WorldWideScience

Sample records for non-perturbative nova-kn code

  1. Non-Perturbative Renormalization

    CERN Document Server

    Mastropietro, Vieri

    2008-01-01

    The notion of renormalization is at the core of several spectacular achievements of contemporary physics, and in the last years powerful techniques have been developed allowing to put renormalization on a firm mathematical basis. This book provides a self-consistent and accessible introduction to the sophisticated tools used in the modern theory of non-perturbative renormalization, allowing an unified and rigorous treatment of Quantum Field Theory, Statistical Physics and Condensed Matter models. In particular the first part of this book is devoted to Constructive Quantum Field Theory, providi

  2. New Methods in Non-Perturbative QCD

    Energy Technology Data Exchange (ETDEWEB)

    Unsal, Mithat [North Carolina State Univ., Raleigh, NC (United States)

    2017-01-31

    In this work, we investigate the properties of quantum chromodynamics (QCD), by using newly developing mathematics and physics formalisms. Almost all of the mass in the visible universe emerges from a quantum chromodynamics (QCD), which has a completely negligible microscopic mass content. An intimately related issue in QCD is the quark confinement problem. Answers to non-perturbative questions in QCD remained largely elusive despite much effort over the years. It is also believed that the usual perturbation theory is inadequate to address these kinds of problems. Perturbation theory gives a divergent asymptotic series (even when the theory is properly renormalized), and there are non-perturbative phenomena which never appear at any order in perturbation theory. Recently, a fascinating bridge between perturbation theory and non-perturbative effects has been found: a formalism called resurgence theory in mathematics tells us that perturbative data and non-perturbative data are intimately related. Translating this to the language of quantum field theory, it turns out that non-perturbative information is present in a coded form in perturbation theory and it can be decoded. We take advantage of this feature, which is particularly useful to understand some unresolved mysteries of QCD from first principles. In particular, we use: a) Circle compactifications which provide a semi-classical window to study confinement and mass gap problems, and calculable prototypes of the deconfinement phase transition; b) Resurgence theory and transseries which provide a unified framework for perturbative and non-perturbative expansion; c) Analytic continuation of path integrals and Lefschetz thimbles which may be useful to address sign problem in QCD at finite density.

  3. Non-perturbative effects in supersymmetry

    International Nuclear Information System (INIS)

    Veneziano, G.

    1987-01-01

    Some non perturbative aspects of globally supersymmetric (SUSY) gauge theories are discussed. These share with their non-supersymmetric analogues interesting non perturbative features, such as the spontaneous breaking of chiral symmetries via condensates. What is peculiar about supersymmetric theories, however, is that one is able to say a lot about non-perturbative effects even without resorting to elaborate numerical calculations: general arguments, supersymmetric and chiral Ward identities and analytic, dynamical calculations will turn out to effectively determine most of the supersymmetric vacuum properties. 28 references, 5 figures

  4. Non-Perturbative Quantum Geometry III

    CERN Document Server

    Krefl, Daniel

    2016-08-02

    The Nekrasov-Shatashvili limit of the refined topological string on toric Calabi-Yau manifolds and the resulting quantum geometry is studied from a non-perturbative perspective. The quantum differential and thus the quantum periods exhibit Stockes phenomena over the combined string coupling and quantized Kaehler moduli space. We outline that the underlying formalism of exact quantization is generally applicable to points in moduli space featuring massless hypermultiplets, leading to non-perturbative band splitting. Our prime example is local P1xP1 near a conifold point in moduli space. In particular, we will present numerical evidence that in a Stockes chamber of interest the string based quantum geometry reproduces the non-perturbative corrections for the Nekrasov-Shatashvili limit of 4d supersymmetric SU(2) gauge theory at strong coupling found in the previous part of this series. A preliminary discussion of local P2 near the conifold point in moduli space is also provided.

  5. Non-perturbative QCD and hadron physics

    International Nuclear Information System (INIS)

    Cobos-Martínez, J J

    2016-01-01

    A brief exposition of contemporary non-perturbative methods based on the Schwinger-Dyson (SDE) and Bethe-Salpeter equations (BSE) of Quantum Chromodynamics (QCD) and their application to hadron physics is given. These equations provide a non-perturbative continuum formulation of QCD and are a powerful and promising tool for the study of hadron physics. Results on some properties of hadrons based on this approach, with particular attention to the pion distribution amplitude, elastic, and transition electromagnetic form factors, and their comparison to experimental data are presented. (paper)

  6. On the non-perturbative effects

    International Nuclear Information System (INIS)

    Manjavidze, J.; Voronyuk, V.

    2004-01-01

    The quantum correspondence principle based on the time reversibility is adopted to take into account the non-Abelian symmetry constrains. The main properties of the new strong-coupling perturbation theory which take into account non-perturbative effects are described. (author)

  7. Non-perturbative Heavy Quark Effective Theory

    DEFF Research Database (Denmark)

    Della Morte, Michele; Heitger, Jochen; Simma, Hubert

    2015-01-01

    We review a lattice strategy how to non-perturbatively determine the coefficients in the HQET expansion of all components of the heavy-light axial and vector currents, including 1/m_h-corrections. We also discuss recent preliminary results on the form factors parameterizing semi-leptonic B...

  8. A non-perturbative operator product expansion

    International Nuclear Information System (INIS)

    Bietenholz, W.; Cundy, N.; Goeckeler, M.

    2009-10-01

    Nucleon structure functions can be observed in Deep Inelastic Scattering experiments, but it is an outstanding challenge to confront them with fully non-perturbative QCD results. For this purpose we investigate the product of electromagnetic currents (with large photonmomenta) between quark states (of low momenta). By means of an Operator Product Expansion the structure function can be decomposed into matrix elements of local operators, and Wilson coefficients. For consistency both have to be computed non-perturbatively. Here we present precision results for a set of Wilson coefficients. They are evaluated from propagators for numerous quark momenta on the lattice, where the use of chiral fermions suppresses undesired operator mixing. This overdetermines the Wilson coefficients, but reliable results can be extracted by means of a Singular Value Decomposition. (orig.)

  9. Non-perturbative quark mass renormalization

    CERN Document Server

    Capitani, S.; Luescher, M.; Sint, S.; Sommer, R.; Weisz, P.; Wittig, H.

    1998-01-01

    We show that the renormalization factor relating the renormalization group invariant quark masses to the bare quark masses computed in lattice QCD can be determined non-perturbatively. The calculation is based on an extension of a finite-size technique previously employed to compute the running coupling in quenched QCD. As a by-product we obtain the $\\Lambda$--parameter in this theory with completely controlled errors.

  10. Non-perturbative materialization of ghosts

    International Nuclear Information System (INIS)

    Emparan, Roberto; Garriga, Jaume

    2006-01-01

    In theories with a hidden ghost sector that couples to visible matter through gravity only, empty space can decay into ghosts and ordinary matter by graviton exchange. Perturbatively, such processes can be very slow provided that the gravity sector violates Lorentz invariance above some cut-off scale. Here, we investigate non-perturbative decay processes involving ghosts, such as the spontaneous creation of self-gravitating lumps of ghost matter, as well as pairs of Bondi dipoles (i.e. lumps of ghost matter chasing after positive energy objects). We find the corresponding instantons and calculate their Euclidean action. In some cases, the instantons induce topology change or have negative Euclidean action. To shed some light on the meaning of such peculiarities, we also consider the nucleation of concentrical domain walls of ordinary and ghost matter, where the Euclidean calculation can be compared with the canonical (Lorentzian) description of tunneling. We conclude that non-perturbative ghost nucleation processes can be safely suppressed in phenomenological scenarios

  11. Non-perturbative description of quantum systems

    CERN Document Server

    Feranchuk, Ilya; Le, Van-Hoang; Ulyanenkov, Alexander

    2015-01-01

    This book introduces systematically the operator method for the solution of the Schrödinger equation. This method permits to describe the states of quantum systems in the entire range of parameters of Hamiltonian with a predefined accuracy. The operator method is unique compared with other non-perturbative methods due to its ability to deliver in zeroth approximation the uniformly suitable estimate for both ground and excited states of quantum system. The method has been generalized for the application to quantum statistics and quantum field theory.  In this book, the numerous applications of operator method for various physical systems are demonstrated. Simple models are used to illustrate the basic principles of the method which are further used for the solution of complex problems of quantum theory for many-particle systems. The results obtained are supplemented by numerical calculations, presented as tables and figures.

  12. Non-perturbative QCD correlation functions

    Energy Technology Data Exchange (ETDEWEB)

    Cyrol, Anton Konrad

    2017-11-27

    Functional methods provide access to the non-perturbative regime of quantum chromo- dynamics. Hence, they allow investigating confinement and chiral symmetry breaking. In this dissertation, correlation functions of Yang-Mills theory and unquenched two-flavor QCD are computed from the functional renormalization group. Employing a self-consistent vertex expansion of the effective action, Yang-Mills correlation functions are obtained in four as well as in three spacetime dimensions. To this end, confinement and Slavnov-Taylor identities are discussed. Our numerical results show very good agreement with corresponding lattice results. Next, unquenched two-flavor QCD is considered where it is shown that the unquenched two-flavor gluon propagator is insensitive to the pion mass. Furthermore, the necessity for consistent truncations is emphasized. Finally, correlation functions of finite-temperature Yang-Mills theory are computed in a truncation that includes the splitting of the gluon field into directions that are transverse and longitudinal to the heat bath. In particular, it includes the splitting of the three- and four-gluon vertices. The obtained gluon propagator allows to extract a Debye screening mass that coincides with the hard thermal loop screening mass at high temperatures, but is meaningful also at temperatures below the phase transition temperature.

  13. Non-perturbative heavy quark effective theory. Introduction and status

    International Nuclear Information System (INIS)

    Sommer, Rainer; Humboldt-Universitaet, Berlin

    2015-01-01

    We give an introduction to Heavy Quark Effective Theory (HQET). Our emphasis is on its formulation non-perturbative in the strong coupling, including the non-perturbative determination of the parameters in the HQET Lagrangian. In a second part we review the present status of HQET on the lattice, largely based on work of the ALPHA collaboration in the last few years. We finally discuss opportunities and challenges.

  14. Non-perturbative renormalization of HQET and QCD

    International Nuclear Information System (INIS)

    Sommer, Rainer

    2003-01-01

    We discuss the necessity of non-perturbative renormalization in QCD and HQET and explain the general strategy for solving this problem. A few selected topics are discussed in some detail, namely the importance of off shell improvement in the MOM-scheme on the lattice, recent progress in the implementation of finite volume schemes and then particular emphasis is put on the recent idea to carry out a non-perturbative renormalization of the Heavy Quark Effective Theory (HQET)

  15. The FLUKA Monte Carlo, Non-Perturbative QCD and Cosmic Ray Cascades

    International Nuclear Information System (INIS)

    Battistoni, G.

    2005-01-01

    The FLUKA Monte Carlo code, presently used in cosmic ray physics, contains packages to sample soft hadronic processes which are built according to the Dual Parton Model. This is a phenomenological model capable of reproducing many of the features of hadronic collisions in the non perturbative QCD regime. The basic principles of the model are summarized and, as an example, the associated Lambda-K production is discussed. This is a process which has some relevance for the calculation of atmospheric neutrino fluxes

  16. Non-perturbative effects and the refined topological string

    Energy Technology Data Exchange (ETDEWEB)

    Hatsuda, Yasuyuki [DESY Hamburg (Germany). Theory Group; Tokyo Institute of Technology (Japan). Dept. of Physics; Marino, Marcos [Geneve Univ. (Switzerland). Dept. de Physique Theorique et Section de Mathematiques; Moriyama, Sanefumi [Nagoya Univ. (Japan). Kobayashi Maskawa Inst.; Nagoya Univ. (Japan). Graduate School of Mathematics; Okuyama, Kazumi [Shinshu Univ., Matsumoto, Nagano (Japan). Dept. of Physics

    2013-06-15

    The partition function of ABJM theory on the three-sphere has non-perturbative corrections due to membrane instantons in the M-theory dual. We show that the full series of membrane instanton corrections is completely determined by the refined topological string on the Calabi-Yau manifold known as local P{sup 1} x P{sup 1}, in the Nekrasov-Shatashvili limit. Our result can be interpreted as a first-principles derivation of the full series of non-perturbative effects for the closed topological string on this Calabi-Yau background. Based on this, we make a proposal for the non-perturbative free energy of topological strings on general, local Calabi-Yau manifolds.

  17. Alien calculus and non perturbative effects in Quantum Field Theory

    Science.gov (United States)

    Bellon, Marc P.

    2016-12-01

    In many domains of physics, methods for dealing with non-perturbative aspects are required. Here, I want to argue that a good approach for this is to work on the Borel transforms of the quantities of interest, the singularities of which give non-perturbative contributions. These singularities in many cases can be largely determined by using the alien calculus developed by Jean Écalle. My main example will be the two point function of a massless theory given as a solution of a renormalization group equation.

  18. Non-perturbative methods applied to multiphoton ionization

    International Nuclear Information System (INIS)

    Brandi, H.S.; Davidovich, L.; Zagury, N.

    1982-09-01

    The use of non-perturbative methods in the treatment of atomic ionization is discussed. Particular attention is given to schemes of the type proposed by Keldysh where multiphoton ionization and tunnel auto-ionization occur for high intensity fields. These methods are shown to correspond to a certain type of expansion of the T-matrix in the intra-atomic potential; in this manner a criterium concerning the range of application of these non-perturbative schemes is suggested. A brief comparison between the ionization rate of atoms in the presence of linearly and circularly polarized light is presented. (Author) [pt

  19. Non-perturbative topological strings and conformal blocks

    NARCIS (Netherlands)

    Cheng, M.C.N.; Dijkgraaf, R.; Vafa, C.

    2011-01-01

    We give a non-perturbative completion of a class of closed topological string theories in terms of building blocks of dual open strings. In the specific case where the open string is given by a matrix model these blocks correspond to a choice of integration contour. We then apply this definition to

  20. Insights on non-perturbative aspects of TMDs from models

    Energy Technology Data Exchange (ETDEWEB)

    H. Avakian, A. Efremov, P. Schweitzer, O. Teryaev, F. Yuan, P. Zavada

    2009-12-01

    Transverse momentum dependent parton distribution functions are a key ingredient in the description of spin and azimuthal asymmetries in deep-inelastic scattering processes. Recent results from non-perturbative calculations in effective approaches are reviewed, with focus on relations among different parton distribution functions in QCD and models.

  1. Elliptic CY3folds and non-perturbative modular transformation

    International Nuclear Information System (INIS)

    Iqbal, Amer; Shabbir, Khurram

    2016-01-01

    We study the refined topological string partition function of a class of toric elliptically fibered Calabi-Yau threefolds. These Calabi-Yau threefolds give rise to five dimensional quiver gauge theories and are dual to configurations of M5-M2-branes. We determine the Gopakumar-Vafa invariants for these threefolds and show that the genus g free energy is given by the weight 2 g Eisenstein series. We also show that although the free energy at all genera are modular invariant, the full partition function satisfies the non-perturbative modular transformation property discussed by Lockhart and Vafa in arXiv:1210.5909 and therefore the modularity of free energy is up to non-perturbative corrections. (orig.)

  2. Non-Perturbative Formulation of Time-Dependent String Solutions

    CERN Document Server

    Alexandre, J; Mavromatos, Nikolaos E; Alexandre, Jean; Ellis, John; Mavromatos, Nikolaos E.

    2006-01-01

    We formulate here a new world-sheet renormalization-group technique for the bosonic string, which is non-perturbative in the Regge slope alpha' and based on a functional method for controlling the quantum fluctuations, whose magnitudes are scaled by the value of alpha'. Using this technique we exhibit, in addition to the well-known linear-dilaton cosmology, a new, non-perturbative time-dependent background solution. Using the reparametrization invariance of the string S-matrix, we demonstrate that this solution is conformally invariant to alpha', and we give a heuristic inductive argument that conformal invariance can be maintained to all orders in alpha'. This new time-dependent string solution may be applicable to primordial cosmology or to the exit from linear-dilaton cosmology at large times.

  3. Elliptic CY3folds and non-perturbative modular transformation

    Energy Technology Data Exchange (ETDEWEB)

    Iqbal, Amer [Government College University, Abdus Salam School of Mathematical Sciences, Lahore (Pakistan); Shabbir, Khurram [Government College University, Department of Mathematics, Lahore (Pakistan)

    2016-03-15

    We study the refined topological string partition function of a class of toric elliptically fibered Calabi-Yau threefolds. These Calabi-Yau threefolds give rise to five dimensional quiver gauge theories and are dual to configurations of M5-M2-branes. We determine the Gopakumar-Vafa invariants for these threefolds and show that the genus g free energy is given by the weight 2 g Eisenstein series. We also show that although the free energy at all genera are modular invariant, the full partition function satisfies the non-perturbative modular transformation property discussed by Lockhart and Vafa in arXiv:1210.5909 and therefore the modularity of free energy is up to non-perturbative corrections. (orig.)

  4. Non-perturbative power corrections to ghost and gluon propagators

    International Nuclear Information System (INIS)

    Boucaud, Philippe; Leroy, Jean-Pierre; Yaouanc, Alain Le; Lokhov, Alexey; Micheli, Jacques; Pene, Olivier; RodrIguez-Quintero, Jose; Roiesnel, Claude

    2006-01-01

    We study the dominant non-perturbative power corrections to the ghost and gluon propagators in Landau gauge pure Yang-Mills theory using OPE and lattice simulations. The leading order Wilson coefficients are proven to be the same for both propagators. The ratio of the ghost and gluon propagators is thus free from this dominant power correction. Indeed, a purely perturbative fit of this ratio gives smaller value ( ≅ 270MeV) of Λ M-barS-bar than the one obtained from the propagators separately( ≅ 320MeV). This argues in favour of significant non-perturbative ∼ 1/q 2 power corrections in the ghost and gluon propagators. We check the self-consistency of the method

  5. Non-perturbative Green functions in quantum gauge theories

    International Nuclear Information System (INIS)

    Shabanov, S.V.

    1991-01-01

    Non-perturbative Green functions for gauge invariant variables are considered. The Green functions are found to be modified as compared with the usual ones in a definite gauge because of a physical configuration space (PCS) reduction. In the Yang-Mills theory with fermions this phenomenon follows from the Singer theorem about the absence of a global gauge condition for the fields tensing to zero at spatial infinity. 20 refs

  6. Non-perturbative versus perturbative renormalization of lattice operators

    International Nuclear Information System (INIS)

    Goeckeler, M.; Technische Hochschule Aachen; Horsley, R.; Ilgenfritz, E.M.; Oelrich, H.; Forschungszentrum Juelich GmbH; Schierholz, G.; Forschungszentrum Juelich GmbH; Perlt, H.; Schiller, A.; Rakow, P.

    1995-09-01

    Our objective is to compute the moments of the deep-inelastic structure functions of the nucleon on the lattice. A major source of uncertainty is the renormalization of the lattice operators that enter the calculation. In this talk we compare the renormalization constants of the most relevant twist-two bilinear quark operators which we have computed non-perturbatively and perturbatively to one loop order. Furthermore, we discuss the use of tadpole improved perturbation theory. (orig.)

  7. Non-perturbative aspects of string theory from elliptic curves

    International Nuclear Information System (INIS)

    Reuter, Jonas

    2015-08-01

    We consider two examples for non-perturbative aspects of string theory involving elliptic curves. First, we discuss F-theory on genus-one fibered Calabi-Yau manifolds with the fiber being a hypersurface in a toric fano variety. We discuss in detail the fiber geometry in order to find the gauge groups, matter content and Yukawa couplings of the corresponding supergravity theories for the four examples leading to gauge groups SU(3) x SU(2) x U(1), SU(4) x SU(2) x SU(2)/Z 2 , U(1) and Z 3 . The theories are connected by Higgsings on the field theory side and conifold transitions on the geometry side. We extend the discussion to the network of Higgsings relating all theories stemming from the 16 hypersurface fibrations. For the models leading to gauge groups SU(3) x SU(2) x U(1), SU(4) x SU(2) x SU(2)/Z 2 and U(1) we discuss the construction of vertical G 4 fluxes. Via the D3-brane tadpole cancelation condition we can restrict the minimal number of families in the first two of these models to be at least three. As a second example for non-perturbative aspects of string theory we discuss a proposal for a non-perturbative completion of topological string theory on local B-model geometries. We discuss in detail the computation of quantum periods for the examples of local F 1 , local F 2 and the resolution of C 3 /Z 5 . The quantum corrections are calculated order by order using second order differential operators acting on the classical periods. Using quantum geometry we calculate the refined free energies in the Nekrasov-Shatashvili limit. Finally we check the non-perturbative completion of topological string theory for the geometry of local F 2 against numerical calculations.

  8. Non-perturbative particle dynamics in (2+1)-gravity

    CERN Document Server

    Bellini, A; Valtancoli, P

    1995-01-01

    We construct a non-perturbative, single-valued solution for the metric and the motion of two interacting particles in (2+1)-Gravity, by using a Coulomb gauge of conformal type. The method provides the mapping from multivalued ( minkowskian ) coordinates to single-valued ones, which solves the non-abelian monodromies due to particles's momenta and can be applied also to the general N-body case.

  9. Calibrated geometries and non perturbative superpotentials in M-theory

    International Nuclear Information System (INIS)

    Hernandez, R.

    1999-12-01

    We consider non perturbative effects in M-theory compactifications on a seven-manifold of G 2 holonomy arising from membranes wrapped on supersymmetric three-cycles. When membranes are wrapped on associative submanifolds they induce a superpotential that can be calculated using calibrated geometry. This superpotential is also derived from compactification on a seven-manifold, to four dimensional Anti-de Sitter spacetime, of eleven dimensional supergravity with non vanishing expectation value of the four-form field strength. (author)

  10. Non-perturbative plaquette in 3d pure SU(3)

    CERN Document Server

    Hietanen, A; Laine, Mikko; Rummukainen, K; Schröder, Y

    2005-01-01

    We present a determination of the elementary plaquette and, after the subsequent ultraviolet subtractions, of the finite part of the gluon condensate, in lattice regularization in three-dimensional pure SU(3) gauge theory. Through a change of regularization scheme to MSbar and a matching back to full four-dimensional QCD, this result determines the first non-perturbative contribution in the weak-coupling expansion of hot QCD pressure.

  11. Non-perturbative inputs for gluon distributions in the hadrons

    Energy Technology Data Exchange (ETDEWEB)

    Ermolaev, B.I. [Ioffe Physico-Technical Institute, Saint Petersburg (Russian Federation); Troyan, S.I. [St. Petersburg Institute of Nuclear Physics, Gatchina (Russian Federation)

    2017-03-15

    Description of hadronic reactions at high energies is conventionally done in the framework of QCD factorization. All factorization convolutions comprise non-perturbative inputs mimicking non-perturbative contributions and perturbative evolution of those inputs. We construct inputs for the gluon-hadron scattering amplitudes in the forward kinematics and, using the optical theorem, convert them into inputs for gluon distributions in the hadrons, embracing the cases of polarized and unpolarized hadrons. In the first place, we formulate mathematical criteria which any model for the inputs should obey and then suggest a model satisfying those criteria. This model is based on a simple reasoning: after emitting an active parton off the hadron, the remaining set of spectators becomes unstable and therefore it can be described through factors of the resonance type, so we call it the resonance model. We use it to obtain non-perturbative inputs for gluon distributions in unpolarized and polarized hadrons for all available types of QCD factorization: basic, K{sub T}-and collinear factorizations. (orig.)

  12. Non-perturbative inputs for gluon distributions in the hadrons

    International Nuclear Information System (INIS)

    Ermolaev, B.I.; Troyan, S.I.

    2017-01-01

    Description of hadronic reactions at high energies is conventionally done in the framework of QCD factorization. All factorization convolutions comprise non-perturbative inputs mimicking non-perturbative contributions and perturbative evolution of those inputs. We construct inputs for the gluon-hadron scattering amplitudes in the forward kinematics and, using the optical theorem, convert them into inputs for gluon distributions in the hadrons, embracing the cases of polarized and unpolarized hadrons. In the first place, we formulate mathematical criteria which any model for the inputs should obey and then suggest a model satisfying those criteria. This model is based on a simple reasoning: after emitting an active parton off the hadron, the remaining set of spectators becomes unstable and therefore it can be described through factors of the resonance type, so we call it the resonance model. We use it to obtain non-perturbative inputs for gluon distributions in unpolarized and polarized hadrons for all available types of QCD factorization: basic, K_T-and collinear factorizations. (orig.)

  13. Non-perturbative O(a) improvement of lattice QCD

    CERN Document Server

    Lüscher, Martin; Sommer, Rainer; Weisz, P; Wolff, U; Luescher, Martin; Sint, Stefan; Sommer, Rainer; Weisz, Peter; Wolff, Ulli

    1997-01-01

    The coefficients multiplying the counterterms required for O($a$) improvement of the action and the isovector axial current in lattice QCD are computed non-perturbatively, in the quenched approximation and for bare gauge couplings $g_0$ in the range $0 \\leq g_0 \\leq 1$. A finite-size method based on the Schrödinger functional is employed, which enables us to perform all calculations at zero or nearly zero quark mass. As a by-product the critical hopping parameter $\\kappa_c$ is obtained at all couplings considered.

  14. Non-perturbative Aspects of QCD and Parameterized Quark Propagator

    Institute of Scientific and Technical Information of China (English)

    HAN Ding-An; ZHOU Li-Juan; ZENG Ya-Guang; GU Yun-Ting; CAO Hui; MA Wei-Xing; MENG Cheng-Ju; PAN Ji-Huan

    2008-01-01

    Based on the Global Color Symmetry Model, the non-perturbative QCD vacuum is investigated in theparameterized fully dressed quark propagator. Our theoretical predictions for various quantities characterized the QCD vacuum are in agreement with those predicted by many other phenomenological QCD inspired models. The successful predictions clearly indicate the extensive validity of our parameterized quark propagator used here. A detailed discussion on the arbitrariness in determining the integration cut-off parameter of# in calculating QCD vacuum condensates and a good method, which avoided the dependence of calculating results on the cut-off parameter is also strongly recommended to readers.

  15. Non-perturbative Debye mass in finite-T QCD

    CERN Document Server

    Kajantie, Keijo; Peisa, J; Rajantie, A; Rummukainen, K; Shaposhnikov, Mikhail E

    1997-01-01

    Employing a non-perturbative gauge invariant definition of the Debye screening mass m_D in the effective field theory approach to finite T QCD, we use 3d lattice simulations to determine the leading O(g^2) and to estimate the next-to-leading O(g^3) corrections to m_D in the high temperature region. The O(g^2) correction is large and modifies qualitatively the standard power-counting hierarchy picture of correlation lengths in high temperature QCD.

  16. Testing QCD in the non-perturbative regime

    Energy Technology Data Exchange (ETDEWEB)

    A.W. Thomas

    2007-01-01

    This is an exciting time for strong interaction physics. We have a candidate for a fundamental theory, namely QCD, which has passed all the tests thrown at it in the perturbative regime. In the non-perturbative regime it has also produced some promising results and recently a few triumphs but the next decade will see enormous progress in our ability to unambiguously calculate the consequences of non-perturbative QCD and to test those predictions experimentally. Amongst the new experimental facilities being constructed, the hadronic machines at JPARC and GSI-FAIR and the 12 GeV Upgrade at Jefferson Lab, the major new electromagnetic facility worldwide, present a beautifully complementary network aimed at producing precise new measurements which will advance our knowledge of nuclear systems and push our ability to calculate the consequences of QCD to the limit. We will first outline the plans at Jefferson Lab for doubling the energy of CEBAF. The new facility presents some wonderful opportunities for discovery in strong interaction physics, as well as beyond the standard model. Then we turn to the theoretical developments aimed at extracting precise results for physical hadron properties from lattice QCD simulations. This discussion will begin with classical examples, such as the mass of the nucleon and ?, before dealing with a very recent and spectacular success involving information extracted from modern parity violating electron scattering.

  17. Introduction to non-perturbative heavy quark effective theory

    International Nuclear Information System (INIS)

    Sommer, R.

    2010-08-01

    My lectures on the effective field theory for heavy quarks, an expansion around the static limit, concentrate on the motivation and formulation of HQET, its renormalization and discretization. This provides the basis for understanding that and how this effective theory can be formulated fully non-perturbatively in the QCD coupling, while by the very nature of an effective field theory, it is perturbative in the expansion parameter 1/m. After the couplings in the effective theory have been determined, the result at a certain order in 1/m is unique up to higher order terms in 1/m. In particular the continuum limit of the lattice regularized theory exists and leaves no trace of how it was regularized. In other words, the theory yields an asymptotic expansion of the QCD observables in 1/m - as usual in a quantum field theory modified by powers of logarithms. None of these properties has been shown rigorously (e.g. to all orders in perturbation theory) but perturbative computations and recently also non-perturbative lattice results give strong support to this ''standard wisdom''. A subtle issue is that a theoretically consistent formulation of the theory is only possible through a non-perturbative matching of its parameters with QCD at finite values of 1/m. As a consequence one finds immediately that the splitting of a result for a certain observable into, for example, lowest order and first order is ambiguous. Depending on how the matching between effective theory and QCD is done, a first order contribution may vanish and appear instead in the lowest order. For example, the often cited phenomenological HQET parameters anti Λ and λ 1 lack a unique non-perturbative definition. But this does not affect the precision of the asymptotic expansion in 1/m. The final result for an observable is correct up to order (1/m) n+1 if the theory was treated including (1/m) n terms. Clearly, the weakest point of HQET is that it intrinsically is an expansion. In practise, carrying it

  18. Introduction to non-perturbative heavy quark effective theory

    Energy Technology Data Exchange (ETDEWEB)

    Sommer, R. [DESY, Zeuthen (Germany). John von Neumann-Inst. fuer Computing NIC

    2010-08-15

    My lectures on the effective field theory for heavy quarks, an expansion around the static limit, concentrate on the motivation and formulation of HQET, its renormalization and discretization. This provides the basis for understanding that and how this effective theory can be formulated fully non-perturbatively in the QCD coupling, while by the very nature of an effective field theory, it is perturbative in the expansion parameter 1/m. After the couplings in the effective theory have been determined, the result at a certain order in 1/m is unique up to higher order terms in 1/m. In particular the continuum limit of the lattice regularized theory exists and leaves no trace of how it was regularized. In other words, the theory yields an asymptotic expansion of the QCD observables in 1/m - as usual in a quantum field theory modified by powers of logarithms. None of these properties has been shown rigorously (e.g. to all orders in perturbation theory) but perturbative computations and recently also non-perturbative lattice results give strong support to this ''standard wisdom''. A subtle issue is that a theoretically consistent formulation of the theory is only possible through a non-perturbative matching of its parameters with QCD at finite values of 1/m. As a consequence one finds immediately that the splitting of a result for a certain observable into, for example, lowest order and first order is ambiguous. Depending on how the matching between effective theory and QCD is done, a first order contribution may vanish and appear instead in the lowest order. For example, the often cited phenomenological HQET parameters anti {lambda} and {lambda}{sub 1} lack a unique non-perturbative definition. But this does not affect the precision of the asymptotic expansion in 1/m. The final result for an observable is correct up to order (1/m){sup n+1} if the theory was treated including (1/m){sup n} terms. Clearly, the weakest point of HQET is that it

  19. Non-perturbative aspects of nonlinear sigma models

    Energy Technology Data Exchange (ETDEWEB)

    Flore, Raphael

    2012-12-07

    The aim of this thesis was the study and further development of non-perturbative methods of quantum field theory by means of their application to nonlinear sigma models. While a large part of the physical phenomena of quantum field theory can be successfully predicted by the perturbation theory, some aspects in the region of large coupling strengths are not definitively understood and require suited non-perturbative methods for its analysis. This thesis is concentrated on two approaches, the numerical treatment of field theories on discrete space-time lattices and the functional renormalization group (FRG) as description of the renormalization flux of effective actions. Considerations of the nonlinear O(N) models have shown that for the correct analysis of the critical properties in the framework of the FRG an approach must be chosen, which contained fourth-derivation orders. For this a covariant formalism was developed, which is based on a background-field expansion and the development of a heat kernel. Apart from a destabilizing coupling the results suggest a nontrivial fixed point and by this a non-perturbative renormalizability of these models. The resulting flow diagrams were finally still compared with the results of a numerical analysis of the renormalization flow by means of the Monte-Carlo renormalization group, and hereby qualitative agreement was found. Furthermore an alternative formulation of the FRG in phase-space coordinates was studied and their consistency tested on simple examples. Beyond this an alternative expansion of the effective action in orders of the canonical momenta was applied to the nonlinear O(N) models with the result of a stable non-trivial fixed point, the critical properties of which however show not the expected N-dependence. By means of the FRG finally still the renormalization of topological operators was studied by means of the winding number of the O(3){approx_equal}CP{sup 1} model. By the generalization of the topological

  20. Non-perturbative aspects of nonlinear sigma models

    International Nuclear Information System (INIS)

    Flore, Raphael

    2012-01-01

    The aim of this thesis was the study and further development of non-perturbative methods of quantum field theory by means of their application to nonlinear sigma models. While a large part of the physical phenomena of quantum field theory can be successfully predicted by the perturbation theory, some aspects in the region of large coupling strengths are not definitively understood and require suited non-perturbative methods for its analysis. This thesis is concentrated on two approaches, the numerical treatment of field theories on discrete space-time lattices and the functional renormalization group (FRG) as description of the renormalization flux of effective actions. Considerations of the nonlinear O(N) models have shown that for the correct analysis of the critical properties in the framework of the FRG an approach must be chosen, which contained fourth-derivation orders. For this a covariant formalism was developed, which is based on a background-field expansion and the development of a heat kernel. Apart from a destabilizing coupling the results suggest a nontrivial fixed point and by this a non-perturbative renormalizability of these models. The resulting flow diagrams were finally still compared with the results of a numerical analysis of the renormalization flow by means of the Monte-Carlo renormalization group, and hereby qualitative agreement was found. Furthermore an alternative formulation of the FRG in phase-space coordinates was studied and their consistency tested on simple examples. Beyond this an alternative expansion of the effective action in orders of the canonical momenta was applied to the nonlinear O(N) models with the result of a stable non-trivial fixed point, the critical properties of which however show not the expected N-dependence. By means of the FRG finally still the renormalization of topological operators was studied by means of the winding number of the O(3)≅CP 1 model. By the generalization of the topological operator and the

  1. Non-perturbative supersymmetry anomaly in supersymmetric QCD

    International Nuclear Information System (INIS)

    Shamir, Y.

    1991-03-01

    The zero modes of the Dirac operator in an instanton and other topologically non-trivial backgrounds are unstable in a large class of massless or partially massless supersymmetric gauge theories. We show that under a generic perturbation of the scalar fields all zero modes become resonances, and discuss the ensuing breakdown of conventional perturbation theory. As a result, despite of the presence of massless fermions, the field theoretic tunneling amplitude is not suppressed. In massless supersymmetric QCD with N c ≤ N f the effective potential is found to be negative and monotonically increasing in the weak coupling regime for scalar VEVs which lie on the perturbatively flat directions. Consequently, massless supersymmetric QCD with N c ≤ N f exhibits a non-perturbative supersymmetry anomaly and exists in a strongly interacting phase which closely resembles ordinary QCD. The same conclusions apply if small masses are added to the lagrangian and the massless limit is smooth. (author). 21 refs, 5 figs

  2. A non-perturbative analysis in finite volume gauge theory

    International Nuclear Information System (INIS)

    Koller, J.; State Univ. of New York, Stony Brook; Van Baal, P.; State Univ. of New York, Stony Brook

    1988-01-01

    We discuss SU(2) gauge theory on a three-torus using a finite volume expansion. Our discovery of natural coordinates allows us to obtain continuum results in a region where Monte Carlo data are also available. The obtained results agree well with the perturbative and semiclassical analysis for small volumes, and there is fair agreement with the Monte Carlo results in intermediate volumes. The simple picture which emerges for the approximate low energy dynamics is that of three interacting particles enclosed in a sphere, with zero total 'angular momentum'. The validity of an adiabatic approximation is investigated. The fundamentally new understanding gained, is that non-perturbative dynamics can be incorporated by imposing boundary conditions which arise through the nontrivial topology of configuration space. (orig.)

  3. Non-perturbative construction of the Luttinger-Ward functional

    Directory of Open Access Journals (Sweden)

    M.Potthoff

    2006-01-01

    Full Text Available For a system of correlated electrons, the Luttinger-Ward functional provides a link between static thermodynamic quantities on the one hand and single-particle excitations on the other. The functional is useful in deriving several general properties of the system as well as in formulating the thermodynamically consistent approximations. Its original construction, however, is perturbative as it is based on the weak-coupling skeleton-diagram expansion. Here, it is shown that the Luttinger-Ward functional can be derived within a general functional-integral approach. This alternative and non-perturbative approach stresses the fact that the Luttinger-Ward functional is universal for a large class of models.

  4. Multiphoton transitions in semiconductors in the non-perturbative approach

    International Nuclear Information System (INIS)

    Iqbal, M.Z.; Hassan, A.R.

    1987-09-01

    Transition rates for multiphoton absorption via direct band-to-band excitation have been calculated using a non-perturbative approach due to Jones and Reiss, based on the Volkov type final state wave functions. Both cases of parabolic and non-parabolic energy bands have been included in our calculations. Absorption coefficients have been obtained for the cases of plane polarized and circularly polarized light. In particular, two-photon absorption coefficients are derived for the two cases of polarization for the parabolic band approximation as well as for non-parabolic bands and compared with the results based on perturbation theory. Numerical estimates of the two photon absorption coefficients resulting from our calculations are also provided. (author). 10 refs, 1 tab

  5. Non-perturbative renormalization of three-quark operators

    Energy Technology Data Exchange (ETDEWEB)

    Goeckeler, Meinulf [Regensburg Univ. (Germany). Inst. fuer Theoretische Physik; Horsley, Roger [Edinburgh Univ. (United Kingdom). School of Physics and Astronomy; Kaltenbrunner, Thomas [Regensburg Univ. (DE). Inst. fuer Theoretische Physik] (and others)

    2008-10-15

    High luminosity accelerators have greatly increased the interest in semi-exclusive and exclusive reactions involving nucleons. The relevant theoretical information is contained in the nucleon wavefunction and can be parametrized by moments of the nucleon distribution amplitudes, which in turn are linked to matrix elements of local three-quark operators. These can be calculated from first principles in lattice QCD. Defining an RI-MOM renormalization scheme, we renormalize three-quark operators corresponding to low moments non-perturbatively and take special care of the operator mixing. After performing a scheme matching and a conversion of the renormalization scale we quote our final results in the MS scheme at {mu}=2 GeV. (orig.)

  6. Non-perturbative approach for laser radiation interactions with solids

    International Nuclear Information System (INIS)

    Jalbert, G.

    1985-01-01

    Multiphoton transitions in direct-gap crystals are studied considering non-perturbative approaches. Two methods currently used for atoms and molecules are revised, generalized and applied to solids. In the first one, we construct an S-matrix which incorporates the eletromagnetic field to all orders in an approximated way leading to analytical solution for the multiphoton transition rates. In the second one, the transition probability is calculated within the Bloch-Floquet formalism applieed to the specific case of solids. This formalism is interpreted as a classical approximation to the quantum treatment of the field. In the weak field limit, we compare our results with the usual perturbation calculations. We also incorporate, in the first approach, the non homogeneity and the multimodes effects of a real laser. (author) [pt

  7. World-Line Formalism: Non-Perturbative Applications

    Directory of Open Access Journals (Sweden)

    Dmitry Antonov

    2016-11-01

    Full Text Available This review addresses the impact on various physical observables which is produced by confinement of virtual quarks and gluons at the level of the one-loop QCD diagrams. These observables include the quark condensate for various heavy flavors, the Yang-Mills running coupling with an infra-red stable fixed point, and the correlation lengths of the stochastic Yang-Mills fields. Other non-perturbative applications of the world-line formalism presented in the review are devoted to the determination of the electroweak phase-transition critical temperature, to the derivation of a semi-classical analogue of the relation between the chiral and the gluon QCD condensates, and to the calculation of the free energy of the gluon plasma in the high-temperature limit. As a complementary result, we demonstrate Casimir scaling of k-string tensions in the Gaussian ensemble of the stochastic Yang-Mills fields.

  8. Probing non-perturbative effects in M-theory

    International Nuclear Information System (INIS)

    Hatsuda, Yasuyuki; Okuyama, Kazumi

    2014-07-01

    The AdS/CFT correspondence enables us to probe M-theory on various backgrounds from the corresponding dual gauge theories. Here we investigate in detail a three-dimensional U(N) N=4 super Yang-Mills theory coupled to one adjoint hypermultiplet and N f fundamental hypermultiplets, which is large N dual to M-theory on AdS 4 x S 7 /Z N f . Using the localization and the Fermi-gas formulation, we explore non-perturbative corrections to the partition function. As in the ABJM theory, we find that there exists a non-trivial pole cancellation mechanism, which guarantees the theory to be well-defined, between worldsheet instantons and membrane instantons for all rational (in particular, physical or integral) values of N f .

  9. A non-perturbative study of massive gauge theories

    DEFF Research Database (Denmark)

    Della Morte, Michele; Hernandez, Pilar

    2013-01-01

    and the lightest degrees of freedom are spin one vector particles with the same quantum numbers as the conserved current, we argue that the most general effective theory describing their low-energy dynamics must be a massive gauge theory. We present results of a exploratory numerical simulation of the model......We consider a non-perturbative formulation of an SU(2) massive gauge theory on a space-time lattice, which is also a discretised gauged non-linear chiral model. The lattice model is shown to have an exactly conserved global SU(2) symmetry. If a scaling region for the lattice model exists...... and find indications for the presence of a scaling region where both a triplet vector and a scalar remain light....

