WorldWideScience

Sample records for program code mode

  1. Index coding via linear programming

    CERN Document Server

    Blasiak, Anna; Lubetzky, Eyal

    2010-01-01

    Index Coding has received considerable attention recently motivated in part by applications such as fast video-on-demand and efficient communication in wireless networks and in part by its connection to Network Coding. The basic setting of Index Coding encodes the side-information relation, the problem input, as an undirected graph and the fundamental parameter is the broadcast rate $\\beta$, the average communication cost per bit for sufficiently long messages (i.e. the non-linear vector capacity). Recent nontrivial bounds on $\\beta$ were derived from the study of other Index Coding capacities (e.g. the scalar capacity $\\beta_1$) by Bar-Yossef et al (FOCS'06), Lubetzky and Stav (FOCS'07) and Alon et al (FOCS'08). However, these indirect bounds shed little light on the behavior of $\\beta$ and its exact value remained unknown for \\emph{any graph} where Index Coding is nontrivial. Our main contribution is a hierarchy of linear programs whose solutions trap $\\beta$ between them. This enables a direct information-...

  2. Requirements of a Better Secure Program Coding

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2012-01-01

    Full Text Available Secure program coding refers to how manage the risks determined by the security breaches because of the program source code. The papers reviews the best practices must be doing during the software development life cycle for secure software assurance, the methods and techniques used for a secure coding assurance, the most known and common vulnerabilities determined by a bad coding process and how the security risks are managed and mitigated. As a tool of the better secure program coding, the code review process is presented, together with objective measures for code review assurance and estimation of the effort for the code improvement.

  3. Multiview coding mode decision with hybrid optimal stopping model.

    Science.gov (United States)

    Zhao, Tiesong; Kwong, Sam; Wang, Hanli; Wang, Zhou; Pan, Zhaoqing; Kuo, C-C Jay

    2013-04-01

    In a generic decision process, optimal stopping theory aims to achieve a good tradeoff between decision performance and time consumed, with the advantages of theoretical decision-making and predictable decision performance. In this paper, optimal stopping theory is employed to develop an effective hybrid model for the mode decision problem, which aims to theoretically achieve a good tradeoff between the two interrelated measurements in mode decision, as computational complexity reduction and rate-distortion degradation. The proposed hybrid model is implemented and examined with a multiview encoder. To support the model and further promote coding performance, the multiview coding mode characteristics, including predicted mode probability and estimated coding time, are jointly investigated with inter-view correlations. Exhaustive experimental results with a wide range of video resolutions reveal the efficiency and robustness of our method, with high decision accuracy, negligible computational overhead, and almost intact rate-distortion performance compared to the original encoder.

  4. Simulations of Edge Current Driven Kink Modes with BOUT + + code

    Science.gov (United States)

    Li, G. Q.; Xu, X. Q.; Snyder, P. B.; Turnbull, A. D.; Xia, T. Y.; Ma, C. H.; Xi, P. W.

    2013-10-01

    Edge kink modes (or peeling modes) play a key role in the ELMs. The edge kink modes are driven by peak edge current, which comes from the bootstrap current. We calculated sequences of equilibria with different edge current using CORSICA by keeping total current and pressure profile fixed. Based on these equilibria, with the 3-field BOUT + + code, we calculated the MHD instabilities driven by edge current. For linear low-n ideal MHD modes, BOUT + + results agree with GATO results. With the edge current increasing, the dominant modes are changed from high-n ballooning modes to low-n kink modes. The edge current provides also stabilizing effects on high-n ballooning modes. Furthermore, for edge current scan without keeping total current fixed, the increasing edge current can stabilize the high-n ballooning modes and cannot drive kink modes. The diamagnetic effect can stabilize the high-n ballooning modes, but has no effect on the low-n kink modes. Also, the nonlinear behavior of kink modes is analyzed. Work supported by China MOST grant 2013GB111000 and by China NSF grant 10975161. Also performed for USDOE by LLNL under DE-AC52-07NA27344.

  5. Code quality issues in student programs

    NARCIS (Netherlands)

    Keuning, H.W.|info:eu-repo/dai/nl/411260820; Heeren, B.J.|info:eu-repo/dai/nl/304840130; Jeuring, J.T.|info:eu-repo/dai/nl/075189771

    2017-01-01

    Because low quality code can cause serious problems in software systems, students learning to program should pay attention to code quality early. Although many studies have investigated mistakes that students make during programming, we do not know much about the quality of their code. This study

  6. Code quality Issues in Student Programs

    NARCIS (Netherlands)

    Keuning, Hieke|info:eu-repo/dai/nl/411260820; Heeren, Bastiaan|info:eu-repo/dai/nl/304840130; Jeuring, Johan|info:eu-repo/dai/nl/075189771

    2017-01-01

    Because low quality code can cause serious problems in software systems, students learning to program should pay attention to code quality early. Although many studies have investigated mistakes that students make during programming, we do not know much about the quality of their code. This study

  7. Complexity control algorithm based on adaptive mode selection for interframe coding in high efficiency video coding

    Science.gov (United States)

    Chen, Gang; Yang, Bing; Zhang, Xiaoyun; Gao, Zhiyong

    2017-07-01

    The latest high efficiency video coding (HEVC) standard significantly increases the encoding complexity for improving its coding efficiency. Due to the limited computational capability of handheld devices, complexity constrained video coding has drawn great attention in recent years. A complexity control algorithm based on adaptive mode selection is proposed for interframe coding in HEVC. Considering the direct proportionality between encoding time and computational complexity, the computational complexity is measured in terms of encoding time. First, complexity is mapped to a target in terms of prediction modes. Then, an adaptive mode selection algorithm is proposed for the mode decision process. Specifically, the optimal mode combination scheme that is chosen through offline statistics is developed at low complexity. If the complexity budget has not been used up, an adaptive mode sorting method is employed to further improve coding efficiency. The experimental results show that the proposed algorithm achieves a very large complexity control range (as low as 10%) for the HEVC encoder while maintaining good rate-distortion performance. For the lowdelayP condition, compared with the direct resource allocation method and the state-of-the-art method, an average gain of 0.63 and 0.17 dB in BDPSNR is observed for 18 sequences when the target complexity is around 40%.

  8. Programming Entity Framework Code First

    CERN Document Server

    Lerman, Julia

    2011-01-01

    Take advantage of the Code First data modeling approach in ADO.NET Entity Framework, and learn how to build and configure a model based on existing classes in your business domain. With this concise book, you'll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration. Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you're working with an exis

  9. FDNS CFD Code Benchmark for RBCC Ejector Mode Operation

    Science.gov (United States)

    Holt, James B.; Ruf, Joe

    1999-01-01

    Computational Fluid Dynamics (CFD) analysis results are compared with benchmark quality test data from the Propulsion Engineering Research Center's (PERC) Rocket Based Combined Cycle (RBCC) experiments to verify fluid dynamic code and application procedures. RBCC engine flowpath development will rely on CFD applications to capture the multi-dimensional fluid dynamic interactions and to quantify their effect on the RBCC system performance. Therefore, the accuracy of these CFD codes must be determined through detailed comparisons with test data. The PERC experiments build upon the well-known 1968 rocket-ejector experiments of Odegaard and Stroup by employing advanced optical and laser based diagnostics to evaluate mixing and secondary combustion. The Finite Difference Navier Stokes (FDNS) code was used to model the fluid dynamics of the PERC RBCC ejector mode configuration. Analyses were performed for both Diffusion and Afterburning (DAB) and Simultaneous Mixing and Combustion (SMC) test conditions. Results from both the 2D and the 3D models are presented.

  10. A Formal Verification Methodology for DDD Mode Pacemaker Control Programs

    Directory of Open Access Journals (Sweden)

    Sana Shuja

    2015-01-01

    Full Text Available Pacemakers are safety-critical devices whose faulty behaviors can cause harm or even death. Often these faulty behaviors are caused due to bugs in programs used for digital control of pacemakers. We present a formal verification methodology that can be used to check the correctness of object code programs that implement the safety-critical control functions of DDD mode pacemakers. Our methodology is based on the theory of Well-Founded Equivalence Bisimulation (WEB refinement, where both formal specifications and implementation are treated as transition systems. We develop a simple and general formal specification for DDD mode pacemakers. We also develop correctness proof obligations that can be applied to validate object code programs used for pacemaker control. Using our methodology, we were able to verify a control program with millions of transitions against the simple specification with only 10 transitions. Our method also found several bugs during the verification process.

  11. The KRAKEN Normal Mode Program

    Science.gov (United States)

    1992-05-22

    Gaussian beam tracing referred to as geometric beam tracing. For those familiar with tradi- tional implementations of ray tracing, the results are often...and Homer P. Bucker, " Gaussian beam tracing for computing ocean acoustic fields," J. Acoust. Soc. Amer. 82, 1349-1359 (1987). The following programs...are used with BELLHOP: BELLHOP Main program for doing Gaussian beam tracing PLOTRAY Produces plots of central rays of beams ANGLES Given the source and

  12. Data calculation program for RELAP 5 code

    Energy Technology Data Exchange (ETDEWEB)

    Silvestre, Larissa J.B.; Sabundjian, Gaiane, E-mail: larissajbs@usp.br, E-mail: gdjian@ipen.br [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil)

    2015-07-01

    As the criteria and requirements for a nuclear power plant are extremely rigid, computer programs for simulation and safety analysis are required for certifying and licensing a plant. Based on this scenario, some sophisticated computational tools have been used such as the Reactor Excursion and Leak Analysis Program (RELAP5), which is the most used code for the thermo-hydraulic analysis of accidents and transients in nuclear reactors. A major difficulty in the simulation using RELAP5 code is the amount of information required for the simulation of thermal-hydraulic accidents or transients. The preparation of the input data leads to a very large number of mathematical operations for calculating the geometry of the components. Therefore, a mathematical friendly preprocessor was developed in order to perform these calculations and prepare RELAP5 input data. The Visual Basic for Application (VBA) combined with Microsoft EXCEL demonstrated to be an efficient tool to perform a number of tasks in the development of the program. Due to the absence of necessary information about some RELAP5 components, this work aims to make improvements to the Mathematic Preprocessor for RELAP5 code (PREREL5). For the new version of the preprocessor, new screens of some components that were not programmed in the original version were designed; moreover, screens of pre-existing components were redesigned to improve the program. In addition, an English version was provided for the new version of the PREREL5. The new design of PREREL5 contributes for saving time and minimizing mistakes made by users of the RELAP5 code. The final version of this preprocessor will be applied to Angra 2. (author)

  13. Studies of impact of plasma shaping on edge localized modes with a nonlinear code BOUT + +

    Science.gov (United States)

    Li, G. Q.; Xu, X. Q.; Snyder, P. B.; Turnbull, A. D.; Xia, T. Y.

    2014-10-01

    The plasma shaping has important effects on the edge localized modes (ELMs). In this work, with the 3-field BOUT + + code, we study the impact of the plasma shaping on the ELMs. Three kinds of typical plasma shapes are studied: circular (cbm), elongated (dbm) and shaped with X-point (meudas). Our calculations show that the shaped plasma and the X-point geometry have stabilizing effect on the ELMs. For linear ideal MHD calculation we benchmark BOUT + + results with ELITE and GATO codes. Then we study the role of non-ideal effects such as resistivity on the ELMs for the X-point geometry. Also the nonlinear calculations are carried out to study the impact of plasma shape on the ELM size. Work supported by China National Magnetic Confinement Fusion Science Program under Grant Nos. 2014GB106001 and 2013GB111000. Also performed for USDOE by LLNL under DE-AC52-07NA27344. LLNL-ABS-656997.

  14. Adaptive mode decision with residual motion compensation for distributed video coding

    DEFF Research Database (Denmark)

    Luong, Huynh Van; Forchhammer, Søren; Slowack, Jurgen

    2013-01-01

    Distributed video coding (DVC) is a coding paradigm that entails low complexity encoding by exploiting the source statistics at the decoder. To improve the DVC coding efficiency, this paper proposes a novel adaptive technique for mode decision to control and take advantage of skip mode and intra...... mode in DVC. The adaptive mode decision is not only based on quality of key frames but also the rate of Wyner-Ziv (WZ) frames. To improve noise distribution estimation for a more accurate mode decision, a residual motion compensation is proposed to estimate a current noise residue based on a previously...... decoded frame. The experimental results show that the proposed adaptive mode decision DVC significantly improves the rate distortion performance without increasing the encoding complexity. For a GOP size of 2 on the set of test sequences, the average bitrate saving of the proposed codec is 35.5% on WZ...

  15. Adaptive mode decision with residual motion compensation for distributed video coding

    DEFF Research Database (Denmark)

    Luong, Huynh Van; Forchhammer, Søren; Slowack, Jurgen

    2015-01-01

    Distributed video coding (DVC) is a coding paradigm that entails low complexity encoding by exploiting the source statistics at the decoder. To improve the DVC coding efficiency, this paper proposes a novel adaptive technique for mode decision to control and take advantage of skip mode and intra...... mode in DVC. The adaptive mode decision is not only based on quality of key frames but also the rate of Wyner-Ziv (WZ) frames. To improve noise distribution estimation for a more accurate mode decision, a residual motion compensation is proposed to estimate a current noise residue based on a previously...... decoded frame. The experimental results show that the proposed adaptive mode decision DVC significantly improves the rate distortion performance without increasing the encoding complexity. For a GOP size of 2 on the set of test sequences, the average bitrate saving of the proposed codec is 35.5% on WZ...

  16. Linear calculations of edge current driven kink modes with BOUT++ code

    Energy Technology Data Exchange (ETDEWEB)

    Li, G. Q., E-mail: ligq@ipp.ac.cn; Xia, T. Y. [Institute of Plasma Physics, CAS, Hefei, Anhui 230031 (China); Lawrence Livermore National Laboratory, Livermore, California 94550 (United States); Xu, X. Q. [Lawrence Livermore National Laboratory, Livermore, California 94550 (United States); Snyder, P. B.; Turnbull, A. D. [General Atomics, San Diego, California 92186 (United States); Ma, C. H.; Xi, P. W. [Lawrence Livermore National Laboratory, Livermore, California 94550 (United States); FSC, School of Physics, Peking University, Beijing 100871 (China)

    2014-10-15

    This work extends previous BOUT++ work to systematically study the impact of edge current density on edge localized modes, and to benchmark with the GATO and ELITE codes. Using the CORSICA code, a set of equilibria was generated with different edge current densities by keeping total current and pressure profile fixed. Based on these equilibria, the effects of the edge current density on the MHD instabilities were studied with the 3-field BOUT++ code. For the linear calculations, with increasing edge current density, the dominant modes are changed from intermediate-n and high-n ballooning modes to low-n kink modes, and the linear growth rate becomes smaller. The edge current provides stabilizing effects on ballooning modes due to the increase of local shear at the outer mid-plane with the edge current. For edge kink modes, however, the edge current does not always provide a destabilizing effect; with increasing edge current, the linear growth rate first increases, and then decreases. In benchmark calculations for BOUT++ against the linear results with the GATO and ELITE codes, the vacuum model has important effects on the edge kink mode calculations. By setting a realistic density profile and Spitzer resistivity profile in the vacuum region, the resistivity was found to have a destabilizing effect on both the kink mode and on the ballooning mode. With diamagnetic effects included, the intermediate-n and high-n ballooning modes can be totally stabilized for finite edge current density.

  17. Linear calculations of edge current driven kink modes with BOUT++ code

    Science.gov (United States)

    Li, G. Q.; Xu, X. Q.; Snyder, P. B.; Turnbull, A. D.; Xia, T. Y.; Ma, C. H.; Xi, P. W.

    2014-10-01

    This work extends previous BOUT++ work to systematically study the impact of edge current density on edge localized modes, and to benchmark with the GATO and ELITE codes. Using the CORSICA code, a set of equilibria was generated with different edge current densities by keeping total current and pressure profile fixed. Based on these equilibria, the effects of the edge current density on the MHD instabilities were studied with the 3-field BOUT++ code. For the linear calculations, with increasing edge current density, the dominant modes are changed from intermediate-n and high-n ballooning modes to low-n kink modes, and the linear growth rate becomes smaller. The edge current provides stabilizing effects on ballooning modes due to the increase of local shear at the outer mid-plane with the edge current. For edge kink modes, however, the edge current does not always provide a destabilizing effect; with increasing edge current, the linear growth rate first increases, and then decreases. In benchmark calculations for BOUT++ against the linear results with the GATO and ELITE codes, the vacuum model has important effects on the edge kink mode calculations. By setting a realistic density profile and Spitzer resistivity profile in the vacuum region, the resistivity was found to have a destabilizing effect on both the kink mode and on the ballooning mode. With diamagnetic effects included, the intermediate-n and high-n ballooning modes can be totally stabilized for finite edge current density.

  18. "Hour of Code": Can It Change Students' Attitudes toward Programming?

    Science.gov (United States)

    Du, Jie; Wimmer, Hayden; Rada, Roy

    2016-01-01

    The Hour of Code is a one-hour introduction to computer science organized by Code.org, a non-profit dedicated to expanding participation in computer science. This study investigated the impact of the Hour of Code on students' attitudes towards computer programming and their knowledge of programming. A sample of undergraduate students from two…

  19. Development of Workbench Programs for CUPID1.7 Code

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Yun Je; Park, Ik Kyu; Lee, Jae Ryong; Lee Seung Jun; Yoon, Han Young [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2013-10-15

    The CUPID1.7 code input is based on the text mode and not only needs pre-processing for grid generation but also post-processing for visualization of calculation results. Therefore, the integrated platform is required to deal with a series of work from pre-processing to post-processing in the manner of a graphical user interface (GUI). With the upgraded of CUPID1.6 to CUPID1.7, the workbench program was developed. Using the CUPID1.7 workbench, users conveniently perform a series of work for CUPID1.7 calculation from the pre-process to the post-process. Because the current version of CUPID1.7 workbench has some functional restrictions according to the hardware, OS, and problems, continuous updates will be conducted through the feedback from users groups. A component-scale thermal hydraulic analysis code, CUPID 1.7 (Component Unstructured Program for Interfacial Dynamics 1.7), was recently distributed in an upgraded version. The most noticeable change of the CUPID1.7 compared to CUPID1.6 is that a parallel calculation based on the Message Passing Interface (MPI) is supported. In addition, the workbench program for the CUPID1.7 (CUPID1.7 workbench) was developed.

  20. Tagalog-English Code Switching as a Mode of Discourse

    Science.gov (United States)

    Bautista, Maria Lourdes S.

    2004-01-01

    The alternation of Tagalog and English in informal discourse is a feature of the linguistic repertoire of educated, middle- and upper-class Filipinos. This paper describes the linguistic structure and sociolinguistic functions of Tagalog-English code switching (Taglish) as provided by various researchers through the years. It shows that the…

  1. New Class of Quantum Error-Correcting Codes for a Bosonic Mode

    Science.gov (United States)

    Michael, Marios H.; Silveri, Matti; Brierley, R. T.; Albert, Victor V.; Salmilehto, Juha; Jiang, Liang; Girvin, S. M.

    2016-07-01

    We construct a new class of quantum error-correcting codes for a bosonic mode, which are advantageous for applications in quantum memories, communication, and scalable computation. These "binomial quantum codes" are formed from a finite superposition of Fock states weighted with binomial coefficients. The binomial codes can exactly correct errors that are polynomial up to a specific degree in bosonic creation and annihilation operators, including amplitude damping and displacement noise as well as boson addition and dephasing errors. For realistic continuous-time dissipative evolution, the codes can perform approximate quantum error correction to any given order in the time step between error detection measurements. We present an explicit approximate quantum error recovery operation based on projective measurements and unitary operations. The binomial codes are tailored for detecting boson loss and gain errors by means of measurements of the generalized number parity. We discuss optimization of the binomial codes and demonstrate that by relaxing the parity structure, codes with even lower unrecoverable error rates can be achieved. The binomial codes are related to existing two-mode bosonic codes, but offer the advantage of requiring only a single bosonic mode to correct amplitude damping as well as the ability to correct other errors. Our codes are similar in spirit to "cat codes" based on superpositions of the coherent states but offer several advantages such as smaller mean boson number, exact rather than approximate orthonormality of the code words, and an explicit unitary operation for repumping energy into the bosonic mode. The binomial quantum codes are realizable with current superconducting circuit technology, and they should prove useful in other quantum technologies, including bosonic quantum memories, photonic quantum communication, and optical-to-microwave up- and down-conversion.

  2. New Class of Quantum Error-Correcting Codes for a Bosonic Mode

    Directory of Open Access Journals (Sweden)

    Marios H. Michael

    2016-07-01

    Full Text Available We construct a new class of quantum error-correcting codes for a bosonic mode, which are advantageous for applications in quantum memories, communication, and scalable computation. These “binomial quantum codes” are formed from a finite superposition of Fock states weighted with binomial coefficients. The binomial codes can exactly correct errors that are polynomial up to a specific degree in bosonic creation and annihilation operators, including amplitude damping and displacement noise as well as boson addition and dephasing errors. For realistic continuous-time dissipative evolution, the codes can perform approximate quantum error correction to any given order in the time step between error detection measurements. We present an explicit approximate quantum error recovery operation based on projective measurements and unitary operations. The binomial codes are tailored for detecting boson loss and gain errors by means of measurements of the generalized number parity. We discuss optimization of the binomial codes and demonstrate that by relaxing the parity structure, codes with even lower unrecoverable error rates can be achieved. The binomial codes are related to existing two-mode bosonic codes, but offer the advantage of requiring only a single bosonic mode to correct amplitude damping as well as the ability to correct other errors. Our codes are similar in spirit to “cat codes” based on superpositions of the coherent states but offer several advantages such as smaller mean boson number, exact rather than approximate orthonormality of the code words, and an explicit unitary operation for repumping energy into the bosonic mode. The binomial quantum codes are realizable with current superconducting circuit technology, and they should prove useful in other quantum technologies, including bosonic quantum memories, photonic quantum communication, and optical-to-microwave up- and down-conversion.

  3. Source Code Author Attribution Using Author’s Programming Style and Code Smells

    OpenAIRE

    Muqaddas Gull; Tehseen Zia; Muhammad Ilyas

    2017-01-01

    Source code is an intellectual property and using it without author’s permission is a violation of property right. Source code authorship attribution is vital for dealing with software theft, copyright issues and piracies. Characterizing author’s signature for identifying their footprints is the core task of authorship attribution. Different aspects of source code have been considered for characterizing signatures including author’s coding style and programming structu...

  4. Coding Metamaterials, Digital Metamaterials and Programming Metamaterials

    OpenAIRE

    Cui, Tie Jun; Qi, Mei Qing; Wan, Xiang; Zhao, Jie; Cheng, Qiang

    2014-01-01

    As artificial structures, metamaterials are usually described by macroscopic effective medium parameters, which are named as "analog metamaterials". Here, we propose "digital metamaterials" in two steps. Firstly, we present "coding metamaterials" that are composed of only two kinds of unit cells with 0 and {\\pi} phase responses, which we name as "0" and "1" elements. By coding "0" and "1" elements with controlled sequences (i.e., 1-bit coding), we can manipulate electromagnetic (EM) waves and...

  5. The Application Programming Interface for the PVMEXEC Program and Associated Code Coupling System

    Energy Technology Data Exchange (ETDEWEB)

    Walter L. Weaver III

    2005-03-01

    This report describes the Application Programming Interface for the PVMEXEC program and the code coupling systems that it implements. The information in the report is intended for programmers wanting to add a new code into the coupling system.

  6. On the linear programming bound for linear Lee codes.

    Science.gov (United States)

    Astola, Helena; Tabus, Ioan

    2016-01-01

    Based on an invariance-type property of the Lee-compositions of a linear Lee code, additional equality constraints can be introduced to the linear programming problem of linear Lee codes. In this paper, we formulate this property in terms of an action of the multiplicative group of the field [Formula: see text] on the set of Lee-compositions. We show some useful properties of certain sums of Lee-numbers, which are the eigenvalues of the Lee association scheme, appearing in the linear programming problem of linear Lee codes. Using the additional equality constraints, we formulate the linear programming problem of linear Lee codes in a very compact form, leading to a fast execution, which allows to efficiently compute the bounds for large parameter values of the linear codes.

  7. Fast Program Codes Dissemination for Smart Wireless Software Defined Networks

    Directory of Open Access Journals (Sweden)

    Xiao Liu

    2016-01-01

    Full Text Available In smart wireless software defined networks (WSDNs, sensor nodes are deployed in the monitored area to sense data. In order to increase the flexibility of WSDNs configuration, sensor nodes use programmable technology. Thus, programming and software engineering that integrate Internet of Things (IoT lead to a smart world. Due to the large capacity of program codes and the limited energy of wireless network, only a subset of nodes is selected to spread program codes, and the remaining nodes are in sleep status to save energy. In this paper, a fast program codes dissemination (FPCD scheme for smart wireless software defined networking is proposed; many nodes in the area far from the sink will be selected to spread program codes; those areas have much energy left, while the area near the sink chooses less number of active nodes to spread program codes to save energy. Thus, FPCD scheme can reduce delay for spreading program codes while retaining network lifetime. The theoretical analysis and experimental results show that our approach can reduce transmission delay by 10.76%–105.791% while retaining network lifetime compares with previous broadcast schemes.

  8. Argonne Code Center: compilation of program abstracts

    Energy Technology Data Exchange (ETDEWEB)

    Butler, M.K.; DeBruler, M.; Edwards, H.S.; Harrison, C. Jr.; Hughes, C.E.; Jorgensen, R.; Legan, M.; Menozzi, T.; Ranzini, L.; Strecok, A.J.

    1977-08-01

    This publication is the eleventh supplement to, and revision of, ANL-7411. It contains additional abstracts and revisions to some earlier abstracts and other pages. Sections of the complete document ANL-7411 are as follows: preface, history and acknowledgements, abstract format, recommended program package contents, program classification guide and thesaurus, and the abstract collection. (RWR)

  9. Argonne Code Center: compilation of program abstracts

    Energy Technology Data Exchange (ETDEWEB)

    Butler, M.K.; DeBruler, M.; Edwards, H.S.

    1976-08-01

    This publication is the tenth supplement to, and revision of, ANL-7411. It contains additional abstracts and revisions to some earlier abstracts and other pages. Sections of the document are as follows: preface; history and acknowledgements; abstract format; recommended program package contents; program classification guide and thesaurus; and abstract collection. (RWR)

  10. Comparison of a Structured-LES and an Unstructured-DES Code for Predicting Combustion Instabilities in a Longitudinal Mode Rocket

    Science.gov (United States)

    2014-12-01

    Structured-LES and an Unstructured-DES Code for Predicting Combustion Instabilities in a Longitudinal Mode Rocket 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NO. Air Force Research Laboratory (AFMC) AFRL/RQRC 10 E. Saturn Blvd...THIS PAGE Unclassified SAR 28 19b. TELEPHONE NO (include area code ) 661-275-6174 Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std

  11. Expanding Dress Code Requirements in the Doctor of Pharmacy Program

    National Research Council Canada - National Science Library

    Cynthia A Naughton

    2017-01-01

    "1 We initiated this article to address both the potential advantages and disadvantages to implementing a dress code to facilitate a discussion surrounding this topic and to assist programs that might...

  12. PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODES

    Directory of Open Access Journals (Sweden)

    Denys Samoilenko

    2016-06-01

    Full Text Available Purpose: One of the most actual trends in program code protection is code marking. The problem consists in creation of some digital “watermarks” which allow distinguishing different copies of the same program codes. Such marks could be useful for authority protection, for code copies numbering, for program propagation monitoring, for information security proposes in client-server communication processes. Methods: We used the methods of digital steganography adopted for program codes as text objects. The same-shape symbols method was transformed to same-semantic element method due to codes features which makes them different from ordinary texts. We use dynamic principle of marks forming making codes similar to be polymorphic. Results: We examined the combinatorial capacity of permutations possible in program codes. As a result it was shown that the set of 5-7 polymorphic variables is suitable for the most modern network applications. Marks creation and restoration algorithms where proposed and discussed. The main algorithm is based on full and partial permutations in variables names and its declaration order. Algorithm for partial permutation enumeration was optimized for calculation complexity. PHP code fragments which realize the algorithms were listed. Discussion: Methodic proposed in the work allows distinguishing of each client-server connection. In a case if a clone of some network resource was found the methodic could give information about included marks and thereby data on IP, date and time, authentication information of client copied the resource. Usage of polymorphic stego-watermarks should improve information security indexes in network communications.

  13. Translating programming languages for intermediate codes

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available Many of the important data structures used in a compiler are intermediate representations of the program being compiled. Often these representations take the form of trees, with several node types, each of which has different attributes. Tree representations can be described with grammars, just like programming languages. For each grammar rule, there is one constructor that belongs to the class for its left-hand-side symbol. I simply extend the abstract class with a concrete class for each grammar rule. Each grammar rule has right hand side components that must be represented in the data structures.

  14. Collective Code Bookmarks for Program Comprehension

    NARCIS (Netherlands)

    Guzzi, A.; Hattori, L.; Lanza, M.; Pinzger, M.; Van Deursen, A.

    2011-01-01

    The program comprehension research community has been developing useful tools and techniques to support developers in the time-consuming activity of understanding software artifacts. However, the majority of the tools do not bring collective benefit to the team: After gaining the necessary

  15. Epigenetic codes programming class switch recombination

    Directory of Open Access Journals (Sweden)

    Bharat eVaidyanathan

    2015-09-01

    Full Text Available Class switch recombination imparts B cells with a fitness-associated adaptive advantage during a humoral immune response by using a precision-tailored DNA excision and ligation process to swap the default constant region gene of the antibody with a new one that has unique effector functions. This secondary diversification of the antibody repertoire is a hallmark of the adaptability of B cells when confronted with environmental and pathogenic challenges. Given that the nucleotide sequence of genes during class switching remains unchanged (genetic constraints, it is logical and necessary therefore, to integrate the adaptability of B cells to an epigenetic state, which is dynamic and can be heritably modulated before, after or even during an antibody-dependent immune response. Epigenetic regulation encompasses heritable changes that affect function (phenotype without altering the sequence information embedded in a gene, and include histone, DNA and RNA modifications. Here, we review current literature on how B cells use an epigenetic code language as a means to ensure antibody plasticity in light of pathogenic insults.

