receiving Comments to DOE Proposed Changes to... CONTACT: Mr. Robert Dewey, U.S. Department of Energy, Energy Efficiency and Renewable Energy, Building... sustainability with safety and performance. The IgCC is intended to provide a green model building...

  13. EVALUASI PROGRAM PENATAAN DAN REHABILITASI PERMUKIMAN KUMUH STUDI KASUS KAWASAN BANTARAN SUNGAI CODE BAGIAN UTARA, YOGYAKARTA (The Evaluation of Slum Area Rehabilitation and Improvement Programs Case Study in Nothern Banks Area of Rivers Code Yogyakarta

    Directory of Open Access Journals (Sweden)

    Tri Rahayu

    2003-07-01

    Full Text Available ABSTRAK Meskipun Pemerintah telah rnelaksanakan penanganan daerah kumuh untuk waktu yang cukup lama, infrastruktur yang dibangun telah diabaikan den ditinggalkan. Hal ini terkait dengan kebijakan pemerintah pada waktu yang lalu dinrana banyak program yang dilaksanakan tanpa melibatkan masyarakat. Belajar dari kegagalan ini, pemerintah mengubah pola pengembangan menuju aktivitas pemberdayaan masyarakat yang disebut Konsep TRIDAYA. Konsep ini memiliki 3 komponen pemberdayaan: (1 pemberdayaan komunitas sosial, (2 pemanfaatan lingkungan fisik, dan (3 peningkatan usaha kecil. Penelitian ini bertujuan untuk mengevaluasi pencapaian pengembangan infrastruktur di daerah Sungai Code bagian utara dalam program penataan dan rehabilitasi permukiman kumuh. Penelitian ini menggunakan metode deskriptif-eksploratif, dengan melakukan interview tidak terstruktur dengan masyarakat yang terlibat dalam program. Hasilnya di analisis dengan metode deskriptif kualitatif. Program tersebut merniliki 3 komponen: (1 penyediaan air, (2 jalan setapak, (3 limbah padat. Dari setiap komponen program dapat dikembangkan 3 tema yaitu masalah sebelum adanya program, benefit dan dampak dari program, serta tanggapan terhadap program. Tema-tema ini dikelompokkan ke dalam beberapa konsep. Terdapat 2 katagori: 2 program berisikan penyediaan air, jalan setapak dapat dicapai, tetapi program limbah padat tidak dapat dikembangkan lagi.   ABSTRACT Even though the government has been taking care of slum area improvement for a long time, the infrastructures that have been built have been neglected and abandoned. It is related with the government policy in the past that conceived many programs without involving the community learning from this failure, the government turned the development pattern into community empowering activities called Tridaya concept. It has three empowering components: (1 empowering social community, (2 taking advantage of physical environment, and (3 improving small

  14. Joint source channel coding using arithmetic codes

    CERN Document Server

    Bi, Dongsheng

    2009-01-01

    Based on the encoding process, arithmetic codes can be viewed as tree codes and current proposals for decoding arithmetic codes with forbidden symbols belong to sequential decoding algorithms and their variants. In this monograph, we propose a new way of looking at arithmetic codes with forbidden symbols. If a limit is imposed on the maximum value of a key parameter in the encoder, this modified arithmetic encoder can also be modeled as a finite state machine and the code generated can be treated as a variable-length trellis code. The number of states used can be reduced and techniques used fo

  15. Programming Turing Machines as a game for technology sense-making

    DEFF Research Database (Denmark)

    Valente, Andrea; Marchetti, Emanuela

    2011-01-01

    To gain a better understanding of the process through which technology users become technology creators, we designed a paper-based, tangible Turing Machine and introduced it to 54 teenage students. The information collected through tinkering tasks and a questionnaire is discussed both via...... statistics and qualitative analysis. This initial study suggests that simple paper tangibles and tinkering have a place in future, technology-enhanced learning, and that central technological concepts can be discussed on the basis of low-cost tabletop-like games. We also notice a general interest...

  16. Communication Studies of DMP and SMP Machines

    Science.gov (United States)

    Sohn, Andrew; Biswas, Rupak; Chancellor, Marisa K. (Technical Monitor)

    1997-01-01

    Understanding the interplay between machines and problems is key to obtaining high performance on parallel machines. This paper investigates the interplay between programming paradigms and communication capabilities of parallel machines. In particular, we explicate the communication capabilities of the IBM SP-2 distributed-memory multiprocessor and the SGI PowerCHALLENGEarray symmetric multiprocessor. Two benchmark problems of bitonic sorting and Fast Fourier Transform are selected for experiments. Communication-efficient algorithms are developed to exploit the overlapping capabilities of the machines. Programs are written in Message-Passing Interface for portability and identical codes are used for both machines. Various data sizes and message sizes are used to test the machines' communication capabilities. Experimental results indicate that the communication performance of the multiprocessors are consistent with the size of messages. The SP-2 is sensitive to message size but yields a much higher communication overlapping because of the communication co-processor. The PowerCHALLENGEarray is not highly sensitive to message size and yields a low communication overlapping. Bitonic sorting yields lower performance compared to FFT due to a smaller computation-to-communication ratio.

  17. 76 FR 40798 - Antidrug and Alcohol Misuse Prevention Programs for Personnel Engaged in Specified Aviation...

    Science.gov (United States)

    2011-07-12

    ... code Work functions program? 1 313311 Fireproofing of Y fabrics. 14 313320 Metallizing S (including... Chemical milling S (reduction of weight). Machining....... S Machining and N welding of ground support... Machining and N welding of ground support parts for planes. Manufacturing & N precision grinding and...

  18. An analytical benchmark and a Mathematica program for MD codes: Testing LAMMPS on the 2nd generation Brenner potential

    Science.gov (United States)

    Favata, Antonino; Micheletti, Andrea; Ryu, Seunghwa; Pugno, Nicola M.

    2016-10-01

    An analytical benchmark and a simple consistent Mathematica program are proposed for graphene and carbon nanotubes, that may serve to test any molecular dynamics code implemented with REBO potentials. By exploiting the benchmark, we checked results produced by LAMMPS (Large-scale Atomic/Molecular Massively Parallel Simulator) when adopting the second generation Brenner potential, we made evident that this code in its current implementation produces results which are offset from those of the benchmark by a significant amount, and provide evidence of the reason. Catalogue identifier: AFAS_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AFAS_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: GNU GPL v3 No. of lines in distributed program, including test data, etc.: 22854 No. of bytes in distributed program, including test data, etc.: 369171 Distribution format: tar.gz Programming language: Mathematica 9. Computer: Any PC. Operating system: Any which supports Mathematica; tested under OS Yosemite. RAM: material properties (Young's modulus and Poisson coefficient) are also computed. Running time: Instantaneous, or a few seconds, depending on computer hardware

  19. Development of a Wrapper Object for MARS TH Systems Code and Its Applications in Object Oriented Programs

    Energy Technology Data Exchange (ETDEWEB)

    Park, Sun Byung; Lee, Young Jin; Kim, Hyong Chol; Han, Sam Hee; Kim, Hyun Jik [Convergence Technology Research Commercialization Center, Daejeon (Korea, Republic of)

    2013-05-15

    TMARS is written for the object pascal program language, and 'wraps' the Dynamic Link Library (DLL) manifestation of the MARS-KS code written in Fortran 90. TMARS behaves as a true object and it can be instantiated, inherited, and its methods overloaded. The functionality of TMARS was verified and demonstrated using two programs built under object oriented program environment. One is a text based program for reviewing the data interface of TMARS, and the other is a graphic intensive prototype NPA program for testing the overall performance of TMARS. The prototype NPA was also used to assess the real-time capability of TMARS. The demonstration programs show that application of TMARS is straight forward and that its functions facilitate easy application developments. TMARS, a wrapper object class encapsulating the calculation functions of MARS-KS code, was successfully developed and verification of its functionality was carried out using custom made programs. The verification results show that TMARS is capable of providing reliable TH calculation results and sufficient performance to realize real time calculations.

  20. The Evolution of a Coding Schema in a Paced Program of Research

    Science.gov (United States)

    Winters, Charlene A.; Cudney, Shirley; Sullivan, Therese

    2010-01-01

    A major task involved in the management, analysis, and integration of qualitative data is the development of a coding schema to facilitate the analytic process. Described in this paper is the evolution of a coding schema that was used in the analysis of qualitative data generated from online forums of middle-aged women with chronic conditions who…

  1. Machine Tool Software

    Science.gov (United States)

    1988-01-01

    A NASA-developed software package has played a part in technical education of students who major in Mechanical Engineering Technology at William Rainey Harper College. Professor Hack has been using (APT) Automatically Programmed Tool Software since 1969 in his CAD/CAM Computer Aided Design and Manufacturing curriculum. Professor Hack teaches the use of APT programming languages for control of metal cutting machines. Machine tool instructions are geometry definitions written in APT Language to constitute a "part program." The part program is processed by the machine tool. CAD/CAM students go from writing a program to cutting steel in the course of a semester.

  2. Autocoding State Machine in Erlang

    DEFF Research Database (Denmark)

    Guo, Yu; Hoffman, Torben; Gunder, Nicholas

    2008-01-01

    This paper presents an autocoding tool suit, which supports development of state machine in a model-driven fashion, where models are central to all phases of the development process. The tool suit, which is built on the Eclipse platform, provides facilities for the graphical specification...... of a state machine model. Once the state machine is specified, it is used as input to a code generation engine that generates source code in Erlang....

  3. Towards Compatible and Interderivable Semantic Specifications for the Scheme Programming Language, Part II: Reduction Semantics and Abstract Machines

    DEFF Research Database (Denmark)

    Biernacka, Malgorzata; Danvy, Olivier

    2009-01-01

    -class continuations.  Starting from this reduction semantics, (1) we refocus it into a small-step abstract machine; (2) we fuse the transition function of this abstract machine with its driver loop, obtaining a big-step abstract machine which is staged; (3) we compress its corridor transitions, obtaining an eval....../continue abstract machine; and (4) we unfold its ground closures, which yields an abstract machine that essentially coincides with Clinger's machine.  This lambda-calculus with explicit substitutions therefore aptly accounts for Core Scheme, including Clinger's permutations and unpermutations....

  4. Quantum machine learning.

    Science.gov (United States)

    Biamonte, Jacob; Wittek, Peter; Pancotti, Nicola; Rebentrost, Patrick; Wiebe, Nathan; Lloyd, Seth

    2017-09-13

    Fuelled by increasing computer power and algorithmic advances, machine learning techniques have become powerful tools for finding patterns in data. Quantum systems produce atypical patterns that classical systems are thought not to produce efficiently, so it is reasonable to postulate that quantum computers may outperform classical computers on machine learning tasks. The field of quantum machine learning explores how to devise and implement quantum software that could enable machine learning that is faster than that of classical computers. Recent work has produced quantum algorithms that could act as the building blocks of machine learning programs, but the hardware and software challenges are still considerable.

  5. Lessons learned from new construction utility demand side management programs and their implications for implementing building energy codes

    Energy Technology Data Exchange (ETDEWEB)

    Wise, B.K.; Hughes, K.R.; Danko, S.L.; Gilbride, T.L.

    1994-07-01

    This report was prepared for the US Department of Energy (DOE) Office of Codes and Standards by the Pacific Northwest Laboratory (PNL) through its Building Energy Standards Program (BESP). The purpose of this task was to identify demand-side management (DSM) strategies for new construction that utilities have adopted or developed to promote energy-efficient design and construction. PNL conducted a survey of utilities and used the information gathered to extrapolate lessons learned and to identify evolving trends in utility new-construction DSM programs. The ultimate goal of the task is to identify opportunities where states might work collaboratively with utilities to promote the adoption, implementation, and enforcement of energy-efficient building energy codes.

  6. Annual Coded Wire Tag Program; Washington Missing Production Groups, 1993 Annual Report.

    Energy Technology Data Exchange (ETDEWEB)

    Fuss, Howard J.; Hammer, Stanley A.; Kimbel, Mark A. (Washington Department of Fisheries, Olympia, WA)

    1994-03-01

    The intent of this project is to coded-wire tag at least one production group of each species at each Columbia Basin hatchery to provide a holistic assessment of survival and catch distribution over time.

  7. Comparative Design Studies for the BESSY FEL Program using the MEDUSA and GENESIS Simulation Codes

    CERN Document Server

    Freund, H

    2005-01-01

    The BESSY FEL is based on a seeded cascade of High Gain Harmonic Generation (HGHG) sections followed by an amplifier to produce coherent and stable short wavelength output. Here, we report on comparative design studies carried out using the MEDUSA [1], and GENESIS [2] simulation codes. These two codes have each been used to successfully predict a variety of FEL designs and have agreed well with a number of important experiments. In addition, they were included in a comparative study of FEL simulation [3] that reported substantial agreement between the codes for the specific configurations studied. However, these codes are based on different assumptions. GENESIS treats the particle dynamics using a wiggler-averaged orbit approximation, the transverse electromagnetic field is treated using a field solver, and harmonics are not included. MEDUSA does not use the wiggler-averaged orbit approximation to treat particle dynamics, the transverse fields are treated using a Gaussian modal superposition, and harmonics ar...

  8. Annual Coded Wire Tag Program; Washington Missing Production Groups, 1996 Annual Report.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, James; Fuss, Howard J.; Ashbrook, Charmane (Washington Department of Fish and Wildlife, Olympia, WA)

    1997-10-01

    The intent of the funding is to coded-wire tag at least one production group of each species at each Columbia Basin hatchery to provide a holistic assessment of survival and catch distribution over time.

  9. Binary Code Disassembly for Reverse Engineering

    Directory of Open Access Journals (Sweden)

    Marius Popa

    2013-01-01

    Full Text Available The disassembly of binary file is used to restore the software application code in a readable and understandable format for humans. Further, the assembly code file can be used in reverse engineering processes to establish the logical flows of the computer program or its vulnerabilities in real-world running environment. The paper highlights the features of the binary executable files under the x86 architecture and portable format, presents issues of disassembly process of a machine code file and intermediate code, disassembly algorithms which can be applied to a correct and complete reconstruction of the source file written in assembly language, and techniques and tools used in binary code disassembly.

  10. Technology Roadmap Instrumentation, Control, and Human-Machine Interface to Support DOE Advanced Nuclear Energy Programs

    Energy Technology Data Exchange (ETDEWEB)

    Donald D Dudenhoeffer; Burce P Hallbert

    2007-03-01

    Instrumentation, Controls, and Human-Machine Interface (ICHMI) technologies are essential to ensuring delivery and effective operation of optimized advanced Generation IV (Gen IV) nuclear energy systems. In 1996, the Watts Bar I nuclear power plant in Tennessee was the last U.S. nuclear power plant to go on line. It was, in fact, built based on pre-1990 technology. Since this last U.S. nuclear power plant was designed, there have been major advances in the field of ICHMI systems. Computer technology employed in other industries has advanced dramatically, and computing systems are now replaced every few years as they become functionally obsolete. Functional obsolescence occurs when newer, more functional technology replaces or supersedes an existing technology, even though an existing technology may well be in working order.Although ICHMI architectures are comprised of much of the same technology, they have not been updated nearly as often in the nuclear power industry. For example, some newer Personal Digital Assistants (PDAs) or handheld computers may, in fact, have more functionality than the 1996 computer control system at the Watts Bar I plant. This illustrates the need to transition and upgrade current nuclear power plant ICHMI technologies.

  11. Using a visual programming language to bridge the cognitive gap between a novice's mental model and program code

    Science.gov (United States)

    Smith, Bryan J.

    Current research suggests that many students do not know how to program very well at the conclusion of their introductory programming course. We believe that a reason novices have such difficulties learning programming is because engineering novices often learn through a lecture format where someone with programming knowledge lectures to novices, the novices attempt to absorb the content, and then reproduce it during exams. By primarily appealing to programming novices who prefer to understand visually, we research whether programming novices understand programming better if computer science concepts are presented using a visual programming language than if these programs are presented using a text-based programming language. This method builds upon previous research that suggests that most engineering students are visual learners, and we propose that using a flow-based visual programming language will address some of the most important and difficult topics to novices of programming. We use an existing flow-model tool, RAPTOR, to test this method, and share the program understanding results using this theory.

  12. Evaluation of an Instruction Program on Diabetes Diet by Means of a Teaching Machine

    Science.gov (United States)

    Teuscher, A.; Heidecker, Barbara

    1976-01-01

    A study of 119 diabetic patients, student nurses, social workers, dieticians, and medical students indicates that programmed self-teaching with feedback by multiple-choice questions is an efficient method of instruction of basic facts of nutrition for diabetes. It enables the physician to spend more time on the patient's personal problems.…

  13. Relating Static and Dynamic Measurements for the Java Virtual Machine Instruction Set

    OpenAIRE

    Dowling, Tom; Power, James; Waldron, John

    2002-01-01

    It has previously been noted that, for conventional machine code, there is a strong relationship between static and dynamic code measurements. One of the goals of this paper is to examine whether this same relationship is true of Java programs at the bytecode level. To this end, the hypothesis of a linear correlation between static and dynamic frequencies was investigated using Pearson’s correlation coefficient. Programs from the Java Grande and SPEC benchmarks suites were used in...

  14. Expanding Options. A Model to Attract Secondary Students into Nontraditional Vocational Programs. For Emphasis in: Building Trades, Electronics, Health Services, Machine Shop, Welding.

    Science.gov (United States)

    Good, James D.; DeVore, Mary Ann

    This model has been designed for use by Missouri secondary schools in attracting females and males into nontraditional occupational programs. The research-based strategies are intended for implementation in the following areas: attracting females into building trades, electronics, machine shop, and welding; and males into secondary health…

  15. When Machines Design Machines!

    DEFF Research Database (Denmark)

    2011-01-01

    Until recently we were the sole designers, alone in the driving seat making all the decisions. But, we have created a world of complexity way beyond human ability to understand, control, and govern. Machines now do more trades than humans on stock markets, they control our power, water, gas...... and food supplies, manage our elevators, microclimates, automobiles and transport systems, and manufacture almost everything. It should come as no surprise that machines are now designing machines. The chips that power our computers and mobile phones, the robots and commercial processing plants on which we...... depend, all are now largely designed by machines. So what of us - will be totally usurped, or are we looking at a new symbiosis with human and artificial intelligences combined to realise the best outcomes possible. In most respects we have no choice! Human abilities alone cannot solve any of the major...

  16. Towards Compatible and Interderivable Semantic Specifications for the Scheme Programming Language, Part II: Reduction Semantics and Abstract Machines

    Science.gov (United States)

    Biernacka, Małgorzata; Danvy, Olivier

    We present a context-sensitive reduction semantics for a lambda-calculus with explicit substitutions and we show that the functional implementation of this small-step semantics mechanically corresponds to that of the abstract machine for Core Scheme presented by Clinger at PLDI’98, including first-class continuations. Starting from this reduction semantics, (1) we refocus it into a small-step abstract machine; (2) we fuse the transition function of this abstract machine with its driver loop, obtaining a big-step abstract machine which is staged; (3) we compress its corridor transitions, obtaining an eval/continue abstract machine; and (4) we unfold its ground closures, which yields an abstract machine that essentially coincides with Clinger’s machine. This lambda-calculus with explicit substitutions therefore aptly accounts for Core Scheme, including Clinger’s permutations and unpermutations.

  17. Automatic generation of NC program for cylinder-type parts based on machining features%基于加工特征的缸体类零件数控程序自动生成

    Institute of Scientific and Technical Information of China (English)

    杨鹏宇; 曹忠亮; 张楠; 张旭堂

    2011-01-01

    根据企业的产品特点和现有的制造资源,提出了一种新的缸体类的加工特征模型.通过该模型的使用,在设计数控工艺时就能根据加工特征的种类,以模块化的方式进行数控程序的生成,很好地解决了传统工艺和数控工序的集成问题.同时以加工特征为单元,采用参数化技术实现数控程序的派生式生成,在三维环境下进行动态仿真,提高了数控程序设计效率和质量,从而实现了数控程序的模块化设计,提高了数控工艺设计的柔性和自适应能力.该方法在企业的工艺自动化系统中得到了验征.%According to the characteristic of products and the manufacturing resources in some enterprise, a new type of cylinder block machining feature model is proposed. Through the use of the model in the design process, the CNC program is generated by modular approach according to CNC machining features. CNC machining feature classification base process design method is a good solution to the integration issues of the traditional processes and CNC processes. With the machining feature as unit, parametric programming technique is applied to the NC code generation as well as in three-dimensional environment for dynamic simulation, which improves the efficiency of the CNC program design and quality, realizes the modular design of the CNC program and improves the NC process design flexibility and adaptive capacity. The proposed scheme is practically demonstrated by the enterprise system.

  18. SISP : Simplified Interface for Stochastic Programming Establishing a hard link between mathematical programming modeling languages and SMPS codes

    CERN Document Server

    Condevaux Lanloy, Christian; King, A J

    2002-01-01

    The aim of this article is to propose a general approach to link a stochastic programming enabler to a mathematical programming modeling language. Modelers often choose to formulate their problems in well- tested, general purpose modeling languages such as GAMS and AMPL, but these modeling languages do not currently implement a natural syntax for stochastic programming. Specialized stochastic programming tools are available to efficiently generate and solve large-scale stochastic programs, but they lack many of the convenient features of the modeling languages. The lack of a well developed link between these tools and modeling languages prevents many modelers from accessing a powerful and convenient technique to take into account uncertainties. As an attempt to fill this gap, we will present SISP (Simplified Interface for Stochastic Programming), an interface between Algebraic Modeling Languages and specialized Stochastic Programming solvers, also known as SP solvers. 12 Refs.

  19. Effects of a short-term resistance program using elastic bands versus weight machines for sedentary middle-aged women.

    Science.gov (United States)

    Colado, Juan C; Triplett, N Travis

    2008-09-01

    This study was designed to determine whether different effects on functional capacity and body composition were produced by using different devices (elastic bands (EBs) versus weight machines (WMs)) with the same resistance training program. Forty-five healthy sedentary middle-aged women volunteers were chosen and randomly assigned to 1 of 3 groups: 21 subjects trained using EBs (EBG), 14 in trained using WMs (WMG), and 10 were controls (CG). Both exercise groups trained with a periodized muscular endurance program twice a week for 10 weeks, with a total of 6 exercises per session for the major muscle groups. Exercise intensity was equalized by jointly monitoring the same targeted number of repetitions (TNRs) and rate of perceived exertion in active muscles (RPE-AM). Functional capacity was assessed by using knee push-up (KPU) and 60-second squat (S) tests. Body composition was measured using an 8-polar bioelectrical impedance analyzer. The results for both the EBG and WMG show a decrease in fat mass (p = 0.05 and p benefits that are comparable to those obtained from WMs in the early phase of strength training of sedentary middle-aged women.

  20. Prediction of Student Dropout in E-Learning Program Through the Use of Machine Learning Method

    OpenAIRE

    Mingjie Tan; Peiji Shao

    2015-01-01

    The high rate of dropout is a serious problem in E-learning program. Thus it has received extensive concern from the education administrators and researchers. Predicting the potential dropout students is a workable solution to prevent dropout. Based on the analysis of related literature, this study selected student’s personal characteristic and academic performance as input attributions. Prediction models were developed using Artificial Neural Network (ANN), Decision Tree (DT) and Bayesian Ne...

  1. Design and Testing of a Generalized Reduced Gradient Code for Nonlinear Programming

    Science.gov (United States)

    1976-02-01

    Penalty Methods.. 34 6.2 Solution of Himmelblau Test Problems ...... 36 K6.3 Comparison with Two Other-NLP Codes ...... 4.1 S6.4i Comparison of Linear vs...effects of m’altiprogramming. ’-g 6.2 Solution of Himmelblau Test Problems I-’ The first twenty-four problems specified in Appendix A of reference [4... Himmelblau (221 implementing an "exact" exterior penalty method, or "Method of Multipliers"--as well as by an earlier version of the code described here

  2. Keyboard with Universal Communication Protocol Applied to CNC Machine

    Directory of Open Access Journals (Sweden)

    Mejía-Ugalde Mario

    2014-04-01

    Full Text Available This article describes the use of a universal communication protocol for industrial keyboard based microcontroller applied to computer numerically controlled (CNC machine. The main difference among the keyboard manufacturers is that each manufacturer has its own programming of source code, producing a different communication protocol, generating an improper interpretation of the function established. The above results in commercial industrial keyboards which are expensive and incompatible in their connection with different machines. In the present work the protocol allows to connect the designed universal keyboard and the standard keyboard of the PC at the same time, it is compatible with all the computers through the communications USB, AT or PS/2, to use in CNC machines, with extension to other machines such as robots, blowing, injection molding machines and others. The advantages of this design include its easy reprogramming, decreased costs, manipulation of various machine functions and easy expansion of entry and exit signals. The results obtained of performance tests were satisfactory, because each key has the programmed and reprogrammed facility in different ways, generating codes for different functions, depending on the application where it is required to be used.

  3. Analyzing Array Manipulating Programs by Program Transformation

    Science.gov (United States)

    Cornish, J. Robert M.; Gange, Graeme; Navas, Jorge A.; Schachte, Peter; Sondergaard, Harald; Stuckey, Peter J.

    2014-01-01

    We explore a transformational approach to the problem of verifying simple array-manipulating programs. Traditionally, verification of such programs requires intricate analysis machinery to reason with universally quantified statements about symbolic array segments, such as "every data item stored in the segment A[i] to A[j] is equal to the corresponding item stored in the segment B[i] to B[j]." We define a simple abstract machine which allows for set-valued variables and we show how to translate programs with array operations to array-free code for this machine. For the purpose of program analysis, the translated program remains faithful to the semantics of array manipulation. Based on our implementation in LLVM, we evaluate the approach with respect to its ability to extract useful invariants and the cost in terms of code size.