  10. Topological string theory, modularity and non-perturbative physics

    Energy Technology Data Exchange (ETDEWEB)

    Rauch, Marco

    2011-09-15

    In this thesis the holomorphic anomaly of correlators in topological string theory, matrix models and supersymmetric gauge theories is investigated. In the first part it is shown how the techniques of direct integration known from topological string theory can be used to solve the closed amplitudes of Hermitian multi-cut matrix models with polynomial potentials. In the case of the cubic matrix model, explicit expressions for the ring of non-holomorphic modular forms that are needed to express all closed matrix model amplitudes are given. This allows to integrate the holomorphic anomaly equation up to holomorphic modular terms that are fixed by the gap condition up to genus four. There is an one-dimensional submanifold of the moduli space in which the spectral curve becomes the Seiberg-Witten curve and the ring reduces to the non-holomorphic modular ring of the group {gamma}(2). On that submanifold, the gap conditions completely fix the holomorphic ambiguity and the model can be solved explicitly to very high genus. Using these results it is possible to make precision tests of the connection between the large order behavior of the 1/N expansion and non-perturbative effects due to instantons. Finally, it is argued that a full understanding of the large genus asymptotics in the multi-cut case requires a new class of non-perturbative sectors in the matrix model. In the second part a holomorphic anomaly equation for the modified elliptic genus of two M5-branes wrapping a rigid divisor inside a Calabi-Yau manifold is derived using wall-crossing formulae and the theory of mock modular forms. The anomaly originates from restoring modularity of an indefinite theta-function capturing the wall-crossing of BPS invariants associated to D4- D2-D0 brane systems. The compatibility of this equation with anomaly equations previously observed in the context of N=4 topological Yang-Mills theory on P{sup 2} and E-strings obtained from wrapping M5-branes on a del Pezzo surface which in

  11. Topological string theory, modularity and non-perturbative physics

    International Nuclear Information System (INIS)

    Rauch, Marco

    2011-09-01

    In this thesis the holomorphic anomaly of correlators in topological string theory, matrix models and supersymmetric gauge theories is investigated. In the first part it is shown how the techniques of direct integration known from topological string theory can be used to solve the closed amplitudes of Hermitian multi-cut matrix models with polynomial potentials. In the case of the cubic matrix model, explicit expressions for the ring of non-holomorphic modular forms that are needed to express all closed matrix model amplitudes are given. This allows to integrate the holomorphic anomaly equation up to holomorphic modular terms that are fixed by the gap condition up to genus four. There is an one-dimensional submanifold of the moduli space in which the spectral curve becomes the Seiberg-Witten curve and the ring reduces to the non-holomorphic modular ring of the group Γ(2). On that submanifold, the gap conditions completely fix the holomorphic ambiguity and the model can be solved explicitly to very high genus. Using these results it is possible to make precision tests of the connection between the large order behavior of the 1/N expansion and non-perturbative effects due to instantons. Finally, it is argued that a full understanding of the large genus asymptotics in the multi-cut case requires a new class of non-perturbative sectors in the matrix model. In the second part a holomorphic anomaly equation for the modified elliptic genus of two M5-branes wrapping a rigid divisor inside a Calabi-Yau manifold is derived using wall-crossing formulae and the theory of mock modular forms. The anomaly originates from restoring modularity of an indefinite theta-function capturing the wall-crossing of BPS invariants associated to D4- D2-D0 brane systems. The compatibility of this equation with anomaly equations previously observed in the context of N=4 topological Yang-Mills theory on P 2 and E-strings obtained from wrapping M5-branes on a del Pezzo surface which in turn is

  12. Non-perturbative string theories and singular surfaces

    International Nuclear Information System (INIS)

    Bochicchio, M.

    1990-01-01

    Singular surfaces are shown to be dense in the Teichmueller space of all Riemann surfaces and in the grasmannian. This happens because a regular surface of genus h, obtained identifying 2h disks in pairs, can be approximated by a very large genus singular surface with punctures dense in the 2h disks. A scale ε is introduced and the approximate genus is defined as half the number of connected regions covered by punctures of radius ε. The non-perturbative partition function is proposed to be a scaling limit of the partition function on such infinite genus singular surfaces with a weight which is the coupling constant g raised to the approximate genus. For a gaussian model in any space-time dimension the regularized partition function on singular surfaces of infinite genus is the partition function of a two-dimensional lattice gas of charges and monopoles. It is shown that modular invariance of the partition function implies a version of the Dirac quantization condition for the values of the e/m charges. Before the scaling limit the phases of the lattice gas may be classified according to the 't Hooft criteria for the condensation of e/m operators. (orig.)

  13. Non perturbative aspects of strongly correlated electron systems

    International Nuclear Information System (INIS)

    Controzzi, D.

    2000-01-01

    In this thesis we report some selected works on Strongly Correlated Electron Systems. A common ingredient of these works is the use of non-perturbative techniques available in low dimensions. In the first part we use the Bethe Ansatz to study some properties of two families of integrable models introduced by Fateev. We calculate the Thermodynamics of the models and show how they can be interpreted as effective Landau-Ginzburg theories for coupled two-dimensional superconductors interacting with an insulating substrate. This allows us to study exactly the dependence of the critical temperature on the thickness of the insulating layer, and on the interaction between the order parameters of two different superconducting planes. In the second part of the thesis we study the optical conductivity of the sine-Gordon model using the Form Factor method and Conformal Perturbation Theory. This allows us to develop, for the first time, a complete theory of the optical conductivity of one-dimensional Mott insulators, in the Quantum Field Theory limit. (author)

  14. A non-perturbative argument for the non-abelian Higgs mechanism

    Energy Technology Data Exchange (ETDEWEB)

    De Palma, G. [Scuola Normale Superiore, Pisa (Italy); INFN, Sezione di Pisa, Pisa (Italy); Strocchi, F., E-mail: franco.strocchi@sns.it [INFN, Sezione di Pisa, Pisa (Italy)

    2013-09-15

    The evasion of massless Goldstone bosons by the non-abelian Higgs mechanism is proved by a non-perturbative argument in the local BRST gauge. -- Highlights: •The perturbative explanation of the Higgs mechanism (HM) is not under mathematical control. •We offer a non-perturbative proof of the absence of Goldstone bosons from the non-abelian HM. •Our non-perturbative proof in the BRST gauge avoids a mean field ansatz and expansion.

  15. A non-perturbative argument for the non-abelian Higgs mechanism

    International Nuclear Information System (INIS)

    De Palma, G.; Strocchi, F.

    2013-01-01

    The evasion of massless Goldstone bosons by the non-abelian Higgs mechanism is proved by a non-perturbative argument in the local BRST gauge. -- Highlights: •The perturbative explanation of the Higgs mechanism (HM) is not under mathematical control. •We offer a non-perturbative proof of the absence of Goldstone bosons from the non-abelian HM. •Our non-perturbative proof in the BRST gauge avoids a mean field ansatz and expansion

  16. Holomorphic couplings in non-perturbative string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Klevers, Denis Marco

    2011-06-15

    In this thesis we present an analysis of several aspects of four-dimensional, non-perturbative N = 1 compactifications of string theory. Our focus is on the study of brane dynamics and their effective physics as encoded in the holomorphic couplings of the low-energy N=1 effective action, most prominently the superpotential W. The thesis is divided into three parts. In part one we derive the effective action of a spacetime-filling D5-brane in generic Type IIB Calabi-Yau orientifold compactifications. In the second part we invoke tools from string dualities, namely from F-theory, heterotic/F-theory duality and mirror symmetry, for a more elaborate study of the dynamics of (p, q) 7-branes and heterotic five-branes. In this context we demonstrate exact computations of the complete perturbative effective superpotential, both due to branes and background fluxes. Finally, in the third part we present a novel geometric description of five-branes in Type IIB and heterotic M-theory Calabi-Yau compactifications via a non-Calabi-Yau threefold Z{sub 3}, that is canonically constructed from the original five-brane and Calabi-Yau threefold Z{sub 3} via a blow-up. We exploit the use of the blow-up threefold Z{sub 3} as a tool to derive open-closed Picard-Fuchs differential equations, that govern the complete effective brane and flux superpotential. In addition, we present first evidence to interpret Z{sub 3} as a flux compactification dual to the original five-brane by defining an SU(3)-structure on Z{sub 3}, that is generated dynamically by the five-brane backreaction. (orig.)

  17. Holomorphic couplings in non-perturbative string compactifications

    International Nuclear Information System (INIS)

    Klevers, Denis Marco

    2011-06-01

    In this thesis we present an analysis of several aspects of four-dimensional, non-perturbative N = 1 compactifications of string theory. Our focus is on the study of brane dynamics and their effective physics as encoded in the holomorphic couplings of the low-energy N=1 effective action, most prominently the superpotential W. The thesis is divided into three parts. In part one we derive the effective action of a spacetime-filling D5-brane in generic Type IIB Calabi-Yau orientifold compactifications. In the second part we invoke tools from string dualities, namely from F-theory, heterotic/F-theory duality and mirror symmetry, for a more elaborate study of the dynamics of (p, q) 7-branes and heterotic five-branes. In this context we demonstrate exact computations of the complete perturbative effective superpotential, both due to branes and background fluxes. Finally, in the third part we present a novel geometric description of five-branes in Type IIB and heterotic M-theory Calabi-Yau compactifications via a non-Calabi-Yau threefold Z 3 , that is canonically constructed from the original five-brane and Calabi-Yau threefold Z 3 via a blow-up. We exploit the use of the blow-up threefold Z 3 as a tool to derive open-closed Picard-Fuchs differential equations, that govern the complete effective brane and flux superpotential. In addition, we present first evidence to interpret Z 3 as a flux compactification dual to the original five-brane by defining an SU(3)-structure on Z 3 , that is generated dynamically by the five-brane backreaction. (orig.)

  18. A non-perturbative definition of 2D quantum gravity by the fifth time action

    International Nuclear Information System (INIS)

    Ambjoern, J.; Greensite, J.; Varsted, S.

    1990-07-01

    The general formalism for stabilizing bottomless Euclidean field theories (the 'fifth-time' action) provides a natural non-perturbative definition of matrix models corresponding to 2d quantum gravity. The formalism allows, in principle, the use of lattice Monte Carlo techniques for non-perturbative computation of correlation functions. (orig.)

  19. Non-perturbative QCD Effect on K-Factor of Drell-Yan Process

    International Nuclear Information System (INIS)

    Hou Zhaoyu; Zhi Haisu; Chen Junxiao

    2006-01-01

    By using a non-perturbative quark propagator with the lowest-dimensional condensate contributions from the QCD vacuum, the non-perturbative effect to K-factor of the Drell-Yan process is numerically investigated for 12 6 C- 12 6 C collision at the center-of-mass energy (s) 1/2 = 200 GeV, 630 GeV respectively. Calculated results show that the non-perturbative QCD effect has just a weak influence on K-factor in the two cases.

  20. PREFACE: Loops 11: Non-Perturbative / Background Independent Quantum Gravity

    Science.gov (United States)

    Mena Marugán, Guillermo A.; Barbero G, J. Fernando; Garay, Luis J.; Villaseñor, Eduardo J. S.; Olmedo, Javier

    2012-05-01

    Loops 11 The international conference LOOPS'11 took place in Madrid from the 23-28 May 2011. It was hosted by the Instituto de Estructura de la Materia (IEM), which belongs to the Consejo Superior de Investigaciones Cientĺficas (CSIC). Like previous editions of the LOOPS meetings, it dealt with a wealth of state-of-the-art topics on Quantum Gravity, with special emphasis on non-perturbative background-independent approaches to spacetime quantization. The main topics addressed at the conference ranged from the foundations of Quantum Gravity to its phenomenological aspects. They encompassed different approaches to Loop Quantum Gravity and Cosmology, Polymer Quantization, Quantum Field Theory, Black Holes, and discrete approaches such as Dynamical Triangulations, amongst others. In addition, this edition celebrated the 25th anniversary of the introduction of the now well-known Ashtekar variables and the Wednesday morning session was devoted to this silver jubilee. The structure of the conference was designed to reflect the current state and future prospects of research on the different topics mentioned above. Plenary lectures that provided general background and the 'big picture' took place during the mornings, and the more specialised talks were distributed in parallel sessions during the evenings. To be more specific, Monday evening was devoted to Shape Dynamics and Phenomenology Derived from Quantum Gravity in Parallel Session A, and to Covariant Loop Quantum Gravity and Spin foams in Parallel Session B. Tuesday's three Parallel Sessions dealt with Black Hole Physics and Dynamical Triangulations (Session A), the continuation of Monday's session on Covariant Loop Quantum Gravity and Spin foams (Session B) and Foundations of Quantum Gravity (Session C). Finally, Thursday and Friday evenings were devoted to Loop Quantum Cosmology (Session A) and to Hamiltonian Loop Quantum Gravity (Session B). The result of the conference was very satisfactory and enlightening. Not

  1. Non-perturbative treatment of relativistic quantum corrections in large Z atoms

    International Nuclear Information System (INIS)

    Dietz, K.; Weymans, G.

    1983-09-01

    Renormalised g-Hartree-Dirac equations incorporating Dirac sea contributions are derived. Their implications for the non-perturbative, selfconsistent calculation of quantum corrections in large Z atoms are discussed. (orig.)

  2. Thoughts on non-perturbative thermalization and jet quenching in heavy ion collisions

    International Nuclear Information System (INIS)

    Kovchegov, Yuri V.

    2006-01-01

    We start by presenting physical arguments for the impossibility of perturbative thermalization leading to (non-viscous) Bjorken hydrodynamic description of heavy ion collisions. These arguments are complimentary to our more formal argument presented in [Yu.V. Kovchegov, hep-ph/0503038]. We argue that the success of hydrodynamic models in describing the quark-gluon system produced in heavy ion collisions could only be due to non-perturbative strong coupling effects. We continue by studying non-perturbative effects in heavy ion collisions at high energies. We model non-perturbative phenomena by an instanton ensemble. We show that non-perturbative instanton vacuum fields may significantly contribute to jet quenching in nuclear collisions. At the same time, the instanton ensemble contribution to thermalization is likely to be rather weak, leading to non-perturbative thermalization time comparable to the time of hadronization. This example illustrates that jet quenching is not necessarily a signal of a thermalized medium. Indeed, since the instanton models do not capture all the effects of QCD vacuum (e.g., they do not account for confinement), there may be other non-perturbative effects facilitating thermalization of the system

  3. Non-perturbative renormalization of static-light four-fermion operators in quenched lattice QCD

    Energy Technology Data Exchange (ETDEWEB)

    Palombi, F. [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Papinutto, M.; Pena, C. [CERN, Geneva (Switzerland). Physics Dept., Theory Div.; Wittig, H. [Mainz Univ. (Germany). Inst. fuer Kernphysik

    2007-06-15

    We perform a non-perturbative study of the scale-dependent renormalization factors of a multiplicatively renormalizable basis of {delta}B=2 parity-odd four-fermion operators in quenched lattice QCD. Heavy quarks are treated in the static approximation with various lattice discretizations of the static action. Light quarks are described by nonperturbatively O(a) improved Wilson-type fermions. The renormalization group running is computed for a family of Schroedinger functional (SF) schemes through finite volume techniques in the continuum limit. We compute non-perturbatively the relation between the renormalization group invariant operators and their counterparts renormalized in the SF at a low energy scale. Furthermore, we provide non-perturbative estimates for the matching between the lattice regularized theory and all the SF schemes considered. (orig.)

  4. Non-perturbative improvement of stout-smeared three flavour clover fermions

    Energy Technology Data Exchange (ETDEWEB)

    Cundy, N.; Goeckeler, M. [Regensburg Univ. (Germany). Inst. fuer Theoretische Physik; Horsley, R. [Edinburgh Univ. (GB). School of Physics and Astronomy] (and others)

    2009-01-15

    We discuss a 3-flavour lattice QCD action with clover improvement in which the fermion matrix has single level stout smearing for the hopping terms together with unsmeared links for the clover term. With the (tree-level) Symanzik improved gluon action this constitutes the Stout Link Non-perturbative Clover or SLiNC action. To cancel O(a) terms the clover term coefficient has to be tuned. We present here results of a non-perturbative determination of this coefficient using the Schroedinger functional and as a by-product a determination of the critical hopping parameter. Comparisons of the results are made with lowest order perturbation theory. (orig.)

  5. Controlling quark mass determinations non-perturbatively in three-flavour QCD

    CERN Document Server

    Campos, Isabel

    2017-01-01

    The determination of quark masses from lattice QCD simulations requires a non-perturbative renormalization procedure and subsequent scale evolution to high energies, where a conversion to the commonly used MS-bar scheme can be safely established. We present our results for the non-perturbative running of renormalized quark masses in Nf=3 QCD between the electroweak and a hadronic energy scale, where lattice simulations are at our disposal. Recent theoretical advances in combination with well-established techniques allows to follow the scale evolution to very high statistical accuracy, and full control of systematic effects.

  6. Ab initio approach to the non-perturbative scalar Yukawa model

    OpenAIRE

    Li, YangDepartment of Physics and Astronomy, Iowa State University, Ames, IA, 50011, USA; Karmanov, V.A.(Lebedev Physical Institute, Leninsky Prospekt 53, Moscow, 119991, Russia); Maris, P.(Department of Physics and Astronomy, Iowa State University, Ames, IA, 50011, USA); Vary, J.P.(Department of Physics and Astronomy, Iowa State University, Ames, IA, 50011, USA)

    2015-01-01

    We report on the first non-perturbative calculation of the scalar Yukawa model in the single-nucleon sector up to four-body Fock sector truncation (one "scalar nucleon" and three "scalar pions"). The light-front Hamiltonian approach with a systematic non-perturbative renormalization is applied. We study the $n$-body norms and the electromagnetic form factor. We find that the one- and two-body contributions dominate up to coupling $\\alpha \\approx 1.7$. As we approach the coupling $\\alpha \\appr...

  7. Non-perturbative heavy quark effective theory. An application to semi-leptonic B-decays

    International Nuclear Information System (INIS)

    Della Morte, Michele; Heitger, Jochen; Simma, Hubert; Sommer, Rainer; Humboldt-Universitaet, Berlin

    2015-01-01

    We review a lattice strategy how to non-perturbatively determine the coefficients in the HQET expansion of all components of the heavy-light axial and vector currents, including 1/m h -corrections. We also discuss recent preliminary results on the form factors parameterizing semi-leptonic B-decays at the leading order in 1/m h .

  8. Non-perturbative subtractions in the heavy quark effective field theory

    International Nuclear Information System (INIS)

    Maiani, L.; Martinelli, G.; Sachrajda, C.T.

    1992-01-01

    We demonstrate the presence of ultraviolet power divergences in the O(1/m h ) corrections to matrix elements of hadronic operators containing a heavy quark field (where m h is the mass of the heavy quark). These power divergences must be subtracted non-perturbatively. The implications for lattice computations are discussed in detail. (orig.)

  9. Spectral zeta function and non-perturbative effects in ABJM Fermi-gas

    International Nuclear Information System (INIS)

    Hatsuda, Yasuyuki

    2015-03-01

    The exact partition function in ABJM theory on three-sphere can be regarded as a canonical partition function of a non-interacting Fermi-gas with an unconventional Hamiltonian. All the information on the partition function is encoded in the discrete spectrum of this Hamiltonian. We explain how (quantum mechanical) non-perturbative corrections in the Fermi-gas system appear from a spectral consideration. Basic tools in our analysis are a Mellin-Barnes type integral representation and a spectral zeta function. From a consistency with known results, we conjecture that the spectral zeta function in the ABJM Fermi-gas has an infinite number of ''non-perturbative'' poles, which are invisible in the semi-classical expansion of the Planck constant. We observe that these poles indeed appear after summing up perturbative corrections. As a consequence, the perturbative resummation of the spectral zeta function causes non-perturbative corrections to the grand canonical partition function. We also present another example associated with a spectral problem in topological string theory. A conjectured non-perturbative free energy on the resolved conifold is successfully reproduced in this framework.

  10. Non-perturbative Heavy-Flavor Transport at RHIC and LHC

    Energy Technology Data Exchange (ETDEWEB)

    He, Min, E-mail: mhe@comp.tamu.edu; Fries, Rainer J.; Rapp, Ralf

    2013-08-15

    We calculate open heavy-flavor (HF) transport in relativistic heavy-ion collisions by applying a strong-coupling treatment in both macro- and microscopic dynamics (hydrodynamics and non-perturbative diffusion interactions). The hydrodynamic medium evolution is quantitatively constrained by bulk and multi-strange hadron spectra and elliptic flow. The heavy quark transport coefficient is evaluated from a non-perturbative T-matrix approach in the Quark–Gluon Plasma which, close to the critical temperature, leads to resonance formation and feeds into the recombination of heavy quarks on a hydrodynamic hypersurface. In the hadronic phase, the diffusion of HF mesons is obtained from effective hadronic theory. We compute observables at RHIC and LHC for non-photonic electrons and HF mesons, respectively.

  11. Non-perturbative BRST quantization of Euclidean Yang-Mills theories in Curci-Ferrari gauges

    Science.gov (United States)

    Pereira, A. D.; Sobreiro, R. F.; Sorella, S. P.

    2016-10-01

    In this paper we address the issue of the non-perturbative quantization of Euclidean Yang-Mills theories in the Curci-Ferrari gauge. In particular, we construct a refined Gribov-Zwanziger action for this gauge, which takes into account the presence of gauge copies as well as the dynamical formation of dimension-two condensates. This action enjoys a non-perturbative BRST symmetry recently proposed in Capri et al. (Phys. Rev. D 92(4), 045039. doi: 10.1103/PhysRevD.92.045039 arXiv:1506.06995 [hep-th], 2015). Finally, we pay attention to the gluon propagator in different space-time dimensions.

  12. Non-perturbative BRST quantization of Euclidean Yang-Mills theories in Curci-Ferrari gauges

    International Nuclear Information System (INIS)

    Pereira, A.D.; Sobreiro, R.F.; Sorella, S.P.

    2016-01-01

    In this paper we address the issue of the non-perturbative quantization of Euclidean Yang-Mills theories in the Curci-Ferrari gauge. In particular, we construct a refined Gribov-Zwanziger action for this gauge, which takes into account the presence of gauge copies as well as the dynamical formation of dimension-two condensates. This action enjoys a non-perturbative BRST symmetry recently proposed in Capri et al. (Phys. Rev. D 92(4), 045039. doi:10.1103/PhysRevD.92.045039. arXiv:1506.06995 [hepth], 2015). Finally, we pay attention to the gluon propagator in different space-time dimensions. (orig.)

  13. HQET at order 1/m. Pt. 1. Non-perturbative parameters in the quenched approximation

    Energy Technology Data Exchange (ETDEWEB)

    Blossier, Benoit [Paris XI Univ., 91 - Orsay (France). Lab. de Physique Theorique; Della Morte, Michele [Mainz Univ. (Germany). Inst. fuer Kernphysik; Garron, Nicolas [Universidad Autonoma de Madrid (Spain). Dept. Fisica Teorica y Inst. de Fisica Teorica UAM/CSIC; Edinburgh Univ. (United Kingdom). School of Physics and Astronomy - SUPA; Sommer, Rainer [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany). John von Neumann-Inst. fuer Computing NIC

    2010-01-15

    We determine non-perturbatively the parameters of the lattice HQET Lagrangian and those of heavy-light axial-vector and vector currents in the quenched approximation. The HQET expansion includes terms of order 1/m{sub b}. Our results allow to compute, for example, the heavy-light spectrum and B-meson decay constants in the static approximation and to order 1/m{sub b} in HQET. The determination of the parameters is separated into universal and non-universal parts. The universal results can be used to determine the parameters for various discretizations. The computation reported in this paper uses the plaquette gauge action and the ''HYP1/2'' action for the b-quark described by HQET. The parameters of the currents also depend on the light-quark action, for which we choose non-perturbatively O(a)-improved Wilson fermions. (orig.)

  14. HQET at order 1/m. Pt. 1. Non-perturbative parameters in the quenched approximation

    International Nuclear Information System (INIS)

    Blossier, Benoit; Della Morte, Michele; Garron, Nicolas; Edinburgh Univ.; Sommer, Rainer

    2010-01-01

    We determine non-perturbatively the parameters of the lattice HQET Lagrangian and those of heavy-light axial-vector and vector currents in the quenched approximation. The HQET expansion includes terms of order 1/m b . Our results allow to compute, for example, the heavy-light spectrum and B-meson decay constants in the static approximation and to order 1/m b in HQET. The determination of the parameters is separated into universal and non-universal parts. The universal results can be used to determine the parameters for various discretizations. The computation reported in this paper uses the plaquette gauge action and the ''HYP1/2'' action for the b-quark described by HQET. The parameters of the currents also depend on the light-quark action, for which we choose non-perturbatively O(a)-improved Wilson fermions. (orig.)

  15. Non-perturbative BRST quantization of Euclidean Yang-Mills theories in Curci-Ferrari gauges

    Energy Technology Data Exchange (ETDEWEB)

    Pereira, A.D. [UFF, Universidade Federal Fluminense, Instituto de Fisica, Campus da Praia Vermelha, Niteroi, RJ (Brazil); Max Planck Institute for Gravitational Physics, Albert Einstein Institute, Potsdam (Germany); UERJ, Universidade do Estado do Rio de Janeiro, Departamento de Fisica Teorica, Rio de Janeiro (Brazil); Sobreiro, R.F. [UFF, Universidade Federal Fluminense, Instituto de Fisica, Campus da Praia Vermelha, Niteroi, RJ (Brazil); Sorella, S.P. [UERJ, Universidade do Estado do Rio de Janeiro, Departamento de Fisica Teorica, Rio de Janeiro (Brazil)

    2016-10-15

    In this paper we address the issue of the non-perturbative quantization of Euclidean Yang-Mills theories in the Curci-Ferrari gauge. In particular, we construct a refined Gribov-Zwanziger action for this gauge, which takes into account the presence of gauge copies as well as the dynamical formation of dimension-two condensates. This action enjoys a non-perturbative BRST symmetry recently proposed in Capri et al. (Phys. Rev. D 92(4), 045039. doi:10.1103/PhysRevD.92.045039. arXiv:1506.06995 [hepth], 2015). Finally, we pay attention to the gluon propagator in different space-time dimensions. (orig.)

  16. Four-fluxes and non-perturbative superpotentials in two dimensions

    International Nuclear Information System (INIS)

    Lerche, W.

    1998-01-01

    We show how certain non-perturbative superpotentials W(Σ), which are the two-dimensional analogs of the Seiberg-Witten prepotential in 4d, can be computed via geometric engineering from 4-folds. We analyze an explicit example for which the relevant compact geometry of the 4-fold is given by P 1 fibered over P 2 . In the field theory limit, this gives an effective U(1) gauge theory with N=(2,2) supersymmetry in two dimensions. We find that the analog of the SW curve is a K3 surface, and that the complex FI coupling is given by the modular parameter of this surface. The FI potential itself coincides with the middle period of a meromorphic differential. However, it only shows up in the effective action if a certain 4-flux is switched on, and then supersymmetry appears to be non-perturbatively broken. (orig.)

  17. Large N non-perturbative effects in N=4 superconformal Chern-Simons theories

    International Nuclear Information System (INIS)

    Hatsuda, Yasuyuki; Honda, Masazumi; Okuyama, Kazumi

    2015-07-01

    We investigate the large N instanton effects of partition functions in a class of N = 4 circular quiver Chern-Simons theories on a three-sphere. Our analysis is based on the supersymmetry localization and the Fermi-gas formalism. The resulting matrix model can be regarded as a two-parameter deformation of the ABJM matrix model, and has richer non-perturbative structures. Based on a systematic semi-classical analysis, we find analytic expressions of membrane instanton corrections. We also exactly compute the partition function for various cases and find some exact forms of worldsheet instanton corrections, which appear as quantum mechanical non-perturbative corrections in the Fermi-gas system.

  18. Non-perturbative approach to 2D-supergravity and super-Virasoro constraints

    CERN Document Server

    Becker, M

    1994-01-01

    The coupling of N=1 SCFT of type (4m,2) to two-dimensional supergravity can be formulated non-perturbatively in terms of a discrete super-eigenvalue model proposed by Alvarez-Gaum\\'e, et al. We derive the superloop equations that describe, in the double scaling limit, the non-perturbative solution of this model. These equations are equivalent to the double scaled super-Virasoro constraints satisfied by the partition function. They are formulated in terms of a \\widehat c=1 theory, with a \\IZ_2-twisted scalar field and a Weyl-Majorana fermion in the Ramond sector. We have solved the superloop equations to all orders in the genus expansion and obtained the explicit expressions for the correlation functions of gravitationally dressed scaling operators in the NS- and R-sector. In the double scaling limit, we obtain a formulation of the model in terms of a new supersymmetric extension of the KdV hierarchy.

  19. Non-perturbative analytical solutions of the space- and time-fractional Burgers equations

    International Nuclear Information System (INIS)

    Momani, Shaher

    2006-01-01

    Non-perturbative analytical solutions for the generalized Burgers equation with time- and space-fractional derivatives of order α and β, 0 < α, β ≤ 1, are derived using Adomian decomposition method. The fractional derivatives are considered in the Caputo sense. The solutions are given in the form of series with easily computable terms. Numerical solutions are calculated for the fractional Burgers equation to show the nature of solution as the fractional derivative parameter is changed

  20. Comments on exact quantization conditions and non-perturbative topological strings

    International Nuclear Information System (INIS)

    Hatsuda, Yasuyuki

    2015-12-01

    We give some remarks on exact quantization conditions associated with quantized mirror curves of local Calabi-Yau threefolds, conjectured in arXiv:1410.3382. It is shown that they characterize a non-perturbative completion of the refined topological strings in the Nekrasov-Shatashvili limit. We find that the quantization conditions enjoy an exact S-dual invariance. We also discuss Borel summability of the semi-classical spectrum.

  1. Large x Behaviour and the Non-Perturbative Structure of Hadronic Systems

    Energy Technology Data Exchange (ETDEWEB)

    Anthony W. Thomas

    2005-02-01

    While the traditional interest in structure functions has been the confirmation of the predictions of perturbative QCD, this data also contains a wealth of information on how QCD works in the infrared, or confinement, region. As the challenge of the strong force now turns to the study of QCD in the non-perturbative region, such information is extremely valuable.We outline some of the key issues for both nucleon and nuclear structure functions.

  2. Non-perturbative renormalisation of left-left four-fermion operators with Neuberger fermions

    International Nuclear Information System (INIS)

    Dimopoulos, P.; Giusti, L.; Hernandez, P.; Palombi, F.; Pena, C.; Vladikas, A.; Wennekers, J.; Wittig, H.

    2006-01-01

    We outline a general strategy for the non-perturbative renormalisation of composite operators in discretisations based on Neuberger fermions, via a matching to results obtained with Wilson-type fermions. As an application, we consider the renormalisation of the four-quark operators entering the ΔS=1 and ΔS=2 effective Hamiltonians. Our results are an essential ingredient for the determination of the low-energy constants governing non-leptonic kaon decays

  3. Physics beyond the standard model in the non-perturbative unification scheme

    International Nuclear Information System (INIS)

    Kapetanakis, D.; Zoupanos, G.

    1990-01-01

    The non-perturbative unification scenario predicts reasonably well the low energy gauge couplings of the standard model. Agreement with the measured low energy couplings is obtained by assuming certain kind of physics beyond the standard model. A number of possibilities for physics beyond the standard model is examined. The best candidates so far are the standard model with eight fermionic families and a similar number of Higgs doublets, and the supersymmetric standard model with five families. (author)

  4. A non-perturbative approach to the Coleman-Weinberg mechanism in massless scalar QED

    International Nuclear Information System (INIS)

    Malbouisson, A.P.C.; Nogueira, F.S.; Svaiter, N.F.

    1995-08-01

    We rederived non-perturbatively the Coleman-Weinberg expression for the effective potential for massless scalar QED. Our result is not restricted to small values of the coupling constants. This shows that the Coleman-Weinberg result can be established beyond the range of perturbation theory. Also, we derive it in a manifestly renormalization group invariant way. It is shown that with the derivation given no Landau ghost singularity arises. The finite temperature case is discussed. (author). 13 refs

  5. Introduction and overview to some topics in perturbative QCD and their relationship to non perturbative effects

    International Nuclear Information System (INIS)

    West, G.

    1990-01-01

    The main thrust of this talk is to review and discuss various topics in both perturbative and non-perturbative QCD that are, by and large, model independent. This inevitably means that we shall rely heavily on the renormalization group and asymptotic freedom. Although this usually means that one has to concentrate on high energy phenomena, there are some physical processes even involving bound states which are certainly highly non-perturbative, where one can make some progress without becoming overly model independent. Experience with the EMC effect, where there are about as many ''explanations'' as authors, has surely taught us that it may well be worth returning to ''basics'' and thinking about general properties of QCD rather than guessing, essentially arbitrarily, what we think is its low energy structure. No doubt we shall have to await further numerical progress or for some inspired theoretical insight before we can, with confidence, attack these extremely difficult problems. So, with this in mine, I shall review a smattering of problems which do have a non-perturbative component and where some rather modest progress can actually be made; I emphasize the adjective ''modest''exclamation point

  6. Non-perturbative QCD Effects and the Top Mass at the Tevatron

    CERN Document Server

    Wicke, Daniel

    2008-01-01

    The modelling of non-perturbative effects is an important part of modern collider physics simulations. In hadron collisions there is some indication that the modelling of the interactions of the beam remnants, the underlying event, may require non-trivial colour reconnection effects to be present. We recently introduced a universally applicable toy model of such reconnections, based on hadronising strings. This model, which has one free parameter, has been implemented in the Pythia event generator. We then considered several parameter sets (`tunes'), constrained by fits to Tevatron minimum-bias data, and determined the sensitivity of a simplified top mass analysis to these effects, in exclusive semi-leptonic top events at the Tevatron. A first attempt at isolating the genuine non-perturbative effects gave an estimate of order +-0.5GeV from non-perturbative uncertainties. The results presented here are an update to the original study and include recent bug fixes of Pythia that influenced the tunings investigat...

  7. Non-perturbative phenomena in QCD vacuum, hadrons, and quark-gluon plasma

    International Nuclear Information System (INIS)

    Shuryak, E.V.

    1983-01-01

    These lectures provide a brief review of recent progress in non-perturbative quantum chromodynamics (QCD). They are intended for non specialists, mainly experimentalists. The main object of discussion, the QCD vacuum, is a rather complicated medium. It may be studied either by infinitesimal probes producing microscopic excitations (=hadrons), or by finite excitations (say, heating some volume to a given temperature T). In the latter case, some qualitative changes (phase transitions) should take place. A summary is given of the extent to which such phenomena can be observed in the laboratory by proton-proton, proton-nucleus, and nucleus-nucleus collisions. (orig.)

  8. Non-perturbative computation of the strong coupling constant on the lattice

    International Nuclear Information System (INIS)

    Sommer, Rainer; Humboldt-Universitaet, Berlin; Wolff, Ulli

    2015-01-01

    We review the long term project of the ALPHA collaboration to compute in QCD the running coupling constant and quark masses at high energy scales in terms of low energy hadronic quantities. The adapted techniques required to numerically carry out the required multiscale non-perturbative calculation with our special emphasis on the control of systematic errors are summarized. The complete results in the two dynamical flavor approximation are reviewed and an outlook is given on the ongoing three flavor extension of the programme with improved target precision.

  9. Two-dimensional sigma models: modelling non-perturbative effects of gauge theories

    International Nuclear Information System (INIS)

    Novikov, V.A.; Shifman, M.A.; Vainshtein, A.I.; Zakharov, V.I.

    1984-01-01

    The review is devoted to a discussion of non-perturbative effects in gauge theories and two-dimensional sigma models. The main emphasis is put on supersymmetric 0(3) sigma model. The instanton-based method for calculating the exact Gell-Mann-Low function and bifermionic condensate is considered in detail. All aspects of the method in simplifying conditions are discussed. The basic points are: the instanton measure from purely classical analysis; a non-renormalization theorem in self-dual external fields; existence of vacuum condensates and their compatibility with supersymmetry

  10. New Results in {mathcal {N}}=2 N = 2 Theories from Non-perturbative String

    Science.gov (United States)

    Bonelli, Giulio; Grassi, Alba; Tanzini, Alessandro

    2018-03-01

    We describe the magnetic phase of SU(N) $\\mathcal{N}=2$ Super Yang-Mills theories in the self-dual Omega background in terms of a new class of multi-cut matrix models. These arise from a non-perturbative completion of topological strings in the dual four dimensional limit which engineers the gauge theory in the strongly coupled magnetic frame. The corresponding spectral determinants provide natural candidates for the tau functions of isomonodromy problems for flat spectral connections associated to the Seiberg-Witten geometry.

  11. Super Toeplitz operators and non-perturbative deformation quantization of supermanifolds

    Energy Technology Data Exchange (ETDEWEB)

    Borthwick, D.; Lesniewski, A.; Rinaldi, M. (Harvard Univ., Cambridge, MA (United States). Lyman Lab. of Physics); Klimek, S. (IUPUI, Indianapolis, IN (United States). Dept. of Mathematics)

    1993-04-01

    The purpose of this paper is to construct non-perturbative deformation quantizations of the algebras of smooth functions on Poisson supermanifolds. For the examples U[sup 1vertical] [sup stroke1] and C[sup mvertical] [sup stroken], algebras of super Toeplitz operators are defined with respect to certain Hilbert spaces of superholomorphic functions. Generators and relations for these algebras are given. The algebras can be thought of as algebras of 'quantized functions', and deformation conditions are proven which demonstrate the recovery of the super Piosson structures in a semi-classical limit. (orig.).

  12. Coulomb versus nuclear break-up of 11Be halo nucleus in a non perturbative framework

    International Nuclear Information System (INIS)

    Fallot, M.; Scarpaci, J.A.; Margueron, J.; Lacroix, D.; Chomaz, Ph.

    2000-01-01

    The 11 Be break-up is calculated using a non perturbative time-dependent quantum calculation. The evolution of the neutron halo wave function shows an emission of neutron at large angles for grazing impact parameters and at forward angles for large impact parameters. The neutron angular distribution is deduced for the different targets and compared to experimental data. We emphasize the diversity of diffraction mechanisms, in particular we discuss the interplay of the nuclear effects such as the towing mode and the Coulomb break-up. A good agreement is found with experimental data. (authors)

  13. Non-perturbative scalar potential inspired by type IIA strings on rigid CY

    Energy Technology Data Exchange (ETDEWEB)

    Alexandrov, Sergei [Laboratoire Charles Coulomb (L2C), UMR 5221, CNRS-Université de Montpellier,F-34095, Montpellier (France); Ketov, Sergei V. [Department of Physics, Tokyo Metropolitan University,1-1 Minami-ohsawa, Hachioji-shi, Tokyo 192-0397 (Japan); Kavli Institute for the Physics and Mathematics of the Universe (IPMU), The University of Tokyo,Chiba 277-8568 (Japan); Institute of Physics and Technology, Tomsk Polytechnic University,30 Lenin Ave., Tomsk 634050 (Russian Federation); Wakimoto, Yuki [Department of Physics, Tokyo Metropolitan University,1-1 Minami-ohsawa, Hachioji-shi, Tokyo 192-0397 (Japan)

    2016-11-10

    Motivated by a class of flux compactifications of type IIA strings on rigid Calabi-Yau manifolds, preserving N=2 local supersymmetry in four dimensions, we derive a non-perturbative potential of all scalar fields from the exact D-instanton corrected metric on the hypermultiplet moduli space. Applying this potential to moduli stabilization, we find a discrete set of exact vacua for axions. At these critical points, the stability problem is decoupled into two subspaces spanned by the axions and the other fields (dilaton and Kähler moduli), respectively. Whereas the stability of the axions is easily achieved, numerical analysis shows instabilities in the second subspace.

  14. Analyzing Bs - anti Bs mixing. Non-perturbative contributions to bag parameters from sum rules

    International Nuclear Information System (INIS)

    Mannel, T.; Pivovarov, A.A.; Russian Academy of Sciecnes, Moscow

    2007-03-01

    We use QCD sum rules to compute matrix elements of the ΔB=2 operators appearing in the heavy-quark expansion of the width difference of the B s mass eigenstates. Our analysis includes the leading-order operators Q and Q S , as well as the subleading operators R 2 and R 3 , which appear at next-to-leading order in the 1/m b expansion. We conclude that the violation of the factorization approximation for these matrix elements due to non-perturbative vacuum condensates is as low as 1-2%. (orig.)

  15. Non-perturbative effects in the transverse momentum distribution of electroweak bosons at the LHC

    CERN Document Server

    Siodmok, Andrzej; Seymour, Michael H

    2009-01-01

    The transverse momentum of electroweak bosons in a Drell-Yan process is an important quantity for the experimental program at the LHC. The new model of non-perturbative gluon emission in an initial state parton shower presented in this note gives a good description of this quantity for the data taken in previous experiments over a wide range of CM energy. The model's prediction for the transverse momentum distribution of Z bosons for the LHC is presented and used for a comparison with other approaches.

  16. Quasilocal quark models as effective theory of non-perturbative QCD

    International Nuclear Information System (INIS)

    Andrianov, A.A.

    2006-01-01

    We consider the Quasilocal Quark Model of NJL type (QNJLM) as effective theory of non-perturbative QCD including scalar (S), pseudo-scalar (P), vector (V) and axial-vector (A) four-fermion interaction with derivatives. In the presence of a strong attraction in the scalar channel the chiral symmetry is spontaneously broken and as a consequence the composite meson states are generated in all channels. With the help of Operator Product Expansion the appropriate set of Chiral Symmetry Restoration (CSR) Sum Rules in these channels are imposed as matching rules to QCD at intermediate energies. The mass spectrum and some decay constants for ground and excited meson states are calculated

  17. Non-perturbative field theory/field theory on a lattice

    International Nuclear Information System (INIS)

    Ambjorn, J.

    1988-01-01

    The connection between the theory of critical phenomena in statistical mechanics and the renormalization of field theory is briefly outlined. The way of using this connection is described to get information about non-perturbative quantities in QCD and about more intelligent ways of doing the Monte Carlo (MC) simulations. The (MC) method is shown to be a viable one in high energy physics, but it is not a good substitute for an analytic understanding. MC-methods will be very valuable both for getting out hard numbers and for testing the correctness of new ideas

  18. Orbital classical solutions, non-perturbative phenomena and singularity at the zero coupling constant point

    International Nuclear Information System (INIS)

    Vourdas, A.