  16. Characterization of LDPC-coded orbital angular momentum modes transmission and multiplexing over a 50-km fiber.

    Science.gov (United States)

    Wang, Andong; Zhu, Long; Chen, Shi; Du, Cheng; Mo, Qi; Wang, Jian

    2016-05-30

    Mode-division multiplexing over fibers has attracted increasing attention over the last few years as a potential solution to further increase fiber transmission capacity. In this paper, we demonstrate the viability of orbital angular momentum (OAM) modes transmission over a 50-km few-mode fiber (FMF). By analyzing mode properties of eigen modes in an FMF, we study the inner mode group differential modal delay (DMD) in FMF, which may influence the transmission capacity in long-distance OAM modes transmission and multiplexing. To mitigate the impact of large inner mode group DMD in long-distance fiber-based OAM modes transmission, we use low-density parity-check (LDPC) codes to increase the system reliability. By evaluating the performance of LDPC-coded single OAM mode transmission over 50-km fiber, significant coding gains of >4 dB, 8 dB and 14 dB are demonstrated for 1-Gbaud, 2-Gbaud and 5-Gbaud quadrature phase-shift keying (QPSK) signals, respectively. Furthermore, in order to verify and compare the influence of DMD in long-distance fiber transmission, single OAM mode transmission over 10-km FMF is also demonstrated in the experiment. Finally, we experimentally demonstrate OAM multiplexing and transmission over a 50-km FMF using LDPC-coded 1-Gbaud QPSK signals to compensate the influence of mode crosstalk and DMD in the 50 km FMF.

  17. Wall-touching kink mode calculations with the M3D code

    Energy Technology Data Exchange (ETDEWEB)

    Breslau, J. A., E-mail: jbreslau@pppl.gov; Bhattacharjee, A. [Princeton Plasma Physics Laboratory, Princeton, New Jersey 08542 (United States)

    2015-06-15

    This paper seeks to address a controversy regarding the applicability of the 3D nonlinear extended MHD code M3D [W. Park et al., Phys. Plasmas 6, 1796 (1999)] and similar codes to calculations of the electromagnetic interaction of a disrupting tokamak plasma with the surrounding vessel structures. M3D is applied to a simple test problem involving an external kink mode in an ideal cylindrical plasma, used also by the Disruption Simulation Code (DSC) as a model case for illustrating the nature of transient vessel currents during a major disruption. While comparison of the results with those of the DSC is complicated by effects arising from the higher dimensionality and complexity of M3D, we verify that M3D is capable of reproducing both the correct saturation behavior of the free boundary kink and the “Hiro” currents arising when the kink interacts with a conducting tile surface interior to the ideal wall.

  18. FDNS CFD Code Benchmark for RBCC Ejector Mode Operation: Continuing Toward Dual Rocket Effects

    Science.gov (United States)

    West, Jeff; Ruf, Joseph H.; Turner, James E. (Technical Monitor)

    2000-01-01

    Computational Fluid Dynamics (CFD) analysis results are compared with benchmark quality test data from the Propulsion Engineering Research Center's (PERC) Rocket Based Combined Cycle (RBCC) experiments to verify fluid dynamic code and application procedures. RBCC engine flowpath development will rely on CFD applications to capture the multi -dimensional fluid dynamic interactions and to quantify their effect on the RBCC system performance. Therefore, the accuracy of these CFD codes must be determined through detailed comparisons with test data. The PERC experiments build upon the well-known 1968 rocket-ejector experiments of Odegaard and Stroup by employing advanced optical and laser based diagnostics to evaluate mixing and secondary combustion. The Finite Difference Navier Stokes (FDNS) code [2] was used to model the fluid dynamics of the PERC RBCC ejector mode configuration. Analyses were performed for the Diffusion and Afterburning (DAB) test conditions at the 200-psia thruster operation point, Results with and without downstream fuel injection are presented.

  19. Comparison of MHD simulation codes for understanding nonlinear ELMs dynamics in KSTAR H-mode plasma

    Science.gov (United States)

    Kim, M.; Lee, J.; Park, H. K.; Yun, G. S.; Xu, X.; Jardin, S. C.; Becoulet, M.

    2017-10-01

    KSTAR electron cyclotron emission imaging (ECEI) systems have contributed to understanding the fundamental physics of ELMs by high-quality 2D and quasi-3D images of ELMs. However, in the highly nonlinear phase of ELM dynamics, the interpretation of ECE signals becomes complicated intrinsically. Theoretical and numerical approaches are necessary to enhance the understanding of ELM physics. Well-established MHD codes (BOUT + + , JOREK, and M3D-C1) are introduced for comparative study with the observations. The nonlinear solutions are obtained using the same equilibrium of the KSTAR H-mode plasma. Each code shows the partial difference in mode evolution, probably, due to the difference in optimized operation window of initial conditions. The nonlinear simulation results show that low- n (n < 5) modes becomes dominant close to pedestal collapse. The mode evolution in the simulations qualitatively matches with the recent ECEI observation just before ELM-crash, or excitation of non-modal solitary perturbation (typically, n = 1) which is highly localized in poloidal and toroidal. Regardless of differences in details, qualitative similarity can provide inspiration to understand the triggering of ELM-crash. This work is supported by NRF of Korea under Contract No. NRF-2014M1A7A1A03029865.

  20. Stability of Finite-n Global Magnetohydrodynamic Modes Using the GATO Stability Code

    Science.gov (United States)

    Chu, M. S.; Wong, S. K.; Lao, L. L.; Turnbull, A. D.; Chance, M. S.

    1999-11-01

    This work extends the capability of the GATO stability code(L.C.Bernard et al.), Comput. Phys. Commun. 24, 377 (1981). to analyze realistic numerical tokamak equilibria for their stability to higher n ( ~5--10) MHD modes. This is motivated by the experimental evidence of these modes being relevant for both plasma termination and the behavior of ELMs. The ballooning angle transformation(R. Gruber et al.), Comput. Phys. Commun. 24, 363 (1981). is applied to the displacement variables in the GATO representation. The potential energy matrix is constructed with the inclusion of extra mapping quantities. The vacuum energy computed from the Green's function is also modified to couple to the transformed displacement at the plasma boundary. The resultant eigenvalue problem is solved with the modified boundary condition in the poloidal direction suitable for these transformed variables. The dependence of the plasma stability as a function of toroidal mode number and plasma equilibrium properties will be presented.

  1. Expanding Dress Code Requirements in the Doctor of Pharmacy Program.

    Science.gov (United States)

    Naughton, Cynthia A; Schweiger, Teresa A; Angelo, Lauren B; Lea Bonner, C; Dhing, Conrad W; Farley, Joel F

    2016-06-25

    Although the use of a professional dress code is standard practice across colleges and schools of pharmacy during introductory and advanced pharmacy practice experiences, requiring professional attire is not applied consistently during the didactic portion of students' education. There are arguments for and against the adoption of a professional dress code throughout the entire doctor of pharmacy program, including the classroom setting. Given uncertainty regarding the potential benefits and challenges that may arise from adopting a professional dress code in the didactic portion of a student pharmacist's education, it is perhaps not surprising that programs adopt disparate policies regarding its use. This exploration was conducted as part of a series of debates held in conjunction with the American Association of Colleges of Pharmacy's (AACP) Academic Leadership Fellows Program (ALFP) and was presented at the 2015 AACP Interim Meeting on February 7, 2015.

  2. The NEST Dry-Run Mode: Efficient Dynamic Analysis of Neuronal Network Simulation Code

    Science.gov (United States)

    Kunkel, Susanne; Schenck, Wolfram

    2017-01-01

    NEST is a simulator for spiking neuronal networks that commits to a general purpose approach: It allows for high flexibility in the design of network models, and its applications range from small-scale simulations on laptops to brain-scale simulations on supercomputers. Hence, developers need to test their code for various use cases and ensure that changes to code do not impair scalability. However, running a full set of benchmarks on a supercomputer takes up precious compute-time resources and can entail long queuing times. Here, we present the NEST dry-run mode, which enables comprehensive dynamic code analysis without requiring access to high-performance computing facilities. A dry-run simulation is carried out by a single process, which performs all simulation steps except communication as if it was part of a parallel environment with many processes. We show that measurements of memory usage and runtime of neuronal network simulations closely match the corresponding dry-run data. Furthermore, we demonstrate the successful application of the dry-run mode in the areas of profiling and performance modeling. PMID:28701946

  3. The NEST Dry-Run Mode: Efficient Dynamic Analysis of Neuronal Network Simulation Code.

    Science.gov (United States)

    Kunkel, Susanne; Schenck, Wolfram

    2017-01-01

    NEST is a simulator for spiking neuronal networks that commits to a general purpose approach: It allows for high flexibility in the design of network models, and its applications range from small-scale simulations on laptops to brain-scale simulations on supercomputers. Hence, developers need to test their code for various use cases and ensure that changes to code do not impair scalability. However, running a full set of benchmarks on a supercomputer takes up precious compute-time resources and can entail long queuing times. Here, we present the NEST dry-run mode, which enables comprehensive dynamic code analysis without requiring access to high-performance computing facilities. A dry-run simulation is carried out by a single process, which performs all simulation steps except communication as if it was part of a parallel environment with many processes. We show that measurements of memory usage and runtime of neuronal network simulations closely match the corresponding dry-run data. Furthermore, we demonstrate the successful application of the dry-run mode in the areas of profiling and performance modeling.

  4. The NEST Dry-Run Mode: Efficient Dynamic Analysis of Neuronal Network Simulation Code

    Directory of Open Access Journals (Sweden)

    Susanne Kunkel

    2017-06-01

    Full Text Available NEST is a simulator for spiking neuronal networks that commits to a general purpose approach: It allows for high flexibility in the design of network models, and its applications range from small-scale simulations on laptops to brain-scale simulations on supercomputers. Hence, developers need to test their code for various use cases and ensure that changes to code do not impair scalability. However, running a full set of benchmarks on a supercomputer takes up precious compute-time resources and can entail long queuing times. Here, we present the NEST dry-run mode, which enables comprehensive dynamic code analysis without requiring access to high-performance computing facilities. A dry-run simulation is carried out by a single process, which performs all simulation steps except communication as if it was part of a parallel environment with many processes. We show that measurements of memory usage and runtime of neuronal network simulations closely match the corresponding dry-run data. Furthermore, we demonstrate the successful application of the dry-run mode in the areas of profiling and performance modeling.

  5. A program evaluation of classroom data collection with bar codes.

    Science.gov (United States)

    Saunders, M D; Saunders, J L; Saunders, R R

    1993-01-01

    A technology incorporating bar code symbols and hand-held optical scanners was evaluated for its utility for routine data collection in a special education classroom. A different bar code symbol was created for each Individualized Educational Plan objective, each type of response occurrence, and each student in the first author's classroom. These symbols were organized by activity and printed as data sheets. The teacher and paraprofessionals scanned relevant codes with scanners when the students emitted targeted behaviors. The codes, dates, and approximate times of the scans were retained in the scanner's electronic memory until they could be transferred by communication software to a computer file. The data from the computer file were organized weekly into a printed report of student performance using a program written with commercially available database software. Advantages, disadvantages, and costs of using the system are discussed.

  6. A distributed implementation of a mode switching control program

    DEFF Research Database (Denmark)

    Holdgaard, Michael; Eriksen, Thomas Juul; Ravn, Anders P.

    1995-01-01

    A distributed implementation of a mode switched control program for a robot is described. The design of the control program is given by a set of real-time automatons. One of them plans a schedule for switching between a fixed set of control functions, another dispatches the control functions...

  7. A Mode Propagation Database Suitable for Code Validation Utilizing the NASA Glenn Advanced Noise Control Fan and Artificial Sources

    Science.gov (United States)

    Sutliff, Daniel L.

    2014-01-01

    The NASA Glenn Research Center's Advanced Noise Control Fan (ANCF) was developed in the early 1990s to provide a convenient test bed to measure and understand fan-generated acoustics, duct propagation, and radiation to the farfield. A series of tests were performed primarily for the use of code validation and tool validation. Rotating Rake mode measurements were acquired for parametric sets of: (i) mode blockage, (ii) liner insertion loss, (iii) short ducts, and (iv) mode reflection.

  8. ADIFOR–Generating Derivative Codes from Fortran Programs

    Directory of Open Access Journals (Sweden)

    Christian Bischof

    1992-01-01

    Full Text Available The numerical methods employed in the solution of many scientific computing problems require the computation of derivatives of a function f Rn→Rm. Both the accuracy and the computational requirements of the derivative computation are usually of critical importance for the robustness and speed of the numerical solution. Automatic Differentiation of FORtran (ADIFOR is a source transformation tool that accepts Fortran 77 code for the computation of a function and writes portable Fortran 77 code for the computation of the derivatives. In contrast to previous approaches, ADIFOR views automatic differentiation as a source transformation problem. ADIFOR employs the data analysis capabilities of the ParaScope Parallel Programming Environment, which enable us to handle arbitrary Fortran 77 codes and to exploit the computational context in the computation of derivatives. Experimental results show that ADIFOR can handle real-life codes and that ADIFOR-generated codes are competitive with divided-difference approximations of derivatives. In addition, studies suggest that the source transformation approach to automatic differentiation may improve the time to compute derivatives by orders of magnitude.

  9. Intra Frame Coding In Advanced Video Coding Standard (H.264) to Obtain Consistent PSNR and Reduce Bit Rate for Diagonal Down Left Mode Using Gaussian Pulse

    Science.gov (United States)

    Manjanaik, N.; Parameshachari, B. D.; Hanumanthappa, S. N.; Banu, Reshma

    2017-08-01

    Intra prediction process of H.264 video coding standard used to code first frame i.e. Intra frame of video to obtain good coding efficiency compare to previous video coding standard series. More benefit of intra frame coding is to reduce spatial pixel redundancy with in current frame, reduces computational complexity and provides better rate distortion performance. To code Intra frame it use existing process Rate Distortion Optimization (RDO) method. This method increases computational complexity, increases in bit rate and reduces picture quality so it is difficult to implement in real time applications, so the many researcher has been developed fast mode decision algorithm for coding of intra frame. The previous work carried on Intra frame coding in H.264 standard using fast decision mode intra prediction algorithm based on different techniques was achieved increased in bit rate, degradation of picture quality(PSNR) for different quantization parameters. Many previous approaches of fast mode decision algorithms on intra frame coding achieved only reduction of computational complexity or it save encoding time and limitation was increase in bit rate with loss of quality of picture. In order to avoid increase in bit rate and loss of picture quality a better approach was developed. In this paper developed a better approach i.e. Gaussian pulse for Intra frame coding using diagonal down left intra prediction mode to achieve higher coding efficiency in terms of PSNR and bitrate. In proposed method Gaussian pulse is multiplied with each 4x4 frequency domain coefficients of 4x4 sub macro block of macro block of current frame before quantization process. Multiplication of Gaussian pulse for each 4x4 integer transformed coefficients at macro block levels scales the information of the coefficients in a reversible manner. The resulting signal would turn abstract. Frequency samples are abstract in a known and controllable manner without intermixing of coefficients, it avoids

  10. High-Power Microwave Transmission and Mode Conversion Program

    Energy Technology Data Exchange (ETDEWEB)

    Vernon, Ronald J. [Univ. of Wisconsin, Madison, WI (United States)

    2015-08-14

    This is a final technical report for a long term project to develop improved designs and design tools for the microwave hardware and components associated with the DOE Plasma Fusion Program. We have developed basic theory, software, fabrication techniques, and low-power measurement techniques for the design of microwave hardware associated gyrotrons, microwave mode converters and high-power microwave transmission lines. Specifically, in this report we discuss our work on designing quasi-optical mode converters for single and multiple frequencies, a new method for the analysis of perturbed-wall waveguide mode converters, perturbed-wall launcher design for TE0n mode gyrotrons, quasi-optical traveling-wave resonator design for high-power testing of microwave components, and possible improvements to the HSX microwave transmission line.

  11. Programming peptidomimetic syntheses by translating genetic codes designed de novo.

    Science.gov (United States)

    Forster, Anthony C; Tan, Zhongping; Nalam, Madhavi N L; Lin, Hening; Qu, Hui; Cornish, Virginia W; Blacklow, Stephen C

    2003-05-27

    Although the universal genetic code exhibits only minor variations in nature, Francis Crick proposed in 1955 that "the adaptor hypothesis allows one to construct, in theory, codes of bewildering variety." The existing code has been expanded to enable incorporation of a variety of unnatural amino acids at one or two nonadjacent sites within a protein by using nonsense or frameshift suppressor aminoacyl-tRNAs (aa-tRNAs) as adaptors. However, the suppressor strategy is inherently limited by compatibility with only a small subset of codons, by the ways such codons can be combined, and by variation in the efficiency of incorporation. Here, by preventing competing reactions with aa-tRNA synthetases, aa-tRNAs, and release factors during translation and by using nonsuppressor aa-tRNA substrates, we realize a potentially generalizable approach for template-encoded polymer synthesis that unmasks the substantially broader versatility of the core translation apparatus as a catalyst. We show that several adjacent, arbitrarily chosen sense codons can be completely reassigned to various unnatural amino acids according to de novo genetic codes by translating mRNAs into specific peptide analog polymers (peptidomimetics). Unnatural aa-tRNA substrates do not uniformly function as well as natural substrates, revealing important recognition elements for the translation apparatus. Genetic programming of peptidomimetic synthesis should facilitate mechanistic studies of translation and may ultimately enable the directed evolution of small molecules with desirable catalytic or pharmacological properties.

  12. Fast Mode Decision in the HEVC Video Coding Standard by Exploiting Region with Dominated Motion and Saliency Features.

    Science.gov (United States)

    Podder, Pallab Kanti; Paul, Manoranjan; Murshed, Manzur

    2016-01-01

    The emerging High Efficiency Video Coding (HEVC) standard introduces a number of innovative and powerful coding tools to acquire better compression efficiency compared to its predecessor H.264. The encoding time complexities have also increased multiple times that is not suitable for realtime video coding applications. To address this limitation, this paper employs a novel coding strategy to reduce the time complexity in HEVC encoder by efficient selection of appropriate block-partitioning modes based on human visual features (HVF). The HVF in the proposed technique comprise with human visual attention modelling-based saliency feature and phase correlation-based motion features. The features are innovatively combined through a fusion process by developing a content-based adaptive weighted cost function to determine the region with dominated motion/saliency (RDMS)- based binary pattern for the current block. The generated binary pattern is then compared with a codebook of predefined binary pattern templates aligned to the HEVC recommended block-paritioning to estimate a subset of inter-prediction modes. Without exhaustive exploration of all modes available in the HEVC standard, only the selected subset of modes are motion estimated and motion compensated for a particular coding unit. The experimental evaluation reveals that the proposed technique notably down-scales the average computational time of the latest HEVC reference encoder by 34% while providing similar rate-distortion (RD) performance for a wide range of video sequences.

  13. Standards, building codes, and certification programs for solar technology applicatons

    Energy Technology Data Exchange (ETDEWEB)

    Riley, J. D.; Odland, R.; Barker, H.

    1979-07-01

    This report is a primer on solar standards development. It explains the development of standards, building code provisions, and certification programs and their relationship to the emerging solar technologies. These areas are important in the commercialization of solar technology because they lead to the attainment of two goals: the development of an industry infrastructure and consumer confidence. Standards activities in the four phases of the commercialization process (applied research, development, introduction, and diffusion) are discussed in relation to institutional issues. Federal policies have been in operation for a number of years to accelerate the development process for solar technology. These policies are discussed in light of the Office of Management and Budget (OMB) Circular on federal interaction with the voluntary consensus system, and in light of current activities of DOE, HUD, and other interested federal agencies. The appendices cover areas of specific interest to different audiences: activities on the state and local level; and standards, building codes, and certification programs for specific technologies. In addition, a contract for the development of a model solar document let by DOE to a model consortium is excerpted in the Appendix.

  14. Structural mode significance using INCA. [Interactive Controls Analysis computer program

    Science.gov (United States)

    Bauer, Frank H.; Downing, John P.; Thorpe, Christopher J.

    1990-01-01

    Structural finite element models are often too large to be used in the design and analysis of control systems. Model reduction techniques must be applied to reduce the structural model to manageable size. In the past, engineers either performed the model order reduction by hand or used distinct computer programs to retrieve the data, to perform the significance analysis and to reduce the order of the model. To expedite this process, the latest version of INCA has been expanded to include an interactive graphical structural mode significance and model order reduction capability.

  15. INSTRUMENTAL TOOLS FOR PROGRAM CODE DEVELOPMENT WRITTEN IN HIGH LEVEL PROGRAMMING LANGUAGE.

    Directory of Open Access Journals (Sweden)

    E.A. Alferov

    2010-11-01

    Full Text Available The paper presents the environment of demonstration of integrated environment for studying course «Basics of algorithmization and programming» (http://weboap.ksu.ks.ua, which allows execution of computational experiment to study the complexity and majorizability of sorting algorithms. We describe the design and development of new version of the application. Much attention is paid to the development component of the code editor, which will meet the current requirements of tools to write programs.

  16. Automatic Parallelization Tool: Classification of Program Code for Parallel Computing

    Directory of Open Access Journals (Sweden)

    Mustafa Basthikodi

    2016-04-01

    Full Text Available Performance growth of single-core processors has come to a halt in the past decade, but was re-enabled by the introduction of parallelism in processors. Multicore frameworks along with Graphical Processing Units empowered to enhance parallelism broadly. Couples of compilers are updated to developing challenges forsynchronization and threading issues. Appropriate program and algorithm classifications will have advantage to a great extent to the group of software engineers to get opportunities for effective parallelization. In present work we investigated current species for classification of algorithms, in that related work on classification is discussed along with the comparison of issues that challenges the classification. The set of algorithms are chosen which matches the structure with different issues and perform given task. We have tested these algorithms utilizing existing automatic species extraction toolsalong with Bones compiler. We have added functionalities to existing tool, providing a more detailed characterization. The contributions of our work include support for pointer arithmetic, conditional and incremental statements, user defined types, constants and mathematical functions. With this, we can retain significant data which is not captured by original speciesof algorithms. We executed new theories into the device, empowering automatic characterization of program code.

  17. INL Experimental Program Roadmap for Thermal Hydraulic Code Validation

    Energy Technology Data Exchange (ETDEWEB)

    Glenn McCreery; Hugh McIlroy

    2007-09-01

    Advanced computer modeling and simulation tools and protocols will be heavily relied on for a wide variety of system studies, engineering design activities, and other aspects of the Next Generation Nuclear Power (NGNP) Very High Temperature Reactor (VHTR), the DOE Global Nuclear Energy Partnership (GNEP), and light-water reactors. The goal is for all modeling and simulation tools to be demonstrated accurate and reliable through a formal Verification and Validation (V&V) process, especially where such tools are to be used to establish safety margins and support regulatory compliance, or to design a system in a manner that reduces the role of expensive mockups and prototypes. Recent literature identifies specific experimental principles that must be followed in order to insure that experimental data meet the standards required for a “benchmark” database. Even for well conducted experiments, missing experimental details, such as geometrical definition, data reduction procedures, and manufacturing tolerances have led to poor Benchmark calculations. The INL has a long and deep history of research in thermal hydraulics, especially in the 1960s through 1980s when many programs such as LOFT and Semiscle were devoted to light-water reactor safety research, the EBRII fast reactor was in operation, and a strong geothermal energy program was established. The past can serve as a partial guide for reinvigorating thermal hydraulic research at the laboratory. However, new research programs need to fully incorporate modern experimental methods such as measurement techniques using the latest instrumentation, computerized data reduction, and scaling methodology. The path forward for establishing experimental research for code model validation will require benchmark experiments conducted in suitable facilities located at the INL. This document describes thermal hydraulic facility requirements and candidate buildings and presents examples of suitable validation experiments related

  18. An Interactive Preprocessor Program with Graphics for a Three-Dimensional Finite Element Code.

    Science.gov (United States)

    Hamilton, Claude Hayden, III

    The development and capabilities of an interactive preprocessor program with graphics for an existing three-dimensional finite element code is presented. This preprocessor program, EDGAP3D, is designed to be used in conjunction with the Texas Three Dimensional Grain Analysis Program (TXCAP3D). The code presented in this research is capable of the…

  19. Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming

    Science.gov (United States)

    Hattingh, Frederik; Buitendag, Albertus A. K.; van der Walt, Jacobus S.

    2013-01-01

    The transfer and teaching of programming and programming related skills has become, increasingly difficult on an undergraduate level over the past years. This is partially due to the number of programming languages available as well as access to readily available source code over the Web. Source code plagiarism is common practice amongst many…

  20. Matrix Algebras and Semidefinite Programming Techniques for Codes

    Science.gov (United States)

    Gijswijt, Dion

    2010-07-01

    This PhD thesis is concerned with SDP bounds for codes: upper bounds for (non)-binary error correcting codes and lower bounds for (non)-binary covering codes. The methods are based on the method of Schrijver that uses triple distances in stead of pairs as in the classical Delsarte bound. The main topics discussed are: 1) Block-diagonalisation of matrix *-algebras, 2) Terwilliger-algebra of the nonbinary Hamming scheme (including an explicit block-diagonalisation), 3) SDP-bounds for (nonbinary) error-correcting codes and covering codes (including computational results), 4) Discussion on the relation with matrix-cuts, 5) Computational results for Affine caps.

  1. BLAKE - A Thermodynamics Code Based on TIGER: Users' Guide to the Revised Program

    National Research Council Canada - National Science Library

    Freedman, Eli

    1998-01-01

    .... This code, which was derived from the original version of SRI's TIGER program, is intended primarily for making calculations on the combustion products from conventional military and electrically...

  2. 78 FR 7939 - Energy Conservation Program: Test Procedures for Microwave Ovens (Active Mode)

    Science.gov (United States)

    2013-02-04

    ... 430 Energy Conservation Program: Test Procedures for Microwave Ovens (Active Mode); Proposed Rule #0... Conservation Program: Test Procedures for Microwave Ovens (Active Mode) AGENCY: Office of Energy Efficiency and... mode energy use for microwave ovens, including both microwave-only ovens and convection microwave ovens...

  3. Expanding Dress Code Requirements in the Doctor of Pharmacy Program

    National Research Council Canada - National Science Library

    Naughton, Cynthia A; Schweiger, Teresa A; Angelo, Lauren B; Lea Bonner, C; Dhing, Conrad W; Farley, Joel F

    2016-01-01

    Although the use of a professional dress code is standard practice across colleges and schools of pharmacy during introductory and advanced pharmacy practice experiences, requiring professional attire...

  4. Fast mode decision for the H.264/AVC video coding standard based on frequency domain motion estimation

    Science.gov (United States)

    Abdelazim, Abdelrahman; Mein, Stephen J.; Varley, Martin R.; Ait-Boudaoud, Djamel

    2011-07-01

    The H.264 video coding standard achieves high performance compression and image quality at the expense of increased encoding complexity. Consequently, several fast mode decision and motion estimation techniques have been developed to reduce the computational cost. These approaches successfully reduce the computational time by reducing the image quality and/or increasing the bitrate. In this paper we propose a novel fast mode decision and motion estimation technique. The algorithm utilizes preprocessing frequency domain motion estimation in order to accurately predict the best mode and the search range. Experimental results show that the proposed algorithm significantly reduces the motion estimation time by up to 97%, while maintaining similar rate distortion performance when compared to the Joint Model software.

  5. Core-SOL simulations of L-mode tokamak plasma discharges using BALDUR code

    Directory of Open Access Journals (Sweden)

    Yutthapong Pinanroj

    2014-04-01

    Full Text Available Core-SOL simulations were carried out of plasma in tokamak reactors operating in a low confinement mode (L-mode, for various conditions that match available experimental data. The simulation results were quantitatively compared against experimental data, showing that the average RMS errors for electron temperature, ion temperature, and electron density were lower than 16% or less for 14 L-mode discharges from two tokamaks named DIII-D and TFTR. In the simulations, the core plasma transport was described using a combination of neoclassical transport calculated by NCLASS module and anomalous transport by Multi-Mode-Model version 2001 (MMM2001. The scrape-off-layer (SOL is the small amount of residual plasma that interacts with the tokamak vessel, and was simulated by integrating the fluid equations, including sources, along open field lines. The SOL solution provided the boundary conditions of core plasma region on low confinement mode (L-mode. The experimental data were for 14 L-mode discharges and from two tokamaks, named DIII-D and TFTR.

  6. Towards provably correct code generation for a hard real-time programming language

    DEFF Research Database (Denmark)

    Fränzle, Martin; Müller-Olm, Markus

    1994-01-01

    This paper sketches a hard real-time programming language featuring operators for expressing timeliness requirements in an abstract, implementation-independent way and presents parts of the design and verification of a provably correct code generator for that language. The notion of implementatio...... correctness used as an implicit specification of the code generator pays attention to timeliness requirements. Hence, formal verification of the code generator design is a guarantee of meeting all deadlines when executing generated code....

  7. Remodularizing Java Programs for Improved Locality of Feature Implementations in Source Code

    DEFF Research Database (Denmark)

    Olszak, Andrzej; Jørgensen, Bo Nørregaard

    2011-01-01

    Explicit traceability between features and source code is known to help programmers to understand and modify programs during maintenance tasks. However, the complex relations between features and their implementations are not evident from the source code of object-oriented Java programs. Conseque...

  8. A Case for Dynamic Reverse-code Generation to Debug Non-deterministic Programs

    Directory of Open Access Journals (Sweden)

    Jooyong Yi

    2013-09-01

    Full Text Available Backtracking (i.e., reverse execution helps the user of a debugger to naturally think backwards along the execution path of a program, and thinking backwards makes it easy to locate the origin of a bug. So far backtracking has been implemented mostly by state saving or by checkpointing. These implementations, however, inherently do not scale. Meanwhile, a more recent backtracking method based on reverse-code generation seems promising because executing reverse code can restore the previous states of a program without state saving. In the literature, there can be found two methods that generate reverse code: (a static reverse-code generation that pre-generates reverse code through static analysis before starting a debugging session, and (b dynamic reverse-code generation that generates reverse code by applying dynamic analysis on the fly during a debugging session. In particular, we espoused the latter one in our previous work to accommodate non-determinism of a program caused by e.g., multi-threading. To demonstrate the usefulness of our dynamic reverse-code generation, this article presents a case study of various backtracking methods including ours. We compare the memory usage of various backtracking methods in a simple but nontrivial example, a bounded-buffer program. In the case of non-deterministic programs such as this bounded-buffer program, our dynamic reverse-code generation outperforms the existing backtracking methods in terms of memory efficiency.