  4. Using a Serious Game Approach to Teach Secure Coding in Introductory Programming: Development and Initial Findings

    Science.gov (United States)

    Adamo-Villani, Nicoletta; Oania, Marcus; Cooper, Stephen

    2013-01-01

    We report the development and initial evaluation of a serious game that, in conjunction with appropriately designed matching laboratory exercises, can be used to teach secure coding and Information Assurance (IA) concepts across a range of introductory computing courses. The IA Game is a role-playing serious game (RPG) in which the student travels…

  5. Using a Serious Game Approach to Teach Secure Coding in Introductory Programming: Development and Initial Findings

    Science.gov (United States)

    Adamo-Villani, Nicoletta; Oania, Marcus; Cooper, Stephen

    2013-01-01

    We report the development and initial evaluation of a serious game that, in conjunction with appropriately designed matching laboratory exercises, can be used to teach secure coding and Information Assurance (IA) concepts across a range of introductory computing courses. The IA Game is a role-playing serious game (RPG) in which the student travels…

  6. Embedded Systems Interfacing for Engineers using the Freescale HCS08 Microcontroller I Machine Language Programming

    CERN Document Server

    Summerville, Douglas

    2009-01-01

    The vast majority of computers in use today are encapsulated within other systems. In contrast to general-purpose computers that run an endless selection of software, these embedded computers are often programmed for a very specific, low-level and often mundane purpose. Low-end microcontrollers, costing as little as one dollar, are often employed by engineers in designs that utilize only a small fraction of the processing capability of the device because it is either more cost-effective than selecting an application-specific part or because programmability offers custom functionality not other

  7. 数控加工程序文件数据缓冲设计%The design of data buffering of CNC machining program file

    Institute of Scientific and Technical Information of China (English)

    梁桂明

    2014-01-01

    分析界面显示及译码对加工程序文件数据缓冲的需求,设计共用数据缓冲的方案,提高软件运行效率,并解决大文件浏览及加工的问题。%To analyze the demand on CNC machining program file of interface displaying and decoding, and then design the scheme of sharing data buffering. Accordingly it improves the software running efficiency and solves the problem of browsing and machining large file.

  8. Hydride heat pump. Volume I. Users manual for HYCSOS system design program. [HYCSOS code

    Energy Technology Data Exchange (ETDEWEB)

    Gorman, R.; Moritz, P.

    1978-05-01

    A method for the design and costing of a metal hydride heat pump for residential use and a computer program, HYCSOS, which automates that method are described. The system analyzed is one in which a metal hydride heat pump can provide space heating and space cooling powered by energy from solar collectors and electric power generated from solar energy. The principles and basic design of the system are presented, and the computer program is described giving detailed design and performance equations used in the program. The operation of the program is explained, and a sample run is presented. This computer program is part of an effort to design, cost, and evaluate a hydride heat pump for residential use. The computer program is written in standard Fortran IV and was run on a CDC Cyber 74 and Cyber 174 computer. A listing of the program is included as an appendix. This report is Volume 1 of a two-volume document.

  9. Correcting sequencing errors in DNA coding regions using a dynamic programming approach.

    Science.gov (United States)

    Xu, Y; Mural, R J; Uberbacher, E C

    1995-04-01

    This paper presents an algorithm for detecting and 'correcting' sequencing errors that occur in DNA coding regions. The types of sequencing errors addressed are insertions and deletions (indels) of DNA bases. The goal is to provide a capability which makes single-pass or low-redundancy sequence data more informative, reducing the need for high-redundancy sequencing for gene identification and characterization purposes. This would permit improved sequencing efficiency and reduce genome sequencing costs. The algorithm detects sequencing errors by discovering changes in the statistically preferred reading frame within a putative coding region and then inserts a number of 'neutral' bases at a perceived reading frame transition point to make the putative exon candidate frame consistent. We have implemented the algorithm as a front-end subsystem of the GRAIL DNA sequence analysis system to construct a version which is very error tolerant and also intend to use this as a testbed for further development of sequencing error-correction technology. Preliminary test results have shown the usefulness of this algorithm and also exhibited some of its weakness, providing possible directions for further improvement. On a test set consisting of 68 human DNA sequences with 1% randomly generated indels in coding regions, the algorithm detected and corrected 76% of the indels. The average distance between the position of an indel and the predicted one was 9.4 bases. With this subsystem in place, GRAIL correctly predicted 89% of the coding messages with 10% false message on the 'corrected' sequences, compared to 69% correctly predicted coding messages and 11% falsely predicted messages on the 'corrupted' sequences using standard GRAIL II method (version 1.2).(ABSTRACT TRUNCATED AT 250 WORDS)

  10. ALGORITHMS FOR THE PROGRAMMING OF FOOTWEAR SOLES MOULDS ON WORKING POSTS OF INJECTION MACHINES

    Directory of Open Access Journals (Sweden)

    LUCA Cornelia

    2014-05-01

    Full Text Available The moulds stock necessary for realization in rhythmically conditions, a certain volume of footwear soles depends on some criterions such as: the range of soles for footwear volume daily realized, the sizes structure of those soles for footwear and, respectively, the sizes tally, the technological cycle for an used mould depending on the equipment efficiency, the provide necessity of spare moulds, the using and fixing conditions etc. From the efficiency point of view, the equipments may have two working posts, or more working posts (always, an even number, as 6, 12, 24, 40 posts. Footwear soles manufacturing takes into account the percentage distribution of the size numbers of the size series. When o portative assembly is used for the manufacturing of the footwear soles using the injection with “n” working posts, it is very important an optimum distribution of the working posts. The disadvantages of these equipments are the situations of the no equilibrium programming of the moulds, so that, in one time, some working posts spread out of the work. The paper presents some practical and theoretical solutions for moulds stock programming in portative assembly for footwear soles injection, so that an optimum equilibrium degree of the working posts will obtain

  11. Towards Compatible and Interderivable Semantic Specifications for the Scheme Programming Language, Part II: Reduction Semantics and Abstract Machines

    DEFF Research Database (Denmark)

    Biernacka, Malgorzata; Danvy, Olivier

    2008-01-01

    We present a context-sensitive reduction semantics for a lambda-calculus with explicit substitutions and store and we show that the functional implementation of this small-step semantics mechanically corresponds to that of an abstract machine. This abstract machine is very close to the abstract...... machine for Core Scheme presented by Clinger at PLDI'98. This lambda-calculus with explicit substitutions and store therefore aptly accounts for Core Scheme....

  12. Implementing RapidArc into clinical routine: A comprehensive program from machine QA to TPS validation and patient QA

    Energy Technology Data Exchange (ETDEWEB)

    Van Esch, Ann; Huyskens, Dominique P.; Behrens, Claus F.; Samsoee, Eva; Sjoelin, Maria; Bjelkengren, Ulf; Sjoestroem, David; Clermont, Christian; Hambach, Lionel; Sergent, Francois [7Sigma, QA-team in Radiotherapy Physics, 3150 Tildonk, Belgium and Department of Radiotherapy, Clinique Ste. Elisabeth, 5000 Namur (Belgium); Department of Oncology, Division of Radiophysics, Copenhagen University Hospital, 2730 Herlev (Denmark); Department of Radiotherapy, Clinique Ste. Elisabeth, 5000 Namur (Belgium)

    2011-09-15

    Purpose: With the increased commercial availability of intensity modulated arc therapy (IMAT) comes the need for comprehensive QA programs, covering the different aspects of this newly available technology. This manuscript proposes such a program for the RapidArc (RA) (Varian Medical Systems, Palo Alto) IMAT solution. Methods: The program was developed and tested out for a Millennium120 MLC on iX Clinacs and a HighDefinition MLC on a Novalis TX, using a variety of measurement equipment including Gafchromic film, 2D ion chamber arrays (Seven29 and StarCheck, PTW, Freiburg, Germany) with inclinometer and Octavius phantom, the Delta4 systam (ScandiDos, Uppsala, Sweden) and the portal imager (EPID). First, a number of complementary machine QA tests were developed to monitor the correct interplay between the accelerating/decelerating gantry, the variable dose rate and the MLC position, straining the delivery to the maximum allowed limits. Second, a systematic approach to the validation of the dose calculation for RA was adopted, starting with static gantry and RA specific static MLC shapes and gradually moving to dynamic gantry, dynamic MLC shapes. RA plans were then optimized on a series of artificial structures created within the homogeneous Octavius phantom and within a heterogeneous lung phantom. These served the double purpose of testing the behavior of the optimization algorithm (PRO) as well as the precision of the forward dose calculation. Finally, patient QA on a series of clinical cases was performed with different methods. In addition to the well established in-phantom QA, we evaluated the portal dosimetry solution within the Varian approach. Results: For routine machine QA, the ''Snooker Cue'' test on the EPID proved to be the most sensitive to overall problem detection. It is also the most practical one. The ''Twinkle'' and ''Sunrise'' tests were useful to obtain well differentiated information on

  13. Implementing RapidArc into clinical routine: a comprehensive program from machine QA to TPS validation and patient QA.

    Science.gov (United States)

    Van Esch, Ann; Huyskens, Dominique P; Behrens, Claus F; Samsoe, Eva; Sjolin, Maria; Bjelkengren, Ulf; Sjostrom, David; Clermont, Christian; Hambach, Lionel; Sergent, Francois

    2011-09-01

    With the increased commercial availability of intensity modulated arc therapy (IMAT) comes the need for comprehensive QA programs, covering the different aspects of this newly available technology. This manuscript proposes such a program for the RapidArc (RA) (Varian Medical Systems, Palo Alto) IMAT solution. The program was developed and tested out for a Millennium120 MLC on iX Clinacs and a HighDefinition MLC on a Novalis TX, using a variety of measurement equipment including Gafchromic film, 2D ion chamber arrays (Seven29 and StarCheck, PTW, Freiburg, Germany) with inclinometer and Octavius phantom, the Delta4 systam (ScandiDos, Uppsala, Sweden) and the portal imager (EPID). First, a number of complementary machine QA tests were developed to monitor the correct interplay between the accelerating/decelerating gantry, the variable dose rate and the MLC position, straining the delivery to the maximum allowed limits. Second, a systematic approach to the validation of the dose calculation for RA was adopted, starting with static gantry and RA specific static MLC shapes and gradually moving to dynamic gantry, dynamic MLC shapes. RA plans were then optimized on a series of artificial structures created within the homogeneous Octavius phantom and within a heterogeneous lung phantom. These served the double purpose of testing the behavior of the optimization algorithm (PRO) as well as the precision of the forward dose calculation. Finally, patient QA on a series of clinical cases was performed with different methods. In addition to the well established in-phantom QA, we evaluated the portal dosimetry solution within the Varian approach. For routine machine QA, the "Snooker Cue" test on the EPID proved to be the most sensitive to overall problem detection. It is also the most practical one. The "Twinkle" and "Sunrise" tests were useful to obtain well differentiated information on the individual treatment delivery components. The AAA8.9 dose calculations showed excellent

  14. Towards Compatible and Interderivable Semantic Specifications for the Scheme Programming Language, Part I: Denotational Semantics, Natural Semantics, and Abstract Machines

    DEFF Research Database (Denmark)

    Danvy, Olivier

    2009-01-01

    We derive two big-step abstract machines, a natural semantics, and the valuation function of a denotational semantics based on the small-step abstract machine for Core Scheme presented by Clinger at PLDI'98. Starting from a functional implementation of this small-step abstract machine, (1) we fuse...... refunctionalize this adjusted abstract machine, obtaining the functional implementation of a natural semantics in continuation-passing style; and (4) we closure-unconvert this natural semantics, obtaining a compositional continuation-passing evaluation function which we identify as the functional implementation...

  15. Towards Compatible and Interderivable Semantic Specifications for the Scheme Programming Language, Part I: Denotational Semantics, Natural Semantics, and Abstract Machines

    DEFF Research Database (Denmark)

    Danvy, Olivier

    2008-01-01

    We derive two big-step abstract machines, a natural semantics, and the valuation function of a denotational semantics based on the small-step abstract machine for Core Scheme presented by Clinger at PLDI'98. Starting from a functional implementation of this small-step abstract machine, (1) we fuse...... refunctionalize this adjusted abstract machine, obtaining the functional implementation of a natural semantics in continuation style; and (4) we closure-unconvert this natural semantics, obtaining a compositional continuation-passing evaluation function which we identify as the functional implementation...

  16. Machine learning with R

    CERN Document Server

    Lantz, Brett

    2015-01-01

    Perhaps you already know a bit about machine learning but have never used R, or perhaps you know a little R but are new to machine learning. In either case, this book will get you up and running quickly. It would be helpful to have a bit of familiarity with basic programming concepts, but no prior experience is required.

  17. Overview of the U.S. DOE Hydrogen Safety, Codes and Standards Program. Part 4: Hydrogen Sensors; Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Buttner, William J.; Rivkin, Carl; Burgess, Robert; Brosha, Eric; Mukundan, Rangachary; James, C. Will; Keller, Jay

    2016-12-01

    Hydrogen sensors are recognized as a critical element in the safety design for any hydrogen system. In this role, sensors can perform several important functions including indication of unintended hydrogen releases, activation of mitigation strategies to preclude the development of dangerous situations, activation of alarm systems and communication to first responders, and to initiate system shutdown. The functionality of hydrogen sensors in this capacity is decoupled from the system being monitored, thereby providing an independent safety component that is not affected by the system itself. The importance of hydrogen sensors has been recognized by DOE and by the Fuel Cell Technologies Office's Safety and Codes Standards (SCS) program in particular, which has for several years supported hydrogen safety sensor research and development. The SCS hydrogen sensor programs are currently led by the National Renewable Energy Laboratory, Los Alamos National Laboratory, and Lawrence Livermore National Laboratory. The current SCS sensor program encompasses the full range of issues related to safety sensors, including development of advance sensor platforms with exemplary performance, development of sensor-related code and standards, outreach to stakeholders on the role sensors play in facilitating deployment, technology evaluation, and support on the proper selection and use of sensors.

  18. Commercial applications of solar total energy systems. Volume 4. Appendices. Final report. [Solar Total Energy System Evaluation Program (STESEP) code

    Energy Technology Data Exchange (ETDEWEB)

    Boobar, M.G.; McFarland, B.L.; Nalbandian, S.J.; Willcox, W.W.; French, E.P.; Smith, K.E.

    1978-07-01

    A methodology has been developed by Atomics International under contract to the Department of Energy to define the applicability of solar total energy systems (STES) to the commercial sector (e.g., retail stores, shopping centers, offices, etc.) in the United States. Candidate STES concepts were selected to provide on-site power generation capability, as well as thermal energy for both heating and cooling applications. Each concept was evaluated on the basis of its cost effectiveness (i.e., as compared to other concepts) and its ability to ultimately penetrate and capture a significant segment of this market, thereby resulting in a saving of fossil fuel resources. This volume contains the appendices. Topics include deterministic insolation model computer code; building energy usage data; computer simulation programs for building energy demand analysis; model buildings for STES evaluation; Solar Total Energy System Evaluation Program (STESEP) computer code; transient simulation of STES concept; solar data tape analysis; program listings and sample output for use with TRNSYS; transient simulation, and financial parameters sensitivities. (WHK)

  19. Program EAGLE User’s Manual. Volume 2. Surface Generation Code

    Science.gov (United States)

    1988-09-01

    252 APPENDIX H NEWTO~N ITERATION FOR INTERSECTION .. .................. 2514 HFFERENCS . ........................ ..... 257 xi/ xii (Blank) NTrRODUCTION...34COMBTNE" will store a tabla of contents of the combined file if CONTENT="YES". This table consists of the COREOUT num- ber and the surface(CURVE...surfaces are developed as follows: (The code notation follows closely that used here.) 1. Sphere xII r(e,q) - constant 2. Ellipsoid x Y E The equation for

  20. Passive Nosetip Technology (PANT) Program. Volume XVIII. Nosetip Analyses Using the EROS Computer Code

    Science.gov (United States)

    1975-06-01

    transfer Distribution Comarisons 3-7 3-6 Ran 207 Camphor Shape Change Prediction (Reg - 10 x 101/ft) 3-9 3-7 Run 208 Camphor Shape Change Prediction...environment. The film coefficient approach enables the modeling of heterogeneous reaction and sublimation kinetics, unequal species diffusion coefficients...ilar predictions. As an exercise of the shape change numerical procedures in the EROS com- puter code, two camphor shape change solutions were generated

  1. Application programming interface document for the modernized Transient Reactor Analysis Code (TRAC-M)

    Energy Technology Data Exchange (ETDEWEB)

    Mahaffy, J. [Pennsylvania State Univ., University Park, PA (United States); Boyack, B.E.; Steinke, R.G. [Los Alamos National Lab., NM (United States)

    1998-05-01

    The objective of this document is to ease the task of adding new system components to the Transient Reactor Analysis Code (TRAC) or altering old ones. Sufficient information is provided to permit replacement or modification of physical models and correlations. Within TRAC, information is passed at two levels. At the upper level, information is passed by system-wide and component-specific data modules at and above the level of component subroutines. At the lower level, information is passed through a combination of module-based data structures and argument lists. This document describes the basic mechanics involved in the flow of information within the code. The discussion of interfaces in the body of this document has been kept to a general level to highlight key considerations. The appendices cover instructions for obtaining a detailed list of variables used to communicate in each subprogram, definitions and locations of key variables, and proposed improvements to intercomponent interfaces that are not available in the first level of code modernization.

  2. Acceleration of the Geostatistical Software Library (GSLIB) by code optimization and hybrid parallel programming

    Science.gov (United States)

    Peredo, Oscar; Ortiz, Julián M.; Herrero, José R.

    2015-12-01

    The Geostatistical Software Library (GSLIB) has been used in the geostatistical community for more than thirty years. It was designed as a bundle of sequential Fortran codes, and today it is still in use by many practitioners and researchers. Despite its widespread use, few attempts have been reported in order to bring this package to the multi-core era. Using all CPU resources, GSLIB algorithms can handle large datasets and grids, where tasks are compute- and memory-intensive applications. In this work, a methodology is presented to accelerate GSLIB applications using code optimization and hybrid parallel processing, specifically for compute-intensive applications. Minimal code modifications are added decreasing as much as possible the elapsed time of execution of the studied routines. If multi-core processing is available, the user can activate OpenMP directives to speed up the execution using all resources of the CPU. If multi-node processing is available, the execution is enhanced using MPI messages between the compute nodes.Four case studies are presented: experimental variogram calculation, kriging estimation, sequential gaussian and indicator simulation. For each application, three scenarios (small, large and extra large) are tested using a desktop environment with 4 CPU-cores and a multi-node server with 128 CPU-nodes. Elapsed times, speedup and efficiency results are shown.

  3. Using Program Theory-Driven Evaluation Science to Crack the Da Vinci Code

    Science.gov (United States)

    Donaldson, Stewart I.

    2005-01-01

    Program theory-driven evaluation science uses substantive knowledge, as opposed to method proclivities, to guide program evaluations. It aspires to update, clarify, simplify, and make more accessible the evolving theory of evaluation practice commonly referred to as theory-driven or theory-based evaluation. The evaluator in this chapter provides a…

  4. TIDY, a complete code for renumbering and editing FORTRAN source programs. User's manual for IBM 360/67

    Science.gov (United States)

    Barlow, A. V.; Vanderplaats, G. N.

    1973-01-01

    TIDY, a computer code which edits and renumerates FORTRAN decks which have become difficult to read because of many patches and revisions, is described. The old program is reorganized so that statement numbers are added sequentially, and extraneous FORTRAN statements are deleted. General instructions for using TIDY on the IBM 360/67 Tymeshare System, and specific instructions for use on the NASA/AMES IBM 360/67 TSS system are included as well as specific instructions on how to run TIDY in conversational and in batch modes. TIDY may be adopted for use on other computers.

  5. Integer-Linear-Programing Optimization in Scalable Video Multicast with Adaptive Modulation and Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dongyul Lee

    2014-01-01

    Full Text Available The advancement in wideband wireless network supports real time services such as IPTV and live video streaming. However, because of the sharing nature of the wireless medium, efficient resource allocation has been studied to achieve a high level of acceptability and proliferation of wireless multimedia. Scalable video coding (SVC with adaptive modulation and coding (AMC provides an excellent solution for wireless video streaming. By assigning different modulation and coding schemes (MCSs to video layers, SVC can provide good video quality to users in good channel conditions and also basic video quality to users in bad channel conditions. For optimal resource allocation, a key issue in applying SVC in the wireless multicast service is how to assign MCSs and the time resources to each SVC layer in the heterogeneous channel condition. We formulate this problem with integer linear programming (ILP and provide numerical results to show the performance under 802.16 m environment. The result shows that our methodology enhances the overall system throughput compared to an existing algorithm.

  6. Integer-linear-programing optimization in scalable video multicast with adaptive modulation and coding in wireless networks.

    Science.gov (United States)

    Lee, Dongyul; Lee, Chaewoo

    2014-01-01

    The advancement in wideband wireless network supports real time services such as IPTV and live video streaming. However, because of the sharing nature of the wireless medium, efficient resource allocation has been studied to achieve a high level of acceptability and proliferation of wireless multimedia. Scalable video coding (SVC) with adaptive modulation and coding (AMC) provides an excellent solution for wireless video streaming. By assigning different modulation and coding schemes (MCSs) to video layers, SVC can provide good video quality to users in good channel conditions and also basic video quality to users in bad channel conditions. For optimal resource allocation, a key issue in applying SVC in the wireless multicast service is how to assign MCSs and the time resources to each SVC layer in the heterogeneous channel condition. We formulate this problem with integer linear programming (ILP) and provide numerical results to show the performance under 802.16 m environment. The result shows that our methodology enhances the overall system throughput compared to an existing algorithm.

  7. Integer-Linear-Programing Optimization in Scalable Video Multicast with Adaptive Modulation and Coding in Wireless Networks

    Science.gov (United States)

    Lee, Chaewoo

    2014-01-01

    The advancement in wideband wireless network supports real time services such as IPTV and live video streaming. However, because of the sharing nature of the wireless medium, efficient resource allocation has been studied to achieve a high level of acceptability and proliferation of wireless multimedia. Scalable video coding (SVC) with adaptive modulation and coding (AMC) provides an excellent solution for wireless video streaming. By assigning different modulation and coding schemes (MCSs) to video layers, SVC can provide good video quality to users in good channel conditions and also basic video quality to users in bad channel conditions. For optimal resource allocation, a key issue in applying SVC in the wireless multicast service is how to assign MCSs and the time resources to each SVC layer in the heterogeneous channel condition. We formulate this problem with integer linear programming (ILP) and provide numerical results to show the performance under 802.16 m environment. The result shows that our methodology enhances the overall system throughput compared to an existing algorithm. PMID:25276862

  8. Development of Web-based Virtual Training Environment for Machining

    Science.gov (United States)

    Yang, Zhixin; Wong, S. F.

    2010-05-01

    With the booming in the manufacturing sector of shoe, garments and toy, etc. in pearl region, training the usage of various facilities and design the facility layout become crucial for the success of industry companies. There is evidence that the use of virtual training may provide benefits in improving the effect of learning and reducing risk in the physical work environment. This paper proposed an advanced web-based training environment that could demonstrate the usage of a CNC machine in terms of working condition and parameters selection. The developed virtual environment could provide training at junior level and advanced level. Junior level training is to explain machining knowledge including safety factors, machine parameters (ex. material, speed, feed rate). Advanced level training enables interactive programming of NG coding and effect simulation. Operation sequence was used to assist the user to choose the appropriate machining condition. Several case studies were also carried out with animation of milling and turning operations.

  9. Of Mice Moths and Men Machines

    Directory of Open Access Journals (Sweden)

    Susan Schuppli

    2008-10-01

    Full Text Available In 1947, Grace Murray Hopper a pioneer in early computing made an unusual entry into her daily logbook: lsquo;Relay #70 Panel F (moth in relay. First actual case of bug being found.rsquo; Accompanying this entry is an actual celluloid tape encrusted bug, or more specifically a moth, fastened to the page of the logbook. According to Hopper, one of the technicians in her team solved a glitch in the emHarvard Mark II/em computer by pulling an actual insect out from between the contacts of one of its relays. Word soon went out that they had lsquo;debugged the machinersquo; and the phrase quickly entered our lexicon. After languishing for years this mythic moth was eventually transported to the emSmithsonian/em where it now lies in archival state. The mothrsquo;s dynamic vitality had introduced a kind of surplus or aberrant code into the machine, which in effect pushed the machine towards a state of chaos and breakdown. Its failure to act as desired, to perform the coding sequences of its programmed history suggests that even a seemingly inert or lifeless machine can become lsquo;more and other than its historyrsquo;. (Elizabeth Grosz, 2005 Hopperrsquo;s bug is thus a material witness to the creative co-evolution of the machine with the living matter of the moth. Moreover, as a cipher for machinic defect the bug reminds us that mutations are in fact necessary for systems to change and evolve. The crisis introduced into a biological system or machine through the virulence of the bug is terminal only to the extent that it becomes the source for another kind of order, another kind of interaction. This is used as a casenbsp;study to argue that chaos is not only an animating force in the constitution of new systems but is necessary for the evolution of difference.

  10. Code Generation in the Columbia Esterel Compiler

    Directory of Open Access Journals (Sweden)

    Jia Zeng

    2007-02-01

    Full Text Available The synchronous language Esterel provides deterministic concurrency by adopting a semantics in which threads march in step with a global clock and communicate in a very disciplined way. Its expressive power comes at a cost, however: it is a difficult language to compile into machine code for standard von Neumann processors. The open-source Columbia Esterel Compiler is a research vehicle for experimenting with new code generation techniques for the language. Providing a front-end and a fairly generic concurrent intermediate representation, a variety of back-ends have been developed. We present three of the most mature ones, which are based on program dependence graphs, dynamic lists, and a virtual machine. After describing the very different algorithms used in each of these techniques, we present experimental results that compares twenty-four benchmarks generated by eight different compilation techniques running on seven different processors.