    1982-01-01

    We try to extend previous arguments on orbital classical solutions in non-relativistic quantum mechanics to the 1/4lambda vertical stroke phi vertical stroke 4 complex relativistic field theory. The single valuedness of the Green function in the semiclassical (Planksche Konstante → 0) limit leads to a Bohr-Sommerfeld quantization. A path integral formalism for the Green functions analogous to that in non-relativistic quantum mechanics is employed and a semiclassical approach which uses our classical solutions indicates non-perturbative effects. They reflect an esub(1/lambda) singularity at the zero coupling constant point. (orig.)

  19. Non-perturbative renormalization of left-left four-fermion operators in quenched lattice QCD

    CERN Document Server

    Guagnelli, M; Peña, C; Sint, S; Vladikas, A

    2006-01-01

    We define a family of Schroedinger Functional renormalization schemes for the four-quark multiplicatively renormalizable operators of the $\\Delta F = 1$ and $\\Delta F = 2$ effective weak Hamiltonians. Using the lattice regularization with quenched Wilson quarks, we compute non-perturbatively the renormalization group running of these operators in the continuum limit in a large range of renormalization scales. Continuum limit extrapolations are well controlled thanks to the implementation of two fermionic actions (Wilson and Clover). The ratio of the renormalization group invariant operator to its renormalized counterpart at a low energy scale, as well as the renormalization constant at this scale, is obtained for all schemes.

  20. Non-Perturbative Asymptotic Improvement of Perturbation Theory and Mellin-Barnes Representation

    Directory of Open Access Journals (Sweden)

    Samuel Friot

    2010-10-01

    Full Text Available Using a method mixing Mellin-Barnes representation and Borel resummation we show how to obtain hyperasymptotic expansions from the (divergent formal power series which follow from the perturbative evaluation of arbitrary ''N-point'' functions for the simple case of zero-dimensional φ4 field theory. This hyperasymptotic improvement appears from an iterative procedure, based on inverse factorial expansions, and gives birth to interwoven non-perturbative partial sums whose coefficients are related to the perturbative ones by an interesting resurgence phenomenon. It is a non-perturbative improvement in the sense that, for some optimal truncations of the partial sums, the remainder at a given hyperasymptotic level is exponentially suppressed compared to the remainder at the preceding hyperasymptotic level. The Mellin-Barnes representation allows our results to be automatically valid for a wide range of the phase of the complex coupling constant, including Stokes lines. A numerical analysis is performed to emphasize the improved accuracy that this method allows to reach compared to the usual perturbative approach, and the importance of hyperasymptotic optimal truncation schemes.

  1. Fundamental parameters of QCD from non-perturbative methods for two and four flavors

    International Nuclear Information System (INIS)

    Marinkovic, Marina

    2013-01-01

    The non-perturbative formulation of Quantumchromodynamics (QCD) on a four dimensional space-time Euclidean lattice together with the finite size techniques enable us to perform the renormalization of the QCD parameters non-perturbatively. In order to obtain precise predictions from lattice QCD, one needs to include the dynamical fermions into lattice QCD simulations. We consider QCD with two and four mass degenerate flavors of O(a) improved Wilson quarks. In this thesis, we improve the existing determinations of the fundamental parameters of two and four flavor QCD. In four flavor theory, we compute the precise value of the Λ parameter in the units of the scale L max defined in the hadronic regime. We also give the precise determination of the Schroedinger functional running coupling in four flavour theory and compare it to the perturbative results. The Monte Carlo simulations of lattice QCD within the Schroedinger Functional framework were performed with a platform independent program package Schroedinger Funktional Mass Preconditioned Hybrid Monte Carlo (SF-MP-HMC), developed as a part of this project. Finally, we compute the strange quark mass and the Λ parameter in two flavour theory, performing a well-controlled continuum limit and chiral extrapolation. To achieve this, we developed a universal program package for simulating two flavours of Wilson fermions, Mass Preconditioned Hybrid Monte Carlo (MP-HMC), which we used to run large scale simulations on small lattice spacings and on pion masses close to the physical value.

  2. B-physics from non-perturbatively renormalized HQET in two-flavour lattice QCD

    Energy Technology Data Exchange (ETDEWEB)

    Bernardoni, Fabio; Simma, Hubert [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany). John von Neumann-Inst. fuer Computing NIC; Blossier, Benoit; Gerardin, Antoine [Paris-11 Univ., 91 - Orsay (France). Lab. de Physique Theorique; CNRS, Orsay (France); Bulava, John [CERN, Geneva (Switzerland). Physics Department; Della Morte, Michele; Hippel, Georg M. von [Mainz Univ. (Germany). Inst. fuer Kernphysik; Fritzsch, Patrick [Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; Garron, Nicolas [Trinity College, Dublin (Ireland). School of Mathematics; Heitger, Jochen [Muenster Univ. (Germany). Inst. fuer Theoretische Physik 1; Collaboration: ALPHA Collaboration

    2012-10-15

    We report on the ALPHA Collaboration's lattice B-physics programme based on N{sub f}=2 O(a) improved Wilson fermions and HQET, including all NLO effects in the inverse heavy quark mass, as well as non-perturbative renormalization and matching, to fix the parameters of the effective theory. Our simulations in large physical volume cover 3 lattice spacings a {approx} (0.08-0.05) fm and pion masses down to 190 MeV to control continuum and chiral extrapolations. We present the status of results for the b-quark mass and the B{sub (s)}-meson decay constants, f{sub B} and f{sub B{sub s}}.

  3. Phase control of the probability of electronic transitions in the non-perturbative laser field intensity

    International Nuclear Information System (INIS)

    Yokoyama, Keiichi; Sugita, Akihiro; Yamada, Hidetaka; Teranishi, Yoshiaki; Yokoyama, Atsushi

    2007-01-01

    A preparatory study on the quantum control of the selective transition K(4S 1/2 ) → K(4P J ) (J=1/2, 3/2) in intense laser field is reported. To generate high average power femtosecond laser pulses with enough field intensity, a Ti:Sapphire regenerative amplifier system with a repetition rate of 1 kHz is constructed. The bandwidth and pulse energy are shown to qualify the required values for the completely selective transition with 100% population inversion. A preliminary experiment of the selective excitation shows that the fringe pattern formed by a phase related pulse pair depends on the laser intensity, indicating that the perturbative behavior of the excitation probabilities is not valid any more and the laser intensity reaches a non-perturbative region. (author)

  4. A Non-Perturbative, Finite Particle Number Approach to Relativistic Scattering Theory

    Energy Technology Data Exchange (ETDEWEB)

    Lindesay, James V

    2001-05-11

    We present integral equations for the scattering amplitudes of three scalar particles, using the Faddeev channel decomposition, which can be readily extended to any finite number of particles of any helicity. The solution of these equations, which have been demonstrated to be calculable, provide a non-perturbative way of obtaining relativistic scattering amplitudes for any finite number of particles that are Lorentz invariant, unitary, cluster decomposable and reduce unambiguously in the non-relativistic limit to the non-relativistic Faddeev equations. The aim of this program is to develop equations which explicitly depend upon physically observable input variables, and do not require ''renormalization'' or ''dressing'' of these parameters to connect them to the boundary states.

  5. Non-perturbative running of quark masses in three-flavour QCD

    CERN Document Server

    Campos, Isabel; Pena, Carlos; Preti, David; Ramos, Alberto; Vladikas, Anastassios

    2016-01-01

    We present our preliminary results for the computation of the non-perturbative running of renormalized quark masses in $N_f = 3$ QCD, between the electroweak and hadronic scales, using standard finite-size scaling techniques. The computation is carried out to very high precision, using massless $\\mathcal{O}(a)$-improved Wilson quarks. Following the strategy adopted by the ALPHA Collaboration for the running coupling, different schemes are used above and below a scale $\\mu_0 \\sim m_b$, which differ by using either the Schr\\"odinger Functional or Gradient Flow renormalized coupling. We discuss our results for the running in both regions, and the procedure to match the two schemes.

  6. From Faddeev-Kulish to LSZ. Towards a non-perturbative description of colliding electrons

    Science.gov (United States)

    Dybalski, Wojciech

    2017-12-01

    In a low energy approximation of the massless Yukawa theory (Nelson model) we derive a Faddeev-Kulish type formula for the scattering matrix of N electrons and reformulate it in LSZ terms. To this end, we perform a decomposition of the infrared finite Dollard modifier into clouds of real and virtual photons, whose infrared divergencies mutually cancel. We point out that in the original work of Faddeev and Kulish the clouds of real photons are omitted, and consequently their wave-operators are ill-defined on the Fock space of free electrons. To support our observations, we compare our final LSZ expression for N = 1 with a rigorous non-perturbative construction due to Pizzo. While our discussion contains some heuristic steps, they can be formulated as clear-cut mathematical conjectures.

  7. 1/4 BPS States and Non-Perturbative Couplings in N=4 String Theories

    CERN Document Server

    Lerche, W.

    1999-01-01

    We compute certain 2K+4-point one-loop couplings in the type IIA string compactified on K3 x T^2, which are related a topological index on this manifold. Their special feature is that they are sensitive to only short and intermediate BPS multiplets. The couplings derive from underlying prepotentials of the form G(T,U)=d^{2K}V ln[chi10(T,U,V)], where chi10(T,U,V) is the helicity partition function of 1/4 BPS states. In the dual heterotic string on T^6, the amplitudes describe non-perturbative gravitational corrections due to bound states of fivebrane instantons with heterotic world-sheet instantons. We argue, as a consequence, that our results give information about instanton configurations in six dimensional Sp(2k) gauge theories on T^6.

  8. Non-perturbative QCD. Renormalization, O(a)-improvement and matching to heavy quark effective theory

    International Nuclear Information System (INIS)

    Sommer, R.

    2006-11-01

    We give an introduction to three topics in lattice gauge theory: I. The Schroedinger Functional and O(a) improvement. O(a) improvement has been reviewed several times. Here we focus on explaining the basic ideas in detail and then proceed directly to an overview of the literature and our personal assessment of what has been achieved and what is missing. II. The computation of the running coupling, running quark masses and the extraction of the renormalization group invariants. We focus on the basic strategy and on the large effort that has been invested in understanding the continuum limit. We point out what remains to be done. III. Non-perturbative Heavy Quark Effective Theory. Since the literature on this subject is still rather sparse, we go beyond the basic ideas and discuss in some detail how the theory works in principle and in practice. (orig.)

  9. Non-perturbative QCD. Renormalization, O(a)-improvement and matching to heavy quark effective theory

    Energy Technology Data Exchange (ETDEWEB)

    Sommer, R.

    2006-11-15

    We give an introduction to three topics in lattice gauge theory: I. The Schroedinger Functional and O(a) improvement. O(a) improvement has been reviewed several times. Here we focus on explaining the basic ideas in detail and then proceed directly to an overview of the literature and our personal assessment of what has been achieved and what is missing. II. The computation of the running coupling, running quark masses and the extraction of the renormalization group invariants. We focus on the basic strategy and on the large effort that has been invested in understanding the continuum limit. We point out what remains to be done. III. Non-perturbative Heavy Quark Effective Theory. Since the literature on this subject is still rather sparse, we go beyond the basic ideas and discuss in some detail how the theory works in principle and in practice. (orig.)

  10. Quantum fields in the non-perturbative regime. Yang-Mills theory and gravity

    Energy Technology Data Exchange (ETDEWEB)

    Eichhorn, Astrid

    2011-09-06

    In this thesis we study candidates for fundamental quantum field theories, namely non-Abelian gauge theories and asymptotically safe quantum gravity. Whereas the first ones have a stronglyinteracting low-energy limit, the second one enters a non-perturbative regime at high energies. Thus, we apply a tool suited to the study of quantum field theories beyond the perturbative regime, namely the Functional Renormalisation Group. In a first part, we concentrate on the physical properties of non-Abelian gauge theories at low energies. Focussing on the vacuum properties of the theory, we present an evaluation of the full effective potential for the field strength invariant F{sub {mu}}{sub {nu}}F{sup {mu}}{sup {nu}} from non-perturbative gauge correlation functions and find a non-trivial minimum corresponding to the existence of a dimension four gluon condensate in the vacuum. We also relate the infrared asymptotic form of the {beta} function of the running background-gauge coupling to the asymptotic behavior of Landau-gauge gluon and ghost propagators and derive an upper bound on their scaling exponents. We then consider the theory at finite temperature and study the nature of the confinement phase transition in d = 3+1 dimensions in various non-Abelian gauge theories. For SU(N) with N= 3,..,12 and Sp(2) we find a first-order phase transition in agreement with general expectations. Moreover our study suggests that the phase transition in E(7) Yang-Mills theory also is of first order. Our studies shed light on the question which property of a gauge group determines the order of the phase transition. In a second part we consider asymptotically safe quantum gravity. Here, we focus on the Faddeev-Popov ghost sector of the theory, to study its properties in the context of an interacting UV regime. We investigate several truncations, which all lend support to the conjecture that gravity may be asymptotically safe. In a first truncation, we study the ghost anomalous dimension

  11. Quantum fields in the non-perturbative regime. Yang-Mills theory and gravity

    International Nuclear Information System (INIS)

    Eichhorn, Astrid

    2011-01-01

    In this thesis we study candidates for fundamental quantum field theories, namely non-Abelian gauge theories and asymptotically safe quantum gravity. Whereas the first ones have a stronglyinteracting low-energy limit, the second one enters a non-perturbative regime at high energies. Thus, we apply a tool suited to the study of quantum field theories beyond the perturbative regime, namely the Functional Renormalisation Group. In a first part, we concentrate on the physical properties of non-Abelian gauge theories at low energies. Focussing on the vacuum properties of the theory, we present an evaluation of the full effective potential for the field strength invariant F μν F μν from non-perturbative gauge correlation functions and find a non-trivial minimum corresponding to the existence of a dimension four gluon condensate in the vacuum. We also relate the infrared asymptotic form of the β function of the running background-gauge coupling to the asymptotic behavior of Landau-gauge gluon and ghost propagators and derive an upper bound on their scaling exponents. We then consider the theory at finite temperature and study the nature of the confinement phase transition in d = 3+1 dimensions in various non-Abelian gauge theories. For SU(N) with N= 3,..,12 and Sp(2) we find a first-order phase transition in agreement with general expectations. Moreover our study suggests that the phase transition in E(7) Yang-Mills theory also is of first order. Our studies shed light on the question which property of a gauge group determines the order of the phase transition. In a second part we consider asymptotically safe quantum gravity. Here, we focus on the Faddeev-Popov ghost sector of the theory, to study its properties in the context of an interacting UV regime. We investigate several truncations, which all lend support to the conjecture that gravity may be asymptotically safe. In a first truncation, we study the ghost anomalous dimension which we find to be negative at the

  12. Non-Perturbative QCD Coupling and Beta Function from Light Front Holography

    Energy Technology Data Exchange (ETDEWEB)

    Brodsky, Stanley J.; /SLAC /Southern Denmark U., CP3-Origins; de Teramond, Guy F.; /Costa Rica U.; Deur, Alexandre; /Jefferson Lab

    2010-05-26

    The light-front holographic mapping of classical gravity in AdS space, modified by a positive-sign dilaton background, leads to a non-perturbative effective coupling {alpha}{sub s}{sup AdS} (Q{sup 2}). It agrees with hadron physics data extracted from different observables, such as the effective charge defined by the Bjorken sum rule, as well as with the predictions of models with built-in confinement and lattice simulations. It also displays a transition from perturbative to nonperturbative conformal regimes at a momentum scale {approx} 1 GeV. The resulting {beta}-function appears to capture the essential characteristics of the full {beta}-function of QCD, thus giving further support to the application of the gauge/gravity duality to the confining dynamics of strongly coupled QCD. Commensurate scale relations relate observables to each other without scheme or scale ambiguity. In this paper we extrapolate these relations to the nonperturbative domain, thus extending the range of predictions based on {alpha}{sub s}{sup AdS} (Q{sup 2}).

  13. Non-perturbative effective potential: Lower bounds on the Higgs mass and dynamical applications

    International Nuclear Information System (INIS)

    Faivre, H.

    2006-01-01

    The purpose of this work was to assess the benefits of using non-perturbative methods to phenomenological issues in field theory. The exact equations of the Wilson renormalization group (RG) and the effective action have been used, we have computed the energy gap between the first 2 levels in double-well potential. We get a very good agreement with exact solutions inferring from the numerical solving of the Schroedinger equation. RG equations lead to a convex effective potential that is consistent with theory. We have considered the Higgs sector of the standard model. It is commonly acknowledged that the Yukawa coupling between the top quark and the Higgs boson generates the instability of the electroweak vacuum at high energy. We show that this instability does not exist, it is a mere consequence of the extrapolation of the RG equations beyond their validity range. We have also used the effective potential for the description of the time history of the mean value of the quantum field. We have defined the conditions under which the dynamics of the mean value can be described in the local potential approximation by classical equations of motion in which the effective potential replaces the classical potential. (A.C.)

  14. Non-perturbative Approach to Equation of State and Collective Modes of the QGP

    Directory of Open Access Journals (Sweden)

    Y.F. Liu Shuai

    2018-01-01

    Full Text Available We discuss a non-perturbative T-matrix approach to investigate the microscopic structure of the quark-gluon plasma (QGP. Utilizing an effective Hamiltonian which includes both light- and heavy-parton degrees of freedoms. The basic two-body interaction includes color-Coulomb and confining contributions in all available color channels, and is constrained by lattice-QCD data for the heavy-quark free energy. The in-medium T-matrices and parton spectral functions are computed selfconsistently with full account of off-shell properties encoded in large scattering widths. We apply the T-matrices to calculate the equation of state (EoS for the QGP, including a ladder resummation of the Luttinger-Ward functional using a matrix-log technique to account for the dynamical formation of bound states. It turns out that the latter become the dominant degrees of freedom in the EoS at low QGP temperatures indicating a transition from parton to hadron degrees of freedom. The calculated spectral properties of one- and two-body states confirm this picture, where large parton scattering rates dissolve the parton quasiparticle structures while broad resonances start to form as the pseudocritical temperature is approached from above. Further calculations of transport coefficients reveal a small viscosity and heavy-quark diffusion coefficient.

  15. Non-Perturbative QCD Coupling and Beta Function from Light Front Holography

    International Nuclear Information System (INIS)

    Brodsky, Stanley J.

    2010-01-01

    The light-front holographic mapping of classical gravity in AdS space, modified by a positive-sign dilaton background, leads to a non-perturbative effective coupling α s AdS (Q 2 ). It agrees with hadron physics data extracted from different observables, such as the effective charge defined by the Bjorken sum rule, as well as with the predictions of models with built-in confinement and lattice simulations. It also displays a transition from perturbative to nonperturbative conformal regimes at a momentum scale ∼ 1 GeV. The resulting β-function appears to capture the essential characteristics of the full β-function of QCD, thus giving further support to the application of the gauge/gravity duality to the confining dynamics of strongly coupled QCD. Commensurate scale relations relate observables to each other without scheme or scale ambiguity. In this paper we extrapolate these relations to the nonperturbative domain, thus extending the range of predictions based on α s AdS (Q 2 ).

  16. G-fluxes and non-perturbative stabilisation of heterotic M-theory

    International Nuclear Information System (INIS)

    Curio, Gottfried; Krause, Axel

    2002-01-01

    We examine heterotic M-theory compactified on a Calabi-Yau manifold with an additional parallel M5-brane. The dominant non-perturbative effect stems from open membrane instantons connecting the M5 with the boundaries. We derive the four-dimensional low-energy supergravity potential for this situation including subleading contributions as it turns out that the leading term vanishes after minimisation. At the minimum of the potential the M5 gets stabilised at the middle of the orbifold interval while the vacuum energy is shown to be manifestly positive. Moreover, induced by the non-trivial running of the Calabi-Yau volume along the orbifold which is driven by the G-fluxes, we find that the orbifold-length and the Calabi-Yau volume modulus are stabilised at values which are related by the G-flux of the visible boundary. Finally we determine the supersymmetry-breaking scale and the gravitino mass for this open membrane vacuum

  17. {alpha}{sub s} from the non-perturbatively renormalised lattice three-gluon vertex

    Energy Technology Data Exchange (ETDEWEB)

    Alles, B. [Pisa Univ. (Italy). Dipt. di Fisica; Henty, D.S. [Department of Physics and Astronomy, University of Edinburgh, Edinburgh EH9 3JZ (United Kingdom); Panagopoulos, H. [Department of Natural Sciences, University of Cyprus, CY-1678 Nicosia (Cyprus); Parrinello, C. [Department of Mathematical Sciences, University of Liverpool, Liverpool L69 3BX (United Kingdom); Pittori, C. [L.P.T.H.E., Universite de Paris Sud, Centre d`Orsay, 91405 Orsay (France); Richards, D.G. [Department of Physics and Astronomy, University of Edinburgh, Edinburgh EH9 3JZ (United Kingdom)]|[Fermilab, P.O. Box 500, Batavia, IL 60510 (United States)

    1997-09-29

    We compute the running QCD coupling on the lattice by evaluating two-point and three-point off-shell gluon Green`s functions in a fixed gauge and imposing non-perturbative renormalisation conditions on them. Our exploratory study is performed in the quenched approximation at {beta}=6.0 on 16{sup 4} and 24{sup 4} lattices. We show that, for momenta in the range 1.8-2.3 GeV, our coupling runs according to the two-loop asymptotic formula, allowing a precise determination of the corresponding {Lambda} parameter. The role of lattice artifacts and finite-volume effects is carefully analysed and these appear to be under control in the momentum range of interest. Our renormalisation procedure corresponds to a momentum subtraction scheme in continuum field theory, and therefore lattice perturbation theory is not needed in order to match our results to the anti M anti S scheme, thus eliminating a major source of uncertainty in the determination of {alpha} {sub anti} {sub M} {sub anti} {sub S}. Our method can be applied directly to the unquenched case. (orig.). 20 refs.

  18. Infrared behavior of the effective coupling in quantum chromodynamics: A non-perturbative approach

    International Nuclear Information System (INIS)

    Bar-Gadda, U.

    1980-01-01

    In this paper we examine a different viewpoint, based on a self-consistent approach. This means that rather than attempting to identify any particular physical mechanism as dominating the QCD vacuum state we use the non-perturbative Schwinger-Dyson equations and Slavnov-Taylor identities of QCD as well as the renormalization group equation to obtain the self-consistent behavior of the effective coupling in the infrared region. We show that the infrared effective coupling behavior anti g(q 2 /μ 2 , gsub(R)(μ)) = (μ 2 /q 2 )sup(lambda/2)gsub(R)(μ) in the infrared limit q 2 /μ 2 → 0, where μ 2 is the euclidean subtraction point; lambda = 1/2(d - 2), where d is the space-time dimension, is the preferred solution if a sufficient self-consistency condition is satisfied. Finally we briefly discuss the nature of the dynamical mass Λ and the 1/N expansion as well as an effective bound state equation. (orig.)

  19. Non perturbative method for radiative corrections applied to lepton-proton scattering

    International Nuclear Information System (INIS)

    Chahine, C.

    1979-01-01

    We present a new, non perturbative method to effect radiative corrections in lepton (electron or muon)-nucleon scattering, useful for existing or planned experiments. This method relies on a spectral function derived in a previous paper, which takes into account both real soft photons and virtual ones and hence is free from infrared divergence. Hard effects are computed perturbatively and then included in the form of 'hard factors' in the non peturbative soft formulas. Practical computations are effected using the Gauss-Jacobi integration method which reduce the relevant integrals to a rapidly converging sequence. For the simple problem of the radiative quasi-elastic peak, we get an exponentiated form conjectured by Schwinger and found by Yennie, Frautschi and Suura. We compare also our results with the peaking approximation, which we derive independantly, and with the exact one-photon emission formula of Mo and Tsai. Applications of our method to the continuous spectrum include the radiative tail of the Δ 33 resonance in e + p scattering and radiative corrections to the Feynman scale invariant F 2 structure function for the kinematics of two recent high energy muon experiments

  20. A complete non-perturbative renormalization prescription for quasi-PDFs

    Energy Technology Data Exchange (ETDEWEB)

    Alexandrou, Constantia [Cyprus Univ., Nicosia (Cyprus). Dept. of Physics; The Cyprus Institute, Nicosia (Cyprus); Cichy, Krzysztof [Frankfurt Univ. (Germany). Inst. fuer Theoretische Physik; Adam Mickiewicz Univ., Poznan (Poland). Faculty of Physics; Constantinou, Martha [Temple Univ., Philadelphia, PA (United States). Dept. of Physics; Hadjiyiannakou, Kyriakos [The Cyprus Institute, Nicosia (Cyprus); Jansen, Karl; Steffens, Fernanda [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany). John von Neumann-Inst. fuer Computing NIC; Panagopoulos, Haralambos [Cyprus Univ., Nicosia (Cyprus). Dept. of Physics; Collaboration: European Twisted Mass Collaboration

    2017-06-15

    In this work we present, for the first time, the non-perturbative renormalization for the unpolarized, helicity and transversity quasi-PDFs, in an RI{sup '} scheme. The proposed prescription addresses simultaneously all aspects of renormalization: logarithmic divergences, finite renormalization as well as the linear divergence which is present in the matrix elements of fermion operators with Wilson lines. Furthermore, for the case of the unpolarized quasi-PDF, we describe how to eliminate the unwanted mixing with the twist-3 scalar operator. We utilize perturbation theory for the one-loop conversion factor that brings the renormalization functions to the MS-scheme at a scale of 2 GeV. We also explain how to improve the estimates on the renormalization functions by eliminating lattice artifacts. The latter can be computed in one-loop perturbation theory and to all orders in the lattice spacing. We apply the methodology for the renormalization to an ensemble of twisted mass fermions with N{sub f}=2+1+1 dynamical quarks, and a pion mass of around 375 MeV.

  1. Non-perturbative measurement of low-intensity charged particle beams

    Science.gov (United States)

    Fernandes, M.; Geithner, R.; Golm, J.; Neubert, R.; Schwickert, M.; Stöhlker, T.; Tan, J.; Welsch, C. P.

    2017-01-01

    Non-perturbative measurements of low-intensity charged particle beams are particularly challenging to beam diagnostics due to the low amplitude of the induced electromagnetic fields. In the low-energy antiproton decelerator (AD) and the future extra low energy antiproton rings at CERN, an absolute measurement of the beam intensity is essential to monitor the operation efficiency. Superconducting quantum interference device (SQUID) based cryogenic current comparators (CCC) have been used for measuring slow charged beams in the nA range, showing a very good current resolution. But these were unable to measure fast bunched beams, due to the slew-rate limitation of SQUID devices and presented a strong susceptibility to external perturbations. Here, we present a CCC system developed for the AD machine, which was optimised in terms of its current resolution, system stability, ability to cope with short bunched beams, and immunity to mechanical vibrations. This paper presents the monitor design and the first results from measurements with a low energy antiproton beam obtained in the AD in 2015. These are the first CCC beam current measurements ever performed in a synchrotron machine with both coasting and short bunched beams. It is shown that the system is able to stably measure the AD beam throughout the entire cycle, with a current resolution of 30 {nA}.

  2. Turbulent mixing of a critical fluid: The non-perturbative renormalization

    Directory of Open Access Journals (Sweden)

    M. Hnatič

    2018-01-01

    Full Text Available Non-perturbative Renormalization Group (NPRG technique is applied to a stochastical model of a non-conserved scalar order parameter near its critical point, subject to turbulent advection. The compressible advecting flow is modeled by a random Gaussian velocity field with zero mean and correlation function 〈υjυi〉∼(Pji⊥+αPji∥/kd+ζ. Depending on the relations between the parameters ζ, α and the space dimensionality d, the model reveals several types of scaling regimes. Some of them are well known (model A of equilibrium critical dynamics and linear passive scalar field advected by a random turbulent flow, but there is a new nonequilibrium regime (universality class associated with new nontrivial fixed points of the renormalization group equations. We have obtained the phase diagram (d, ζ of possible scaling regimes in the system. The physical point d=3, ζ=4/3 corresponding to three-dimensional fully developed Kolmogorov's turbulence, where critical fluctuations are irrelevant, is stable for α≲2.26. Otherwise, in the case of “strong compressibility” α≳2.26, the critical fluctuations of the order parameter become relevant for three-dimensional turbulence. Estimations of critical exponents for each scaling regime are presented.

  3. Towards a non-perturbative matching of HQET and QCD with dynamical light quarks

    International Nuclear Information System (INIS)

    Della Morte, M.; Simma, H.; Sommer, R.

    2007-10-01

    We explain how the strategy of solving renormalization problems in HQET non-perturbatively by a matching to QCD in finite volume can be implemented to include dynamical fermions. As a primary application, some elements of an HQET computation of the mass of the b-quark beyond the leading order with N f =2 are outlined. In particular, the matching of HQET and QCD requires relativistic QCD simulations in a volume with L∼0.5 fm, which will serve to quantitatively determine the heavy quark mass dependence of heavy-light meson observables in the continuum limit of finite-volume two-flavour lattice QCD. As a preparation for the latter, we report on our determination of the renormalization constants and improvement coefficients relating the renormalized current and subtracted bare quark mass in the relevant weak coupling region. The calculation of these coefficients employs a constant physics condition in the Schrodinger functional scheme, where the box size L is fixed by working at a prescribed value of the renormalized coupling. (orig.)

  4. Exact quantization conditions, toric Calabi-Yau and non-perturbative topological string

    Energy Technology Data Exchange (ETDEWEB)

    Sun, Kaiwen [Department of Mathematics, University of Science and Technology of China,96 Jinzhai Road, Hefei, Anhui 230026 (China); Wang, Xin; Huang, Min-xin [Interdisciplinary Center for Theoretical Study,Department of Modern Physics, University of Science and Technology of China,96 Jinzhai Road, Hefei, Anhui 230026 (China)

    2017-01-16

    We establish the precise relation between the Nekrasov-Shatashvili (NS) quantization scheme and Grassi-Hatsuda-Mariño conjecture for the mirror curve of arbitrary toric Calabi-Yau threefold. For a mirror curve of genus g, the NS quantization scheme leads to g quantization conditions for the corresponding integrable system. The exact NS quantization conditions enjoy a self S-duality with respect to Planck constant ℏ and can be derived from the Lockhart-Vafa partition function of non-perturbative topological string. Based on a recent observation on the correspondence between spectral theory and topological string, another quantization scheme was proposed by Grassi-Hatsuda-Mariño, in which there is a single quantization condition and the spectra are encoded in the vanishing of a quantum Riemann theta function. We demonstrate that there actually exist at least g nonequivalent quantum Riemann theta functions and the intersections of their theta divisors coincide with the spectra determined by the exact NS quantization conditions. This highly nontrivial coincidence between the two quantization schemes requires infinite constraints among the refined Gopakumar-Vafa invariants. The equivalence for mirror curves of genus one has been verified for some local del Pezzo surfaces. In this paper, we generalize the correspondence to higher genus, and analyze in detail the resolved ℂ{sup 3}/ℤ{sub 5} orbifold and several SU(N) geometries. We also give a proof for some models at ℏ=2π/k.

  5. Necessary and sufficient conditions for non-perturbative equivalences of large Nc orbifold gauge theories

    International Nuclear Information System (INIS)

    Kovtun, Pave; Uensal, Mithat; Yaffe, Laurence G.

    2005-01-01

    Large N coherent state methods are used to study the relation between U(N c ) gauge theories containing adjoint representation matter fields and their orbifold projections. The classical dynamical systems which reproduce the large N c limits of the quantum dynamics in parent and daughter orbifold theories are compared. We demonstrate that the large N c dynamics of the parent theory, restricted to the subspace invariant under the orbifold projection symmetry, and the large N c dynamics of the daughter theory, restricted to the untwisted sector invariant under 'theory space' permutations, coincide. This implies equality, in the large N c limit, between appropriately identified connected correlation functions in parent and daughter theories, provided the orbifold projection symmetry is not spontaneously broken in the parent theory and the theory space permutation symmetry is not spontaneously broken in the daughter. The necessity of these symmetry realization conditions for the validity of the large N c equivalence is unsurprising, but demonstrating the sufficiency of these conditions is new. This work extends an earlier proof of non-perturbative large N c equivalence which was only valid in the phase of the (lattice regularized) theories continuously connected to large mass and strong coupling

  6. Towards a non-perturbative matching of HQET and QCD with dynamical light quarks

    Energy Technology Data Exchange (ETDEWEB)

    Della Morte, M. [CERN, Geneva (Switzerland). Physics Dept.; Fritzsch, P.; Heitger, J. [Muenster Univ. (Germany). Inst. fuer Theoretische Physik 1; Meyer, H.B. [Massachusets Institute of Technology, Center for Theoretical Physics, Cambridge, MA (United States); Simma, H.; Sommer, R. [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany)

    2007-10-15

    We explain how the strategy of solving renormalization problems in HQET non-perturbatively by a matching to QCD in finite volume can be implemented to include dynamical fermions. As a primary application, some elements of an HQET computation of the mass of the b-quark beyond the leading order with N{sub f} =2 are outlined. In particular, the matching of HQET and QCD requires relativistic QCD simulations in a volume with L{approx}0.5 fm, which will serve to quantitatively determine the heavy quark mass dependence of heavy-light meson observables in the continuum limit of finite-volume two-flavour lattice QCD. As a preparation for the latter, we report on our determination of the renormalization constants and improvement coefficients relating the renormalized current and subtracted bare quark mass in the relevant weak coupling region. The calculation of these coefficients employs a constant physics condition in the Schrodinger functional scheme, where the box size L is fixed by working at a prescribed value of the renormalized coupling. (orig.)

  7. The non-perturbative QCD Debye mass from a Wilson line operator

    CERN Document Server

    Laine, Mikko

    1999-01-01

    According to a proposal by Arnold and Yaffe, the non-perturbative g^2T-contribution to the Debye mass in the deconfined QCD plasma phase can be determined from a single Wilson line operator in the three-dimensional pure SU(3) gauge theory. We extend a previous SU(2) measurement of this quantity to the physical SU(3) case. We find a numerical coefficient which is more accurate and smaller than that obtained previously with another method, but still very large compared with the naive expectation: the correction is larger than the leading term up to T ~ 10^7 T_c, corresponding to g^2 ~ 0.4. At moderate temperatures T ~ 2 T_c, a consistent picture emerges where the Debye mass is m_D ~ 6T, the lightest gauge invariant screening mass in the system is ~ 3T, and the purely magnetic operators couple dominantly to a scale ~ 6T. Electric (~ gT) and magnetic (~ g^2T) scales are therefore strongly overlapping close to the phase transition, and the colour-electric fields play an essential role in the dynamics.

  8. Correlations in double parton distributions: perturbative and non-perturbative effects

    Energy Technology Data Exchange (ETDEWEB)

    Rinaldi, Matteo; Scopetta, Sergio [Dipartimento di Fisica e Geologia, Università degli Studi di Perugia andIstituto Nazionale di Fisica Nucleare, Sezione di Perugia, via A. Pascoli, I-06123 Perugia (Italy); Traini, Marco [Institut de Physique Théorique CEA-Saclay, F-91191 Gif-sur-Yvette (France); INFN - TIFPA, Dipartimento di Fisica, Università degli Studi di Trento,Via Sommarive 14, I-38123 Povo (Trento) (Italy); Vento, Vicente [Departament de Física Teòrica, Universitat de València and Institut de Física Corpuscular,Consejo Superior de Investigaciones Científicas, 46100 Carrer del Dr. Moliner 50 València (Spain)

    2016-10-12

    The correct description of Double Parton Scattering (DPS), which represents a background in several channels for the search of new Physics at the LHC, requires the knowledge of double parton distribution functions (dPDFs). These quantities represent also a novel tool for the study of the three-dimensional nucleon structure, complementary to the possibilities offered by electromagnetic probes. In this paper we analyze dPDFs using Poincaré covariant predictions obtained by using a Light-Front constituent quark model proposed in a recent paper, and QCD evolution. We study to what extent factorized expressions for dPDFs, which neglect, at least in part, two-parton correlations, can be used. We show that they fail in reproducing the calculated dPDFs, in particular in the valence region. Actually measurable processes at existing facilities occur at low longitudinal momenta of the interacting partons; to have contact with these processes we have analyzed correlations between pairs of partons of different kind, finding that, in some cases, they are strongly suppressed at low longitudinal momenta, while for other distributions they can be sizeable. For example, the effect of gluon-gluon correlations can be as large as 20 %. We have shown that these behaviors can be understood in terms of a delicate interference of non-perturbative correlations, generated by the dynamics of the model, and perturbative ones, generated by the model independent evolution procedure. Our analysis shows that at LHC kinematics two-parton correlations can be relevant in DPS, and therefore we address the possibility to study them experimentally.

  9. A Non-Perturbative Treatment of Quantum Impurity Problems in Real Lattices

    Science.gov (United States)

    Allerdt, Andrew C.

    Historically, the RKKY or indirect exchange, interaction has been accepted as being able to be described by second order perturbation theory. A typical universal expression is usually given in this context. This approach, however, fails to incorporate many body effects, quantum fluctuations, and other important details. In Chapter 2, a novel numerical approach is developed to tackle these problems in a quasi-exact, non-perturbative manner. Behind the method lies the main concept of being able to exactly map an n-dimensional lattice problem onto a 1-dimensional chain. The density matrix renormalization group algorithm is then employed to solve the newly cast Hamiltonian. In the following chapters, it is demonstrated that conventional RKKY theory does not capture the crucial physics. It is found that the Kondo effect, i.e. the screening of an impurity spin, tends to dominate over a ferromagnetic interaction between impurity spins. Furthermore, it is found that the indirect exchange interaction does not decay algebraically. Instead, there is a crossover upon increasing JK, where impurities favor forming their own independent Kondo states after just a few lattice spacings. This is not a trivial result, as one may naively expect impurities to interact when their conventional Kondo clouds overlap. The spin structure around impurities coupled to the edge of a 2D topological insulator is investigated in Chapter 7. Modeled after materials such as silicine, germanene, and stanene, it is shown with spatial resolution of the lattice that the specific impurity placement plays a key role. Effects of spin-orbit interactions are also discussed. Finally, in the last chapter, transition metal complexes are studied. This really shows the power and versatility of the method developed throughout the work. The spin states of an iron atom in the molecule FeN4C 10 are calculated and compared to DFT, showing the importance of inter-orbital coulomb interactions. Using dynamical DMRG, the

  10. Experimental investigations of strong interaction in the non-perturbative QCD region

    International Nuclear Information System (INIS)

    Lindenbaum, S.J.; Samuel, S.

    1993-09-01

    A critical investigation of non-perturbative QCD require investigating glueballs, search for a Quark Gluon Plasma (OGP), and search for strangelets. In the glueball area the data obtained (E- 881) at 8 GeV/c were analyzed for π - + p → φφn (OZI forbidden), φK + K - n (OZI allowed), K - p → φφ(ΛΣ) (OZI allowed), and bar pp → φφ → φφπ 0 (OZI forbidden), φK + K - π 0 (OZI allowed). By comparing the OZI forbidden (glueball filter reactions) with the OZI allowed and previous 22 GeV/c π - p → φφn or φK + K - n data a further critical test of the so far unsuccessfully challenged hypothesis that our g T (2010), g T '(2300) and g T double-prime(2340) all with I G J PC = 0 + 2 ++ are produced by 1-3 2 ++ glueballs will be made. In the QGP search with a large-solid-angle TPC a good Ξ signal was observed. The ratio of Ξ to single strange quark particles such as λ is a better indication of strangeness enhancement in QGP formation. The data indicate enhancement by a factor ∼ 2 over cascade model (corrected to observed strangeness) predictions, but it is definitely far from conclusive at this stage since the result is model dependent. Double λ topologies of the type needed to discover light strangelets in the nanosecond lifetime region were found. In addition, research has been accomplished in three main areas: bosonic technicolor and strings, buckministerfullerene C 60 and neutrino oscillations in a dense neutrino gas

  11. AdS/QCD, LIight-Front Holography, and the Non-perturbative Running Coupling

    Energy Technology Data Exchange (ETDEWEB)

    Brodsky, Stanley J.; /SLAC; de Teramond, Guy; /Costa Rica U.; Deur, Alexandre; /Jefferson Lab

    2010-04-29

    The combination of Anti-de Sitter space (AdS) methods with light-front (LF) holography provides a remarkably accurate first approximation for the spectra and wavefunctions of meson and baryon light-quark bound states. The resulting bound-state Hamiltonian equation of motion in QCD leads to relativistic light-front wave equations in terms of an invariant impact variable {zeta} which measures the separation of the quark and gluonic constituents within the hadron at equal light-front time. These equations of motion in physical space-time are equivalent to the equations of motion which describe the propagation of spin-J modes in anti-de Sitter (AdS) space. The eigenvalues give the hadronic spectrum, and the eigenmodes represent the probability distributions of the hadronic constituents at a given scale. A positive-sign confining dilaton background modifying AdS space gives a very good account of meson and baryon spectroscopy and form factors. The light-front holographic mapping of this model also leads to a non-perturbative effective coupling {alpha}{sub s}{sup Ads} (Q{sup 2}) which agrees with the effective charge defined by the Bjorken sum rule and lattice simulations. It displays a transition from perturbative to nonperturbative conformal regimes at a momentum scale {approx} 1 GeV. The resulting {beta}-function appears to capture the essential characteristics of the full {beta}-function of QCD, thus giving further support to the application of the gauge/gravity duality to the confining dynamics of strongly coupled QCD.