  9. New residential construction compliance: Evaluation of the Washington State Energy Code program

    Energy Technology Data Exchange (ETDEWEB)

    Warwick, W.M.; Lee, A.D.; Sandahl, L.J.; Durfee, D.L.; Richman, E.E.

    1993-07-01

    This report describes the Pacific Northwest Laboratory`s (PNL`s) evaluation of the Washington State Energy Code Program (WSECP). In 1990, the Washington State Legislature passed a residential energy efficiency code to be effective July 1, 1992. Bonneville supported passage and implementation of the code to ensure that new residences in the State of Washington were as energy efficient as economically feasible. The Washington State Energy Office (WSEO) is conducting the WSECP for Bonneville to support code implementation. This support takes several forms, including providing training to code enforcement officials, technical support both in the field and through telephone ``hot lines,`` and computerized tools to review house plans for code compliance. WSEO began implementing the WSECP in 1992, prior to the effective date of the new code. This first phase of the WSECP was the subject of an earlier process evaluation conducted by PNL. From that evaluation PNL found that most new homes being built immediately after the code went into effect were ``grand-fathered`` under the old code. The training program for the new code was in place and sessions were being attended by the jurisdictions but it was too early to determine if the training was effective in improving code compliance and easing the transition to the new energy code. That is the subject of this evaluation.

  10. Edge-preserving Intra mode for efficient depth map coding based on H.264/AVC

    DEFF Research Database (Denmark)

    Zamarin, Marco; Forchhammer, Søren

    2014-01-01

    Depth-image-based-rendering (DIBR) algorithms for 3D video communication systems based on the “multi-view video plus depth” format are very sensitive to the accuracy of depth information. Specifically, edge regions in the depth data should be preserved in the coding/decoding process to ensure good...

  11. Detecting plagiarism in program code and free text

    OpenAIRE

    Bandelj, Anej

    2014-01-01

    Lately we often hear allegations that a certain work is a plagiarism, hence I decided to describe this area in detail in my diploma thesis. First I define what precisely the term plagiarism means, in which areas it is present, how to limit it, and how to utilize software for its detection. I delve into the utility of software which detects details in source code and text documents. Such software does not determine plagiarism itself, but rather indicates the percentage of text or source code s...

  12. FLUKA A multi-particle transport code (program version 2005)

    CERN Document Server

    Ferrari, A; Fassò, A; Ranft, Johannes

    2005-01-01

    This report describes the 2005 version of the Fluka particle transport code. The first part introduces the basic notions, describes the modular structure of the system, and contains an installation and beginner’s guide. The second part complements this initial information with details about the various components of Fluka and how to use them. It concludes with a detailed history and bibliography.

  13. Experimental demonstration of entanglement assisted coding using a two-mode squeezed vacuum state

    OpenAIRE

    Mizuno, Jun; Wakui, Kentaro; Furusawa, Akira; Sasaki, Masahide

    2004-01-01

    We have experimentally realized the scheme initially proposed as quantum dense coding with continuous variables [Ban, J. Opt. B \\textbf{1}, L9 (1999), and Braunstein and Kimble, \\pra\\textbf{61}, 042302 (2000)]. In our experiment, a pair of EPR (Einstein-Podolski-Rosen) beams is generated from two independent squeezed vacua. After adding two-quadrature signal to one of the EPR beams, two squeezed beams that contain the signal were recovered. Although our squeezing level is not sufficient to de...

  14. A STUDY OF CODE SWITCHING AND CODE MIXING IN EFL CLASSROOM: A SURVEY OF CLASSROOM INTERACTION AT ENGLISH EDUCATION STUDY PROGRAM OF UIN RADEN FATAH PALEMBANG

    Directory of Open Access Journals (Sweden)

    Annisa Astrid

    2017-04-01

    Full Text Available The Study was conducted in oder to find out a phenomena of code switching and code mixing happened in EFL classrom. The writer collected the data from English Education Study Program of UIN Raden Fatah Palembang. Four classes were observed to have the phenomena of code switching and code mixing. A set of questionnaire was given to 120 students and 15 lecturers of English in order to assess their attitude and feedback toward the use of code switching and code mixing. The Results of the research study showed that the lecturers and the students employed code switching and code mixing in the interactions which happened along teaching and learning activities with various patterns and considerations. Finally the data from the questionnaire reflects the positive attitude toward the use of code switching and code mixing along teaching and learning activities in the classroom.

  15. Program visualization: bringing visual analysis to code development

    Science.gov (United States)

    Erbacher, Robert F.; Grinstein, Georges G.

    1999-03-01

    This paper focuses on the visualization of application code. The goal is to provide a visual representation of the code that relieves the user from having to rely solely on textual representations. The visual representation of code can be correlated with visual displays of the data and displayed simultaneously within a single display. This prevents the user from having to change perceptual contexts or focus to a separate window. The visualization techniques are themselves based on the familiar metaphor of picture frames. Since we wish to provide the application data within the same display, representing operations and instructions as a frame around the application data provides a merged display with the data and operations correlated in an unobtrusive manner. The borders also work well by matching with the human perceptual systems ability to differentiate and characterize edges. The borders can be as simple as rectangles with the characteristics of the rectangle (i.e., thickness, color, consistency, etc.) identifying the type of operation. Portions of the frame can be made representative of the underlying data (i.e., current and termination conditions).

  16. Computation of Program Source Code Similarity by Composition of Parse Tree and Call Graph

    Directory of Open Access Journals (Sweden)

    Hyun-Je Song

    2015-01-01

    Full Text Available This paper proposes a novel method to compute how similar two program source codes are. Since a program source code is represented as a structural form, the proposed method adopts convolution kernel functions as a similarity measure. Actually, a program source code has two kinds of structural information. One is syntactic information and the other is the dependencies of function calls lying on the program. Since the syntactic information of a program is expressed as its parse tree, the syntactic similarity between two programs is computed by a parse tree kernel. The function calls within a program provide a global structure of a program and can be represented as a graph. Therefore, the similarity of function calls is computed with a graph kernel. Then, both structural similarities are reflected simultaneously into comparing program source codes by composing the parse tree and the graph kernels based on a cyclomatic complexity. According to the experimental results on a real data set for program plagiarism detection, the proposed method is proved to be effective in capturing the similarity between programs. The experiments show that the plagiarized pairs of programs are found correctly and thoroughly by the proposed method.

  17. One ancestor for two codes viewed from the perspective of two complementary modes of tRNA aminoacylation

    Directory of Open Access Journals (Sweden)

    Szathmáry Eörs

    2009-01-01

    Full Text Available Abstract Background The genetic code is brought into action by 20 aminoacyl-tRNA synthetases. These enzymes are evenly divided into two classes (I and II that recognize tRNAs from the minor and major groove sides of the acceptor stem, respectively. We have reported recently that: (1 ribozymic precursors of the synthetases seem to have used the same two sterically mirror modes of tRNA recognition, (2 having these two modes might have helped in preventing erroneous aminoacylation of ancestral tRNAs with complementary anticodons, yet (3 the risk of confusion for the presumably earliest pairs of complementarily encoded amino acids had little to do with anticodons. Accordingly, in this communication we focus on the acceptor stem. Results Our main result is the emergence of a palindrome structure for the acceptor stem's common ancestor, reconstructed from the phylogenetic trees of Bacteria, Archaea and Eukarya. In parallel, for pairs of ancestral tRNAs with complementary anticodons, we present updated evidence of concerted complementarity of the second bases in the acceptor stems. These two results suggest that the first pairs of "complementary" amino acids that were engaged in primordial coding, such as Gly and Ala, could have avoided erroneous aminoacylation if and only if the acceptor stems of their adaptors were recognized from the same, major groove, side. The class II protein synthetases then inherited this "primary preference" from isofunctional ribozymes. Conclusion Taken together, our results support the hypothesis that the genetic code per se (the one associated with the anticodons and the operational code of aminoacylation (associated with the acceptor diverged from a common ancestor that probably began developing before translation. The primordial advantage of linking some amino acids (most likely glycine and alanine to the ancestral acceptor stem may have been selective retention in a protocell surrounded by a leaky membrane for use in

  18. One ancestor for two codes viewed from the perspective of two complementary modes of tRNA aminoacylation.

    Science.gov (United States)

    Rodin, Andrei S; Szathmáry, Eörs; Rodin, Sergei N

    2009-01-27

    The genetic code is brought into action by 20 aminoacyl-tRNA synthetases. These enzymes are evenly divided into two classes (I and II) that recognize tRNAs from the minor and major groove sides of the acceptor stem, respectively. We have reported recently that: (1) ribozymic precursors of the synthetases seem to have used the same two sterically mirror modes of tRNA recognition, (2) having these two modes might have helped in preventing erroneous aminoacylation of ancestral tRNAs with complementary anticodons, yet (3) the risk of confusion for the presumably earliest pairs of complementarily encoded amino acids had little to do with anticodons. Accordingly, in this communication we focus on the acceptor stem. Our main result is the emergence of a palindrome structure for the acceptor stem's common ancestor, reconstructed from the phylogenetic trees of Bacteria, Archaea and Eukarya. In parallel, for pairs of ancestral tRNAs with complementary anticodons, we present updated evidence of concerted complementarity of the second bases in the acceptor stems. These two results suggest that the first pairs of "complementary" amino acids that were engaged in primordial coding, such as Gly and Ala, could have avoided erroneous aminoacylation if and only if the acceptor stems of their adaptors were recognized from the same, major groove, side. The class II protein synthetases then inherited this "primary preference" from isofunctional ribozymes. Taken together, our results support the hypothesis that the genetic code per se (the one associated with the anticodons) and the operational code of aminoacylation (associated with the acceptor) diverged from a common ancestor that probably began developing before translation. The primordial advantage of linking some amino acids (most likely glycine and alanine) to the ancestral acceptor stem may have been selective retention in a protocell surrounded by a leaky membrane for use in nucleotide and coenzyme synthesis. Such acceptor stems

  19. Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments

    Science.gov (United States)

    Kermek, Dragutin; Novak, Matija

    2016-01-01

    In programming courses there are various ways in which students attempt to cheat. The most commonly used method is copying source code from other students and making minimal changes in it, like renaming variable names. Several tools like Sherlock, JPlag and Moss have been devised to detect source code plagiarism. However, for larger student…

  20. International Code Assessment and Applications Program: Summary of code assessment studies concerning RELAP5/MOD2, RELAP5/MOD3, and TRAC-B. International Agreement Report

    Energy Technology Data Exchange (ETDEWEB)

    Schultz, R.R. [EG and G Idaho, Inc., Idaho Falls, ID (United States)

    1993-12-01

    Members of the International Code Assessment Program (ICAP) have assessed the US Nuclear Regulatory Commission (USNRC) advanced thermal-hydraulic codes over the past few years in a concerted effort to identify deficiencies, to define user guidelines, and to determine the state of each code. The results of sixty-two code assessment reviews, conducted at INEL, are summarized. Code deficiencies are discussed and user recommended nodalizations investigated during the course of conducting the assessment studies and reviews are listed. All the work that is summarized was done using the RELAP5/MOD2, RELAP5/MOD3, and TRAC-B codes.

  1. PENNON: A code for convex nonlinear and semidefinite programming

    Czech Academy of Sciences Publication Activity Database

    Kočvara, Michal; Stingl, M.

    2003-01-01

    Roč. 18, č. 3 (2003), s. 317-333 ISSN 1055-6788 R&D Projects: GA ČR GA201/00/0080 Grant - others:BMBF(DE) 03ZOM3ER Institutional research plan: CEZ:AV0Z1075907 Keywords : convex programming * semidefinite programming * large-scale problems Subject RIV: BB - Applied Statistics, Operational Research Impact factor: 0.306, year: 2003

  2. Computer Programs for Characteristic Modes of Bodies of Revolution

    Science.gov (United States)

    Computer programs are given for calculating the characteristic currents and characteristic gain patterns of conducting bodies of revolution. Also...given are computer programs for using these characteristic currents in aperture radiation and plane-wave scattering problems. Plot programs for use with

  3. Lex genetica: the law and ethics of programming biological code.

    Science.gov (United States)

    Burk, Dan L

    2002-01-01

    Recent advances in genetic engineering now allow the design of programmable biological artifacts. Such programming may include usage constraints that will alter the balance of ownership and control for biotechnology products. Similar changes have been analyzed in the context of digital content management systems, and while this previous work is useful in analyzing issues related to biological programming, the latter technology presents new conceptual problems that require more comprehensive evaluation of the interplay between law and technologically embedded values. In particular, the ability to embed contractual terms in technological artifacts now requires a re-examination of disclosure and consent in transactions involving such artifacts.

  4. Python Source Code Plagiarism Attacks on Introductory Programming Course Assignments

    Science.gov (United States)

    Karnalim, Oscar

    2017-01-01

    This paper empirically enlists Python plagiarism attacks that have been found on Introductory Programming course assignments for undergraduate students. According to our observation toward 400 plagiarism-suspected cases, there are 35 plagiarism attacks that have been conducted by students. It starts with comment & whitespace modification as…

  5. Using Visual Programming and Robots to Help Novices to Overcome Fear of Coding

    DEFF Research Database (Denmark)

    Chongtay, R.

    2016-01-01

    Learning a computer programming language can be an intimidating experience for most novices. At first glance, the lines of code of a programming language can look like a very complex syntax and together with the abstract concepts involved can represent barriers that for some turn into fear...... of coding . This paper presents and instructional design aimed to introduce students to the basic concepts of programming using visual programming alone as well as visual programming to program robots. Furthermore, the instructional design was applied in a case study: an introductory programming course......, surprise and fear. The results are analyzed and discussed in relation to the influence on students’ ability to overcome the barriers mentioned above as well as students’ learning experience....

  6. Coding and Billing in Surgical Education: A Systems-Based Practice Education Program.

    Science.gov (United States)

    Ghaderi, Kimeya F; Schmidt, Scott T; Drolet, Brian C

    Despite increased emphasis on systems-based practice through the Accreditation Council for Graduate Medical Education core competencies, few studies have examined what surgical residents know about coding and billing. We sought to create and measure the effectiveness of a multifaceted approach to improving resident knowledge and performance of documenting and coding outpatient encounters. We identified knowledge gaps and barriers to documentation and coding in the outpatient setting. We implemented a series of educational and workflow interventions with a group of 12 residents in a surgical clinic at a tertiary care center. To measure the effect of this program, we compared billing codes for 1 year before intervention (FY2012) to prospectively collected data from the postintervention period (FY2013). All related documentation and coding were verified by study-blinded auditors. Interventions took place at the outpatient surgical clinic at Rhode Island Hospital, a tertiary-care center. A cohort of 12 plastic surgery residents ranging from postgraduate year 2 through postgraduate year 6 participated in the interventional sequence. A total of 1285 patient encounters in the preintervention group were compared with 1170 encounters in the postintervention group. Using evaluation and management codes (E&M) as a measure of documentation and coding, we demonstrated a significant and durable increase in billing with supporting clinical documentation after the intervention. For established patient visits, the monthly average E&M code level increased from 2.14 to 3.05 (p educational and workflow interventions, which improved resident coding and billing of outpatient clinic encounters. Using externally audited coding data, we demonstrate significantly increased rates of higher complexity E&M coding in a stable patient population based on improved documentation and billing awareness by the residents. Copyright © 2017 Association of Program Directors in Surgery. Published by

  7. The Live Coding of Slub - Art Oriented Programming as Media Critique

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digital audio/images in music, video, stage design, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated code, etc.). This paper......-oriented programming needs to acknowledge the conditions of its own making – its poesis." (Cox et. al. 2004) The paper will argue that this statement formulates a media critique. As Florian Cramer has proposed, the GUI represents a media separation (of text/code and image) causing alienation to the computer......'s materiality/text. (Cramer 2003) The paper will then propose that object of art oriented programming – in an avant-garde perspective – must be to recuperate an interchangeability of data and processing. How? The particularity of Live Coding does not rely on the magical expression – but nor does it rely...

  8. Identification and Analysis of Critical Gaps in Nuclear Fuel Cycle Codes Required by the SINEMA Program

    Energy Technology Data Exchange (ETDEWEB)

    Adrian Miron; Joshua Valentine; John Christenson; Majd Hawwari; Santosh Bhatt; Mary Lou Dunzik-Gougar: Michael Lineberry

    2009-10-01

    The current state of the art in nuclear fuel cycle (NFC) modeling is an eclectic mixture of codes with various levels of applicability, flexibility, and availability. In support of the advanced fuel cycle systems analyses, especially those by the Advanced Fuel Cycle Initiative (AFCI), Unviery of Cincinnati in collaboration with Idaho State University carried out a detailed review of the existing codes describing various aspects of the nuclear fuel cycle and identified the research and development needs required for a comprehensive model of the global nuclear energy infrastructure and the associated nuclear fuel cycles. Relevant information obtained on the NFC codes was compiled into a relational database that allows easy access to various codes' properties. Additionally, the research analyzed the gaps in the NFC computer codes with respect to their potential integration into programs that perform comprehensive NFC analysis.

  9. Translating the 'Sugar Code' into Immune and Vascular Signaling Programs.

    Science.gov (United States)

    Cerliani, Juan P; Blidner, Ada G; Toscano, Marta A; Croci, Diego O; Rabinovich, Gabriel A

    2017-04-01

    The vast range and complexity of glycan structures and their dynamic variations in health and disease have presented formidable challenges toward understanding the biological significance of these molecules. Despite these limitations, compelling evidence highlights a major role for galectins, a family of soluble glycan-binding proteins, as endogenous decoders that translate glycan-containing information into a broad spectrum of cellular responses by modulating receptor clustering, reorganization, endocytosis, and signaling. Here, we underscore pioneer findings and recent advances in understanding the biology of galectin-glycan interactions in myeloid, lymphoid, and endothelial compartments, highlighting important pathways by which these multivalent complexes control immune and vascular programs. Implementation of novel glycoanalytical approaches, as well as the use of genetically engineered cell and organism models, have allowed glycans and galectins to be explored across a range of cellular processes. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Code Mixing in Break Out Music Program on Net.tv

    OpenAIRE

    Nurhayati, Siti; Gintings, Elia Masa

    2014-01-01

    This research aims to get information of sociolinguistics about code mixing in Break Out Music Program on NET.TV by the presenters. The objectives of the study are to find types of code mixing, and the most dominant type. The research on this thesis was carried out on descriptive qualitative design. The source of data was the whole script of the utterances by the two presenters. The data were the scenes that have code mixing in its dialogue. The data were analyzed based on Muysken theory, the...

  11. Annual Coded Wire Tag Program; Oregon Stock Assessment, Annual Report 2002.

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Mark; Mallette, Christine; Murray, William

    2003-03-01

    This annual report is in fulfillment of contract obligations with Bonneville Power Administration which is the funding source for the Oregon Department of Fish and Wildlife project 'Annual Stock Assessment - Coded Wire Tag Program (ODFW)'. Results for the 2002 contract period: Objective 1 - Over 1 million juvenile salmon were coded-wire by this program (Table 1). This accounted for about 20% of the fish ODFW coded-wire tagged in 2002 for release in the Columbia Basin; Objective 2 - ODFW recovered and processed over 50,000 snouts collected from coded-wire tagged fish (Table 2); Objective 3 - The survival data summarized below includes results for coded-wire groups funded by this program as well as coded-wire groups funded from other sources; Objective 4 - The last returns of experimental groups of coho marked with VIE tags occurred in 2002 at Sandy Hatchery. This sampling showed that 26 of 67 jack coho and 1 of 2,223 adult coho VIE marked as juveniles retained the VIE mark as adults.

  12. Neurolinguistic Programming Examined: Imagery, Sensory Mode, and Communication.

    Science.gov (United States)

    Fromme, Donald K.; Daniell, Jennifer

    1984-01-01

    Tested Neurolinguistic Programming (NLP) assumptions by examining intercorrelations among response times of students (N=64) for extracting visual, auditory, and kinesthetic information from alphabetic images. Large positive intercorrelations were obtained, the only outcome not compatible with NLP. Good visualizers were significantly better in…

  13. Delay-Aware Program Codes Dissemination Scheme in Internet of Everything

    Directory of Open Access Journals (Sweden)

    Yixuan Xu

    2016-01-01

    Full Text Available Due to recent advancements in big data, connection technologies, and smart devices, our environment is transforming into an “Internet of Everything” (IoE environment. These smart devices can obtain new or special functions by reprogramming: upgrade their soft systems through receiving new version of program codes. However, bulk codes dissemination suffers from large delay, energy consumption, and number of retransmissions because of the unreliability of wireless links. In this paper, a delay-aware program dissemination (DAPD scheme is proposed to disseminate program codes with fast, reliable, and energy-efficient style. We observe that although total energy is limited in wireless sensor network, there exists residual energy in nodes deployed far from the base station. Therefore, DAPD scheme improves the performance of bulk codes dissemination through the following two aspects. (1 Due to the fact that a high transmitting power can significantly improve the quality of wireless links, transmitting power of sensors with more residual energy is enhanced to improve link quality. (2 Due to the fact that performance of correlated dissemination tends to degrade in a highly dynamic environment, link correlation is autonomously updated in DAPD during codes dissemination to maintain improvements brought by correlated dissemination. Theoretical analysis and experimental results show that, compared with previous work, DAPD scheme improves the dissemination performance in terms of completion time, transmission cost, and the efficiency of energy utilization.

  14. Utility residential new construction programs: Going beyond the code. A report from the Database on Energy Efficiency Programs (DEEP) Project

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.

    1995-08-01

    Based on an evaluation of 10 residential new construction programs, primarily sponsored by investor-owned utilities in the United States, we find that many of these programs are in dire straits and are in danger of being discontinued because current inclusion of only direct program effects leads to the conclusion that they are not cost-effective. We believe that the cost-effectiveness of residential new construction programs can be improved by: (1) promoting technologies and advanced building design practices that significantly exceed state and federal standards; (2) reducing program marketing costs and developing more effective marketing strategies; (3) recognizing the role of these programs in increasing compliance with existing state building codes; and (4) allowing utilities to obtain an ``energy-savings credit`` from utility regulators for program spillover (market transformation) impacts. Utilities can also leverage their resources in seizing these opportunities by forming strong and trusting partnerships with the building community and with local and state government.

  15. Annual Coded Wire Tag Program; Oregon Stock Assessment, 2001 Annual Report.

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Mark; Mallette, Christine; Murray, William

    2002-03-01

    This annual report is in fulfillment of contract obligations with Bonneville Power Administration which is the funding source for the Oregon Department of Fish and Wildlife project 'Annual Stock Assessment - Coded Wire Tag Program (ODFW)'. Results for the 2001 contract period: Objective 1--Over 1 million juvenile salmon were coded-wire by this program (Table 1); Objective 2--ODFW recovered and processed over 40,000 snout collected from coded-wire tagged fish (Table 2); Objective 3--Survival data is summarized below; Objective 4--The last group of VIE tagged coho was released in 2001 and returning coho were samples at Sandy Hatchery. This sampling showed only 1 of 1,160 returning coho VIE marked as juveniles retained the VIE mark as adults.

  16. Nurses' perceptions of simulation-based interprofessional training program for rapid response and code blue events.

    Science.gov (United States)

    Wehbe-Janek, Hania; Lenzmeier, Carissa R; Ogden, Paul E; Lambden, Mary Pat; Sanford, Pamela; Herrick, Judy; Song, Juhee; Pliego, Jose F; Colbert, Colleen Y

    2012-01-01

    Following completion of an interprofessional simulation program for rapid response and code blue events, we explored hospital unit nurses' perspectives of the training, through a mixed-methods analysis. The results of this study advocate for the use of simulation training in preparing nurses and promoting communication among team members, effective teamwork, and early recognition of clinically deteriorating patients. This study provides support for the implementation and continued use of simulation interprofessional programs in hospital settings.

  17. Functions of Arabic-English Code-Switching: Sociolinguistic Insights from a Study Abroad Program

    Science.gov (United States)

    Al Masaeed, Khaled

    2013-01-01

    This sociolinguistic study examines the functions and motivations of code-switching, which is used here to mean the use of more than one language in the same conversation. The conversations studied here take place in a very particular context: one-on-one speaking sessions in a study abroad program in Morocco where English is the L1 and Arabic the…

  18. Assessment of Programming Language Learning Based on Peer Code Review Model: Implementation and Experience Report

    Science.gov (United States)

    Wang, Yanqing; Li, Hang; Feng, Yuqiang; Jiang, Yu; Liu, Ying

    2012-01-01

    The traditional assessment approach, in which one single written examination counts toward a student's total score, no longer meets new demands of programming language education. Based on a peer code review process model, we developed an online assessment system called "EduPCR" and used a novel approach to assess the learning of computer…

  19. Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language

    Directory of Open Access Journals (Sweden)

    Arnon Hershkovitz

    2015-09-01

    Full Text Available In recent years, schools (as well as universities have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features, based on common standards for software quality (PEP 8 and security (derived from CERT Secure Coding Standards. We use a multi-view, data-driven approach, by (a using hierarchical clustering to bottom-up partition the population into groups based on their code-related features and (b building a decision tree model that predicts whether a student or a teacher wrote a given code (resulting with a LOOCV kappa of 0.751. Overall, our findings suggest that the teachers’ codes have a better quality than the students’ – with a sub-group of the teachers, mostly males, demonstrate better coding than their peers and the students – and that the students’ codes are slightly better secured than the teachers’ codes (although both populations show very low security levels. The findings imply that teachers might benefit from their prior knowledge and experience, but also emphasize the lack of continuous involvement of some of the teachers with code-writing. Therefore, findings shed light on computer science teachers as lifelong learners. Findings also highlight the difference between quality and security in today’s programming paradigms. Implications for these findings are discussed.

  20. A program for undergraduate research into the mechanisms of sensory coding and memory decay

    Energy Technology Data Exchange (ETDEWEB)

    Calin-Jageman, R J

    2010-09-28

    This is the final technical report for this DOE project, entitltled "A program for undergraduate research into the mechanisms of sensory coding and memory decay". The report summarizes progress on the three research aims: 1) to identify phyisological and genetic correlates of long-term habituation, 2) to understand mechanisms of olfactory coding, and 3) to foster a world-class undergraduate neuroscience program. Progress on the first aim has enabled comparison of learning-regulated transcripts across closely related learning paradigms and species, and results suggest that only a small core of transcripts serve truly general roles in long-term memory. Progress on the second aim has enabled testing of several mutant phenotypes for olfactory behaviors, and results show that responses are not fully consistent with the combinitoral coding hypothesis. Finally, 14 undergraduate students participated in this research, the neuroscience program attracted extramural funding, and we completed a successful summer program to enhance transitions for community-college students into 4-year colleges to persue STEM fields.

  1. Computer Program of SIE ASME-NH (Revision 1.0) Code

    Energy Technology Data Exchange (ETDEWEB)

    Koo, Gyeong Hoi; Lee, J. H

    2008-01-15

    In this report, the SIE ASME (Structural Integrity Evaluations by ASME-NH) (Revision 1.0), which has a computerized implementation of ASME Pressure Vessels and Piping Code Section III Subsection NH rules, is developed to apply to the next generation reactor design subjecting to the elevated temperature operations over 500 .deg. C and over 30 years design lifetime, and the user's manual for this program is described in detail.

  2. Responding to the Effects of Extreme Heat: Baltimore City's Code Red Program.

    Science.gov (United States)

    Martin, Jennifer L

    2016-01-01

    Heat response plans are becoming increasingly more common as US cities prepare for heat waves and other effects of climate change. Standard elements of heat response plans exist, but plans vary depending on geographic location and distribution of vulnerable populations. Because heat events vary over time and affect populations differently based on vulnerability, it is difficult to compare heat response plans and evaluate responses to heat events. This article provides an overview of the Baltimore City heat response plan, the Code Red program, and discusses the city's response to the 2012 Ohio Valley/Mid Atlantic Derecho, a complex heat event. Challenges with and strategies for evaluating the program are reviewed and shared.

  3. Analysis method and principle of dual-mode electro-mechanical variable transmission program

    Science.gov (United States)

    Li, Hongcai; Yan, Qingdong; Xiang, Changle; Wang, Weida

    2012-05-01

    Automotive industry, as an important pillar of the national economy, has been rapidly developing in recent years. But proplems such as energy comsumption and environmental pollution are posed at the same time. Electro-mechanical variable transmission system is considered one of avilable workarounds. It is brought forward a kind of design methods of dual-mode electro-mechanical variable transmission system rotational speed characteristics and dual-mode drive diagrams. With the motor operating behavior of running in four quadrants and the speed characteristics of the simple internal and external meshing single planetary gear train, four kinds of dual-mode electro-mechanical transmission system scheme are designed. And the velocity, torque and power characteristics of one of the programs are analyzed. The magnitude of the electric split-flow power is an important factor which influences the system performance, so in the parameters matching design, it needs to reduce the power needs under the first mode of the motor. The motor, output rotational speed range and the position of the mode switching point have relationships with the characteristics design of the planetary gear set. The analysis method is to provide a reference for hybrid vehicles' design. As the involved rotational speed and torque relationships are the natural contact of every part of transmission system, a theory basis of system program and performance analysis is provided.