  11. Comparison of Test Procedures and Energy Efficiency Criteria in Selected International Standards and Labeling Programs for Clothes Washers, Water Dispensers, Vending Machines and CFLs

    Energy Technology Data Exchange (ETDEWEB)

    Fridley, David; Zheng, Nina; Zhou, Nan

    2010-06-01

    Since the late 1970s, energy labeling programs and mandatory energy performance standards have been used in many different countries to improve the efficiency levels of major residential and commercial equipment. As more countries and regions launch programs covering a greater range of products that are traded worldwide, greater attention has been given to harmonizing the specific efficiency criteria in these programs and the test methods for measurements. For example, an international compact fluorescent light (CFL) harmonization initiative was launched in 2006 to focus on collaboration between Australia, China, Europe and North America. Given the long history of standards and labeling programs, most major energy-consuming residential appliances and commercial equipment are already covered under minimum energy performance standards (MEPS) and/or energy labels. For these products, such as clothes washers and CFLs, harmonization may still be possible when national MEPS or labeling thresholds are revised. Greater opportunity for harmonization exists in newer energy-consuming products that are not commonly regulated but are under consideration for new standards and labeling programs. This may include commercial products such as water dispensers and vending machines, which are only covered by MEPS or energy labels in a few countries or regions. As China continues to expand its appliance standards and labeling programs and revise existing standards and labels, it is important to learn from recent international experiences with efficiency criteria and test procedures for the same products. Specifically, various types of standards and labeling programs already exist in North America, Europe and throughout Asia for products in China's 2010 standards and labeling programs, namely clothes washers, water dispensers, vending machines and CFLs. This report thus examines similarities and critical differences in energy efficiency values, test procedure specifications and

  12. A program code generator for multiphysics biological simulation using markup languages.

    Science.gov (United States)

    Amano, Akira; Kawabata, Masanari; Yamashita, Yoshiharu; Rusty Punzalan, Florencio; Shimayoshi, Takao; Kuwabara, Hiroaki; Kunieda, Yoshitoshi

    2012-01-01

    To cope with the complexity of the biological function simulation models, model representation with description language is becoming popular. However, simulation software itself becomes complex in these environment, thus, it is difficult to modify the simulation conditions, target computation resources or calculation methods. In the complex biological function simulation software, there are 1) model equations, 2) boundary conditions and 3) calculation schemes. Use of description model file is useful for first point and partly second point, however, third point is difficult to handle for various calculation schemes which is required for simulation models constructed from two or more elementary models. We introduce a simulation software generation system which use description language based description of coupling calculation scheme together with cell model description file. By using this software, we can easily generate biological simulation code with variety of coupling calculation schemes. To show the efficiency of our system, example of coupling calculation scheme with three elementary models are shown.

  13. Optimization of Operation Sequence in CNC Machine Tools Using Genetic Algorithm

    Science.gov (United States)

    Abu Qudeiri, Jaber; Yamamoto, Hidehiko; Ramli, Rizauddin

    The productivity of machine tools is significantly improved by using microcomputer based CAD/CAM systems for NC program generation. Currently, many commercial CAD/CAM packages that provide automatic NC programming have been developed and applied to various cutting processes. Many cutting processes machined by CNC machine tools. In this paper, we attempt to find an efficient solution approach to determine the best sequence of operations for a set of operations that located in asymmetrical locations and different levels. In order to find the best sequence of operations that achieves the shortest cutting tool travel path (CTTP), genetic algorithm is introduced. After the sequence is optimized, the G-codes that use to code for the travel time is created. CTTP can be formulated as a special case of the traveling salesman problem (TSP). The incorporation of genetic algorithm and TSP can be included in the commercial CAD/CAM packages to optimize the CTTP during automatic generation of NC programs.

  14. COMSAT: Residue contact prediction of transmembrane proteins based on support vector machines and mixed integer linear programming.

    Science.gov (United States)

    Zhang, Huiling; Huang, Qingsheng; Bei, Zhendong; Wei, Yanjie; Floudas, Christodoulos A

    2016-03-01

    In this article, we present COMSAT, a hybrid framework for residue contact prediction of transmembrane (TM) proteins, integrating a support vector machine (SVM) method and a mixed integer linear programming (MILP) method. COMSAT consists of two modules: COMSAT_SVM which is trained mainly on position-specific scoring matrix features, and COMSAT_MILP which is an ab initio method based on optimization models. Contacts predicted by the SVM model are ranked by SVM confidence scores, and a threshold is trained to improve the reliability of the predicted contacts. For TM proteins with no contacts above the threshold, COMSAT_MILP is used. The proposed hybrid contact prediction scheme was tested on two independent TM protein sets based on the contact definition of 14 Å between Cα-Cα atoms. First, using a rigorous leave-one-protein-out cross validation on the training set of 90 TM proteins, an accuracy of 66.8%, a coverage of 12.3%, a specificity of 99.3% and a Matthews' correlation coefficient (MCC) of 0.184 were obtained for residue pairs that are at least six amino acids apart. Second, when tested on a test set of 87 TM proteins, the proposed method showed a prediction accuracy of 64.5%, a coverage of 5.3%, a specificity of 99.4% and a MCC of 0.106. COMSAT shows satisfactory results when compared with 12 other state-of-the-art predictors, and is more robust in terms of prediction accuracy as the length and complexity of TM protein increase. COMSAT is freely accessible at http://hpcc.siat.ac.cn/COMSAT/.

  15. Why zombies cannot write significant source code: The Knowledge Game and the art of computer programming

    NARCIS (Netherlands)

    Gobbo, F.; Benini, M.

    2015-01-01

    This article analyses the knowledge needed to understand a computer program within the philosophy of information. L. Floridi's method of levels of abstraction is applied to the relation between an ideal programmer and a modern computer seen together as an informational organism. The results obtained

  16. Studying Students' Attitudes on Using Examples of Game Source Code for Learning Programming

    Science.gov (United States)

    Theodoraki, Aristea; Xinogalos, Stelios

    2014-01-01

    Games for learning are currently used in several disciplines for motivating students and enhancing their learning experience. This new approach of technology-enhanced learning has attracted researchers' and instructors' attention in the area of programming that is one of the most cognitively demanding fields in Computer Science. Several…

  17. PC Cluster Machine Equipped with High-Speed Communication Software

    CERN Document Server

    Tanaka, M

    2004-01-01

    A high performance Beowulf (PC cluster) machine installed with Linux operating system and MPI (Message Passing Interface) for interprocessor communications has been constructed using Gigabit Ethernet and the communication software GAMMA (Genoa Active Message Machine), instead of the standard TCP/IP protocol. Fast C/Fortran compilers have been exploited with the GAMMA communication libraries. This method has eliminated large communication overhead of TCP/IP and resulted in significant increase in the computational performance of real application programs including the first-principle molecular dynamics simulation code. (Keywords: non TCP/IP, active messages, small latency, fast C/Fortran compilers, materials science, first-principle molecular dynamics)

  18. DOE FreedomCAR and vehicle technologies program advanced power electronic and electrical machines annual review report

    Energy Technology Data Exchange (ETDEWEB)

    Olszewski, Mitch [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2006-10-11

    This report is a summary of the Review Panel at the FY06 DOE FreedomCAR and Vehicle Technologies (FCVT) Annual Review of Advanced Power Electronics and Electric Machine (APEEM) research activities held on August 15-17, 2006.

  19. Walking Machine Control Programming

    Science.gov (United States)

    1983-08-31

    20000 ___ -123 Drive Pump ....Rec avery Pump 1CO 2gO 3C00 4C Q 5C00 6O0 7C0 8C00 $C0 10000__ _ _ _ _ w830728.data Pump settings Figure 8...I’rogrammitg SSA #2051 IFitia ’l’ciiiral RIeport 50000. 40000 30000 20000 10000.. w830728.data 123 progress estimate ..... w830728.data 456 progress...these controls. We usually opvrattc \\% itil the ,tick conrtrolling forward speed arid turning rate, with the right foot pedal controlling the speed of the

  20. HDFS optimization program based on GE coding%基于GE码的HDFS优化方案

    Institute of Scientific and Technical Information of China (English)

    朱媛媛; 王晓京

    2013-01-01

    Concerning Hadoop Distributed File System (HDFS) data disaster recovery efficiency and small files, this paper presented an improved solution based on coding and the solution introduced a coding module of erasure GE to HDFS. Different from the multiple-replication strategy adopted by the original system, the module encoded files of HDFS into a great number of slices, and saved them dispersedly into the clusters of the storage system in distributed fashion. The research methods introduced the new concept of the slice, slice was classified and merged to save in the block and the secondary index of slice was established to solve the small files issue. In the case of cluster failure, the original data would be recovered via decoding by collecting any 70% of the slice, the method also introduced the dynamic replication strategies, through dynamically creating and deleting replications to keep the whole cluster in a good load-balancing status and settle the hotspot issues. The experiments on analogous clusters of storage system show the feasibility and advantages of new measures in proposed solution.%针对Hadoop分布式文件系统(HDFS)数据容灾效率和小文件问题,提出了基于纠删码的解决方案.该方案引用了新型纠删码(GE码)的编码和译码模块,对HDFS中的文件进行编码分片,生成很多个Slice并随机均匀的分配保存到集群中,代替原来HDFS系统的多副本容灾策略.该方法中引入了Slice的新概念,将Slice进行分类合保存在block中并然后通过对Slice建立二级索引来解决小文件问题;该研究方法中抛弃了三备份机制,而是在集群出现节点失效的情况下,通过收集与失效文件相关的任意70%左右的Slice进行原始数据的恢复.通过相关的集群实验结果表明,该方法在容灾效率、小文件问题、存储成本以及安全性上对HDFS作了很大的优化.

  1. 人机显示界面中的文字和位置编码%Text and position coding of human-machine display interface

    Institute of Scientific and Technical Information of China (English)

    张磊; 庄达民

    2011-01-01

    In process of operating aircraft, pilots need to use large amounts of information. So reasonable coding of information can improve driving safety. According to research requirements, a task model was developed for the ergonomics experiment. After subjects complete the tasks, their correct rate and reaction time were measured. Combined the measured results with eye movement data, the impact of text and position coding on information identification was analyzed to provide a scientific basis for the ergonomics design of information interface. Experimental results show that subject's identification of the text information is affected by the position coding. And position coding relates to vision scope and attention allocation strategy. Identification efficiency of the center is better than the periphery, and the left position is better than the right position. Identification efficiency of Chinese information is better than English, the impact of mother tongue should be considered in the practical application.%飞行员在驾驶飞机的过程中需要用到大量的信息,对信息进行合理的编码可以提高驾驶安全性.根据研究的需要,开发一个用于工效实验的作业任务模型.通过测量被试完成作业任务的正确率和反应时间,结合眼动仪测得的眼动数据,分析文字和位置编码对信息辨识的影响,为显示界面适人性设计提供科学依据.实验结果表明:人对文字信息的辨识受到位置编码影响,位置编码方式与视野范围和注意力分配策略相关;中心位置的辨识效率优于边缘位置,左侧位置优于右侧位置;中文信息的辨识效果优于英文信息,实际应用时应考虑母语的影响.

  2. Architectural Visualization of C/C++ Source Code for Program Comprehension

    Energy Technology Data Exchange (ETDEWEB)

    Panas, T; Epperly, T W; Quinlan, D; Saebjornsen, A; Vuduc, R

    2006-09-01

    Structural and behavioral visualization of large-scale legacy systems to aid program comprehension is still a major challenge. The challenge is even greater when applications are implemented in flexible and expressive languages such as C and C++. In this paper, we consider visualization of static and dynamic aspects of large-scale scientific C/C++ applications. For our investigation, we reuse and integrate specialized analysis and visualization tools. Furthermore, we present a novel layout algorithm that permits a compressive architectural view of a large-scale software system. Our layout is unique in that it allows traditional program visualizations, i.e., graph structures, to be seen in relation to the application's file structure.

  3. The GEM code. A simulation program for the evaporation and the fission process of an excited nucleus

    Energy Technology Data Exchange (ETDEWEB)

    Furihata, Shiori [Mitsubishi Research Institute Inc., Tokyo (Japan); Niita, Koji [Research Organization for Information Science and Technology, Tokai, Ibaraki (Japan); Meigo, Shin-ichiro; Ikeda, Yujiro; Maekawa, Fujio [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    2001-03-01

    The GEM code is a simulation program which describes the de-excitation process of an excited nucleus, which is based on the Generalized Evaporation Model and the Atchison fission model. It has been shown that the combination of the Bertini intranuclear cascade model and GEM accurately predicts the cross sections of light fragments, such as Be produced from the proton-induced reactions. It has also been shown that the use of the reevaluated parameters in the Atchison model improves predictions of cross sections of fission fragments produced from the proton-induced reaction on Au. In this report, we present details and the usage of the GEM code. Furthermore, the results of benchmark calculations are shown by using the combination of the Bertini intranuclear cascade model and the GEM code (INC/GEM). Neutron spectra and isotope production cross sections from the reactions on various targets irradiated by protons are calculated with INC/GEM. Those results are compared with experimental data as well as the calculation results with LAHET. INC/GEM reproduces the experiments of double differential neutron emissions from the reaction on Al and Pb. The isotopic distributions for He, Li, and Be produced from the reaction on Ag are in good agreement with experimental data within 50%, although INC/GEM underestimates those of heavier nuclei than O. It is also shown that the predictions with INC/GEM for isotope production of light fragments, such as Li and Be, are better than those calculation with LAHET, particularly for heavy target. INC/GEM also gives better estimates of the cross sections of fission products than LAHET. (author)

  4. Conceptual Design of Object Oriented Program (OOP) for Pilot Code of Two-Fluid, Three-field Model with C++ 6.0

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Bub Dong; Lee, Young Jin [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2006-07-01

    Engineering software for design purpose in nuclear industries have been developed since early 1970s, and well established in 1980s. The most popular and common language for the software development has been FORTRAN series, until the more sophisticated GUI and software coupling is needed. The advanced computer language, such as C++, C has been developed to help the programming for the easy GUI need and reuse of well developed routines, with adopting the objective oriented program. A recent trend of programming becomes objective-oriented since the results are often more intuitive and easier to maintain than procedure program. The main motivation of this work is to capture objective oriented concepts for conventional safety analysis programs which consist of many functions and procedure oriented structures. In this work, the new objective programming with C++ 6.0 language has been tried for the PILOT code written in FORTRAN language, and conceptual OOP design of the system safety analysis code has been done.

  5. The Research and Appliaction of the Multi-classification Algorithm of Error-Correcting Codes Based on Support Vector Machine%基于SVM的纠错编码多分类算法的研究与应用

    Institute of Scientific and Technical Information of China (English)

    祖文超; 苑津莎; 王峰; 刘磊

    2012-01-01

    In order to enhance the accuracy rate of transformer fault diagnosis,multiclass classification algorithm,which is based upon Error-correcting codes connects with SVM,has been proposedThe mathe-matical model of transformer fault diagnosis is set up according to the theory of Support Vector Machine. Firstly,the Error-correcting codes matrix constructs some irrelevant Support Vector Machine,so that the accuracy rate of classified model can be enhanced.Finally,taking the dissolved gases in the transformer oil as the practise and testing sample of Error-correcting codes and SVM to realize transformer fault diagno- sis.And checking the arithmetic by using UCI data.The multiclass classification algorithm has been verified through VS2008 combined with Libsvm has been verified.And the result shows the method has high ac- curacy of classification.%为了提高变压器故障诊断的准确率,提出了一种基于纠错编码和支持向量机相结合的多分类算法,根据SVM理论建立变压器故障诊断数学模型,首先基于纠错编码矩阵构造出若干个互不相关的子支持向量机,以提高分类模型的分类准确率。最后把变压器油中溶解气体(DGA)作为纠错编码支持向量机的训练以及测试样本,实现变压器的故障诊断,同时用UCI数据对该算法进行验证。通过VS2008和Libsvm相结合对其进行验证,结果表明该方法具有很高的分类精度。

  6. Photon attenuation coefficients of Heavy-Metal Oxide glasses by MCNP code, XCOM program and experimental data: A comparison study

    Science.gov (United States)

    El-Khayatt, A. M.; Ali, A. M.; Singh, Vishwanath P.

    2014-01-01

    The mass attenuation coefficients, μ/ρ, total interaction cross-section, σt, and mean free path (MFP) of some Heavy Metal Oxides (HMO) glasses, with potential applications as gamma ray shielding materials, have been investigated using the MCNP-4C code. Appreciable variations are noted for all parameters by changing the photon energy and the chemical composition of HMO glasses. The numerical simulations parameters are compared with experimental data wherever possible. Comparisons are also made with predictions from the XCOM program in the energy region from 1 keV to 100 MeV. Good agreement noticed indicates that the chosen Monte Carlo method may be employed to make additional calculations on the photon attenuation characteristics of different glass systems, a capability particularly useful in cases where no analogous experimental data exist.

  7. Development of a simple detector response function generation program: the CEARDRFs code.

    Science.gov (United States)

    Wang, Jiaxin; Wang, Zhijian; Peeples, Johanna; Yu, Huawei; Gardner, Robin P

    2012-07-01

    A simple Monte Carlo program named CEARDRFs has been developed to generate very accurate detector response functions (DRFs) for scintillation detectors. It utilizes relatively rigorous gamma-ray transport with simple electron transport, and accounts for two phenomena that have rarely been treated: scintillator non-linearity and the variable flat continuum part of the DRF. It has been proven that these physics and treatments work well for 3×3″ and 6×6″ cylindrical NaI detector in CEAR's previous work. Now this approach has been expanded to cover more scintillation detectors with various common shapes and sizes. Benchmark experiments of 2×2″ cylindrical BGO detector and 2×4×16″ rectangular NaI detector have been carried out at CEAR with various radiactive sources. The simulation results of CEARDRFs have also been compared with MCNP5 calculations. The benchmark and comparison show that CEARDRFs can generate very accurate DRFs (more accurate than MCNP5) at a very fast speed (hundred times faster than MCNP5). The use of this program can significantly increase the accuracy of applications relying on detector spectroscopy like prompt gamma-ray neutron activation analysis, X-ray fluorescence analysis, oil well logging and homeland security. Copyright © 2011 Elsevier Ltd. All rights reserved.

  8. Machine Translation

    Institute of Scientific and Technical Information of China (English)

    张严心

    2015-01-01

    As a kind of ancillary translation tool, Machine Translation has been paid increasing attention to and received different kinds of study by a great deal of researchers and scholars for a long time. To know the definition of Machine Translation and to analyse its benefits and problems are significant for translators in order to make good use of Machine Translation, and helpful to develop and consummate Machine Translation Systems in the future.

  9. Systems Analysis Programs for Hands-on Integrated Reliability Evaluations (SAPHIRE) Code Reference Manual

    Energy Technology Data Exchange (ETDEWEB)

    C. L. Smith; K. J. Kvarfordt; S. T. Wood

    2008-08-01

    The Systems Analysis Programs for Hands-on Integrated Reliability Evaluations (SAPHIRE) is a software application developed for performing a complete probabilistic risk assessment (PRA) using a personal computer. SAPHIRE is funded by the U.S. Nuclear Regulatory Commission (NRC) and developed by the Idaho National Laboratory (INL). The INL's primary role in this project is that of software developer. However, the INL also plays an important role in technology transfer by interfacing and supporting SAPHIRE users comprised of a wide range of PRA practitioners from the NRC, national laboratories, the private sector, and foreign countries. SAPHIRE can be used to model a complex system’s response to initiating events, quantify associated damage outcome frequencies, and identify important contributors to this damage (Level 1 PRA) and to analyze containment performance during a severe accident and quantify radioactive releases (Level 2 PRA). It can be used for a PRA evaluating a variety of operating conditions, for example, for a nuclear reactor at full power, low power, or at shutdown conditions. Furthermore, SAPHIRE can be used to analyze both internal and external initiating events and has special features for transforming models built for internal event analysis to models for external event analysis. It can also be used in a limited manner to quantify risk in terms of release consequences to both the public and the environment (Level 3 PRA). SAPHIRE includes a separate module called the Graphical Evaluation Module (GEM). GEM provides a highly specialized user interface with SAPHIRE that automates SAPHIRE process steps for evaluating operational events at commercial nuclear power plants. Using GEM, an analyst can estimate the risk associated with operational events in a very efficient and expeditious manner. This reference guide will introduce the SAPHIRE Version 7.0 software. A brief discussion of the purpose and history of the software is included along with

  10. Systems Analysis Programs for Hands-on Integrated Reliability Evaluations (SAPHIRE) Code Reference Manual

    Energy Technology Data Exchange (ETDEWEB)

    C. L. Smith; K. J. Kvarfordt; S. T. Wood

    2006-07-01

    The Systems Analysis Programs for Hands-on Integrated Reliability Evaluations (SAPHIRE) is a software application developed for performing a complete probabilistic risk assessment (PRA) using a personal computer. SAPHIRE is funded by the U.S. Nuclear Regulatory Commission (NRC) and developed by the Idaho National Laboratory (INL). The INL's primary role in this project is that of software developer. However, the INL also plays an important role in technology transfer by interfacing and supporting SAPHIRE users comprised of a wide range of PRA practitioners from the NRC, national laboratories, the private sector, and foreign countries. SAPHIRE can be used to model a complex system’s response to initiating events, quantify associated damage outcome frequencies, and identify important contributors to this damage (Level 1 PRA) and to analyze containment performance during a severe accident and quantify radioactive releases (Level 2 PRA). It can be used for a PRA evaluating a variety of operating conditions, for example, for a nuclear reactor at full power, low power, or at shutdown conditions. Furthermore, SAPHIRE can be used to analyze both internal and external initiating events and has special features for ansforming models built for internal event analysis to models for external event analysis. It can also be used in a limited manner to quantify risk in terms of release consequences to both the public and the environment (Level 3 PRA). SAPHIRE includes a separate module called the Graphical Evaluation Module (GEM). GEM provides a highly specialized user interface with SAPHIRE that automates SAPHIRE process steps for evaluating operational events at commercial nuclear power plants. Using GEM, an analyst can estimate the risk associated with operational events in a very efficient and expeditious manner. This reference guide will introduce the SAPHIRE Version 7.0 software. A brief discussion of the purpose and history of the software is included along with

  11. Programmer's rantings on programming-language religions, code philosophies, google work culture, and other stuff

    CERN Document Server

    Yegge, Steve

    2012-01-01

    This book grew out of a lot of angst. Well, and wine. Put enough angst in me, and I'll start ranting. Pour in some wine, and the rants get mean-and funny. I still go back and read these posts now and then, and I always laugh. I was so mean. My angst grew out of traveling different roads than most programmers. Those roads forced me to see the world differently. Now I see all sorts of patterns that many experienced programmers fail to see-because, well, to put it bluntly, they're stuck in ruts. Over the past 25 years I've done a bunch of dramatically different types of programming, and I've a

  12. Development of a simple detector response function generation program: The CEARDRFs code

    Energy Technology Data Exchange (ETDEWEB)

    Wang Jiaxin, E-mail: jwang3@ncsu.edu [Center for Engineering Applications of Radioisotopes (CEAR), Department of Nuclear Engineering, North Carolina State University, Raleigh, NC 27695 (United States); Wang Zhijian; Peeples, Johanna [Center for Engineering Applications of Radioisotopes (CEAR), Department of Nuclear Engineering, North Carolina State University, Raleigh, NC 27695 (United States); Yu Huawei [Center for Engineering Applications of Radioisotopes (CEAR), Department of Nuclear Engineering, North Carolina State University, Raleigh, NC 27695 (United States); College of Geo-Resources and Information, China University of Petroleum, Qingdao, Shandong 266555 (China); Gardner, Robin P. [Center for Engineering Applications of Radioisotopes (CEAR), Department of Nuclear Engineering, North Carolina State University, Raleigh, NC 27695 (United States)

    2012-07-15

    A simple Monte Carlo program named CEARDRFs has been developed to generate very accurate detector response functions (DRFs) for scintillation detectors. It utilizes relatively rigorous gamma-ray transport with simple electron transport, and accounts for two phenomena that have rarely been treated: scintillator non-linearity and the variable flat continuum part of the DRF. It has been proven that these physics and treatments work well for 3 Multiplication-Sign 3 Double-Prime and 6 Multiplication-Sign 6 Double-Prime cylindrical NaI detector in CEAR's previous work. Now this approach has been expanded to cover more scintillation detectors with various common shapes and sizes. Benchmark experiments of 2 Multiplication-Sign 2 Double-Prime cylindrical BGO detector and 2 Multiplication-Sign 4 Multiplication-Sign 16 Double-Prime rectangular NaI detector have been carried out at CEAR with various radiactive sources. The simulation results of CEARDRFs have also been compared with MCNP5 calculations. The benchmark and comparison show that CEARDRFs can generate very accurate DRFs (more accurate than MCNP5) at a very fast speed (hundred times faster than MCNP5). The use of this program can significantly increase the accuracy of applications relying on detector spectroscopy like prompt gamma-ray neutron activation analysis, X-ray fluorescence analysis, oil well logging and homeland security. - Highlights: Black-Right-Pointing-Pointer CEARDRF has been developed to generate detector response functions (DRFs) for scintillation detectors a. Black-Right-Pointing-Pointer Generated DRFs are very accurate. Black-Right-Pointing-Pointer Simulation speed is hundreds of times faster than MCNP5. Black-Right-Pointing-Pointer It utilizes rigorous gamma-ray transport with simple electron transport. Black-Right-Pointing-Pointer It also accounts for scintillator non-linearity and the variable flat continuum part.

  13. Sustainable machining

    CERN Document Server

    2017-01-01

    This book provides an overview on current sustainable machining. Its chapters cover the concept in economic, social and environmental dimensions. It provides the reader with proper ways to handle several pollutants produced during the machining process. The book is useful on both undergraduate and postgraduate levels and it is of interest to all those working with manufacturing and machining technology.