  12. A non-perturbative exploration of the high energy regime in Nf=3 QCD. ALPHA Collaboration

    Science.gov (United States)

    Dalla Brida, Mattia; Fritzsch, Patrick; Korzec, Tomasz; Ramos, Alberto; Sint, Stefan; Sommer, Rainer

    2018-05-01

    Using continuum extrapolated lattice data we trace a family of running couplings in three-flavour QCD over a large range of scales from about 4 to 128 GeV. The scale is set by the finite space time volume so that recursive finite size techniques can be applied, and Schrödinger functional (SF) boundary conditions enable direct simulations in the chiral limit. Compared to earlier studies we have improved on both statistical and systematic errors. Using the SF coupling to implicitly define a reference scale 1/L_0≈ 4 GeV through \\bar{g}^2(L_0) =2.012, we quote L_0 Λ ^{N_f=3}_{{\\overline{MS}}} =0.0791(21). This error is dominated by statistics; in particular, the remnant perturbative uncertainty is negligible and very well controlled, by connecting to infinite renormalization scale from different scales 2^n/L_0 for n=0,1,\\ldots ,5. An intermediate step in this connection may involve any member of a one-parameter family of SF couplings. This provides an excellent opportunity for tests of perturbation theory some of which have been published in a letter (ALPHA collaboration, M. Dalla Brida et al. in Phys Rev Lett 117(18):182001, 2016). The results indicate that for our target precision of 3 per cent in L_0 Λ ^{N_f=3}_{{\\overline{MS}}}, a reliable estimate of the truncation error requires non-perturbative data for a sufficiently large range of values of α _s=\\bar{g}^2/(4π ). In the present work we reach this precision by studying scales that vary by a factor 2^5= 32, reaching down to α _s≈ 0.1. We here provide the details of our analysis and an extended discussion.

  13. Non-perturbative investigation of current correlators in twisted mass lattice QCD

    International Nuclear Information System (INIS)

    Petschlies, Marcus

    2013-01-01

    We present an investigation of hadronic current-current correlators based on the first principles of Quantum Chromodynamics. Specifically we apply the non-perturbative methods of twisted mass lattice QCD with dynamical up and down quark taking advantage of its automatic O(a) improvement. As a special application we discuss the calculation of the hadronic leading order contribution to the muon anomalous magnetic moment. The latter is regarded as a promising quantity for the search for physics beyond the standard model. The origin of the strong interest in the muon anomaly lies in the persistent discrepancy between the standard model estimate and its experimental measurement. In the theoretical determination the hadronic leading order part is currently afflicted with the largest uncertainty and a dedicated lattice investigation of the former can be of strong impact on future estimates. We discuss our study of all systematic uncertainties in the lattice calculation, including three lattice volumes, two lattice spacings, pion masses from 650 MeV to 290 MeV and the quark-disconnected contribution. We present a new method for the extrapolation to the physical point that softens the pion mass dependence of a μ hlo and allows for a linear extrapolation with small statistical uncertainty at the physical point. We determine the contribution of up and down quark as a μ hlo (N f =2)=5.69(15)10 -8 . The methods used for the muon are extended to the electron and tau lepton and we find a e hlo (N f =2)=1.512(43)10 -12 and a τ hlo (N f =2)=2.635(54)10 -6 . We estimate the charm contribution to a μ hlo in partially quenched tmLQCD with the result a μ hlo (charm)=1.447(24)(30)10 -9 in very good agreement with a dispersion-relation based result using experimental data for the hadronic R-ratio.

  14. A strategy for implementing non-perturbative renormalisation of heavy-light four-quark operators in the static approximation

    Energy Technology Data Exchange (ETDEWEB)

    Palombi, F. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany). Gruppe Theorie; Papinutto, M. [Istituto Nazionale di Fisica Nucleare, Rome (Italy); Pena, C. [European Organization for Nuclear Research, Geneva (Switzerland). Theoretical Physics Div.; Wittig, H. [Mainz Univ. (Germany). Inst. fuer Kernphysik

    2006-04-15

    We discuss the renormalisation properties of the complete set of {delta}B=2 four-quark operators with the heavy quark treated in the static approximation. We elucidate the role of heavy quark symmetry and other symmetry transformations in constraining their mixing under renormalisation. By employing the Schroedinger functional, a set of non-perturbative renormalisation conditions can be defined in terms of suitable correlation functions. As a first step in a fully non-perturbative determination of the scale-dependent renormalisation factors, we evaluate these conditions in lattice perturbation theory at one loop. Thereby we verify the expected mixing patterns and determine the anomalous dimensions of the operators at NLO in the Schroedinger functional scheme. Finally, by employing twisted-mass QCD it is shown how finite subtractions arising from explicit chiral symmetry breaking can be avoided completely. (Orig.)

  15. A strategy for implementing non-perturbative renormalisation of heavy-light four-quark operators in the static approximation

    International Nuclear Information System (INIS)

    Palombi, F.; Pena, C.; Wittig, H.

    2006-04-01

    We discuss the renormalisation properties of the complete set of ΔB=2 four-quark operators with the heavy quark treated in the static approximation. We elucidate the role of heavy quark symmetry and other symmetry transformations in constraining their mixing under renormalisation. By employing the Schroedinger functional, a set of non-perturbative renormalisation conditions can be defined in terms of suitable correlation functions. As a first step in a fully non-perturbative determination of the scale-dependent renormalisation factors, we evaluate these conditions in lattice perturbation theory at one loop. Thereby we verify the expected mixing patterns and determine the anomalous dimensions of the operators at NLO in the Schroedinger functional scheme. Finally, by employing twisted-mass QCD it is shown how finite subtractions arising from explicit chiral symmetry breaking can be avoided completely. (Orig.)

  16. Non-perturbative renormalization of the static vector current and its O(a)-improvement in quenched QCD

    Energy Technology Data Exchange (ETDEWEB)

    Palombi, F.

    2007-06-15

    We carry out the renormalization and the Symanzik O(a)-improvement programme for the static vector current in quenched lattice QCD. The scale independent ratio of the renormalization constants of the static vector and axial currents is obtained non-perturbatively from an axial Ward identity with Wilson-type light quarks and various lattice discretizations of the static action. The improvement coefficients c{sub V}{sup stat} and b{sub V}{sup stat} are obtained up to O(g{sub 4}{sup 0})-terms by enforcing improvement conditions respectively on the axial Ward identity and a three-point correlator of the static vector current. A comparison between the non-perturbative estimates and the corresponding one-loop results shows a non-negligible effect of the O(g{sub 4}{sup 0})-terms on the improvement coefficients but a good accuracy of the perturbative description of the ratio of the renormalization constants. (orig.)

  17. Effect of Hydrotherapy on Static and Dynamic Balance in Older Adults: Comparison of Perturbed and Non-Perturbed Programs

    Directory of Open Access Journals (Sweden)

    Elham Azimzadeh

    2013-01-01

    Full Text Available Objectives: Falling is a main cause of mortality in elderly. Balance training exercises can help to prevent falls in older adults. According to the principle of specificity of training, the perturbation-based trainings are more similar to the real world. So these training programs can improve balance in elderly. Furthermore, exercising in an aquatic environment can reduce the limitations for balance training rather than a non-aquatic on. The aim of this study is comparing the effectiveness of perturbed and non-perturbed balance training programs in water on static and dynamic balance in aforementioned population group. Methods & Materials: 37 old women (age 80-65, were randomized to the following groups: perturbation-based training (n=12, non-perturbation-based training (n=12 and control (n=13 groups. Static and dynamic balance had been tested before and after the eight weeks of training by the postural stability test of the Biodex balance system using dynamic (level 4 and static platform. The data were analyzed by one sample paired t-test, Independent t-test and ANOVA. Results: There was a significant improvement for all indexes of static and dynamic balance in perturbation-based training (P<0.05. However, in non-perturbed group, all indexes were improved except ML (P<0.05. ANOVA showed that perturbed training was more effective than non-perturbed training on both static and dynamic balances. Conclusion: The findings confirmed the specificity principle of training. Although balance training can improve balance abilities, these kinds of trainings are not such specific for improving balance neuromuscular activities.The perturbation-based trainings can activate postural compensatory responses and reduce falling risk. According to results, we can conclude that hydrotherapy especially with perturbation-based programs will be useful for rehabilitation interventions in elderly .

  18. Scale-invariant scalar metric fluctuations during inflation: non-perturbative formalism from a 5D vacuum

    International Nuclear Information System (INIS)

    Anabitarte, M.; Bellini, M.; Madriz Aguilar, Jose Edgar

    2010-01-01

    We extend to 5D an approach of a 4D non-perturbative formalism to study scalar metric fluctuations of a 5D Riemann-flat de Sitter background metric. In contrast with the results obtained in 4D, the spectrum of cosmological scalar metric fluctuations during inflation can be scale invariant and the background inflaton field can take sub-Planckian values. (orig.)

  19. Non-perturbative treatment of excitation and ionization in U92++U91+ collisions at 1 GeV/amu

    International Nuclear Information System (INIS)

    Becker, U.; Gruen, N.; Scheid, W.; Soff, G.

    1986-01-01

    Inner shell excitation and ionization processes in relativistic collisions of very heavy ions are treated by a non-perturbative method for the first time. The time-dependent Dirac equation is solved by a finite difference method for the scattering of U 92+ on U 91+ at Esub(lab) = 1 GeV/amu and zero impact parameter. The K-shell ionization probabilities are compared with those resulting from first-order perturbation theory. (orig.)

  20. Non-perturbative aspects of quantum field theory. From the quark-gluon plasma to quantum gravity

    International Nuclear Information System (INIS)

    Christiansen, Nicolai

    2015-01-01

    In this dissertation we investigate several aspects of non-perturbative quantum field theory. Two main parts of the thesis are concerned with non-perturbative renormalization of quantum gravity within the asymptotic safety scenario. This framework is based on a non-Gaussian ultraviolet fixed point and provides a well-defined theory of quantized gravity. We employ functional renormalization group (FRG) techniques that allow for the study of quantum fields even in strongly coupled regimes. We construct a setup for the computation of graviton correlation functions and analyze the ultraviolet completion of quantum gravity in terms of the properties of the two- and three point function of the graviton. Moreover, the coupling of gravity to Yang-Mills theories is discussed. In particular, we study the effects of graviton induced interactions on asymptotic freedom on the one hand, and the role of gluonic fluctuations in the gravity sector on the other hand. The last subject of this thesis is the physics of the quark-gluon plasma. We set-up a general non-perturbative strategy for the computation of transport coefficients in non-Abelian gauge theories. We determine the viscosity over entropy ratio η/s in SU(3) Yang-Mills theory as a function of temperature and estimate its behavior in full quantum chromodynamics (QCD).

  1. M{sub b} and f{sub B} from non-perturbatively renormalized HQET with N{sub f} = 2 light quarks

    Energy Technology Data Exchange (ETDEWEB)

    Blossier, Benoit [CNRS et Univ. Paris-Sud XI, Orsay (France). Lab. de Physique Theorique; Bulava, John [CERN, Geneva (Switzerland). Physics Dept.; Della Morte, Michele; Hippel, Georg von [Mainz Univ. (Germany). Inst. fuer Kernphysik; Donnellan, Michael; Simma, Hubert; Sommer, Rainer [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany). NIC; Fritzsch, Patrick [Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; Garron, Nicolas [Edinburgh Univ. (United Kingdom). Tait Inst.; Heitger, Jochen [Muenster Univ. (Germany). Inst. fuer Theoretische Physik 1

    2011-12-15

    We present an updated analysis of the non-perturbatively renormalized b-quark mass and B meson decay constant based on CLS lattices with two dynamical non-perturbatively improved Wilson quarks. This update incorporates additional light quark masses and lattice spacings in large physical volume to improve chiral extrapolations and to reach the continuum limit. We use Heavy Quark Effective Theory (HQET) including 1/m{sub b} terms with non-perturbative coefficients based on the matching of QCD and HQET developed by the ALPHA collaboration during the past years. (orig.)

  2. Non-perturbative calculation of equilibrium polarization of stored electron beams

    International Nuclear Information System (INIS)

    Yokoya, Kaoru.

    1992-05-01

    Stored electron/positron beams polarize spontaneously owing to the spin-flip synchrotron radiation. In the existing computer codes, the degree of the equilibrium polarization has been calculated using perturbation expansions in terms of the orbital oscillation amplitudes. In this paper a new numerical method is presented which does not employ the perturbation expansion. (author)

  3. Non-perturbative models of intermittency in drift-wave turbulence: towards a probabilistic theory of anomalous transport

    International Nuclear Information System (INIS)

    Kim, Eun-jin; Diamond, P.H.; Malkov, M.

    2003-01-01

    Two examples of non-perturbative models of intermittency in drift-wave (DW) turbulence are presented. The first is a calculation of the probability distribution function (PDF) of ion heat flux due to structures in ion temperature gradient turbulence. The instanton calculus predicts the PDF to be a stretched exponential. The second is a derivation of a bi-variate Burgers equation for the evolution of the DW population density in the presence of radially extended streamer flows. The PDF of fluctuation intensity avalanches is determined. The relation of this to turbulence spreading, observed in simulations, is discussed. (author)

  4. Non-perturbative improvement of the axial current with three dynamical flavors and the Iwasaki gauge action

    Energy Technology Data Exchange (ETDEWEB)

    Kaneko, T.; Hashimoto, S. [High Energy Accelerator Research Organization (KEK), Tsukuba, Ibaraki (Japan)]|[Graduate Univ. for Advanced Studies, Tsukuba, Ibaraki (Japan); Aoki, S. [Tsukuba Univ., Ibaraki (Japan). Graduate School of Pure and Applied Sciences]|[Brookhaven National Laboratory, Upton, NY (United States). Riken BNL Research Center; Della Morte, M. [CERN, Physics Dept., Geneva (Switzerland); Hoffmann, R. [Colorado Univ., Boulder, CO (United States). Dept. of Physics; Sommer, R. [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany)

    2007-03-15

    We perform a non-perturbative determination of the improvement coefficient c{sub A} to remove O(a) discretization errors in the axial vector current in three-flavor lattice QCD with the Iwasaki gauge action and the standard O(a)-improved Wilson quark action. An improvement condition with a good sensitivity to c{sub A} is imposed at constant physics. Combining our results with the perturbative expansion, c{sub A} is now known rather precisely for a{sup -1}>or similar 1.6 GeV. (orig.)

  5. Non-perturbative improvement of the axial current with three dynamical flavors and the Iwasaki gauge action

    International Nuclear Information System (INIS)

    Kaneko, T.; Hashimoto, S.; Aoki, S.; Hoffmann, R.

    2007-03-01

    We perform a non-perturbative determination of the improvement coefficient c A to remove O(a) discretization errors in the axial vector current in three-flavor lattice QCD with the Iwasaki gauge action and the standard O(a)-improved Wilson quark action. An improvement condition with a good sensitivity to c A is imposed at constant physics. Combining our results with the perturbative expansion, c A is now known rather precisely for a -1 >or similar 1.6 GeV. (orig.)

  6. Kaon semileptonic decay form factors from Nf = 2 non-perturbatively O(a)-improved Wilson fermions

    International Nuclear Information System (INIS)

    Broemmel, D.; Nakamura, Y.; Pleiter, D.

    2007-10-01

    We present first results from the QCDSF collaboration for the kaon semileptonic decay form factors at zero momentum transfer, using two flavours of non-perturbatively O(a)-improved Wilson quarks. A lattice determination of these form factors is of particular interest to improve the accuracy on the CKM matrix element vertical stroke V us vertical stroke. Calculations are performed on lattices with lattice spacing of about 0.08 fm with different values of light and strange quark masses, which allows us to extrapolate to chiral limit. Employing double ratio techniques, we are able to get small statistical errors. (orig.)

  7. QCD non-perturbative study in radiative and pure-leptonic decays of Bc by wave function

    International Nuclear Information System (INIS)

    Guo Peng; Hou Zhaoyu; Zhi Haisu

    2012-01-01

    The radiative and pure-leptonic decays of B c mesons are of hadrons uncertainty in theoretical calculations. Using three types of the B c meson wave functions which describe the characteristics of the QCD non-perturbative and by controlling the parameters in them, the uncertainties of B c meson decay caused by the hadron decay model are studied in detail. The theoretical results show the branching ratios are (1.81981∼3.18961) × 10 -5 , which are sensitive to the type of wave functions. (authors)

  8. The coherence lifetime-borrowing effect in vibronically coupled molecular aggregates under non-perturbative system-environment interactions.

    Science.gov (United States)

    Yeh, Shu-Hao; Engel, Gregory S.; Kais, Sabre

    Recently it has been suggested that the long-lived coherences in some photosynthetic pigment-protein systems, such as the Fenna-Matthews-Olson complex, could be attributed to the mixing of the pigments' electronic and vibrational degrees of freedom. In order to verify whether this is the case and to understand its underlying mechanism, a theoretical model capable of including both the electronic excitations and intramolecular vibrational modes of the pigments is necessary. Our model simultaneously considers the electronic and vibrational degrees of freedom, treating the system-environment interactions non-perturbatively by implementing the hierarchical equations of motion approach. Here we report the simulated two-dimensional electronic spectra of vibronically coupled molecular dimers to demonstrate how the electronic coherence lifetimes can be extended by borrowing the lifetime from the vibrational coherences. Funded by Qatar National Research Fund and Qatar Environment and Energy Research Institute.

  9. A non-perturbative approach to jet cross-sections and a new model for hadron-hadron interactions

    International Nuclear Information System (INIS)

    Andersson, B.

    1986-01-01

    The author discusses two subjects in this work. The first is a description of a non-perturbative approach to calculate the probabilities to obtain a particular state of confined force field in a hard interaction like e/sup +/e/sup -/ annihilation. This approach has been discussed previously by the author. There are at this time many more results of the program, in particular, some rather puzzling and disturbing ones as compared to the results obtained in perturbative QCD. The second subject is a new approach to hadron-hadron inelastic scattering. A model for these interactions based upon multiple perturbative parton interactions and subsequent string-stretching and breaking has been formulated by others in earlier works

  10. Simulation of QCD with N_f=2+1 flavors of non-perturbatively improved Wilson fermions

    International Nuclear Information System (INIS)

    Bruno, Mattia; Djukanovic, Dalibor; Engel, Georg P.; Francis, Anthony; Herdoiza, Gregorio; Horch, Hanno; Korcyl, Piotr; Korzec, Tomasz; Papinutto, Mauro; Schaefer, Stefan; Scholz, Enno E.; Simeth, Jakob; Simma, Hubert; Söldner, Wolfgang

    2015-01-01

    We describe a new set of gauge configurations generated within the CLS effort. These ensembles have N_f=2+1 flavors of non-perturbatively improved Wilson fermions in the sea with the Lüscher-Weisz action used for the gluons. Open boundary conditions in time are used to address the problem of topological freezing at small lattice spacings and twisted-mass reweighting for improved stability of the simulations. We give the bare parameters at which the ensembles have been generated and how these parameters have been chosen. Details of the algorithmic setup and its performance are presented as well as measurements of the pion and kaon masses alongside the scale parameter t_0.

  11. Non-perturbative renormalisation of {delta}F=2 four-fermion operators in two-flavour QCD

    Energy Technology Data Exchange (ETDEWEB)

    Dimopoulos, P.; Vladikas, A. [INFN, Sezione di Roma II (Italy)]|[Rome-3 Univ. (Italy). Dipt. di Fisica; Herdoiza, G. [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Palombi, F.; Papinutto, M. [CERN, Geneva (Switzerland). Physics Dept., TH Division; Pena, C. [Universidad Autonoma de Madrid (Spain). Dept. de Fisica Teorica C-XI]|[Univ. Autonoma de Madrid (Spain). Inst. de Fisica Teorica UAM/CSIC C-XVI; Wittig, H. [Mainz Univ. (Germany). Inst. fuer Kernphysik

    2007-12-15

    Using Schroedinger Functional methods, we compute the non-perturbative renormalisation and renormalisation group running of several four-fermion operators, in the framework of lattice simulations with two dynamical Wilson quarks. Two classes of operators have been targeted: (i) those with left-left current structure and four propagating quark fields; (ii) all operators containing two static quarks. In both cases, only the parity-odd contributions have been considered, being the ones that renormalise multiplicatively. Our results, once combined with future simulations of the corresponding lattice hadronic matrix elements, may be used for the computation of phenomenological quantities of interest, such as B{sub K} and B{sub B} (the latter also in the static limit). (orig.)

  12. Numerical investigation of non-perturbative kinetic effects of energetic particles on toroidicity-induced Alfvén eigenmodes in tokamaks and stellarators

    International Nuclear Information System (INIS)

    Slaby, Christoph; Könies, Axel; Kleiber, Ralf

    2016-01-01

    The resonant interaction of shear Alfvén waves with energetic particles is investigated numerically in tokamak and stellarator geometry using a non-perturbative MHD-kinetic hybrid approach. The focus lies on toroidicity-induced Alfvén eigenmodes (TAEs), which are most easily destabilized by a fast-particle population in fusion plasmas. While the background plasma is treated within the framework of an ideal-MHD theory, the drive of the fast particles, as well as Landau damping of the background plasma, is modelled using the drift-kinetic Vlasov equation without collisions. Building on analytical theory, a fast numerical tool, STAE-K, has been developed to solve the resulting eigenvalue problem using a Riccati shooting method. The code, which can be used for parameter scans, is applied to tokamaks and the stellarator Wendelstein 7-X. High energetic-ion pressure leads to large growth rates of the TAEs and to their conversion into kinetically modified TAEs and kinetic Alfvén waves via continuum interaction. To better understand the physics of this conversion mechanism, the connections between TAEs and the shear Alfvén wave continuum are examined. It is shown that, when energetic particles are present, the continuum deforms substantially and the TAE frequency can leave the continuum gap. The interaction of the TAE with the continuum leads to singularities in the eigenfunctions. To further advance the physical model and also to eliminate the MHD continuum together with the singularities in the eigenfunctions, a fourth-order term connected to radiative damping has been included. The radiative damping term is connected to non-ideal effects of the bulk plasma and introduces higher-order derivatives to the model. Thus, it has the potential to substantially change the nature of the solution. For the first time, the fast-particle drive, Landau damping, continuum damping, and radiative damping have been modelled together in tokamak- as well as in stellarator geometry.

  13. Numerical investigation of non-perturbative kinetic effects of energetic particles on toroidicity-induced Alfvén eigenmodes in tokamaks and stellarators

    Energy Technology Data Exchange (ETDEWEB)

    Slaby, Christoph; Könies, Axel; Kleiber, Ralf [Max-Planck-Institut für Plasmaphysik, D-17491 Greifswald (Germany)

    2016-09-15

    The resonant interaction of shear Alfvén waves with energetic particles is investigated numerically in tokamak and stellarator geometry using a non-perturbative MHD-kinetic hybrid approach. The focus lies on toroidicity-induced Alfvén eigenmodes (TAEs), which are most easily destabilized by a fast-particle population in fusion plasmas. While the background plasma is treated within the framework of an ideal-MHD theory, the drive of the fast particles, as well as Landau damping of the background plasma, is modelled using the drift-kinetic Vlasov equation without collisions. Building on analytical theory, a fast numerical tool, STAE-K, has been developed to solve the resulting eigenvalue problem using a Riccati shooting method. The code, which can be used for parameter scans, is applied to tokamaks and the stellarator Wendelstein 7-X. High energetic-ion pressure leads to large growth rates of the TAEs and to their conversion into kinetically modified TAEs and kinetic Alfvén waves via continuum interaction. To better understand the physics of this conversion mechanism, the connections between TAEs and the shear Alfvén wave continuum are examined. It is shown that, when energetic particles are present, the continuum deforms substantially and the TAE frequency can leave the continuum gap. The interaction of the TAE with the continuum leads to singularities in the eigenfunctions. To further advance the physical model and also to eliminate the MHD continuum together with the singularities in the eigenfunctions, a fourth-order term connected to radiative damping has been included. The radiative damping term is connected to non-ideal effects of the bulk plasma and introduces higher-order derivatives to the model. Thus, it has the potential to substantially change the nature of the solution. For the first time, the fast-particle drive, Landau damping, continuum damping, and radiative damping have been modelled together in tokamak- as well as in stellarator geometry.

  14. Non-perturbative construction of 2D and 4D supersymmetric Yang-Mills theories with 8 supercharges

    International Nuclear Information System (INIS)

    Hanada, Masanori; Matsuura, So; Sugino, Fumihiko

    2012-01-01

    In this paper, we consider two-dimensional N=(4,4) supersymmetric Yang-Mills (SYM) theory and deform it by a mass parameter M with keeping all supercharges. We further add another mass parameter m in a manner to respect two of the eight supercharges and put the deformed theory on a two-dimensional square lattice, on which the two supercharges are exactly preserved. The flat directions of scalar fields are stabilized due to the mass deformations, which gives discrete minima representing fuzzy spheres. We show in the perturbation theory that the lattice continuum limit can be taken without any fine tuning. Around the trivial minimum, this lattice theory serves as a non-perturbative definition of two-dimensional N=(4,4) SYM theory. We also discuss that the same lattice theory realizes four-dimensional N=2U(k) SYM on R 2 ×(Fuzzy R 2 ) around the minimum of k-coincident fuzzy spheres.

  15. Tests of perturbative and non perturbative structure of moments of hadronic event shapes using experiments JADE and OPAL

    International Nuclear Information System (INIS)

    Pahl, Christoph Johannes

    2008-01-01

    In hadron production data of the e + e - annihilation experiments JADE and OPAL we measure the first five moments of twelve hadronic-event-shape variables at c.m. energies from 14 to 207 GeV. From the comparison of the QCD NLO prediction with the data corrected by means of MC models about hadronization we obtain the reference value of the strong coupling α s (M Z 0 )=0.1254±0.0007(stat.)±0.0010(exp.) +0.0009 -0.0 0 23 (had.) +0.0069 -0.0053 (theo.). For some, especially higher moments, systematic unsufficiencies in the QCD NLO prediction are recognizable. Simultaneous fits to two moments under assumption of identical renormalization scales yield scale values from x μ =0.057 to x μ =0.196. We check predictions of different non-perturbative models. From the single-dressed-gluon approximation a perturbative prediction in O(α 5 s ) results with neglegible energy power correction, which describes the thrust average on hadron level well with α s (M Z 0 )=0.1186±0,0017(exp.) -0.0028 +0.0033 (theo.). The variance of the event-shape variable is measured and compared with models as well as predictions. [de

  16. c-function and central charge of the sine-Gordon model from the non-perturbative renormalization group flow

    Directory of Open Access Journals (Sweden)

    V. Bacsó

    2015-12-01

    Full Text Available In this paper we study the c-function of the sine-Gordon model taking explicitly into account the periodicity of the interaction potential. The integration of the c-function along trajectories of the non-perturbative renormalization group flow gives access to the central charges of the model in the fixed points. The results at vanishing frequency β2, where the periodicity does not play a role, are retrieved and the independence on the cutoff regulator for small frequencies is discussed. Our findings show that the central charge obtained integrating the trajectories starting from the repulsive low-frequencies fixed points (β2<8π to the infra-red limit is in good quantitative agreement with the expected Δc=1 result. The behavior of the c-function in the other parts of the flow diagram is also discussed. Finally, we point out that including also higher harmonics in the renormalization group treatment at the level of local potential approximation is not sufficient to give reasonable results, even if the periodicity is taken into account. Rather, incorporating the wave-function renormalization (i.e. going beyond local potential approximation is crucial to get sensible results even when a single frequency is used.

  17. The b-quark mass from non-perturbative $N_f=2$ Heavy Quark Effective Theory at $O(1/m_h)$

    DEFF Research Database (Denmark)

    Bernardoni, F.; Blossier, B.; Bulava, J.

    2014-01-01

    We report our final estimate of the b-quark mass from $N_f=2$ lattice QCD simulations using Heavy Quark Effective Theory non-perturbatively matched to QCD at $O(1/m_h)$. Treating systematic and statistical errors in a conservative manner, we obtain $\\overline{m}_{\\rm b}^{\\overline{\\rm MS}}(2 {\\rm...

  18. Analyzing B{sub s} - anti B{sub s} mixing. Non-perturbative contributions to bag parameters from sum rules

    Energy Technology Data Exchange (ETDEWEB)

    Mannel, T. [Siegen Univ. (Germany). FB 7, Theoretische Physik; Pecjak, B.D. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Pivovarov, A.A. [Siegen Univ. (Germany). FB 7, Theoretische Physik]|[Russian Academy of Sciecnes, Moscow (Russian Federation). Inst. for Nuclear Research

    2007-03-15

    We use QCD sum rules to compute matrix elements of the {delta}B=2 operators appearing in the heavy-quark expansion of the width difference of the B{sub s} mass eigenstates. Our analysis includes the leading-order operators Q and Q{sub S}, as well as the subleading operators R{sub 2} and R{sub 3}, which appear at next-to-leading order in the 1/m{sub b} expansion. We conclude that the violation of the factorization approximation for these matrix elements due to non-perturbative vacuum condensates is as low as 1-2%. (orig.)

  19. Single hadron spectrum in γγ collisions: The QCD contribution to order αsub(s) and the non perturbative background

    International Nuclear Information System (INIS)

    Aurenche, P.; Douiri, A.; Baier, R.; Fontannaz, M.; Schiff, D.

    1985-01-01

    We calculate the corrections of order αsub(s) to the process γγ->HX where both initial photons are real. The analytic expressions are given and a detailed discussion of the variation of the corrections with psub(T) and rapidity is presented. The dependence on the factorization prescription and scale is also discussed. Using the equivalent photon approximation the cross-section for e + e - ->e + e - HX is calculated both in the PEP/PETRA and LEP energy range. Based on the vector meson dominance model the non perturbative background is estimated and its importance for present and future experiments is emphasized. (orig.)

  20. H{sup +}{sub 2} ionization by ultra-short electromagnetic pulses investigated through a non-perturbative Coulomb-Volkov approach

    Energy Technology Data Exchange (ETDEWEB)

    RodrIguez, V D [Departamento de Fisica, FCEyN, Universidad de Buenos Aires, 1428 Buenos Aires (Argentina); Macri, P [Departamento de Fisica, FCEyN, Universidad de Buenos Aires, 1428 Buenos Aires (Argentina); Instituto de Astronomia y Fisica del Espacio, Consejo Nacional de Investigaciones CientIficas y Tecnicas, 1428 Buenos Aires (Argentina); Gayet, R [CELIA, Centre Lasers Intenses et Applications, UMR 5107, Unite Mixte de Recherche CNRS-CEA-Universite Bordeaux 1, Universite Bordeaux 1, 351 Cours de la Liberation, 33405 Talence Cedex (France)

    2005-08-14

    The sudden Coulomb-Volkov theoretical approximation has been shown to well describe atomic ionization by intense and ultra-short electromagnetic pulses, such as pulses generated by very fast highly-charged ions. This approach is extended here to investigate single ionization of homonuclear diatomic molecules by such pulses in the framework of one-active electron. Under particular conditions, a Young-like interference formula can approximately be factored out. Present calculations show interference effects originating from the molecular two-centre structure. Fivefold differential angular distributions of the ejected electron are studied as a function of the molecular orientation and internuclear distance. Both non-perturbative and perturbative regimes are examined. In the non-perturbative case, an interference pattern is visible but a main lobe, opposite to the electric field polarization direction, dominates the angular distribution. In contrast, in perturbation conditions the structure of interferences shows analogies to the Young-like interference pattern obtained in ionization of molecules by fast electron impacts. Finally, the strong dependence of these Young-like angular distributions on the internuclear distance is addressed.

  1. Non-perturbative renormalization of the chromo-magnetic operator in heavy quark effective theory and the B{sup *} - B mass splitting

    Energy Technology Data Exchange (ETDEWEB)

    Guazzini, D.; Sommer, R. [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Meyer, H. [Massachusetts Institute of Technology, Cambridge, MA (United States). Center for Theoretical Physics

    2007-05-15

    We carry out the non-perturbative renormalization of the chromo-magnetic operator in Heavy Quark Effective Theory. At order 1/m of the expansion, the operator is responsible for the mass splitting between the pseudoscalar and vector B mesons. We obtain its two-loop anomalous dimension in a Schroedinger functional scheme by successive oneloop conversions to the lattice MS scheme and the MS scheme. We then compute the scale evolution of the operator non-perturbatively in the N{sub f}=0 theory between {mu} {approx}0.3 GeV and {mu} {approx}100 GeV, where contact is made with perturbation theory. The overall renormalization factor that converts the bare lattice operator to its renormalization group invariant form is given for the Wilson gauge action and two standard discretizations of the heavy-quark action. As an application, we find that this factor brings the previous quenched predictions of the B{sup *}-B mass splitting closer to the experimental value than found with a perturbative renormalization. The same renormalization factor is applicable to the spin-dependent potentials of Eichten and Feinberg. (orig.)

  2. Associated heavy quarks pair production with Higgs as a tool for a search for non-perturbative effects of the electroweak interaction at the LHC

    Directory of Open Access Journals (Sweden)

    B.A. Arbuzov

    2017-09-01

    Full Text Available Assuming an existence of the anomalous triple electro-weak bosons interaction being defined by coupling constant λ we calculate its contribution to interactions of the Higgs with pairs of heavy particles. Bearing in mind experimental restrictions −0.011<λ<0.011 we present results for possible effects in processes pp→W+W−H,pp→W+ZH,pp→W−ZH,pp→t¯tH, pp→b¯bH. Effects could be significant with negative sign of λ in associated heavy quarks t,b pairs production with the Higgs. In calculations we rely on results of the non-perturbative approach to a spontaneous generation of effective interactions, which defines the form-factor of the three-boson anomalous interaction.

  3. Modeling of ICRH H-minorit driven n = 1 Resonant Modes in JET

    International Nuclear Information System (INIS)

    Gorelenkov, N.N.; Mantsinen, M.J.; Sharapov, S.E.; Cheng, C.Z.

    2003-01-01

    A nonperturbative code NOVA-KN (Kinetic Nonperturbative) has been developed to account for finite orbit width (FOW) effects in nonperturbative resonant modes such as the low-frequency MHD modes observed in the Joint European Torus (JET). The NOVA-KN code was used to show that the resonant modes with frequencies in the observed frequency range are ones having the characteristic toroidal precession frequency of H-minority ions. Results are similar to previous theoretical studies of fishbone instabilities, which were found to exist at characteristic precession frequencies of hot ions

  4. Non-perturbative RPA-method implemented in the Coulomb gauge QCD Hamiltonian: From quarks and gluons to baryons and mesons

    Science.gov (United States)

    Yepez-Martinez, Tochtli; Civitarese, Osvaldo; Hess, Peter O.

    2018-02-01

    Starting from an algebraic model based on the QCD-Hamiltonian and previously applied to study meson states, we have developed an extension of it in order to explore the structure of baryon states. In developing our approach we have adapted concepts taken from group theory and non-perturbative many-body methods to describe states built from effective quarks and anti-quarks degrees of freedom. As a Hamiltonian we have used the QCD Hamiltonian written in the Coulomb Gauge, and expressed it in terms of effective quark-antiquark, di-quarks and di-antiquark excitations. To gain some insights about the relevant interactions of quarks in hadronic states, the Hamiltonian was approximately diagonalized by mapping quark-antiquark pairs and di-quarks (di-antiquarks) onto phonon states. In dealing with the structure of the vacuum of the theory, color-scalar and color-vector states are introduced to account for ground-state correlations. While the use of a purely color-scalar ground state is an obvious choice, so that colorless hadrons contain at least three quarks, the presence of coupled color-vector pairs in the ground state allows for colorless excitations resulting from the action of color objects upon it.

  5. A non-perturbative study of 4d U(1) non-commutative gauge theory - the fate of one-loop instability

    International Nuclear Information System (INIS)

    Bietenholz, Wolfgang; Nishimura, Jun; Susaki, Yoshiaki; Volkholz, Jan

    2006-01-01

    Recent perturbative studies show that in 4d non-commutative spaces, the trivial (classically stable) vacuum of gauge theories becomes unstable at the quantum level, unless one introduces sufficiently many fermionic degrees of freedom. This is due to a negative IR-singular term in the one-loop effective potential, which appears as a result of the UV/IR mixing. We study such a system non-perturbatively in the case of pure U(1) gauge theory in four dimensions, where two directions are non-commutative. Monte Carlo simulations are performed after mapping the regularized theory onto a U(N) lattice gauge theory in d = 2. At intermediate coupling strength, we find a phase in which open Wilson lines acquire non-zero vacuum expectation values, which implies the spontaneous breakdown of translational invariance. In this phase, various physical quantities obey clear scaling behaviors in the continuum limit with a fixed non-commutativity parameter θ, which provides evidence for a possible continuum theory. The extent of the dynamically generated space in the non-commutative directions becomes finite in the above limit, and its dependence on θ is evaluated explicitly. We also study the dispersion relation. In the weak coupling symmetric phase, it involves a negative IR-singular term, which is responsible for the observed phase transition. In the broken phase, it reveals the existence of the Nambu-Goldstone mode associated with the spontaneous symmetry breaking

  6. A non-perturbative study of 4d U(1) non-commutative gauge theory — the fate of one-loop instability

    Science.gov (United States)

    Bietenholz, Wolfgang; Nishimura, Jun; Susaki, Yoshiaki; Volkholz, Jan

    2006-10-01

    Recent perturbative studies show that in 4d non-commutative spaces, the trivial (classically stable) vacuum of gauge theories becomes unstable at the quantum level, unless one introduces sufficiently many fermionic degrees of freedom. This is due to a negative IR-singular term in the one-loop effective potential, which appears as a result of the UV/IR mixing. We study such a system non-perturbatively in the case of pure U(1) gauge theory in four dimensions, where two directions are non-commutative. Monte Carlo simulations are performed after mapping the regularized theory onto a U(N) lattice gauge theory in d = 2. At intermediate coupling strength, we find a phase in which open Wilson lines acquire non-zero vacuum expectation values, which implies the spontaneous breakdown of translational invariance. In this phase, various physical quantities obey clear scaling behaviors in the continuum limit with a fixed non-commutativity parameter θ, which provides evidence for a possible continuum theory. The extent of the dynamically generated space in the non-commutative directions becomes finite in the above limit, and its dependence on θ is evaluated explicitly. We also study the dispersion relation. In the weak coupling symmetric phase, it involves a negative IR-singular term, which is responsible for the observed phase transition. In the broken phase, it reveals the existence of the Nambu-Goldstone mode associated with the spontaneous symmetry breaking.

  7. Non-perturbative methodologies for low-dimensional strongly-correlated systems: From non-Abelian bosonization to truncated spectrum methods.

    Science.gov (United States)

    James, Andrew J A; Konik, Robert M; Lecheminant, Philippe; Robinson, Neil J; Tsvelik, Alexei M

    2018-02-26

    We review two important non-perturbative approaches for extracting the physics of low-dimensional strongly correlated quantum systems. Firstly, we start by providing a comprehensive review of non-Abelian bosonization. This includes an introduction to the basic elements of conformal field theory as applied to systems with a current algebra, and we orient the reader by presenting a number of applications of non-Abelian bosonization to models with large symmetries. We then tie this technique into recent advances in the ability of cold atomic systems to realize complex symmetries. Secondly, we discuss truncated spectrum methods for the numerical study of systems in one and two dimensions. For one-dimensional systems we provide the reader with considerable insight into the methodology by reviewing canonical applications of the technique to the Ising model (and its variants) and the sine-Gordon model. Following this we review recent work on the development of renormalization groups, both numerical and analytical, that alleviate the effects of truncating the spectrum. Using these technologies, we consider a number of applications to one-dimensional systems: properties of carbon nanotubes, quenches in the Lieb-Liniger model, 1  +  1D quantum chromodynamics, as well as Landau-Ginzburg theories. In the final part we move our attention to consider truncated spectrum methods applied to two-dimensional systems. This involves combining truncated spectrum methods with matrix product state algorithms. We describe applications of this method to two-dimensional systems of free fermions and the quantum Ising model, including their non-equilibrium dynamics.

  8. Non-perturbative methodologies for low-dimensional strongly-correlated systems: From non-Abelian bosonization to truncated spectrum methods

    Science.gov (United States)

    James, Andrew J. A.; Konik, Robert M.; Lecheminant, Philippe; Robinson, Neil J.; Tsvelik, Alexei M.

    2018-04-01

    We review two important non-perturbative approaches for extracting the physics of low-dimensional strongly correlated quantum systems. Firstly, we start by providing a comprehensive review of non-Abelian bosonization. This includes an introduction to the basic elements of conformal field theory as applied to systems with a current algebra, and we orient the reader by presenting a number of applications of non-Abelian bosonization to models with large symmetries. We then tie this technique into recent advances in the ability of cold atomic systems to realize complex symmetries. Secondly, we discuss truncated spectrum methods for the numerical study of systems in one and two dimensions. For one-dimensional systems we provide the reader with considerable insight into the methodology by reviewing canonical applications of the technique to the Ising model (and its variants) and the sine-Gordon model. Following this we review recent work on the development of renormalization groups, both numerical and analytical, that alleviate the effects of truncating the spectrum. Using these technologies, we consider a number of applications to one-dimensional systems: properties of carbon nanotubes, quenches in the Lieb–Liniger model, 1  +  1D quantum chromodynamics, as well as Landau–Ginzburg theories. In the final part we move our attention to consider truncated spectrum methods applied to two-dimensional systems. This involves combining truncated spectrum methods with matrix product state algorithms. We describe applications of this method to two-dimensional systems of free fermions and the quantum Ising model, including their non-equilibrium dynamics.