  4. Rigorous study of low-complexity adaptive space-time block-coded MIMO receivers in high-speed mode multiplexed fiber-optic transmission links using few-mode fibers

    Science.gov (United States)

    Weng, Yi; He, Xuan; Wang, Junyi; Pan, Zhongqi

    2017-01-01

    Spatial-division multiplexing (SDM) techniques have been purposed to increase the capacity of optical fiber transmission links by utilizing multicore fibers or few-mode fibers (FMF). The most challenging impairments of SDMbased long-haul optical links mainly include modal dispersion and mode-dependent loss (MDL), whereas MDL arises from inline component imperfections, and breaks modal orthogonality thus degrading the capacity of multiple-inputmultiple- output (MIMO) receivers. To reduce MDL, optical approaches include mode scramblers and specialty fiber designs, yet these methods were burdened with high cost, yet cannot completely remove the accumulated MDL in the link. Besides, space-time trellis codes (STTC) were purposed to lessen MDL, but suffered from high complexity. In this work, we investigated the performance of space-time block-coding (STBC) scheme to mitigate MDL in SDM-based optical communication by exploiting space and delay diversity, whereas weight matrices of frequency-domain equalization (FDE) were updated heuristically using decision-directed recursive-least-squares (RLS) algorithm for convergence and channel estimation. The STBC was evaluated in a six-mode multiplexed system over 30-km FMF via 6×6 MIMO FDE, with modal gain offset 3 dB, core refractive index 1.49, numerical aperture 0.5. Results show that optical-signal-to-noise ratio (OSNR) tolerance can be improved via STBC by approximately 3.1, 4.9, 7.8 dB for QPSK, 16- and 64-QAM with respective bit-error-rates (BER) and minimum-mean-square-error (MMSE). Besides, we also evaluate the complexity optimization of STBC decoding scheme with zero-forcing decision feedback (ZFDF) equalizer by shortening the coding slot length, which is robust to frequency-selective fading channels, and can be scaled up for SDM systems with more dynamic channels.

  5. Predictive Study of Non-Inductive Current Drive Discharge Modes using Newly Upgraded ASTRA code in KSTAR

    Science.gov (United States)

    Ju, Myunghee

    1999-11-01

    To investigate the reference discharge scenarios for the steady state operation in KSTAR [1], the code ASTRA (An Automatic System for TRansport Analysis) [2] has been upgraded: (A) the ray-tracing lower-hybrid wave code LSC [3] is newly added in ASTRA , (B) the neutral beam solver is modified with the KSTAR parameters [4], (C) the ICRF (Ion Cyclotron Ranges of Frequency) full wave code TORIC [5] is also newly implemented in ASTRA. With the newly upgraded ASTRA code, the predictive study of 100current drive discharge scenarios in neutral beam + lower hybrid wave + fast wave heated plasma has been done with a variety of transport models in the KSTAR tokamak reference plasma. * Work supported by the Ministry of Science and Technology, Korea. [1] G. S. Lee, Y. Kim, S. M. Hwang, J. Kim, and D. I. Choi, Bull. Am. Phys. Soc. 41, 7 (1996). [2] Pereverzev G.V. et al., Preprint IPP 5/42, Garching, 1991. [3] D.W. Ignat et al, Nuclear Fusion. Vol. 34, No. 6, 1994. [4] Alexi Polevoi et al., JAERI-DATA/Code 97-014. [5] M. Brambilla, A Full Wave Code for Ion Cyclotron Waves in Toroidal Plasmas, Report IPP 5/66, Garching, 1996.

  6. Correcting sequencing errors in DNA coding regions using a dynamic programming approach

    Energy Technology Data Exchange (ETDEWEB)

    Xu, Y.; Mural, R.J.; Uberbacher, E.C.

    1994-12-01

    This paper presents an algorithm for detecting and ``correcting`` sequencing errors that occur in DNA coding regions. The types of sequencing error addressed include insertions and deletions (indels) of DNA bases. The goal is to provide a capability which makes single-pass or low-redundancy sequence data more informative, reducing the need for high-redundancy sequencing for gene identification and characterization purposes. The algorithm detects sequencing errors by discovering changes in the statistically preferred reading frame within a putative coding region and then inserts a number of ``neutral`` bases at a perceived reading frame transition point to make the putative exon candidate frame consistent. The authors have implemented the algorithm as a front-end subsystem of the GRAIL DNA sequence analysis system to construct a version which is very error tolerant and also intend to use this as a testbed for further development of sequencing error-correction technology. On a test set consisting of 68 Human DNA sequences with 1% randomly generated indels in coding regions, the algorithm detected and corrected 76% of the indels. The average distance between the position of an indel and the predicted one was 9.4 bases. With this subsystem in place, GRAIL correctly predicted 89% of the coding messages with 10% false message on the ``corrected`` sequences, compared to 69% correctly predicted coding messages and 11% falsely predicted messages on the ``corrupted`` sequences using standard GRAIL II method. The method uses a dynamic programming algorithm, and runs in time and space linear to the size of the input sequence.

  7. FORTRAN Automated Code Evaluation System (faces) system documentation, version 2, mod 0. [error detection codes/user manuals (computer programs)

    Science.gov (United States)

    1975-01-01

    A system is presented which processes FORTRAN based software systems to surface potential problems before they become execution malfunctions. The system complements the diagnostic capabilities of compilers, loaders, and execution monitors rather than duplicating these functions. Also, it emphasizes frequent sources of FORTRAN problems which require inordinate manual effort to identify. The principle value of the system is extracting small sections of unusual code from the bulk of normal sequences. Code structures likely to cause immediate or future problems are brought to the user's attention. These messages stimulate timely corrective action of solid errors and promote identification of 'tricky' code. Corrective action may require recoding or simply extending software documentation to explain the unusual technique.

  8. Evaluation of single photon and Geiger mode Lidar for the 3D Elevation Program

    Science.gov (United States)

    Stoker, Jason M.; Abdullah, Qassim; Nayegandhi, Amar; Winehouse, Jayna

    2016-01-01

    Data acquired by Harris Corporation’s (Melbourne, FL, USA) Geiger-mode IntelliEarth™ sensor and Sigma Space Corporation’s (Lanham-Seabrook, MD, USA) Single Photon HRQLS sensor were evaluated and compared to accepted 3D Elevation Program (3DEP) data and survey ground control to assess the suitability of these new technologies for the 3DEP. While not able to collect data currently to meet USGS lidar base specification, this is partially due to the fact that the specification was written for linear-mode systems specifically. With little effort on part of the manufacturers of the new lidar systems and the USGS Lidar specifications team, data from these systems could soon serve the 3DEP program and its users. Many of the shortcomings noted in this study have been reported to have been corrected or improved upon in the next generation sensors.

  9. 76 FR 13101 - Building Energy Codes Program: Presenting and Receiving Comments to DOE Proposed Changes to the...

    Science.gov (United States)

    2011-03-10

    ... CONTACT: Mr. Robert Dewey, U.S. Department of Energy, Energy Efficiency and Renewable Energy, Building... Part 430 Building Energy Codes Program: Presenting and Receiving Comments to DOE Proposed Changes to the International Green Construction Code (IgCC) AGENCY: Office of Energy Efficiency and Renewable...

  10. Apparatus, Method, and Computer Program for a Resolution-Enhanced Pseudo-Noise Code Technique

    Science.gov (United States)

    Li, Steven X. (Inventor)

    2015-01-01

    An apparatus, method, and computer program for a resolution enhanced pseudo-noise coding technique for 3D imaging is provided. In one embodiment, a pattern generator may generate a plurality of unique patterns for a return to zero signal. A plurality of laser diodes may be configured such that each laser diode transmits the return to zero signal to an object. Each of the return to zero signal includes one unique pattern from the plurality of unique patterns to distinguish each of the transmitted return to zero signals from one another.

  11. DOG-IV revised input generator program for DORT-TORT code

    Energy Technology Data Exchange (ETDEWEB)

    Saitou, Masato; Handa, Hiroyuki; Hayashi, Katsumi [Hitachi Engineering Co. Ltd., Ibaraki (Japan); Kamogawa, Susumu; Yamada, Koubun [Business Automation Co. Ltd., Tokyo (Japan)

    2000-03-01

    We developed new version; DOG-IV program in which the function of generating input data for DORT-TORT code was added to old function and operating performance has improved. All the input data is created by interactive method in front of color display without looking for the DORT-TORT manual. Also the geometry related input are easily created without calculation of precise curved mesh point. By using the DOG-IV, reliable input data for the DORT-TORT is obtained easily and quickly and time saving for preparing input data could be expected. (author)

  12. Euler Technology Assessment program for preliminary aircraft design employing SPLITFLOW code with Cartesian unstructured grid method

    Science.gov (United States)

    Finley, Dennis B.

    1995-01-01

    This report documents results from the Euler Technology Assessment program. The objective was to evaluate the efficacy of Euler computational fluid dynamics (CFD) codes for use in preliminary aircraft design. Both the accuracy of the predictions and the rapidity of calculations were to be assessed. This portion of the study was conducted by Lockheed Fort Worth Company, using a recently developed in-house Cartesian-grid code called SPLITFLOW. The Cartesian grid technique offers several advantages for this study, including ease of volume grid generation and reduced number of cells compared to other grid schemes. SPLITFLOW also includes grid adaptation of the volume grid during the solution convergence to resolve high-gradient flow regions. This proved beneficial in resolving the large vortical structures in the flow for several configurations examined in the present study. The SPLITFLOW code predictions of the configuration forces and moments are shown to be adequate for preliminary design analysis, including predictions of sideslip effects and the effects of geometry variations at low and high angles of attack. The time required to generate the results from initial surface definition is on the order of several hours, including grid generation, which is compatible with the needs of the design environment.

  13. Coding a Weather Model: DOE-FIU Science & Technology Workforce Development Program.

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, Jon David [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-12-01

    DOE Fellow, Andres Cremisini, completed a 10-week internship with Sandia National Laboratories (SNL) in Albuquerque, New Mexico. Under the management of Kristopher Klingler and the mentorship of Jon Bradley, he was tasked with conceiving and coding a realistic weather model for use in physical security applications. The objective was to make a weather model that could use real data to accurately predict wind and precipitation conditions at any location of interest on the globe at any user-determined time. The intern received guidance on software design, the C++ programming language and clear communication of project goals and ongoing progress. In addition, Mr. Cremisini was given license to structure the program however he best saw fit, an experience that will benefit ongoing research endeavors.

  14. Analog Coding.

    Science.gov (United States)

    CODING, ANALOG SYSTEMS), INFORMATION THEORY, DATA TRANSMISSION SYSTEMS , TRANSMITTER RECEIVERS, WHITE NOISE, PROBABILITY, ERRORS, PROBABILITY DENSITY FUNCTIONS, DIFFERENTIAL EQUATIONS, SET THEORY, COMPUTER PROGRAMS

  15. Tourist Affiliate Program while Using Online Booking System with Possibility of Entering B2B Code

    Directory of Open Access Journals (Sweden)

    Slivar Iva

    2008-01-01

    Full Text Available Affiliate marketing programs are one of the most powerful tools for online marketing since the merchant presenting a product or a service decides on the commissioning model and the commission is granted only if the desired results have been reached. Affiliate marketing is based offline as much as tourism itself and it relies on the commission that tourist companies pay to their partners (affiliates who bring new guests. This paper will present the basics of how online affiliate programs work, benefits they bring and steps for their further implementation. It will explain in detail how to establish an affiliate program for dynamic web pages which use online booking system platforms that offer a possibility of entering a B2B code. Special attention will be paid to SEO (Search Engine Optimisation. It will also present results of a research on Croatian hotels web pages and the implementation of the online booking system and affiliate programs. Having in mind the insufficient deployment of online potentials, the aim of the paper is to stress the need for setting up an effective method of monitoring changes and updates in the online world as well as implementing new promotional possibilities, all aimed at increasing sales. The goal of the paper is to explore advantages and disadvantages of the affiliate program as a new sales channel and promote the possibility to implement it in one of the biggest Croatian hotel companies, Maistra d.d. Rovinj. Along with methods of data acquiring and different techniques of creative thinking, the following scientific research methods were also used: statistic, historic, descriptive, comparison, interview, analysis and synthesis, induction and deduction.

  16. Optimized conical shaped charge design using the SCAP (Shaped Charge Analysis Program) code

    Energy Technology Data Exchange (ETDEWEB)

    Vigil, M.G.

    1988-09-01

    The Shaped Charge Analysis Program (SCAP) is used to analytically model and optimize the design of Conical Shaped Charges (CSC). A variety of existing CSCs are initially modeled with the SCAP code and the predicted jet tip velocities, jet penetrations, and optimum standoffs are compared to previously published experimental results. The CSCs vary in size from 0.69 inch (1.75 cm) to 9.125 inch (23.18 cm) conical liner inside diameter. Two liner materials (copper and steel) and several explosives (Octol, Comp B, PBX-9501) are included in the CSCs modeled. The target material was mild steel. A parametric study was conducted using the SCAP code to obtain the optimum design for a 3.86 inch (9.8 cm) CSC. The variables optimized in this study included the CSC apex angle, conical liner thickness, explosive height, optimum standoff, tamper/confinement thickness, and explosive width. The non-dimensionalized jet penetration to diameter ratio versus the above parameters are graphically presented. 12 refs., 10 figs., 7 tabs.

  17. Fast-ion transport in low density L-mode plasmas at TCV using FIDA spectroscopy and the TRANSP code

    Science.gov (United States)

    Geiger, B.; Karpushov, A. N.; Duval, B. P.; Marini, C.; Sauter, O.; Andrebe, Y.; Testa, D.; Marascheck, M.; Salewski, M.; Schneider, P. A.; the TCV Team; the EUROfusion MST1 Team

    2017-11-01

    Experiments with the new neutral beam injection source of TCV have been performed with high fast-ion fractions (>20%) that exhibit a clear reduction of the loop voltage and a clear increase of the plasma pressure in on- and off-axis heating configurations. However, good quantitative agreement between the experimental data and TRANSP predictions is only found when including strong additional fast-ion losses. These losses could in part be caused by turbulence or MHD activity as, e.g. high frequency modes near the frequency of toroidicity induced Alfvén eignmodes are observed. In addition, a newly installed fast-ion D-alpha (FIDA) spectroscopy system measures strong passive radiation and, hence, indicates the presence of high background neutral densities such that charge-exchange losses are substantial. Also the active radiation measured with the FIDA diagnostic, as well as data from a neutral particle analyzer, suggest strong fast-ion losses and large neutral densities. The large neutral densities can be justified since high electron temperatures (3-4 keV), combined with low electron densities (about 2× {10}19 m-3) yield long mean free paths of the neutrals which are penetrating from the walls.

  18. Whole Language versus Code-Based Skills and Interactional Patterns in Singapore's Early Literacy Program

    Science.gov (United States)

    Vaish, Viniti

    2014-01-01

    This paper analyzes whole language and code-based skills approaches in early literacy and the specific patterns of interaction present in both approaches. Nineteen hours of video data were coded to analyze the nature of whole language versus code-based skills instruction and document the allocation of time spent on each approach in a reading…

  19. Connected Code: Why Children Need to Learn Programming. MacArthur Foundation Series on Digital Media and Learning

    Science.gov (United States)

    Kafai, Yasmin B.; Burke, Quinn

    2014-01-01

    Coding, once considered an arcane craft practiced by solitary techies, is now recognized by educators and theorists as a crucial skill, even a new literacy, for all children. Programming is often promoted in K-12 schools as a way to encourage "computational thinking"--which has now become the umbrella term for understanding what computer…

  20. CFC (Comment-First-Coding)--A Simple yet Effective Method for Teaching Programming to Information Systems Students

    Science.gov (United States)

    Sengupta, Arijit

    2009-01-01

    Programming courses have always been a difficult part of an Information Systems curriculum. While we do not train Information Systems students to be developers, understanding how to build a system always gives students an added perspective to improve their system design and analysis skills. This teaching tip presents CFC (Comment-First-Coding)--a…

  1. The implementation of the graphics of program EAGLE: A numerical grid generation code on NASA Langley SNS computer system

    Science.gov (United States)

    Houston, Johnny L.

    1989-01-01

    Program EAGLE (Eglin Arbitrary Geometry Implicit Euler) Numerical Grid Generation System is a composite (multi-block) algebraic or elliptic grid generation system designed to discretize the domain in and/or around any arbitrarily shaped three dimensional regions. This system combines a boundary conforming surface generation scheme and includes plotting routines designed to take full advantage of the DISSPLA Graphics Package (Version 9.0). Program EAGLE is written to compile and execute efficiently on any Cray machine with or without solid state disk (SSD) devices. Also, the code uses namelist inputs which are supported by all Cray machines using the FORTRAN compiler CFT77. The namelist inputs makes it easier for the user to understand the inputs and operation of Program EAGLE. EAGLE's numerical grid generator is constructed in the following form: main program, EGG (executive routine); subroutine SURFAC (surface generation routine); subroutine GRID (grid generation routine); and subroutine GRDPLOT (grid plotting routines). The EAGLE code was modified to use on the NASA-LaRC SNS computer (Cray 2S) system. During the modification a conversion program was developed for the output data of EAGLE's subroutine GRID to permit the data to be graphically displayed by IRIS workstations, using Plot3D. The code of program EAGLE was modified to make operational subroutine GRDPLOT (using DI-3000 Graphics Software Packages) on the NASA-LaRC SNS Computer System. How to implement graphically, the output data of subroutine GRID was determined on any NASA-LaRC graphics terminal that has access to the SNS Computer System DI-300 Graphics Software Packages. A Quick Reference User Guide was developed for the use of program EAGLE on the NASA-LaRC SNS Computer System. One or more application program(s) was illustrated using program EAGLE on the NASA LaRC SNS Computer System, with emphasis on graphics illustrations.

  2. Analyzing programming behavior to support self-reflection for improving source code quality

    OpenAIRE

    Prause, Christian R.; Scheffel, Maren; Niemann, Katja; Wolpers, Martin

    2011-01-01

    Improving the quality of source code is an important aspect of reducing software development cost in industry. This position paper postulates that developers in a software team conduct different activities during software development like closing the source code editor for compilation as opposed to leaving it open that either improve or degrade the quality of resulting source code. We propose to combine mining of contextualized attention metadata with developers' quality reputations to identi...

  3. Program WALKMAN: A code designed to perform electron single collision elastic scattering Monte Carlo calculations

    Energy Technology Data Exchange (ETDEWEB)

    Cullen, D.E.

    1994-08-01

    The computer code WALKMAN performs electron single collision elastic scattering Monte Carlo calculations in spherical or planar geometry. It is intended as a research tool to obtain results that can be compared to the results of condensed history calculations. This code is designed to be self documenting, in the sense that the latest documentation is included as comment lines at the beginning of the code. Printed documentation, such as this document, is periodically published and consists mostly of a copy of the comment lines from the code. The user should be aware that the comment lines within the code are continually updated to reflect the most recent status of the code and these comments should always be considered to be the most recent documentation for the code and may supersede published documentation, such as this document. Therefore, the user is advised to always read the documentation within the actual code. The remainder of this report consists of example results and a listing of the documentation which appears at the beginning of the code.

  4. Annual Coded Wire Tag Program; Oregon Missing Production Groups, 1997 Annual Report.

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Mark A.; Mallette, Christine; Murray, William M.

    1998-03-01

    This annual report is in fulfillment of contract obligations with Bonneville Power Administration which is the funding source for the Oregon Department of Fish and Wildlife's Annual Coded Wire Tag Program - Oregon Missing Production Groups Project. Tule stock fall chinook were caught primarily in British Columbia and Washington ocean, and Oregon freshwater fisheries. Up-river bright stock fall chinook contributed primarily to Alaska and British Columbia ocean commercial, and Columbia River gillnet and other freshwater fisheries. Contribution of Rogue stock fall chinook released in the lower Columbia River occurred primarily in Oregon ocean commercial and Columbia river gillnet fisheries. Willamette stock spring chinook contributed primarily to Alaska and British Columbia ocean commercial, Oregon freshwater sport and Columbia River gillnet fisheries. Willamette stock spring chinook released by CEDC contributed to similar ocean fisheries, but had much higher catch in gillnet fisheries than the same stocks released in the Willamette system. Up-river stocks of spring chinook contributed almost exclusively to Columbia River sport fisheries and other freshwater recovery areas. The up-river stocks of Columbia River summer steelhead contributed primarily to the Columbia River gillnet and other freshwater fisheries. Coho ocean fisheries from Washington to California were closed or very limited from 1994 through 1997 (1991 through 1994 broods). This has resulted in a greater average percent of catch for other fishery areas. Coho stocks released by ODFW below Bonneville Dam contributed mainly to Oregon and Washington ocean, Columbia Gillnet and other freshwater fisheries. Coho stocks released in the Klaskanine River and Youngs Bay area had similar ocean catch, but much higher contribution to gillnet fisheries than the other coho releases. Coho stocks released above Bonneville Dam had similar contribution to ocean fisheries as other coho releases. However, they

  5. Initiation of a pediatric mock code program at a children's hospital.

    Science.gov (United States)

    Tofil, Nancy M; Lee White, Marjorie; Manzella, Bryn; McGill, Denise; Zinkan, Lynn

    2009-06-01

    Pediatric cardiopulmonary arrests are rare. Mock codes were instituted to bridge the gap between opportunity and reality. The goal was to improve medical caregivers' skills in pediatric resuscitation. All pediatric and internal medicine/pediatric (med/peds) residents were anonymously surveyed pre- and post-intervention about confidence level about codes and code skills. Twenty mock codes were conducted during the 1 year intervention period. Statistical comparisons were made between each resident pre- and post-survey, graduating third-year residents (PGY3s) prior to intervention versus PGY3s with mock codes and pediatric versus med/peds residents. All residents significantly improved in their perception of overall skill level during the study (p educational initiatives.

  6. Computation of vibration mode elastic-rigid and effective weight coefficients from finite-element computer program output

    Science.gov (United States)

    Levy, R.

    1991-01-01

    Post-processing algorithms are given to compute the vibratory elastic-rigid coupling matrices and the modal contributions to the rigid-body mass matrices and to the effective modal inertias and masses. Recomputation of the elastic-rigid coupling matrices for a change in origin is also described. A computational example is included. The algorithms can all be executed by using standard finite-element program eigenvalue analysis output with no changes to existing code or source programs.

  7. Test tasks for verification of program codes for calculation of neutron-physical characteristics of the BN series reactors

    Science.gov (United States)

    Tikhomirov, Georgy; Ternovikh, Mikhail; Smirnov, Anton; Saldikov, Ivan; Bahdanovich, Rynat; Gerasimov, Alexander

    2017-09-01

    System of test tasks is presented with the fast reactor BN-1200 with nitride fuel as prototype. The system of test tasks includes three test based on different geometric models. Model of fuel element in homogeneous and in heterogeneous form, model of fuel assembly in height-heterogeneous and full heterogeneous form, and modeling of the active core of BN-1200 reactor. Cross-verification of program codes was performed. Transition from simple geometry to more complex one allows to identify the causes of discrepancies in the results during the early stage of cross-verification of codes. This system of tests can be applied for certification of engineering programs based on the method of Monte Carlo to the calculation of full-scale models of the reactor core of the BN series. The developed tasks take into account the basic layout and structural features of the reactor BN-1200. They are intended for study of neutron-physical characteristics, estimation of influence of heterogeneous structure and influence of diffusion approximation. The development of system of test tasks allowed to perform independent testing of programs for calculation of neutron-physical characteristics: engineering programs JARFR and TRIGEX, and codes MCU, TDMCC, and MMK based on the method of Monte Carlo.

  8. MRI Mode Programming for Safe Magnetic Resonance Imaging in Patients With a Magnetic Resonance Conditional Cardiac Device.

    Science.gov (United States)

    Nakai, Toshiko; Kurokawa, Sayaka; Ikeya, Yukitoshi; Iso, Kazuki; Takahashi, Keiko; Sasaki, Naoko; Ashino, Sonoko; Okubo, Kimie; Okumura, Yasuo; Kunimoto, Satoshi; Watanabe, Ichiro; Hirayama, Atsushi

    2016-01-01

    Although diagnostically indispensable, magnetic resonance imaging (MRI) has been, until recently, contraindicated in patients with an implantable cardiac device. MR conditional cardiac devices are now widely used, but the mode programming needed for safe MRI has yet to be established. We reviewed the details of 41 MRI examinations of patients with a MR conditional device. There were no associated adverse events. However, in 3 cases, paced beats competed with the patient's own beats during the MRI examination. We describe 2 of the 3 specific cases because they illustrate these potentially risky situations: a case in which the intrinsic heart rate increased and another in which atrial fibrillation occurred. Safe MRI in patients with an MR conditional device necessitates detailed MRI mode programming. The MRI pacing mode should be carefully and individually selected.

  9. Computer code and users' guide for the preliminary analysis of dual-mode space nuclear fission solid core power and propulsion systems, NUROC3A. AMS report No. 1239b

    Energy Technology Data Exchange (ETDEWEB)

    Nichols, R.A.; Smith, W.W.

    1976-06-30

    The three-volume report describes a dual-mode nuclear space power and propulsion system concept that employs an advanced solid-core nuclear fission reactor coupled via heat pipes to one of several electric power conversion systems. The second volume describes the computer code and users' guide for the preliminary analysis of the system.

  10. A depth-first search algorithm to compute elementary flux modes by linear programming.

    Science.gov (United States)

    Quek, Lake-Ee; Nielsen, Lars K

    2014-07-30

    The decomposition of complex metabolic networks into elementary flux modes (EFMs) provides a useful framework for exploring reaction interactions systematically. Generating a complete set of EFMs for large-scale models, however, is near impossible. Even for moderately-sized models (linear programming (LP) to enumerate EFMs in an exhaustive fashion. Constraints can be introduced to directly generate a subset of EFMs satisfying the set of constraints. The depth-first search algorithm has a constant memory overhead. Using flux constraints, a large LP problem can be massively divided and parallelized into independent sub-jobs for deployment into computing clusters. Since the sub-jobs do not overlap, the approach scales to utilize all available computing nodes with minimal coordination overhead or memory limitations. The speed of the algorithm was comparable to efmtool, a mainstream Double Description method, when enumerating all EFMs; the attrition power gained from performing flux feasibility tests offsets the increased computational demand of running an LP solver. Unlike the Double Description method, the algorithm enables accelerated enumeration of all EFMs satisfying a set of constraints.

  11. Coding Labour

    Directory of Open Access Journals (Sweden)

    Anthony McCosker

    2014-03-01

    Full Text Available As well as introducing the Coding Labour section, the authors explore the diffusion of code across the material contexts of everyday life, through the objects and tools of mediation, the systems and practices of cultural production and organisational management, and in the material conditions of labour. Taking code beyond computation and software, their specific focus is on the increasingly familiar connections between code and labour with a focus on the codification and modulation of affect through technologies and practices of management within the contemporary work organisation. In the grey literature of spreadsheets, minutes, workload models, email and the like they identify a violence of forms through which workplace affect, in its constant flux of crisis and ‘prodromal’ modes, is regulated and governed.

  12. Lessons learned from new construction utility demand side management programs and their implications for implementing building energy codes

    Energy Technology Data Exchange (ETDEWEB)

    Wise, B.K.; Hughes, K.R.; Danko, S.L.; Gilbride, T.L.

    1994-07-01

    This report was prepared for the US Department of Energy (DOE) Office of Codes and Standards by the Pacific Northwest Laboratory (PNL) through its Building Energy Standards Program (BESP). The purpose of this task was to identify demand-side management (DSM) strategies for new construction that utilities have adopted or developed to promote energy-efficient design and construction. PNL conducted a survey of utilities and used the information gathered to extrapolate lessons learned and to identify evolving trends in utility new-construction DSM programs. The ultimate goal of the task is to identify opportunities where states might work collaboratively with utilities to promote the adoption, implementation, and enforcement of energy-efficient building energy codes.

  13. Simulation model for wind energy storage systems. Volume III. Program descriptions. [SIMWEST CODE

    Energy Technology Data Exchange (ETDEWEB)

    Warren, A.W.; Edsinger, R.W.; Burroughs, J.D.

    1977-08-01

    The effort developed a comprehensive computer program for the modeling of wind energy/storage systems utilizing any combination of five types of storage (pumped hydro, battery, thermal, flywheel and pneumatic). An acronym for the program is SIMWEST (Simulation Model for Wind Energy Storage). The level of detail of SIMWEST is consistent with a role of evaluating the economic feasibility as well as the general performance of wind energy systems. The software package consists of two basic programs and a library of system, environmental, and load components. Volume III, the SIMWEST program description contains program descriptions, flow charts and program listings for the SIMWEST Model Generation Program, the Simulation program, the File Maintenance program and the Printer Plotter program. Volume III generally would not be required by SIMWEST user.

  14. Pembuatan Kakas Pendeteksi Unused Method pada Kode Program PHP dengan Framework CodeIgniter Menggunakan Call Graph

    Directory of Open Access Journals (Sweden)

    Divi Galih Prasetyo Putri

    2014-03-01

    Full Text Available Proses evolusi dan perawatan dari sebuah sistem merupakan proses yang sangat penting dalam rekayasa perangkat lunak tidak terkecuali pada aplikasi web. Pada proses ini kebanyakan pengembang tidak lagi berpatokan pada rancangan sistem. Hal ini menyebabkan munculnya unused method. Bagian-bagian program ini tidak lagi terpakai namun masih berada dalam sistem. Keadaan ini meningkatkan kompleksitas dan mengurangi tingkat understandability sistem. Guna mendeteksi adanya unused method pada progam diperlukan teknik untuk melakukan code analysis. Teknik static analysis yang digunakan memanfaatkan call graph yang dibangun dari kode program untuk mengetahui adanya unused method. Call graph dibangun berdasarkan pemanggilan antar method. Aplikasi ini mendeteksi unused method pada kode program PHP yang dibangun menggunakan framework CodeIgniter. Kode program sebagai inputan diurai kedalam bentuk Abstract Syntax Tree (AST yang kemudian dimanfaatkan untuk melakukan analisis terhadap kode program. Proses analisis tersebut kemudian menghasilkan sebuah call graph. Dari call graph yang dihasilkan dapat dideteksi method-method mana saja yang tidak berhasil ditelusuri dan tergolong kedalam unused method. Kakas telah diuji coba pada 5 aplikasi PHP dengan hasil  rata-rata nilai presisi sistem sebesar 0.749 dan recall sebesar 1.