  14. Training program for energy conservation in new building construction. Volume III. Energy conservation technology for plan examiners and code administrators. Energy Conservation Technology Series 200

    Energy Technology Data Exchange (ETDEWEB)

    None

    1977-12-01

    Under the sponsorship of the United States Department of Energy, a Model Code for Energy Conservation in New Building Construction has been developed by those national organizations primarily concerned with the development and promulgation of model codes. The technical provisions are based on ASHRAE Standard 90-75 and are intended for use by state and local officials. The subject of regulation of new building construction to assure energy conservation is recognized as one in which code officials have not had previous exposure. It was also determined that application of the model code would be made at varying levels by officials with both a specific requirement for knowledge and a differing degree of prior training in the state-of-the-art. Therefore, a training program and instructional materials were developed for code officials to assist them in the implementation and enforcement of energy efficient standards and codes. The training program for Energy Conservation Tehnology for Plan Examiners and Code Administrators (ECT Series 200) is presented.

  15. Program Synthesizes UML Sequence Diagrams

    Science.gov (United States)

    Barry, Matthew R.; Osborne, Richard N.

    2006-01-01

    A computer program called "Rational Sequence" generates Universal Modeling Language (UML) sequence diagrams of a target Java program running on a Java virtual machine (JVM). Rational Sequence thereby performs a reverse engineering function that aids in the design documentation of the target Java program. Whereas previously, the construction of sequence diagrams was a tedious manual process, Rational Sequence generates UML sequence diagrams automatically from the running Java code.

  16. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    ; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...... development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech...... expression in the public realm. The book’s line of argument defends language against its invasion by economics, arguing that speech continues to underscore the human condition, however paradoxical this may seem in an era of pervasive computing....

  17. Machine Learning for Hackers

    CERN Document Server

    Conway, Drew

    2012-01-01

    If you're an experienced programmer interested in crunching data, this book will get you started with machine learning-a toolkit of algorithms that enables computers to train themselves to automate useful tasks. Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through a series of hands-on case studies, instead of a traditional math-heavy presentation. Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you'll learn how to analyz

  18. Expert system interaction with existing analysis codes

    Energy Technology Data Exchange (ETDEWEB)

    Ransom, V.H.; Fink, R.K.; Bertch, W.J.; Callow, R.A.

    1986-01-01

    Coupling expert systems with existing engineering analysis codes is a promising area in the field of artificial intelligence. The added intelligence can provide for easier and less costly use of the code and also reduce the potential for code misuse. This paper will discuss the methods available to allow interaction between an expert system and a large analysis code running on a mainframe. Concluding remarks will identify potential areas of expert system application with specific areas that are being considered in a current research program. The difficulty of interaction between an analysis code and an expert system is due to the incompatibility between the FORTRAN environment used for the analysis code and the AI environment used for the expert system. Three methods, excluding file transfer techniques, are discussed to help overcome this incompatibility. The first method is linking the FORTRAN routines to the LISP environment on the same computer. Various LISP dialects available on mainframes and their interlanguage communication capabilities are discussed. The second method involves network interaction between a LISP machine and a mainframe computer. Comparisons between the linking method and networking are noted. The third method involves the use of an expert system tool that is campatible with a FORTRAN environment. Several available tools are discussed. With the interaction methods identified, several potential application areas are considered. Selection of the specific areas that will be developed for the pilot project and applied to a thermal-hydraulic energy analysis code are noted.

  19. Gamma ray shielding study of barium-bismuth-borosilicate glasses as transparent shielding materials using MCNP-4C code, XCOM program, and available experimental data

    Energy Technology Data Exchange (ETDEWEB)

    Bagheri, Reza; Yousefinia, Hassan [Nuclear Fuel Cycle Research School (NFCRS), Nuclear Science and Technology Research Institute (NSTRI), Atomic Energy Organization of Iran, Tehran (Iran, Islamic Republic of); Moghaddam, Alireza Khorrami [Radiology Department, Paramedical Faculty, Mazandaran University of Medical Sciences, Sari (Iran, Islamic Republic of)

    2017-02-15

    In this work, linear and mass attenuation coefficients, effective atomic number and electron density, mean free paths, and half value layer and 10th value layer values of barium-bismuth-borosilicate glasses were obtained for 662 keV, 1,173 keV, and 1,332 keV gamma ray energies using MCNP-4C code and XCOM program. Then obtained data were compared with available experimental data. The MCNP-4C code and XCOM program results were in good agreement with the experimental data. Barium-bismuth-borosilicate glasses have good gamma ray shielding properties from the shielding point of view.

  20. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    , in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded......The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered...... as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  1. Machine musicianship

    Science.gov (United States)

    Rowe, Robert

    2002-05-01

    The training of musicians begins by teaching basic musical concepts, a collection of knowledge commonly known as musicianship. Computer programs designed to implement musical skills (e.g., to make sense of what they hear, perform music expressively, or compose convincing pieces) can similarly benefit from access to a fundamental level of musicianship. Recent research in music cognition, artificial intelligence, and music theory has produced a repertoire of techniques that can make the behavior of computer programs more musical. Many of these were presented in a recently published book/CD-ROM entitled Machine Musicianship. For use in interactive music systems, we are interested in those which are fast enough to run in real time and that need only make reference to the material as it appears in sequence. This talk will review several applications that are able to identify the tonal center of musical material during performance. Beyond this specific task, the design of real-time algorithmic listening through the concurrent operation of several connected analyzers is examined. The presentation includes discussion of a library of C++ objects that can be combined to perform interactive listening and a demonstration of their capability.

  2. 结合DMG加工中心对话格式程序的Cimatron E后处理开发%Development of Cimatron EPost Program Combined with DMG CNC Machine Conversational Format Program

    Institute of Scientific and Technical Information of China (English)

    孙明智

    2012-01-01

    DMU 100monoBLOCK加工中心机床是德国DMG机床集团制造的采用Heidenhain iTNC530控制系统的一种先进而高效的加工中心,广泛应用于模具制造领域。本文阐述了结合本机床的运动特点与专业CAD/CAM软件Cimatron E的后处理工具,定制后处理的开发过程,后处理程序通过加工试验并取得成功。%DMU 100 monoBLOCK CNC machine manufactured by Germany DMG Machine Tool Group adopts Heidenhain iTNC530 control system. It's advanced and efficient, and widely used in mold manufacturing field. The paper states development processes of customing post program combined with CNC machine motion characteristics and post program tools of Cimatron E, a professional CAD/CAM software, and proceeding processing tests through post program , then achieving success.

  3. Siemens 802S / C Manual Programming Instance for CNC Milling Machine%SIEMENS802S/C数控铣床手工编程实例

    Institute of Scientific and Technical Information of China (English)

    郭满荣

    2012-01-01

    Taking slot plate as example, the manual programming method for NC milling machine equipped with SIEMENS 802S/C economy NC system was introduced, focusing on the programmable shift, additional programmable rotation, and subroutine calls and so on.%以槽轮板为例,介绍配备SIEMENS 802S/C经济型数控系统的数控铣床的手工编程方法,重点论述可编程的偏移、附加的可编程旋转和子程序调用等功能.

  4. Comparison of Test Procedures and Energy Efficiency Criteria in Selected International Standards & Labeling Programs for Copy Machines, External Power Supplies, LED Displays, Residential Gas Cooktops and Televisions

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Nina [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Zhou, Nan [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-03-01

    This report presents a technical review of international minimum energy performance standards (MEPS), voluntary and mandatory energy efficiency labels and test procedures for five products being considered for new or revised MEPS in China: copy machines, external power supply, LED displays, residential gas cooktops and flat-screen televisions. For each product, an overview of the scope of existing international standards and labeling programs, energy values and energy performance metrics and description and detailed summary table of criteria and procedures in major test standards are presented.

  5. Integration of a code for aeroelastic design of conventional and composite wings into ACSYNT, an aircraft synthesis program. [wing aeroelastic design (WADES)

    Science.gov (United States)

    Mullen, J., Jr.

    1976-01-01

    A comparison of program estimates of wing weight, material distribution. structural loads and elastic deformations with actual Northrop F-5A/B data is presented. Correlation coefficients obtained using data from a number of existing aircraft were computed for use in vehicle synthesis to estimate wing weights. The modifications necessary to adapt the WADES code for use in the ACSYNT program are described. Basic program flow and overlay structure is outlined. An example of the convergence of the procedure in estimating wing weights during the synthesis of a vehicle to satisfy F-5 mission requirements is given. A description of inputs required for use of the WADES program is included.

  6. Object-Oriented Support for Adaptive Methods on Paranel Machines

    Directory of Open Access Journals (Sweden)

    Sandeep Bhatt

    1993-01-01

    Full Text Available This article reports on experiments from our ongoing project whose goal is to develop a C++ library which supports adaptive and irregular data structures on distributed memory supercomputers. We demonstrate the use of our abstractions in implementing "tree codes" for large-scale N-body simulations. These algorithms require dynamically evolving treelike data structures, as well as load-balancing, both of which are widely believed to make the application difficult and cumbersome to program for distributed-memory machines. The ease of writing the application code on top of our C++ library abstractions (which themselves are application independent, and the low overhead of the resulting C++ code (over hand-crafted C code supports our belief that object-oriented approaches are eminently suited to programming distributed-memory machines in a manner that (to the applications programmer is architecture-independent. Our contribution in parallel programming methodology is to identify and encapsulate general classes of communication and load-balancing strategies useful across applications and MIMD architectures. This article reports experimental results from simulations of half a million particles using multiple methods.

  7. From Turing machines to computer viruses.

    Science.gov (United States)

    Marion, Jean-Yves

    2012-07-28

    Self-replication is one of the fundamental aspects of computing where a program or a system may duplicate, evolve and mutate. Our point of view is that Kleene's (second) recursion theorem is essential to understand self-replication mechanisms. An interesting example of self-replication codes is given by computer viruses. This was initially explained in the seminal works of Cohen and of Adleman in the 1980s. In fact, the different variants of recursion theorems provide and explain constructions of self-replicating codes and, as a result, of various classes of malware. None of the results are new from the point of view of computability theory. We now propose a self-modifying register machine as a model of computation in which we can effectively deal with the self-reproduction and in which new offsprings can be activated as independent organisms.

  8. Creating Tomorrow's Technologists: Contrasting Information Technology Curriculum in North American Library and Information Science Graduate Programs against Code4lib Job Listings

    Science.gov (United States)

    Maceli, Monica

    2015-01-01

    This research study explores technology-related course offerings in ALA-accredited library and information science (LIS) graduate programs in North America. These data are juxtaposed against a text analysis of several thousand LIS-specific technology job listings from the Code4lib jobs website. Starting in 2003, as a popular library technology…

  9. Creating Tomorrow's Technologists: Contrasting Information Technology Curriculum in North American Library and Information Science Graduate Programs against Code4lib Job Listings

    Science.gov (United States)

    Maceli, Monica

    2015-01-01

    This research study explores technology-related course offerings in ALA-accredited library and information science (LIS) graduate programs in North America. These data are juxtaposed against a text analysis of several thousand LIS-specific technology job listings from the Code4lib jobs website. Starting in 2003, as a popular library technology…

  10. SHOWICD - A COMPUTER-PROGRAM TO DISPLAY ICD-9CM CODED INJURY DIAGNOSES AND THEIR CORRESPONDING INJURY SEVERITY SCORES FOR A PARTICULAR PATIENT

    NARCIS (Netherlands)

    KINGMA, J; TENVERGERT, E; KLASEN, HJ

    1994-01-01

    SHOWICD is an interactive computer program designed to document severity of injury from the ICD-9CM coded injury diagnoses of a particular patient. Two severity-of-injury scores [the Abbreviated Injury Scale (AIS) and the Injury Severity Score (ISS)] are used. By employing the AIS scores, the severi

  11. SHOWICD - A COMPUTER-PROGRAM TO DISPLAY ICD-9CM CODED INJURY DIAGNOSES AND THEIR CORRESPONDING INJURY SEVERITY SCORES FOR A PARTICULAR PATIENT

    NARCIS (Netherlands)

    KINGMA, J; TENVERGERT, E; KLASEN, HJ

    1994-01-01

    SHOWICD is an interactive computer program designed to document severity of injury from the ICD-9CM coded injury diagnoses of a particular patient. Two severity-of-injury scores [the Abbreviated Injury Scale (AIS) and the Injury Severity Score (ISS)] are used. By employing the AIS scores, the severi

  12. NASAP: a computer code for the evaluation of the Non-proliferation Alternative Systems Assessment Program concepts. Final report in support of Task 2. [PWR; BWR

    Energy Technology Data Exchange (ETDEWEB)

    Maul, B.A.

    1979-09-01

    The Non-Proliferation Alternative Systems Assessment Program (NASAP) computer code was developed to calculate the LWR and NASAP choice reactor cost through an arbitrary year T/sub N/. The final cost is arrived at by calculation of cost contributory factors for both LWR and NASAP choice reactors.

  13. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  14. Refactoring test code

    NARCIS (Netherlands)

    Deursen, A. van; Moonen, L.M.F.; Bergh, A. van den; Kok, G.

    2001-01-01

    Two key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from refactoring product

  15. Simple machines

    CERN Document Server

    Graybill, George

    2007-01-01

    Just how simple are simple machines? With our ready-to-use resource, they are simple to teach and easy to learn! Chocked full of information and activities, we begin with a look at force, motion and work, and examples of simple machines in daily life are given. With this background, we move on to different kinds of simple machines including: Levers, Inclined Planes, Wedges, Screws, Pulleys, and Wheels and Axles. An exploration of some compound machines follows, such as the can opener. Our resource is a real time-saver as all the reading passages, student activities are provided. Presented in s

  16. Perspex machine: VII. The universal perspex machine

    Science.gov (United States)

    Anderson, James A. D. W.

    2006-01-01

    -linear perspex-machine which is very much easier to program than the original perspex-machine. We then show how to map the whole of perspex space into a unit cube. This allows us to construct a fractal of perspex machines with the cardinality of a real-numbered line or space. This fractal is the universal perspex machine. It can solve, in unit time, the halting problem for itself and for all perspex machines instantiated in real-numbered space, including all Turing machines. We cite an experiment that has been proposed to test the physical reality of the perspex machine's model of time, but we make no claim that the physical universe works this way or that it has the cardinality of the perspex machine. We leave it that the perspex machine provides an upper bound on the computational properties of physical things, including manufactured computers and biological organisms, that have a cardinality no greater than the real-number line.

  17. Creating a Multi-axis Machining Postprocessor

    Directory of Open Access Journals (Sweden)

    Petr Vavruška

    2012-01-01

    Full Text Available This paper focuses on the postprocessor creation process. When using standard commercially available postprocessors it is often very difficult to modify its internal source code, and it is a very complex process, in many cases even impossible, to implement the newly-developed functions. It is therefore very important to have a method for creating a postprocessor for any CAM system, which allows CL data (Cutter Location data to be generated to a separate text file. The goal of our work is to verify the proposed method for creating a postprocessor. Postprocessor functions for multi-axis machiningare dealt with in this work. A file with CL data must be translated by the postprocessor into an NC program that has been customized for a specific production machine and its control system. The postprocessor is therefore verified by applications for machining free-form surfaces of complex parts, and by executing the NC programs that are generated on real machine tools. This is also presented here.

  18. PCP-ML: protein characterization package for machine learning.

    Science.gov (United States)

    Eickholt, Jesse; Wang, Zheng

    2014-11-18

    Machine Learning (ML) has a number of demonstrated applications in protein prediction tasks such as protein structure prediction. To speed further development of machine learning based tools and their release to the community, we have developed a package which characterizes several aspects of a protein commonly used for protein prediction tasks with machine learning. A number of software libraries and modules exist for handling protein related data. The package we present in this work, PCP-ML, is unique in its small footprint and emphasis on machine learning. Its primary focus is on characterizing various aspects of a protein through sets of numerical data. The generated data can then be used with machine learning tools and/or techniques. PCP-ML is very flexible in how the generated data is formatted and as a result is compatible with a variety of existing machine learning packages. Given its small size, it can be directly packaged and distributed with community developed tools for protein prediction tasks. Source code and example programs are available under a BSD license at http://mlid.cps.cmich.edu/eickh1jl/tools/PCPML/. The package is implemented in C++ and accessible as a Python module.

  19. Clojure for machine learning

    CERN Document Server

    Wali, Akhil

    2014-01-01

    A book that brings out the strengths of Clojure programming that have to facilitate machine learning. Each topic is described in substantial detail, and examples and libraries in Clojure are also demonstrated.This book is intended for Clojure developers who want to explore the area of machine learning. Basic understanding of the Clojure programming language is required, but thorough acquaintance with the standard Clojure library or any libraries are not required. Familiarity with theoretical concepts and notation of mathematics and statistics would be an added advantage.

  20. Quantum Virtual Machine (QVM)

    Energy Technology Data Exchange (ETDEWEB)

    2016-11-18

    There is a lack of state-of-the-art HPC simulation tools for simulating general quantum computing. Furthermore, there are no real software tools that integrate current quantum computers into existing classical HPC workflows. This product, the Quantum Virtual Machine (QVM), solves this problem by providing an extensible framework for pluggable virtual, or physical, quantum processing units (QPUs). It enables the execution of low level quantum assembly codes and returns the results of such executions.

  1. Visualization program development using Java

    Energy Technology Data Exchange (ETDEWEB)

    Sasaki, Akira; Suto, Keiko [Japan Atomic Energy Research Inst., Kizu, Kyoto (Japan). Kansai Research Establishment; Yokota, Hisashi [Research Organization for Information Science and Technology, Tokai, Ibaraki (Japan)

    2002-03-01

    Method of visualization programs using Java for the PC with the graphical user interface (GUI) is discussed, and applied to the visualization and analysis of 1D and 2D data from experiments and numerical simulations. Based on an investigation of programming techniques such as drawing graphics and event driven program, example codes are provided in which GUI is implemented using the Abstract Window Toolkit (AWT). The marked advantage of Java comes from the inclusion of library routines for graphics and networking as its language specification, which enables ordinary scientific programmers to make interactive visualization a part of their simulation codes. Moreover, the Java programs are machine independent at the source level. Object oriented programming (OOP) methods used in Java programming will be useful for developing large scientific codes which includes number of modules with better maintenance ability. (author)

  2. Machine learning with R cookbook

    CERN Document Server

    Chiu, Yu-Wei

    2015-01-01

    If you want to learn how to use R for machine learning and gain insights from your data, then this book is ideal for you. Regardless of your level of experience, this book covers the basics of applying R to machine learning through to advanced techniques. While it is helpful if you are familiar with basic programming or machine learning concepts, you do not require prior experience to benefit from this book.

  3. Electric machine

    Science.gov (United States)

    El-Refaie, Ayman Mohamed Fawzi [Niskayuna, NY; Reddy, Patel Bhageerath [Madison, WI

    2012-07-17

    An interior permanent magnet electric machine is disclosed. The interior permanent magnet electric machine comprises a rotor comprising a plurality of radially placed magnets each having a proximal end and a distal end, wherein each magnet comprises a plurality of magnetic segments and at least one magnetic segment towards the distal end comprises a high resistivity magnetic material.

  4. EGS code system: computer programs for the Monte Carlo simulation of electromagnetic cascade showers. Version 3. [EGS, PEGS, TESTSR, in MORTRAN

    Energy Technology Data Exchange (ETDEWEB)

    Ford, R.L.; Nelson, W.R.

    1978-06-01

    A code to simulate almost any electron--photon transport problem conceivable is described. The report begins with a lengthy historical introduction and a description of the shower generation process. Then the detailed physics of the shower processes and the methods used to simulate them are presented. Ideas of sampling theory, transport techniques, particle interactions in general, and programing details are discussed. Next, EGS calculations and various experiments and other Monte Carlo results are compared. The remainder of the report consists of user manuals for EGS, PEGS, and TESTSR codes; options, input specifications, and typical output are included. 38 figures, 12 tables. (RWR)

  5. Transplantation Method of QR Code Decoding Program Based on Embedded Platforms%嵌入式平台QR码译码程序的移植方法

    Institute of Scientific and Technical Information of China (English)

    杨柏松; 高美凤

    2016-01-01

    A transplantation method of QR code decoding program based on embedded platform was presented. The UP- NETARM2410-S was selected as the hardware development platform. Firstly, the system hardware composition was given. Then, the whole development process of QR code decoding program using Qt-Creator was introduced in detail. In the test phase, in order to simulate the running state of QR code decoding, the qvfb visual screen was used. Finally, the program was transplanted to true embedded platform. Test results showed that the decoding program can run normally on the embedded platform and correctly decode QR code information. The proposed transplantation method may have certain reference significance for different platforms QR code decoding.%给出一种嵌入式平台QR码译码程序的移植方法.选用UP-NETARM2410-S嵌入式平台作为硬件开发平台,首先介绍了系统的硬件平台的组成,然后,对使用Qt-Creator进行QR码译码程序的开发的具体流程进行详细的介绍,测试阶段,利用qvfb虚拟屏,对程序在开发平台的运行情况进行模拟.最后,将程序向嵌入式平台移植.测试结果表明,译码程序能够在嵌入式平台正常运行,并能进行QR码的译码.所提出的移植方法,对于不同平台QR码译码程序移植有一定的借鉴意义.

  6. The Machine Scoring of Writing

    Science.gov (United States)

    McCurry, Doug

    2010-01-01

    This article provides an introduction to the kind of computer software that is used to score student writing in some high stakes testing programs, and that is being promoted as a teaching and learning tool to schools. It sketches the state of play with machines for the scoring of writing, and describes how these machines work and what they do.…

  7. Neural Decoder for Topological Codes

    Science.gov (United States)

    Torlai, Giacomo; Melko, Roger G.

    2017-07-01

    We present an algorithm for error correction in topological codes that exploits modern machine learning techniques. Our decoder is constructed from a stochastic neural network called a Boltzmann machine, of the type extensively used in deep learning. We provide a general prescription for the training of the network and a decoding strategy that is applicable to a wide variety of stabilizer codes with very little specialization. We demonstrate the neural decoder numerically on the well-known two-dimensional toric code with phase-flip errors.

  8. An abstract machine based execution model for computer architecture design and efficient implementation of logic programs in parallel.

    OpenAIRE

    Hermenegildo, Manuel V.

    1986-01-01

    The term "Logic Programming" refers to a variety of computer languages and execution models which are based on the traditional concept of Symbolic Logic. The expressive power of these languages offers promise to be of great assistance in facing the programming challenges of present and future symbolic processing applications in Artificial Intelligence, Knowledge-based systems, and many other areas of computing. The sequential execution speed of logic programs has been greatly improved sinc...

  9. The Machine within the Machine

    CERN Multimedia

    Katarina Anthony

    2014-01-01

    Although Virtual Machines are widespread across CERN, you probably won't have heard of them unless you work for an experiment. Virtual machines - known as VMs - allow you to create a separate machine within your own, allowing you to run Linux on your Mac, or Windows on your Linux - whatever combination you need.   Using a CERN Virtual Machine, a Linux analysis software runs on a Macbook. When it comes to LHC data, one of the primary issues collaborations face is the diversity of computing environments among collaborators spread across the world. What if an institute cannot run the analysis software because they use different operating systems? "That's where the CernVM project comes in," says Gerardo Ganis, PH-SFT staff member and leader of the CernVM project. "We were able to respond to experimentalists' concerns by providing a virtual machine package that could be used to run experiment software. This way, no matter what hardware they have ...

  10. Technology Time Machine 2012

    DEFF Research Database (Denmark)

    Lehner, Wolfgang; Fettweis, Gerhard; Fitzek, Frank

    2013-01-01

    The IEEE Technology Time Machine (TTM) is a unique event for industry leaders, academics, and decision making government officials who direct R&D activities, plan research programs or manage portfolios of research activities. This report covers the main topics of the 2nd Symposium of future...

  11. Development of Fractal Pattern Making Application using L-System for Enhanced Machine Controller

    Directory of Open Access Journals (Sweden)

    Gunawan Alexander A S

    2014-03-01

    Full Text Available One big issue facing the industry today is an automated machine lack of flexibility for customization because it is designed by the manufacturers based on certain standards. In this research, it is developed customized application software for CNC (Computer Numerically Controlled machines using open source platform. The application is enable us to create designs by means of fractal patterns using L-System, developed by turtle geometry interpretation and Python programming languages. The result of the application is the G-Code of fractal pattern formed by the method of L-System. In the experiment on the CNC machine, the G-Code of fractal pattern which involving the branching structure has been able to run well.

  12. The program of CNC machine not following Descartes reference frame%不遵循笛卡尔坐标系的数控机床加工程序编制

    Institute of Scientific and Technical Information of China (English)

    耿欣; 顾红光

    2013-01-01

    针对不遵循笛卡尔坐标系的专用数控机床不能按通用的数控指令进行编程的问题,运用宏程序编制一螺旋插补铣的加工程序.%Aiming at the CNC machine can't program with standard dictate not following Descartes reference frame, here program a screw interpolation milling programm with Macro program.

  13. Machine Learning

    CERN Document Server

    CERN. Geneva

    2017-01-01

    Machine learning, which builds on ideas in computer science, statistics, and optimization, focuses on developing algorithms to identify patterns and regularities in data, and using these learned patterns to make predictions on new observations. Boosted by its industrial and commercial applications, the field of machine learning is quickly evolving and expanding. Recent advances have seen great success in the realms of computer vision, natural language processing, and broadly in data science. Many of these techniques have already been applied in particle physics, for instance for particle identification, detector monitoring, and the optimization of computer resources. Modern machine learning approaches, such as deep learning, are only just beginning to be applied to the analysis of High Energy Physics data to approach more and more complex problems. These classes will review the framework behind machine learning and discuss recent developments in the field.

  14. ENERGY STAR Certified Vending Machines

    Data.gov (United States)

    U.S. Environmental Protection Agency — Certified models meet all ENERGY STAR requirements as listed in the Version 3.0 ENERGY STAR Program Requirements for Refrigerated Beverage Vending Machines that are...