  9. Code Cactus; Code Cactus

    Energy Technology Data Exchange (ETDEWEB)

    Fajeau, M; Nguyen, L T; Saunier, J [Commissariat a l' Energie Atomique, Centre d' Etudes Nucleaires de Saclay, 91 - Gif-sur-Yvette (France)

    1966-09-01

    This code handles the following problems: -1) Analysis of thermal experiments on a water loop at high or low pressure; steady state or transient behavior; -2) Analysis of thermal and hydrodynamic behavior of water-cooled and moderated reactors, at either high or low pressure, with boiling permitted; fuel elements are assumed to be flat plates: - Flowrate in parallel channels coupled or not by conduction across plates, with conditions of pressure drops or flowrate, variable or not with respect to time is given; the power can be coupled to reactor kinetics calculation or supplied by the code user. The code, containing a schematic representation of safety rod behavior, is a one dimensional, multi-channel code, and has as its complement (FLID), a one-channel, two-dimensional code. (authors) [French] Ce code permet de traiter les problemes ci-dessous: 1. Depouillement d'essais thermiques sur boucle a eau, haute ou basse pression, en regime permanent ou transitoire; 2. Etudes thermiques et hydrauliques de reacteurs a eau, a plaques, a haute ou basse pression, ebullition permise: - repartition entre canaux paralleles, couples on non par conduction a travers plaques, pour des conditions de debit ou de pertes de charge imposees, variables ou non dans le temps; - la puissance peut etre couplee a la neutronique et une representation schematique des actions de securite est prevue. Ce code (Cactus) a une dimension d'espace et plusieurs canaux, a pour complement Flid qui traite l'etude d'un seul canal a deux dimensions. (auteurs)

  10. Variational techniques in non-perturbative QCD

    CERN Document Server

    Kovner, Alex; Kovner, Alex

    2004-01-01

    We review attempts to apply the variational principle to understand the vacuum of non-abelian gauge theories. In particular, we focus on the method explored by Ian Kogan and collaborators, which imposes exact gauge invariance on the trial Gaussian wave functional prior to the minimization of energy. We describe the application of the method to a toy model -- confining compact QED in 2+1 dimensions -- where it works wonderfully and reproduces all known non-trivial results. We then follow its applications to pure Yang-Mills theory in 3+1 dimensions at zero and finite temperature. Among the results of the variational calculation are dynamical mass generation and the analytic description of the deconfinement phase transition.

  11. A non-perturbative approach to strings

    International Nuclear Information System (INIS)

    Orland, P.

    1986-03-01

    After briefly reviewing the theory of strings in the light-cone gauge, a lattice regularized path integral for the amplitudes is discussed. The emphasis is put on a toy string model; the U(N) Veneziano model in the limit as N->infinite with g 0 2 N fixed. The lattice methods of Giles and Thorn are used extensively, but are found to require modification beyond perturbation theory. The twenty-six-dimensional toy string model is recast as a two-dimensional spin system. (orig.)

  12. Non-Perturbative Aspects of Thermal QCD

    Energy Technology Data Exchange (ETDEWEB)

    Greensite, Jeff [San Francisco State Univ., CA (United States); Golterman, Maarten F. l. [San Francisco State Univ., CA (United States)

    2015-09-30

    This report summarizes research in theoretical high energy physics carried out under grant support by Mithat Unsal, Jeff Greensite and Maarten Golterman, together with a list of publications generated under this grant.

  13. A non-perturbative approach to strings

    International Nuclear Information System (INIS)

    Orland, P.

    1986-01-01

    After briefly reviewing the theory of strings in the light-cone gauge, a lattice regularized path integral for the amplitudes is discussed. The emphasis is put on a toy string model; the U(N) Veneziano model in the limit as N → ∞, with g/sup 2//sub o/N fixed. The lattice methods of Giles and Thorn are used extensively, but are found to require modification beyond perturbation theory. The twenty-six-dimensional toy string model is recast as a two-dimensional spin system

  14. Non-perturbative background field calculations

    International Nuclear Information System (INIS)

    Stephens, C.R.; Department of Physics, University of Utah, Salt Lake City, Utah 84112)

    1988-01-01

    New methods are developed for calculating one loop functional determinants in quantum field theory. Instead of relying on a calculation of all the eigenvalues of the small fluctuation equation, these techniques exploit the ability of the proper time formalism to reformulate an infinite dimensional field theoretic problem into a finite dimensional covariant quantum mechanical analog, thereby allowing powerful tools such as the method of Jacobi fields to be used advantageously in a field theory setting. More generally the methods developed herein should be extremely valuable when calculating quantum processes in non-constant background fields, offering a utilitarian alternative to the two standard methods of calculation: perturbation theory in the background field or taking the background field into account exactly. The formalism developed also allows for the approximate calculation of covariances of partial differential equations from a knowledge of the solutions of a homogeneous ordinary differential equation. copyright 1988 Academic Press, Inc

  15. Introduction to non-perturbative quantum chromodynamics

    International Nuclear Information System (INIS)

    Pene, O.

    1995-01-01

    Quantum chromodynamics is considered to be the theory of strong interaction. The main peculiarity of this theory is that its asymptotic states (hadrons) are different from its elementary fields (quarks and gluons). This property plays a great part in any physical process involving small momentum-energy transfers. In such a range perturbative methods are no longer allowed. This work focuses on other tools such as QCD symmetry, the quark model, Green functions and the sum rules. To get hadron characteristics numerically, QCD on lattices is used but only in the case of simple process involving no more than one hadron in the initial and final states because of the complexity of the Green function. Some examples using a Monte-Carlo simulation are given. (A.C.)

  16. Non-perturbative background field calculations

    Science.gov (United States)

    Stephens, C. R.

    1988-01-01

    New methods are developed for calculating one loop functional determinants in quantum field theory. Instead of relying on a calculation of all the eigenvalues of the small fluctuation equation, these techniques exploit the ability of the proper time formalism to reformulate an infinite dimensional field theoretic problem into a finite dimensional covariant quantum mechanical analog, thereby allowing powerful tools such as the method of Jacobi fields to be used advantageously in a field theory setting. More generally the methods developed herein should be extremely valuable when calculating quantum processes in non-constant background fields, offering a utilitarian alternative to the two standard methods of calculation—perturbation theory in the background field or taking the background field into account exactly. The formalism developed also allows for the approximate calculation of covariances of partial differential equations from a knowledge of the solutions of a homogeneous ordinary differential equation.

  17. Non-perturbative renormalization on the lattice

    International Nuclear Information System (INIS)

    Koerner, Daniel

    2014-01-01

    Strongly-interacting theories lie at the heart of elementary particle physics. Their distinct behaviour shapes our world sui generis. We are interested in lattice simulations of supersymmetric models, but every discretization of space-time inevitably breaks supersymmetry and allows renormalization of relevant susy-breaking operators. To understand the role of such operators, we study renormalization group trajectories of the nonlinear O(N) Sigma model (NLSM). Similar to quantum gravity, it is believed to adhere to the asymptotic safety scenario. By combining the demon method with blockspin transformations, we compute the global flow diagram. In two dimensions, we reproduce asymptotic freedom and in three dimensions, asymptotic safety is demonstrated. Essential for these results is the application of a novel optimization scheme to treat truncation errors. We proceed with a lattice simulation of the supersymmetric nonlinear O(3) Sigma model. Using an original discretization that requires to fine tune only a single operator, we argue that the continuum limit successfully leads to the correct continuum physics. Unfortunately, for large lattices, a sign problem challenges the applicability of Monte Carlo methods. Consequently, the last chapter of this thesis is spent on an assessment of the fermion-bag method. We find that sign fluctuations are thereby significantly reduced for the susy NLSM. The proposed discretization finally promises a direct confirmation of supersymmetry restoration in the continuum limit. For a complementary analysis, we study the one-flavor Gross-Neveu model which has a complex phase problem. However, phase fluctuations for Wilson fermions are very small and no conclusion can be drawn regarding the potency of the fermion-bag approach for this model.

  18. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  19. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  20. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  1. Tests of perturbative and non perturbative structure of moments of hadronic event shapes using experiments JADE and OPAL; Untersuchung perturbativer und nichtperturbativer Struktur der Momente hadronischer Ereignisformvariablen mit den Experimenten JADE und OPAL

    Energy Technology Data Exchange (ETDEWEB)

    Pahl, Christoph Johannes

    2008-01-29

    In hadron production data of the e{sup +}e{sup -} annihilation experiments JADE and OPAL we measure the first five moments of twelve hadronic-event-shape variables at c.m. energies from 14 to 207 GeV. From the comparison of the QCD NLO prediction with the data corrected by means of MC models about hadronization we obtain the reference value of the strong coupling {alpha}{sub s}(M{sub Z{sup 0}})=0.1254{+-}0.0007(stat.){+-}0.0010(exp.){sup +0.0009}{sub -0.0023}(had.){sup +0.0069}{sub -0.0053}(theo.). For some, especially higher moments, systematic unsufficiencies in the QCD NLO prediction are recognizable. Simultaneous fits to two moments under assumption of identical renormalization scales yield scale values from x{sub {mu}}=0.057 to x{sub {mu}}=0.196. We check predictions of different non-perturbative models. From the single-dressed-gluon approximation a perturbative prediction in O({alpha}{sup 5}{sub s}) results with neglegible energy power correction, which describes the thrust average on hadron level well with {alpha}{sub s}(M{sub Z{sup 0}})=0.1186{+-}0,0017(exp.){sub -0.0028}{sup +0.0033}(theo.). The variance of the event-shape variable is measured and compared with models as well as predictions. [German] In Hadronproduktionsdaten der e{sup +}e{sup -}-Vernichtungsexperimente JADE und OPAL messen wir die ersten fuenf Momente von zwoelf hadronischen Ereignisformvariablen bei Schwerpunktsenergien von 14 bis 207 GeV. Aus dem Vergleich der QCD NLO-Vorhersage mit den mittels MC-Modellen um Hadronisierung korrigierten Daten erhalten wir den Referenzwert der starken Kopplung {alpha}{sub s}(M{sub Z{sup 0}})=0.1254{+-}0.0007(stat.){+-}0.0010(exp.){sup +0.0009}{sub -0.0023}(had.){sup +0.0069}{sub -0.0053}(theo.). Fuer einige, insbesondere hoehere, Momente sind systematische Unzulaenglichkeiten in der QCD NLO-Vorhersage erkenntlich. Simultane Fits an zwei Momente unter Annahme identischer Renormierungsskalen ergeben Skalenwerte von x{sub {mu}}=0.057 bis x{sub {mu}}=0

  2. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  3. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  4. Aztheca Code

    International Nuclear Information System (INIS)

    Quezada G, S.; Espinosa P, G.; Centeno P, J.; Sanchez M, H.

    2017-09-01

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  5. Vocable Code

    DEFF Research Database (Denmark)

    Soon, Winnie; Cox, Geoff

    2018-01-01

    a computational and poetic composition for two screens: on one of these, texts and voices are repeated and disrupted by mathematical chaos, together exploring the performativity of code and language; on the other, is a mix of a computer programming syntax and human language. In this sense queer code can...... be understood as both an object and subject of study that intervenes in the world’s ‘becoming' and how material bodies are produced via human and nonhuman practices. Through mixing the natural and computer language, this article presents a script in six parts from a performative lecture for two persons...

  6. NSURE code

    International Nuclear Information System (INIS)

    Rattan, D.S.

    1993-11-01

    NSURE stands for Near-Surface Repository code. NSURE is a performance assessment code. developed for the safety assessment of near-surface disposal facilities for low-level radioactive waste (LLRW). Part one of this report documents the NSURE model, governing equations and formulation of the mathematical models, and their implementation under the SYVAC3 executive. The NSURE model simulates the release of nuclides from an engineered vault, their subsequent transport via the groundwater and surface water pathways tot he biosphere, and predicts the resulting dose rate to a critical individual. Part two of this report consists of a User's manual, describing simulation procedures, input data preparation, output and example test cases

  7. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  8. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening...... Coding Pirates2. Rapporten er forfattet af Docent i digitale læringsressourcer og forskningskoordinator for forsknings- og udviklingsmiljøet Digitalisering i Skolen (DiS), Mikala Hansbøl, fra Institut for Skole og Læring ved Professionshøjskolen Metropol; og Lektor i læringsteknologi, interaktionsdesign......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017...

  9. Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the objectives, meeting goals and overall NASA goals for the NASA Data Standards Working Group. The presentation includes information on the technical progress surrounding the objective, short LDPC codes, and the general results on the Pu-Pw tradeoff.

  10. ANIMAL code

    International Nuclear Information System (INIS)

    Lindemuth, I.R.

    1979-01-01

    This report describes ANIMAL, a two-dimensional Eulerian magnetohydrodynamic computer code. ANIMAL's physical model also appears. Formulated are temporal and spatial finite-difference equations in a manner that facilitates implementation of the algorithm. Outlined are the functions of the algorithm's FORTRAN subroutines and variables

  11. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  12. MCNP code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MCNP code is the major Monte Carlo coupled neutron-photon transport research tool at the Los Alamos National Laboratory, and it represents the most extensive Monte Carlo development program in the United States which is available in the public domain. The present code is the direct descendent of the original Monte Carlo work of Fermi, von Neumaum, and Ulam at Los Alamos in the 1940s. Development has continued uninterrupted since that time, and the current version of MCNP (or its predecessors) has always included state-of-the-art methods in the Monte Carlo simulation of radiation transport, basic cross section data, geometry capability, variance reduction, and estimation procedures. The authors of the present code have oriented its development toward general user application. The documentation, though extensive, is presented in a clear and simple manner with many examples, illustrations, and sample problems. In addition to providing the desired results, the output listings give a a wealth of detailed information (some optional) concerning each state of the calculation. The code system is continually updated to take advantage of advances in computer hardware and software, including interactive modes of operation, diagnostic interrupts and restarts, and a variety of graphical and video aids

  13. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  14. Panda code

    International Nuclear Information System (INIS)

    Altomare, S.; Minton, G.

    1975-02-01

    PANDA is a new two-group one-dimensional (slab/cylinder) neutron diffusion code designed to replace and extend the FAB series. PANDA allows for the nonlinear effects of xenon, enthalpy and Doppler. Fuel depletion is allowed. PANDA has a completely general search facility which will seek criticality, maximize reactivity, or minimize peaking. Any single parameter may be varied in a search. PANDA is written in FORTRAN IV, and as such is nearly machine independent. However, PANDA has been written with the present limitations of the Westinghouse CDC-6600 system in mind. Most computation loops are very short, and the code is less than half the useful 6600 memory size so that two jobs can reside in the core at once. (auth)

  15. CANAL code

    International Nuclear Information System (INIS)

    Gara, P.; Martin, E.

    1983-01-01

    The CANAL code presented here optimizes a realistic iron free extraction channel which has to provide a given transversal magnetic field law in the median plane: the current bars may be curved, have finite lengths and cooling ducts and move in a restricted transversal area; terminal connectors may be added, images of the bars in pole pieces may be included. A special option optimizes a real set of circular coils [fr

  16. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  17. Automatic coding method of the ACR Code

    International Nuclear Information System (INIS)

    Park, Kwi Ae; Ihm, Jong Sool; Ahn, Woo Hyun; Baik, Seung Kook; Choi, Han Yong; Kim, Bong Gi

    1993-01-01

    The authors developed a computer program for automatic coding of ACR(American College of Radiology) code. The automatic coding of the ACR code is essential for computerization of the data in the department of radiology. This program was written in foxbase language and has been used for automatic coding of diagnosis in the Department of Radiology, Wallace Memorial Baptist since May 1992. The ACR dictionary files consisted of 11 files, one for the organ code and the others for the pathology code. The organ code was obtained by typing organ name or code number itself among the upper and lower level codes of the selected one that were simultaneous displayed on the screen. According to the first number of the selected organ code, the corresponding pathology code file was chosen automatically. By the similar fashion of organ code selection, the proper pathologic dode was obtained. An example of obtained ACR code is '131.3661'. This procedure was reproducible regardless of the number of fields of data. Because this program was written in 'User's Defined Function' from, decoding of the stored ACR code was achieved by this same program and incorporation of this program into program in to another data processing was possible. This program had merits of simple operation, accurate and detail coding, and easy adjustment for another program. Therefore, this program can be used for automation of routine work in the department of radiology

  18. Error-correction coding

    Science.gov (United States)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  19. Dynamic Shannon Coding

    OpenAIRE

    Gagie, Travis

    2005-01-01

    We present a new algorithm for dynamic prefix-free coding, based on Shannon coding. We give a simple analysis and prove a better upper bound on the length of the encoding produced than the corresponding bound for dynamic Huffman coding. We show how our algorithm can be modified for efficient length-restricted coding, alphabetic coding and coding with unequal letter costs.

  20. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  1. Codes Over Hyperfields

    Directory of Open Access Journals (Sweden)

    Atamewoue Surdive

    2017-12-01

    Full Text Available In this paper, we define linear codes and cyclic codes over a finite Krasner hyperfield and we characterize these codes by their generator matrices and parity check matrices. We also demonstrate that codes over finite Krasner hyperfields are more interesting for code theory than codes over classical finite fields.

  2. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  3. Homological stabilizer codes

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

    2013-03-15

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  4. Diagnostic Coding for Epilepsy.

    Science.gov (United States)

    Williams, Korwyn; Nuwer, Marc R; Buchhalter, Jeffrey R

    2016-02-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  5. Coding of Neuroinfectious Diseases.

    Science.gov (United States)

    Barkley, Gregory L

    2015-12-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  6. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  7. Entropy Coding in HEVC

    OpenAIRE

    Sze, Vivienne; Marpe, Detlev

    2014-01-01

    Context-Based Adaptive Binary Arithmetic Coding (CABAC) is a method of entropy coding first introduced in H.264/AVC and now used in the latest High Efficiency Video Coding (HEVC) standard. While it provides high coding efficiency, the data dependencies in H.264/AVC CABAC make it challenging to parallelize and thus limit its throughput. Accordingly, during the standardization of entropy coding for HEVC, both aspects of coding efficiency and throughput were considered. This chapter describes th...

  8. Generalized concatenated quantum codes

    International Nuclear Information System (INIS)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng Bei

    2009-01-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  9. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  10. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  11. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  12. Discussion on LDPC Codes and Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  13. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  14. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Shannon limit of the channel. Among the earliest discovered codes that approach the. Shannon limit were the low density parity check (LDPC) codes. The term low density arises from the property of the parity check matrix defining the code. We will now define this matrix and the role that it plays in decoding. 2. Linear Codes.

  15. Manually operated coded switch

    International Nuclear Information System (INIS)

    Barnette, J.H.

    1978-01-01

    The disclosure related to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made

  16. Coding in Muscle Disease.

    Science.gov (United States)

    Jones, Lyell K; Ney, John P

    2016-12-01

    Accurate coding is critically important for clinical practice and research. Ongoing changes to diagnostic and billing codes require the clinician to stay abreast of coding updates. Payment for health care services, data sets for health services research, and reporting for medical quality improvement all require accurate administrative coding. This article provides an overview of administrative coding for patients with muscle disease and includes a case-based review of diagnostic and Evaluation and Management (E/M) coding principles in patients with myopathy. Procedural coding for electrodiagnostic studies and neuromuscular ultrasound is also reviewed.

  17. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  18. Non-perturbative embedding of local defects in crystalline materials

    International Nuclear Information System (INIS)

    Cances, Eric; Deleurence, Amelie; Lewin, Mathieu

    2008-01-01

    We present a new variational model for computing the electronic first-order density matrix of a crystalline material in the presence of a local defect. A natural way to obtain variational discretizations of this model is to expand the difference Q between the density matrix of the defective crystal and the density matrix of the perfect crystal, in a basis of precomputed maximally localized Wannier functions of the reference perfect crystal. This approach can be used within any semi-empirical or density functional theory framework

  19. Non-perturbative effective interactions in the standard model

    Energy Technology Data Exchange (ETDEWEB)

    Arbuzov, Boris A. [Moscow Lomonosov State Univ. (Russian Federation). Skobeltsyn Inst. of Nuclear Physics

    2014-07-01

    This monograph is devoted to the nonperturbative dynamics in the Standard Model (SM), the basic theory of allfundamental interactions in natureexcept gravity. The Standard Model is divided into two parts: the quantum chromodynamics (QCD) and the electro-weak theory (EWT) are well-defined renormalizable theories in which the perturbation theory is valid. However, for the adequate description of the real physics nonperturbative effects are inevitable. This book describes how these nonperturbative effects may be obtained in the framework of spontaneous generation of effective interactions. The well-known example of such effective interaction is provided by the famous Nambu-Jona-Lasinio effective interaction. Also a spontaneous generation of this interaction in the framework of QCD is described and applied to the method for other effective interactions in QCD and EWT. The method is based on N.N. Bogolyubov's conception of compensation equations. As a result we then describe the principal features of the Standard Model, e.g. Higgs sector, and significant nonperturbative effects including recent results obtained at LHC and TEVATRON.

  20. Conformal bootstrap: non-perturbative QFT's under siege

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    [Exceptionally in Council Chamber] Originally formulated in the 70's, the conformal bootstrap is the ambitious idea that one can use internal consistency conditions to carve out, and eventually solve, the space of conformal field theories. In this talk I will review recent developments in the field which have boosted this program to a new level. I will present a method to extract quantitative informations in strongly-interacting theories, such as 3D Ising, O(N) vector model and even systems without a Lagrangian formulation. I will explain how these techniques have led to the world record determination of several critical exponents. Finally, I will review exact analytical results obtained using bootstrap techniques.

  1. Non-perturbative effective interactions in the standard model

    CERN Document Server

    Arbuzov, Boris A

    2014-01-01

    This monograph is devoted to the nonperturbative dynamics in the Standard Model (SM), the basic theory of all, but gravity, fundamental interactions in nature. The Standard Model is devided into two parts: the Quantum chromodynamics (QCD) and the Electro-weak theory (EWT) are well-defined renormalizable theories in which the perturbation theory is valid. However, for the adequate description of the real physics nonperturbative effects are inevitable. This book describes how these nonperturbative effects may be obtained in the framework of spontaneous generation of effective interactions. The well-known example of such effective interaction is provided by the famous Nambu--Jona-Lasinio effective interaction. Also a spontaneous generation of this interaction in the framework of QCD is described and applied to the method for other effective interactions in QCD and EWT. The method is based on N.N. Bogoliubov conception of compensation equations. As a result we then describe the principle feathures of the Standard...

  2. Patient observers and non-perturbative infrared dynamics in inflation

    DEFF Research Database (Denmark)

    Ferreira, Ricardo Z.; Sandora, McCullen; Sloth, Martin S.

    2018-01-01

    observer who has lived long enough to have a record of the state before the soft mode was created. Though classically there is no obstruction to measuring this effect locally, we give several indications that quantum mechanical uncertainties may censor the effect. We then apply our methods to find a non...

  3. Non-perturbative gravity at different length scales

    International Nuclear Information System (INIS)

    Folkerts, Sarah

    2013-01-01

    In this thesis, we investigate different aspects of gravity as an effective field theory. Building on the arguments of self-completeness of Einstein gravity, we argue that any sensible theory, which does not propagate negative-norm states and reduces to General Relativity in the low energy limit is self-complete. Due to black hole formation in high energy scattering experiments, distances smaller than the Planck scale are shielded from any accessibility. Degrees of freedom with masses larger than the Planck mass are mapped to large classical black holes which are described by the already existing infrared theory. Since high energy (UV) modifications of gravity which are ghost-free can only produce stronger gravitational interactions than Einstein gravity, the black hole shielding is even more efficient in such theories. In this light, we argue that conventional attempts of a Wilsonian UV completion are severely constrained. Furthermore, we investigate the quantum picture for black holes which emerges in the low energy description put forward by Dvali and Gomez in which black holes are described as Bose-Einstein condensates of many weakly coupled gravitons. Specifically, we investigate a non-relativistic toy model which mimics certain aspects of the graviton condensate picture. This toy model describes the collapse of a condensate of attractive bosons which emits particles due to incoherent scattering. We show that it is possible that the evolution of the condensate follows the critical point which is accompanied by the appearance of a light mode. Another aspect of gravitational interactions concerns the question whether quantum gravity breaks global symmetries. Arguments relying on the no hair theorem and wormhole solutions suggest that global symmetries can be violated. In this thesis, we parametrize such effects in terms of an effective field theory description of three-form fields. We investigate the possible implications for the axion solution of the strong CP problem. Since the axion is the (pseudo-) Goldstone boson of a broken U(1) global symmetry, quantum gravitational global symmetry violations could reinstate the CP problem even in the presence of the axion. We show that in the presence of massless neutrinos possible conflicts with the axion solution can be resolved. Demanding a viable axion solution of the strong CP problem, we derive new bounds on neutrino masses. In addition, we investigate the QCD vacuum energy screening mechanism for light quarks. It is well-known that the θ-dependence of the QCD vacuum vanishes linearly with the lightest quark mass. By an analogy with Schwinger pair creation in a strong electric field, we consider vacuum screening by η' bubble nucleation. We find that using the standard instanton approximation for the η' potential, the linear dependence is not recovered. We take this as an indication for the non-analyticity of the QCD vacuum energy proposed by Witten. In the last part of this thesis, we are concerned with gravitational effects on cosmological scales. The recent Planck data indicate that one of the best motivated dark matter candidates, the axion, is in conflict with bounds on isocurvature perturbations. We show that the isocurvature fluctuations can be efficiently suppressed when introducing a non-minimal kinetic coupling for the axion field during inflation. Thus, the axion can be a viable dark matter candidate for a large range of parameters. We show that the same coupling allows for the Standard Model Higgs to drive inflation and the dark matter density to be produced by the axion. Gravitational effects on large scales would also be sensitive to a possible mass for the graviton. However, such a modification has been known to be plagued by inconsistencies. In light of the recent proposal of a ghost-free theory of massive gravity by de Rham, Gabadadze and Tolley, we investigate the cubic order interactions of this theory in terms of helicities of a massive spin-2 particle. We find that it is not possible to truncate the action at cubic order without introducing higher derivative terms strongly coupled at scale Λ 5 . Additionally, we consider possible cubic interaction terms for a massive spin-2 particle on a Minkowski background. We derive the unique interaction terms which are free of higher derivatives.

  4. (Non)perturbative gravity, nonlocality, and nice slices

    International Nuclear Information System (INIS)

    Giddings, Steven B.

    2006-01-01

    Perturbative dynamics of gravity is investigated for high-energy scattering and in black hole backgrounds. In the latter case, a straightforward perturbative analysis fails, in a close parallel to the failure of the former when the impact parameter reaches the Schwarzschild radius. This suggests a flaw in a semiclassical description of physics on spatial slices that intersect both outgoing Hawking radiation and matter that has carried information into a black hole; such slices are instrumental in a general argument for black hole information loss. This indicates a possible role for the proposal that nonperturbative gravitational physics is intrinsically nonlocal

  5. Lattice field theories: non-perturbative methods of analysis

    International Nuclear Information System (INIS)

    Weinstein, M.

    1978-01-01

    A lecture is given on the possible extraction of interesting physical information from quantum field theories by studying their semiclassical versions. From the beginning the problem of solving for the spectrum states of any given continuum quantum field theory is considered as a giant Schroedinger problem, and then some nonperturbative methods for diagonalizing the Hamiltonian of the theory are explained without recourse to semiclassical approximations. The notion of a lattice appears as an artifice to handle the problems associated with the familiar infrared and ultraviolet divergences of continuum quantum field theory and in fact for all but gauge theories. 18 references

  6. Non-perturbative transitions among intersecting-brane vacua

    CERN Document Server

    Angelantonj, Carlo; Dudas, Emilian; Pradisi, Gianfranco; 10.1007/JHEP07(2011)123

    2011-01-01

    We investigate the transmutation of D-branes into Abelian magnetic backgrounds on the world-volume of higher-dimensional branes, within the framework of global models with compact internal dimensions. The phenomenon, T-dual to brane recombination in the intersecting-brane picture, shares some similarities to inverse small-instanton transitions in non-compact spaces, though in this case the Abelian magnetic background is a consequence of the compactness of the internal manifold, and is not ascribed to a zero-size non-Abelian instanton growing to maximal size. We provide details of the transition in various supersymmetric orientifolds and non-supersymmetric tachyon-free vacua with Brane Supersymmetry Breaking, both from brane recombination and from a field theory Higgs mechanism viewpoints.

  7. Non-perturbative chiral corrections for lattice QCD

    International Nuclear Information System (INIS)

    Thomas, A.W.; Leinweber, D.B.; Lu, D.H.

    2002-01-01

    We explore the chiral aspects of extrapolation of observables calculated within lattice QCD, using the nucleon magnetic moments as an example. Our analysis shows that the biggest effects of chiral dynamics occur for quark masses corresponding to a pion mass below 600 MeV. In this limited range chiral perturbation theory is not rapidly convergent, but we can develop some understanding of the behaviour through chiral quark models. This model dependent analysis leads us to a simple Pade approximant which builds in both the limits m π → 0 and m π → ∞ correctly and permits a consistent, model independent extrapolation to the physical pion mass which should be extremely reliable. (author)

  8. On non-perturbative effects of background fields

    International Nuclear Information System (INIS)

    Hosoda, Masataka; Yamakoshi, Hitoshi; Shimizu, Tadayoshi.

    1986-01-01

    APS-index of the Abelian Higgs model is at first obtained in a bounded domain of a disk with radius R. It is shown that the APS-index depends strongly on the behavior of the background fields and becomes integer when boundary effects are taken into account. Next, the electric charge of the vacuum is reconsidered in the momopole field coupled to a massive Dirac particle. It is reconfirmed that the monopole ground state has an electric charge θ/π which changes discontinuously to zero when the fermion mass is zero. (author)

  9. R 2 inflation to probe non-perturbative quantum gravity

    Science.gov (United States)

    Koshelev, Alexey S.; Sravan Kumar, K.; Starobinsky, Alexei A.

    2018-03-01

    It is natural to expect a consistent inflationary model of the very early Universe to be an effective theory of quantum gravity, at least at energies much less than the Planck one. For the moment, R + R 2, or shortly R 2, inflation is the most successful in accounting for the latest CMB data from the PLANCK satellite and other experiments. Moreover, recently it was shown to be ultra-violet (UV) complete via an embedding into an analytic infinite derivative (AID) non-local gravity. In this paper, we derive a most general theory of gravity that contributes to perturbed linear equations of motion around maximally symmetric space-times. We show that such a theory is quadratic in the Ricci scalar and the Weyl tensor with AID operators along with the Einstein-Hilbert term and possibly a cosmological constant. We explicitly demonstrate that introduction of the Ricci tensor squared term is redundant. Working in this quadratic AID gravity framework without a cosmological term we prove that for a specified class of space homogeneous space-times, a space of solutions to the equations of motion is identical to the space of backgrounds in a local R 2 model. We further compute the full second order perturbed action around any background belonging to that class. We proceed by extracting the key inflationary parameters of our model such as a spectral index ( n s ), a tensor-to-scalar ratio ( r) and a tensor tilt ( n t ). It appears that n s remains the same as in the local R 2 inflation in the leading slow-roll approximation, while r and n t get modified due to modification of the tensor power spectrum. This class of models allows for any value of r complete R 2 gravity a natural target for future CMB probes.

  10. Non-perturbative studies of QCD at small quark masses

    Energy Technology Data Exchange (ETDEWEB)

    Wennekers, J.

    2006-07-15

    We investigate the quenched approximation of lattice QCD with numerical simulations of Ginsparg-Wilson fermions, which are a fermion discretisation with exact chiral symmetry. We compute the renormalisation constant of the scalar density, which allows to extrapolate the chiral condensate to the continuum limit. Furthermore we match lattice results of matrix elements describing hadronic kaon decays to Chiral Perturbation Theory in finite volume and at almost vanishing quark mass. The resulting low-energy constants in the considered SU(4)-flavour symmetric case indicate a substantial contribution of low scale QCD effects to the {delta}I = 1/2 rule. (Orig.)

  11. Non-perturbative selection rules in F-theory

    Energy Technology Data Exchange (ETDEWEB)

    Martucci, Luca [Dipartimento di Fisica e Astronomia ‘Galileo Galilei’, Università di Padova, and I.N.F.N. Sezione di Padova, via Marzolo 8, Padova, I-35131 (Italy); Weigand, Timo [Institut für Theoretische Physik, Ruprecht-Karls-Universität, Philosophenweg 19, Heidelberg, 69120 (Germany)

    2015-09-29

    We discuss the structure of charged matter couplings in 4-dimensional F-theory compactifications. Charged matter is known to arise from M2-branes wrapping fibral curves on an elliptic or genus-one fibration Y. If a set of fibral curves satisfies a homological relation in the fibre homology, a coupling involving the states can arise without exponential volume suppression due to a splitting and joining of the M2-branes. If the fibral curves only sum to zero in the integral homology of the full fibration, no such coupling is possible. In this case an M2-instanton wrapping a 3-chain bounded by the fibral matter curves can induce a D-term which is volume suppressed. We elucidate the consequences of this pattern for the appearance of massive U(1) symmetries in F-theory and analyse the structure of discrete selection rules in the coupling sector. The weakly coupled analogue of said M2-instantons is worked out to be given by D1-F1 instantons. The generation of an exponentially suppressed F-term requires the formation of half-BPS bound states of M2 and M5-instantons. This effect and its description in terms of fluxed M5-instantons is discussed in a companion paper.

  12. Random surfaces: A non-perturbative regularization of strings?

    International Nuclear Information System (INIS)

    Ambjoern, J.

    1989-12-01

    I review the basic properties of the theory of randum surfaces. While it is by now well known that the theory of (discretized) random surfaces correctly describes the (perturbative) aspects of non-critical strings in d 1. In these lectures I intend to show that the theory of dynamical triangulated random surfaces provides us with a lot of information about the dynamics of both the bosonic string and the superstring even for d>1. I also briefly review recent attempts to define a string field theory (sum over all genus) in this approach. (orig.)

  13. Codes and curves

    CERN Document Server

    Walker, Judy L

    2000-01-01

    When information is transmitted, errors are likely to occur. Coding theory examines efficient ways of packaging data so that these errors can be detected, or even corrected. The traditional tools of coding theory have come from combinatorics and group theory. Lately, however, coding theorists have added techniques from algebraic geometry to their toolboxes. In particular, by re-interpreting the Reed-Solomon codes, one can see how to define new codes based on divisors on algebraic curves. For instance, using modular curves over finite fields, Tsfasman, Vladut, and Zink showed that one can define a sequence of codes with asymptotically better parameters than any previously known codes. This monograph is based on a series of lectures the author gave as part of the IAS/PCMI program on arithmetic algebraic geometry. Here, the reader is introduced to the exciting field of algebraic geometric coding theory. Presenting the material in the same conversational tone of the lectures, the author covers linear codes, inclu...

  14. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    This essay studies the source code of an artwork from a software studies perspective. By examining code that come close to the approach of critical code studies (Marino, 2006), I trace the network artwork, Pupufu (Lin, 2009) to understand various real-time approaches to social media platforms (MSN......, Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  15. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  16. SEVERO code - user's manual

    International Nuclear Information System (INIS)

    Sacramento, A.M. do.

    1989-01-01

    This user's manual contains all the necessary information concerning the use of SEVERO code. This computer code is related to the statistics of extremes = extreme winds, extreme precipitation and flooding hazard risk analysis. (A.C.A.S.)

  17. Topological color codes and two-body quantum lattice Hamiltonians

    Science.gov (United States)

    Kargarian, M.; Bombin, H.; Martin-Delgado, M. A.

    2010-02-01

    Topological color codes are among the stabilizer codes with remarkable properties from the quantum information perspective. In this paper, we construct a lattice, the so-called ruby lattice, with coordination number 4 governed by a two-body Hamiltonian. In a particular regime of coupling constants, in a strong coupling limit, degenerate perturbation theory implies that the low-energy spectrum of the model can be described by a many-body effective Hamiltonian, which encodes the color code as its ground state subspace. Ground state subspace corresponds to a vortex-free sector. The gauge symmetry Z2×Z2 of the color code could already be realized by identifying three distinct plaquette operators on the ruby lattice. All plaquette operators commute with each other and with the Hamiltonian being integrals of motion. Plaquettes are extended to closed strings or string-net structures. Non-contractible closed strings winding the space commute with Hamiltonian but not always with each other. This gives rise to exact topological degeneracy of the model. A connection to 2-colexes can be established via the coloring of the strings. We discuss it at the non-perturbative level. The particular structure of the two-body Hamiltonian provides a fruitful interpretation in terms of mapping onto bosons coupled to effective spins. We show that high-energy excitations of the model have fermionic statistics. They form three families of high-energy excitations each of one color. Furthermore, we show that they belong to a particular family of topological charges. The emergence of invisible charges is related to the string-net structure of the model. The emerging fermions are coupled to nontrivial gauge fields. We show that for particular 2-colexes, the fermions can see the background fluxes in the ground state. Also, we use the Jordan-Wigner transformation in order to test the integrability of the model via introducing Majorana fermions. The four-valent structure of the lattice prevents the

  18. Synthesizing Certified Code

    OpenAIRE

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach for formally demonstrating software quality. Its basic idea is to require code producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates that can be checked independently. Since code certification uses the same underlying technology as program verification, it requires detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding annotations to th...

  19. FERRET data analysis code

    International Nuclear Information System (INIS)

    Schmittroth, F.

    1979-09-01

    A documentation of the FERRET data analysis code is given. The code provides a way to combine related measurements and calculations in a consistent evaluation. Basically a very general least-squares code, it is oriented towards problems frequently encountered in nuclear data and reactor physics. A strong emphasis is on the proper treatment of uncertainties and correlations and in providing quantitative uncertainty estimates. Documentation includes a review of the method, structure of the code, input formats, and examples

  20. Stylize Aesthetic QR Code

    OpenAIRE

    Xu, Mingliang; Su, Hao; Li, Yafei; Li, Xi; Liao, Jing; Niu, Jianwei; Lv, Pei; Zhou, Bing

    2018-01-01

    With the continued proliferation of smart mobile devices, Quick Response (QR) code has become one of the most-used types of two-dimensional code in the world. Aiming at beautifying the appearance of QR codes, existing works have developed a series of techniques to make the QR code more visual-pleasant. However, these works still leave much to be desired, such as visual diversity, aesthetic quality, flexibility, universal property, and robustness. To address these issues, in this paper, we pro...

  1. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  2. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded...

  3. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  4. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  5. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  6. The network code

    International Nuclear Information System (INIS)

    1997-01-01

    The Network Code defines the rights and responsibilities of all users of the natural gas transportation system in the liberalised gas industry in the United Kingdom. This report describes the operation of the Code, what it means, how it works and its implications for the various participants in the industry. The topics covered are: development of the competitive gas market in the UK; key points in the Code; gas transportation charging; impact of the Code on producers upstream; impact on shippers; gas storage; supply point administration; impact of the Code on end users; the future. (20 tables; 33 figures) (UK)

  7. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  8. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  9. XSOR codes users manual

    International Nuclear Information System (INIS)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ''XSOR''. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms

  10. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    1999-01-01

    The present lecture has a main goal to show how the transport lattice calculations are realised in a standard computer code. This is illustrated on the example of the WIMSD code, belonging to the most popular tools for reactor calculations. Most of the approaches discussed here can be easily modified to any other lattice code. The description of the code assumes the basic knowledge of reactor lattice, on the level given in the lecture on 'Reactor lattice transport calculations'. For more advanced explanation of the WIMSD code the reader is directed to the detailed descriptions of the code cited in References. The discussion of the methods and models included in the code is followed by the generally used homogenisation procedure and several numerical examples of discrepancies in calculated multiplication factors based on different sources of library data. (author)

  11. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  12. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  13. An Optimal Linear Coding for Index Coding Problem

    OpenAIRE

    Pezeshkpour, Pouya

    2015-01-01

    An optimal linear coding solution for index coding problem is established. Instead of network coding approach by focus on graph theoric and algebraic methods a linear coding program for solving both unicast and groupcast index coding problem is presented. The coding is proved to be the optimal solution from the linear perspective and can be easily utilize for any number of messages. The importance of this work is lying mostly on the usage of the presented coding in the groupcast index coding ...

  14. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  15. Majorana fermion codes

    International Nuclear Information System (INIS)

    Bravyi, Sergey; Terhal, Barbara M; Leemhuis, Bernhard

    2010-01-01

    We initiate the study of Majorana fermion codes (MFCs). These codes can be viewed as extensions of Kitaev's one-dimensional (1D) model of unpaired Majorana fermions in quantum wires to higher spatial dimensions and interacting fermions. The purpose of MFCs is to protect quantum information against low-weight fermionic errors, that is, operators acting on sufficiently small subsets of fermionic modes. We examine to what extent MFCs can surpass qubit stabilizer codes in terms of their stability properties. A general construction of 2D MFCs is proposed that combines topological protection based on a macroscopic code distance with protection based on fermionic parity conservation. Finally, we use MFCs to show how to transform any qubit stabilizer code to a weakly self-dual CSS code.

  16. Theory of epigenetic coding.

    Science.gov (United States)

    Elder, D

    1984-06-07

    The logic of genetic control of development may be based on a binary epigenetic code. This paper revises the author's previous scheme dealing with the numerology of annelid metamerism in these terms. Certain features of the code had been deduced to be combinatorial, others not. This paradoxical contrast is resolved here by the interpretation that these features relate to different operations of the code; the combinatiorial to coding identity of units, the non-combinatorial to coding production of units. Consideration of a second paradox in the theory of epigenetic coding leads to a new solution which further provides a basis for epimorphic regeneration, and may in particular throw light on the "regeneration-duplication" phenomenon. A possible test of the model is also put forward.

  17. DISP1 code

    International Nuclear Information System (INIS)

    Vokac, P.

    1999-12-01

    DISP1 code is a simple tool for assessment of the dispersion of the fission product cloud escaping from a nuclear power plant after an accident. The code makes it possible to tentatively check the feasibility of calculations by more complex PSA3 codes and/or codes for real-time dispersion calculations. The number of input parameters is reasonably low and the user interface is simple enough to allow a rapid processing of sensitivity analyses. All input data entered through the user interface are stored in the text format. Implementation of dispersion model corrections taken from the ARCON96 code enables the DISP1 code to be employed for assessment of the radiation hazard within the NPP area, in the control room for instance. (P.A.)

  18. Phonological coding during reading.

    Science.gov (United States)

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  19. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  20. MORSE Monte Carlo code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described

  1. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  2. Tokamak Systems Code

    International Nuclear Information System (INIS)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged

  3. Efficient Coding of Information: Huffman Coding -RE ...

    Indian Academy of Sciences (India)

    to a stream of equally-likely symbols so as to recover the original stream in the event of errors. The for- ... The source-coding problem is one of finding a mapping from U to a ... probability that the random variable X takes the value x written as ...

  4. NR-code: Nonlinear reconstruction code

    Science.gov (United States)

    Yu, Yu; Pen, Ue-Li; Zhu, Hong-Ming

    2018-04-01

    NR-code applies nonlinear reconstruction to the dark matter density field in redshift space and solves for the nonlinear mapping from the initial Lagrangian positions to the final redshift space positions; this reverses the large-scale bulk flows and improves the precision measurement of the baryon acoustic oscillations (BAO) scale.