  15. Code requirements document: MODFLOW 2. 1: A program for predicting moderator flow patterns

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, P.F. (Univ. of California, Berkeley (United States). Dept. of Nuclear Engineering); Paik, I.K. (Westinghouse Savannah River Co., Aiken, SC (United States))

    1992-03-01

    Sudden changes in the temperature of flowing liquids can result in transient buoyancy forces which strongly impact the flow hydrodynamics via flow stratification. These effects have been studied for the case of potential flow of stratified liquids to line sinks, but not for moderator flow in SRS reactors. Standard codes, such as TRAC and COMMIX, do not have the capability to capture the stratification effect, due to strong numerical diffusion which smears away the hot/cold fluid interface. A related problem with standard codes is the inability to track plumes injected into the liquid flow, again due to numerical diffusion. The combined effects of buoyant stratification and plume dispersion have been identified as being important in operation of the Supplementary Safety System which injects neutron-poison ink into SRS reactors to provide safe shutdown in the event of safety rod failure. The MODFLOW code discussed here provides transient moderator flow pattern information with stratification effects, and tracks the location of ink plumes in the reactor. The code, written in Fortran, is compiled for Macintosh II computers, and includes subroutines for interactive control and graphical output. Removing the graphics capabilities, the code can also be compiled on other computers. With graphics, in addition to the capability to perform safety related computations, MODFLOW also provides an easy tool for becoming familiar with flow distributions in SRS reactors.

  16. Code requirements document: MODFLOW 2.1: A program for predicting moderator flow patterns

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, P.F. [Univ. of California, Berkeley (US). Dept. of Nuclear Engineering; Paik, I.K. [Westinghouse Savannah River Co., Aiken, SC (US)

    1992-03-01

    Sudden changes in the temperature of flowing liquids can result in transient buoyancy forces which strongly impact the flow hydrodynamics via flow stratification. These effects have been studied for the case of potential flow of stratified liquids to line sinks, but not for moderator flow in SRS reactors. Standard codes, such as TRAC and COMMIX, do not have the capability to capture the stratification effect, due to strong numerical diffusion which smears away the hot/cold fluid interface. A related problem with standard codes is the inability to track plumes injected into the liquid flow, again due to numerical diffusion. The combined effects of buoyant stratification and plume dispersion have been identified as being important in operation of the Supplementary Safety System which injects neutron-poison ink into SRS reactors to provide safe shutdown in the event of safety rod failure. The MODFLOW code discussed here provides transient moderator flow pattern information with stratification effects, and tracks the location of ink plumes in the reactor. The code, written in Fortran, is compiled for Macintosh II computers, and includes subroutines for interactive control and graphical output. Removing the graphics capabilities, the code can also be compiled on other computers. With graphics, in addition to the capability to perform safety related computations, MODFLOW also provides an easy tool for becoming familiar with flow distributions in SRS reactors.

  17. Using a visual programming language to bridge the cognitive gap between a novice's mental model and program code

    Science.gov (United States)

    Smith, Bryan J.

    Current research suggests that many students do not know how to program very well at the conclusion of their introductory programming course. We believe that a reason novices have such difficulties learning programming is because engineering novices often learn through a lecture format where someone with programming knowledge lectures to novices, the novices attempt to absorb the content, and then reproduce it during exams. By primarily appealing to programming novices who prefer to understand visually, we research whether programming novices understand programming better if computer science concepts are presented using a visual programming language than if these programs are presented using a text-based programming language. This method builds upon previous research that suggests that most engineering students are visual learners, and we propose that using a flow-based visual programming language will address some of the most important and difficult topics to novices of programming. We use an existing flow-model tool, RAPTOR, to test this method, and share the program understanding results using this theory.

  18. Hanford Dose Overview Program. Comparison of AIRDOS-EPA and Hanford site dose codes

    Energy Technology Data Exchange (ETDEWEB)

    Aaberg, R.L.; Napier, B.A.

    1985-11-01

    Radiation dose commitments for persons in the Hanford environs calculated using AIRDOS-EPA were compared with those calculated using a suite of Hanford codes: FOOD, PABLM, DACRIN, and KRONIC. Dose commitments to the population and to the maximally exposed individual (MI) based on annual releases of eight radionuclides from the N-Reactor, were calculated by these codes. Dose commitments from each pathway to the total body, lung, thyroid, and lower large intestine (LLI) are given for the population and MI, respectively. 11 refs., 25 tabs.

  19. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...... development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech......; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...

  20. New Upper Bounds for Nonbinary Codes Based on the Terwilliger Algebra and Semidefinite Programming

    NARCIS (Netherlands)

    Gijswijt, D.C.; Schrijver, A.

    2006-01-01

    Abstract: We give a new upper bound on the maximum size $A_q(n,d)$ of a code of word length $n$ and minimum Hamming distance at least $d$ over the alphabet of $q\\geq 3$ letters. By block-diagonalizing the Terwilliger algebra of the nonbinary Hamming scheme, the bound can be calculated in time

  1. New code upper bounds from the Terwilliger algebra and semidefinite programming

    NARCIS (Netherlands)

    A. Schrijver (Alexander)

    2005-01-01

    textabstractWe give a new upper bound on the maximum size $A(n, d)$ of a binary code of word length $n$ and minimum distance at least $d$. It is based on block-diagonalising the Terwilliger algebra of the Hamming cube. The bound strengthens the Delsarte bound, and can be calculated with

  2. New upper bounds for nonbinary codes based on the Terwilliger algebra and semidefinite programming

    NARCIS (Netherlands)

    D. Gijswijt (Dion); A. Schrijver (Alexander); H. Tanaka

    2006-01-01

    htmlabstractWe give a new upper bound on the maximum size $A_q(n,d)$ of a code of word length $n$ and minimum Hamming distance at least $d$ over the alphabet of $q\\geq 3$ letters. By block-diagonalizing the Terwilliger algebra of the nonbinary Hamming scheme, the bound can be calculated in time

  3. Failure mode and effects analysis based risk profile assessment for stereotactic radiosurgery programs at three cancer centers in Brazil

    Energy Technology Data Exchange (ETDEWEB)

    Teixeira, Flavia C., E-mail: flavitiz@gmail.com [CNEN—Comissao Nacional de Energia Nuclear, Rio de Janeiro, RJ 22290-901, Brazil and LCR/UERJ—Laboratorio de Ciencias Radiologicas/Universidade do Estado do Rio de Janeiro, Rio de Janeiro, RJ 20550-013 (Brazil); Almeida, Carlos E. de [LCR/UERJ—Laboratorio de Ciencias Radiologicas/Universidade do Estado do Rio de Janeiro, Rio de Janeiro, RJ 20550-013 (Brazil); Saiful Huq, M. [Department of Radiation Oncology, University of Pittsburgh Cancer Institute and UPMC Cancer Center, Pittsburgh, Pennsylvania 15232 (United States)

    2016-01-15

    Purpose: The goal of this study was to evaluate the safety and quality management program for stereotactic radiosurgery (SRS) treatment processes at three radiotherapy centers in Brazil by using three industrial engineering tools (1) process mapping, (2) failure modes and effects analysis (FMEA), and (3) fault tree analysis. Methods: The recommendations of Task Group 100 of American Association of Physicists in Medicine were followed to apply the three tools described above to create a process tree for SRS procedure for each radiotherapy center and then FMEA was performed. Failure modes were identified for all process steps and values of risk priority number (RPN) were calculated from O, S, and D (RPN = O × S × D) values assigned by a professional team responsible for patient care. Results: The subprocess treatment planning was presented with the highest number of failure modes for all centers. The total number of failure modes were 135, 104, and 131 for centers I, II, and III, respectively. The highest RPN value for each center is as follows: center I (204), center II (372), and center III (370). Failure modes with RPN ≥ 100: center I (22), center II (115), and center III (110). Failure modes characterized by S ≥ 7, represented 68% of the failure modes for center III, 62% for center II, and 45% for center I. Failure modes with RPNs values ≥100 and S ≥ 7, D ≥ 5, and O ≥ 5 were considered as high priority in this study. Conclusions: The results of the present study show that the safety risk profiles for the same stereotactic radiotherapy process are different at three radiotherapy centers in Brazil. Although this is the same treatment process, this present study showed that the risk priority is different and it will lead to implementation of different safety interventions among the centers. Therefore, the current practice of applying universal device-centric QA is not adequate to address all possible failures in clinical processes at different

  4. Hydride heat pump. Volume I. Users manual for HYCSOS system design program. [HYCSOS code

    Energy Technology Data Exchange (ETDEWEB)

    Gorman, R.; Moritz, P.

    1978-05-01

    A method for the design and costing of a metal hydride heat pump for residential use and a computer program, HYCSOS, which automates that method are described. The system analyzed is one in which a metal hydride heat pump can provide space heating and space cooling powered by energy from solar collectors and electric power generated from solar energy. The principles and basic design of the system are presented, and the computer program is described giving detailed design and performance equations used in the program. The operation of the program is explained, and a sample run is presented. This computer program is part of an effort to design, cost, and evaluate a hydride heat pump for residential use. The computer program is written in standard Fortran IV and was run on a CDC Cyber 74 and Cyber 174 computer. A listing of the program is included as an appendix. This report is Volume 1 of a two-volume document.

  5. Application programming interface document for the modernized Transient Reactor Analysis Code (TRAC-M)

    Energy Technology Data Exchange (ETDEWEB)

    Mahaffy, J. [Pennsylvania State Univ., University Park, PA (United States); Boyack, B.E.; Steinke, R.G. [Los Alamos National Lab., NM (United States)

    1998-05-01

    The objective of this document is to ease the task of adding new system components to the Transient Reactor Analysis Code (TRAC) or altering old ones. Sufficient information is provided to permit replacement or modification of physical models and correlations. Within TRAC, information is passed at two levels. At the upper level, information is passed by system-wide and component-specific data modules at and above the level of component subroutines. At the lower level, information is passed through a combination of module-based data structures and argument lists. This document describes the basic mechanics involved in the flow of information within the code. The discussion of interfaces in the body of this document has been kept to a general level to highlight key considerations. The appendices cover instructions for obtaining a detailed list of variables used to communicate in each subprogram, definitions and locations of key variables, and proposed improvements to intercomponent interfaces that are not available in the first level of code modernization.

  6. Commercial applications of solar total energy systems. Volume 4. Appendices. Final report. [Solar Total Energy System Evaluation Program (STESEP) code

    Energy Technology Data Exchange (ETDEWEB)

    Boobar, M.G.; McFarland, B.L.; Nalbandian, S.J.; Willcox, W.W.; French, E.P.; Smith, K.E.

    1978-07-01

    A methodology has been developed by Atomics International under contract to the Department of Energy to define the applicability of solar total energy systems (STES) to the commercial sector (e.g., retail stores, shopping centers, offices, etc.) in the United States. Candidate STES concepts were selected to provide on-site power generation capability, as well as thermal energy for both heating and cooling applications. Each concept was evaluated on the basis of its cost effectiveness (i.e., as compared to other concepts) and its ability to ultimately penetrate and capture a significant segment of this market, thereby resulting in a saving of fossil fuel resources. This volume contains the appendices. Topics include deterministic insolation model computer code; building energy usage data; computer simulation programs for building energy demand analysis; model buildings for STES evaluation; Solar Total Energy System Evaluation Program (STESEP) computer code; transient simulation of STES concept; solar data tape analysis; program listings and sample output for use with TRNSYS; transient simulation, and financial parameters sensitivities. (WHK)

  7. Overview of the U.S. DOE Hydrogen Safety, Codes and Standards Program. Part 4: Hydrogen Sensors; Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Buttner, William J.; Rivkin, Carl; Burgess, Robert; Brosha, Eric; Mukundan, Rangachary; James, C. Will; Keller, Jay

    2016-12-01

    Hydrogen sensors are recognized as a critical element in the safety design for any hydrogen system. In this role, sensors can perform several important functions including indication of unintended hydrogen releases, activation of mitigation strategies to preclude the development of dangerous situations, activation of alarm systems and communication to first responders, and to initiate system shutdown. The functionality of hydrogen sensors in this capacity is decoupled from the system being monitored, thereby providing an independent safety component that is not affected by the system itself. The importance of hydrogen sensors has been recognized by DOE and by the Fuel Cell Technologies Office's Safety and Codes Standards (SCS) program in particular, which has for several years supported hydrogen safety sensor research and development. The SCS hydrogen sensor programs are currently led by the National Renewable Energy Laboratory, Los Alamos National Laboratory, and Lawrence Livermore National Laboratory. The current SCS sensor program encompasses the full range of issues related to safety sensors, including development of advance sensor platforms with exemplary performance, development of sensor-related code and standards, outreach to stakeholders on the role sensors play in facilitating deployment, technology evaluation, and support on the proper selection and use of sensors.

  8. Building "My First NMRviewer": A Project Incorporating Coding and Programming Tasks in the Undergraduate Chemistry Curricula

    Science.gov (United States)

    Arrabal-Campos, Francisco M.; Cortés-Villena, Alejandro; Fernández, Ignacio

    2017-01-01

    This paper presents a programming project named NMRviewer that allows students to visualize transformed and processed 1 H NMR data in an accessible, interactive format while allowing instructors to incorporate programming content into the chemistry curricula. Using the MATLAB graphical user interface development environment (GUIDE), students can…

  9. Blended Synchronous Delivery Mode in Graduate Programs: A Literature Review and Its Implementation in the Master Teacher Program

    Science.gov (United States)

    Lakhal, Sawsen; Bateman, Dianne; Bédard, Janie

    2017-01-01

    The aim of this study is to present a narrative literature review of advantages, challenges, and conditions for the success of blended synchronous course delivery mode. For this purpose, we searched the database EditLib and analyzed 16 existing papers from 2001 to 2016. The conditions for success were operationalized in the Master Teacher Program…

  10. A 20 GHz, high efficiency dual mode TWT for the ACTS program. [Advanced Communications Technology Satellite

    Science.gov (United States)

    Muennemann, Frank; Dombro, Louis; Long, Jin

    1986-01-01

    The development of a 50 W/10 W dual mode K-band downlink TWT is examined, and its performance is evaluated. The designs of the electron gun, RF circuit, and collector for the TWT, which is enclosed in a capsule, are described. It is observed that the high power mode (HPM) power output is at 50 GHz and the low power mode (LPM) output is at 12 GHz; the saturated gain is 52.5 dB for HPM and 3 dB for LPM; the AM-PM is 4.2 dB; the HPM dc power output is 104 W; and the LPM dc output is 42 W; and the efficiency is 45 percent for the HPM and 28.6 percent for the LPM.

  11. Integer-Linear-Programing Optimization in Scalable Video Multicast with Adaptive Modulation and Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dongyul Lee

    2014-01-01

    Full Text Available The advancement in wideband wireless network supports real time services such as IPTV and live video streaming. However, because of the sharing nature of the wireless medium, efficient resource allocation has been studied to achieve a high level of acceptability and proliferation of wireless multimedia. Scalable video coding (SVC with adaptive modulation and coding (AMC provides an excellent solution for wireless video streaming. By assigning different modulation and coding schemes (MCSs to video layers, SVC can provide good video quality to users in good channel conditions and also basic video quality to users in bad channel conditions. For optimal resource allocation, a key issue in applying SVC in the wireless multicast service is how to assign MCSs and the time resources to each SVC layer in the heterogeneous channel condition. We formulate this problem with integer linear programming (ILP and provide numerical results to show the performance under 802.16 m environment. The result shows that our methodology enhances the overall system throughput compared to an existing algorithm.

  12. Integer-linear-programing optimization in scalable video multicast with adaptive modulation and coding in wireless networks.

    Science.gov (United States)

    Lee, Dongyul; Lee, Chaewoo

    2014-01-01

    The advancement in wideband wireless network supports real time services such as IPTV and live video streaming. However, because of the sharing nature of the wireless medium, efficient resource allocation has been studied to achieve a high level of acceptability and proliferation of wireless multimedia. Scalable video coding (SVC) with adaptive modulation and coding (AMC) provides an excellent solution for wireless video streaming. By assigning different modulation and coding schemes (MCSs) to video layers, SVC can provide good video quality to users in good channel conditions and also basic video quality to users in bad channel conditions. For optimal resource allocation, a key issue in applying SVC in the wireless multicast service is how to assign MCSs and the time resources to each SVC layer in the heterogeneous channel condition. We formulate this problem with integer linear programming (ILP) and provide numerical results to show the performance under 802.16 m environment. The result shows that our methodology enhances the overall system throughput compared to an existing algorithm.

  13. Compliance Performance: Effects of a Provider Incentive Program and Coding Compliance Plan

    National Research Council Canada - National Science Library

    Tudela, Joseph A

    2004-01-01

    ...) and select attributes and experience/training variables. For BAMC's provider incentive program, analysis reveals statistical significance for record compliance rates with data dated measures, F(underscored)(1,103)= 4.74, p(underscored) = .03...

  14. Trends in Canadian faculties of education: An overview of graduate programs, curricular offerings, exit requirements, and modes of delivery.

    Directory of Open Access Journals (Sweden)

    Carla Abreu Ellis

    2008-07-01

    Full Text Available Introduction This research investigated universities registered with the Association of Universities and Colleges of Canada (AUCC whose primary instructional language was English. A content analysis was performed on university web pages related to the following content: (a frequency of graduate programs being offered, (b types of degrees being offered, (c frequency and variation of program of study offerings, (d variation of exit requirements, and (e modalities of course delivery. This research provides an overview and analysis of graduate level programs, more precisely Masters and Doctorate degrees, offered through faculties of education in Canada. An understanding of the findings of this research may benefit Canadian university administrative bodies in providing a source in which they may compare findings with their current offerings and programming. Prospective students of graduate programs in education may also benefit from the information provided in this study when choosing a program of study by ameliorating their knowledge of current programs, curriculum offerings, and modes of course delivery being offered by faculties of education in Canada.

  15. Studying Students' Attitudes on Using Examples of Game Source Code for Learning Programming

    Science.gov (United States)

    Theodoraki, Aristea; Xinogalos, Stelios

    2014-01-01

    Games for learning are currently used in several disciplines for motivating students and enhancing their learning experience. This new approach of technology-enhanced learning has attracted researchers' and instructors' attention in the area of programming that is one of the most cognitively demanding fields in Computer Science. Several…

  16. Why zombies cannot write significant source code: The Knowledge Game and the art of computer programming

    NARCIS (Netherlands)

    Gobbo, F.; Benini, M.

    2015-01-01

    This article analyses the knowledge needed to understand a computer program within the philosophy of information. L. Floridi's method of levels of abstraction is applied to the relation between an ideal programmer and a modern computer seen together as an informational organism. The results obtained

  17. Architectural Visualization of C/C++ Source Code for Program Comprehension

    Energy Technology Data Exchange (ETDEWEB)

    Panas, T; Epperly, T W; Quinlan, D; Saebjornsen, A; Vuduc, R

    2006-09-01

    Structural and behavioral visualization of large-scale legacy systems to aid program comprehension is still a major challenge. The challenge is even greater when applications are implemented in flexible and expressive languages such as C and C++. In this paper, we consider visualization of static and dynamic aspects of large-scale scientific C/C++ applications. For our investigation, we reuse and integrate specialized analysis and visualization tools. Furthermore, we present a novel layout algorithm that permits a compressive architectural view of a large-scale software system. Our layout is unique in that it allows traditional program visualizations, i.e., graph structures, to be seen in relation to the application's file structure.

  18. TIPONLINE Code Table

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Coded items are entered in the tiponline data entry program. The codes and their explanations are necessary in order to use the data

  19. The C programming Micro lecture designing mode study in mobile learning circumstance

    Directory of Open Access Journals (Sweden)

    Zhu Qing-Ting

    2017-01-01

    Full Text Available With the exuberant developing of mobile communication tech and education resources, the mobile, non-formal, fragmented, personal learning concepts started to threaten the traditional college education. This article explored the function that the Micro lecture applying in the personal study of students in the C program course education based on mobile learning circumstance; discussed the role Micro lecture can play in c program course education. And, according to the cognitive ability of students, the constitute elements and the general structure of the Micro lecture supporting platform are divided by program design, which eventually offer the applying model of c program teaching based on Micro lecture in the perspective of mobile learning.

  20. Establishing a communications link between two different, incompatible, personal computers: with practical examples and illustrations and program code.

    Science.gov (United States)

    Davidson, R W

    1985-01-01

    The increasing need to communicate to exchange data can be handled by personal microcomputers. The necessity for the transference of information stored in one type of personal computer to another type of personal computer is often encountered in the process of integrating multiple sources of information stored in different and incompatible computers in Medical Research and Practice. A practical example is demonstrated with two relatively inexpensive commonly used computers, the IBM PC jr. and the Apple IIe. The basic input/output (I/O) interface chip for serial communication for each computer are joined together using a Null connector and cable to form a communications link. Using BASIC (Beginner's All-purpose Symbolic Instruction Code) Computer Language and the Disk Operating System (DOS) the communications handshaking protocol and file transfer is established between the two computers. The BASIC programming languages used are Applesoft (Apple Personal Computer) and PC BASIC (IBM Personal computer).

  1. Systems Analysis Programs for Hands-on Integrated Reliability Evaluations (SAPHIRE) Code Reference Manual

    Energy Technology Data Exchange (ETDEWEB)

    C. L. Smith; K. J. Kvarfordt; S. T. Wood

    2006-07-01

    The Systems Analysis Programs for Hands-on Integrated Reliability Evaluations (SAPHIRE) is a software application developed for performing a complete probabilistic risk assessment (PRA) using a personal computer. SAPHIRE is funded by the U.S. Nuclear Regulatory Commission (NRC) and developed by the Idaho National Laboratory (INL). The INL's primary role in this project is that of software developer. However, the INL also plays an important role in technology transfer by interfacing and supporting SAPHIRE users comprised of a wide range of PRA practitioners from the NRC, national laboratories, the private sector, and foreign countries. SAPHIRE can be used to model a complex system’s response to initiating events, quantify associated damage outcome frequencies, and identify important contributors to this damage (Level 1 PRA) and to analyze containment performance during a severe accident and quantify radioactive releases (Level 2 PRA). It can be used for a PRA evaluating a variety of operating conditions, for example, for a nuclear reactor at full power, low power, or at shutdown conditions. Furthermore, SAPHIRE can be used to analyze both internal and external initiating events and has special features for ansforming models built for internal event analysis to models for external event analysis. It can also be used in a limited manner to quantify risk in terms of release consequences to both the public and the environment (Level 3 PRA). SAPHIRE includes a separate module called the Graphical Evaluation Module (GEM). GEM provides a highly specialized user interface with SAPHIRE that automates SAPHIRE process steps for evaluating operational events at commercial nuclear power plants. Using GEM, an analyst can estimate the risk associated with operational events in a very efficient and expeditious manner. This reference guide will introduce the SAPHIRE Version 7.0 software. A brief discussion of the purpose and history of the software is included along with

  2. Systems Analysis Programs for Hands-on Integrated Reliability Evaluations (SAPHIRE) Code Reference Manual

    Energy Technology Data Exchange (ETDEWEB)

    C. L. Smith; K. J. Kvarfordt; S. T. Wood

    2008-08-01

    The Systems Analysis Programs for Hands-on Integrated Reliability Evaluations (SAPHIRE) is a software application developed for performing a complete probabilistic risk assessment (PRA) using a personal computer. SAPHIRE is funded by the U.S. Nuclear Regulatory Commission (NRC) and developed by the Idaho National Laboratory (INL). The INL's primary role in this project is that of software developer. However, the INL also plays an important role in technology transfer by interfacing and supporting SAPHIRE users comprised of a wide range of PRA practitioners from the NRC, national laboratories, the private sector, and foreign countries. SAPHIRE can be used to model a complex system’s response to initiating events, quantify associated damage outcome frequencies, and identify important contributors to this damage (Level 1 PRA) and to analyze containment performance during a severe accident and quantify radioactive releases (Level 2 PRA). It can be used for a PRA evaluating a variety of operating conditions, for example, for a nuclear reactor at full power, low power, or at shutdown conditions. Furthermore, SAPHIRE can be used to analyze both internal and external initiating events and has special features for transforming models built for internal event analysis to models for external event analysis. It can also be used in a limited manner to quantify risk in terms of release consequences to both the public and the environment (Level 3 PRA). SAPHIRE includes a separate module called the Graphical Evaluation Module (GEM). GEM provides a highly specialized user interface with SAPHIRE that automates SAPHIRE process steps for evaluating operational events at commercial nuclear power plants. Using GEM, an analyst can estimate the risk associated with operational events in a very efficient and expeditious manner. This reference guide will introduce the SAPHIRE Version 7.0 software. A brief discussion of the purpose and history of the software is included along with

  3. Training program for energy conservation in new building construction. Volume III. Energy conservation technology for plan examiners and code administrators. Energy Conservation Technology Series 200

    Energy Technology Data Exchange (ETDEWEB)

    None

    1977-12-01

    Under the sponsorship of the United States Department of Energy, a Model Code for Energy Conservation in New Building Construction has been developed by those national organizations primarily concerned with the development and promulgation of model codes. The technical provisions are based on ASHRAE Standard 90-75 and are intended for use by state and local officials. The subject of regulation of new building construction to assure energy conservation is recognized as one in which code officials have not had previous exposure. It was also determined that application of the model code would be made at varying levels by officials with both a specific requirement for knowledge and a differing degree of prior training in the state-of-the-art. Therefore, a training program and instructional materials were developed for code officials to assist them in the implementation and enforcement of energy efficient standards and codes. The training program for Energy Conservation Tehnology for Plan Examiners and Code Administrators (ECT Series 200) is presented.

  4. Effects of Mode of Target Task Selection on Learning about Plants in a Mobile Learning Environment: Effortful Manual Selection versus Effortless QR-Code Selection

    Science.gov (United States)

    Gao, Yuan; Liu, Tzu-Chien; Paas, Fred

    2016-01-01

    This study compared the effects of effortless selection of target plants using quick respond (QR) code technology to effortful manual search and selection of target plants on learning about plants in a mobile device supported learning environment. In addition, it was investigated whether the effectiveness of the 2 selection methods was…

  5. Sequential computation of elementary modes and minimal cut sets in genome-scale metabolic networks using alternate integer linear programming

    Energy Technology Data Exchange (ETDEWEB)

    Song, Hyun-Seob; Goldberg, Noam; Mahajan, Ashutosh; Ramkrishna, Doraiswami

    2017-03-27

    Elementary (flux) modes (EMs) have served as a valuable tool for investigating structural and functional properties of metabolic networks. Identification of the full set of EMs in genome-scale networks remains challenging due to combinatorial explosion of EMs in complex networks. It is often, however, that only a small subset of relevant EMs needs to be known, for which optimization-based sequential computation is a useful alternative. Most of the currently available methods along this line are based on the iterative use of mixed integer linear programming (MILP), the effectiveness of which significantly deteriorates as the number of iterations builds up. To alleviate the computational burden associated with the MILP implementation, we here present a novel optimization algorithm termed alternate integer linear programming (AILP). Results: Our algorithm was designed to iteratively solve a pair of integer programming (IP) and linear programming (LP) to compute EMs in a sequential manner. In each step, the IP identifies a minimal subset of reactions, the deletion of which disables all previously identified EMs. Thus, a subsequent LP solution subject to this reaction deletion constraint becomes a distinct EM. In cases where no feasible LP solution is available, IP-derived reaction deletion sets represent minimal cut sets (MCSs). Despite the additional computation of MCSs, AILP achieved significant time reduction in computing EMs by orders of magnitude. The proposed AILP algorithm not only offers a computational advantage in the EM analysis of genome-scale networks, but also improves the understanding of the linkage between EMs and MCSs.

  6. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives...

  7. Analysis of MELCOR code structure

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dong Ha; Park, Sun Hee

    2000-04-01

    MELCOR executes in two parts. The first is a MELGEN program, in which most of the input is specified, processed, and checked. The second part of MELCOR is the MELCOR program itself, which advances the program through time based on the database generated by MELGEN and any additional MELCOR input. In particular, MELCOR execution involves two steps: (1) a setup mode in MEXSET, during which the database is read from the restart file and any additional input is processed, and (2) a run mode in MEXRUN, which advances the simulation through time, updating the time-dependent portion of the database each cycle. MELGEN and MELCOR share a structured and modular architecture that facilitates the incorporation of additional or altenative phenomenological modes. This structure consists of four primary levels: executive level, database manager routine level, package level, and utility level. MELCOR is composed of 24 different packages, each of which models a different portion of the accident phenomenology or program control. To identify the relation of the MELCOR subroutines with the packages, first two or three letters of the package's name are duplicated in the name of the subroutines. The same rule applies to the naming of the common block. Data flows and the specific subroutines in the MELGEN and MELCOR are analyzed by their functions according to the hierarchy of four levels for model improvement and replacement during the integral code development project.

  8. Gamma Ray Shielding Study of Barium–Bismuth–Borosilicate Glasses as Transparent Shielding Materials using MCNP-4C Code, XCOM Program, and Available Experimental Data

    Directory of Open Access Journals (Sweden)

    Reza Bagheri

    2017-02-01

    Full Text Available In this work, linear and mass attenuation coefficients, effective atomic number and electron density, mean free paths, and half value layer and 10th value layer values of barium–bismuth–borosilicate glasses were obtained for 662 keV, 1,173 keV, and 1,332 keV gamma ray energies using MCNP-4C code and XCOM program. Then obtained data were compared with available experimental data. The MCNP-4C code and XCOM program results were in good agreement with the experimental data. Barium–bismuth–borosilicate glasses have good gamma ray shielding properties from the shielding point of view.

  9. MO-DE-207-04: Imaging educational program on solutions to common pediatric imaging challenges

    Energy Technology Data Exchange (ETDEWEB)

    Krishnamurthy, R. [Texas Children’s Hospital: Pediatric MRI Quality, Artifacts, and Safety (United States)

    2015-06-15

    This imaging educational program will focus on solutions to common pediatric imaging challenges. The speakers will present collective knowledge on best practices in pediatric imaging from their experience at dedicated children’s hospitals. The educational program will begin with a detailed discussion of the optimal configuration of fluoroscopes for general pediatric procedures. Following this introduction will be a focused discussion on the utility of Dual Energy CT for imaging children. The third lecture will address the substantial challenge of obtaining consistent image post -processing in pediatric digital radiography. The fourth and final lecture will address best practices in pediatric MRI including a discussion of ancillary methods to reduce sedation and anesthesia rates. Learning Objectives: To learn techniques for optimizing radiation dose and image quality in pediatric fluoroscopy To become familiar with the unique challenges and applications of Dual Energy CT in pediatric imaging To learn solutions for consistent post-processing quality in pediatric digital radiography To understand the key components of an effective MRI safety and quality program for the pediatric practice.