  15. Optimized periodic verification testing blended risk and performance-based MOV inservice test program an application of ASME code case OMN-1

    Energy Technology Data Exchange (ETDEWEB)

    Sellers, C.; Fleming, K.; Bidwell, D.; Forbes, P. [and others

    1996-12-01

    This paper presents an application of ASME Code Case OMN-1 to the GL 89-10 Program at the South Texas Project Electric Generating Station (STPEGS). Code Case OMN-1 provides guidance for a performance-based MOV inservice test program that can be used for periodic verification testing and allows consideration of risk insights. Blended probabilistic and deterministic evaluation techniques were used to establish inservice test strategies including both test methods and test frequency. Described in the paper are the methods and criteria for establishing MOV safety significance based on the STPEGS probabilistic safety assessment, deterministic considerations of MOV performance characteristics and performance margins, the expert panel evaluation process, and the development of inservice test strategies. Test strategies include a mix of dynamic and static testing as well as MOV exercising.

  16. FY05 LDRD Fianl Report Investigation of AAA+ protein machines that participate in DNA replication, recombination, and in response to DNA damage LDRD Project Tracking Code: 04-LW-049

    Energy Technology Data Exchange (ETDEWEB)

    Sawicka, D; de Carvalho-Kavanagh, M S; Barsky, D; Venclovas, C

    2006-12-04

    The AAA+ proteins are remarkable macromolecules that are able to self-assemble into nanoscale machines. These protein machines play critical roles in many cellular processes, including the processes that manage a cell's genetic material, but the mechanism at the molecular level has remained elusive. We applied computational molecular modeling, combined with advanced sequence analysis and available biochemical and genetic data, to structurally characterize eukaryotic AAA+ proteins and the protein machines they form. With these models we have examined intermolecular interactions in three-dimensions (3D), including both interactions between the components of the AAA+ complexes and the interactions of these protein machines with their partners. These computational studies have provided new insights into the molecular structure and the mechanism of action for AAA+ protein machines, thereby facilitating a deeper understanding of processes involved in DNA metabolism.

  17. Chatter and machine tools

    CERN Document Server

    Stone, Brian

    2014-01-01

    Focussing on occurrences of unstable vibrations, or Chatter, in machine tools, this book gives important insights into how to eliminate chatter with associated improvements in product quality, surface finish and tool wear. Covering a wide range of machining processes, including turning, drilling, milling and grinding, the author uses his research expertise and practical knowledge of vibration problems to provide solutions supported by experimental evidence of their effectiveness. In addition, this book contains links to supplementary animation programs that help readers to visualise the ideas detailed in the text. Advancing knowledge in chatter avoidance and suggesting areas for new innovations, Chatter and Machine Tools serves as a handbook for those desiring to achieve significant reductions in noise, longer tool and grinding wheel life and improved product finish.

  18. PCRELAP5: data calculation program for RELAP 5 code; PCRELAP5: programa de calculo dos dados de entrada para o codigo RELAP5

    Energy Technology Data Exchange (ETDEWEB)

    Silvestre, Larissa Jacome Barros

    2016-07-01

    Nuclear accidents in the world led to the establishment of rigorous criteria and requirements for nuclear power plant operations by the international regulatory bodies. By using specific computer programs, simulations of various accidents and transients likely to occur at any nuclear power plant are required for certifying and licensing a nuclear power plant. Based on this scenario, some sophisticated computational tools have been used such as the Reactor Excursion and Leak Analysis Program (RELAP5), which is the most widely used code for the thermo-hydraulic analysis of accidents and transients in nuclear reactors in Brazil and worldwide. A major difficulty in the simulation by using RELAP5 code is the amount of information required for the simulation of thermal-hydraulic accidents or transients. The preparation of the input data requires a great number of mathematical operations to calculate the geometry of the components. Thus, for those calculations performance and preparation of RELAP5 input data, a friendly mathematical preprocessor was designed. The Visual Basic for Application (VBA) for Microsoft Excel demonstrated to be an effective tool to perform a number of tasks in the development of the program. In order to meet the needs of RELAP5 users, the RELAP5 Calculation Program (Programa de Calculo do RELAP5 - PCRELAP5) was designed. The components of the code were codified; all entry cards including the optional cards of each one have been programmed. In addition, an English version for PCRELAP5 was provided. Furthermore, a friendly design was developed in order to minimize the time of preparation of input data and errors committed by users. In this work, the final version of this preprocessor was successfully applied for Safety Injection System (SIS) of Angra 2. (author)

  19. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  20. Laser Marked Codes For Paperless Tracking Applications

    Science.gov (United States)

    Crater, David

    1987-01-01

    The application of laser markers for marking machine readable codes is described. Use of such codes for automatic tracking and considerations for marker performance and features are discussed. Available laser marker types are reviewed. Compatibility of laser/material combinations and material/code/reader systems are reviewed.

  1. PREREM: an interactive data preprocessing code for INREM II. Part I: user's manual. Part II: code structure

    Energy Technology Data Exchange (ETDEWEB)

    Ryan, M.T.; Fields, D.E.

    1981-05-01

    PREREM is an interactive computer code developed as a data preprocessor for the INREM-II (Killough, Dunning, and Pleasant, 1978a) internal dose program. PREREM is intended to provide easy access to current and self-consistent nuclear decay and radionuclide-specific metabolic data sets. Provision is made for revision of metabolic data, and the code is intended for both production and research applications. Documentation for the code is in two parts. Part I is a user's manual which emphasizes interpretation of program prompts and choice of user input. Part II stresses internal structure and flow of program control and is intended to assist the researcher who wishes to revise or modify the code or add to its capabilities. PREREM is written for execution on a Digital Equipment Corporation PDP-10 System and much of the code will require revision before it can be run on other machines. The source program length is 950 lines (116 blocks) and computer core required for execution is 212 K bytes. The user must also have sufficient file space for metabolic and S-factor data sets. Further, 64 100 K byte blocks of computer storage space are required for the nuclear decay data file. Computer storage space must also be available for any output files produced during the PREREM execution. 9 refs., 8 tabs.

  2. Design of equipment for training machine tools

    Directory of Open Access Journals (Sweden)

    Císar Miroslav

    2017-01-01

    Full Text Available The article proposes multiple devices designed to be used with training machine tools EMCO Concept series. Design was focused to enchant educational potential of training machine tools located in the laboratory of CNC programing, department of automation and production systems, Faculty of mechanical engineering, University of Zilina. The described device allows monitoring of machine tool, to measure tool offset and dimension, to use alternative ways of clamping, and to create video of machining.

  3. Machine Learning

    Energy Technology Data Exchange (ETDEWEB)

    Chikkagoudar, Satish; Chatterjee, Samrat; Thomas, Dennis G.; Carroll, Thomas E.; Muller, George

    2017-04-21

    The absence of a robust and unified theory of cyber dynamics presents challenges and opportunities for using machine learning based data-driven approaches to further the understanding of the behavior of such complex systems. Analysts can also use machine learning approaches to gain operational insights. In order to be operationally beneficial, cybersecurity machine learning based models need to have the ability to: (1) represent a real-world system, (2) infer system properties, and (3) learn and adapt based on expert knowledge and observations. Probabilistic models and Probabilistic graphical models provide these necessary properties and are further explored in this chapter. Bayesian Networks and Hidden Markov Models are introduced as an example of a widely used data driven classification/modeling strategy.

  4. The SIFT Code Specification

    Science.gov (United States)

    1983-01-01

    The specification of Software Implemented Fault Tolerance (SIFT) consists of two parts, the specifications of the SIFT models and the specifications of the SIFT PASCAL program which actually implements the SIFT system. The code specifications are the last of a hierarchy of models describing the operation of the SIFT system and are related to the SIFT models as well as the PASCAL program. These Specifications serve to link the SIFT models to the running program. The specifications are very large and detailed and closely follow the form and organization of the PASCAL code. In addition to describing each of the components of the SIFT code, the code specifications describe the assumptions of the upper SIFT models which are required to actually prove that the code will work as specified. These constraints are imposed primarily on the schedule tables.

  5. Programming Scala Scalability = Functional Programming + Objects

    CERN Document Server

    Wampler, Dean

    2009-01-01

    Learn how to be more productive with Scala, a new multi-paradigm language for the Java Virtual Machine (JVM) that integrates features of both object-oriented and functional programming. With this book, you'll discover why Scala is ideal for highly scalable, component-based applications that support concurrency and distribution. Programming Scala clearly explains the advantages of Scala as a JVM language. You'll learn how to leverage the wealth of Java class libraries to meet the practical needs of enterprise and Internet projects more easily. Packed with code examples, this book provides us

  6. Mantis: Predicting System Performance through Program Analysis and Modeling

    CERN Document Server

    Chun, Byung-Gon; Lee, Sangmin; Maniatis, Petros; Naik, Mayur

    2010-01-01

    We present Mantis, a new framework that automatically predicts program performance with high accuracy. Mantis integrates techniques from programming language and machine learning for performance modeling, and is a radical departure from traditional approaches. Mantis extracts program features, which are information about program execution runs, through program instrumentation. It uses machine learning techniques to select features relevant to performance and creates prediction models as a function of the selected features. Through program analysis, it then generates compact code slices that compute these feature values for prediction. Our evaluation shows that Mantis can achieve more than 93% accuracy with less than 10% training data set, which is a significant improvement over models that are oblivious to program features. The system generates code slices that are cheap to compute feature values.

  7. MACHINING OPTIMISATION AND OPERATION ALLOCATION FOR NC LATHE MACHINES IN A JOB SHOP MANUFACTURING SYSTEM

    Directory of Open Access Journals (Sweden)

    MUSSA I. MGWATU

    2013-08-01

    Full Text Available Numerical control (NC machines in a job shop may not be cost and time effective if the assignment of cutting operations and optimisation of machining parameters are overlooked. In order to justify better utilisation and higher productivity of invested NC machine tools, it is necessary to determine the optimum machining parameters and realize effective assignment of cutting operations on machines. This paper presents two mathematical models for optimising machining parameters and effectively allocating turning operations on NC lathe machines in a job shop manufacturing system. The models are developed as non-linear programming problems and solved using a commercial LINGO software package. The results show that the decisions of machining optimisation and operation allocation on NC lathe machines can be simultaneously made while minimising both production cost and cycle time. In addition, the results indicate that production cost and cycle time can be minimised while significantly reducing or totally eliminating idle times among machines.

  8. Phase 3 of a Brushless Doubly-Fed Machine System Development Program : Final Technical Report for Period January 1, 1992-June 30, 1993.

    Energy Technology Data Exchange (ETDEWEB)

    Alexander, Gerald C.; Spee, Rene; Wallace, Alan K.

    1993-12-31

    Since the inception of the BDFM development program in 1989, the value of BDFM technology has become apparent. The BDFM provides for adjustable speed, synchronous operation while keeping costs associated with the required power conversion equipment lower than in competing technologies. This provides for an advantage in initial as well as maintenance expenses over conventional drive system. Thus, the BDFM enables energy efficient, adjustable speed process control for applications where established drive technology has not been able to deliver satisfactory returns on investment. At the same time, the BDFM challenges conventional drive technologies in established markets by providing for improved performance at lower cost. BDFM converter rating is kept at a minimum, which significantly improves power quality at the utility interface over competing power conversion equipment. In summary, BDFM technology can be expected to provide significant benefits to utilities as well as their customers. This report discusses technical research and development activities related to Phase 3 of the Brushless Doubly-Fed Machine System Development Program, including work made possible by supplemental funds for laboratory improvement and prototype construction. Market research for the BDFM was provided by the College of Business at Oregon State University; market study results will be discussed in a separate report.

  9. A TURBO PASCAL PROGRAM TO CONVERT ICD-9CM CODED INJURY DIAGNOSES INTO INJURY SEVERITY SCORES - ICDTOAIS

    NARCIS (Netherlands)

    KINGMA, J; TENVERGERT, E; WERKMAN, HA; TENDUIS, HJ; KLASEN, HJ

    1994-01-01

    Diagnoses of injuries as a result Of trauma are commonly coded by means of the International Classification of Diseases (9th rev.) Clinical Modification (ICD-9CM). The Abbreviated Injury Scale (AIS) is frequently employed to assess the severity of injury per body region. The Injury Severity Score (I

  10. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...

  11. The Design of the Tool Change Control Program of Mechanical Hand in Machining Center%加工中心机械手换刀控制程序的设计

    Institute of Scientific and Technical Information of China (English)

    李明

    2015-01-01

    Mechanical hand in machining center changes tool by using ladder diagram combining with the macro program. The amount of the program editing is small and the logic of time is convenient to control. The key points considered in compiling the program are the keys to solve program design.%加工中心机械手换刀运用梯形图结合宏程序来实现,程序编写量小,时序控制方便。程序编写中考虑的要点是解决程序设计关键。

  12. Using Machine Learning to Predict Swine Movements within a Regional Program to Improve Control of Infectious Diseases in the US.

    Science.gov (United States)

    Valdes-Donoso, Pablo; VanderWaal, Kimberly; Jarvis, Lovell S; Wayne, Spencer R; Perez, Andres M

    2017-01-01

    Between-farm animal movement is one of the most important factors influencing the spread of infectious diseases in food animals, including in the US swine industry. Understanding the structural network of contacts in a food animal industry is prerequisite to planning for efficient production strategies and for effective disease control measures. Unfortunately, data regarding between-farm animal movements in the US are not systematically collected and thus, such information is often unavailable. In this paper, we develop a procedure to replicate the structure of a network, making use of partial data available, and subsequently use the model developed to predict animal movements among sites in 34 Minnesota counties. First, we summarized two networks of swine producing facilities in Minnesota, then we used a machine learning technique referred to as random forest, an ensemble of independent classification trees, to estimate the probability of pig movements between farms and/or markets sites located in two counties in Minnesota. The model was calibrated and tested by comparing predicted data and observed data in those two counties for which data were available. Finally, the model was used to predict animal movements in sites located across 34 Minnesota counties. Variables that were important in predicting pig movements included between-site distance, ownership, and production type of the sending and receiving farms and/or markets. Using a weighted-kernel approach to describe spatial variation in the centrality measures of the predicted network, we showed that the south-central region of the study area exhibited high aggregation of predicted pig movements. Our results show an overlap with the distribution of outbreaks of porcine reproductive and respiratory syndrome, which is believed to be transmitted, at least in part, though animal movements. While the correspondence of movements and disease is not a causal test, it suggests that the predicted network may approximate

  13. Using Machine Learning to Predict Swine Movements within a Regional Program to Improve Control of Infectious Diseases in the US

    Science.gov (United States)

    Valdes-Donoso, Pablo; VanderWaal, Kimberly; Jarvis, Lovell S.; Wayne, Spencer R.; Perez, Andres M.

    2017-01-01

    Between-farm animal movement is one of the most important factors influencing the spread of infectious diseases in food animals, including in the US swine industry. Understanding the structural network of contacts in a food animal industry is prerequisite to planning for efficient production strategies and for effective disease control measures. Unfortunately, data regarding between-farm animal movements in the US are not systematically collected and thus, such information is often unavailable. In this paper, we develop a procedure to replicate the structure of a network, making use of partial data available, and subsequently use the model developed to predict animal movements among sites in 34 Minnesota counties. First, we summarized two networks of swine producing facilities in Minnesota, then we used a machine learning technique referred to as random forest, an ensemble of independent classification trees, to estimate the probability of pig movements between farms and/or markets sites located in two counties in Minnesota. The model was calibrated and tested by comparing predicted data and observed data in those two counties for which data were available. Finally, the model was used to predict animal movements in sites located across 34 Minnesota counties. Variables that were important in predicting pig movements included between-site distance, ownership, and production type of the sending and receiving farms and/or markets. Using a weighted-kernel approach to describe spatial variation in the centrality measures of the predicted network, we showed that the south-central region of the study area exhibited high aggregation of predicted pig movements. Our results show an overlap with the distribution of outbreaks of porcine reproductive and respiratory syndrome, which is believed to be transmitted, at least in part, though animal movements. While the correspondence of movements and disease is not a causal test, it suggests that the predicted network may approximate

  14. GOOGLE SUMMER OF CODE

    National Research Council Canada - National Science Library

    Leslie Hawthorn

    2008-01-01

      This article examines the Google Summer of Code (GSoC) program, the world's first global initiative to introduce College and University students to free/libre open source software (F/LOSS) development...

  15. Machine testning

    DEFF Research Database (Denmark)

    De Chiffre, Leonardo

    This document is used in connection with a laboratory exercise of 3 hours duration as a part of the course GEOMETRICAL METROLOGY AND MACHINE TESTING. The exercise includes a series of tests carried out by the student on a conventional and a numerically controled lathe, respectively. This document...

  16. Representational Machines

    DEFF Research Database (Denmark)

    Petersson, Dag; Dahlgren, Anna; Vestberg, Nina Lager

    to the enterprises of the medium. This is the subject of Representational Machines: How photography enlists the workings of institutional technologies in search of establishing new iconic and social spaces. Together, the contributions to this edited volume span historical epochs, social environments, technological...

  17. The path of code linting

    CERN Document Server

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  18. Computer programs in BASIC language for atomic absorption flame spectroscopy. Part 2. Documentation. [SEMIAUTOMATIC, RANDOM, and BRACKET codes

    Energy Technology Data Exchange (ETDEWEB)

    Boyle, W.G. Jr.

    1977-10-28

    There are three computer programs, written in the BASIC language, used for taking data from an atomic absorption spectrophotometer operating in the flame mode. The programs are divided into logical sections, and these have been flow-charted. The general features, the structure, the order of subroutines and functions, and the storage of data are discussed. In addition, variables are listed and defined, and a complete listing of each program with a symbol occurrence table is provided.

  19. Abstract quantum computing machines and quantum computational logics

    Science.gov (United States)

    Chiara, Maria Luisa Dalla; Giuntini, Roberto; Sergioli, Giuseppe; Leporini, Roberto

    2016-06-01

    Classical and quantum parallelism are deeply different, although it is sometimes claimed that quantum Turing machines are nothing but special examples of classical probabilistic machines. We introduce the concepts of deterministic state machine, classical probabilistic state machine and quantum state machine. On this basis, we discuss the question: To what extent can quantum state machines be simulated by classical probabilistic state machines? Each state machine is devoted to a single task determined by its program. Real computers, however, behave differently, being able to solve different kinds of problems. This capacity can be modeled, in the quantum case, by the mathematical notion of abstract quantum computing machine, whose different programs determine different quantum state machines. The computations of abstract quantum computing machines can be linguistically described by the formulas of a particular form of quantum logic, termed quantum computational logic.

  20. Agent Based Computing Machine

    Science.gov (United States)

    2005-12-09

    be used in Phase 2 to accomplish the following enhancements. Due to the speed and support of MPI for C/C++ on Beowulf clusters , these languages could...1.7 ABC Machine Formal Definition 24 1.8 Computational Analysis 31 1.9 Programming Concepts 34 1.10 Cluster Mapping 38 1.11 Phase 1 Results 43 2...options for hardware implementation are explored including an emulation with a high performance cluster , a high performance silicon chip and the

  1. National Aviation Fuel Scenario Analysis Program (NAFSAP). Volume I. Model Description. Volume II. User Manual.

    Science.gov (United States)

    1980-03-01

    TESI CHART NATIONAI RUREAt (F ANDA[)Rt 1V4 A NATIONAL. AVIATION ~ FUEL SCENARIO.. ANALYSIS PROGRAM 49!! VOLUM I: MODEL DESCRIA~v 4<C VOLUME II: tr)ER...executes post processor which translates results of the graphics program to machine readable code used by the pen plotter) cr (depressing the carriage

  2. Adding machine and calculating machine

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1642 the French mathematician Blaise Pascal(1623-1662) invented a machine;.that could add and subtract. It had.wheels that each had: 1 to 10 marked off along its circumference. When the wheel at the right, representing units, made one complete circle, it engaged the wheel to its left, represents tens, and moved it forward one notch.

  3. The method machining outer contour based on G71 instruction and the macro program%应用 G71指令和宏程序编程的外圆加工方法

    Institute of Scientific and Technical Information of China (English)

    刘健; 王静婷; 蔡军; 刘玮; 王浩程

    2014-01-01

    轴类零件的外圆加工是车削加工的主要内容之一,对于待切削量较大的外圆,通常采用G71或者G73进行循环粗切削,再利用G70进行外圆精加工。但是简单地采用G71或者G73都有其局限性和弊端,而将两者结合使用需考虑的工艺分析过程一般较复杂;另外,G73的加工效率较低且对外圆车刀角度的限制较大。提出一种基于G71循环指令和宏程序编程的轴类零件外圆加工方法,对切削区域的凸域进行G71编程、凹域进行宏程序编程,试验证明,基于该方法编写的数控程序加工精度高、效率高且经济安全。%The machining of outer contour is one of the main contents machining shaft parts .When the cutting quantity is large , the instructions G71 or G73 will be used generally to machine roughly;then finishing will be finished by G70.It is limited using G71 or G73 simply.However,it is complex needing to think about more process analysis if combining with the use of G 71 and G73.What’s more,the machining efficiency of G73 is lower and the limits to the turning tools are larger .A method machining outer contour based on G 71 instruction and the macro program is proposed .The convex domain of cutting area will be machined based on G71,and the concave region will be machined based on the macro program .It is proved that the machining precision and safety is high and the machining efficiency is fast by examples .

  4. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    discusses code as the artist’s material and, further, formulates a critique of Cramer. The seductive magic in computer-generated art does not lie in the magical expression, but nor does it lie in the code/material/text itself. It lies in the nature of code to do something – as if it was magic......Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  5. The Liege Oscillation Code

    CERN Document Server

    Scuflaire, R; Théado, S; Bourge, P -O; Miglio, A; Godart, M; Thoul, A; Noels, A

    2007-01-01

    The Liege Oscillation code can be used as a stand-alone program or as a library of subroutines that the user calls from a Fortran main program of his own to compute radial and non-radial adiabatic oscillations of stellar models. We describe the variables and the equations used by the program and the methods used to solve them. A brief account is given of the use and the output of the program.

  6. 基于制造特征的三轴高速铣削数控自动编程技术%MACHINING-FEATURE BASED 3-AXIS AUTOMATIC NC PROGRAMMING FOR HIGH-SPEED MILLING

    Institute of Scientific and Technical Information of China (English)

    孙全平; 汪通悦; 廖文和; 何宁

    2007-01-01

    运用面向对象技术,描述了待加工件的制造特征.利用模糊最大隶属原则,实现了加工区域几何制造特征的识别.以高速加工工艺数据库和范例库为支撑,采用IFTHEN规则和模糊匹配方法,提取出了适合高速铣削加工的工艺信息.提出了以切削时间短、加工成本低、表面质量高为目标的工艺方案寻优模型,该模型有助于形成成功的加工范例.依据已有加工范例和提取的工艺信息,实现了3轴高速铣削加工的自动编程.%Machining-features of the workplace are described by using of the object-oriented (O-O) technology. Geometrical machining-features are recognized in the given cut region by using the maximum membership priciple about the fuzzy set. Depending on the IF-THEN rule and the fuzzy matching method, the rough information of the machining-process for high-speed milling (HSM) is extracted based on the database of machining-process for HSM. The optimization model of machining-process scheme is established to obtain shorter cut time, lower cost or higher surface quality. It is helpful to form successful cases for HSM. NC programming for HSM is realized according to optimized machining-process data from HSM cases selected by the optimization model and the extracted information of machining-process.

  7. Genesis machines

    CERN Document Server

    Amos, Martyn

    2014-01-01

    Silicon chips are out. Today's scientists are using real, wet, squishy, living biology to build the next generation of computers. Cells, gels and DNA strands are the 'wetware' of the twenty-first century. Much smaller and more intelligent, these organic computers open up revolutionary possibilities. Tracing the history of computing and revealing a brave new world to come, Genesis Machines describes how this new technology will change the way we think not just about computers - but about life itself.

  8. Reservation System for machine time in the laboratories of the University of Information Sciences

    Directory of Open Access Journals (Sweden)

    Omar Mar Cornelio

    2013-12-01

    Full Text Available In organizations that many people have access to services of machine time, it requires proper planning and control. At the University of Computer Sciences, is done through pre-printed models which generates an inefficient management and poor quality service. In this paper we describe the solution of this problem from the computerization of the process for which was coded using a programming language such as PHP5 on Eclipse Integrated Development Environment with CodeIgniter framework, MySQL as a delivery system database. The system also has a set of reports that facilitate decision making to managers such as availability, location number reserved among others.

  9. The Implications of Virtual Machine Introspection for Digital Forensics on Nonquiescent Virtual Machines

    Science.gov (United States)

    2011-06-01

    TERMS Virtual Machine Introspection, VMI , Virtual Machine, Forensics, Xen 15. NUMBER OF PAGES 61 16. PRICE CODE 17. SECURITY CLASSIFICATION OF...taken for VMI memory dump utility to run with different loads ...........22 x THIS PAGE INTENTIONALLY LEFT BLANK xi LIST OF TABLES Table 1...Time to compile kernel without VMI ..............................................................20 Table 2. Time to compile kernel with VMI

  10. Untyped Memory in the Java Virtual Machine

    DEFF Research Database (Denmark)

    Gal, Andreas; Probst, Christian; Franz, Michael

    2005-01-01

    We have implemented a virtual execution environment that executes legacy binary code on top of the type-safe Java Virtual Machine by recompiling native code instructions to type-safe bytecode. As it is essentially impossible to infer static typing into untyped machine code, our system emulates...... untyped memory on top of Java’s type system. While this approach allows to execute native code on any off-the-shelf JVM, the resulting runtime performance is poor. We propose a set of virtual machine extensions that add type-unsafe memory objects to JVM. We contend that these JVM extensions do not relax...... Java’s type system as the same functionality can be achieved in pure Java, albeit much less efficiently....

  11. Source Code Migration of CUDA Program to Cell Platform%CUDA程序到Cell平台的源代码移植

    Institute of Scientific and Technical Information of China (English)

    岳峰; 庞建民; 张一弛; 余勇

    2012-01-01

    相对于传统的串行程序移植,并行系统间的代码移植因体系结构间的巨大差异而变得极为复杂.为此,针对统一计算设备架构(CUDA)程序向其他异构多核平台的移植,提出CUDA架构到Cell的映射方案.通过模型映射、并行粒度提升、共享变量清除和运行时优化,使CUDA程序的大规模并行线程可以在Cell平台上正确执行.实验结果证明,翻译后的程序在Cell的执行效率可达到Cell平台上手动编写程序的72%.%Compared with traditional serial program migration, parallel program migration becomes sophisticated for the huge diversity of different architectures. To migrate Compute Unified Device Architecture(CUDA) programs to other heterogeneous multi-cores, a method of mapping CUDA architecture to Ceil is proposed. Through executing model mapping, enhancing paraliei granularity, memory mapping and optimization, the mass threads in CUDA can execute correctly in Cell architecture by source code migration. Experimental result shows the executing speed of translated programs can achieve 72% of native compiled programs.