  5. Synthesizing Certified Code

    Science.gov (United States)

    Whalen, Michael; Schumann, Johann; Fischer, Bernd

    2002-01-01

    Code certification is a lightweight approach to demonstrate software quality on a formal level. Its basic idea is to require producers to provide formal proofs that their code satisfies certain quality properties. These proofs serve as certificates which can be checked independently. Since code certification uses the same underlying technology as program verification, it also requires many detailed annotations (e.g., loop invariants) to make the proofs possible. However, manually adding theses annotations to the code is time-consuming and error-prone. We address this problem by combining code certification with automatic program synthesis. We propose an approach to generate simultaneously, from a high-level specification, code and all annotations required to certify generated code. Here, we describe a certification extension of AUTOBAYES, a synthesis tool which automatically generates complex data analysis programs from compact specifications. AUTOBAYES contains sufficient high-level domain knowledge to generate detailed annotations. This allows us to use a general-purpose verification condition generator to produce a set of proof obligations in first-order logic. The obligations are then discharged using the automated theorem E-SETHEO. We demonstrate our approach by certifying operator safety for a generated iterative data classification program without manual annotation of the code.

  6. Code of Ethics

    Science.gov (United States)

    Division for Early Childhood, Council for Exceptional Children, 2009

    2009-01-01

    The Code of Ethics of the Division for Early Childhood (DEC) of the Council for Exceptional Children is a public statement of principles and practice guidelines supported by the mission of DEC. The foundation of this Code is based on sound ethical reasoning related to professional practice with young children with disabilities and their families…

  7. Interleaved Product LDPC Codes

    OpenAIRE

    Baldi, Marco; Cancellieri, Giovanni; Chiaraluce, Franco

    2011-01-01

    Product LDPC codes take advantage of LDPC decoding algorithms and the high minimum distance of product codes. We propose to add suitable interleavers to improve the waterfall performance of LDPC decoding. Interleaving also reduces the number of low weight codewords, that gives a further advantage in the error floor region.

  8. Insurance billing and coding.

    Science.gov (United States)

    Napier, Rebecca H; Bruelheide, Lori S; Demann, Eric T K; Haug, Richard H

    2008-07-01

    The purpose of this article is to highlight the importance of understanding various numeric and alpha-numeric codes for accurately billing dental and medically related services to private pay or third-party insurance carriers. In the United States, common dental terminology (CDT) codes are most commonly used by dentists to submit claims, whereas current procedural terminology (CPT) and International Classification of Diseases, Ninth Revision, Clinical Modification (ICD.9.CM) codes are more commonly used by physicians to bill for their services. The CPT and ICD.9.CM coding systems complement each other in that CPT codes provide the procedure and service information and ICD.9.CM codes provide the reason or rationale for a particular procedure or service. These codes are more commonly used for "medical necessity" determinations, and general dentists and specialists who routinely perform care, including trauma-related care, biopsies, and dental treatment as a result of or in anticipation of a cancer-related treatment, are likely to use these codes. Claim submissions for care provided can be completed electronically or by means of paper forms.

  9. Error Correcting Codes

    Indian Academy of Sciences (India)

    Science and Automation at ... the Reed-Solomon code contained 223 bytes of data, (a byte ... then you have a data storage system with error correction, that ..... practical codes, storing such a table is infeasible, as it is generally too large.

  10. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Lene; Pries-Heje, Jan; Dalgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  11. RFQ simulation code

    International Nuclear Information System (INIS)

    Lysenko, W.P.

    1984-04-01

    We have developed the RFQLIB simulation system to provide a means to systematically generate the new versions of radio-frequency quadrupole (RFQ) linac simulation codes that are required by the constantly changing needs of a research environment. This integrated system simplifies keeping track of the various versions of the simulation code and makes it practical to maintain complete and up-to-date documentation. In this scheme, there is a certain standard version of the simulation code that forms a library upon which new versions are built. To generate a new version of the simulation code, the routines to be modified or added are appended to a standard command file, which contains the commands to compile the new routines and link them to the routines in the library. The library itself is rarely changed. Whenever the library is modified, however, this modification is seen by all versions of the simulation code, which actually exist as different versions of the command file. All code is written according to the rules of structured programming. Modularity is enforced by not using COMMON statements, simplifying the relation of the data flow to a hierarchy diagram. Simulation results are similar to those of the PARMTEQ code, as expected, because of the similar physical model. Different capabilities, such as those for generating beams matched in detail to the structure, are available in the new code for help in testing new ideas in designing RFQ linacs

  12. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  13. 78 FR 18321 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2013-03-26

    ... Energy Conservation Code. International Existing Building Code. International Fire Code. International... Code. International Property Maintenance Code. International Residential Code. International Swimming Pool and Spa Code International Wildland-Urban Interface Code. International Zoning Code. ICC Standards...

  14. Validation of thermalhydraulic codes

    International Nuclear Information System (INIS)

    Wilkie, D.

    1992-01-01

    Thermalhydraulic codes require to be validated against experimental data collected over a wide range of situations if they are to be relied upon. A good example is provided by the nuclear industry where codes are used for safety studies and for determining operating conditions. Errors in the codes could lead to financial penalties, to the incorrect estimation of the consequences of accidents and even to the accidents themselves. Comparison between prediction and experiment is often described qualitatively or in approximate terms, e.g. ''agreement is within 10%''. A quantitative method is preferable, especially when several competing codes are available. The codes can then be ranked in order of merit. Such a method is described. (Author)

  15. Fracture flow code

    International Nuclear Information System (INIS)

    Dershowitz, W; Herbert, A.; Long, J.

    1989-03-01

    The hydrology of the SCV site will be modelled utilizing discrete fracture flow models. These models are complex, and can not be fully cerified by comparison to analytical solutions. The best approach for verification of these codes is therefore cross-verification between different codes. This is complicated by the variation in assumptions and solution techniques utilized in different codes. Cross-verification procedures are defined which allow comparison of the codes developed by Harwell Laboratory, Lawrence Berkeley Laboratory, and Golder Associates Inc. Six cross-verification datasets are defined for deterministic and stochastic verification of geometric and flow features of the codes. Additional datasets for verification of transport features will be documented in a future report. (13 figs., 7 tabs., 10 refs.) (authors)

  16. Huffman coding in advanced audio coding standard

    Science.gov (United States)

    Brzuchalski, Grzegorz

    2012-05-01

    This article presents several hardware architectures of Advanced Audio Coding (AAC) Huffman noiseless encoder, its optimisations and working implementation. Much attention has been paid to optimise the demand of hardware resources especially memory size. The aim of design was to get as short binary stream as possible in this standard. The Huffman encoder with whole audio-video system has been implemented in FPGA devices.

  17. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  18. Report number codes

    International Nuclear Information System (INIS)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  19. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  20. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  1. Transport theory and codes

    International Nuclear Information System (INIS)

    Clancy, B.E.

    1986-01-01

    This chapter begins with a neutron transport equation which includes the one dimensional plane geometry problems, the one dimensional spherical geometry problems, and numerical solutions. The section on the ANISN code and its look-alikes covers problems which can be solved; eigenvalue problems; outer iteration loop; inner iteration loop; and finite difference solution procedures. The input and output data for ANISN is also discussed. Two dimensional problems such as the DOT code are given. Finally, an overview of the Monte-Carlo methods and codes are elaborated on

  2. Gravity inversion code

    International Nuclear Information System (INIS)

    Burkhard, N.R.

    1979-01-01

    The gravity inversion code applies stabilized linear inverse theory to determine the topography of a subsurface density anomaly from Bouguer gravity data. The gravity inversion program consists of four source codes: SEARCH, TREND, INVERT, and AVERAGE. TREND and INVERT are used iteratively to converge on a solution. SEARCH forms the input gravity data files for Nevada Test Site data. AVERAGE performs a covariance analysis on the solution. This document describes the necessary input files and the proper operation of the code. 2 figures, 2 tables

  3. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  4. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed; Ghanem, Bernard; Wonka, Peter

    2018-01-01

    coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements

  5. SASSYS LMFBR systems code

    International Nuclear Information System (INIS)

    Dunn, F.E.; Prohammer, F.G.; Weber, D.P.

    1983-01-01

    The SASSYS LMFBR systems analysis code is being developed mainly to analyze the behavior of the shut-down heat-removal system and the consequences of failures in the system, although it is also capable of analyzing a wide range of transients, from mild operational transients through more severe transients leading to sodium boiling in the core and possible melting of clad and fuel. The code includes a detailed SAS4A multi-channel core treatment plus a general thermal-hydraulic treatment of the primary and intermediate heat-transport loops and the steam generators. The code can handle any LMFBR design, loop or pool, with an arbitrary arrangement of components. The code is fast running: usually faster than real time

  6. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  7. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  8. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  9. Induction technology optimization code

    International Nuclear Information System (INIS)

    Caporaso, G.J.; Brooks, A.L.; Kirbie, H.C.

    1992-01-01

    A code has been developed to evaluate relative costs of induction accelerator driver systems for relativistic klystrons. The code incorporates beam generation, transport and pulsed power system constraints to provide an integrated design tool. The code generates an injector/accelerator combination which satisfies the top level requirements and all system constraints once a small number of design choices have been specified (rise time of the injector voltage and aspect ratio of the ferrite induction cores, for example). The code calculates dimensions of accelerator mechanical assemblies and values of all electrical components. Cost factors for machined parts, raw materials and components are applied to yield a total system cost. These costs are then plotted as a function of the two design choices to enable selection of an optimum design based on various criteria. (Author) 11 refs., 3 figs

  10. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  11. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  12. Reactor lattice codes

    International Nuclear Information System (INIS)

    Kulikowska, T.

    2001-01-01

    The description of reactor lattice codes is carried out on the example of the WIMSD-5B code. The WIMS code in its various version is the most recognised lattice code. It is used in all parts of the world for calculations of research and power reactors. The version WIMSD-5B is distributed free of charge by NEA Data Bank. The description of its main features given in the present lecture follows the aspects defined previously for lattice calculations in the lecture on Reactor Lattice Transport Calculations. The spatial models are described, and the approach to the energy treatment is given. Finally the specific algorithm applied in fuel depletion calculations is outlined. (author)

  13. Critical Care Coding for Neurologists.

    Science.gov (United States)

    Nuwer, Marc R; Vespa, Paul M

    2015-10-01

    Accurate coding is an important function of neurologic practice. This contribution to Continuum is part of an ongoing series that presents helpful coding information along with examples related to the issue topic. Tips for diagnosis coding, Evaluation and Management coding, procedure coding, or a combination are presented, depending on which is most applicable to the subject area of the issue.

  14. Lattice Index Coding

    OpenAIRE

    Natarajan, Lakshmi; Hong, Yi; Viterbo, Emanuele

    2014-01-01

    The index coding problem involves a sender with K messages to be transmitted across a broadcast channel, and a set of receivers each of which demands a subset of the K messages while having prior knowledge of a different subset as side information. We consider the specific case of noisy index coding where the broadcast channel is Gaussian and every receiver demands all the messages from the source. Instances of this communication problem arise in wireless relay networks, sensor networks, and ...

  15. Towards advanced code simulators

    International Nuclear Information System (INIS)

    Scriven, A.H.

    1990-01-01

    The Central Electricity Generating Board (CEGB) uses advanced thermohydraulic codes extensively to support PWR safety analyses. A system has been developed to allow fully interactive execution of any code with graphical simulation of the operator desk and mimic display. The system operates in a virtual machine environment, with the thermohydraulic code executing in one virtual machine, communicating via interrupts with any number of other virtual machines each running other programs and graphics drivers. The driver code itself does not have to be modified from its normal batch form. Shortly following the release of RELAP5 MOD1 in IBM compatible form in 1983, this code was used as the driver for this system. When RELAP5 MOD2 became available, it was adopted with no changes needed in the basic system. Overall the system has been used for some 5 years for the analysis of LOBI tests, full scale plant studies and for simple what-if studies. For gaining rapid understanding of system dependencies it has proved invaluable. The graphical mimic system, being independent of the driver code, has also been used with other codes to study core rewetting, to replay results obtained from batch jobs on a CRAY2 computer system and to display suitably processed experimental results from the LOBI facility to aid interpretation. For the above work real-time execution was not necessary. Current work now centers on implementing the RELAP 5 code on a true parallel architecture machine. Marconi Simulation have been contracted to investigate the feasibility of using upwards of 100 processors, each capable of a peak of 30 MIPS to run a highly detailed RELAP5 model in real time, complete with specially written 3D core neutronics and balance of plant models. This paper describes the experience of using RELAP5 as an analyzer/simulator, and outlines the proposed methods and problems associated with parallel execution of RELAP5

  16. Cracking the Gender Codes

    DEFF Research Database (Denmark)

    Rennison, Betina Wolfgang

    2016-01-01

    extensive work to raise the proportion of women. This has helped slightly, but women remain underrepresented at the corporate top. Why is this so? What can be done to solve it? This article presents five different types of answers relating to five discursive codes: nature, talent, business, exclusion...... in leadership management, we must become more aware and take advantage of this complexity. We must crack the codes in order to crack the curve....

  17. PEAR code review

    International Nuclear Information System (INIS)

    De Wit, R.; Jamieson, T.; Lord, M.; Lafortune, J.F.

    1997-07-01

    As a necessary component in the continuous improvement and refinement of methodologies employed in the nuclear industry, regulatory agencies need to periodically evaluate these processes to improve confidence in results and ensure appropriate levels of safety are being achieved. The independent and objective review of industry-standard computer codes forms an essential part of this program. To this end, this work undertakes an in-depth review of the computer code PEAR (Public Exposures from Accidental Releases), developed by Atomic Energy of Canada Limited (AECL) to assess accidental releases from CANDU reactors. PEAR is based largely on the models contained in the Canadian Standards Association (CSA) N288.2-M91. This report presents the results of a detailed technical review of the PEAR code to identify any variations from the CSA standard and other supporting documentation, verify the source code, assess the quality of numerical models and results, and identify general strengths and weaknesses of the code. The version of the code employed in this review is the one which AECL intends to use for CANDU 9 safety analyses. (author)

  18. KENO-V code

    International Nuclear Information System (INIS)

    Cramer, S.N.

    1984-01-01

    The KENO-V code is the current release of the Oak Ridge multigroup Monte Carlo criticality code development. The original KENO, with 16 group Hansen-Roach cross sections and P 1 scattering, was one ot the first multigroup Monte Carlo codes and it and its successors have always been a much-used research tool for criticality studies. KENO-V is able to accept large neutron cross section libraries (a 218 group set is distributed with the code) and has a general P/sub N/ scattering capability. A supergroup feature allows execution of large problems on small computers, but at the expense of increased calculation time and system input/output operations. This supergroup feature is activated automatically by the code in a manner which utilizes as much computer memory as is available. The primary purpose of KENO-V is to calculate the system k/sub eff/, from small bare critical assemblies to large reflected arrays of differing fissile and moderator elements. In this respect KENO-V neither has nor requires the many options and sophisticated biasing techniques of general Monte Carlo codes

  19. Code, standard and specifications

    International Nuclear Information System (INIS)

    Abdul Nassir Ibrahim; Azali Muhammad; Ab. Razak Hamzah; Abd. Aziz Mohamed; Mohamad Pauzi Ismail

    2008-01-01

    Radiography also same as the other technique, it need standard. This standard was used widely and method of used it also regular. With that, radiography testing only practical based on regulations as mentioned and documented. These regulation or guideline documented in code, standard and specifications. In Malaysia, level one and basic radiographer can do radiography work based on instruction give by level two or three radiographer. This instruction was produced based on guideline that mention in document. Level two must follow the specifications mentioned in standard when write the instruction. From this scenario, it makes clearly that this radiography work is a type of work that everything must follow the rule. For the code, the radiography follow the code of American Society for Mechanical Engineer (ASME) and the only code that have in Malaysia for this time is rule that published by Atomic Energy Licensing Board (AELB) known as Practical code for radiation Protection in Industrial radiography. With the existence of this code, all the radiography must follow the rule or standard regulated automatically.

  20. Fast Coding Unit Encoding Mechanism for Low Complexity Video Coding

    OpenAIRE

    Gao, Yuan; Liu, Pengyu; Wu, Yueying; Jia, Kebin; Gao, Guandong

    2016-01-01

    In high efficiency video coding (HEVC), coding tree contributes to excellent compression performance. However, coding tree brings extremely high computational complexity. Innovative works for improving coding tree to further reduce encoding time are stated in this paper. A novel low complexity coding tree mechanism is proposed for HEVC fast coding unit (CU) encoding. Firstly, this paper makes an in-depth study of the relationship among CU distribution, quantization parameter (QP) and content ...

  1. SPECTRAL AMPLITUDE CODING OCDMA SYSTEMS USING ENHANCED DOUBLE WEIGHT CODE

    Directory of Open Access Journals (Sweden)

    F.N. HASOON

    2006-12-01

    Full Text Available A new code structure for spectral amplitude coding optical code division multiple access systems based on double weight (DW code families is proposed. The DW has a fixed weight of two. Enhanced double-weight (EDW code is another variation of a DW code family that can has a variable weight greater than one. The EDW code possesses ideal cross-correlation properties and exists for every natural number n. A much better performance can be provided by using the EDW code compared to the existing code such as Hadamard and Modified Frequency-Hopping (MFH codes. It has been observed that theoretical analysis and simulation for EDW is much better performance compared to Hadamard and Modified Frequency-Hopping (MFH codes.

  2. Nuclear code abstracts (1975 edition)

    International Nuclear Information System (INIS)

    Akanuma, Makoto; Hirakawa, Takashi

    1976-02-01

    Nuclear Code Abstracts is compiled in the Nuclear Code Committee to exchange information of the nuclear code developments among members of the committee. Enlarging the collection, the present one includes nuclear code abstracts obtained in 1975 through liaison officers of the organizations in Japan participating in the Nuclear Energy Agency's Computer Program Library at Ispra, Italy. The classification of nuclear codes and the format of code abstracts are the same as those in the library. (auth.)

  3. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  4. ACE - Manufacturer Identification Code (MID)

    Data.gov (United States)

    Department of Homeland Security — The ACE Manufacturer Identification Code (MID) application is used to track and control identifications codes for manufacturers. A manufacturer is identified on an...

  5. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  6. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  7. The Aster code

    International Nuclear Information System (INIS)

    Delbecq, J.M.

    1999-01-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  8. Adaptive distributed source coding.

    Science.gov (United States)

    Varodayan, David; Lin, Yao-Chung; Girod, Bernd

    2012-05-01

    We consider distributed source coding in the presence of hidden variables that parameterize the statistical dependence among sources. We derive the Slepian-Wolf bound and devise coding algorithms for a block-candidate model of this problem. The encoder sends, in addition to syndrome bits, a portion of the source to the decoder uncoded as doping bits. The decoder uses the sum-product algorithm to simultaneously recover the source symbols and the hidden statistical dependence variables. We also develop novel techniques based on density evolution (DE) to analyze the coding algorithms. We experimentally confirm that our DE analysis closely approximates practical performance. This result allows us to efficiently optimize parameters of the algorithms. In particular, we show that the system performs close to the Slepian-Wolf bound when an appropriate doping rate is selected. We then apply our coding and analysis techniques to a reduced-reference video quality monitoring system and show a bit rate saving of about 75% compared with fixed-length coding.

  9. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  10. Spatially coded backscatter radiography

    International Nuclear Information System (INIS)

    Thangavelu, S.; Hussein, E.M.A.

    2007-01-01

    Conventional radiography requires access to two opposite sides of an object, which makes it unsuitable for the inspection of extended and/or thick structures (airframes, bridges, floors etc.). Backscatter imaging can overcome this problem, but the indications obtained are difficult to interpret. This paper applies the coded aperture technique to gamma-ray backscatter-radiography in order to enhance the detectability of flaws. This spatial coding method involves the positioning of a mask with closed and open holes to selectively permit or block the passage of radiation. The obtained coded-aperture indications are then mathematically decoded to detect the presence of anomalies. Indications obtained from Monte Carlo calculations were utilized in this work to simulate radiation scattering measurements. These simulated measurements were used to investigate the applicability of this technique to the detection of flaws by backscatter radiography

  11. Aztheca Code; Codigo Aztheca

    Energy Technology Data Exchange (ETDEWEB)

    Quezada G, S.; Espinosa P, G. [Universidad Autonoma Metropolitana, Unidad Iztapalapa, San Rafael Atlixco No. 186, Col. Vicentina, 09340 Ciudad de Mexico (Mexico); Centeno P, J.; Sanchez M, H., E-mail: sequga@gmail.com [UNAM, Facultad de Ingenieria, Ciudad Universitaria, Circuito Exterior s/n, 04510 Ciudad de Mexico (Mexico)

    2017-09-15

    This paper presents the Aztheca code, which is formed by the mathematical models of neutron kinetics, power generation, heat transfer, core thermo-hydraulics, recirculation systems, dynamic pressure and level models and control system. The Aztheca code is validated with plant data, as well as with predictions from the manufacturer when the reactor operates in a stationary state. On the other hand, to demonstrate that the model is applicable during a transient, an event occurred in a nuclear power plant with a BWR reactor is selected. The plant data are compared with the results obtained with RELAP-5 and the Aztheca model. The results show that both RELAP-5 and the Aztheca code have the ability to adequately predict the behavior of the reactor. (Author)

  12. The Coding Question.

    Science.gov (United States)

    Gallistel, C R

    2017-07-01

    Recent electrophysiological results imply that the duration of the stimulus onset asynchrony in eyeblink conditioning is encoded by a mechanism intrinsic to the cerebellar Purkinje cell. This raises the general question - how is quantitative information (durations, distances, rates, probabilities, amounts, etc.) transmitted by spike trains and encoded into engrams? The usual assumption is that information is transmitted by firing rates. However, rate codes are energetically inefficient and computationally awkward. A combinatorial code is more plausible. If the engram consists of altered synaptic conductances (the usual assumption), then we must ask how numbers may be written to synapses. It is much easier to formulate a coding hypothesis if the engram is realized by a cell-intrinsic molecular mechanism. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Revised SRAC code system

    International Nuclear Information System (INIS)

    Tsuchihashi, Keichiro; Ishiguro, Yukio; Kaneko, Kunio; Ido, Masaru.

    1986-09-01

    Since the publication of JAERI-1285 in 1983 for the preliminary version of the SRAC code system, a number of additions and modifications to the functions have been made to establish an overall neutronics code system. Major points are (1) addition of JENDL-2 version of data library, (2) a direct treatment of doubly heterogeneous effect on resonance absorption, (3) a generalized Dancoff factor, (4) a cell calculation based on the fixed boundary source problem, (5) the corresponding edit required for experimental analysis and reactor design, (6) a perturbation theory calculation for reactivity change, (7) an auxiliary code for core burnup and fuel management, etc. This report is a revision of the users manual which consists of the general description, input data requirements and their explanation, detailed information on usage, mathematics, contents of libraries and sample I/O. (author)

  14. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  15. The correspondence between projective codes and 2-weight codes

    NARCIS (Netherlands)

    Brouwer, A.E.; Eupen, van M.J.M.; Tilborg, van H.C.A.; Willems, F.M.J.

    1994-01-01

    The hyperplanes intersecting a 2-weight code in the same number of points obviously form the point set of a projective code. On the other hand, if we have a projective code C, then we can make a 2-weight code by taking the multiset of points E PC with multiplicity "Y(w), where W is the weight of

  16. Visualizing code and coverage changes for code review

    NARCIS (Netherlands)

    Oosterwaal, Sebastiaan; van Deursen, A.; De Souza Coelho, R.; Sawant, A.A.; Bacchelli, A.

    2016-01-01

    One of the tasks of reviewers is to verify that code modifications are well tested. However, current tools offer little support in understanding precisely how changes to the code relate to changes to the tests. In particular, it is hard to see whether (modified) test code covers the changed code.

  17. Turbo-Gallager Codes: The Emergence of an Intelligent Coding ...

    African Journals Online (AJOL)

    Today, both turbo codes and low-density parity-check codes are largely superior to other code families and are being used in an increasing number of modern communication systems including 3G standards, satellite and deep space communications. However, the two codes have certain distinctive characteristics that ...

  18. Code of Medical Ethics

    Directory of Open Access Journals (Sweden)

    . SZD-SZZ

    2017-03-01

    Full Text Available Te Code was approved on December 12, 1992, at the 3rd regular meeting of the General Assembly of the Medical Chamber of Slovenia and revised on April 24, 1997, at the 27th regular meeting of the General Assembly of the Medical Chamber of Slovenia. The Code was updated and harmonized with the Medical Association of Slovenia and approved on October 6, 2016, at the regular meeting of the General Assembly of the Medical Chamber of Slovenia.

  19. Supervised Convolutional Sparse Coding

    KAUST Repository

    Affara, Lama Ahmed

    2018-04-08

    Convolutional Sparse Coding (CSC) is a well-established image representation model especially suited for image restoration tasks. In this work, we extend the applicability of this model by proposing a supervised approach to convolutional sparse coding, which aims at learning discriminative dictionaries instead of purely reconstructive ones. We incorporate a supervised regularization term into the traditional unsupervised CSC objective to encourage the final dictionary elements to be discriminative. Experimental results show that using supervised convolutional learning results in two key advantages. First, we learn more semantically relevant filters in the dictionary and second, we achieve improved image reconstruction on unseen data.

  20. CONCEPT computer code

    International Nuclear Information System (INIS)

    Delene, J.

    1984-01-01

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated

  1. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  2. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... includes a reformulation of the usual methods to estimate the minimum distances of evaluation codes into the setting of affine variety codes. Finally we describe the connection to the theory of one-pointgeometric Goppa codes. Contents 4.1 Introduction...... . . . . . . . . . . . . . . . . . . . . . . . 171 4.9 Codes form order domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4.10 One-point geometric Goppa codes . . . . . . . . . . . . . . . . . . . . . . . . 176 4.11 Bibliographical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 References...

  3. Dual Coding in Children.

    Science.gov (United States)

    Burton, John K.; Wildman, Terry M.

    The purpose of this study was to test the applicability of the dual coding hypothesis to children's recall performance. The hypothesis predicts that visual interference will have a small effect on the recall of visually presented words or pictures, but that acoustic interference will cause a decline in recall of visually presented words and…

  4. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  5. Radioactive action code

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    A new coding system, 'Hazrad', for buildings and transportation containers for alerting emergency services personnel to the presence of radioactive materials has been developed in the United Kingdom. The hazards of materials in the buildings or transport container, together with the recommended emergency action, are represented by a number of codes which are marked on the building or container and interpreted from a chart carried as a pocket-size guide. Buildings would be marked with the familiar yellow 'radioactive' trefoil, the written information 'Radioactive materials' and a list of isotopes. Under this the 'Hazrad' code would be written - three symbols to denote the relative radioactive risk (low, medium or high), the biological risk (also low, medium or high) and the third showing the type of radiation emitted, alpha, beta or gamma. The response cards indicate appropriate measures to take, eg for a high biological risk, Bio3, the wearing of a gas-tight protection suit is advised. The code and its uses are explained. (U.K.)

  6. Building Codes and Regulations.

    Science.gov (United States)

    Fisher, John L.

    The hazard of fire is of great concern to libraries due to combustible books and new plastics used in construction and interiors. Building codes and standards can offer architects and planners guidelines to follow but these standards should be closely monitored, updated, and researched for fire prevention. (DS)

  7. Physics of codes

    International Nuclear Information System (INIS)

    Cooper, R.K.; Jones, M.E.

    1989-01-01

    The title given this paper is a bit presumptuous, since one can hardly expect to cover the physics incorporated into all the codes already written and currently being written. The authors focus on those codes which have been found to be particularly useful in the analysis and design of linacs. At that the authors will be a bit parochial and discuss primarily those codes used for the design of radio-frequency (rf) linacs, although the discussions of TRANSPORT and MARYLIE have little to do with the time structures of the beams being analyzed. The plan of this paper is first to describe rather simply the concepts of emittance and brightness, then to describe rather briefly each of the codes TRANSPORT, PARMTEQ, TBCI, MARYLIE, and ISIS, indicating what physics is and is not included in each of them. It is expected that the vast majority of what is covered will apply equally well to protons and electrons (and other particles). This material is intended to be tutorial in nature and can in no way be expected to be exhaustive. 31 references, 4 figures

  8. Reliability and code level

    NARCIS (Netherlands)

    Kasperski, M.; Geurts, C.P.W.

    2005-01-01

    The paper describes the work of the IAWE Working Group WBG - Reliability and Code Level, one of the International Codification Working Groups set up at ICWE10 in Copenhagen. The following topics are covered: sources of uncertainties in the design wind load, appropriate design target values for the

  9. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  10. CERN Code of Conduct

    CERN Document Server

    Department, HR

    2010-01-01

    The Code is intended as a guide in helping us, as CERN contributors, to understand how to conduct ourselves, treat others and expect to be treated. It is based around the five core values of the Organization. We should all become familiar with it and try to incorporate it into our daily life at CERN.

  11. Nuclear safety code study

    Energy Technology Data Exchange (ETDEWEB)

    Hu, H.H.; Ford, D.; Le, H.; Park, S.; Cooke, K.L.; Bleakney, T.; Spanier, J.; Wilburn, N.P.; O' Reilly, B.; Carmichael, B.

    1981-01-01

    The objective is to analyze an overpower accident in an LMFBR. A simplified model of the primary coolant loop was developed in order to understand the instabilities encountered with the MELT III and SAS codes. The computer programs were translated for switching to the IBM 4331. Numerical methods were investigated for solving the neutron kinetics equations; the Adams and Gear methods were compared. (DLC)

  12. Revised C++ coding conventions

    CERN Document Server

    Callot, O

    2001-01-01

    This document replaces the note LHCb 98-049 by Pavel Binko. After a few years of practice, some simplification and clarification of the rules was needed. As many more people have now some experience in writing C++ code, their opinion was also taken into account to get a commonly agreed set of conventions

  13. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  14. Error Correcting Codes -34 ...

    Indian Academy of Sciences (India)

    information and coding theory. A large scale relay computer had failed to deliver the expected results due to a hardware fault. Hamming, one of the active proponents of computer usage, was determined to find an efficient means by which computers could detect and correct their own faults. A mathematician by train-.

  15. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives ...

  16. Software Defined Coded Networking

    DEFF Research Database (Denmark)

    Di Paola, Carla; Roetter, Daniel Enrique Lucani; Palazzo, Sergio

    2017-01-01

    the quality of each link and even across neighbouring links and using simulations to show that an additional reduction of packet transmission in the order of 40% is possible. Second, to advocate for the use of network coding (NC) jointly with software defined networking (SDN) providing an implementation...

  17. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  18. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  19. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    having a probability Pi of being equal to a 1. Let us assume ... equal to a 0/1 has no bearing on the probability of the. It is often ... bits (call this set S) whose individual bits add up to zero ... In the context of binary error-correct~ng codes, specifi-.

  20. The Redox Code.

    Science.gov (United States)

    Jones, Dean P; Sies, Helmut

    2015-09-20

    The redox code is a set of principles that defines the positioning of the nicotinamide adenine dinucleotide (NAD, NADP) and thiol/disulfide and other redox systems as well as the thiol redox proteome in space and time in biological systems. The code is richly elaborated in an oxygen-dependent life, where activation/deactivation cycles involving O₂ and H₂O₂ contribute to spatiotemporal organization for differentiation, development, and adaptation to the environment. Disruption of this organizational structure during oxidative stress represents a fundamental mechanism in system failure and disease. Methodology in assessing components of the redox code under physiological conditions has progressed, permitting insight into spatiotemporal organization and allowing for identification of redox partners in redox proteomics and redox metabolomics. Complexity of redox networks and redox regulation is being revealed step by step, yet much still needs to be learned. Detailed knowledge of the molecular patterns generated from the principles of the redox code under defined physiological or pathological conditions in cells and organs will contribute to understanding the redox component in health and disease. Ultimately, there will be a scientific basis to a modern redox medicine.

  1. Z₂-double cyclic codes

    OpenAIRE

    Borges, J.

    2014-01-01

    A binary linear code C is a Z2-double cyclic code if the set of coordinates can be partitioned into two subsets such that any cyclic shift of the coordinates of both subsets leaves invariant the code. These codes can be identified as submodules of the Z2[x]-module Z2[x]/(x^r − 1) × Z2[x]/(x^s − 1). We determine the structure of Z2-double cyclic codes giving the generator polynomials of these codes. The related polynomial representation of Z2-double cyclic codes and its duals, and the relation...

  2. Coding for urologic office procedures.

    Science.gov (United States)

    Dowling, Robert A; Painter, Mark

    2013-11-01

    This article summarizes current best practices for documenting, coding, and billing common office-based urologic procedures. Topics covered include general principles, basic and advanced urologic coding, creation of medical records that support compliant coding practices, bundled codes and unbundling, global periods, modifiers for procedure codes, when to bill for evaluation and management services during the same visit, coding for supplies, and laboratory and radiology procedures pertinent to urology practice. Detailed information is included for the most common urology office procedures, and suggested resources and references are provided. This information is of value to physicians, office managers, and their coding staff. Copyright © 2013 Elsevier Inc. All rights reserved.

  3. Essential idempotents and simplex codes

    Directory of Open Access Journals (Sweden)

    Gladys Chalom

    2017-01-01

    Full Text Available We define essential idempotents in group algebras and use them to prove that every mininmal abelian non-cyclic code is a repetition code. Also we use them to prove that every minimal abelian code is equivalent to a minimal cyclic code of the same length. Finally, we show that a binary cyclic code is simplex if and only if is of length of the form $n=2^k-1$ and is generated by an essential idempotent.

  4. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  5. Entanglement-assisted quantum MDS codes constructed from negacyclic codes

    Science.gov (United States)

    Chen, Jianzhang; Huang, Yuanyuan; Feng, Chunhui; Chen, Riqing

    2017-12-01

    Recently, entanglement-assisted quantum codes have been constructed from cyclic codes by some scholars. However, how to determine the number of shared pairs required to construct entanglement-assisted quantum codes is not an easy work. In this paper, we propose a decomposition of the defining set of negacyclic codes. Based on this method, four families of entanglement-assisted quantum codes constructed in this paper satisfy the entanglement-assisted quantum Singleton bound, where the minimum distance satisfies q+1 ≤ d≤ n+2/2. Furthermore, we construct two families of entanglement-assisted quantum codes with maximal entanglement.

  6. Efficient convolutional sparse coding

    Science.gov (United States)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  7. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off......-the-shelf hardware is less reliable than the dedicated network elements used in conventional cellular deployments. The typical solution for this problem is to duplicate network functions across geographically distributed hardware in order to ensure diversity. In contrast, this letter proposes to leverage channel...... coding in order to enhance the robustness on NFV to hardware failure. The proposed approach targets the network function of uplink channel decoding, and builds on the algebraic structure of the encoded data frames in order to perform in-network coding on the signals to be processed at different servers...

  8. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  9. Computer code FIT

    International Nuclear Information System (INIS)

    Rohmann, D.; Koehler, T.

    1987-02-01

    This is a description of the computer code FIT, written in FORTRAN-77 for a PDP 11/34. FIT is an interactive program to decude position, width and intensity of lines of X-ray spectra (max. length of 4K channels). The lines (max. 30 lines per fit) may have Gauss- or Voigt-profile, as well as exponential tails. Spectrum and fit can be displayed on a Tektronix terminal. (orig.) [de

  10. Discrete Sparse Coding.

    Science.gov (United States)

    Exarchakis, Georgios; Lücke, Jörg

    2017-11-01

    Sparse coding algorithms with continuous latent variables have been the subject of a large number of studies. However, discrete latent spaces for sparse coding have been largely ignored. In this work, we study sparse coding with latents described by discrete instead of continuous prior distributions. We consider the general case in which the latents (while being sparse) can take on any value of a finite set of possible values and in which we learn the prior probability of any value from data. This approach can be applied to any data generated by discrete causes, and it can be applied as an approximation of continuous causes. As the prior probabilities are learned, the approach then allows for estimating the prior shape without assuming specific functional forms. To efficiently train the parameters of our probabilistic generative model, we apply a truncated expectation-maximization approach (expectation truncation) that we modify to work with a general discrete prior. We evaluate the performance of the algorithm by applying it to a variety of tasks: (1) we use artificial data to verify that the algorithm can recover the generating parameters from a random initialization, (2) use image patches of natural images and discuss the role of the prior for the extraction of image components, (3) use extracellular recordings of neurons to present a novel method of analysis for spiking neurons that includes an intuitive discretization strategy, and (4) apply the algorithm on the task of encoding audio waveforms of human speech. The diverse set of numerical experiments presented in this letter suggests that discrete sparse coding algorithms can scale efficiently to work with realistic data sets and provide novel statistical quantities to describe the structure of the data.

  11. Code of Practice

    International Nuclear Information System (INIS)

    Doyle, Colin; Hone, Christopher; Nowlan, N.V.

    1984-05-01

    This Code of Practice introduces accepted safety procedures associated with the use of alpha, beta, gamma and X-radiation in secondary schools (pupils aged 12 to 18) in Ireland, and summarises good practice and procedures as they apply to radiation protection. Typical dose rates at various distances from sealed sources are quoted, and simplified equations are used to demonstrate dose and shielding calculations. The regulatory aspects of radiation protection are outlined, and references to statutory documents are given

  12. Tokamak simulation code manual

    International Nuclear Information System (INIS)

    Chung, Moon Kyoo; Oh, Byung Hoon; Hong, Bong Keun; Lee, Kwang Won

    1995-01-01

    The method to use TSC (Tokamak Simulation Code) developed by Princeton plasma physics laboratory is illustrated. In KT-2 tokamak, time dependent simulation of axisymmetric toroidal plasma and vertical stability have to be taken into account in design phase using TSC. In this report physical modelling of TSC are described and examples of application in JAERI and SERI are illustrated, which will be useful when TSC is installed KAERI computer system. (Author) 15 refs., 6 figs., 3 tabs

  13. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  14. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, transparency, neutrality, impartiality, effectiveness, accountability, and legality. The normative context of public administration, as expressed in codes, seems to ignore the New Public Management and Reinventing Government reform movements....

  15. Orthopedics coding and funding.

    Science.gov (United States)

    Baron, S; Duclos, C; Thoreux, P

    2014-02-01

    The French tarification à l'activité (T2A) prospective payment system is a financial system in which a health-care institution's resources are based on performed activity. Activity is described via the PMSI medical information system (programme de médicalisation du système d'information). The PMSI classifies hospital cases by clinical and economic categories known as diagnosis-related groups (DRG), each with an associated price tag. Coding a hospital case involves giving as realistic a description as possible so as to categorize it in the right DRG and thus ensure appropriate payment. For this, it is essential to understand what determines the pricing of inpatient stay: namely, the code for the surgical procedure, the patient's principal diagnosis (reason for admission), codes for comorbidities (everything that adds to management burden), and the management of the length of inpatient stay. The PMSI is used to analyze the institution's activity and dynamism: change on previous year, relation to target, and comparison with competing institutions based on indicators such as the mean length of stay performance indicator (MLS PI). The T2A system improves overall care efficiency. Quality of care, however, is not presently taken account of in the payment made to the institution, as there are no indicators for this; work needs to be done on this topic. Copyright © 2014. Published by Elsevier Masson SAS.

  16. Code Modernization of VPIC

    Science.gov (United States)

    Bird, Robert; Nystrom, David; Albright, Brian

    2017-10-01

    The ability of scientific simulations to effectively deliver performant computation is increasingly being challenged by successive generations of high-performance computing architectures. Code development to support efficient computation on these modern architectures is both expensive, and highly complex; if it is approached without due care, it may also not be directly transferable between subsequent hardware generations. Previous works have discussed techniques to support the process of adapting a legacy code for modern hardware generations, but despite the breakthroughs in the areas of mini-app development, portable-performance, and cache oblivious algorithms the problem still remains largely unsolved. In this work we demonstrate how a focus on platform agnostic modern code-development can be applied to Particle-in-Cell (PIC) simulations to facilitate effective scientific delivery. This work builds directly on our previous work optimizing VPIC, in which we replaced intrinsic based vectorisation with compile generated auto-vectorization to improve the performance and portability of VPIC. In this work we present the use of a specialized SIMD queue for processing some particle operations, and also preview a GPU capable OpenMP variant of VPIC. Finally we include a lessons learnt. Work performed under the auspices of the U.S. Dept. of Energy by the Los Alamos National Security, LLC Los Alamos National Laboratory under contract DE-AC52-06NA25396 and supported by the LANL LDRD program.

  17. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  18. MELCOR computer code manuals

    International Nuclear Information System (INIS)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L.; Hodge, S.A.; Hyman, C.R.; Sanders, R.L.

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR's phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package

  19. Quality Improvement of MARS Code and Establishment of Code Coupling

    International Nuclear Information System (INIS)

    Chung, Bub Dong; Jeong, Jae Jun; Kim, Kyung Doo

    2010-04-01

    The improvement of MARS code quality and coupling with regulatory auditing code have been accomplished for the establishment of self-reliable technology based regulatory auditing system. The unified auditing system code was realized also by implementing the CANDU specific models and correlations. As a part of the quality assurance activities, the various QA reports were published through the code assessments. The code manuals were updated and published a new manual which describe the new models and correlations. The code coupling methods were verified though the exercise of plant application. The education-training seminar and technology transfer were performed for the code users. The developed MARS-KS is utilized as reliable auditing tool for the resolving the safety issue and other regulatory calculations. The code can be utilized as a base technology for GEN IV reactor applications

  20. Design of convolutional tornado code

    Science.gov (United States)

    Zhou, Hui; Yang, Yao; Gao, Hongmin; Tan, Lu

    2017-09-01

    As a linear block code, the traditional tornado (tTN) code is inefficient in burst-erasure environment and its multi-level structure may lead to high encoding/decoding complexity. This paper presents a convolutional tornado (cTN) code which is able to improve the burst-erasure protection capability by applying the convolution property to the tTN code, and reduce computational complexity by abrogating the multi-level structure. The simulation results show that cTN code can provide a better packet loss protection performance with lower computation complexity than tTN code.