  10. The chromatin regulatory code: Beyond a histone code

    Science.gov (United States)

    Lesne, A.

    2006-03-01

    In this commentary on the contribution by Arndt Benecke in this issue, I discuss why the notion of “chromatin code” introduced and elaborated in this paper is to be preferred to that of “histone code”. Speaking of a code as regards nucleosome conformation and histone tail post-translational modifications only makes sense within the chromatin fiber, where their physico-chemical features can be translated into regulatory programs at the genome level, by means of a complex, multi-level interplay with the fiber architecture and dynamics settled in the course of Evolution. In particular, this chromatin code presumably exploits allosteric transitions of the chromatin fiber. The chromatin structure dependence of its translation suggests two alternative modes of transcription initiation regulation, also proposed in the paper by A. Benecke in this issue for interpreting strikingly bimodal micro-array data.

  11. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  12. Non-physiological increase of AV conduction time in sinus disease patients programmed in AAIR-based pacing mode.

    Science.gov (United States)

    Mabo, Philippe; Cebron, Jean-Pierre; Solnon, Aude; Tassin, Aude; Graindorge, Laurence; Gras, Daniel

    2012-11-01

    The EVOCAV(DS) trial aimed to quantify the paradoxal atrioventricular (AV) conduction time lengthening in sinus node (SD) patients (pts) paced in AAIR-based pacing mode. SD pts, implanted with dual-chamber pacemaker programmed in AAIR-based pacing mode, were randomized in two arms for a 1-month period: the low atrial pacing (LAP; basic rate at 60 bpm, dual sensor with minimal slope) and the high atrial pacing (HAP; basic rate at 70 bpm, dual sensor with optimized slope, overdrive pacing) arm. At 1 month, crossover was performed for an additional 1-month period. AV conduction time, AV block occurrence and AV conduction time adaptation during exercise were ascertained from device memories at each follow-up. Seventy-nine pts participated to the analysis (75 ± 8 years; 32 male; PR = 184 ± 38 ms; bundle branch block n = 12; AF history n = 36; antiarrhythmic treatment n = 53; beta-blockers n = 27; class III/Ic n = 18; both n = 8). The mean AV conduction time was significantly greater during the HAP (275 ± 51 ms) vs. LAP (263 ± 49 ms) period (p AAIR-based pacing in SD pts may induce a significant lengthening of pts' AV conduction time, including frequent abnormal adaptation of AV conduction time during exercise.

  13. The SAGE-Spec Spitzer Legacy program: Identification of Spitzer-IRS staring mode targets in the Large Magellanic Cloud

    Science.gov (United States)

    Jones, Olivia; Sage-Spec Team

    2017-01-01

    The Infrared Spectrograph (IRS) on the Spitzer Space Telescope observed over 1000 point sources in the Large Magellanic Cloud (LMC). As a follow up to the SAGE-Spec legacy program (Kemper et al. 2010), we have now extended the initial classification of 197 sources in the LMC (Woods et al. 2011) to all 1000 Spitzer-IRS staring mode targets in the SAGE footprint. We classify these point sources into evolutionary and chemical types according to their infrared spectral features, continuum and spectral energy distribution shape, bolometric luminosity, cluster membership, and variability information. This spectral classification will allow us improve our understanding of the stellar populations in the LMC, study the composition, and characteristics of dust species in a variety of LMC objects, and to verify the photometric classification methods used by mid-IR surveys. Finally we discuss the application of mid-IR spectral and photometric classifications to data that will be obtained from the MIRI instrument on JWST.

  14. Sequential computation of elementary modes and minimal cut sets in genome-scale metabolic networks using alternate integer linear programming.

    Science.gov (United States)

    Song, Hyun-Seob; Goldberg, Noam; Mahajan, Ashutosh; Ramkrishna, Doraiswami

    2017-08-01

    Elementary (flux) modes (EMs) have served as a valuable tool for investigating structural and functional properties of metabolic networks. Identification of the full set of EMs in genome-scale networks remains challenging due to combinatorial explosion of EMs in complex networks. It is often, however, that only a small subset of relevant EMs needs to be known, for which optimization-based sequential computation is a useful alternative. Most of the currently available methods along this line are based on the iterative use of mixed integer linear programming (MILP), the effectiveness of which significantly deteriorates as the number of iterations builds up. To alleviate the computational burden associated with the MILP implementation, we here present a novel optimization algorithm termed alternate integer linear programming (AILP). Our algorithm was designed to iteratively solve a pair of integer programming (IP) and linear programming (LP) to compute EMs in a sequential manner. In each step, the IP identifies a minimal subset of reactions, the deletion of which disables all previously identified EMs. Thus, a subsequent LP solution subject to this reaction deletion constraint becomes a distinct EM. In cases where no feasible LP solution is available, IP-derived reaction deletion sets represent minimal cut sets (MCSs). Despite the additional computation of MCSs, AILP achieved significant time reduction in computing EMs by orders of magnitude. The proposed AILP algorithm not only offers a computational advantage in the EM analysis of genome-scale networks, but also improves the understanding of the linkage between EMs and MCSs. The software is implemented in Matlab, and is provided as supplementary information . hyunseob.song@pnnl.gov. Supplementary data are available at Bioinformatics online.

  15. Creating Tomorrow's Technologists: Contrasting Information Technology Curriculum in North American Library and Information Science Graduate Programs against Code4lib Job Listings

    Science.gov (United States)

    Maceli, Monica

    2015-01-01

    This research study explores technology-related course offerings in ALA-accredited library and information science (LIS) graduate programs in North America. These data are juxtaposed against a text analysis of several thousand LIS-specific technology job listings from the Code4lib jobs website. Starting in 2003, as a popular library technology…

  16. Prenatal Centrifugation: A Mode1 for Fetal Programming of Body Weight?

    Science.gov (United States)

    Baer, Lisa A.; Rushing, Linda; Wade, Charles E.; Ronca, April E.

    2005-01-01

    'Fetal programming' is a newly emerging field that is revealing astounding insights into the prenatal origins of adult disease, including metabolic, endocrine, and cardiovascular pathophysiology. In the present study, we tested the hypothesis that rat pups conceived, gestated and born at 2-g have significantly reduced birth weights and increased adult body weights as compared to 1-g controls. Offspring were produced by mating young adult male and female rats that were adapted to 2-g centrifugation. Female rats underwent conception, pregnancy and birth at 2-g. Newborn pups in the 2-g condition were removed from the centrifuge and fostered to non-manipulated, newly parturient dams maintained at 1 -g. Comparisons were made with 1-g stationary controls, also crossfostered at birth. As compared to 1-g controls, birth weights of pups gestated and born at 2-g were significantly reduced. Pup body weights were significantly reduced until Postnatal day (P) 12. Beginning on P63, body weights of 2-g-gestated offspring exceeded those of 1-g controls by 7-10%. Thus, prenatal rearing at 2-g restricts neonatal growth and increases adult body weight. Collectively, these data support the hypothesis that 2-g centrifugation alters the intrauterine milieu, thereby inducing persistent changes in adult phenotype.

  17. A user's guide to the SUDAN computer program for determining the vibration modes of structural systems. Ph.D. Thesis - Case Western Reserve Univ., Jun. 1963

    Science.gov (United States)

    Kvaternik, R. G.; Durling, B. J.

    1978-01-01

    The use of the SUDAN computer program for analyzing structural systems for their natural modes and frequencies of vibration is described. SUDAN is intended for structures which can be represented as an equivalent system of beam, spring, and rigid-body substructures. User-written constraint equations are used to analytically join the mass and stiffness matrices of the substructures to form the mass and stiffness matrices of the complete structure from which all the frequencies and modes of the system are determined. The SUDAN program can treat the case in which both the mass and stiffness matrices of the coupled system may be singular simultaneously. A general description of the FORTRAN IV program is given, the computer hardware and software specifications are indicated, and the input required by the program is described.

  18. The study of Genetic Algorithm by Hierarchical Coded for the MMRCPSP

    Science.gov (United States)

    Shi-man, Xie; Chen, Jian-wei; Xuan, Zhao-yan

    In order to solve the problem of Multi-Mode Resource Constrained Project Scheduling Problem (MMRCPSP), this paper suggests Genetic Algorithm (GA) by hierarchical coded. In the first layer, the chromosomes are used to choose the activity sequence. In the second layer, the chromosomes are used to decide the combination of activity modes. The chromosomes produced by the Activities Resource Competition Relation (ARCR) are coded by binary code. That is to say, the subsequent operation will be improved by mature algorithm including selection, crossover and mutation. Finally, programing used PSBLIB standard data shows that this algorithm is feasible.

  19. Algorithm and Program for Calculation and Analysis of Modes and Losses of Electric Energy in Electricity Distribution Networks of 6–20 kV

    Directory of Open Access Journals (Sweden)

    M. Fursanov

    2013-01-01

    Full Text Available A refined mathematical model and algorithm for operative control of the modes and detection of energy loss sites in electricity distribution networks of 6–20 kV have been developed in the paper. The developed software program can be used for testing other technical solutions and computer programs pertaining to the area of research and it is considered as one of the most important components applied for creation of intellectual electric networks.

  20. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...... to understand the socio-technical side of a changing network environment. Through the study of code, including but not limited to source code, technical specifications and other materials in relation to the artwork production, I would like to explore the materiality of code that goes beyond technical...

  1. Summary Report for ASC L2 Milestone #4782: Assess Newly Emerging Programming and Memory Models for Advanced Architectures on Integrated Codes

    Energy Technology Data Exchange (ETDEWEB)

    Neely, J. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hornung, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Black, A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Robinson, P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-09-29

    This document serves as a detailed companion to the powerpoint slides presented as part of the ASC L2 milestone review for Integrated Codes milestone #4782 titled “Assess Newly Emerging Programming and Memory Models for Advanced Architectures on Integrated Codes”, due on 9/30/2014, and presented for formal program review on 9/12/2014. The program review committee is represented by Mike Zika (A Program Project Lead for Kull), Brian Pudliner (B Program Project Lead for Ares), Scott Futral (DEG Group Lead in LC), and Mike Glass (Sierra Project Lead at Sandia). This document, along with the presentation materials, and a letter of completion signed by the review committee will act as proof of completion for this milestone.

  2. Programed nebulizing-gas pressure mode for quantitative capillary electrophoresis-mass spectrometry analysis of endocrine disruptors in honey.

    Science.gov (United States)

    Domínguez-Álvarez, Javier; Rodríguez-Gonzalo, Encarnación; Hernández-Méndez, Jesús; Carabias-Martínez, Rita

    2012-08-01

    The application of programed nebulizing-gas pressure (PNP) has been previously described to be a simple strategy for the separation of anions by capillary electrophoresis-electrospray-mass spectrometry (CE-ESI-MS). The PNP mode provided high resolution and stable analyses and also had the advantage of allowing the use of capillaries wider than the 50-75 μm conventional ones. Here, the application of the PNP approach to the quantitative analysis of pollutants in real samples by CE-ESI-MS is described for the first time; in particular, for the determination several endocrine disruptors (2,4-dichlorophenol, 2,4,5-trichlorophenol, pentachlorophenol, bisphenol-A, 4-tert-butyl-phenol, and 4-tert-butyl benzoic acid) in honey. For sample pretreatment, different liquid-liquid extraction (LLE) procedures were assayed and compared to the QuEChERS(©) methodology prior to electrophoretic analysis. With the application of the PNP approach to CE-ESI-MS, the limits of detection achieved were in the 1-4 ng/g range with a simple liquid-liquid procedure without any further clean-up step; relative standard deviation values in the 2-9% range were found. The analytical characteristics allow the proposed method to be used in the control analysis of these compounds in honey. © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  3. Optimized periodic verification testing blended risk and performance-based MOV inservice test program an application of ASME code case OMN-1

    Energy Technology Data Exchange (ETDEWEB)

    Sellers, C.; Fleming, K.; Bidwell, D.; Forbes, P. [and others

    1996-12-01

    This paper presents an application of ASME Code Case OMN-1 to the GL 89-10 Program at the South Texas Project Electric Generating Station (STPEGS). Code Case OMN-1 provides guidance for a performance-based MOV inservice test program that can be used for periodic verification testing and allows consideration of risk insights. Blended probabilistic and deterministic evaluation techniques were used to establish inservice test strategies including both test methods and test frequency. Described in the paper are the methods and criteria for establishing MOV safety significance based on the STPEGS probabilistic safety assessment, deterministic considerations of MOV performance characteristics and performance margins, the expert panel evaluation process, and the development of inservice test strategies. Test strategies include a mix of dynamic and static testing as well as MOV exercising.

  4. Computer Program of SIE ASME-NH Code for Structural Integrity Evaluation of Next Generation Reactors Subjecting to Elevated Temperature Operations

    Energy Technology Data Exchange (ETDEWEB)

    Koo, Gyeong Hoi; Lee, J. H

    2006-03-15

    In this report, the SIE ASME (Structural Integrity Evaluations by ASME-NH), which has a computerized implementation of ASME Pressure Vessels and Piping Code Section III Subsection NH rules, is developed to apply to the next generation reactor design subjecting to the elevated temperature operations over 500 .deg. C and over 30 years design lifetime, and the user's manual for this program is described in detail.

  5. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... code, etc.). The presentation relates this artistic fascination of code to a media critique expressed by Florian Cramer, claiming that the graphical interface represents a media separation (of text/code and image) causing alienation to the computer’s materiality. Cramer is thus the voice of a new ‘code...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  6. Impact of a pediatric primary care office-based mock code program on physician and staff confidence to perform life-saving skills.

    Science.gov (United States)

    Toback, Seth L; Fiedor, Melinda; Kilpela, Brian; Reis, Evelyn Cohen

    2006-06-01

    Previous studies have described that pediatric offices are ill-prepared for medical emergencies. Pediatric "mock codes" have been utilized to increase the emergency preparedness of inpatient medical units for several decades. These practice drills have been shown to both increase practitioners' confidence and decrease anxiety during actual resuscitations. Although the use of mock codes is recommended in the outpatient setting, these benefits have yet to be demonstrated for office-based practitioners. We conducted this study to determine whether mock codes performed in pediatric primary care offices increase practitioner confidence to perform life-saving skills. Pediatric group practices participated in a clinical trial of an office-based, 2-step, emergency preparedness training. First, physicians and staffs attended a 1-hour didactic program which included staff education, office emergency protocols, emergency equipment and medications, and guidelines on instituting a mock code program. Second, each practice participated in a 10-15-minute mock code exercise. The drill was conducted by pediatric advanced life support instructors. After the code, a 30-minute feedback session was conducted which reviewed office coordination, individual skill performance, and approach to resuscitation. Each participating practice also received an infant manikin and a text complete with several mock codes scenarios written specifically for the pediatric primary care office. Evaluation of the intervention consisted of 2 components. (1) Pre- and postintervention completion of a self-administered survey assessed participants' comfort in emergency situations and confidence to perform specific life-saving skills, using an ordinal scale: 1 = "strongly agree" to 5 = "strongly disagree". (2) Practices were contacted by telephone 12 months after the training to determine whether they had implemented improvements in emergency preparedness, including instituting mock codes, preparing a written

  7. PCRELAP5: data calculation program for RELAP 5 code; PCRELAP5: programa de calculo dos dados de entrada para o codigo RELAP5

    Energy Technology Data Exchange (ETDEWEB)

    Silvestre, Larissa Jacome Barros

    2016-07-01

    Nuclear accidents in the world led to the establishment of rigorous criteria and requirements for nuclear power plant operations by the international regulatory bodies. By using specific computer programs, simulations of various accidents and transients likely to occur at any nuclear power plant are required for certifying and licensing a nuclear power plant. Based on this scenario, some sophisticated computational tools have been used such as the Reactor Excursion and Leak Analysis Program (RELAP5), which is the most widely used code for the thermo-hydraulic analysis of accidents and transients in nuclear reactors in Brazil and worldwide. A major difficulty in the simulation by using RELAP5 code is the amount of information required for the simulation of thermal-hydraulic accidents or transients. The preparation of the input data requires a great number of mathematical operations to calculate the geometry of the components. Thus, for those calculations performance and preparation of RELAP5 input data, a friendly mathematical preprocessor was designed. The Visual Basic for Application (VBA) for Microsoft Excel demonstrated to be an effective tool to perform a number of tasks in the development of the program. In order to meet the needs of RELAP5 users, the RELAP5 Calculation Program (Programa de Calculo do RELAP5 - PCRELAP5) was designed. The components of the code were codified; all entry cards including the optional cards of each one have been programmed. In addition, an English version for PCRELAP5 was provided. Furthermore, a friendly design was developed in order to minimize the time of preparation of input data and errors committed by users. In this work, the final version of this preprocessor was successfully applied for Safety Injection System (SIS) of Angra 2. (author)

  8. The path of code linting

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  9. Cyclone Codes

    OpenAIRE

    Schindelhauer, Christian; Jakoby, Andreas; Köhler, Sven

    2016-01-01

    We introduce Cyclone codes which are rateless erasure resilient codes. They combine Pair codes with Luby Transform (LT) codes by computing a code symbol from a random set of data symbols using bitwise XOR and cyclic shift operations. The number of data symbols is chosen according to the Robust Soliton distribution. XOR and cyclic shift operations establish a unitary commutative ring if data symbols have a length of $p-1$ bits, for some prime number $p$. We consider the graph given by code sym...

  10. An Ensemble Empirical Mode Decomposition, Self-Organizing Map, and Linear Genetic Programming Approach for Forecasting River Streamflow

    Directory of Open Access Journals (Sweden)

    Jonathan T. Barge

    2016-06-01

    Full Text Available This study focused on employing Linear Genetic Programming (LGP, Ensemble Empirical Mode Decomposition (EEMD, and the Self-Organizing Map (SOM in modeling the rainfall–runoff relationship in a mid-size catchment. Models were assessed with regard to their ability to capture daily discharge at Lock and Dam 10 along the Kentucky River as well as the hybrid design of EEM-SOM-LGP to make predictions multiple time-steps ahead. Different model designs were implemented to demonstrate the improvements of hybrid designs compared to LGP as a standalone application. Additionally, LGP was utilized to gain a better understanding of the catchment in question and to assess its ability to capture different aspects of the flow hydrograph. As a standalone application, LGP was able to outperform published Artificial Neural Network (ANN results over the same dataset, posting an average absolute relative error (AARE of 17.118 and Nash-Sutcliff (E of 0.937. Utilizing EEMD derived IMF runoff subcomponents for forecasting daily discharge resulted in an AARE of 14.232 and E of 0.981. Clustering the EEMD-derived input space through an SOM before LGP application returned the strongest results, posting an AARE of 10.122 and E of 0.987. Applying LGP to the distinctive low and high flow seasons demonstrated a loss in correlation for the low flow season with an under-predictive nature signified by a normalized mean biased error (NMBE of −2.353. Separating the rising and falling trends of the hydrograph showed that the falling trends were more easily captured with an AARE of 8.511 and E of 0.968 compared to the rising trends AARE of 38.744 and E of 0.948. Utilizing the EEMD-SOM-LGP design to make predictions multiple-time-steps ahead resulted in a AARE of 43.365 and E of 0.902 for predicting streamflow three days ahead. The results demonstrate the effectiveness of utilizing EEMD and an SOM in conjunction with LGP for streamflow forecasting.

  11. Tearing mode dynamics and sawtooth oscillation in Hall-MHD

    Science.gov (United States)

    Ma, Zhiwei; Zhang, Wei; Wang, Sheng

    2017-10-01

    Tearing mode instability is one of the most important dynamic processes in space and laboratory plasmas. Hall effects, resulted from the decoupling of electron and ion motions, could cause the fast development and perturbation structure rotation of the tearing mode and become non-negligible. We independently developed high accuracy nonlinear MHD code (CLT) to study Hall effects on the dynamic evolution of tearing modes with Tokamak geometries. It is found that the rotation frequency of the mode in the electron diamagnetic direction is in a good agreement with analytical prediction. The linear growth rate increases with increase of the ion inertial length, which is contradictory to analytical solution in the slab geometry. We further find that the self-consistently generated rotation largely alters the dynamic behavior of the double tearing mode and the sawtooth oscillation. National Magnetic Confinement Fusion Science Program of China under Grant No. 2013GB104004 and 2013GB111004.

  12. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  13. Overview of Code Verification

    Science.gov (United States)

    1983-01-01

    The verified code for the SIFT Executive is not the code that executes on the SIFT system as delivered. The running versions of the SIFT Executive contain optimizations and special code relating to the messy interface to the hardware broadcast interface and to packing of data to conserve space in the store of the BDX930 processors. The running code was in fact developed prior to and without consideration of any mechanical verification. This was regarded as necessary experimentation with the SIFT hardware and special purpose Pascal compiler. The Pascal code sections cover: the selection of a schedule from the global executive broadcast, scheduling, dispatching, three way voting, and error reporting actions of the SIFT Executive. Not included in these sections of Pascal code are: the global executive, five way voting, clock synchronization, interactive consistency, low level broadcasting, and program loading, initialization, and schedule construction.

  14. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Sammenfatning af de mest væsentlige pointer fra hovedrapporten: Dokumentation og evaluering af Coding Class......Sammenfatning af de mest væsentlige pointer fra hovedrapporten: Dokumentation og evaluering af Coding Class...

  15. code {poems}

    Directory of Open Access Journals (Sweden)

    Ishac Bertran

    2012-08-01

    Full Text Available "Exploring the potential of code to communicate at the level of poetry," the code­ {poems} project solicited submissions from code­writers in response to the notion of a poem, written in a software language which is semantically valid. These selections reveal the inner workings, constitutive elements, and styles of both a particular software and its authors.

  16. Line-Editor Computer Program

    Science.gov (United States)

    Scott, Peter J.

    1989-01-01

    ZED editing program for DEC VAX computer simple, powerful line editor for text, program source code, and nonbinary data. Excels in processing of text by use of procedure files. Also features versatile search qualifiers, global changes, conditionals, online help, hexadecimal mode, space compression, looping, logical combinations of search strings, journaling, visible control characters, and automatic detabbing. Users of Cambridge implementation devised such ZED procedures as chess games, calculators, and programs for evaluating pi. Written entirely in C.

  17. Ocean Thermal Energy Conversion power system development. Phase I: preliminary design. Final report. [OSAP-1 code; OTEC Steady-State Analysis Program

    Energy Technology Data Exchange (ETDEWEB)

    Westerberg, Arthur

    1978-12-04

    The following appendices are included: highlights of direction and correspondence; user manual for OTEC Steady-State Analysis Program (OSAP-1); sample results of OSAP-1; surface condenser installations; double-clad systems; aluminum alloy seawater piping; references searched for ammonia evaluation; references on stress-corrosion for ammonia; references on anhydrous ammonia storage; references on miscellaneous ammonia items; OTEC materials testing; test reports; OTEC technical specification chlorination system; OTEC technical specification AMERTAP system; OTEC optimization program users guide; concrete hull construction; weight and stability estimates; packing factor data; machinery and equipment list; letter from HPTI on titanium tubes; tables on Wolverine Korodense tubes; evaporator and condenser enhancement tables; code weld titanium tube price, weight tables Alcoa tubing tables; Union Carbide tubing pricing tables; turbotec tubing pricing tables; Wolverine tubing pricing tables; Union Carbide tubing characteristics and pricing; working fluids and turbines for OTEC power system; and hydrodynamic design of prototype OTEC cold and warm seawater pumps. (WHK)

  18. Authorship Attribution of Source Code

    Science.gov (United States)

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  19. Parallelization of a numerical simulation code for isotropic turbulence

    Energy Technology Data Exchange (ETDEWEB)

    Sato, Shigeru; Yokokawa, Mitsuo; Watanabe, Tadashi; Kaburaki, Hideo

    1996-03-01

    A parallel pseudospectral code which solves the three-dimensional Navier-Stokes equation by direct numerical simulation is developed and execution time, parallelization efficiency, load balance and scalability are evaluated. A vector parallel supercomputer, Fujitsu VPP500 with up to 16 processors is used for this calculation for Fourier modes up to 256x256x256 using 16 processors. Good scalability for number of processors is achieved when number of Fourier mode is fixed. For small Fourier modes, calculation time of the program is proportional to NlogN which is ideal complexity of calculation for 3D-FFT on vector parallel processors. It is found that the calculation performance decreases as the increase of the Fourier modes. (author).

  20. Sharing code.

    Science.gov (United States)

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  1. Effects of Recruiting Midwives into a Family Physician Program on Women's Awareness and Preference for Mode of Delivery and Caesarean Section Rates in Rural Areas of Kurdistan.

    Science.gov (United States)

    Hajizadeh, Shayesteh; Tehrani, Fahimeh Ramezani; Simbar, Masoumeh; Farzadfar, Farshad

    2016-01-01

    The accepted rate rate of caesarean section is 15%. It is expected that an increase in the density of midwives in the family physician program lead to a decrease in this indicator. This study aimed to compare the rates of caesarean section and women's awareness and preference for mode of delivery before and after the implementation of the family physician program in health centres with and without an increase in midwives density. In this cross-sectional study, using multistage cluster sampling method a total of 668 mothers with two-month-old children were selected from among all mothers with two-month-old children who were living in rural areas of Kurdistan province. Using the difference-in-differences model and Matchit statistical model, the factors associated with caesarean section rates and women's awareness and preference for mode of delivery were compared in centres with and without an increase in midwives density after the implementation of the family physician program. To compare the changes before and after the program, we used the data collected from the same number of women in 2005 as the baseline. After adjusting for baseline data collected in 2005, the resutls showed no significant change in caesarean section rates and women's awareness and preference for mode of delivery in the centres with and without an increase in midwives density after the implementation of the family physician program. The Matchit model showed a significant mean increase 14%(0.03-0.25) in women's awareness of the benefits of natural childbirth between 2005 and 2013 in health centres where the density of midwives increased compared with health centres where it did not. The difference-in-differences model showed that the odds ratio of women's preference for caesarean section decreased by 41% among participants who were aware of the benefits of natural childbirth, (OR = 0.59, 95% CI: (0.22-0.85); P>0.001). The results of this study showed that an increase in the density of midwives

  2. Divergence coding for convolutional codes

    Directory of Open Access Journals (Sweden)

    Valery Zolotarev

    2017-01-01

    Full Text Available In the paper we propose a new coding/decoding on the divergence principle. A new divergent multithreshold decoder (MTD for convolutional self-orthogonal codes contains two threshold elements. The second threshold element decodes the code with the code distance one greater than for the first threshold element. Errorcorrecting possibility of the new MTD modification have been higher than traditional MTD. Simulation results show that the performance of the divergent schemes allow to approach area of its effective work to channel capacity approximately on 0,5 dB. Note that we include the enough effective Viterbi decoder instead of the first threshold element, the divergence principle can reach more. Index Terms — error-correcting coding, convolutional code, decoder, multithreshold decoder, Viterbi algorithm.

  3. Programų kūrimo procesų vertinimas, naudojant keletą procesų vertinimo modelių

    OpenAIRE

    Peldžius, Stasys

    2014-01-01

    Dauguma programinę įrangą kuriančių įmonių susiduria su problemomis: projektai vėluoja, viršijamas biudžetas, klientai nepatenkinti produktų kokybe. Daugelis problemų kyla dėl nebrandaus programų kūrimo proceso, pagal kurį įmonė įgyvendina projektus. Populiariausi pasaulyje programų kūrimo procesų vertinimo modeliai yra ISO/IEC 15504 ir CMMI. Įmonės, norėdamos būti oficialiai pripažintos platesnėje aplinkoje, renkasi vieną iš šių dviejų modelių. Įmonės susiduria su problema, kad skirtin...

  4. Some calculator programs for particle physics. [LEGENDRE, ASSOCIATED LEGENDRE, CONFIDENCE, TWO BODY, ELLIPSE, DALITZ RECTANGULAR, and DALITZ TRIANGULAR codes

    Energy Technology Data Exchange (ETDEWEB)

    Wohl, C.G.

    1982-01-01

    Seven calculator programs that do simple chores that arise in elementary particle physics are given. LEGENDRE evaluates the Legendre polynomial series ..sigma..a/sub n/P/sub n/(x) at a series of values of x. ASSOCIATED LEGENDRE evaluates the first-associated Legendre polynomial series ..sigma..b/sub n/P/sub n//sup 1/(x) at a series of values of x. CONFIDENCE calculates confidence levels for chi/sup 2/, Gaussian, or Poisson probability distributions. TWO BODY calculates the c.m. energy, the initial- and final-state c.m. momenta, and the extreme values of t and u for a 2-body reaction. ELLIPSE calculates coordinates of points for drawing an ellipse plot showing the kinematics of a 2-body reaction or decay. DALITZ RECTANGULAR calculates coordinates of points on the boundary of a rectangular Dalitz plot. DALITZ TRIANGULAR calculates coordinates of points on the boundary of a triangular Dalitz plot. There are short versions of CONFIDENCE (EVEN N and POISSON) that calculate confidence levels for the even-degree-of-freedom-chi/sup 2/ and the Poisson cases, and there is a short version of TWO BODY (CM) that calculates just the c.m. energy and initial-state momentum. The programs are written for the HP-97 calculator. (WHK)

  5. Coding labour

    National Research Council Canada - National Science Library

    McCosker, Anthony; Milne, Esther

    2014-01-01

    ... software. Code encompasses the laws that regulate human affairs and the operation of capital, behavioural mores and accepted ways of acting, but it also defines the building blocks of life as DNA...

  6. Differences in individual empowerment outcomes of socially disadvantaged women: effects of mode of participation and structural changes in a physical activity promotion program.