  12. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  13. Programming in Biomolecular Computation

    DEFF Research Database (Denmark)

    Hartmann, Lars; Jones, Neil; Simonsen, Jakob Grue

    2010-01-01

    Our goal is to provide a top-down approach to biomolecular computation. In spite of widespread discussion about connections between biology and computation, one question seems notable by its absence: Where are the programs? We introduce a model of computation that is evidently programmable......, by programs reminiscent of low-level computer machine code; and at the same time biologically plausible: its functioning is defined by a single and relatively small set of chemical-like reaction rules. Further properties: the model is stored-program: programs are the same as data, so programs are not only...... in a strong sense: a universal algorithm exists, that is able to execute any program, and is not asymptotically inefficient. A prototype model has been implemented (for now in silico on a conventional computer). This work opens new perspectives on just how computation may be specified at the biological level....

  14. Ocean Thermal Energy Conversion power system development. Phase I: preliminary design. Final report. [OSAP-1 code; OTEC Steady-State Analysis Program

    Energy Technology Data Exchange (ETDEWEB)

    Westerberg, Arthur

    1978-12-04

    The following appendices are included: highlights of direction and correspondence; user manual for OTEC Steady-State Analysis Program (OSAP-1); sample results of OSAP-1; surface condenser installations; double-clad systems; aluminum alloy seawater piping; references searched for ammonia evaluation; references on stress-corrosion for ammonia; references on anhydrous ammonia storage; references on miscellaneous ammonia items; OTEC materials testing; test reports; OTEC technical specification chlorination system; OTEC technical specification AMERTAP system; OTEC optimization program users guide; concrete hull construction; weight and stability estimates; packing factor data; machinery and equipment list; letter from HPTI on titanium tubes; tables on Wolverine Korodense tubes; evaporator and condenser enhancement tables; code weld titanium tube price, weight tables Alcoa tubing tables; Union Carbide tubing pricing tables; turbotec tubing pricing tables; Wolverine tubing pricing tables; Union Carbide tubing characteristics and pricing; working fluids and turbines for OTEC power system; and hydrodynamic design of prototype OTEC cold and warm seawater pumps. (WHK)

  15. Analogy Mapping Development for Learning Programming

    Science.gov (United States)

    Sukamto, R. A.; Prabawa, H. W.; Kurniawati, S.

    2017-02-01

    Programming skill is an important skill for computer science students, whereas nowadays, there many computer science students are lack of skills and information technology knowledges in Indonesia. This is contrary with the implementation of the ASEAN Economic Community (AEC) since the end of 2015 which is the qualified worker needed. This study provided an effort for nailing programming skills by mapping program code to visual analogies as learning media. The developed media was based on state machine and compiler principle and was implemented in C programming language. The state of every basic condition in programming were successful determined as analogy visualization.

  16. Degradation and oxidation of B{sub 4}C control rod segments at high temperatures. A review and code interpretation of the BECARRE program

    Energy Technology Data Exchange (ETDEWEB)

    Luze, O. de, E-mail: olivier.de-luze@irsn.fr [Institut de Radioprotection et de Sûreté Nucléaire, PSN-RES, SEMIA, LIMAR, BP 3, F-13115 St Paul Lez Durance Cedex (France)

    2013-06-15

    The paper gives a code-based interpretation of the experimental BECARRE program carried out at the “Institut de Radioprotection et de Sureté Nucléaire” (IRSN) between 2005 and 2010, using the severe accident (SA) code ASTEC/ICARE. As part of the International Source Term Program (ISTP), the BECARRE program focuses on boron carbide (B4C) effects during SA conditions, when B4C is used as an absorber material in French PWRs. Steam oxidation of solid B4C pellets (at 1200–1800 °C), as well as oxidation of molten B4C bearing mixtures up to 9 wt% of B4C dissolution (at 1289–1527 °C) are studied, as well as degradation of 60 cm-long control rod (CR) segments representative of a PWR geometry (up to ∼2000 °C). Temperature and outlet gas releases (steam, H{sub 2}, CO, CO{sub 2}) measured in line, and post-test examinations (radiography, tomography, microscopic examinations) give available data to code validation and interpretation. The oxidation rates of the B4C bearing melts have been found always lower than the rates of the solid pellet oxidation in similar conditions, as modeled in ASTEC. For the degradation of the CRs, it is shown that for temperature above 1600 °C, the main effect of the B4C is more toward a mitigation of the hydrogen production rather than increasing it by additional oxidation of boron compounds. No large increases of the hydrogen release after the failure of the guide tube (GT) have been measured, due to downward relocation of the low viscosity B4C bearing melts inside the 60 cm-height CR segments. The ZrO{sub 2} oxide layer formed on the outer surface of the GT has been found very protective, leading to failure only above 1650 °C. Both isothermal and runaway thermal conditions have been used to bring about limited GT failure showing that the main mechanisms leading to failure are linked to deformation of the initial geometry, close contacts between materials, and subsequent eutectic material formations. Such a limited degradation for

  17. Realization of graphic automatic programming in flame cutting machine system%图形自动编程在火焰切割机系统开发中的实现

    Institute of Scientific and Technical Information of China (English)

    杨旭; 董玉德; 余来宏; 李东亚; 张震霄

    2014-01-01

    In order to improve the efficiency of the cutting machine ,CNC flame cutting machine based on the automatic programming with C+ + language is developed .This system has implemented the process-ing of graphic files and the loading of machining program ,automatic cutting ,back to the original track cutting function .The solution of the key problem is proposed ,such as the processing for single-ring or multi-ring graph ,slotted compensation ,adding the lead-cutting ,process simulation and tracking .The system has been successfully applied to CNC flame cutting machine .%为提高切割机效率,应用C++语言,开发出一套基于图形自动编程的火焰切割机数控系统。系统实现了图形文件的处理与加工程序的读取,自动切割加工,原迹返回加工等功能;提出单环和套环图形的处理,气体半径补偿,添加切入引线,加工过程的仿真跟踪等关键问题的解决方法。该数控系统已成功应用于企业的火焰切割机中。

  18. NASA-Enhanced Version Of Automatically Programmed Tool Software (APT)

    Science.gov (United States)

    Purves, L. R.

    1989-01-01

    APT code one of most widely used software tools for complex numerically-controlled machining. Both a programming language and software that processes language. Upgrades include super pocket for concave polygon pockets and editor to reprocess cutter location coordinates according to user-supplied commands.

  19. Simulating Turing machines on Maurer machines

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2008-01-01

    In a previous paper, we used Maurer machines to model and analyse micro-architectures. In the current paper, we investigate the connections between Turing machines and Maurer machines with the purpose to gain an insight into computability issues relating to Maurer machines. We introduce ways to

  20. MHD Generation Code

    OpenAIRE

    Frutos-Alfaro, Francisco; Carboni-Mendez, Rodrigo

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a c...

  1. Environmentally Friendly Machining

    CERN Document Server

    Dixit, U S; Davim, J Paulo

    2012-01-01

    Environment-Friendly Machining provides an in-depth overview of environmentally-friendly machining processes, covering numerous different types of machining in order to identify which practice is the most environmentally sustainable. The book discusses three systems at length: machining with minimal cutting fluid, air-cooled machining and dry machining. Also covered is a way to conserve energy during machining processes, along with useful data and detailed descriptions for developing and utilizing the most efficient modern machining tools. Researchers and engineers looking for sustainable machining solutions will find Environment-Friendly Machining to be a useful volume.

  2. Authorship Attribution of Source Code

    Science.gov (United States)

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  3. Machine learning an artificial intelligence approach

    CERN Document Server

    Banerjee, R; Bradshaw, Gary; Carbonell, Jaime Guillermo; Mitchell, Tom Michael; Michalski, Ryszard Spencer

    1983-01-01

    Machine Learning: An Artificial Intelligence Approach contains tutorial overviews and research papers representative of trends in the area of machine learning as viewed from an artificial intelligence perspective. The book is organized into six parts. Part I provides an overview of machine learning and explains why machines should learn. Part II covers important issues affecting the design of learning programs-particularly programs that learn from examples. It also describes inductive learning systems. Part III deals with learning by analogy, by experimentation, and from experience. Parts IV a

  4. Machine Transliteration

    CERN Document Server

    Knight, K; Knight, Kevin; Graehl, Jonathan

    1997-01-01

    It is challenging to translate names and technical terms across languages with different alphabets and sound inventories. These items are commonly transliterated, i.e., replaced with approximate phonetic equivalents. For example, "computer" in English comes out as "konpyuutaa" in Japanese. Translating such items from Japanese back to English is even more challenging, and of practical interest, as transliterated items make up the bulk of text phrases not found in bilingual dictionaries. We describe and evaluate a method for performing backwards transliterations by machine. This method uses a generative model, incorporating several distinct stages in the transliteration process.

  5. DESIGNING OF COMPUTER AIDED AND USER INTERACTIVE CNC PART PROGRAMME FOR A MILLING MACHINE

    Directory of Open Access Journals (Sweden)

    M. Ali DÖNERTAŞ

    2005-02-01

    Full Text Available In this study, a user–interactive computer programme generating CNC part programme according to dialog method has been developed. The design of programme has been prepared like a CAM programme structure. The part programme was established by required parameters asking to the user with a specific order. Subsequently, this parameters are used to create M and G codes, and these codes are showed at a different page on the screen. In addition, these code pages can be stored with "txt" format. This program includes basic processes and the programme design has been prepared for milling machine working according to Fanuc system. The computer programme was written by using Delphi 6 programming language.

  6. Task-Based Assessment of Students' Computational Thinking Skills Developed through Visual Programming or Tangible Coding Environments

    Science.gov (United States)

    Djambong, Takam; Freiman, Viktor

    2016-01-01

    While today's schools in several countries, like Canada, are about to bring back programming to their curricula, a new conceptual angle, namely one of computational thinking, draws attention of researchers. In order to understand the articulation between computational thinking tasks in one side, student's targeted skills, and the types of problems…

  7. Plug into 'the modernizing machine'!

    DEFF Research Database (Denmark)

    Krejsler, John B.

    2013-01-01

    ‘The modernizing machine’ codes individual bodies, things and symbols with images from New Public Management, neoliberal and Knowledge Economy discourses. Drawing on Deleuze & Guattari’s concept of machines, this article explores how ‘the modernizing machine’ produces neo-liberal modernization...... of the public sector. Taking its point of departure in Danish university reform, the article explores how the university is transformed by this desiring-producing machine. ‘The modernizing machine’ wrestles with the so-called ‘democratic-Humboldtian machine’. The University Act of 2003 and the host of reforms...... bodies and minds simultaneously produce academic subjectivities by plugging into these transformative machinic forces and are produced as they are traversed by them. What is experienced as stressful closures vis-à-vis new opportunities depends to a great extent upon how these producing...

  8. Study of on-machine error identification and compensation methods for micro machine tools

    Science.gov (United States)

    Wang, Shih-Ming; Yu, Han-Jen; Lee, Chun-Yi; Chiu, Hung-Sheng

    2016-08-01

    Micro machining plays an important role in the manufacturing of miniature products which are made of various materials with complex 3D shapes and tight machining tolerance. To further improve the accuracy of a micro machining process without increasing the manufacturing cost of a micro machine tool, an effective machining error measurement method and a software-based compensation method are essential. To avoid introducing additional errors caused by the re-installment of the workpiece, the measurement and compensation method should be on-machine conducted. In addition, because the contour of a miniature workpiece machined with a micro machining process is very tiny, the measurement method should be non-contact. By integrating the image re-constructive method, camera pixel correction, coordinate transformation, the error identification algorithm, and trajectory auto-correction method, a vision-based error measurement and compensation method that can on-machine inspect the micro machining errors and automatically generate an error-corrected numerical control (NC) program for error compensation was developed in this study. With the use of the Canny edge detection algorithm and camera pixel calibration, the edges of the contour of a machined workpiece were identified and used to re-construct the actual contour of the work piece. The actual contour was then mapped to the theoretical contour to identify the actual cutting points and compute the machining errors. With the use of a moving matching window and calculation of the similarity between the actual and theoretical contour, the errors between the actual cutting points and theoretical cutting points were calculated and used to correct the NC program. With the use of the error-corrected NC program, the accuracy of a micro machining process can be effectively improved. To prove the feasibility and effectiveness of the proposed methods, micro-milling experiments on a micro machine tool were conducted, and the results

  9. Machine Protection

    CERN Document Server

    Schmidt, R

    2014-01-01

    The protection of accelerator equipment is as old as accelerator technology and was for many years related to high-power equipment. Examples are the protection of powering equipment from overheating (magnets, power converters, high-current cables), of superconducting magnets from damage after a quench and of klystrons. The protection of equipment from beam accidents is more recent. It is related to the increasing beam power of high-power proton accelerators such as ISIS, SNS, ESS and the PSI cyclotron, to the emission of synchrotron light by electron–positron accelerators and FELs, and to the increase of energy stored in the beam (in particular for hadron colliders such as LHC). Designing a machine protection system requires an excellent understanding of accelerator physics and operation to anticipate possible failures that could lead to damage. Machine protection includes beam and equipment monitoring, a system to safely stop beam operation (e.g. dumping the beam or stopping the beam at low energy) and an ...

  10. TURING MACHINE AS UNIVERSAL ALGORITHM EXECUTOR AND ITS APPLICATION IN THE PROCESS OF HIGH-SCHOOL STUDENTS` ADVANCED STUDY OF ALGORITHMIZATION AND PROGRAMMING FUNDAMENTALS

    Directory of Open Access Journals (Sweden)

    Oleksandr B. Yashchyk

    2016-05-01

    Full Text Available The article discusses the importance of studying the notion of algorithm and its formal specification using Turing machines. In the article it was identified the basic hypothesis of the theory of algorithms for Turing as well as reviewed scientific research of modern scientists devoted to this issue and found the main principles of the Turing machine as an abstract mathematical model. The process of forming information competencies components, information culture and students` logical thinking development with the inclusion of the topic “Study and Application of Turing machine as Universal Algorithm Executor” in the course of Informatics was analyzed.

  11. Diamond Measuring Machine

    Energy Technology Data Exchange (ETDEWEB)

    Krstulic, J.F.

    2000-01-27

    The fundamental goal of this project was to develop additional capabilities to the diamond measuring prototype, work out technical difficulties associated with the original device, and perform automated measurements which are accurate and repeatable. For this project, FM and T was responsible for the overall system design, edge extraction, and defect extraction and identification. AccuGem provided a lab and computer equipment in Lawrence, 3D modeling, industry expertise, and sets of diamonds for testing. The system executive software which controls stone positioning, lighting, focusing, report generation, and data acquisition was written in Microsoft Visual Basic 6, while data analysis and modeling were compiled in C/C++ DLLs. All scanning parameters and extracted data are stored in a central database and available for automated analysis and reporting. The Phase 1 study showed that data can be extracted and measured from diamond scans, but most of the information had to be manually extracted. In this Phase 2 project, all data required for geometric modeling and defect identification were automatically extracted and passed to a 3D modeling module for analysis. Algorithms were developed which automatically adjusted both light levels and stone focus positioning for each diamond-under-test. After a diamond is analyzed and measurements are completed, a report is printed for the customer which shows carat weight, summarizes stone geometry information, lists defects and their size, displays a picture of the diamond, and shows a plot of defects on a top view drawing of the stone. Initial emphasis of defect extraction was on identification of feathers, pinpoints, and crystals. Defects were plotted color-coded by industry standards for inclusions (red), blemishes (green), and unknown defects (blue). Diamonds with a wide variety of cut quality, size, and number of defects were tested in the machine. Edge extraction, defect extraction, and modeling code were tested for

  12. Aeroelastic code development activities in the United States

    Energy Technology Data Exchange (ETDEWEB)

    Wright, A.D. [National Renewable Energy Lab., Golden, Colorado (United States)

    1996-09-01

    Designing wind turbines to be fatigue resistant and to have long lifetimes at minimal cost is a major goal of the federal wind program and the wind industry in the United States. To achieve this goal, we must be able to predict critical loads for a wide variety of different wind turbines operating under extreme conditions. The codes used for wind turbine dynamic analysis must be able to analyze a wide range of different wind turbine configurations as well as rapidly predict the loads due to turbulent wind inflow with a minimal set of degrees of freedom. Code development activities in the US have taken a two-pronged approach in order to satisfy both of these criteria: (1) development of a multi-purpose code which can be used to analyze a wide variety of wind turbine configurations without having to develop new equations of motion with each configuration change, and (2) development of specialized codes with minimal sets of specific degrees of freedom for analysis of two- and three-bladed horizontal axis wind turbines and calculation of machine loads due to turbulent inflow. In the first method we have adapted a commercial multi-body dynamics simulation package for wind turbine analysis. In the second approach we are developing specialized codes with limited degrees of freedom, usually specified in the modal domain. This paper will summarize progress to date in the development, validation, and application of these codes. (au) 13 refs.

  13. 程控X线机控制系统实训教学模式的探索%Practice Teaching Mode of Program-controlled X-ray Machine Control System

    Institute of Scientific and Technical Information of China (English)

    尹今扬; 芦静; 陈冰虹; 施珩

    2012-01-01

    Adopting practical teaching mode, the program-controlled X-ray machine control system was devided into five practical teaching module which enables students to learn program-controlled X-ray machine control system by linking theory with practice. After a series of training, the studenls can really combine theoretical knowledge with practice in learning program-controlled X-ray machine control system. The actual practice teaching proves that this teaching mode is of great help to students.%为采用实训教学模式,将程控X线机控制系统的学习设计成5个实训教学模块,使学生学习程控X线机控制系统时理论联系实际.经过系列模块实训,学生在学习程控X线机控制系统过程中,真正做到手脑并用,把理论知识和实际有机地结合起来.1年多的实训教学实践证明,该教学模式对学生的培养和锻炼有很大的帮助.

  14. Army-NASA aircrew/aircraft integration program. Phase 5: A3I Man-Machine Integration Design and Analysis System (MIDAS) software concept document

    Science.gov (United States)

    Banda, Carolyn; Bushnell, David; Chen, Scott; Chiu, Alex; Neukom, Christian; Nishimura, Sayuri; Prevost, Michael; Shankar, Renuka; Staveland, Lowell; Smith, Greg

    1992-01-01

    This is the Software Concept Document for the Man-machine Integration Design and Analysis System (MIDAS) being developed as part of Phase V of the Army-NASA Aircrew/Aircraft Integration (A3I) Progam. The approach taken in this program since its inception in 1984 is that of incremental development with clearly defined phases. Phase 1 began in 1984 and subsequent phases have progressed at approximately 10-16 month intervals. Each phase of development consists of planning, setting requirements, preliminary design, detailed design, implementation, testing, demonstration and documentation. Phase 5 began with an off-site planning meeting in November, 1990. It is expected that Phase 5 development will be complete and ready for demonstration to invited visitors from industry, government and academia in May, 1992. This document, produced during the preliminary design period of Phase 5, is intended to record the top level design concept for MIDAS as it is currently conceived. This document has two main objectives: (1) to inform interested readers of the goals of the MIDAS Phase 5 development period, and (2) to serve as the initial version of the MIDAS design document which will be continuously updated as the design evolves. Since this document is written fairly early in the design period, many design issues still remain unresolved. Some of the unresolved issues are mentioned later in this document in the sections on specific components. Readers are cautioned that this is not a final design document and that, as the design of MIDAS matures, some of the design ideas recorded in this document will change. The final design will be documented in a detailed design document published after the demonstrations.

  15. Analysis of machining and machine tools

    CERN Document Server

    Liang, Steven Y

    2016-01-01

    This book delivers the fundamental science and mechanics of machining and machine tools by presenting systematic and quantitative knowledge in the form of process mechanics and physics. It gives readers a solid command of machining science and engineering, and familiarizes them with the geometry and functionality requirements of creating parts and components in today’s markets. The authors address traditional machining topics, such as: single and multiple point cutting processes grinding components accuracy and metrology shear stress in cutting cutting temperature and analysis chatter They also address non-traditional machining, such as: electrical discharge machining electrochemical machining laser and electron beam machining A chapter on biomedical machining is also included. This book is appropriate for advanced undergraduate and graduate mechani cal engineering students, manufacturing engineers, and researchers. Each chapter contains examples, exercises and their solutions, and homework problems that re...

  16. User's manual for seismic analysis code 'SONATINA-2V'

    Energy Technology Data Exchange (ETDEWEB)

    Hanawa, Satoshi; Iyoku, Tatsuo [Japan Atomic Energy Research Inst., Oarai, Ibaraki (Japan). Oarai Research Establishment

    2001-08-01

    The seismic analysis code, SONATINA-2V, has been developed to analyze the behavior of the HTTR core graphite components under seismic excitation. The SONATINA-2V code is a two-dimensional computer program capable of analyzing the vertical arrangement of the HTTR graphite components, such as fuel blocks, replaceable reflector blocks, permanent reflector blocks, as well as their restraint structures. In the analytical model, each block is treated as rigid body and is restrained by dowel pins which restrict relative horizontal movement but allow vertical and rocking motions between upper and lower blocks. Moreover, the SONATINA-2V code is capable of analyzing the core vibration behavior under both simultaneous excitations of vertical and horizontal directions. The SONATINA-2V code is composed of the main program, pri-processor for making the input data to SONATINA-2V and post-processor for data processing and making the graphics from analytical results. Though the SONATINA-2V code was developed in order to work in the MSP computer system of Japan Atomic Energy Research Institute (JAERI), the computer system was abolished with the technical progress of computer. Therefore, improvement of this analysis code was carried out in order to operate the code under the UNIX machine, SR8000 computer system, of the JAERI. The users manual for seismic analysis code, SONATINA-2V, including pri- and post-processor is given in the present report. (author)

  17. Programming in biomolecular computation

    DEFF Research Database (Denmark)

    Hartmann, Lars Røeboe; Jones, Neil; Simonsen, Jakob Grue

    2010-01-01

    executable, but are also compilable and interpretable. It is universal: all computable functions can be computed (in natural ways and without arcane encodings of data and algorithm); it is also uniform: new “hardware” is not needed to solve new problems; and (last but not least) it is Turing complete......Our goal is to provide a top-down approach to biomolecular computation. In spite of widespread discussion about connections between biology and computation, one question seems notable by its absence: Where are the programs? We introduce a model of computation that is evidently programmable......, by programs reminiscent of low-level computer machine code; and at the same time biologically plausible: its functioning is defined by a single and relatively small set of chemical-like reaction rules. Further properties: the model is stored-program: programs are the same as data, so programs are not only...

  18. Python for probability, statistics, and machine learning

    CERN Document Server

    Unpingco, José

    2016-01-01

    This book covers the key ideas that link probability, statistics, and machine learning illustrated using Python modules in these areas. The entire text, including all the figures and numerical results, is reproducible using the Python codes and their associated Jupyter/IPython notebooks, which are provided as supplementary downloads. The author develops key intuitions in machine learning by working meaningful examples using multiple analytical methods and Python codes, thereby connecting theoretical concepts to concrete implementations. Modern Python modules like Pandas, Sympy, and Scikit-learn are applied to simulate and visualize important machine learning concepts like the bias/variance trade-off, cross-validation, and regularization. Many abstract mathematical ideas, such as convergence in probability theory, are developed and illustrated with numerical examples. This book is suitable for anyone with an undergraduate-level exposure to probability, statistics, or machine learning and with rudimentary knowl...

  19. Holographic codes

    CERN Document Server

    Latorre, Jose I

    2015-01-01

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  20. Reserved-Length Prefix Coding

    CERN Document Server

    Baer, Michael B

    2008-01-01

    Huffman coding finds an optimal prefix code for a given probability mass function. Consider situations in which one wishes to find an optimal code with the restriction that all codewords have lengths that lie in a user-specified set of lengths (or, equivalently, no codewords have lengths that lie in a complementary set). This paper introduces a polynomial-time dynamic programming algorithm that finds optimal codes for this reserved-length prefix coding problem. This has applications to quickly encoding and decoding lossless codes. In addition, one modification of the approach solves any quasiarithmetic prefix coding problem, while another finds optimal codes restricted to the set of codes with g codeword lengths for user-specified g (e.g., g=2).

  1. Optimization of machining techniques – A retrospective and literature review

    Indian Academy of Sciences (India)

    Aman Aggarwal; Hari Singh

    2005-12-01

    In this paper an attempt is made to review the literature on optimizing machining parameters in turning processes. Various conventional techniques employed for machining optimization include geometric programming, geometric plus linear programming, goal programming, sequential unconstrained minimizationtechnique, dynamic programming etc. The latest techniques for optimization include fuzzy logic, scatter search technique, genetic algorithm, Taguchi technique and response surface methodology.