  1. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  2. Containment Code Validation Matrix

    International Nuclear Information System (INIS)

    Chin, Yu-Shan; Mathew, P.M.; Glowa, Glenn; Dickson, Ray; Liang, Zhe; Leitch, Brian; Barber, Duncan; Vasic, Aleks; Bentaib, Ahmed; Journeau, Christophe; Malet, Jeanne; Studer, Etienne; Meynet, Nicolas; Piluso, Pascal; Gelain, Thomas; Michielsen, Nathalie; Peillon, Samuel; Porcheron, Emmanuel; Albiol, Thierry; Clement, Bernard; Sonnenkalb, Martin; Klein-Hessling, Walter; Arndt, Siegfried; Weber, Gunter; Yanez, Jorge; Kotchourko, Alexei; Kuznetsov, Mike; Sangiorgi, Marco; Fontanet, Joan; Herranz, Luis; Garcia De La Rua, Carmen; Santiago, Aleza Enciso; Andreani, Michele; Paladino, Domenico; Dreier, Joerg; Lee, Richard; Amri, Abdallah

    2014-01-01

    The Committee on the Safety of Nuclear Installations (CSNI) formed the CCVM (Containment Code Validation Matrix) task group in 2002. The objective of this group was to define a basic set of available experiments for code validation, covering the range of containment (ex-vessel) phenomena expected in the course of light and heavy water reactor design basis accidents and beyond design basis accidents/severe accidents. It was to consider phenomena relevant to pressurised heavy water reactor (PHWR), pressurised water reactor (PWR) and boiling water reactor (BWR) designs of Western origin as well as of Eastern European VVER types. This work would complement the two existing CSNI validation matrices for thermal hydraulic code validation (NEA/CSNI/R(1993)14) and In-vessel core degradation (NEA/CSNI/R(2001)21). The report initially provides a brief overview of the main features of a PWR, BWR, CANDU and VVER reactors. It also provides an overview of the ex-vessel corium retention (core catcher). It then provides a general overview of the accident progression for light water and heavy water reactors. The main focus is to capture most of the phenomena and safety systems employed in these reactor types and to highlight the differences. This CCVM contains a description of 127 phenomena, broken down into 6 categories: - Containment Thermal-hydraulics Phenomena; - Hydrogen Behaviour (Combustion, Mitigation and Generation) Phenomena; - Aerosol and Fission Product Behaviour Phenomena; - Iodine Chemistry Phenomena; - Core Melt Distribution and Behaviour in Containment Phenomena; - Systems Phenomena. A synopsis is provided for each phenomenon, including a description, references for further information, significance for DBA and SA/BDBA and a list of experiments that may be used for code validation. The report identified 213 experiments, broken down into the same six categories (as done for the phenomena). An experiment synopsis is provided for each test. Along with a test description

  3. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  4. TASS code topical report. V.1 TASS code technical manual

    International Nuclear Information System (INIS)

    Sim, Suk K.; Chang, W. P.; Kim, K. D.; Kim, H. C.; Yoon, H. Y.

    1997-02-01

    TASS 1.0 code has been developed at KAERI for the initial and reload non-LOCA safety analysis for the operating PWRs as well as the PWRs under construction in Korea. TASS code will replace various vendor's non-LOCA safety analysis codes currently used for the Westinghouse and ABB-CE type PWRs in Korea. This can be achieved through TASS code input modifications specific to each reactor type. The TASS code can be run interactively through the keyboard operation. A simimodular configuration used in developing the TASS code enables the user easily implement new models. TASS code has been programmed using FORTRAN77 which makes it easy to install and port for different computer environments. The TASS code can be utilized for the steady state simulation as well as the non-LOCA transient simulations such as power excursions, reactor coolant pump trips, load rejections, loss of feedwater, steam line breaks, steam generator tube ruptures, rod withdrawal and drop, and anticipated transients without scram (ATWS). The malfunctions of the control systems, components, operator actions and the transients caused by the malfunctions can be easily simulated using the TASS code. This technical report describes the TASS 1.0 code models including reactor thermal hydraulic, reactor core and control models. This TASS code models including reactor thermal hydraulic, reactor core and control models. This TASS code technical manual has been prepared as a part of the TASS code manual which includes TASS code user's manual and TASS code validation report, and will be submitted to the regulatory body as a TASS code topical report for a licensing non-LOCA safety analysis for the Westinghouse and ABB-CE type PWRs operating and under construction in Korea. (author). 42 refs., 29 tabs., 32 figs

  5. Construction of new quantum MDS codes derived from constacyclic codes

    Science.gov (United States)

    Taneja, Divya; Gupta, Manish; Narula, Rajesh; Bhullar, Jaskaran

    Obtaining quantum maximum distance separable (MDS) codes from dual containing classical constacyclic codes using Hermitian construction have paved a path to undertake the challenges related to such constructions. Using the same technique, some new parameters of quantum MDS codes have been constructed here. One set of parameters obtained in this paper has achieved much larger distance than work done earlier. The remaining constructed parameters of quantum MDS codes have large minimum distance and were not explored yet.

  6. Combinatorial neural codes from a mathematical coding theory perspective.

    Science.gov (United States)

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli.

  7. Convolutional coding techniques for data protection

    Science.gov (United States)

    Massey, J. L.

    1975-01-01

    Results of research on the use of convolutional codes in data communications are presented. Convolutional coding fundamentals are discussed along with modulation and coding interaction. Concatenated coding systems and data compression with convolutional codes are described.

  8. High Energy Transport Code HETC

    International Nuclear Information System (INIS)

    Gabriel, T.A.

    1985-09-01

    The physics contained in the High Energy Transport Code (HETC), in particular the collision models, are discussed. An application using HETC as part of the CALOR code system is also given. 19 refs., 5 figs., 3 tabs

  9. Code stroke in Asturias.

    Science.gov (United States)

    Benavente, L; Villanueva, M J; Vega, P; Casado, I; Vidal, J A; Castaño, B; Amorín, M; de la Vega, V; Santos, H; Trigo, A; Gómez, M B; Larrosa, D; Temprano, T; González, M; Murias, E; Calleja, S

    2016-04-01

    Intravenous thrombolysis with alteplase is an effective treatment for ischaemic stroke when applied during the first 4.5 hours, but less than 15% of patients have access to this technique. Mechanical thrombectomy is more frequently able to recanalise proximal occlusions in large vessels, but the infrastructure it requires makes it even less available. We describe the implementation of code stroke in Asturias, as well as the process of adapting various existing resources for urgent stroke care in the region. By considering these resources, and the demographic and geographic circumstances of our region, we examine ways of reorganising the code stroke protocol that would optimise treatment times and provide the most appropriate treatment for each patient. We distributed the 8 health districts in Asturias so as to permit referral of candidates for reperfusion therapies to either of the 2 hospitals with 24-hour stroke units and on-call neurologists and providing IV fibrinolysis. Hospitals were assigned according to proximity and stroke severity; the most severe cases were immediately referred to the hospital with on-call interventional neurology care. Patient triage was provided by pre-hospital emergency services according to the NIHSS score. Modifications to code stroke in Asturias have allowed us to apply reperfusion therapies with good results, while emphasising equitable care and managing the severity-time ratio to offer the best and safest treatment for each patient as soon as possible. Copyright © 2015 Sociedad Española de Neurología. Published by Elsevier España, S.L.U. All rights reserved.

  10. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  11. WWER reactor physics code applications

    International Nuclear Information System (INIS)

    Gado, J.; Kereszturi, A.; Gacs, A.; Telbisz, M.

    1994-01-01

    The coupled steady-state reactor physics and thermohydraulic code system KARATE has been developed and applied for WWER-1000 and WWER-440 operational calculations. The 3 D coupled kinetic code KIKO3D has been developed and validated for WWER-440 accident analysis applications. The coupled kinetic code SMARTA developed by VTT Helsinki has been applied for WWER-440 accident analysis. The paper gives a summary of the experience in code development and application. (authors). 10 refs., 2 tabs., 5 figs

  12. The path of code linting

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  13. The CORSYS neutronics code system

    International Nuclear Information System (INIS)

    Caner, M.; Krumbein, A.D.; Saphier, D.; Shapira, M.

    1994-01-01

    The purpose of this work is to assemble a code package for LWR core physics including coupled neutronics, burnup and thermal hydraulics. The CORSYS system is built around the cell code WIMS (for group microscopic cross section calculations) and 3-dimension diffusion code CITATION (for burnup and fuel management). We are implementing such a system on an IBM RS-6000 workstation. The code was rested with a simplified model of the Zion Unit 2 PWR. (authors). 6 refs., 8 figs., 1 tabs

  14. Bar codes for nuclear safeguards

    International Nuclear Information System (INIS)

    Keswani, A.N.; Bieber, A.M. Jr.

    1983-01-01

    Bar codes similar to those used in supermarkets can be used to reduce the effort and cost of collecting nuclear materials accountability data. A wide range of equipment is now commercially available for printing and reading bar-coded information. Several examples of each of the major types of commercially available equipment are given, and considerations are discussed both for planning systems using bar codes and for choosing suitable bar code equipment

  15. Bar codes for nuclear safeguards

    International Nuclear Information System (INIS)

    Keswani, A.N.; Bieber, A.M.

    1983-01-01

    Bar codes similar to those used in supermarkets can be used to reduce the effort and cost of collecting nuclear materials accountability data. A wide range of equipment is now commercially available for printing and reading bar-coded information. Several examples of each of the major types of commercially-available equipment are given, and considerations are discussed both for planning systems using bar codes and for choosing suitable bar code equipment

  16. Quick response codes in Orthodontics

    Directory of Open Access Journals (Sweden)

    Moidin Shakil

    2015-01-01

    Full Text Available Quick response (QR code codes are two-dimensional barcodes, which encodes for a large amount of information. QR codes in Orthodontics are an innovative approach in which patient details, radiographic interpretation, and treatment plan can be encoded. Implementing QR code in Orthodontics will save time, reduces paperwork, and minimizes manual efforts in storage and retrieval of patient information during subsequent stages of treatment.

  17. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  18. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  19. UNSPEC: revisited (semaphore code)

    International Nuclear Information System (INIS)

    Neifert, R.D.

    1981-01-01

    The UNSPEC code is used to solve the problem of unfolding an observed x-ray spectrum given the response matrix of the measuring system and the measured signal values. UNSPEC uses an iterative technique to solve the unfold problem. Due to experimental errors in the measured signal values and/or computer round-off errors, discontinuities and oscillatory behavior may occur in the iterated spectrum. These can be suppressed by smoothing the results after each iteration. Input/output options and control cards are explained; sample input and output are provided

  20. The FLIC conversion codes

    International Nuclear Information System (INIS)

    Basher, J.C.

    1965-05-01

    This report describes the FORTRAN programmes, FLIC 1 and FLIC 2. These programmes convert programmes coded in one dialect of FORTRAN to another dialect of the same language. FLIC 1 is a general pattern recognition and replacement programme whereas FLIC 2 contains extensions directed towards the conversion of FORTRAN II and S2 programmes to EGTRAN 1 - the dialect now in use on the Winfrith KDF9. FII or S2 statements are replaced where possible by their E1 equivalents; other statements which may need changing are flagged. (author)

  1. SPRAY code user's report

    International Nuclear Information System (INIS)

    Shire, P.R.

    1977-03-01

    The SPRAY computer code has been developed to model the effects of postulated sodium spray release from LMFBR piping within containment chambers. The calculation method utilizes gas convection, heat transfer and droplet combustion theory to calculate the pressure and temperature effects within the enclosure. The applicable range is 0-21 mol percent oxygen and .02-.30 inch droplets with or without humidity. Droplet motion and large sodium surface area combine to produce rapid heat release and pressure rise within the enclosed volume

  2. The FLIC conversion codes

    Energy Technology Data Exchange (ETDEWEB)

    Basher, J C [General Reactor Physics Division, Atomic Energy Establishment, Winfrith, Dorchester, Dorset (United Kingdom)

    1965-05-15

    This report describes the FORTRAN programmes, FLIC 1 and FLIC 2. These programmes convert programmes coded in one dialect of FORTRAN to another dialect of the same language. FLIC 1 is a general pattern recognition and replacement programme whereas FLIC 2 contains extensions directed towards the conversion of FORTRAN II and S2 programmes to EGTRAN 1 - the dialect now in use on the Winfrith KDF9. FII or S2 statements are replaced where possible by their E1 equivalents; other statements which may need changing are flagged. (author)

  3. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  4. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...... machinery of algebraic geometry....

  5. Direct-semidirect (DSD) codes

    International Nuclear Information System (INIS)

    Cvelbar, F.

    1999-01-01

    Recent codes for direct-semidirect (DSD) model calculations in the form of answers to a detailed questionnaire are reviewed. These codes include those embodying the classical DSD approach covering only the transitions to the bound states (RAF, HIKARI, and those of the Bologna group), as well as the code CUPIDO++ that also treats transitions to unbound states. (author)

  6. Dual Coding, Reasoning and Fallacies.

    Science.gov (United States)

    Hample, Dale

    1982-01-01

    Develops the theory that a fallacy is not a comparison of a rhetorical text to a set of definitions but a comparison of one person's cognition with another's. Reviews Paivio's dual coding theory, relates nonverbal coding to reasoning processes, and generates a limited fallacy theory based on dual coding theory. (PD)

  7. Strongly-MDS convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Rosenthal, J; Smarandache, R

    Maximum-distance separable (MDS) convolutional codes have the property that their free distance is maximal among all codes of the same rate and the same degree. In this paper, a class of MDS convolutional codes is introduced whose column distances reach the generalized Singleton bound at the

  8. Lattice polytopes in coding theory

    Directory of Open Access Journals (Sweden)

    Ivan Soprunov

    2015-05-01

    Full Text Available In this paper we discuss combinatorial questions about lattice polytopes motivated by recent results on minimum distance estimation for toric codes. We also include a new inductive bound for the minimum distance of generalized toric codes. As an application, we give new formulas for the minimum distance of generalized toric codes for special lattice point configurations.

  9. Computer codes for safety analysis

    International Nuclear Information System (INIS)

    Holland, D.F.

    1986-11-01

    Computer codes for fusion safety analysis have been under development in the United States for about a decade. This paper will discuss five codes that are currently under development by the Fusion Safety Program. The purpose and capability of each code will be presented, a sample given, followed by a discussion of the present status and future development plans

  10. Geochemical computer codes. A review

    International Nuclear Information System (INIS)

    Andersson, K.

    1987-01-01

    In this report a review of available codes is performed and some code intercomparisons are also discussed. The number of codes treating natural waters (groundwater, lake water, sea water) is large. Most geochemical computer codes treat equilibrium conditions, although some codes with kinetic capability are available. A geochemical equilibrium model consists of a computer code, solving a set of equations by some numerical method and a data base, consisting of thermodynamic data required for the calculations. There are some codes which treat coupled geochemical and transport modeling. Some of these codes solve the equilibrium and transport equations simultaneously while other solve the equations separately from each other. The coupled codes require a large computer capacity and have thus as yet limited use. Three code intercomparisons have been found in literature. It may be concluded that there are many codes available for geochemical calculations but most of them require a user that us quite familiar with the code. The user also has to know the geochemical system in order to judge the reliability of the results. A high quality data base is necessary to obtain a reliable result. The best results may be expected for the major species of natural waters. For more complicated problems, including trace elements, precipitation/dissolution, adsorption, etc., the results seem to be less reliable. (With 44 refs.) (author)

  11. Separate Turbo Code and Single Turbo Code Adaptive OFDM Transmissions

    Directory of Open Access Journals (Sweden)

    Lei Ye

    2009-01-01

    Full Text Available This paper discusses the application of adaptive modulation and adaptive rate turbo coding to orthogonal frequency-division multiplexing (OFDM, to increase throughput on the time and frequency selective channel. The adaptive turbo code scheme is based on a subband adaptive method, and compares two adaptive systems: a conventional approach where a separate turbo code is used for each subband, and a single turbo code adaptive system which uses a single turbo code over all subbands. Five modulation schemes (BPSK, QPSK, 8AMPM, 16QAM, and 64QAM are employed and turbo code rates considered are 1/2 and 1/3. The performances of both systems with high (10−2 and low (10−4 BER targets are compared. Simulation results for throughput and BER show that the single turbo code adaptive system provides a significant improvement.

  12. New quantum codes constructed from quaternary BCH codes

    Science.gov (United States)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  13. Quantum Codes From Cyclic Codes Over The Ring R 2

    International Nuclear Information System (INIS)

    Altinel, Alev; Güzeltepe, Murat

    2016-01-01

    Let R 2 denotes the ring F 2 + μF 2 + υ 2 + μυ F 2 + wF 2 + μwF 2 + υwF 2 + μυwF 2 . In this study, we construct quantum codes from cyclic codes over the ring R 2 , for arbitrary length n, with the restrictions μ 2 = 0, υ 2 = 0, w 2 = 0, μυ = υμ, μw = wμ, υw = wυ and μ (υw) = (μυ) w. Also, we give a necessary and sufficient condition for cyclic codes over R 2 that contains its dual. As a final point, we obtain the parameters of quantum error-correcting codes from cyclic codes over R 2 and we give an example of quantum error-correcting codes form cyclic codes over R 2 . (paper)

  14. Separate Turbo Code and Single Turbo Code Adaptive OFDM Transmissions

    Directory of Open Access Journals (Sweden)

    Burr Alister

    2009-01-01

    Full Text Available Abstract This paper discusses the application of adaptive modulation and adaptive rate turbo coding to orthogonal frequency-division multiplexing (OFDM, to increase throughput on the time and frequency selective channel. The adaptive turbo code scheme is based on a subband adaptive method, and compares two adaptive systems: a conventional approach where a separate turbo code is used for each subband, and a single turbo code adaptive system which uses a single turbo code over all subbands. Five modulation schemes (BPSK, QPSK, 8AMPM, 16QAM, and 64QAM are employed and turbo code rates considered are and . The performances of both systems with high ( and low ( BER targets are compared. Simulation results for throughput and BER show that the single turbo code adaptive system provides a significant improvement.

  15. Converter of a continuous code into the Grey code

    International Nuclear Information System (INIS)

    Gonchar, A.I.; TrUbnikov, V.R.

    1979-01-01

    Described is a converter of a continuous code into the Grey code used in a 12-charged precision amplitude-to-digital converter to decrease the digital component of spectrometer differential nonlinearity to +0.7% in the 98% range of the measured band. To construct the converter of a continuous code corresponding to the input signal amplitude into the Grey code used is the regularity in recycling of units and zeroes in each discharge of the Grey code in the case of a continuous change of the number of pulses of a continuous code. The converter is constructed on the elements of 155 series, the frequency of continuous code pulse passing at the converter input is 25 MHz

  16. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  17. Two-terminal video coding.

    Science.gov (United States)

    Yang, Yang; Stanković, Vladimir; Xiong, Zixiang; Zhao, Wei

    2009-03-01

    Following recent works on the rate region of the quadratic Gaussian two-terminal source coding problem and limit-approaching code designs, this paper examines multiterminal source coding of two correlated, i.e., stereo, video sequences to save the sum rate over independent coding of both sequences. Two multiterminal video coding schemes are proposed. In the first scheme, the left sequence of the stereo pair is coded by H.264/AVC and used at the joint decoder to facilitate Wyner-Ziv coding of the right video sequence. The first I-frame of the right sequence is successively coded by H.264/AVC Intracoding and Wyner-Ziv coding. An efficient stereo matching algorithm based on loopy belief propagation is then adopted at the decoder to produce pixel-level disparity maps between the corresponding frames of the two decoded video sequences on the fly. Based on the disparity maps, side information for both motion vectors and motion-compensated residual frames of the right sequence are generated at the decoder before Wyner-Ziv encoding. In the second scheme, source splitting is employed on top of classic and Wyner-Ziv coding for compression of both I-frames to allow flexible rate allocation between the two sequences. Experiments with both schemes on stereo video sequences using H.264/AVC, LDPC codes for Slepian-Wolf coding of the motion vectors, and scalar quantization in conjunction with LDPC codes for Wyner-Ziv coding of the residual coefficients give a slightly lower sum rate than separate H.264/AVC coding of both sequences at the same video quality.

  18. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  19. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  20. 75 FR 19944 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2010-04-16

    ... documents from ICC's Chicago District Office: International Code Council, 4051 W Flossmoor Road, Country... Energy Conservation Code. International Existing Building Code. International Fire Code. International...

  1. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm.......For any nonzero elementcof a general finite fieldGF(q), it is shown that the polynomials(x - c)^i, i = 0,1,2,cdots, have the "weight-retaining" property that any linear combination of these polynomials with coefficients inGF(q)has Hamming weight at least as great as that of the minimum degree...

  2. Introduction of SCIENCE code package

    International Nuclear Information System (INIS)

    Lu Haoliang; Li Jinggang; Zhu Ya'nan; Bai Ning

    2012-01-01

    The SCIENCE code package is a set of neutronics tools based on 2D assembly calculations and 3D core calculations. It is made up of APOLLO2F, SMART and SQUALE and used to perform the nuclear design and loading pattern analysis for the reactors on operation or under construction of China Guangdong Nuclear Power Group. The purpose of paper is to briefly present the physical and numerical models used in each computation codes of the SCIENCE code pack age, including the description of the general structure of the code package, the coupling relationship of APOLLO2-F transport lattice code and SMART core nodal code, and the SQUALE code used for processing the core maps. (authors)

  3. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory text to algebraic coding theory. In the first chapter, you'll gain inside knowledge of coding fundamentals, which is essential for a deeper understanding of state-of-the-art coding systems. This book is a quick reference for those who are unfamiliar with this topic, as well as for use with specific applications such as cryptography and communication. Linear error-correcting block codes through elementary principles span eleven chapters of the text. Cyclic codes, some finite field algebra, Goppa codes, algebraic decoding algorithms, and applications in public-key cryptography and secret-key cryptography are discussed, including problems and solutions at the end of each chapter. Three appendices cover the Gilbert bound and some related derivations, a derivation of the Mac- Williams' identities based on the probability of undetected error, and two important tools for algebraic decoding-namely, the finite field Fourier transform and the Euclidean algorithm f...

  4. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    of interfering nodes and usage of spatial reservation mechanisms. Specifically, we introduce a reserved area in order to protect the nodes involved in two-way relaying from the interference caused by neighboring nodes. We analytically derive the end-to-end rate achieved by PLNC considering the impact......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...

  5. Concatenated quantum codes

    Energy Technology Data Exchange (ETDEWEB)

    Knill, E.; Laflamme, R.

    1996-07-01

    One main problem for the future of practial quantum computing is to stabilize the computation against unwanted interactions with the environment and imperfections in the applied operations. Existing proposals for quantum memories and quantum channels require gates with asymptotically zero error to store or transmit an input quantum state for arbitrarily long times or distances with fixed error. This report gives a method which has the property that to store or transmit a qubit with maximum error {epsilon} requires gates with errors at most {ital c}{epsilon} and storage or channel elements with error at most {epsilon}, independent of how long we wish to store the state or how far we wish to transmit it. The method relies on using concatenated quantum codes and hierarchically implemented recovery operations. The overhead of the method is polynomial in the time of storage or the distance of the transmission. Rigorous and heuristic lower bounds for the constant {ital c} are given.

  6. Code des baux 2018

    CERN Document Server

    Vial-Pedroletti, Béatrice; Kendérian, Fabien; Chavance, Emmanuelle; Coutan-Lapalus, Christelle

    2017-01-01

    Le code des baux 2018 vous offre un contenu extrêmement pratique, fiable et à jour au 1er août 2017. Cette 16e édition intègre notamment : le décret du 27 juillet 2017 relatif à l’évolution de certains loyers dans le cadre d’une nouvelle location ou d’un renouvellement de bail, pris en application de l’article 18 de la loi n° 89-462 du 6 juillet 1989 ; la loi du 27 janvier 2017 relative à l’égalité et à la citoyenneté ; la loi du 9 décembre 2016 relative à la transparence, à la lutte contre la corruption et à la modernisation de la vie économique ; la loi du 18 novembre 2016 de modernisation de la justice du xxie siècle

  7. GOC: General Orbit Code

    International Nuclear Information System (INIS)

    Maddox, L.B.; McNeilly, G.S.

    1979-08-01

    GOC (General Orbit Code) is a versatile program which will perform a variety of calculations relevant to isochronous cyclotron design studies. In addition to the usual calculations of interest (e.g., equilibrium and accelerated orbits, focusing frequencies, field isochronization, etc.), GOC has a number of options to calculate injections with a charge change. GOC provides both printed and plotted output, and will follow groups of particles to allow determination of finite-beam properties. An interactive PDP-10 program called GIP, which prepares input data for GOC, is available. GIP is a very easy and convenient way to prepare complicated input data for GOC. Enclosed with this report are several microfiche containing source listings of GOC and other related routines and the printed output from a multiple-option GOC run

  8. LDGM Codes for Channel Coding and Joint Source-Channel Coding of Correlated Sources

    Directory of Open Access Journals (Sweden)

    Javier Garcia-Frias

    2005-05-01

    Full Text Available We propose a coding scheme based on the use of systematic linear codes with low-density generator matrix (LDGM codes for channel coding and joint source-channel coding of multiterminal correlated binary sources. In both cases, the structures of the LDGM encoder and decoder are shown, and a concatenated scheme aimed at reducing the error floor is proposed. Several decoding possibilities are investigated, compared, and evaluated. For different types of noisy channels and correlation models, the resulting performance is very close to the theoretical limits.

  9. Surface acoustic wave coding for orthogonal frequency coded devices

    Science.gov (United States)

    Malocha, Donald (Inventor); Kozlovski, Nikolai (Inventor)

    2011-01-01

    Methods and systems for coding SAW OFC devices to mitigate code collisions in a wireless multi-tag system. Each device producing plural stepped frequencies as an OFC signal with a chip offset delay to increase code diversity. A method for assigning a different OCF to each device includes using a matrix based on the number of OFCs needed and the number chips per code, populating each matrix cell with OFC chip, and assigning the codes from the matrix to the devices. The asynchronous passive multi-tag system includes plural surface acoustic wave devices each producing a different OFC signal having the same number of chips and including a chip offset time delay, an algorithm for assigning OFCs to each device, and a transceiver to transmit an interrogation signal and receive OFC signals in response with minimal code collisions during transmission.

  10. Entanglement-assisted quantum MDS codes from negacyclic codes

    Science.gov (United States)

    Lu, Liangdong; Li, Ruihu; Guo, Luobin; Ma, Yuena; Liu, Yang

    2018-03-01

    The entanglement-assisted formalism generalizes the standard stabilizer formalism, which can transform arbitrary classical linear codes into entanglement-assisted quantum error-correcting codes (EAQECCs) by using pre-shared entanglement between the sender and the receiver. In this work, we construct six classes of q-ary entanglement-assisted quantum MDS (EAQMDS) codes based on classical negacyclic MDS codes by exploiting two or more pre-shared maximally entangled states. We show that two of these six classes q-ary EAQMDS have minimum distance more larger than q+1. Most of these q-ary EAQMDS codes are new in the sense that their parameters are not covered by the codes available in the literature.

  11. An algebraic approach to graph codes

    DEFF Research Database (Denmark)

    Pinero, Fernando

    This thesis consists of six chapters. The first chapter, contains a short introduction to coding theory in which we explain the coding theory concepts we use. In the second chapter, we present the required theory for evaluation codes and also give an example of some fundamental codes in coding...... theory as evaluation codes. Chapter three consists of the introduction to graph based codes, such as Tanner codes and graph codes. In Chapter four, we compute the dimension of some graph based codes with a result combining graph based codes and subfield subcodes. Moreover, some codes in chapter four...

  12. Diagonal Eigenvalue Unity (DEU) code for spectral amplitude coding-optical code division multiple access

    Science.gov (United States)

    Ahmed, Hassan Yousif; Nisar, K. S.

    2013-08-01

    Code with ideal in-phase cross correlation (CC) and practical code length to support high number of users are required in spectral amplitude coding-optical code division multiple access (SAC-OCDMA) systems. SAC systems are getting more attractive in the field of OCDMA because of its ability to eliminate the influence of multiple access interference (MAI) and also suppress the effect of phase induced intensity noise (PIIN). In this paper, we have proposed new Diagonal Eigenvalue Unity (DEU) code families with ideal in-phase CC based on Jordan block matrix with simple algebraic ways. Four sets of DEU code families based on the code weight W and number of users N for the combination (even, even), (even, odd), (odd, odd) and (odd, even) are constructed. This combination gives DEU code more flexibility in selection of code weight and number of users. These features made this code a compelling candidate for future optical communication systems. Numerical results show that the proposed DEU system outperforms reported codes. In addition, simulation results taken from a commercial optical systems simulator, Virtual Photonic Instrument (VPI™) shown that, using point to multipoint transmission in passive optical network (PON), DEU has better performance and could support long span with high data rate.

  13. Self-complementary circular codes in coding theory.

    Science.gov (United States)

    Fimmel, Elena; Michel, Christian J; Starman, Martin; Strüngmann, Lutz

    2018-04-01

    Self-complementary circular codes are involved in pairing genetic processes. A maximal [Formula: see text] self-complementary circular code X of trinucleotides was identified in genes of bacteria, archaea, eukaryotes, plasmids and viruses (Michel in Life 7(20):1-16 2017, J Theor Biol 380:156-177, 2015; Arquès and Michel in J Theor Biol 182:45-58 1996). In this paper, self-complementary circular codes are investigated using the graph theory approach recently formulated in Fimmel et al. (Philos Trans R Soc A 374:20150058, 2016). A directed graph [Formula: see text] associated with any code X mirrors the properties of the code. In the present paper, we demonstrate a necessary condition for the self-complementarity of an arbitrary code X in terms of the graph theory. The same condition has been proven to be sufficient for codes which are circular and of large size [Formula: see text] trinucleotides, in particular for maximal circular codes ([Formula: see text] trinucleotides). For codes of small-size [Formula: see text] trinucleotides, some very rare counterexamples have been constructed. Furthermore, the length and the structure of the longest paths in the graphs associated with the self-complementary circular codes are investigated. It has been proven that the longest paths in such graphs determine the reading frame for the self-complementary circular codes. By applying this result, the reading frame in any arbitrary sequence of trinucleotides is retrieved after at most 15 nucleotides, i.e., 5 consecutive trinucleotides, from the circular code X identified in genes. Thus, an X motif of a length of at least 15 nucleotides in an arbitrary sequence of trinucleotides (not necessarily all of them belonging to X) uniquely defines the reading (correct) frame, an important criterion for analyzing the X motifs in genes in the future.

  14. Error correcting coding for OTN

    DEFF Research Database (Denmark)

    Justesen, Jørn; Larsen, Knud J.; Pedersen, Lars A.

    2010-01-01

    Forward error correction codes for 100 Gb/s optical transmission are currently receiving much attention from transport network operators and technology providers. We discuss the performance of hard decision decoding using product type codes that cover a single OTN frame or a small number...... of such frames. In particular we argue that a three-error correcting BCH is the best choice for the component code in such systems....

  15. Numerical Tokamak Project code comparison

    International Nuclear Information System (INIS)

    Waltz, R.E.; Cohen, B.I.; Beer, M.A.

    1994-01-01

    The Numerical Tokamak Project undertook a code comparison using a set of TFTR tokamak parameters. Local radial annulus codes of both gyrokinetic and gyrofluid types were compared for both slab and toroidal case limits assuming ion temperature gradient mode turbulence in a pure plasma with adiabatic electrons. The heat diffusivities were found to be in good internal agreement within ± 50% of the group average over five codes

  16. Ethical codes in business practice

    OpenAIRE

    Kobrlová, Marie

    2013-01-01

    The diploma thesis discusses the issues of ethics and codes of ethics in business. The theoretical part defines basic concepts of ethics, presents its historical development and the methods and tools of business ethics. It also focuses on ethical codes and the area of law and ethics. The practical part consists of a quantitative survey, which provides views of selected business entities of business ethics and the use of codes of ethics in practice.

  17. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  18. High Order Modulation Protograph Codes

    Science.gov (United States)

    Nguyen, Thuy V. (Inventor); Nosratinia, Aria (Inventor); Divsalar, Dariush (Inventor)

    2014-01-01

    Digital communication coding methods for designing protograph-based bit-interleaved code modulation that is general and applies to any modulation. The general coding framework can support not only multiple rates but also adaptive modulation. The method is a two stage lifting approach. In the first stage, an original protograph is lifted to a slightly larger intermediate protograph. The intermediate protograph is then lifted via a circulant matrix to the expected codeword length to form a protograph-based low-density parity-check code.

  19. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan; Gao, Xin

    2014-01-01

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  20. Programming Entity Framework Code First

    CERN Document Server

    Lerman, Julia

    2011-01-01

    Take advantage of the Code First data modeling approach in ADO.NET Entity Framework, and learn how to build and configure a model based on existing classes in your business domain. With this concise book, you'll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration. Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you're working with an exis

  1. User manual of UNF code

    International Nuclear Information System (INIS)

    Zhang Jingshang

    2001-01-01

    The UNF code (2001 version) written in FORTRAN-90 is developed for calculating fast neutron reaction data of structure materials with incident energies from about 1 Kev up to 20 Mev. The code consists of the spherical optical model, the unified Hauser-Feshbach and exciton model. The man nal of the UNF code is available for users. The format of the input parameter files and the output files, as well as the functions of flag used in UNF code, are introduced in detail, and the examples of the format of input parameters files are given

  2. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  3. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-12-01

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high-dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaicing and 4D light field view synthesis.

  4. Coded aperture tomography revisited

    International Nuclear Information System (INIS)

    Bizais, Y.; Rowe, R.W.; Zubal, I.G.; Bennett, G.W.; Brill, A.B.

    1983-01-01

    Coded aperture (CA) Tomography never achieved wide spread use in Nuclear Medicine, except for the degenerate case of Seven Pinhole tomagraphy (7PHT). However it enjoys several attractive features (high sensitivity and tomographic ability with a statis detector). On the other hand, resolution is usually poor especially along the depth axis and the reconstructed volume is rather limited. Arguments are presented justifying the position that CA tomography can be useful for imaging time-varying 3D structures, if its major drawbacks (poor longitudinal resolution and difficulty in quantification) are overcome. Poor results obtained with 7PHT can be explained by both a very limited angular range sampled and a crude modelling of the image formation process. Therefore improvements can be expected by the use of a dual-detector system, along with a better understanding of its sampling properties and the use of more powerful reconstruction algorithms. Non overlapping multipinhole plates, because they do not involve a decoding procedure, should be considered first for practical applications. Use of real CA should be considered for cases in which non overlapping multipinhole plates do not lead to satisfactory solutions. We have been and currently are carrying out theoretical and experimental works, in order to define the factors which limit CA imaging and to propose satisfactory solutions for Dynamic Emission Tomography

  5. Mobile code security

    Science.gov (United States)

    Ramalingam, Srikumar

    2001-11-01

    A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.

  6. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-04-11

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaickingand 4D light field view synthesis.

  7. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  8. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup; Swanson, Robin; Heide, Felix; Wetzstein, Gordon; Heidrich, Wolfgang

    2017-01-01

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high-dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaicing and 4D light field view synthesis.

  9. Computer code abstract: NESTLE

    International Nuclear Information System (INIS)

    Turinsky, P.J.; Al-Chalabi, R.M.K.; Engrand, P.; Sarsour, H.N.; Faure, F.X.; Guo, W.

    1995-01-01

    NESTLE is a few-group neutron diffusion equation solver utilizing the nodal expansion method (NEM) for eigenvalue, adjoint, and fixed-source steady-state and transient problems. The NESTLE code solve the eigenvalue (criticality), eigenvalue adjoint, external fixed-source steady-state, and external fixed-source or eigenvalue initiated transient problems. The eigenvalue problem allows criticality searches to be completed, and the external fixed-source steady-state problem can search to achieve a specified power level. Transient problems model delayed neutrons via precursor groups. Several core properties can be input as time dependent. Two- or four-energy groups can be utilized, with all energy groups being thermal groups (i.e., upscatter exits) is desired. Core geometries modeled include Cartesian and hexagonal. Three-, two-, and one-dimensional models can be utilized with various symmetries. The thermal conditions predicted by the thermal-hydraulic model of the core are used to correct cross sections for temperature and density effects. Cross sections for temperature and density effects. Cross sections are parameterized by color, control rod state (i.e., in or out), and burnup, allowing fuel depletion to be modeled. Either a macroscopic or microscopic model may be employed

  10. Joint source-channel coding using variable length codes

    NARCIS (Netherlands)

    Balakirsky, V.B.

    2001-01-01

    We address the problem of joint source-channel coding when variable-length codes are used for information transmission over a discrete memoryless channel. Data transmitted over the channel are interpreted as pairs (m k ,t k ), where m k is a message generated by the source and t k is a time instant

  11. Interrelations of codes in human semiotic systems.

    OpenAIRE

    Somov, Georgij

    2016-01-01

    Codes can be viewed as mechanisms that enable relations of signs and their components, i.e., semiosis is actualized. The combinations of these relations produce new relations as new codes are building over other codes. Structures appear in the mechanisms of codes. Hence, codes can be described as transformations of structures from some material systems into others. Structures belong to different carriers, but exist in codes in their "pure" form. Building of codes over other codes fosters t...

  12. Further Generalisations of Twisted Gabidulin Codes

    DEFF Research Database (Denmark)

    Puchinger, Sven; Rosenkilde, Johan Sebastian Heesemann; Sheekey, John

    2017-01-01

    We present a new family of maximum rank distance (MRD) codes. The new class contains codes that are neither equivalent to a generalised Gabidulin nor to a twisted Gabidulin code, the only two known general constructions of linear MRD codes.......We present a new family of maximum rank distance (MRD) codes. The new class contains codes that are neither equivalent to a generalised Gabidulin nor to a twisted Gabidulin code, the only two known general constructions of linear MRD codes....

  13. MARS Code in Linux Environment

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, Moon Kyu; Bae, Sung Won; Jung, Jae Joon; Chung, Bub Dong [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2005-07-01

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  14. Allele coding in genomic evaluation

    Directory of Open Access Journals (Sweden)

    Christensen Ole F

    2011-06-01

    Full Text Available Abstract Background Genomic data are used in animal breeding to assist genetic evaluation. Several models to estimate genomic breeding values have been studied. In general, two approaches have been used. One approach estimates the marker effects first and then, genomic breeding values are obtained by summing marker effects. In the second approach, genomic breeding values are estimated directly using an equivalent model with a genomic relationship matrix. Allele coding is the method chosen to assign values to the regression coefficients in the statistical model. A common allele coding is zero for the homozygous genotype of the first allele, one for the heterozygote, and two for the homozygous genotype for the other allele. Another common allele coding changes these regression coefficients by subtracting a value from each marker such that the mean of regression coefficients is zero within each marker. We call this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. Results Theoretical derivations showed that parameter estimates and estimated marker effects in marker-based models are the same irrespective of the allele coding, provided that the model has a fixed general mean. For the equivalent models, the same results hold, even though different allele coding methods lead to different genomic relationship matrices. Calculated genomic breeding values are independent of allele coding when the estimate of the general mean is included into the values. Reliabilities of estimated genomic breeding values calculated using elements of the inverse of the coefficient matrix depend on the allele coding because different allele coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being

  15. MARS Code in Linux Environment

    International Nuclear Information System (INIS)

    Hwang, Moon Kyu; Bae, Sung Won; Jung, Jae Joon; Chung, Bub Dong

    2005-01-01

    The two-phase system analysis code MARS has been incorporated into Linux system. The MARS code was originally developed based on the RELAP5/MOD3.2 and COBRA-TF. The 1-D module which evolved from RELAP5 alone could be applied for the whole NSSS system analysis. The 3-D module developed based on the COBRA-TF, however, could be applied for the analysis of the reactor core region where 3-D phenomena would be better treated. The MARS code also has several other code units that could be incorporated for more detailed analysis. The separate code units include containment analysis modules and 3-D kinetics module. These code modules could be optionally invoked to be coupled with the main MARS code. The containment code modules (CONTAIN and CONTEMPT), for example, could be utilized for the analysis of the plant containment phenomena in a coupled manner with the nuclear reactor system. The mass and energy interaction during the hypothetical coolant leakage accident could, thereby, be analyzed in a more realistic manner. In a similar way, 3-D kinetics could be incorporated for simulating the three dimensional reactor kinetic behavior, instead of using the built-in point kinetics model. The MARS code system, developed initially for the MS Windows environment, however, would not be adequate enough for the PC cluster system where multiple CPUs are available. When parallelism is to be eventually incorporated into the MARS code, MS Windows environment is not considered as an optimum platform. Linux environment, on the other hand, is generally being adopted as a preferred platform for the multiple codes executions as well as for the parallel application. In this study, MARS code has been modified for the adaptation of Linux platform. For the initial code modification, the Windows system specific features have been removed from the code. Since the coupling code module CONTAIN is originally in a form of dynamic load library (DLL) in the Windows system, a similar adaptation method

  16. Coding in pigeons: Multiple-coding versus single-code/default strategies.

    Science.gov (United States)

    Pinto, Carlos; Machado, Armando

    2015-05-01

    To investigate the coding strategies that pigeons may use in a temporal discrimination tasks, pigeons were trained on a matching-to-sample procedure with three sample durations (2s, 6s and 18s) and two comparisons (red and green hues). One comparison was correct following 2-s samples and the other was correct following both 6-s and 18-s samples. Tests were then run to contrast the predictions of two hypotheses concerning the pigeons' coding strategies, the multiple-coding and the single-code/default. According to the multiple-coding hypothesis, three response rules are acquired, one for each sample. According to the single-code/default hypothesis, only two response rules are acquired, one for the 2-s sample and a "default" rule for any other duration. In retention interval tests, pigeons preferred the "default" key, a result predicted by the single-code/default hypothesis. In no-sample tests, pigeons preferred the key associated with the 2-s sample, a result predicted by multiple-coding. Finally, in generalization tests, when the sample duration equaled 3.5s, the geometric mean of 2s and 6s, pigeons preferred the key associated with the 6-s and 18-s samples, a result predicted by the single-code/default hypothesis. The pattern of results suggests the need for models that take into account multiple sources of stimulus control. © Society for the Experimental Analysis of Behavior.