    Science.gov (United States)

    Röger, Ulrike; Rütten, Alfred; Frahsa, Annika; Abu-Omar, Karim; Morgan, Antony

    2011-10-01

    This study explored the differences in individual empowerment outcomes of a group of socially disadvantaged women participating in physical activity promotion. The outcomes observed were assessed in the context of the women's mode of participation and the structural organizational and community level changes, which took place during the implementation of the program. Fifteen semi-structured qualitative interviews were conducted and analyzed using qualitative content analysis. Two groups of women participated in the interviews--those involved in the whole process of planning, implementation and evaluation of the program and those who took part in the program activities. Individual empowerment outcomes were achieved for all those interviewed, although those participating in the planning, implementation and evaluation of the program achieved the greatest. A number of organizational and community level processes were also identified that supported the individual empowerment of those taking part. This study supports the use of multilevel empowerment approaches to health as they help to identify the ideal characteristics that organizations and communities should possess and the potential structural changes required to support individual empowerment.

  7. Foundational Certification Of Code Transformations Using Automatic Differentiation

    Directory of Open Access Journals (Sweden)

    Emmanuel M. Tadjouddine

    2014-01-01

    Full Text Available Automatic Differentiation (AD is concerned with the semantics augmentation of an input program representing a function to form a transformed program that computes the function's derivatives. To ensure the correctness  of the AD transformed code, particularly for safety critical applications, we aim at certifying the algebraic manipulations at the heart of the AD process. We have considered a WHILE-language and have shown how such proofs can be constructed by using an appropriate relational Hoare logic.In particular, we have shown how such inference rules can be constructed for both the forward and reverse mode AD by using an abductive logical reasoning.

  8. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  9. Quality Managment Program (QMP) report: A review of quality management programs developed in response to Title 10, Section 35.32 of the Code of Federal Regulations

    Energy Technology Data Exchange (ETDEWEB)

    Witte, M.C.

    1994-10-01

    In July of 1991, the Nuclear Regulatory Commission published a Final Rule in the Federal Register amending regulations governing medical therapeutic administrations of byproduct material and certain uses of radioactive sodium iodide. These amendments required implementation of a Quality Management Program (QMP) to provide high confidence that the byproduct material -- or radiation from byproduct material -- will be administered as directed by an authorized user physician. Herein, this rule is referred to as the QM rule. The Final Rule was published after two proposed rules had been published in the Federal Register.

  10. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  11. Application of a Healthcare Failure Modes and Effects Analysis to Identify and Mitigate Potential Risks in the Implementation of a National Prehospital Pediatric Rapid Sequence Intubation Program.

    Science.gov (United States)

    Howard, Ian; Castle, Nicholas; Al Shaikh, Loua Asad

    2017-12-15

    Rapid sequence intubation (RSI) has become the de facto airway method of choice in the emergency airway management of adult and pediatric patients. There is significant controversy regarding pediatric RSI in the prehospital setting, given not only the complexities inherent in both the procedure and patient population, but in variations in emergency medical service models, prehospital qualifications, scope of practice, and patient exposure too. A Healthcare Failure Mode and Effects Analysis was conducted to identify and mitigate potential hazards in the national implementation of a prehospital pediatric RSI program. A process map and potential failure points were developed and identified. Probabilities, severity, and hazards scores were calculated for each failure point, and actions items developed to address these. One hundred four potential failure points were identified among 44 subprocesses, divided between nine major processes. In terms of severity, most were classified as either major (n = 39 [37.5%]) or catastrophic (n = 35 [33.7%]) with just more than half falling within the uncommon category (n = 56 [53.9%]) in terms of probability. Five strategic actions items were identified to mitigate against the failure points meeting criteria for action. To monitor the success of these, 11 quality and performance indicators were developed for concurrent implementation. The Healthcare Failure Mode and Effects Analysis represents a simple yet comprehensive first step toward risk analysis of complex procedures within the prehospital emergency care setting. Application of the methodology provided guidance for the consensus identification of hazards associated with prehospital pediatric RSI and appropriate actions to mitigate them.

  12. Applicability of NASA contract quality management and failure mode effect analysis procedures to the USGS Outer Continental Shelf oil and gas lease management program

    Science.gov (United States)

    Dyer, M. K.; Little, D. G.; Hoard, E. G.; Taylor, A. C.; Campbell, R.

    1972-01-01

    An approach that might be used for determining the applicability of NASA management techniques to benefit almost any type of down-to-earth enterprise is presented. A study was made to determine the following: (1) the practicality of adopting NASA contractual quality management techniques to the U.S. Geological Survey Outer Continental Shelf lease management function; (2) the applicability of failure mode effects analysis to the drilling, production, and delivery systems in use offshore; (3) the impact on industrial offshore operations and onshore management operations required to apply recommended NASA techniques; and (4) the probable changes required in laws or regulations in order to implement recommendations. Several management activities that have been applied to space programs are identified, and their institution for improved management of offshore and onshore oil and gas operations is recommended.

  13. MAGNETOHYDRODYNAMIC EQUATIONS (MHD GENERATION CODE

    Directory of Open Access Journals (Sweden)

    Francisco Frutos Alfaro

    2017-04-01

    Full Text Available A program to generate codes in Fortran and C of the full magnetohydrodynamic equations is shown. The program uses the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the magnetohydrodynamic equations to obtain a code that can be used as a seed for a magnetohydrodynamic code for numerical applications. As an example, we present part of the output of our programs for Cartesian coordinates and how to do the discretization.

  14. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  15. Network Coding

    Indian Academy of Sciences (India)

    Network coding is a technique to increase the amount of information °ow in a network by mak- ing the key observation that information °ow is fundamentally different from commodity °ow. Whereas, under traditional methods of opera- tion of data networks, intermediate nodes are restricted to simply forwarding their incoming.

  16. Coding Class

    DEFF Research Database (Denmark)

    Ejsing-Duun, Stine; Hansbøl, Mikala

    Denne rapport rummer evaluering og dokumentation af Coding Class projektet1. Coding Class projektet blev igangsat i skoleåret 2016/2017 af IT-Branchen i samarbejde med en række medlemsvirksomheder, Københavns kommune, Vejle Kommune, Styrelsen for IT- og Læring (STIL) og den frivillige forening...... Coding Pirates2. Rapporten er forfattet af Docent i digitale læringsressourcer og forskningskoordinator for forsknings- og udviklingsmiljøet Digitalisering i Skolen (DiS), Mikala Hansbøl, fra Institut for Skole og Læring ved Professionshøjskolen Metropol; og Lektor i læringsteknologi, interaktionsdesign......, design tænkning og design-pædagogik, Stine Ejsing-Duun fra Forskningslab: It og Læringsdesign (ILD-LAB) ved Institut for kommunikation og psykologi, Aalborg Universitet i København. Vi har fulgt og gennemført evaluering og dokumentation af Coding Class projektet i perioden november 2016 til maj 2017...

  17. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621. Keywords.

  18. Expander Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 1. Expander Codes - The Sipser–Spielman Construction. Priti Shankar. General Article Volume 10 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science Bangalore 560 012, India.

  19. Simulation and transient analyses of a complete passive heat removal system in a downward cooling pool-type material testing reactor against a complete station blackout and long-term natural convection mode using the RELAP5/3.2 code

    Energy Technology Data Exchange (ETDEWEB)

    Hedayat, Afshin [Reactor and Nuclear Safety School, Nuclear Science and Technology Research Institute (NSTRI), Tehran (Iran, Islamic Republic of)

    2017-08-15

    In this paper, a complete station blackout (SBO) or complete loss of electrical power supplies is simulated and analyzed in a downward cooling 5-MW pool-type Material Testing Reactor (MTR). The scenario is traced in the absence of active cooling systems and operators. The code nodalization is successfully benchmarked against experimental data of the reactor's operating parameters. The passive heat removal system includes downward water cooling after pump breakdown by the force of gravity (where the coolant streams down to the unfilled portion of the holdup tank), safety flapper opening, flow reversal from a downward to an upward cooling direction, and then the upward free convection heat removal throughout the flapper safety valve, lower plenum, and fuel assemblies. Both short-term and long-term natural core cooling conditions are simulated and investigated using the RELAP5 code. Short-term analyses focus on the safety flapper valve operation and flow reversal mode. Long-term analyses include simulation of both complete SBO and long-term operation of the free convection mode. Results are promising for pool-type MTRs because this allows operators to investigate RELAP code abilities for MTR thermal–hydraulic simulations without any oscillation; moreover, the Tehran Research Reactor is conservatively safe against the complete SBO and long-term free convection operation.

  20. A novel method of generating and remembering international morse codes

    Digital Repository Service at National Institute of Oceanography (India)

    Charyulu, R.J.K.

    untethered communications have been advanced, despite as S.O.S International Morse Code will be at rescue as an emergency tool, when all other modes fail The details of hte method and actual codes have been enumerated....

  1. Relevance of stroke code, stroke unit and stroke networks in organization of acute stroke care--the Madrid acute stroke care program.

    Science.gov (United States)

    Alonso de Leciñana-Cases, María; Gil-Núñez, Antonio; Díez-Tejedor, Exuperio

    2009-01-01

    Stroke is a neurological emergency. The early administration of specific treatment improves the prognosis of the patients. Emergency care systems with early warning for the hospital regarding patients who are candidates for this treatment (stroke code) increases the number of patients treated. Currently, reperfusion via thrombolysis for ischemic stroke and attention in stroke units are the bases of treatment. Healthcare professionals and health provision authorities need to work together to organize systems that ensure continuous quality care for the patients during the whole process of their disease. To implement this, there needs to be an appropriate analysis of the requirements and resources with the objective of their adjustment for efficient use. It is necessary to provide adequate information and continuous training for all professionals who are involved in stroke care, including primary care physicians, extrahospital emergency teams and all physicians involved in the care of stroke patients within the hospital. The neurologist has the function of coordinating the protocols of intrahospital care. These organizational plans should also take into account the process beyond the acute phase, to ensure the appropriate application of measures of secondary prevention, rehabilitation, and chronic care of the patients that remain in a dependent state. We describe here the stroke care program in the Community of Madrid (Spain). (c) 2009 S. Karger AG, Basel.

  2. Polar Codes

    Science.gov (United States)

    2014-12-01

    added by the decoder is K/ρ+Td. By the last assumption, Td and Te are both ≤ K/ρ, so the total latency added is between 2K/ρ and 4K /ρ. For example...better resolution near the decision point. Reference [12] showed that in decoding a (1024, 512) polar code, using 6-bit LLRs resulted in per- formance

  3. Calculations of multidimensional test reactor neutron diffusion problems with KORAT 3D code and its combination with two-velocity two-temperature thermohydraulic RATEG code

    Energy Technology Data Exchange (ETDEWEB)

    Voronova, O.A.; Grebennikov, A.N.; Zvenigorodskaya, O.A. [Russian Federal Nuclear Center, Arzamas (Russian Federation)] [and others

    1996-09-01

    The paper briefly presents the method for numerical computation of 3-D group neutron diffusion equation implemented in KORAT 3D code within SATURN complex and oriented to 3-D stationary and nonstationary calculations in nuclear reactor physics including those on up-to-date distributed-memory multiprocessors. The computational results are given obtained with the above mentioned code for multidimensional test reactor problems as well as the results of numerical efficiency studies for the code parallelization on multiprocessors Cray T3D and SP-2. Then the setup is given for 3-D dynamic problem simulating a hypothetical mode of WPBER reactor. The computational results are presented for the above problem which includes the neutron-nuclear processes, thermohydraulic processes and the feedback. The computations used two program complexes: KORAT 3D + multichannel two-velocity two-temperature thermohydraulics code RATEG and READY complex. (author)

  4. Convolutional-Code-Specific CRC Code Design

    OpenAIRE

    Lou, Chung-Yu; Daneshrad, Babak; Wesel, Richard D.

    2015-01-01

    Cyclic redundancy check (CRC) codes check if a codeword is correctly received. This paper presents an algorithm to design CRC codes that are optimized for the code-specific error behavior of a specified feedforward convolutional code. The algorithm utilizes two distinct approaches to computing undetected error probability of a CRC code used with a specific convolutional code. The first approach enumerates the error patterns of the convolutional code and tests if each of them is detectable. Th...

  5. Continuous-variable quantum erasure correcting code

    DEFF Research Database (Denmark)

    Lassen, Mikael Østergaard; Sabuncu, Metin; Huck, Alexander

    2010-01-01

    We experimentally demonstrate a continuous variable quantum erasure-correcting code, which protects coherent states of light against complete erasure. The scheme encodes two coherent states into a bi-party entangled state, and the resulting 4-mode code is conveyed through 4 independent channels...

  6. P-code versus C/A-code GPS for range tracking applications

    Science.gov (United States)

    Hoefener, Carl E.; van Wechel, Bob

    This article compares the use of P-code and C/A-code GPS receivers on test and training ranges. The requirements on many ranges for operation under conditions of jamming preclude the use of C/A-code receivers because of their relatively low jamming immunity as compared with P-code receivers. Also, C/A-code receivers present some problems when used with pseudolites on ranges. The cost of P-code receivers is customarily much higher than that of C/A-code receivers. However, most of this difference is caused by factors other than P-code, particularly the parts screening specifications applied to military programs.

  7. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  8. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  9. Concatenated codes with convolutional inner codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Zyablov, Viktor

    1988-01-01

    The minimum distance of concatenated codes with Reed-Solomon outer codes and convolutional inner codes is studied. For suitable combinations of parameters the minimum distance can be lower-bounded by the product of the minimum distances of the inner and outer codes. For a randomized ensemble...... of concatenated codes a lower bound of the Gilbert-Varshamov type is proved...

  10. Report on HOM experimental methods and code

    CERN Document Server

    Shinton, I R R; Flisgen, T

    2013-01-01

    Experimental methods and various codes used are reported on with the aim to understand the signals picked up from the higher order modes in the third harmonic cavities within the ACC39 module at FLASH. Both commercial computer codes have been used, and also codes written for the express purpose of understanding the sensitivity of the modal profiles to geometrical errors and other sources of experimental errors.

  11. Code-labelling

    DEFF Research Database (Denmark)

    Spangsberg, Thomas Hvid; Brynskov, Martin

    in programming education collected in an Action Research cycle. The results support the use of a structural approach to teaching programming to this target audience; particularly, the translation-grammar method seems to integrate well with programming education. The paper also explores the potential underlying......The code-labelling exercise is an attempt to apply natural language education techniques for solving the challenge of teaching introductory programming to non-STEM novices in higher education. This paper presents findings from a study exploring the use of natural language teaching techniques...... reasons. It seems the exercise invokes an assimilation of student's existing cognitive schemata and supports a deep-learning experience. The exercise is an invitation to other teachers to create further iterations to improve their own teaching. It also seeks to enrich the portfolio of teaching activities...

  12. The FORTRAN NALAP code adapted to a microcomputer compiler

    Energy Technology Data Exchange (ETDEWEB)

    Lobo, Paulo David de Castro; Borges, Eduardo Madeira; Braz Filho, Francisco Antonio; Guimaraes, Lamartine Nogueira Frutuoso, E-mail: plobo.a@uol.com.b, E-mail: eduardo@ieav.cta.b, E-mail: fbraz@ieav.cta.b, E-mail: guimarae@ieav.cta.b [Instituto de Estudos Avancados (IEAv/CTA), Sao Jose dos Campos, SP (Brazil)

    2010-07-01

    The Nuclear Energy Division of the Institute for Advanced Studies (IEAv) is conducting the TERRA project (TEcnologia de Reatores Rapidos Avancados), Technology for Advanced Fast Reactors project, aimed at a space reactor application. In this work, to attend the TERRA project, the NALAP code adapted to a microcomputer compiler called Compaq Visual Fortran (Version 6.6) is presented. This code, adapted from the light water reactor transient code RELAP 3B, simulates thermal-hydraulic responses for sodium cooled fast reactors. The strategy to run the code in a PC was divided in some steps mainly to remove unnecessary routines, to eliminate old statements, to introduce new ones and also to include extension precision mode. The source program was able to solve three sample cases under conditions of protected transients suggested in literature: the normal reactor shutdown, with a delay of 200 ms to start the control rod movement and a delay of 500 ms to stop the pumps; reactor scram after transient of loss of flow; and transients protected from overpower. Comparisons were made with results from the time when the NALAP code was acquired by the IEAv, back in the 80's. All the responses for these three simulations reproduced the calculations performed with the CDC compiler in 1985. Further modifications will include the usage of gas as coolant for the nuclear reactor to allow a Closed Brayton Cycle Loop - CBCL - to be used as a heat/electric converter. (author)

  13. Instructional DVD video lesson with code switching: its effect on the performance level in dancing social dance among grade 10 special program in the art students of the Philippines

    Directory of Open Access Journals (Sweden)

    Capilitan Fernando T.

    2017-01-01

    Full Text Available This paper shows that the experimental group who are exposed to DVD Video Lesson that uses code switching language has an average mean score in the pretest of 1.56, and this increased to an average mean of 3.50 in the posttest. The control group that uses DVD Video Lesson that uses purely English language got an average mean of 1.06 in the pretest and increased to 1.53 in the posttest. Based on the results of the performance posttest taken by the two groups, the experimental group has a dramatic increase in scores from the pretest to posttest. Although both groups had increased in their performance scores from pretest to posttest, the experimental group (code switching language performs well in the posttest than the control group. As revealed in this findings , there is a significant difference in the posttest scores between the experimental group who are exposed to DVD lesson that uses code switching as a medium of instruction and the control group who are exposed to DVD lesson that uses English. The students who are exposed to the Video Lesson that uses code switching perform well than those students who are exposed in DVD video lesson that uses purely English language. DVD Video lesson that uses code switching as a medium of instruction in teaching social dance is the useful approach in teaching Grade 10 Special Program in the Art students. The language used (code switching is the powerful medium of instruction that enhances the learning outcomes of the students to perform well. This paper could be an eye opener to the Department of Education to inculcate the used of first language/local language or MTB-MLE, not only in Grade I to III but all level in K to 12 programs, since education is a key factor for building a better nation.

  14. Failure Modes

    DEFF Research Database (Denmark)

    Jakobsen, K. P.; Burcharth, H. F.; Ibsen, Lars Bo

    1999-01-01

    The present appendix contains the derivation of ten different limit state equations divided on three different failure modes. Five of the limit state equations can be used independently of the characteristics of the subsoil, whereas the remaining five can be used for either drained or undrained s...

  15. Dynamic Reverse Code Generation for Backward Execution

    DEFF Research Database (Denmark)

    Lee, Jooyong

    2007-01-01

    . In this paper, we present a method to generate reverse code, so that backtracking can be performed by executing reverse code. The novelty of our work is that we generate reverse code on-the-fly, while running a debugger, which makes it possible to apply the method even to debugging multi-threaded programs....

  16. Novel Modes Workshop Summary Report

    Science.gov (United States)

    2015-12-01

    On December 2-3, 2014, the Federal Highway Administration's (FHWA's) Exploratory Advanced Research Program, with support from the John A. Volpe National Transportation Systems Center, convened the 2-day workshop "Novel Modes." It was held concurrentl...

  17. Channel coding techniques for wireless communications

    CERN Document Server

    Deergha Rao, K

    2015-01-01

    The book discusses modern channel coding techniques for wireless communications such as turbo codes, low-density parity check (LDPC) codes, space–time (ST) coding, RS (or Reed–Solomon) codes and convolutional codes. Many illustrative examples are included in each chapter for easy understanding of the coding techniques. The text is integrated with MATLAB-based programs to enhance the understanding of the subject’s underlying theories. It includes current topics of increasing importance such as turbo codes, LDPC codes, Luby transform (LT) codes, Raptor codes, and ST coding in detail, in addition to the traditional codes such as cyclic codes, BCH (or Bose–Chaudhuri–Hocquenghem) and RS codes and convolutional codes. Multiple-input and multiple-output (MIMO) communications is a multiple antenna technology, which is an effective method for high-speed or high-reliability wireless communications. PC-based MATLAB m-files for the illustrative examples are provided on the book page on Springer.com for free dow...

  18. FASOR - A second generation shell of revolution code

    Science.gov (United States)

    Cohen, G. A.

    1978-01-01

    An integrated computer program entitled Field Analysis of Shells of Revolution (FASOR) currently under development for NASA is described. When completed, this code will treat prebuckling, buckling, initial postbuckling and vibrations under axisymmetric static loads as well as linear response and bifurcation under asymmetric static loads. Although these modes of response are treated by existing programs, FASOR extends the class of problems treated to include general anisotropy and transverse shear deformations of stiffened laminated shells. At the same time, a primary goal is to develop a program which is free of the usual problems of modeling, numerical convergence and ill-conditioning, laborious problem setup, limitations on problem size and interpretation of output. The field method is briefly described, the shell differential equations are cast in a suitable form for solution by this method and essential aspects of the input format are presented. Numerical results are given for both unstiffened and stiffened anisotropic cylindrical shells and compared with previously published analytical solutions.

  19. Measuring Source Code Similarity Using Reference Vectors

    Science.gov (United States)

    Ohno, Asako; Murao, Hajime

    In this paper, we propose a novel method to measure similarity between program source codes. Different to others, our method doues not compare two source codes directly but compares two reference vectors, where a reference vector is calculated from one source code and a set of reference source codes. This means that our method requires no original source code when considering an application open to public such as a search engine for the program source code on the internet. We have built a simple search system and have evaluated with Java source codes made in the university course of basic programming. Results show that the system can achieve quite high average precision rate in very short time which means the proposed method can measure correct similarity very fast.

  20. Energy information data base: report number codes

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-09-01

    Each report processed by the US DOE Technical Information Center is identified by a unique report number consisting of a code plus a sequential number. In most cases, the code identifies the originating installation. In some cases, it identifies a specific program or a type of publication. Listed in this publication are all codes that have been used by DOE in cataloging reports. This compilation consists of two parts. Part I is an alphabetical listing of report codes identified with the issuing installations that have used the codes. Part II is an alphabetical listing of installations identified with codes each has used. (RWR)

  1. Recent Experimental Results Related to Ejector Mode Studies of Rocket-Based Combined Cycle (RBCC) Engines

    Science.gov (United States)

    Cramer, J. M.; Pal, S.; Marshall, W. M.; Santoro, R. J.

    2003-01-01

    Contents include the folloving: 1. Motivation. Support NASA's 3d generation launch vehicle technology program. RBCC is promising candidate for 3d generation propulsion system. 2. Approach. Focus on ejector mode p3erformance (Mach 0-3). Perform testing on established flowpath geometry. Use conventional propulsion measurement techniques. Use advanced optical diagnostic techniques to measure local combustion gas properties. 3. Objectives. Gain physical understanding of detailing mixing and combustion phenomena. Establish an experimental data set for CFD code development and validation.

  2. Tristan code and its application

    Science.gov (United States)

    Nishikawa, K.-I.

    Since TRISTAN: The 3-D Electromagnetic Particle Code was introduced in 1990, it has been used for many applications including the simulations of global solar windmagnetosphere interaction. The most essential ingridients of this code have been published in the ISSS-4 book. In this abstract we describe some of issues and an application of this code for the study of global solar wind-magnetosphere interaction including a substorm study. The basic code (tristan.f) for the global simulation and a local simulation of reconnection with a Harris model (issrec2.f) are available at http:/www.physics.rutger.edu/˜kenichi. For beginners the code (isssrc2.f) with simpler boundary conditions is suitable to start to run simulations. The future of global particle simulations for a global geospace general circulation (GGCM) model with predictive capability (for Space Weather Program) is discussed.

  3. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  4. User's manual to the ICRP Code: a series of computer programs to perform dosimetric calculations for the ICRP Committee 2 report

    Energy Technology Data Exchange (ETDEWEB)

    Watson, S.B.; Ford, M.R.

    1980-02-01

    A computer code has been developed that implements the recommendations of ICRP Committee 2 for computing limits for occupational exposure of radionuclides. The purpose of this report is to describe the various modules of the computer code and to present a description of the methods and criteria used to compute the tables published in the Committee 2 report. The computer code contains three modules of which: (1) one computes specific effective energy; (2) one calculates cumulated activity; and (3) one computes dose and the series of ICRP tables. The description of the first two modules emphasizes the new ICRP Committee 2 recommendations in computing specific effective energy and cumulated activity. For the third module, the complex criteria are discussed for calculating the tables of committed dose equivalent, weighted committed dose equivalents, annual limit of intake, and derived air concentration.

  5. Impacts of Model Building Energy Codes

    Energy Technology Data Exchange (ETDEWEB)

    Athalye, Rahul A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sivaraman, Deepak [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Elliott, Douglas B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Liu, Bing [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bartlett, Rosemarie [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-10-31

    The U.S. Department of Energy (DOE) Building Energy Codes Program (BECP) periodically evaluates national and state-level impacts associated with energy codes in residential and commercial buildings. Pacific Northwest National Laboratory (PNNL), funded by DOE, conducted an assessment of the prospective impacts of national model building energy codes from 2010 through 2040. A previous PNNL study evaluated the impact of the Building Energy Codes Program; this study looked more broadly at overall code impacts. This report describes the methodology used for the assessment and presents the impacts in terms of energy savings, consumer cost savings, and reduced CO2 emissions at the state level and at aggregated levels. This analysis does not represent all potential savings from energy codes in the U.S. because it excludes several states which have codes which are fundamentally different from the national model energy codes or which do not have state-wide codes. Energy codes follow a three-phase cycle that starts with the development of a new model code, proceeds with the adoption of the new code by states and local jurisdictions, and finishes when buildings comply with the code. The development of new model code editions creates the potential for increased energy savings. After a new model code is adopted, potential savings are realized in the field when new buildings (or additions and alterations) are constructed to comply with the new code. Delayed adoption of a model code and incomplete compliance with the code’s requirements erode potential savings. The contributions of all three phases are crucial to the overall impact of codes, and are considered in this assessment.

  6. LFSC - Linac Feedback Simulation Code

    Energy Technology Data Exchange (ETDEWEB)

    Ivanov, Valentin; /Fermilab

    2008-05-01

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  7. Research of the Power Plant Operational Modes

    Directory of Open Access Journals (Sweden)

    Koismynina Nina M.

    2017-01-01

    Full Text Available In this article the algorithm of the power plant operational modes research is offered. According to this algorithm the program for the modes analysis and connection power transformers choice is developed. The program can be used as educational means for studying of the power plant electric part, at the same time basic data are provided. Also the program can be used for the analysis of the working power plants modes. Checks of the entered data completeness and a choice correctness of the operational modes are provided in the program; in all cases of a deviation from the correct decisions to the user the relevant information is given.

  8. Halftone Coding with JBIG2

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    2000-01-01

    The emerging international standard for compression of bilevel images and bi-level documents, JBIG2,provides a mode dedicated for lossy coding of halftones. The encoding procedure involves descreening of the bi-levelimage into gray-scale, encoding of the gray-scale image, and construction...... of a halftone pattern dictionary.The decoder first decodes the gray-scale image. Then for each gray-scale pixel looks up the corresponding halftonepattern in the dictionary and places it in the reconstruction bitmap at the position corresponding to the gray-scale pixel. The coding method is inherently lossy...... and care must be taken to avoid introducing artifacts in the reconstructed image. We describe how to apply this coding method for halftones created by periodic ordered dithering, by clustered dot screening (offset printing), and by techniques which in effect dithers with blue noise, e.g., error diffusion...

  9. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  10. Ocean Thermal Energy Conversion power system development. Phase I: preliminary design. Final report. [ODSP-3 code; OTEC Steady-State Analysis Program

    Energy Technology Data Exchange (ETDEWEB)

    1978-12-04

    The following appendices are included; Dynamic Simulation Program (ODSP-3); sample results of dynamic simulation; trip report - NH/sub 3/ safety precautions/accident records; trip report - US Coast Guard Headquarters; OTEC power system development, preliminary design test program report; medium turbine generator inspection point program; net energy analysis; bus bar cost of electricity; OTEC technical specifications; and engineer drawings. (WHK)

  11. Potential seismic structural failure modes associated with the Zion Nuclear Plant. Seismic safety margins research program (Phase I). Project VI. Fragilities

    Energy Technology Data Exchange (ETDEWEB)

    1979-10-01

    The Zion 1 and 2 Nuclear Power Plant consists of a number of structures. The most important of these from the viewpoint of safety are the containment buildings, the auxiliary building, the turbine building, and the crib house (or intake structure). The evaluation of the potential seismic failure modes and determination of the ultimate seismic capacity of the structures is a complex undertaking which will require a large number of detailed calculations. As the first step in this evaluation, a number of potential modes of structural failure have been determined and are discussed. The report is principally directed towards seismically induced failure of structures. To some extent, modes involving soil foundation failures are discussed in so far as they affect the buildings. However, failure modes involving soil liquefaction, surface faulting, tsunamis, etc., are considered outside the scope of this evaluation.

  12. Code Modernization of VPIC

    Science.gov (United States)

    Bird, Robert; Nystrom, David; Albright, Brian

    2017-10-01

    The ability of scientific simulations to effectively deliver performant computation is increasingly being challenged by successive generations of high-performance computing architectures. Code development to support efficient computation on these modern architectures is both expensive, and highly complex; if it is approached without due care, it may also not be directly transferable between subsequent hardware generations. Previous works have discussed techniques to support the process of adapting a legacy code for modern hardware generations, but despite the breakthroughs in the areas of mini-app development, portable-performance, and cache oblivious algorithms the problem still remains largely unsolved. In this work we demonstrate how a focus on platform agnostic modern code-development can be applied to Particle-in-Cell (PIC) simulations to facilitate effective scientific delivery. This work builds directly on our previous work optimizing VPIC, in which we replaced intrinsic based vectorisation with compile generated auto-vectorization to improve the performance and portability of VPIC. In this work we present the use of a specialized SIMD queue for processing some particle operations, and also preview a GPU capable OpenMP variant of VPIC. Finally we include a lessons learnt. Work performed under the auspices of the U.S. Dept. of Energy by the Los Alamos National Security, LLC Los Alamos National Laboratory under contract DE-AC52-06NA25396 and supported by the LANL LDRD program.

  13. FRAPCON-1: a computer code for the steady state analysis of oxide fuel rods

    Energy Technology Data Exchange (ETDEWEB)

    Berna, G. A.; Bohn, M. P.; Coleman, D. R.; Lanning, D. D.