  2. Optimization analysis of parallel codes for single program multiple data%单程序多数据并行程序优化规律分析

    Institute of Scientific and Technical Information of China (English)

    胡悦; 童维勤

    2014-01-01

    In developing parallel programs, effective parallel program optimization can give full play to the hardware and software execution efficiency. In this paper the Amdahl's law was re-observed. Based on this, the optimized changing trends of SPMD parallel codes' computing time and efficiency for data-intensive problems were analyzed, which were demonstrated by equations and could make the most use of Amdahl's law to guide parallel program optimization. The experimental results indicate the effectiveness of the discussions.%在并行程序开发过程中,对并行程序的有效优化能够充分发挥软硬件的执行效率。在进一步探讨Amdahl定律的基础上,针对数据密集型问题的单程序多数据( SPMD)并行计算,分析并行程序被有效优化后其计算时间及并行效率的变化规律,并给出了公式证明,有利于充分利用Amdahl定律指导并行程序的优化。实验结果表明了论证的有效性。

  3. Improvements in the Placet tracking code

    CERN Document Server

    Latina, A; Dalena, B; Schulte, D; Snuverink, J

    2012-01-01

    The tracking code PLACET simulates beam transport and orbit corrections in linear accelerators. It incorporates single- and multi-bunch effects, static and dynamic imperfections. It has an interface based on both Tcl/Tk and Octave to provide maximum flexibility and easy programming of complex scenarios. Recently, new functionalities have been added to expand its simulation and tuning capabilities, such as: tools to perform beam-based alignment of non-linear optical systems, higher order imperfections in magnets, better tools for integrated feedback loops. Moreover, self-contained frameworks have been created to ease the simulation of CLIC Drive Beam, CLIC Main Beam, and other existing electron machines such as CTF3 and FACET.

  4. Sharing code

    OpenAIRE

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  5. New approach to training support vector machine

    Institute of Scientific and Technical Information of China (English)

    Tang Faming; Chen Mianyun; Wang Zhongdong

    2006-01-01

    Support vector machine has become an increasingly popular tool for machine learning tasks involving classification, regression or novelty detection. Training a support vector machine requires the solution of a very large quadratic programming problem. Traditional optimization methods cannot be directly applied due to memory restrictions. Up to now, several approaches exist for circumventing the above shortcomings and work well. Another learning algorithm, particle swarm optimization, for training SVM is introduted. The method is tested on UCI datasets.

  6. Study of Virtual Machine and its application

    Directory of Open Access Journals (Sweden)

    Rohaan Chandra

    2013-07-01

    Full Text Available A virtual machine is software that’s capable of executing programs as if it were a physical machine—it’s a computer within a computer. A virtual machine (VM is a software implemented abstraction of the underlying hardware, which is presented to the application layer of the system. Virtual machines may be based on specifications of a hypothetical computer or emulate the computer architecture and functions of a real world computer.

  7. Audio Signal Generator System Based On State Machines

    Institute of Scientific and Technical Information of China (English)

    王维喜

    2009-01-01

    A state machine can make program designing quicker, simpler and more efficient. This paper describes in detail the model for a state machine and the idea for its designing and gives the design process of the state machine through an example of audio signal generator system based on Labview. The result shows that the introduction of the state machine can make complex design processes more clear and the revision of programs easier.

  8. NC Programming of Non-circular Curve Contour with Equal Error Machining Based on Visual Basic%基于VB的非圆曲线轮廓等误差加工的数控编程

    Institute of Scientific and Technical Information of China (English)

    张明艳; 刘文雯

    2012-01-01

    When a CNC machine tool is used to machine the non-circular curve contour, the node coordintes are calculated first, then the CNC programming is carried out, in order to control the machining error and obtain better surface quality, but its calculation is most cumbersome and complex. This paper designs the non-circular curve contour and node coordinates for equal error machining, uses VB language program format, such as contour error ellipse fitting to achieve the computational and graphical simulation of the curve and gives the VB and macro programs and the conversion relationship between the user and related procedures.%用数控机床对非圆曲线轮廓进行加工时,为了控制加工误差,获得较好的表面品质,需要在数控编程时用一定的算法进行节点坐标的计算,而节点坐标的计算是数控编程数值计算中最烦琐、最复杂的部分.设计了非曲线轮廓等误差加工时节点坐标的算法,利用VB语言程序格式,以椭圆轮廓的等误差拟合为例,实现了对该算法的计算机编程并进行了曲线图形仿真,给出了VB程序与用户宏程序的转换关系及相关程序.

  9. A Fortran 90 code for magnetohydrodynamics

    Energy Technology Data Exchange (ETDEWEB)

    Walker, D.W.

    1992-03-01

    This report describes progress in developing a Fortran 90 version of the KITE code for studying plasma instabilities in Tokamaks. In particular, the evaluation of convolution terms appearing in the numerical solution is discussed, and timing results are presented for runs performed on an 8k processor Connection Machine (CM-2). Estimates of the performance on a full-size 64k CM-2 are given, and range between 100 and 200 Mflops. The advantages of having a Fortran 90 version of the KITE code are stressed, and the future use of such a code on the newly announced CM5 and Paragon computers, from Thinking Machines Corporation and Intel, is considered.

  10. Using Phun to Study ``Perpetual Motion'' Machines

    Science.gov (United States)

    Koreš, Jaroslav

    2012-05-01

    The concept of "perpetual motion" has a long history. The Indian astronomer and mathematician Bhaskara II (12th century) was the first person to describe a perpetual motion (PM) machine. An example of a 13th- century PM machine is shown in Fig. 1. Although the law of conservation of energy clearly implies the impossibility of PM construction, over the centuries numerous proposals for PM have been made, involving ever more elements of modern science in their construction. It is possible to test a variety of PM machines in the classroom using a program called Phun2 or its commercial version Algodoo.3 The programs are designed to simulate physical processes and we can easily simulate mechanical machines using them. They provide an intuitive graphical environment controlled with a mouse; a programming language is not needed. This paper describes simulations of four different (supposed) PM machines.4

  11. Operating System For Numerically Controlled Milling Machine

    Science.gov (United States)

    Ray, R. B.

    1992-01-01

    OPMILL program is operating system for Kearney and Trecker milling machine providing fast easy way to program manufacture of machine parts with IBM-compatible personal computer. Gives machinist "equation plotter" feature, which plots equations that define movements and converts equations to milling-machine-controlling program moving cutter along defined path. System includes tool-manager software handling up to 25 tools and automatically adjusts to account for each tool. Developed on IBM PS/2 computer running DOS 3.3 with 1 MB of random-access memory.

  12. Operating System For Numerically Controlled Milling Machine

    Science.gov (United States)

    Ray, R. B.

    1992-01-01

    OPMILL program is operating system for Kearney and Trecker milling machine providing fast easy way to program manufacture of machine parts with IBM-compatible personal computer. Gives machinist "equation plotter" feature, which plots equations that define movements and converts equations to milling-machine-controlling program moving cutter along defined path. System includes tool-manager software handling up to 25 tools and automatically adjusts to account for each tool. Developed on IBM PS/2 computer running DOS 3.3 with 1 MB of random-access memory.

  13. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  14. Polar Codes

    Science.gov (United States)

    2014-12-01

    QPSK Gaussian channels . .......................................................................... 39 vi 1. INTRODUCTION Forward error correction (FEC...Capacity of BSC. 7 Figure 5. Capacity of AWGN channel . 8 4. INTRODUCTION TO POLAR CODES Polar codes were introduced by E. Arikan in [1]. This paper...Under authority of C. A. Wilgenbusch, Head ISR Division EXECUTIVE SUMMARY This report describes the results of the project “More reliable wireless

  15. Automation of printing machine

    OpenAIRE

    Sušil, David

    2016-01-01

    Bachelor thesis is focused on the automation of the printing machine and comparing the two types of printing machines. The first chapter deals with the history of printing, typesettings, printing techniques and various kinds of bookbinding. The second chapter describes the difference between sheet-fed printing machines and offset printing machines, the difference between two representatives of rotary machines, technological process of the products on these machines, the description of the mac...

  16. Program Development Tools and Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Schulz, M

    2012-03-12

    Exascale class machines will exhibit a new level of complexity: they will feature an unprecedented number of cores and threads, will most likely be heterogeneous and deeply hierarchical, and offer a range of new hardware techniques (such as speculative threading, transactional memory, programmable prefetching, and programmable accelerators), which all have to be utilized for an application to realize the full potential of the machine. Additionally, users will be faced with less memory per core, fixed total power budgets, and sharply reduced MTBFs. At the same time, it is expected that the complexity of applications will rise sharply for exascale systems, both to implement new science possible at exascale and to exploit the new hardware features necessary to achieve exascale performance. This is particularly true for many of the NNSA codes, which are large and often highly complex integrated simulation codes that push the limits of everything in the system including language features. To overcome these limitations and to enable users to reach exascale performance, users will expect a new generation of tools that address the bottlenecks of exascale machines, that work seamlessly with the (set of) programming models on the target machines, that scale with the machine, that provide automatic analysis capabilities, and that are flexible and modular enough to overcome the complexities and changing demands of the exascale architectures. Further, any tool must be robust enough to handle the complexity of large integrated codes while keeping the user's learning curve low. With the ASC program, in particular the CSSE (Computational Systems and Software Engineering) and CCE (Common Compute Environment) projects, we are working towards a new generation of tools that fulfill these requirements and that provide our users as well as the larger HPC community with the necessary tools, techniques, and methodologies required to make exascale performance a reality.

  17. Android Virtual Machine (VM) Setup on Linux

    Science.gov (United States)

    2014-12-01

    Machine (VM) Setup on Linux Ken F Yu Computational and Information Sciences Directorate, ARL...Virtual Machine (VM) Setup on Linux 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Ken F Yu 5d. PROJECT NUMBER

  18. Minimizing Total Earliness and Tardiness for Common Due Date Single-Machine Scheduling with an Unavailability Interval

    Directory of Open Access Journals (Sweden)

    Chinyao Low

    2016-01-01

    Full Text Available This paper addresses the problem of scheduling n independent jobs on a single machine with a fixed unavailability interval, where the aim is to minimize the total earliness and tardiness (TET about a common due date. Two exact methods are proposed for solving the problem: mixed integer linear programming formulations and a dynamic programming based method. These methods are coded and tested intensively on a large data set and the results are analytically compared. Computational experiments show that the dynamic programming method is efficient in obtaining the optimal solutions and no problems due to memory requirement.

  19. Quality Managment Program (QMP) report: A review of quality management programs developed in response to Title 10, Section 35.32 of the Code of Federal Regulations

    Energy Technology Data Exchange (ETDEWEB)

    Witte, M.C.

    1994-10-01

    In July of 1991, the Nuclear Regulatory Commission published a Final Rule in the Federal Register amending regulations governing medical therapeutic administrations of byproduct material and certain uses of radioactive sodium iodide. These amendments required implementation of a Quality Management Program (QMP) to provide high confidence that the byproduct material -- or radiation from byproduct material -- will be administered as directed by an authorized user physician. Herein, this rule is referred to as the QM rule. The Final Rule was published after two proposed rules had been published in the Federal Register.

  20. Teaching Machines to Think Fuzzy

    Science.gov (United States)

    Technology Teacher, 2004

    2004-01-01

    Fuzzy logic programs for computers make them more human. Computers can then think through messy situations and make smart decisions. It makes computers able to control things the way people do. Fuzzy logic has been used to control subway trains, elevators, washing machines, microwave ovens, and cars. Pretty much all the human has to do is push one…

  1. Precision Machining Technology. Curriculum Guide.

    Science.gov (United States)

    Idaho State Dept. of Education, Boise. Div. of Vocational Education.

    This curriculum guide was developed from a Technical Committee Report prepared with the assistance of industry personnel and containing a Task List which is the basis of the guide. It presents competency-based program standards for courses in precision machining technology and is part of the Idaho Vocational Curriculum Guide Project, a cooperative…

  2. A language for easy and efficient modeling of Turing machines

    Institute of Scientific and Technical Information of China (English)

    Pinaki Chakraborty

    2007-01-01

    A Turing Machine Description Language (TMDL) is developed for easy and efficient modeling of Turing machines.TMDL supports formal symbolic representation of Turing machines. The grammar for the language is also provided. Then a fast singlepass compiler is developed for TMDL. The scope of code optimization in the compiler is examined. An interpreter is used to simulate the exact behavior of the compiled Turing machines. A dynamically allocated and resizable array is used to simulate the infinite tape of a Turing machine. The procedure for simulating composite Turing machines is also explained. In this paper, two sample Turing machines have been designed in TMDL and their simulations are discussed. The TMDL can be extended to model the different variations of the standard Turing machine.

  3. PGHPF – An Optimizing High Performance Fortran Compiler for Distributed Memory Machines

    Directory of Open Access Journals (Sweden)

    Zeki Bozkus

    1997-01-01

    Full Text Available High Performance Fortran (HPF is the first widely supported, efficient, and portable parallel programming language for shared and distributed memory systems. HPF is realized through a set of directive-based extensions to Fortran 90. It enables application developers and Fortran end-users to write compact, portable, and efficient software that will compile and execute on workstations, shared memory servers, clusters, traditional supercomputers, or massively parallel processors. This article describes a production-quality HPF compiler for a set of parallel machines. Compilation techniques such as data and computation distribution, communication generation, run-time support, and optimization issues are elaborated as the basis for an HPF compiler implementation on distributed memory machines. The performance of this compiler on benchmark programs demonstrates that high efficiency can be achieved executing HPF code on parallel architectures.

  4. Electrical machines mathematical fundamentals of machine topologies

    CERN Document Server

    Gerling, Dieter

    2015-01-01

    Electrical Machines and Drives play a powerful role in industry with an ever increasing importance. This fact requires the understanding of machine and drive principles by engineers of many different disciplines. Therefore, this book is intended to give a comprehensive deduction of these principles. Special attention is given to the precise mathematical derivation of the necessary formulae to calculate machines and drives and to the discussion of simplifications (if applied) with the associated limits. The book shows how the different machine topologies can be deduced from general fundamentals, and how they are linked together. This book addresses graduate students, researchers, and developers of Electrical Machines and Drives, who are interested in getting knowledge about the principles of machine and drive operation and in detecting the mathematical and engineering specialties of the different machine and drive topologies together with their mutual links. The detailed - but nevertheless compact - mat...

  5. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  6. Laser machining of advanced materials

    CERN Document Server

    Dahotre, Narendra B

    2011-01-01

    Advanced materialsIntroductionApplicationsStructural ceramicsBiomaterials CompositesIntermetallicsMachining of advanced materials IntroductionFabrication techniquesMechanical machiningChemical Machining (CM)Electrical machiningRadiation machining Hybrid machiningLaser machiningIntroductionAbsorption of laser energy and multiple reflectionsThermal effectsLaser machining of structural ceramicsIntrodu

  7. Machine-to-machine communications architectures, technology, standards, and applications

    CERN Document Server

    Misic, Vojislav B

    2014-01-01

    With the number of machine-to-machine (M2M)-enabled devices projected to reach 20 to 50 billion by 2020, there is a critical need to understand the demands imposed by such systems. Machine-to-Machine Communications: Architectures, Technology, Standards, and Applications offers rigorous treatment of the many facets of M2M communication, including its integration with current technology.Presenting the work of a different group of international experts in each chapter, the book begins by supplying an overview of M2M technology. It considers proposed standards, cutting-edge applications, architectures, and traffic modeling and includes case studies that highlight the differences between traditional and M2M communications technology.Details a practical scheme for the forward error correction code designInvestigates the effectiveness of the IEEE 802.15.4 low data rate wireless personal area network standard for use in M2M communicationsIdentifies algorithms that will ensure functionality, performance, reliability, ...

  8. Open architecture controller solution for custom machine systems

    Science.gov (United States)

    Anderson, Ronald L.; Reagin, J. M.; Garner, T. D.; Sweeny, T. E.

    1997-01-01

    In today's marketplace, product quality and price have become requirements for entry and are no longer sufficient to differentiate one's product and gain a competitive advantage. A key to competition in the future will be a company's ability to respond quickly to a rapidly-changing global marketplace. Developers of manufacturing equipment must play a role in the reduction of the product development cycle time by increasing the flexibility of their equipment and decreasing its cost and time to market. This paper will discuss the implementation of an open-architecture machine controller on a flip-chip placement machine and how this implementation supports the goals of reduced development time and increased equipment flexibility. The following subjects are discussed: 1) Issues related to the selection of a standard operating system, including real-time performance, preemptive multi-tasking, multi-threaded applications, and development tools. 2) The use of a common API for motion, and I/O. 3) Use of a rapid application development and object-oriented programming techniques on the machine controller to shorten development time and support code reuse. 4) Specific hardware and software issues related to the implementation of the flip chip controller. This includes hardware and software implementation details, controller performance, and human interface issues.

  9. The deleuzian abstract machines

    DEFF Research Database (Denmark)

    Werner Petersen, Erik

    2005-01-01

    production. In Kafka: Toward a Minor Literature, Deleuze and Guatari gave the most comprehensive explanation to the abstract machine in the work of art. Like the war-machines of Virilio, the Kafka-machine operates in three gears or speeds. Furthermore, the machine is connected to spatial diagrams...

  10. Numerical Electromagnetics Code (NEC)-Method of Moments. A User-Oriented Computer Code for Analysis of the Electromagnetic Response of Antennas and Other Metal Structures. Part 1: Program Description-Theory. Part 2: Program Description-Code. Volume 1. Revised

    Science.gov (United States)

    1981-01-01

    ground plane was developed by Arnold Somerfeld (ref. 20).. While this solution has been used directly in integral-equation computer codes, excessive...FORMAT (///.A3) SN 158 159 20 FORMAT (4H lRo,13,/,(10E12.5)) SN 159 160 END SN 160- -396- BESSEL bESSEL ., PURP"OS Et To cumpute the Hessel functiton

  11. Optimal Placement Algorithms for Virtual Machines

    CERN Document Server

    Bellur, Umesh; SD, Madhu Kumar

    2010-01-01

    Cloud computing provides a computing platform for the users to meet their demands in an efficient, cost-effective way. Virtualization technologies are used in the clouds to aid the efficient usage of hardware. Virtual machines (VMs) are utilized to satisfy the user needs and are placed on physical machines (PMs) of the cloud for effective usage of hardware resources and electricity in the cloud. Optimizing the number of PMs used helps in cutting down the power consumption by a substantial amount. In this paper, we present an optimal technique to map virtual machines to physical machines (nodes) such that the number of required nodes is minimized. We provide two approaches based on linear programming and quadratic programming techniques that significantly improve over the existing theoretical bounds and efficiently solve the problem of virtual machine (VM) placement in data centers.

  12. Program generator for the Incomplete Cholesky Conjugate Gradient (ICCG) method

    Energy Technology Data Exchange (ETDEWEB)

    Kuo-Petravic, G.; Petravic, M.

    1978-04-01

    The Incomplete Cholesky Conjugate Gradient (ICCG) method has been found very effective for the solution of sparse systems of linear equations. Its implementation on a computer, however, requires a considerable amount of careful coding to achieve good machine efficiency. Furthermore, the resulting code is necessarily inflexible and cannot be easily adapted to different problems. We present in this paper a code generator GENIC which, given a small amount of information concerning the sparsity pattern and size of the system of equations, generates a solver package. This package, called SOLIC, is tailor made for a particular problem and can be easily incorporated into any user program.

  13. Search on Collaborative Offline Programming by Network Based on Dual Robot Machining System%双机器人制造系统的网络协作离线编程研究

    Institute of Scientific and Technical Information of China (English)

    缪燕; 金平; 尹佑盛

    2001-01-01

    Based on the andysis of hardware characteristics of dual robot machining system for rapid prototyping,the architecture of offline programming system is built up.Every function module of this system is designed in detail with IDEF method,and the key techniques of every function module,such as graphics data processing,creating track of tool center and postprocessing,are researched.The machining programs of dual robot are produced automatically.At the end of the paper,with the NetMeeting ,work mode and real-time collaborative procedure of offline programming in the different place are discussed.%在分析双机器人快速原型加工硬件特点的基础上,建立了双机器人离线编程系统总体结构,研究了图形数据处理、加工路径规划与仿真和后置处理等关键技术,并用IDEF方法对各功能模块进行了详细设计,研制了一套离线编程软件,实现了双机器人加工程序的自动生成。最后详细论述了用NetMeeting进行双机器人异地协作编程的系统配置和工作过程。

  14. MAGNETOHYDRODYNAMIC EQUATIONS (MHD GENERATION CODE

    Directory of Open Access Journals (Sweden)

    Francisco Frutos Alfaro

    2017-04-01

    Full Text Available A program to generate codes in Fortran and C of the full magnetohydrodynamic equations is shown. The program uses the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the magnetohydrodynamic equations to obtain a code that can be used as a seed for a magnetohydrodynamic code for numerical applications. As an example, we present part of the output of our programs for Cartesian coordinates and how to do the discretization.

  15. Switching surface chemistry with supramolecular machines.

    Energy Technology Data Exchange (ETDEWEB)

    Dunbar, Timothy D.; Kelly, Michael James; Jeppesen, Jan O. (University of California, Los Angeles, CA); Bunker, Bruce Conrad; Matzke, Carolyn M.; Stoddart, J. Fraser; Huber, Dale L.; Kushmerick, James G.; Flood, Amar H. (University of California, Los Angeles, CA); Perkins, Julie (University of California, Los Angeles, CA); Cao, Jianguo (University of California, Los Angeles, CA)

    2005-07-01

    Tethered supramolecular machines represent a new class of active self-assembled monolayers in which molecular configurations can be reversibly programmed using electrochemical stimuli. We are using these machines to address the chemistry of substrate surfaces for integrated microfluidic systems. Interactions between the tethered tetracationic cyclophane host cyclobis(paraquat-p-phenylene) and dissolved {pi}-electron-rich guest molecules, such as tetrathiafulvalene, have been reversibly switched by oxidative electrochemistry. The results demonstrate that surface-bound supramolecular machines can be programmed to adsorb or release appropriately designed solution species for manipulating surface chemistry.

  16. Research on NC Programming Strategies for Complex Mesh Surface High Efficiency Machining ant Its Appilcation%复杂网格曲面高效加工数控编程策略研究与应用

    Institute of Scientific and Technical Information of China (English)

    陈晓兵; 廖文和

    2012-01-01

    为了提高复杂网格曲面数控加工的效率和品质,研究了复杂网格曲面高效加工数控编程策略.从刀轨规划方式、数控程序量、多轴刀轴规划和进给速度优化等方面阐述了现有方法的不足和应采取的策略.将文中的策略应用到口腔修复体网格曲面的高效加工中,实例结果表明了文中所研究策略的正确性和有效性.%To improve the efficiency of complex mesh surface machining, the strategies of its high efficient machining are researched on. This paper analyzes the shortcomings of current methods in aspects of tool path planning manners, NC program size, cutter axis vectors planning and feed-rate optimization and sets forth the adopted strategies. The proposed strategies are applied in dental restoration mesh surface high efficient machining, and the experiment results indicate that these strategies are correct and effective.

  17. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  18. Machine learning a probabilistic perspective

    CERN Document Server

    Murphy, Kevin P

    2012-01-01

    Today's Web-enabled deluge of electronic data calls for automated methods of data analysis. Machine learning provides these, developing methods that can automatically detect patterns in data and then use the uncovered patterns to predict future data. This textbook offers a comprehensive and self-contained introduction to the field of machine learning, based on a unified, probabilistic approach. The coverage combines breadth and depth, offering necessary background material on such topics as probability, optimization, and linear algebra as well as discussion of recent developments in the field, including conditional random fields, L1 regularization, and deep learning. The book is written in an informal, accessible style, complete with pseudo-code for the most important algorithms. All topics are copiously illustrated with color images and worked examples drawn from such application domains as biology, text processing, computer vision, and robotics. Rather than providing a cookbook of different heuristic method...

  19. A CONTERPORARYAPPROACH FOR OBTAINING REGULARLY SHAPED ROUGHNESS BY BALL-BURNISHING PROCESS CARIED OUT USINGCNC CONTROLEDMILLING MACHINES

    Directory of Open Access Journals (Sweden)

    STOYAN SLAVOV

    2017-05-01

    Full Text Available The present work describes the main advantages of the implementation a newapproachfor ball-burnishing process, for precisely formation of regularly shaped roughness on external planar and cylindrical functional surfaces from machine parts. The considered approach includes the capabilities of contemporary CAM software products for automated programing, and 3-axis vertical or 4-axis horizontal machining centrescontrolled by CNC. A mathematical model developed for generating the sinusoidal curves, which represents needed toolpaths and an algorithm for obtaining the NC-code for corresponding machine tools are presented. The principle of the purposed processing schemes for ball burnishingof external planar or cylindrical surfaces is described and conclusions about the advantages of the purposed approach are given.

  20. Findings from the National Machine Guarding Program–A Small Business Intervention: Machine Safety

    Science.gov (United States)

    Yamin, Samuel C.; Xi, Min; Brosseau, Lisa M.; Gordon, Robert; Most, Ivan G.; Stanley, Rodney

    2016-01-01

    Objectives The purpose of this nationwide intervention was to improve machine safety in small metal fabrication businesses (3 – 150 employees). The failure to implement machine safety programs related to guarding and lockout/tagout (LOTO) are frequent causes of OSHA citations and may result in serious traumatic injury. Methods Insurance safety consultants conducted a standardized evaluation of machine guarding, safety programs, and LOTO. Businesses received a baseline evaluation, two intervention visits and a twelve-month follow-up evaluation. Results The intervention was completed by 160 businesses. Adding a safety committee was associated with a 10-percentage point increase in business-level machine scores (p< 0.0001) and a 33-percentage point increase in LOTO program scores (p <0.0001). Conclusions Insurance safety consultants proved effective at disseminating a machine safety and LOTO intervention via management-employee safety committees. PMID:26716850

  1. Army-NASA aircrew/aircraft integration program: Phase 4 A(3)I Man-Machine Integration Design and Analysis System (MIDAS) software detailed design document

    Science.gov (United States)

    Banda, Carolyn; Bushnell, David; Chen, Scott; Chiu, Alex; Constantine, Betsy; Murray, Jerry; Neukom, Christian; Prevost, Michael; Shankar, Renuka; Staveland, Lowell

    1991-01-01

    The Man-Machine Integration Design and Analysis System (MIDAS) is an integrated suite of software components that constitutes a prototype workstation to aid designers in applying human factors principles to the design of complex human-machine systems. MIDAS is intended to be used at the very early stages of conceptual design to provide an environment wherein designers can use computational representations of the crew station and operator, instead of hardware simulators and man-in-the-loop studies, to discover problems and ask 'what if' questions regarding the projected mission, equipment, and environment. This document is the Software Product Specification for MIDAS. Introductory descriptions of the processing requirements, hardware/software environment, structure, I/O, and control are given in the main body of the document for the overall MIDAS system, with detailed discussion of the individual modules included in Annexes A-J.