  17. Error-correction coding for digital communications

    Science.gov (United States)

    Clark, G. C., Jr.; Cain, J. B.

    This book is written for the design engineer who must build the coding and decoding equipment and for the communication system engineer who must incorporate this equipment into a system. It is also suitable as a senior-level or first-year graduate text for an introductory one-semester course in coding theory. Fundamental concepts of coding are discussed along with group codes, taking into account basic principles, practical constraints, performance computations, coding bounds, generalized parity check codes, polynomial codes, and important classes of group codes. Other topics explored are related to simple nonalgebraic decoding techniques for group codes, soft decision decoding of block codes, algebraic techniques for multiple error correction, the convolutional code structure and Viterbi decoding, syndrome decoding techniques, and sequential decoding techniques. System applications are also considered, giving attention to concatenated codes, coding for the white Gaussian noise channel, interleaver structures for coded systems, and coding for burst noise channels.

  18. Distributed space-time coding

    CERN Document Server

    Jing, Yindi

    2014-01-01

    Distributed Space-Time Coding (DSTC) is a cooperative relaying scheme that enables high reliability in wireless networks. This brief presents the basic concept of DSTC, its achievable performance, generalizations, code design, and differential use. Recent results on training design and channel estimation for DSTC and the performance of training-based DSTC are also discussed.

  19. NETWORK CODING BY BEAM FORMING

    DEFF Research Database (Denmark)

    2013-01-01

    Network coding by beam forming in networks, for example, in single frequency networks, can provide aid in increasing spectral efficiency. When network coding by beam forming and user cooperation are combined, spectral efficiency gains may be achieved. According to certain embodiments, a method...... cooperating with the plurality of user equipment to decode the received data....

  20. Building codes : obstacle or opportunity?

    Science.gov (United States)

    Alberto Goetzl; David B. McKeever

    1999-01-01

    Building codes are critically important in the use of wood products for construction. The codes contain regulations that are prescriptive or performance related for various kinds of buildings and construction types. A prescriptive standard might dictate that a particular type of material be used in a given application. A performance standard requires that a particular...

  1. Accelerator Physics Code Web Repository

    CERN Document Server

    Zimmermann, Frank; Bellodi, G; Benedetto, E; Dorda, U; Giovannozzi, Massimo; Papaphilippou, Y; Pieloni, T; Ruggiero, F; Rumolo, G; Schmidt, F; Todesco, E; Zotter, Bruno W; Payet, J; Bartolini, R; Farvacque, L; Sen, T; Chin, Y H; Ohmi, K; Oide, K; Furman, M; Qiang, J; Sabbi, G L; Seidl, P A; Vay, J L; Friedman, A; Grote, D P; Cousineau, S M; Danilov, V; Holmes, J A; Shishlo, A; Kim, E S; Cai, Y; Pivi, M; Kaltchev, D I; Abell, D T; Katsouleas, Thomas C; Boine-Frankenheim, O; Franchetti, G; Hofmann, I; Machida, S; Wei, J

    2006-01-01

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic acceleratorphysics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  2. LFSC - Linac Feedback Simulation Code

    Energy Technology Data Exchange (ETDEWEB)

    Ivanov, Valentin; /Fermilab

    2008-05-01

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  3. Interleaver Design for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl; Zyablov, Viktor

    1997-01-01

    By a combination of construction and random search based on a careful analysis of the low weight words and the distance properties of the component codes, it is possible to find interleavers for turbo coding with a high minimum distance. We have designed a block interleaver with permutations...

  4. Code breaking in the pacific

    CERN Document Server

    Donovan, Peter

    2014-01-01

    Covers the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945 Describes, explains and analyzes the code breaking techniques developed during the war in the Pacific Exposes the blunders (in code construction and use) made by the Japanese Navy that led to significant US Naval victories

  5. Development status of TUF code

    International Nuclear Information System (INIS)

    Liu, W.S.; Tahir, A.; Zaltsgendler

    1996-01-01

    An overview of the important development of the TUF code in 1995 is presented. The development in the following areas is presented: control of round-off error propagation, gas resolution and release models, and condensation induced water hammer. This development is mainly generated from station requests for operational support and code improvement. (author)

  6. Accident consequence assessment code development

    International Nuclear Information System (INIS)

    Homma, T.; Togawa, O.

    1991-01-01

    This paper describes the new computer code system, OSCAAR developed for off-site consequence assessment of a potential nuclear accident. OSCAAR consists of several modules which have modeling capabilities in atmospheric transport, foodchain transport, dosimetry, emergency response and radiological health effects. The major modules of the consequence assessment code are described, highlighting the validation and verification of the models. (author)

  7. The nuclear codes and guidelines

    International Nuclear Information System (INIS)

    Sonter, M.

    1984-01-01

    This paper considers problems faced by the mining industry when implementing the nuclear codes of practice. Errors of interpretation are likely. A major criticism is that the guidelines to the codes must be seen as recommendations only. They are not regulations. Specific clauses in the guidelines are criticised

  8. Survey of coded aperture imaging

    International Nuclear Information System (INIS)

    Barrett, H.H.

    1975-01-01

    The basic principle and limitations of coded aperture imaging for x-ray and gamma cameras are discussed. Current trends include (1) use of time varying apertures, (2) use of ''dilute'' apertures with transmission much less than 50%, and (3) attempts to derive transverse tomographic sections, unblurred by other planes, from coded images

  9. ACCELERATION PHYSICS CODE WEB REPOSITORY.

    Energy Technology Data Exchange (ETDEWEB)

    WEI, J.

    2006-06-26

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  10. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions with a ...

  11. On Network Coded Filesystem Shim

    DEFF Research Database (Denmark)

    Sørensen, Chres Wiant; Roetter, Daniel Enrique Lucani; Médard, Muriel

    2017-01-01

    Although network coding has shown the potential to revolutionize networking and storage, its deployment has faced a number of challenges. Usual proposals involve two approaches. First, deploying a new protocol (e.g., Multipath Coded TCP), or retrofitting another one (e.g., TCP/NC) to deliver bene...

  12. Running codes through the web

    International Nuclear Information System (INIS)

    Clark, R.E.H.

    2001-01-01

    Dr. Clark presented a report and demonstration of running atomic physics codes through the WWW. The atomic physics data is generated from Los Alamos National Laboratory (LANL) codes that calculate electron impact excitation, ionization, photoionization, and autoionization, and inversed processes through detailed balance. Samples of Web interfaces, input and output are given in the report

  13. Dynamic benchmarking of simulation codes

    International Nuclear Information System (INIS)

    Henry, R.E.; Paik, C.Y.; Hauser, G.M.

    1996-01-01

    Computer simulation of nuclear power plant response can be a full-scope control room simulator, an engineering simulator to represent the general behavior of the plant under normal and abnormal conditions, or the modeling of the plant response to conditions that would eventually lead to core damage. In any of these, the underlying foundation for their use in analysing situations, training of vendor/utility personnel, etc. is how well they represent what has been known from industrial experience, large integral experiments and separate effects tests. Typically, simulation codes are benchmarked with some of these; the level of agreement necessary being dependent upon the ultimate use of the simulation tool. However, these analytical models are computer codes, and as a result, the capabilities are continually enhanced, errors are corrected, new situations are imposed on the code that are outside of the original design basis, etc. Consequently, there is a continual need to assure that the benchmarks with important transients are preserved as the computer code evolves. Retention of this benchmarking capability is essential to develop trust in the computer code. Given the evolving world of computer codes, how is this retention of benchmarking capabilities accomplished? For the MAAP4 codes this capability is accomplished through a 'dynamic benchmarking' feature embedded in the source code. In particular, a set of dynamic benchmarks are included in the source code and these are exercised every time the archive codes are upgraded and distributed to the MAAP users. Three different types of dynamic benchmarks are used: plant transients; large integral experiments; and separate effects tests. Each of these is performed in a different manner. The first is accomplished by developing a parameter file for the plant modeled and an input deck to describe the sequence; i.e. the entire MAAP4 code is exercised. The pertinent plant data is included in the source code and the computer

  14. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...... steps, conventionally performed at the video encoder side, to the decoder side. Emerging applications such as wireless visual sensor networks and wireless video surveillance all require lightweight video encoding with high coding efficiency and error-resilience. The video data of DVC schemes differ from...... the assumptions of SW and WZ distributed coding, e.g. by being correlated in time and nonstationary. Improving the efficiency of DVC coding is challenging. This paper presents some selected techniques to address the DVC challenges. Focus is put on pin-pointing how the decoder steps are modified to provide...

  15. Non-Protein Coding RNAs

    CERN Document Server

    Walter, Nils G; Batey, Robert T

    2009-01-01

    This book assembles chapters from experts in the Biophysics of RNA to provide a broadly accessible snapshot of the current status of this rapidly expanding field. The 2006 Nobel Prize in Physiology or Medicine was awarded to the discoverers of RNA interference, highlighting just one example of a large number of non-protein coding RNAs. Because non-protein coding RNAs outnumber protein coding genes in mammals and other higher eukaryotes, it is now thought that the complexity of organisms is correlated with the fraction of their genome that encodes non-protein coding RNAs. Essential biological processes as diverse as cell differentiation, suppression of infecting viruses and parasitic transposons, higher-level organization of eukaryotic chromosomes, and gene expression itself are found to largely be directed by non-protein coding RNAs. The biophysical study of these RNAs employs X-ray crystallography, NMR, ensemble and single molecule fluorescence spectroscopy, optical tweezers, cryo-electron microscopy, and ot...

  16. Reliability-Based Code Calibration

    DEFF Research Database (Denmark)

    Faber, M.H.; Sørensen, John Dalsgaard

    2003-01-01

    The present paper addresses fundamental concepts of reliability based code calibration. First basic principles of structural reliability theory are introduced and it is shown how the results of FORM based reliability analysis may be related to partial safety factors and characteristic values....... Thereafter the code calibration problem is presented in its principal decision theoretical form and it is discussed how acceptable levels of failure probability (or target reliabilities) may be established. Furthermore suggested values for acceptable annual failure probabilities are given for ultimate...... and serviceability limit states. Finally the paper describes the Joint Committee on Structural Safety (JCSS) recommended procedure - CodeCal - for the practical implementation of reliability based code calibration of LRFD based design codes....

  17. What Froze the Genetic Code?

    Directory of Open Access Journals (Sweden)

    Lluís Ribas de Pouplana

    2017-04-01

    Full Text Available The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  18. Verification of reactor safety codes

    International Nuclear Information System (INIS)

    Murley, T.E.

    1978-01-01

    The safety evaluation of nuclear power plants requires the investigation of wide range of potential accidents that could be postulated to occur. Many of these accidents deal with phenomena that are outside the range of normal engineering experience. Because of the expense and difficulty of full scale tests covering the complete range of accident conditions, it is necessary to rely on complex computer codes to assess these accidents. The central role that computer codes play in safety analyses requires that the codes be verified, or tested, by comparing the code predictions with a wide range of experimental data chosen to span the physical phenomena expected under potential accident conditions. This paper discusses the plans of the Nuclear Regulatory Commission for verifying the reactor safety codes being developed by NRC to assess the safety of light water reactors and fast breeder reactors. (author)

  19. What Froze the Genetic Code?

    Science.gov (United States)

    Ribas de Pouplana, Lluís; Torres, Adrian Gabriel; Rafels-Ybern, Àlbert

    2017-04-05

    The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids. Fifty years later, it is clear that variations to the universal Genetic Code exist in nature and that translation is not limited to twenty amino acids. However, given the astonishing diversity of life on earth, and the extended evolutionary time that has taken place since the emergence of the extant Genetic Code, the idea that the translation apparatus is for the most part immobile remains true. Here, we will offer a potential explanation to the reason why the code has remained mostly stable for over three billion years, and discuss some of the mechanisms that allow species to overcome the intrinsic functional limitations of the protein synthesis machinery.

  20. Tristan code and its application

    Science.gov (United States)

    Nishikawa, K.-I.

    Since TRISTAN: The 3-D Electromagnetic Particle Code was introduced in 1990, it has been used for many applications including the simulations of global solar windmagnetosphere interaction. The most essential ingridients of this code have been published in the ISSS-4 book. In this abstract we describe some of issues and an application of this code for the study of global solar wind-magnetosphere interaction including a substorm study. The basic code (tristan.f) for the global simulation and a local simulation of reconnection with a Harris model (issrec2.f) are available at http:/www.physics.rutger.edu/˜kenichi. For beginners the code (isssrc2.f) with simpler boundary conditions is suitable to start to run simulations. The future of global particle simulations for a global geospace general circulation (GGCM) model with predictive capability (for Space Weather Program) is discussed.

  1. High efficiency video coding coding tools and specification

    CERN Document Server

    Wien, Mathias

    2015-01-01

    The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video resolutions of HD and beyond, providing Ultra HD video at similar compressed bit rates as for HD video encoded with the well-established video coding standard H.264 | AVC. Based on known concepts, new coding structures and improved coding tools have been developed and specified in HEVC. The standard is expected to be taken up easily by established industry as well as new endeavors, answering the needs of todays connected and ever-evolving online world. This book presents the High Efficiency Video Coding standard and explains it in a clear and coherent language. It provides a comprehensive and consistently written description, all of a piece. The book targets at both, newbies to video coding as well as experts in the field. While providing sections with introductory text for the beginner, it suits as a well-arranged reference book for the expert. The book provides a comprehensive reference for th...

  2. Detecting non-coding selective pressure in coding regions

    Directory of Open Access Journals (Sweden)

    Blanchette Mathieu

    2007-02-01

    Full Text Available Abstract Background Comparative genomics approaches, where orthologous DNA regions are compared and inter-species conserved regions are identified, have proven extremely powerful for identifying non-coding regulatory regions located in intergenic or intronic regions. However, non-coding functional elements can also be located within coding region, as is common for exonic splicing enhancers, some transcription factor binding sites, and RNA secondary structure elements affecting mRNA stability, localization, or translation. Since these functional elements are located in regions that are themselves highly conserved because they are coding for a protein, they generally escaped detection by comparative genomics approaches. Results We introduce a comparative genomics approach for detecting non-coding functional elements located within coding regions. Codon evolution is modeled as a mixture of codon substitution models, where each component of the mixture describes the evolution of codons under a specific type of coding selective pressure. We show how to compute the posterior distribution of the entropy and parsimony scores under this null model of codon evolution. The method is applied to a set of growth hormone 1 orthologous mRNA sequences and a known exonic splicing elements is detected. The analysis of a set of CORTBP2 orthologous genes reveals a region of several hundred base pairs under strong non-coding selective pressure whose function remains unknown. Conclusion Non-coding functional elements, in particular those involved in post-transcriptional regulation, are likely to be much more prevalent than is currently known. With the numerous genome sequencing projects underway, comparative genomics approaches like that proposed here are likely to become increasingly powerful at detecting such elements.

  3. Coding for effective denial management.

    Science.gov (United States)

    Miller, Jackie; Lineberry, Joe

    2004-01-01

    Nearly everyone will agree that accurate and consistent coding of diagnoses and procedures is the cornerstone for operating a compliant practice. The CPT or HCPCS procedure code tells the payor what service was performed and also (in most cases) determines the amount of payment. The ICD-9-CM diagnosis code, on the other hand, tells the payor why the service was performed. If the diagnosis code does not meet the payor's criteria for medical necessity, all payment for the service will be denied. Implementation of an effective denial management program can help "stop the bleeding." Denial management is a comprehensive process that works in two ways. First, it evaluates the cause of denials and takes steps to prevent them. Second, denial management creates specific procedures for refiling or appealing claims that are initially denied. Accurate, consistent and compliant coding is key to both of these functions. The process of proactively managing claim denials also reveals a practice's administrative strengths and weaknesses, enabling radiology business managers to streamline processes, eliminate duplicated efforts and shift a larger proportion of the staff's focus from paperwork to servicing patients--all of which are sure to enhance operations and improve practice management and office morale. Accurate coding requires a program of ongoing training and education in both CPT and ICD-9-CM coding. Radiology business managers must make education a top priority for their coding staff. Front office staff, technologists and radiologists should also be familiar with the types of information needed for accurate coding. A good staff training program will also cover the proper use of Advance Beneficiary Notices (ABNs). Registration and coding staff should understand how to determine whether the patient's clinical history meets criteria for Medicare coverage, and how to administer an ABN if the exam is likely to be denied. Staff should also understand the restrictions on use of

  4. ESCADRE and ICARE code systems

    International Nuclear Information System (INIS)

    Reocreux, M.; Gauvain, J.

    1992-01-01

    The French sever accident code development program is following two parallel approaches: the first one is dealing with ''integral codes'' which are designed for giving immediate engineer answers, the second one is following a more mechanistic way in order to have the capability of detailed analysis of experiments, in order to get a better understanding of the scaling problem and reach a better confidence in plant calculations. In the first approach a complete system has been developed and is being used for practical cases: this is the ESCADRE system. In the second approach, a set of codes dealing first with primary circuit is being developed: a mechanistic core degradation code, ICARE, has been issued and is being coupled with the advanced thermalhydraulic code CATHARE. Fission product codes have been also coupled to CATHARE. The ''integral'' ESCADRE system and the mechanistic ICARE and associated codes are described. Their main characteristics are reviewed and the status of their development and assessment given. Future studies are finally discussed. 36 refs, 4 figs, 1 tab

  5. The ZPIC educational code suite

    Science.gov (United States)

    Calado, R.; Pardal, M.; Ninhos, P.; Helm, A.; Mori, W. B.; Decyk, V. K.; Vieira, J.; Silva, L. O.; Fonseca, R. A.

    2017-10-01

    Particle-in-Cell (PIC) codes are used in almost all areas of plasma physics, such as fusion energy research, plasma accelerators, space physics, ion propulsion, and plasma processing, and many other areas. In this work, we present the ZPIC educational code suite, a new initiative to foster training in plasma physics using computer simulations. Leveraging on our expertise and experience from the development and use of the OSIRIS PIC code, we have developed a suite of 1D/2D fully relativistic electromagnetic PIC codes, as well as 1D electrostatic. These codes are self-contained and require only a standard laptop/desktop computer with a C compiler to be run. The output files are written in a new file format called ZDF that can be easily read using the supplied routines in a number of languages, such as Python, and IDL. The code suite also includes a number of example problems that can be used to illustrate several textbook and advanced plasma mechanisms, including instructions for parameter space exploration. We also invite contributions to this repository of test problems that will be made freely available to the community provided the input files comply with the format defined by the ZPIC team. The code suite is freely available and hosted on GitHub at https://github.com/zambzamb/zpic. Work partially supported by PICKSC.

  6. Stability analysis by ERATO code

    International Nuclear Information System (INIS)

    Tsunematsu, Toshihide; Takeda, Tatsuoki; Matsuura, Toshihiko; Azumi, Masafumi; Kurita, Gen-ichi

    1979-12-01

    Problems in MHD stability calculations by ERATO code are described; which concern convergence property of results, equilibrium codes, and machine optimization of ERATO code. It is concluded that irregularity on a convergence curve is not due to a fault of the ERATO code itself but due to inappropriate choice of the equilibrium calculation meshes. Also described are a code to calculate an equilibrium as a quasi-inverse problem and a code to calculate an equilibrium as a result of a transport process. Optimization of the code with respect to I/O operations reduced both CPU time and I/O time considerably. With the FACOM230-75 APU/CPU multiprocessor system, the performance is about 6 times as high as with the FACOM230-75 CPU, showing the effectiveness of a vector processing computer for the kind of MHD computations. This report is a summary of the material presented at the ERATO workshop 1979(ORNL), supplemented with some details. (author)

  7. ETR/ITER systems code

    Energy Technology Data Exchange (ETDEWEB)

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.; Bulmer, R.H.; Busigin, A.; DuBois, P.F.; Fenstermacher, M.E.; Fink, J.; Finn, P.A.; Galambos, J.D.; Gohar, Y.; Gorker, G.E.; Haines, J.R.; Hassanein, A.M.; Hicks, D.R.; Ho, S.K.; Kalsi, S.S.; Kalyanam, K.M.; Kerns, J.A.; Lee, J.D.; Miller, J.R.; Miller, R.L.; Myall, J.O.; Peng, Y-K.M.; Perkins, L.J.; Spampinato, P.T.; Strickler, D.J.; Thomson, S.L.; Wagner, C.E.; Willms, R.S.; Reid, R.L. (ed.)

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs.

  8. ETR/ITER systems code

    International Nuclear Information System (INIS)

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs

  9. LFSC - Linac Feedback Simulation Code

    International Nuclear Information System (INIS)

    Ivanov, Valentin; Fermilab

    2008-01-01

    The computer program LFSC ( ) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output

  10. Coded communications with nonideal interleaving

    Science.gov (United States)

    Laufer, Shaul

    1991-02-01

    Burst error channels - a type of block interference channels - feature increasing capacity but decreasing cutoff rate as the memory rate increases. Despite the large capacity, there is degradation in the performance of practical coding schemes when the memory length is excessive. A short-coding error parameter (SCEP) was introduced, which expresses a bound on the average decoding-error probability for codes shorter than the block interference length. The performance of a coded slow frequency-hopping communication channel is analyzed for worst-case partial band jamming and nonideal interleaving, by deriving expressions for the capacity and cutoff rate. The capacity and cutoff rate, respectively, are shown to approach and depart from those of a memoryless channel corresponding to the transmission of a single code letter per hop. For multiaccess communications over a slot-synchronized collision channel without feedback, the channel was considered as a block interference channel with memory length equal to the number of letters transmitted in each slot. The effects of an asymmetrical background noise and a reduced collision error rate were studied, as aspects of real communications. The performance of specific convolutional and Reed-Solomon codes was examined for slow frequency-hopping systems with nonideal interleaving. An upper bound is presented for the performance of a Viterbi decoder for a convolutional code with nonideal interleaving, and a soft decision diversity combining technique is introduced.

  11. Coding and decoding for code division multiple user communication systems

    Science.gov (United States)

    Healy, T. J.

    1985-01-01

    A new algorithm is introduced which decodes code division multiple user communication signals. The algorithm makes use of the distinctive form or pattern of each signal to separate it from the composite signal created by the multiple users. Although the algorithm is presented in terms of frequency-hopped signals, the actual transmitter modulator can use any of the existing digital modulation techniques. The algorithm is applicable to error-free codes or to codes where controlled interference is permitted. It can be used when block synchronization is assumed, and in some cases when it is not. The paper also discusses briefly some of the codes which can be used in connection with the algorithm, and relates the algorithm to past studies which use other approaches to the same problem.

  12. GAMERA - The New Magnetospheric Code

    Science.gov (United States)

    Lyon, J.; Sorathia, K.; Zhang, B.; Merkin, V. G.; Wiltberger, M. J.; Daldorff, L. K. S.

    2017-12-01

    The Lyon-Fedder-Mobarry (LFM) code has been a main-line magnetospheric simulation code for 30 years. The code base, designed in the age of memory to memory vector ma- chines,is still in wide use for science production but needs upgrading to ensure the long term sustainability. In this presentation, we will discuss our recent efforts to update and improve that code base and also highlight some recent results. The new project GAM- ERA, Grid Agnostic MHD for Extended Research Applications, has kept the original design characteristics of the LFM and made significant improvements. The original de- sign included high order numerical differencing with very aggressive limiting, the ability to use arbitrary, but logically rectangular, grids, and maintenance of div B = 0 through the use of the Yee grid. Significant improvements include high-order upwinding and a non-clipping limiter. One other improvement with wider applicability is an im- proved averaging technique for the singularities in polar and spherical grids. The new code adopts a hybrid structure - multi-threaded OpenMP with an overarching MPI layer for large scale and coupled applications. The MPI layer uses a combination of standard MPI and the Global Array Toolkit from PNL to provide a lightweight mechanism for coupling codes together concurrently. The single processor code is highly efficient and can run magnetospheric simulations at the default CCMC resolution faster than real time on a MacBook pro. We have run the new code through the Athena suite of tests, and the results compare favorably with the codes available to the astrophysics community. LFM/GAMERA has been applied to many different situations ranging from the inner and outer heliosphere and magnetospheres of Venus, the Earth, Jupiter and Saturn. We present example results the Earth's magnetosphere including a coupled ring current (RCM), the magnetospheres of Jupiter and Saturn, and the inner heliosphere.

  13. SCALE Code System

    Energy Technology Data Exchange (ETDEWEB)

    Jessee, Matthew Anderson [ORNL

    2016-04-01

    The SCALE Code System is a widely-used modeling and simulation suite for nuclear safety analysis and design that is developed, maintained, tested, and managed by the Reactor and Nuclear Systems Division (RNSD) of Oak Ridge National Laboratory (ORNL). SCALE provides a comprehensive, verified and validated, user-friendly tool set for criticality safety, reactor and lattice physics, radiation shielding, spent fuel and radioactive source term characterization, and sensitivity and uncertainty analysis. Since 1980, regulators, licensees, and research institutions around the world have used SCALE for safety analysis and design. SCALE provides an integrated framework with dozens of computational modules including three deterministic and three Monte Carlo radiation transport solvers that are selected based on the desired solution strategy. SCALE includes current nuclear data libraries and problem-dependent processing tools for continuous-energy (CE) and multigroup (MG) neutronics and coupled neutron-gamma calculations, as well as activation, depletion, and decay calculations. SCALE includes unique capabilities for automated variance reduction for shielding calculations, as well as sensitivity and uncertainty analysis. SCALE’s graphical user interfaces assist with accurate system modeling, visualization of nuclear data, and convenient access to desired results.SCALE 6.2 provides many new capabilities and significant improvements of existing features.New capabilities include:• ENDF/B-VII.1 nuclear data libraries CE and MG with enhanced group structures,• Neutron covariance data based on ENDF/B-VII.1 and supplemented with ORNL data,• Covariance data for fission product yields and decay constants,• Stochastic uncertainty and correlation quantification for any SCALE sequence with Sampler,• Parallel calculations with KENO,• Problem-dependent temperature corrections for CE calculations,• CE shielding and criticality accident alarm system analysis with MAVRIC,• CE

  14. Code-Mixing and Code Switchingin The Process of Learning

    Directory of Open Access Journals (Sweden)

    Diyah Atiek Mustikawati

    2016-09-01

    Full Text Available This study aimed to describe a form of code switching and code mixing specific form found in the teaching and learning activities in the classroom as well as determining factors influencing events stand out that form of code switching and code mixing in question.Form of this research is descriptive qualitative case study which took place in Al Mawaddah Boarding School Ponorogo. Based on the analysis and discussion that has been stated in the previous chapter that the form of code mixing and code switching learning activities in Al Mawaddah Boarding School is in between the use of either language Java language, Arabic, English and Indonesian, on the use of insertion of words, phrases, idioms, use of nouns, adjectives, clauses, and sentences. Code mixing deciding factor in the learning process include: Identification of the role, the desire to explain and interpret, sourced from the original language and its variations, is sourced from a foreign language. While deciding factor in the learning process of code, includes: speakers (O1, partners speakers (O2, the presence of a third person (O3, the topic of conversation, evoke a sense of humour, and just prestige. The significance of this study is to allow readers to see the use of language in a multilingual society, especially in AL Mawaddah boarding school about the rules and characteristics variation in the language of teaching and learning activities in the classroom. Furthermore, the results of this research will provide input to the ustadz / ustadzah and students in developing oral communication skills and the effectiveness of teaching and learning strategies in boarding schools.

  15. Neural Decoder for Topological Codes

    Science.gov (United States)

    Torlai, Giacomo; Melko, Roger G.

    2017-07-01

    We present an algorithm for error correction in topological codes that exploits modern machine learning techniques. Our decoder is constructed from a stochastic neural network called a Boltzmann machine, of the type extensively used in deep learning. We provide a general prescription for the training of the network and a decoding strategy that is applicable to a wide variety of stabilizer codes with very little specialization. We demonstrate the neural decoder numerically on the well-known two-dimensional toric code with phase-flip errors.

  16. Coding chaotic billiards. Pt. 3

    International Nuclear Information System (INIS)

    Ullmo, D.; Giannoni, M.J.

    1993-01-01

    Non-tiling compact billiard defined on the pseudosphere is studied 'a la Morse coding'. As for most bounded systems, the coding is non exact. However, two sets of approximate grammar rules can be obtained, one specifying forbidden codes, and the other allowed ones. In-between some sequences remain in the 'unknown' zone, but their relative amount can be reduced to zero if one lets the length of the approximate grammar rules goes to infinity. The relationship between these approximate grammar rules and the 'pruning front' introduced by Cvitanovic et al. is discussed. (authors). 13 refs., 10 figs., 1 tab

  17. Iterative nonlinear unfolding code: TWOGO

    International Nuclear Information System (INIS)

    Hajnal, F.

    1981-03-01

    a new iterative unfolding code, TWOGO, was developed to analyze Bonner sphere neutron measurements. The code includes two different unfolding schemes which alternate on successive iterations. The iterative process can be terminated either when the ratio of the coefficient of variations in terms of the measured and calculated responses is unity, or when the percentage difference between the measured and evaluated sphere responses is less than the average measurement error. The code was extensively tested with various known spectra and real multisphere neutron measurements which were performed inside the containments of pressurized water reactors

  18. Atlas C++ Coding Standard Specification

    CERN Document Server

    Albrand, S; Barberis, D; Bosman, M; Jones, B; Stavrianakou, M; Arnault, C; Candlin, D; Candlin, R; Franck, E; Hansl-Kozanecka, Traudl; Malon, D; Qian, S; Quarrie, D; Schaffer, R D

    2001-01-01

    This document defines the ATLAS C++ coding standard, that should be adhered to when writing C++ code. It has been adapted from the original "PST Coding Standard" document (http://pst.cern.ch/HandBookWorkBook/Handbook/Programming/programming.html) CERN-UCO/1999/207. The "ATLAS standard" comprises modifications, further justification and examples for some of the rules in the original PST document. All changes were discussed in the ATLAS Offline Software Quality Control Group and feedback from the collaboration was taken into account in the "current" version.

  19. Writing the Live Coding Book

    DEFF Research Database (Denmark)

    Blackwell, Alan; Cox, Geoff; Lee, Sang Wong

    2016-01-01

    This paper is a speculation on the relationship between coding and writing, and the ways in which technical innovations and capabilities enable us to rethink each in terms of the other. As a case study, we draw on recent experiences of preparing a book on live coding, which integrates a wide range...... of personal, historical, technical and critical perspectives. This book project has been both experimental and reflective, in a manner that allows us to draw on critical understanding of both code and writing, and point to the potential for new practices in the future....

  20. LiveCode mobile development

    CERN Document Server

    Lavieri, Edward D

    2013-01-01

    A practical guide written in a tutorial-style, ""LiveCode Mobile Development Hotshot"" walks you step-by-step through 10 individual projects. Every project is divided into sub tasks to make learning more organized and easy to follow along with explanations, diagrams, screenshots, and downloadable material.This book is great for anyone who wants to develop mobile applications using LiveCode. You should be familiar with LiveCode and have access to a smartphone. You are not expected to know how to create graphics or audio clips.

  1. Network Coding Fundamentals and Applications

    CERN Document Server

    Medard, Muriel

    2011-01-01

    Network coding is a field of information and coding theory and is a method of attaining maximum information flow in a network. This book is an ideal introduction for the communications and network engineer, working in research and development, who needs an intuitive introduction to network coding and to the increased performance and reliability it offers in many applications. This book is an ideal introduction for the research and development communications and network engineer who needs an intuitive introduction to the theory and wishes to understand the increased performance and reliabil

  2. Linear network error correction coding

    CERN Document Server

    Guang, Xuan

    2014-01-01

    There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most important contributions following the classic approach, which represents messages by sequences?similar to algebraic coding,?and also briefly discuss the main results following the?other approach,?that uses the theory of rank metric codes for network error correction of representing messages by subspaces. This book starts by establishing the basic linear network error correction (LNEC) model and then characterizes two equivalent descriptions. Distances an

  3. Tree Coding of Bilevel Images

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    1998-01-01

    Presently, sequential tree coders are the best general purpose bilevel image coders and the best coders of halftoned images. The current ISO standard, Joint Bilevel Image Experts Group (JBIG), is a good example. A sequential tree coder encodes the data by feeding estimates of conditional...... is one order of magnitude slower than JBIG, obtains excellent and highly robust compression performance. A multipass free tree coding scheme produces superior compression results for all test images. A multipass free template coding scheme produces significantly better results than JBIG for difficult...... images such as halftones. By utilizing randomized subsampling in the template selection, the speed becomes acceptable for practical image coding...

  4. Studies on DANESS Code Modeling

    International Nuclear Information System (INIS)

    Jeong, Chang Joon

    2009-09-01

    The DANESS code modeling study has been performed. DANESS code is widely used in a dynamic fuel cycle analysis. Korea Atomic Energy Research Institute (KAERI) has used the DANESS code for the Korean national nuclear fuel cycle scenario analysis. In this report, the important models such as Energy-demand scenario model, New Reactor Capacity Decision Model, Reactor and Fuel Cycle Facility History Model, and Fuel Cycle Model are investigated. And, some models in the interface module are refined and inserted for Korean nuclear fuel cycle model. Some application studies have also been performed for GNEP cases and for US fast reactor scenarios with various conversion ratios

  5. Beam-dynamics codes used at DARHT

    Energy Technology Data Exchange (ETDEWEB)

    Ekdahl, Jr., Carl August [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-01

    Several beam simulation codes are used to help gain a better understanding of beam dynamics in the DARHT LIAs. The most notable of these fall into the following categories: for beam production – Tricomp Trak orbit tracking code, LSP Particle in cell (PIC) code, for beam transport and acceleration – XTR static envelope and centroid code, LAMDA time-resolved envelope and centroid code, LSP-Slice PIC code, for coasting-beam transport to target – LAMDA time-resolved envelope code, LSP-Slice PIC code. These codes are also being used to inform the design of Scorpius.

  6. Introduction to coding and information theory

    CERN Document Server

    Roman, Steven

    1997-01-01

    This book is intended to introduce coding theory and information theory to undergraduate students of mathematics and computer science. It begins with a review of probablity theory as applied to finite sample spaces and a general introduction to the nature and types of codes. The two subsequent chapters discuss information theory: efficiency of codes, the entropy of information sources, and Shannon's Noiseless Coding Theorem. The remaining three chapters deal with coding theory: communication channels, decoding in the presence of errors, the general theory of linear codes, and such specific codes as Hamming codes, the simplex codes, and many others.

  7. Allegheny County Zip Code Boundaries

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset demarcates the zip code boundaries that lie within Allegheny County.If viewing this description on the Western Pennsylvania Regional Data Center’s open...

  8. Ultrasound imaging using coded signals

    DEFF Research Database (Denmark)

    Misaridis, Athanasios

    Modulated (or coded) excitation signals can potentially improve the quality and increase the frame rate in medical ultrasound scanners. The aim of this dissertation is to investigate systematically the applicability of modulated signals in medical ultrasound imaging and to suggest appropriate...... methods for coded imaging, with the goal of making better anatomic and flow images and three-dimensional images. On the first stage, it investigates techniques for doing high-resolution coded imaging with improved signal-to-noise ratio compared to conventional imaging. Subsequently it investigates how...... coded excitation can be used for increasing the frame rate. The work includes both simulated results using Field II, and experimental results based on measurements on phantoms as well as clinical images. Initially a mathematical foundation of signal modulation is given. Pulse compression based...

  9. National Tribal Building Codes Summit

    Science.gov (United States)

    National Tribal Building Codes summit statement developed to support tribes interested in adopting green and culturally-appropriate building systems to ensure safe, sustainable, affordable, and culturally-appropriate buildings on tribal lands.

  10. Tracking Code for Microwave Instability

    International Nuclear Information System (INIS)

    Heifets, S.; SLAC

    2006-01-01

    To study microwave instability the tracking code is developed. For bench marking, results are compared with Oide-Yokoya results [1] for broad-band Q = 1 impedance. Results hint to two possible mechanisms determining the threshold of instability

  11. CRUCIB: an axisymmetric convection code

    International Nuclear Information System (INIS)

    Bertram, L.A.

    1975-03-01

    The CRUCIB code was written in support of an experimental program aimed at measurement of thermal diffusivities of refractory liquids. Precise values of diffusivity are necessary to realistic analysis of reactor safety problems, nuclear waste disposal procedures, and fundamental metal forming processes. The code calculates the axisymmetric transient convective motions produced in a right circular cylindrical crucible, which is surface heated by an annular heat pulse. Emphasis of this report is placed on the input-output options of the CRUCIB code, which are tailored to assess the importance of the convective heat transfer in determining the surface temperature distribution. Use is limited to Prandtl numbers less than unity; larger values can be accommodated by replacement of a single block of the code, if desired. (U.S.)

  12. QUIL: a chemical equilibrium code

    International Nuclear Information System (INIS)

    Lunsford, J.L.

    1977-02-01

    A chemical equilibrium code QUIL is described, along with two support codes FENG and SURF. QUIL is designed to allow calculations on a wide range of chemical environments, which may include surface phases. QUIL was written specifically to calculate distributions associated with complex equilibria involving fission products in the primary coolant loop of the high-temperature gas-cooled reactor. QUIL depends upon an energy-data library called ELIB. This library is maintained by FENG and SURF. FENG enters into the library all reactions having standard free energies of reaction that are independent of concentration. SURF enters all surface reactions into ELIB. All three codes are interactive codes written to be used from a remote terminal, with paging control provided. Plotted output is also available

  13. Electronic Code of Federal Regulations

    Data.gov (United States)

    National Archives and Records Administration — The Electronic Code of Federal Regulations (e-CFR) is the codification of the general and permanent rules published in the Federal Register by the executive...

  14. Zip Codes - MDC_WCSZipcode

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — The WCSZipcode polygon feature class was created by Miami-Dade Enterprise Technology Department to be used in the WCS batch jobs to assign the actual zip code of...

  15. The intercomparison of aerosol codes

    International Nuclear Information System (INIS)

    Dunbar, I.H.; Fermandjian, J.; Gauvain, J.

    1988-01-01

    The behavior of aerosols in a reactor containment vessel following a severe accident could be an important determinant of the accident source term to the environment. Various processes result in the deposition of the aerosol onto surfaces within the containment, from where they are much less likely to be released. Some of these processes are very sensitive to particle size, so it is important to model the aerosol growth processes: agglomeration and condensation. A number of computer codes have been written to model growth and deposition processes. They have been tested against each other in a series of code comparison exercises. These exercises have investigated sensitivities to physical and numerical assumptions and have also proved a useful means of quality control for the codes. Various exercises in which code predictions are compared with experimental results are now under way

  16. Automatic code generation in practice

    DEFF Research Database (Denmark)

    Adam, Marian Sorin; Kuhrmann, Marco; Schultz, Ulrik Pagh

    2016-01-01

    -specific language to specify those requirements and to allow for generating a safety-enforcing layer of code, which is deployed to the robot. The paper at hand reports experiences in practically applying code generation to mobile robots. For two cases, we discuss how we addressed challenges, e.g., regarding weaving......Mobile robots often use a distributed architecture in which software components are deployed to heterogeneous hardware modules. Ensuring the consistency with the designed architecture is a complex task, notably if functional safety requirements have to be fulfilled. We propose to use a domain...... code generation into proprietary development environments and testing of manually written code. We find that a DSL based on the same conceptual model can be used across different kinds of hardware modules, but a significant adaptation effort is required in practical scenarios involving different kinds...

  17. Squares of Random Linear Codes

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego

    2015-01-01

    a positive answer, for codes of dimension $k$ and length roughly $\\frac{1}{2}k^2$ or smaller. Moreover, the convergence speed is exponential if the difference $k(k+1)/2-n$ is at least linear in $k$. The proof uses random coding and combinatorial arguments, together with algebraic tools involving the precise......Given a linear code $C$, one can define the $d$-th power of $C$ as the span of all componentwise products of $d$ elements of $C$. A power of $C$ may quickly fill the whole space. Our purpose is to answer the following question: does the square of a code ``typically'' fill the whole space? We give...

  18. Cost reducing code implementation strategies

    International Nuclear Information System (INIS)

    Kurtz, Randall L.; Griswold, Michael E.; Jones, Gary C.; Daley, Thomas J.

    1995-01-01

    Sargent and Lundy's Code consulting experience reveals a wide variety of approaches toward implementing the requirements of various nuclear Codes Standards. This paper will describe various Code implementation strategies which assure that Code requirements are fully met in a practical and cost-effective manner. Applications to be discussed includes the following: new construction; repair, replacement and modifications; assessments and life extensions. Lessons learned and illustrative examples will be included. Preferred strategies and specific recommendations will also be addressed. Sargent and Lundy appreciates the opportunity provided by the Korea Atomic Industrial Forum and Korean Nuclear Society to share our ideas and enhance global cooperation through the exchange of information and views on relevant topics

  19. Adaptive decoding of convolutional codes

    Directory of Open Access Journals (Sweden)

    K. Hueske

    2007-06-01

    Full Text Available Convolutional codes, which are frequently used as error correction codes in digital transmission systems, are generally decoded using the Viterbi Decoder. On the one hand the Viterbi Decoder is an optimum maximum likelihood decoder, i.e. the most probable transmitted code sequence is obtained. On the other hand the mathematical complexity of the algorithm only depends on the used code, not on the number of transmission errors. To reduce the complexity of the decoding process for good transmission conditions, an alternative syndrome based decoder is presented. The reduction of complexity is realized by two different approaches, the syndrome zero sequence deactivation and the path metric equalization. The two approaches enable an easy adaptation of the decoding complexity for different transmission conditions, which results in a trade-off between decoding complexity and error correction performance.

  20. Covariance data processing code. ERRORJ

    International Nuclear Information System (INIS)

    Kosako, Kazuaki

    2001-01-01

    The covariance data processing code, ERRORJ, was developed to process the covariance data of JENDL-3.2. ERRORJ has the processing functions of covariance data for cross sections including resonance parameters, angular distribution and energy distribution. (author)