  2. INFLUENCE OF POWER SPENT ON OVERCOMING CUTTING RESISTANCE FORCES ON ELECTRIC MOTOR POWER IN SYSTEM OF AUTOMATIC MACHINE CONTROL WITH NUMERICAL PROGRAMMED CONTROL

    Directory of Open Access Journals (Sweden)

    Shuxin Xu

    2009-01-01

    Full Text Available If a defect unexpectedly arises in the direction of supply while working a «free» curve being distinguished by a arbitrary curvature and small value twisting from the given ones then there will be worsening of cutting process that will lead to surface defects of the machined surface or tool break down. A method of wave analysis has been used for an experimental study of power in specific frequency bands and a minimum cutter damage has been obtained which with power on a drive motor makes it possible to control supply, restoring the condition of cutting. A technical novelty of automatic control method has been proposed according to instantaneous defect by means wave change on a drive motor. The problem of quantitative assessment of machined surface defects has been successfully solved in the paper.

  3. Accurate discrimination of conserved coding and non-coding regions through multiple indicators of evolutionary dynamics

    Directory of Open Access Journals (Sweden)

    Pesole Graziano

    2009-09-01

    Full Text Available Abstract Background The conservation of sequences between related genomes has long been recognised as an indication of functional significance and recognition of sequence homology is one of the principal approaches used in the annotation of newly sequenced genomes. In the context of recent findings that the number non-coding transcripts in higher organisms is likely to be much higher than previously imagined, discrimination between conserved coding and non-coding sequences is a topic of considerable interest. Additionally, it should be considered desirable to discriminate between coding and non-coding conserved sequences without recourse to the use of sequence similarity searches of protein databases as such approaches exclude the identification of novel conserved proteins without characterized homologs and may be influenced by the presence in databases of sequences which are erroneously annotated as coding. Results Here we present a machine learning-based approach for the discrimination of conserved coding sequences. Our method calculates various statistics related to the evolutionary dynamics of two aligned sequences. These features are considered by a Support Vector Machine which designates the alignment coding or non-coding with an associated probability score. Conclusion We show that our approach is both sensitive and accurate with respect to comparable methods and illustrate several situations in which it may be applied, including the identification of conserved coding regions in genome sequences and the discrimination of coding from non-coding cDNA sequences.

  4. Management of Statically Modifiable Prolog Code

    Institute of Scientific and Technical Information of China (English)

    张晨曦; 慈云桂

    1989-01-01

    The Warren Abstract Machine is an efficient execution model for Prolog,which has become the basis of many high performance Prolog systems.However.little support for the implementation of the non-logical components of Prolog is provided in the WAM.The original Warren code is not modifiable.In this paper,we show how static modifications of Warren code can be achieved by adding a few instructions and a little extra information to the code.The implementation of the code manager is discussed.Algorithms for some basic operations are given.

  5. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  6. 快速数控编程系统的制造特征构建研究%Research on Reconstruction of Machining Feature for Rapid NC Programming System

    Institute of Scientific and Technical Information of China (English)

    李铁钢; 付春林; 于天彪; 王宛山

    2012-01-01

    Aiming at recognition and reconstruction of features from different 3D CAD models, this paper presented the implementation process of feature recognition. Firstly, an attributed adjacency graph (AAG) created of geometry and topology in STEP file by lexical analysis. According to the analyses on machining features of structural parts in terms of the NC programming cutting logical, the machining feature will be recognized and reconstructed. The machining feature are provided by XML, which can be used by CAM system. Case study validates the proposed method, which improves efficiency and quality of NC programming of structural part.%针对快速数控编程系统中不同CAD模型的特征识别和构建,论述了基于STEP文件的特征识别技术及其实现过程:首先利用词法分析器解析STEP中性文件,按照STEP的文件拓扑结构生成属性邻接图(AAG);在总结典型结构件拓扑特征基础上,结合数控编程切削逻辑,以切削级为基础进行特征识别和特征构建;最后以XML形式构造制造特征森林以供CAM系统使用.实例证明了文中方法的有效性,提高了结构件数控编程的效率和质量.

  7. Machine tool structures

    CERN Document Server

    Koenigsberger, F

    1970-01-01

    Machine Tool Structures, Volume 1 deals with fundamental theories and calculation methods for machine tool structures. Experimental investigations into stiffness are discussed, along with the application of the results to the design of machine tool structures. Topics covered range from static and dynamic stiffness to chatter in metal cutting, stability in machine tools, and deformations of machine tool structures. This volume is divided into three sections and opens with a discussion on stiffness specifications and the effect of stiffness on the behavior of the machine under forced vibration c

  8. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe...... the codes succinctly using Gröbner bases....

  9. MetaJC++: A flexible and automatic program transformation technique using meta framework

    Science.gov (United States)

    Beevi, Nadera; Reghu, M.; Chitraprasad, D.; Vinodchandra, S.

    2014-09-01

    Compiler is a tool to translate abstract code containing natural language terms to machine code. Meta compilers are available to compile more than one languages. We have developed a meta framework intends to combine two dissimilar programming languages, namely C++ and Java to provide a flexible object oriented programming platform for the user. Suitable constructs from both the languages have been combined, thereby forming a new and stronger Meta-Language. The framework is developed using the compiler writing tools, Flex and Yacc to design the front end of the compiler. The lexer and parser have been developed to accommodate the complete keyword set and syntax set of both the languages. Two intermediate representations have been used in between the translation of the source program to machine code. Abstract Syntax Tree has been used as a high level intermediate representation that preserves the hierarchical properties of the source program. A new machine-independent stack-based byte-code has also been devised to act as a low level intermediate representation. The byte-code is essentially organised into an output class file that can be used to produce an interpreted output. The results especially in the spheres of providing C++ concepts in Java have given an insight regarding the potential strong features of the resultant meta-language.

  10. 基于行动导向的《数控加工工艺与手工编程》课程开发%Vocational Courses Development of CNC Machining Technology and Manual Programming Based on Working Process

    Institute of Scientific and Technical Information of China (English)

    王艳宜

    2011-01-01

    从基于行动导向课程开发基础流程、相关概念及行动领域分析-情境设计-课程实施等几个方面介绍了《数控加工工艺与手工编程》课程的开发,对《数控加工工艺与手工编程》课程教学如何实现基于工作过程导向的教学改革进行了探索与实践。%According to the working process of a systematic curriculum development based on the basic processes, concepts and actions related to the field of situational analysis of the design - Team - building project of the teaching materials development and other aspects, the aper introduces the development of "CNC machining technology and manual programming "course development, this paper discusses how to implement the pedagogical reforms based on working process for NC programing and machining curriculum teaching.

  11. VB与MATLAB混合编程在修磨机床软件中的应用%Application of Mix Programming between VB and MATLAB in Grinding Machine Tool

    Institute of Scientific and Technical Information of China (English)

    关娟; 梅国平

    2012-01-01

    Four methods of mix programming between VB and MATLAB were described. These methods not only realized the integration of superior visible interface of VB but also the powerful processing function of MATLAB to improve efficiency of programming. The practical application by PC data processing software of CNC grinding machine tool passed the test.%介绍了VB与MATLAB混合编程的4种方法,通过这些方法,可使VB的可视化界面和Matlab强大的计算及绘图功能得以实现,从而提高编程的效率,并在某产品CNC修磨机床的上位机数据处理软件中通过了验证.

  12. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  13. Should you learn to code?

    CERN Document Server

    Team, The Hyperink

    2013-01-01

    On May 15, 2012 Jeff Atwood (co-founder of Stack Overflow) published a blog post titled "Please Don't Learn to Code" in response to Mayor Mike Bloomberg's resolution to learn how to code in 2012. In that post he argues against "learning to code just for the sake of learning how to code," a sentiment that sparked an active online debate. This book is a compilation of several different perspectives on that debate. Should programming be taught to every student as part of their core curriculum, similar to mathematics, reading, and writing? Should every working professional take time to learn a

  14. Plug Into "The Modernizing Machine"! Danish University Reform and Its Transformable Academic Subjectivities

    Science.gov (United States)

    Krejsler, John Benedicto

    2013-01-01

    "The modernizing machine" codes individual bodies, things, and symbols with images from New Public Management, neo-liberal, and Knowledge Economy discourses. Drawing on Deleuze and Guattari's concept of machines, this article explores how "the modernizing machine" produces neo-liberal modernization of the public sector. Taking…

  15. Design of Demining Machines

    CERN Document Server

    Mikulic, Dinko

    2013-01-01

    In constant effort to eliminate mine danger, international mine action community has been developing safety, efficiency and cost-effectiveness of clearance methods. Demining machines have become necessary when conducting humanitarian demining where the mechanization of demining provides greater safety and productivity. Design of Demining Machines describes the development and testing of modern demining machines in humanitarian demining.   Relevant data for design of demining machines are included to explain the machinery implemented and some innovative and inspiring development solutions. Development technologies, companies and projects are discussed to provide a comprehensive estimate of the effects of various design factors and to proper selection of optimal parameters for designing the demining machines.   Covering the dynamic processes occurring in machine assemblies and their components to a broader understanding of demining machine as a whole, Design of Demining Machines is primarily tailored as a tex...

  16. Applied machining technology

    CERN Document Server

    Tschätsch, Heinz

    2010-01-01

    Machining and cutting technologies are still crucial for many manufacturing processes. This reference presents all important machining processes in a comprehensive and coherent way. It includes many examples of concrete calculations, problems and solutions.

  17. Machining with abrasives

    CERN Document Server

    Jackson, Mark J

    2011-01-01

    Abrasive machining is key to obtaining the desired geometry and surface quality in manufacturing. This book discusses the fundamentals and advances in the abrasive machining processes. It provides a complete overview of developing areas in the field.

  18. Women, Men, and Machines.

    Science.gov (United States)

    Form, William; McMillen, David Byron

    1983-01-01

    Data from the first national study of technological change show that proportionately more women than men operate machines, are more exposed to machines that have alienating effects, and suffer more from the negative effects of technological change. (Author/SSH)

  19. Brain versus Machine Control.

    Directory of Open Access Journals (Sweden)

    Jose M Carmena

    2004-12-01

    Full Text Available Dr. Octopus, the villain of the movie "Spiderman 2", is a fusion of man and machine. Neuroscientist Jose Carmena examines the facts behind this fictional account of a brain- machine interface

  20. Fingerprinting Communication and Computation on HPC Machines

    Energy Technology Data Exchange (ETDEWEB)

    Peisert, Sean

    2010-06-02

    How do we identify what is actually running on high-performance computing systems? Names of binaries, dynamic libraries loaded, or other elements in a submission to a batch queue can give clues, but binary names can be changed, and libraries provide limited insight and resolution on the code being run. In this paper, we present a method for"fingerprinting" code running on HPC machines using elements of communication and computation. We then discuss how that fingerprint can be used to determine if the code is consistent with certain other types of codes, what a user usually runs, or what the user requested an allocation to do. In some cases, our techniques enable us to fingerprint HPC codes using runtime MPI data with a high degree of accuracy.

  1. Space coding for sensorimotor transformations can emerge through unsupervised learning.

    Science.gov (United States)

    De Filippo De Grazia, Michele; Cutini, Simone; Lisi, Matteo; Zorzi, Marco

    2012-08-01

    The posterior parietal cortex (PPC) is fundamental for sensorimotor transformations because it combines multiple sensory inputs and posture signals into different spatial reference frames that drive motor programming. Here, we present a computational model mimicking the sensorimotor transformations occurring in the PPC. A recurrent neural network with one layer of hidden neurons (restricted Boltzmann machine) learned a stochastic generative model of the sensory data without supervision. After the unsupervised learning phase, the activity of the hidden neurons was used to compute a motor program (a population code on a bidimensional map) through a simple linear projection and delta rule learning. The average motor error, calculated as the difference between the expected and the computed output, was less than 3°. Importantly, analyses of the hidden neurons revealed gain-modulated visual receptive fields, thereby showing that space coding for sensorimotor transformations similar to that observed in the PPC can emerge through unsupervised learning. These results suggest that gain modulation is an efficient coding strategy to integrate visual and postural information toward the generation of motor commands.

  2. Atlas C++ Coding Standard Specification

    CERN Document Server

    Albrand, S; Barberis, D; Bosman, M; Jones, B; Stavrianakou, M; Arnault, C; Candlin, D; Candlin, R; Franck, E; Hansl-Kozanecka, Traudl; Malon, D; Qian, S; Quarrie, D; Schaffer, R D

    2001-01-01

    This document defines the ATLAS C++ coding standard, that should be adhered to when writing C++ code. It has been adapted from the original "PST Coding Standard" document (http://pst.cern.ch/HandBookWorkBook/Handbook/Programming/programming.html) CERN-UCO/1999/207. The "ATLAS standard" comprises modifications, further justification and examples for some of the rules in the original PST document. All changes were discussed in the ATLAS Offline Software Quality Control Group and feedback from the collaboration was taken into account in the "current" version.

  3. Solving Classification Problems Using Genetic Programming Algorithms on GPUs

    Science.gov (United States)

    Cano, Alberto; Zafra, Amelia; Ventura, Sebastián

    Genetic Programming is very efficient in problem solving compared to other proposals but its performance is very slow when the size of the data increases. This paper proposes a model for multi-threaded Genetic Programming classification evaluation using a NVIDIA CUDA GPUs programming model to parallelize the evaluation phase and reduce computational time. Three different well-known Genetic Programming classification algorithms are evaluated using the parallel evaluation model proposed. Experimental results using UCI Machine Learning data sets compare the performance of the three classification algorithms in single and multithreaded Java, C and CUDA GPU code. Results show that our proposal is much more efficient.

  4. Reasoning with Computer Code: a new Mathematical Logic

    Science.gov (United States)

    Pissanetzky, Sergio

    2013-01-01

    A logic is a mathematical model of knowledge used to study how we reason, how we describe the world, and how we infer the conclusions that determine our behavior. The logic presented here is natural. It has been experimentally observed, not designed. It represents knowledge as a causal set, includes a new type of inference based on the minimization of an action functional, and generates its own semantics, making it unnecessary to prescribe one. This logic is suitable for high-level reasoning with computer code, including tasks such as self-programming, objectoriented analysis, refactoring, systems integration, code reuse, and automated programming from sensor-acquired data. A strong theoretical foundation exists for the new logic. The inference derives laws of conservation from the permutation symmetry of the causal set, and calculates the corresponding conserved quantities. The association between symmetries and conservation laws is a fundamental and well-known law of nature and a general principle in modern theoretical Physics. The conserved quantities take the form of a nested hierarchy of invariant partitions of the given set. The logic associates elements of the set and binds them together to form the levels of the hierarchy. It is conjectured that the hierarchy corresponds to the invariant representations that the brain is known to generate. The hierarchies also represent fully object-oriented, self-generated code, that can be directly compiled and executed (when a compiler becomes available), or translated to a suitable programming language. The approach is constructivist because all entities are constructed bottom-up, with the fundamental principles of nature being at the bottom, and their existence is proved by construction. The new logic is mathematically introduced and later discussed in the context of transformations of algorithms and computer programs. We discuss what a full self-programming capability would really mean. We argue that self-programming

  5. Doubly Fed Induction Machine Control For Wind Energy Conversion System

    Science.gov (United States)

    2009-06-01

    this_block) % Revision History: % % 18-Dec-2008 (15:15 hours): % Original code was machine generated by Xilinx’s System Generator % after...this_block.setTopLevelLanguage(’VHDL’); this_block.setEntityName(’code’); % System Generator has to assume that your entity has a combinational % feed through

  6. A Universal Reactive Machine

    DEFF Research Database (Denmark)

    Andersen, Henrik Reif; Mørk, Simon; Sørensen, Morten U.

    1997-01-01

    Turing showed the existence of a model universal for the set of Turing machines in the sense that given an encoding of any Turing machine asinput the universal Turing machine simulates it. We introduce the concept of universality for reactive systems and construct a CCS processuniversal...

  7. A simple and efficient universal reversible turing machine

    DEFF Research Database (Denmark)

    Axelsen, Holger Bock; Glück, Robert

    2011-01-01

    for RTMs is RTM-universality, where programs are considered part of both input and output of a URTM. The machine described here is the first URTM which does not depend on reversibilizing any existing universal machine. The interpretive overhead of the URTM is limited to a (program dependent) constant...

  8. Censorship during the Depression: The Banning of "You and Machines."

    Science.gov (United States)

    Barry, Arlene L.

    2001-01-01

    Provides background information on the Civilian Conservation Corps (CCC) focusing on the educational programs for the CCC. Presents a lesson on the censorship of the booklet "You and Machines" from the CCC programs. Includes excerpts from "You and Machines," copies of newspaper articles about the booklet, and a student handout.…

  9. Simulation and Optimization of Turning-Milling Complex Machining

    Directory of Open Access Journals (Sweden)

    Shihong Guo

    2013-05-01

    Full Text Available In this study, the turning-milling complex processing simulation platform is established based on the simulation and optimization platform of VERICUT NC machining, with WFL M65 turning-milling complex machining center as the research object; taking barrel body parts as an example, the simulation machining and related process issues checking in machining process is made and the analysis and optimization of effect factors is made for processing efficiency. The application indicates that: the research results effectively realize the simulation of the turning-milling complex machining process and the correctness verification and process optimization of the NC machining program, improve the processing efficiency and the processing quality, well improve the application level of enterprise turning-milling complex machining center, promote the development of the turning-milling complex machining technology.

  10. Programming and machining of the base parts based on NC simulation system%基于数控仿真系统的底座零件编程与加工

    Institute of Scientific and Technical Information of China (English)

    金江

    2012-01-01

    With the development of society and economy, as well as the actual production of the strong demand, the traditional manufacturing has undergone a fundamental change, with numerical control technology based on modern manufacturing technology to occupy an important position. This article through the base parts of the structure analysis, using Auto - CAD software to the base part drawing design, and process analysis, determine the machining process. Finally, according to the parameters, using Mastercam / Mill9 on parts of the program for entity authentication, automatic processing program for processing export. The auto- matic processing program for machining simulation.%随着社会经济的发展和生产实际的强烈需求,传统的制造方式已发生了根本性的变革,以数控技术为主的现代制造技术占据了重要地位.文章通过底座零件的结构分析,利用Auto—CAD软件进行底座零件图设计,而后进行工艺分析,确定零件的加工工艺;之后根据工艺参数,运用Mastercam\Mi119对零件程序进行实体验证,后处理导出自动加工程序;再对自动加工程序进行仿真加工.

  11. Instructional DVD video lesson with code switching: its effect on the performance level in dancing social dance among grade 10 special program in the art students of the Philippines

    Directory of Open Access Journals (Sweden)

    Capilitan Fernando T.

    2017-01-01

    Full Text Available This paper shows that the experimental group who are exposed to DVD Video Lesson that uses code switching language has an average mean score in the pretest of 1.56, and this increased to an average mean of 3.50 in the posttest. The control group that uses DVD Video Lesson that uses purely English language got an average mean of 1.06 in the pretest and increased to 1.53 in the posttest. Based on the results of the performance posttest taken by the two groups, the experimental group has a dramatic increase in scores from the pretest to posttest. Although both groups had increased in their performance scores from pretest to posttest, the experimental group (code switching language performs well in the posttest than the control group. As revealed in this findings , there is a significant difference in the posttest scores between the experimental group who are exposed to DVD lesson that uses code switching as a medium of instruction and the control group who are exposed to DVD lesson that uses English. The students who are exposed to the Video Lesson that uses code switching perform well than those students who are exposed in DVD video lesson that uses purely English language. DVD Video lesson that uses code switching as a medium of instruction in teaching social dance is the useful approach in teaching Grade 10 Special Program in the Art students. The language used (code switching is the powerful medium of instruction that enhances the learning outcomes of the students to perform well. This paper could be an eye opener to the Department of Education to inculcate the used of first language/local language or MTB-MLE, not only in Grade I to III but all level in K to 12 programs, since education is a key factor for building a better nation.

  12. POLYSHIFT Communications Software for the Connection Machine System CM-200

    Directory of Open Access Journals (Sweden)

    William George

    1994-01-01

    Full Text Available We describe the use and implementation of a polyshift function PSHIFT for circular shifts and end-offs shifts. Polyshift is useful in many scientific codes using regular grids, such as finite difference codes in several dimensions, and multigrid codes, molecular dynamics computations, and in lattice gauge physics computations, such as quantum chromodynamics (QCD calculations. Our implementation of the PSHIFT function on the Connection Machine systems CM-2 and CM-200 offers a speedup of up to a factor of 3–4 compared with CSHIFT when the local data motion within a node is small. The PSHIFT routine is included in the Connection Machine Scientific Software Library (CMSSL.

  13. Asynchronized synchronous machines

    CERN Document Server

    Botvinnik, M M

    1964-01-01

    Asynchronized Synchronous Machines focuses on the theoretical research on asynchronized synchronous (AS) machines, which are "hybrids” of synchronous and induction machines that can operate with slip. Topics covered in this book include the initial equations; vector diagram of an AS machine; regulation in cases of deviation from the law of full compensation; parameters of the excitation system; and schematic diagram of an excitation regulator. The possible applications of AS machines and its calculations in certain cases are also discussed. This publication is beneficial for students and indiv

  14. Precision machine design

    CERN Document Server

    Slocum, Alexander H

    1992-01-01

    This book is a comprehensive engineering exploration of all the aspects of precision machine design - both component and system design considerations for precision machines. It addresses both theoretical analysis and practical implementation providing many real-world design case studies as well as numerous examples of existing components and their characteristics. Fast becoming a classic, this book includes examples of analysis techniques, along with the philosophy of the solution method. It explores the physics of errors in machines and how such knowledge can be used to build an error budget for a machine, how error budgets can be used to design more accurate machines.

  15. Illinois Occupational Skill Standards: Machining Skills Cluster.

    Science.gov (United States)

    Illinois Occupational Skill Standards and Credentialing Council, Carbondale.

    This document of skill standards for the machining skills cluster serves as a guide to workforce preparation program providers in defining content for their programs and to employers to establish the skills and standards necessary for job acquisition. These 67 occupational skill standards describe what people should know and be able to do in an…

  16. Probabilistic machine learning and artificial intelligence.

    Science.gov (United States)

    Ghahramani, Zoubin

    2015-05-28

    How can a machine learn from experience? Probabilistic modelling provides a framework for understanding what learning is, and has therefore emerged as one of the principal theoretical and practical approaches for designing machines that learn from data acquired through experience. The probabilistic framework, which describes how to represent and manipulate uncertainty about models and predictions, has a central role in scientific data analysis, machine learning, robotics, cognitive science and artificial intelligence. This Review provides an introduction to this framework, and discusses some of the state-of-the-art advances in the field, namely, probabilistic programming, Bayesian optimization, data compression and automatic model discovery.

  17. Probabilistic machine learning and artificial intelligence

    Science.gov (United States)

    Ghahramani, Zoubin

    2015-05-01

    How can a machine learn from experience? Probabilistic modelling provides a framework for understanding what learning is, and has therefore emerged as one of the principal theoretical and practical approaches for designing machines that learn from data acquired through experience. The probabilistic framework, which describes how to represent and manipulate uncertainty about models and predictions, has a central role in scientific data analysis, machine learning, robotics, cognitive science and artificial intelligence. This Review provides an introduction to this framework, and discusses some of the state-of-the-art advances in the field, namely, probabilistic programming, Bayesian optimization, data compression and automatic model discovery.

  18. SIMULATION OF MULTI-SUPPORT MACHINE VIBRATIONS

    Directory of Open Access Journals (Sweden)

    N. N. Hurski

    2009-01-01

    Full Text Available The paper considers problems pertaining to simulation of multi-support machine vibrations by means of  ADMOS programming product. A mathematical model of the multi-support machine is presented and its main geometric and physical and mechanical parameters are given in the paper. The paper reveals analysis results of the vibration processes and observes variables in time and frequency areas. The investigations have made it possible to obtain amplitude and frequency and statistical characteristics  of  the machine mass centre acceleration during its motion along various types of roads

  19. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  20. Effect of Assembling and Machining Errors on Wavefront Coding Imaging Performance of Cubic Phase Mask%波前编码中立方相位板的装配及加工误差对成像性能的影响

    Institute of Scientific and Technical Information of China (English)

    张效栋; 张林; 刘现磊; 姜丽丽

    2015-01-01

    在波前编码技术中,通过立方相位板的光学调制和后续图像处理,扩展了系统景深.其中系统的光学调制过程,可以用广义光瞳函数描述.系统的广义光瞳函数描述了光通过立方相位板后相位的变化过程.立方相位板是波前编码技术的关键器件,装配及加工误差直接影响系统的成像性能.本文通过推导不同误差情况下的广义光曈函数,得到了立方相位板装配及加工误差对点扩散函数( PSF)和调制传递函数( MTF)的变化规律.评估这些规律,得到了装配和加工误差对系统成像性能的变化规律,为装配和加工过程提供了基本的指导.文中分析了不同装配误差和加工误差对于系统性能的影响,其中围绕Z轴的装配误差和加工中振动引起的正弦形状误差对于MTF的影响最大.因此,在装配和加工中应尽量避免围绕Z轴的装配误差和正弦形状误差,正弦形状误差的PV值应保持在0.5μm之内.%In wavefront coding , a cubic phase mask extends the field depth of an imaging system through modulation and deconvolution .The modulation could be defined by a pupil function which describes how light wave is affected after passing through the mask .As the key optical element responsible for providing the designated spatially varying path length ,the machining and assembling errors ( MAEs) affect the ima-ging performance directly by deviating the modulation .In this paper , with derivation of the generalized pupil function under various errors , the influence rules of assembly and machining errors of cubic phase mask on imaging performance were obtained .To assess these MAEs , the point spread function ( PSF) and the modulation transfer function(MTF) were derived.The influence rules of MAEs on imaging perform-ance were established as well .These rules are eventually developed into the necessary and essential guidelines to the machining and