    1978-08-01

    FRAPCON is a FORTRAN IV computer code which predicts the steady state long-term burnup response of a light water reactor fuel rod. The coupled effects of fuel and cladding deformation, temperature, and internal gas pressure on the behavior of the fuel rod are considered in determining fuel rod response. The cladding deformation model includes multi-axial, elasto-plastic analysis and considers both primary and secondary creep. The fuel temperature model considers the effects of fuel cracking and relocation in determining the fuel temperature distribution. Burnup dependent fission gas generation and release is included in calculating fuel rod internal pressure. An integral fuel rod failure subcode determines failure and failure modes based on the operating conditions at each timestep. The material property subcode, MATPRO, provides gas, fuel and cladding properties to the computational subcodes in FRAPCON. No material properties need to be supplied by the code user. FRAPCON is a completely modular code with each major computational subcode isolated within the code and coupled to the main code by subroutine calls and data transfer through argument lists. FRAPCON is soft-coupled to the transient fuel rod code, FRAP-T, to provide initial conditions to initiate analysis of such off-normal transients as a loss-of-coolant accident. The code is presently programmed and running on a CDC 7600 computer.

  14. The cosmic code comparison project

    Energy Technology Data Exchange (ETDEWEB)

    Heitmann, Katrin; Fasel, Patricia; Habib, Salman; Warren, Michael S; Ahrens, James; Ankeny, Lee; O' Shea, Brian [Los Alamos National Laboratory, Los Alamos, NM 87545 (United States); Lukic, Zarija; Ricker, Paul M [Department of Astronomy, University of Illinois, Urbana, IL 61801 (United States); White, Martin [Department of Astronomy, University of California, Berkeley, CA 94720-3411 (United States); Armstrong, Ryan [Department of Computer Science, UC Davis, Davis, CA 95616 (United States); Springel, Volker [Max-Planck-Institute for Astrophysics, 85741 Garching (Germany); Stadel, Joachim [Institute of Theoretical Physics, University of Zurich, 8057 Zurich (Switzerland); Trac, Hy [Department of Astrophysical Sciences, Princeton University, NJ 08544 (United States)], E-mail: heitmann@lanl.gov

    2008-10-01

    Current and upcoming cosmological observations allow us to probe structures on smaller and smaller scales, entering highly nonlinear regimes. In order to obtain theoretical predictions in these regimes, large cosmological simulations have to be carried out. The promised high accuracy from observations makes the simulation task very demanding: the simulations have to be at least as accurate as the observations. This requirement can only be fulfilled by carrying out an extensive code verification program. The first step of such a program is the comparison of different cosmology codes including gravitational interactions only. In this paper, we extend a recently carried out code comparison project to include five more simulation codes. We restrict our analysis to a small cosmological volume which allows us to investigate properties of halos. For the matter power spectrum and the mass function, the previous results hold, with the codes agreeing at the 10% level over wide dynamic ranges. We extend our analysis to the comparison of halo profiles and investigate the halo count as a function of local density. We introduce and discuss ParaView as a flexible analysis tool for cosmological simulations, the use of which immensely simplifies the code comparison task.

  15. Performance of Turbo Code with Different Parameters

    Directory of Open Access Journals (Sweden)

    Samir Jasim

    2017-08-01

    Full Text Available Turbo codes are one of error correction coding where the errors which may be added into the transmission data through a communication channel can be detected and corrected, these codes provided for long codewords with decoding complexity. Turbo code is one of the concatenated codes connected in serial or in parallel for transmission data with great throughput and achieve near Shannon limit. This paper presents the performance of turbo code with different parameters such as (number of iteration, type of decoding techniques, length of code, rate, generator polynomial and type of channel get the Bit Error Rate (BER for each case, then compare the results to specify the parameters which give the optimum performance of this code. The system is simulated by using MATLAB R2016b program.

  16. Affine Grassmann codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Beelen, Peter; Ghorpade, Sudhir Ramakant

    2010-01-01

    We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes.We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show...

  17. 3D Structured Grid Generation Codes for Turbomachinery

    Science.gov (United States)

    Loellbach, James; Tsung, Fu-Lin

    1999-01-01

    This report describes the research tasks during the past year. The research was mainly in the area of computational grid generation in support of CFD analyses of turbomachinery components. In addition to the grid generation work, a numerical simulation was obtained for the flow through a centrifugal gas compressor using an unstructured Navier-Stokes solver. Other tasks involved many different turbomachinery component analyses. These analyses were performed for NASA projects or for industrial applications. The work includes both centrifugal and axial machines, single and multiple blade rows, and steady and unsteady analyses. Over the past five years, a set of structured grid generation codes were developed that allow grids to be obtained fairly quickly for the large majority of configurations we encounter. These codes do not comprise a generalized grid generation package; they are noninteractive codes specifically designed for turbomachinery blade row geometries. But because of this limited scope, the codes are small, fast, and portable, and they can be run in the batch mode on small workstations. During the past year, these programs were used to generate computational grids were modified for a wide variety of configurations. In particular, the codes or wrote supplementary codes to improve our grid generation capabilities for multiple blade row configurations. This involves generating separate grids for each blade row, and then making them match and overlap by a few grid points at their common interface so that fluid properties are communicated across the interface. Unsteady rotor/stator analyses were performed for an axial turbine, a centrifugal compressor, and a centrifugal pump. Steady-state single-blade-row analyses were made for a study of blade sweep in transonic compressors. There was also cooperation on the application of an unstructured Navier-Stokes solver for turbomachinery flow simulations. In particular, the unstructured solver was used to analyze the

  18. An Object-Oriented Approach to Writing Computational Electromagnetics Codes

    Science.gov (United States)

    Zimmerman, Martin; Mallasch, Paul G.

    1996-01-01

    Presently, most computer software development in the Computational Electromagnetics (CEM) community employs the structured programming paradigm, particularly using the Fortran language. Other segments of the software community began switching to an Object-Oriented Programming (OOP) paradigm in recent years to help ease design and development of highly complex codes. This paper examines design of a time-domain numerical analysis CEM code using the OOP paradigm, comparing OOP code and structured programming code in terms of software maintenance, portability, flexibility, and speed.

  19. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Advocacy Summit Webinars Practice Management Practice Management Practice Management CPT Coding Bulletin Articles CPT Coding Workshops ICD-10 Coding Physicians as Assistants at Surgery Webinars Primers and Compendiums Quality Payment Program AMA House of Delegates ACS in ...

  20. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Management Practice Management Practice Management CPT Coding Bulletin Articles CPT Coding Workshops ICD-10 Coding Physicians as Assistants at Surgery Webinars Primers and Compendiums Quality Payment Program AMA ...

  1. 27. The impact of introduction of code-stemi program on clinical outcomes of acute st-elevation myocardial infarction (stemi patients undergoing primary pci: Single center study in Saudi Arabia

    Directory of Open Access Journals (Sweden)

    A. ALYAHYA

    2016-07-01

    Full Text Available This study was conducted to evaluate the effect of direct Emergency Department activation of the Catheterization Lab on door to balloon (D2B time and outcomes of acute ST-elevation myocardial infarction (STEMI patients in King Khalid University Hospital (KKUH. Establishing dedicated comprehensive STEMI programs aiming at reducing door to balloon time will impact favourably the outcomes of patients presenting with acute STEMI. This was a retrospective cohort study that involved 100 patients in KKUH who presented with acute STEMI and underwent primary percutaneous intervention (PPCI, between June 2010 and January 2015. The cohort was divided into two groups, the first group consisted of 50 patients who were treated before establishing the Code-STEMI protocol, whereas the second group were 50 patients who were treated according to the protocol, which was implemented in June 2013. Code-STEMI program is a comprehensive program that includes direct activation of the cath lab team using a single call system, data monitoring and feedback, and standardized order forms. The mean age in both groups was 54 ± 12 years and 86% (43 and 94% (47 of the patients in the two groups were males, respectively. 90% (90 of patients in both groups had one or more comorbidities.Code-STEMI group had a significantly lower D2BT with 70% of patients treated within the recommended 90 minutes (median = 76.5 min, IQR: 63–90 min compared to only 26% of pre code-STEMI patients (median = 107 min, IQR: 74–149 min In-hospital complications were lower in the Code-STEMI group; however, the only statistically significant reduction was in non-fatal re-infarction, (8% vs. 0%, p = 0.043. In addition, the number of patients with more than one in-hospital complications was also reduced by 20%.Implementation of direct ER-Catheterization lab activation protocol was associated with a significant reduction in D2B time, and an overall improvement of in-hospital outcomes.

  2. Using facilitators in mock codes: recasting the parts for success.

    Science.gov (United States)

    Cuda, S; Doerr, D; Gonzalez, M

    1999-01-01

    Members of the CHRISTUS Santa Rosa Children's Hospital staff development committee identified a need for a mock code program which would address a range of learning needs for nurses and other caregivers with varying levels of knowledge, skills, and experience. We implemented a mock code program using experienced caregivers, usually emergency room and pediatric intensive care RNs and respiratory therapists to serve as facilitators to code participants during the mock code drills. Facilitators have dual roles of teaching and guiding the code participant as well as evaluating performance. Code participants and facilitators benefit from the design of this program. Debriefing session input and written program evaluations show that code participants value the opportunity to practice their skills in a nonthreatening situation in which they receive immediate feedback as needed. Facilitators learn to teach and coach and strengthen their own code knowledge and skills at the same time. This mock code program serves as a unique way to include novice and experienced nurses in mock codes together. The knowledge, skills, and confidence of the code participants and the facilitators have matured. The design of the program allows for immediate teaching/learning where needed, as well as appropriate evaluation. This program develops stronger, calmer, more efficient, and more confident nurses during codes. Practice and equipment changes can be based on findings from the mock codes. The program is invaluable to patients, staff, and hospital.

  3. Towards a testbed for malicious code detection

    Energy Technology Data Exchange (ETDEWEB)

    Lo, R.; Kerchen, P.; Crawford, R.; Ho, W.; Crossley, J.; Fink, G.; Levitt, K.; Olsson, R.; Archer, M. (California Univ., Davis, CA (USA). Div. of Computer Science)

    1991-01-01

    This paper proposes an environment for detecting many types of malicious code, including computer viruses, Trojan horses, and time/logic bombs. This malicious code testbed (MCT) is based upon both static and dynamic analysis tools developed at the University of California, Davis, which have been shown to be effective against certain types of malicious code. The testbed extends the usefulness of these tools by using them in a complementary fashion to detect more general cases of malicious code. Perhaps more importantly, the MCT allows administrators and security analysts to check a program before installation, thereby avoiding any damage a malicious program might inflict. 5 refs., 2 figs., 2 tabs.

  4. Mode-by-mode hydrodynamics: Ideas and concepts

    Energy Technology Data Exchange (ETDEWEB)

    Floerchinger, Stefan

    2014-06-15

    The main ideas, technical concepts and perspectives for a mode resolved description of the hydrodynamical regime of relativistic heavy ion collisions are discussed. A background-fluctuation splitting and a Bessel–Fourier expansion for the fluctuating part of the hydrodynamical fields allows for a complete characterization of initial conditions, the fluid dynamical propagation of single modes, the study of interaction effects between modes, the determination of the associated particle spectra and the generalization of the whole program to event-by-event correlations and probability distributions.

  5. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is propose...... including an outer BCH code correcting a few bit errors.......The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  6. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  7. Generalized concatenated quantum codes

    Science.gov (United States)

    Grassl, Markus; Shor, Peter; Smith, Graeme; Smolin, John; Zeng, Bei

    2009-05-01

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length but also asymptotically meet the quantum Hamming bound for large block length.

  8. Modeling of BWR core meltdown accidents - for application in the MELRPI. MOD2 computer code

    Energy Technology Data Exchange (ETDEWEB)

    Koh, B R; Kim, S H; Taleyarkhan, R P; Podowski, M Z; Lahey, Jr, R T

    1985-04-01

    This report summarizes improvements and modifications made in the MELRPI computer code. A major difference between this new, updated version of the code, called MELRPI.MOD2, and the one reported previously, concerns the inclusion of a model for the BWR emergency core cooling systems (ECCS). This model and its computer implementation, the ECCRPI subroutine, account for various emergency injection modes, for both intact and rubblized geometries. Other changes to MELRPI deal with an improved model for canister wall oxidation, rubble bed modeling, and numerical integration of system equations. A complete documentation of the entire MELRPI.MOD2 code is also given, including an input guide, list of subroutines, sample input/output and program listing.

  9. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  10. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  11. Evaluation of Advanced Bionics high resolution mode.

    Science.gov (United States)

    Buechner, Andreas; Frohne-Buechner, Carolin; Gaertner, Lutz; Lesinski-Schiedat, Anke; Battmer, Rolf-Dieter; Lenarz, Thomas

    2006-07-01

    The objective of this paper is to evaluate the advantages of the Advanced Bionic high resolution mode for speech perception, through a retrospective analysis. Forty-five adult subjects were selected who had a minimum experience of three months' standard mode (mean of 10 months) before switching to high resolution mode. Speech perception was tested in standard mode immediately before fitting with high resolution mode, and again after a maximum of six months high resolution mode usage (mean of two months). A significant improvement was found, between 11 and 17%, depending on the test material. The standard mode preference does not give any indication about the improvement when switching to high resolution. Users who are converted within any study achieve a higher performance improvement than those converted in the clinical routine. This analysis proves the significant benefits of high resolution mode for users, and also indicates the need for guidelines for individual optimization of parameter settings in a high resolution mode program.

  12. IAEA coordinated research program on `harmonization and validation of fast reactor thermomechanical and thermohydraulic codes using experimental data`. 1. Thermohydraulic benchmark analysis on high-cycle thermal fatigue events occurred at French fast breeder reactor Phenix

    Energy Technology Data Exchange (ETDEWEB)

    Muramatsu, Toshiharu [Power Reactor and Nuclear Fuel Development Corp., Oarai, Ibaraki (Japan). Oarai Engineering Center

    1997-06-01

    A benchmark exercise on `Tee junction of Liquid Metal Fast Reactor (LMFR) secondary circuit` was proposed by France in the scope of the said Coordinated Research Program (CRP) via International Atomic Energy Agency (IAEA). The physical phenomenon chosen here deals with the mixture of two flows of different temperature. In a LMFR, several areas of the reactor are submitted to this problem. They are often difficult to design, because of the complexity of the phenomena involved. This is one of the major problems of the LMFRs. This problem has been encountered in the Phenix reactor on the secondary loop, where defects in a tee junction zone were detected during a campaign of inspections after an operation of 90,000 hours of the reactor. The present benchmark is based on an industrial problem and deal with thermal striping phenomena. Problems on pipes induced by thermal striping phenomena have been observed in some reactors and experimental facilities coolant circuits. This report presents numerical results on thermohydraulic characteristics of the benchmark problem, carried out using a direct numerical simulation code DINUS-3 and a boundary element code BEMSET. From the analysis with both the codes, it was confirmed that the hot sodium from the small pipe rise into the cold sodium of the main pipe with thermally instabilities. Furthermore, it was indicated that the coolant mixing region including the instabilities agrees approximately with the result by eye inspections. (author)

  13. (U) Ristra Next Generation Code Report

    Energy Technology Data Exchange (ETDEWEB)

    Hungerford, Aimee L. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Daniel, David John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-22

    LANL’s Weapons Physics management (ADX) and ASC program office have defined a strategy for exascale-class application codes that follows two supportive, and mutually risk-mitigating paths: evolution for established codes (with a strong pedigree within the user community) based upon existing programming paradigms (MPI+X); and Ristra (formerly known as NGC), a high-risk/high-reward push for a next-generation multi-physics, multi-scale simulation toolkit based on emerging advanced programming systems (with an initial focus on data-flow task-based models exemplified by Legion [5]). Development along these paths is supported by the ATDM, IC, and CSSE elements of the ASC program, with the resulting codes forming a common ecosystem, and with algorithm and code exchange between them anticipated. Furthermore, solution of some of the more challenging problems of the future will require a federation of codes working together, using established-pedigree codes in partnership with new capabilities as they come on line. The role of Ristra as the high-risk/high-reward path for LANL’s codes is fully consistent with its role in the Advanced Technology Development and Mitigation (ATDM) sub-program of ASC (see Appendix C), in particular its emphasis on evolving ASC capabilities through novel programming models and data management technologies.

  14. Discussion on LDPC Codes and Uplink Coding

    Science.gov (United States)

    Andrews, Ken; Divsalar, Dariush; Dolinar, Sam; Moision, Bruce; Hamkins, Jon; Pollara, Fabrizio

    2007-01-01

    This slide presentation reviews the progress that the workgroup on Low-Density Parity-Check (LDPC) for space link coding. The workgroup is tasked with developing and recommending new error correcting codes for near-Earth, Lunar, and deep space applications. Included in the presentation is a summary of the technical progress of the workgroup. Charts that show the LDPC decoder sensitivity to symbol scaling errors are reviewed, as well as a chart showing the performance of several frame synchronizer algorithms compared to that of some good codes and LDPC decoder tests at ESTL. Also reviewed is a study on Coding, Modulation, and Link Protocol (CMLP), and the recommended codes. A design for the Pseudo-Randomizer with LDPC Decoder and CRC is also reviewed. A chart that summarizes the three proposed coding systems is also presented.

  15. Damage mechanics - failure modes

    Energy Technology Data Exchange (ETDEWEB)

    Krajcinovic, D.; Vujosevic, M. [Arizona State Univ., Tempe, AZ (United States)

    1996-12-31

    The present study summarizes the results of the DOE sponsored research program focused on the brittle failure of solids with disordered microstructure. The failure is related to the stochastic processes on the microstructural scale; namely, the nucleation and growth of microcracks. The intrinsic failure modes, such as the percolation, localization and creep rupture, are studied by emphasizing the effect of the micro-structural disorder. A rich spectrum of physical phenomena and new concepts that emerges from this research demonstrates the reasons behind the limitations of traditional, deterministic, and local continuum models.

  16. Depth-based Multi-View 3D Video Coding

    DEFF Research Database (Denmark)

    Zamarin, Marco

    on edge-preserving solutions. In a proposed scheme, texture-depth correlation is exploited to predict surface shapes in the depth signal. In this way depth coding performance can be improved in terms of both compression gain and edge-preservation. Another solution proposes a new intra coding mode targeted...... to depth blocks featuring arbitrarily-shaped edges. Edge information is encoded exploiting previously coded edge blocks. Integrated in H.264/AVC, the proposed mode allows significant bit rate savings compared with a number of state-of-the-art depth codecs. View synthesis performances are also improved......, both in terms of objective and visual evaluations. Depth coding based on standard H.264/AVC is explored for multi-view plus depth image coding. A single depth map is used to disparity-compensate multiple views and allow more efficient coding than H.264 MVC at low bit rates. Lossless coding of depth...

  17. Do you write secure code?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    At CERN, we are excellent at producing software, such as complex analysis jobs, sophisticated control programs, extensive monitoring tools, interactive web applications, etc. This software is usually highly functional, and fulfils the needs and requirements as defined by its author. However, due to time constraints or unintentional ignorance, security aspects are often neglected. Subsequently, it was even more embarrassing for the author to find out that his code flawed and was used to break into CERN computers, web pages or to steal data…   Thus, if you have the pleasure or task of producing software applications, take some time before and familiarize yourself with good programming practices. They should not only prevent basic security flaws in your code, but also improve its readability, maintainability and efficiency. Basic rules for good programming, as well as essential books on proper software development, can be found in the section for software developers on our security we...

  18. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  19. Algebraic geometric codes

    Science.gov (United States)

    Shahshahani, M.

    1991-01-01

    The performance characteristics are discussed of certain algebraic geometric codes. Algebraic geometric codes have good minimum distance properties. On many channels they outperform other comparable block codes; therefore, one would expect them eventually to replace some of the block codes used in communications systems. It is suggested that it is unlikely that they will become useful substitutes for the Reed-Solomon codes used by the Deep Space Network in the near future. However, they may be applicable to systems where the signal to noise ratio is sufficiently high so that block codes would be more suitable than convolutional or concatenated codes.

  20. Monomial-like codes

    CERN Document Server

    Martinez-Moro, Edgar; Ozbudak, Ferruh; Szabo, Steve

    2010-01-01

    As a generalization of cyclic codes of length p^s over F_{p^a}, we study n-dimensional cyclic codes of length p^{s_1} X ... X p^{s_n} over F_{p^a} generated by a single "monomial". Namely, we study multi-variable cyclic codes of the form in F_{p^a}[x_1...x_n] / . We call such codes monomial-like codes. We show that these codes arise from the product of certain single variable codes and we determine their minimum Hamming distance. We determine the dual of monomial-like codes yielding a parity check matrix. We also present an alternative way of constructing a parity check matrix using the Hasse derivative. We study the weight hierarchy of certain monomial like codes. We simplify an expression that gives us the weight hierarchy of these codes.

  1. Leveraging Code Comments to Improve Software Reliability

    Science.gov (United States)

    Tan, Lin

    2009-01-01

    Commenting source code has long been a common practice in software development. This thesis, consisting of three pieces of work, made novel use of the code comments written in natural language to improve software reliability. Our solution combines Natural Language Processing (NLP), Machine Learning, Statistics, and Program Analysis techniques to…

  2. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  3. Benchmark studies of BOUT++ code and TPSMBI code on neutral transport during SMBI

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Y.H. [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei 230031 (China); University of Science and Technology of China, Hefei 230026 (China); Center for Magnetic Fusion Theory, Chinese Academy of Sciences, Hefei 230031 (China); Wang, Z.H., E-mail: zhwang@swip.ac.cn [Southwestern Institute of Physics, Chengdu 610041 (China); Guo, W., E-mail: wfguo@ipp.ac.cn [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei 230031 (China); Center for Magnetic Fusion Theory, Chinese Academy of Sciences, Hefei 230031 (China); Ren, Q.L. [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei 230031 (China); Sun, A.P.; Xu, M.; Wang, A.K. [Southwestern Institute of Physics, Chengdu 610041 (China); Xiang, N. [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei 230031 (China); Center for Magnetic Fusion Theory, Chinese Academy of Sciences, Hefei 230031 (China)

    2017-06-09

    SMBI (supersonic molecule beam injection) plays an important role in tokamak plasma fuelling, density control and ELM mitigation in magnetic confinement plasma physics, which has been widely used in many tokamaks. The trans-neut module of BOUT++ code is the only large-scale parallel 3D fluid code used to simulate the SMBI fueling process, while the TPSMBI (transport of supersonic molecule beam injection) code is a recent developed 1D fluid code of SMBI. In order to find a method to increase SMBI fueling efficiency in H-mode plasma, especially for ITER, it is significant to first verify the codes. The benchmark study between the trans-neut module of BOUT++ code and the TPSMBI code on radial transport dynamics of neutral during SMBI has been first successfully achieved in both slab and cylindrical coordinates. The simulation results from the trans-neut module of BOUT++ code and TPSMBI code are consistent very well with each other. Different upwind schemes have been compared to deal with the sharp gradient front region during the inward propagation of SMBI for the code stability. The influence of the WENO3 (weighted essentially non-oscillatory) and the third order upwind schemes on the benchmark results has also been discussed. - Highlights: • A 1D model of SMBI has developed. • Benchmarks of BOUT++ and TPSMBI codes have first been finished. • The influence of the WENO3 and the third order upwind schemes on the benchmark results has also been discussed.

  4. Coding Military Command as a Promiscuous Practice

    DEFF Research Database (Denmark)

    Ashcraft, Karen Lee; Muhr, Sara Louise

    2018-01-01

    metaphor as a consequential practice of leadership unto itself. Drawing on queer theory, the article develops a mode of analysis, called ‘promiscuous coding’, conducive to disrupting the gender divisions that currently anchor most leadership metaphors. Promiscuous coding can assist leadership scholars...

  5. Results and code predictions for ABCOVE (aerosol behavior code validation and evaluation) aerosol code validation: Test AB6 with two aerosol species. [LMFBR

    Energy Technology Data Exchange (ETDEWEB)

    Hilliard, R K; McCormack, J C; Muhlestein, L D

    1984-12-01

    A program for aerosol behavior code validation and evaluation (ABCOVE) has been developed in accordance with the LMFBR Safety Program Plan. The ABCOVE program is a cooperative effort between the USDOE, the USNRC, and their contractor organizations currently involved in aerosol code development, testing or application. The second large-scale test in the ABCOVE program, AB6, was performed in the 850-m/sup 3/ CSTF vessel with a two-species test aerosol. The test conditions simulated the release of a fission product aerosol, NaI, in the presence of a sodium spray fire. Five organizations made pretest predictions of aerosol behavior using seven computer codes. Three of the codes (QUICKM, MAEROS and CONTAIN) were discrete, multiple species codes, while four (HAA-3, HAA-4, HAARM-3 and SOFIA) were log-normal codes which assume uniform coagglomeration of different aerosol species. Detailed test results are presented and compared with the code predictions for seven key aerosol behavior parameters.

  6. Sexing code subversion, theory and representation

    CERN Document Server

    Herbst, Claudia

    2008-01-01

    Critically investigating the gender of programming in popular culture, Sexing Code proposes that the de facto representation of technical ability serves to perpetuate the age-old association of the male with intellect and reason, while identifying the fem

  7. Automated assistance for detecting malicious code

    Energy Technology Data Exchange (ETDEWEB)

    Crawford, R.; Kerchen, P.; Levitt, K.; Olsson, R.; Archer, M.; Casillas, M. [Univ. of California, Davis, CA (US). Dept. of Computer Science

    1993-06-18

    This paper gives an update on the continuing work on the Malicious Code Testbed (MCT). The MCT is a semi-automated tool, operating in a simulated, cleanroom environment, that is capable of detecting many types of malicious code, such as viruses, Trojan horses, and time/logic bombs. The MCT allows security analysts to check a program before installation, thereby avoiding any damage a malicious program might inflict.

  8. Fast prediction algorithm for multiview video coding

    Science.gov (United States)

    Abdelazim, Abdelrahman; Mein, Stephen James; Varley, Martin Roy; Ait-Boudaoud, Djamel

    2013-03-01

    The H.264/multiview video coding (MVC) standard has been developed to enable efficient coding for three-dimensional and multiple viewpoint video sequences. The inter-view statistical dependencies are utilized and an inter-view prediction is employed to provide more efficient coding; however, this increases the overall encoding complexity. Motion homogeneity is exploited here to selectively enable inter-view prediction, and to reduce complexity in the motion estimation (ME) and the mode selection processes. This has been accomplished by defining situations that relate macro-blocks' motion characteristics to the mode selection and the inter-view prediction processes. When comparing the proposed algorithm to the H.264/MVC reference software and other recent work, the experimental results demonstrate a significant reduction in ME time while maintaining similar rate-distortion performance.

  9. NIPER Lab WARDEN -- Description and LabVIEW{reg_sign} executable code of a general-purpose laboratory-automation program. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Mahmood, S.M.; Olsen, D.K.

    1994-04-01

    This report is Volume 1 (the description) of a two volume series that describes a general purpose, automation computer program developed by NIPER for data acquisition/control/analysis/presentation. This software was developed to provide interactive computer control of a variety of instruments typically found in laboratories and pilot plants in order to improve efficiency in operation and safe handling of potentially hazardous operations. For example, it is easily adaptable for operating a laboratory that conducts experiments at extreme conditions of pressure and temperature, such as those found in a steamflooding laboratory. The software was developed in an object-oriented graphical language around National Instruments` LabVIEW{reg_sign} which is the future trend in automation programming.

  10. Topics in Semantics-based Program Manipulation

    DEFF Research Database (Denmark)

    Grobauer, Bernt

    Programming is at least as much about manipulating existing code as it is about writing new code. Existing code is modified, for example to make inefficient code run faster, or to accommodate for new features when reusing code; existing code is analyzed, for example to verify certain program prop...

  11. Feature-based fast coding unit partition algorithm for high efficiency video coding

    Directory of Open Access Journals (Sweden)

    Yih-Chuan Lin

    2015-04-01

    Full Text Available High Efficiency Video Coding (HEVC, which is the newest video coding standard, has been developed for the efficient compression of ultra high definition videos. One of the important features in HEVC is the adoption of a quad-tree based video coding structure, in which each incoming frame is represented as a set of non-overlapped coding tree blocks (CTB by variable-block sized prediction and coding process. To do this, each CTB needs to be recursively partitioned into coding unit (CU, predict unit (PU and transform unit (TU during the coding process, leading to a huge computational load in the coding of each video frame. This paper proposes to extract visual features in a CTB and uses them to simplify the coding procedure by reducing the depth of quad-tree partition for each CTB in HEVC intra coding mode. A measure for the edge strength in a CTB, which is defined with simple Sobel edge detection, is used to constrain the possible maximum depth of quad-tree partition of the CTB. With the constrained partition depth, the proposed method can reduce a lot of encoding time. Experimental results by HM10.1 show that the average time-savings is about 13.4% under the increase of encoded BD-Rate by only 0.02%, which is a less performance degradation in comparison to other similar methods.

  12. Program specialization

    CERN Document Server

    Marlet, Renaud

    2013-01-01

    This book presents the principles and techniques of program specialization - a general method to make programs faster (and possibly smaller) when some inputs can be known in advance. As an illustration, it describes the architecture of Tempo, an offline program specializer for C that can also specialize code at runtime, and provides figures for concrete applications in various domains. Technical details address issues related to program analysis precision, value reification, incomplete program specialization, strategies to exploit specialized program, incremental specialization, and data speci

  13. Hello Ruby adventures in coding

    CERN Document Server

    Liukas, Linda

    2015-01-01

    "Code is the 21st century literacy and the need for people to speak the ABCs of Programming is imminent." --Linda Liukas Meet Ruby--a small girl with a huge imagination. In Ruby's world anything is possible if you put your mind to it. When her dad asks her to find five hidden gems Ruby is determined to solve the puzzle with the help of her new friends, including the Wise Snow Leopard, the Friendly Foxes, and the Messy Robots. As Ruby stomps around her world kids will be introduced to the basic concepts behind coding and programming through storytelling. Learn how to break big problems into small problems, repeat tasks, look for patterns, create step-by-step plans, and think outside the box. With hands-on activities included in every chapter, future coders will be thrilled to put their own imaginations to work.

  14. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  15. When Is Coding Scholarship And When Is It Not?

    NARCIS (Netherlands)

    van Zundert, Joris J.; Haentjens Dekker, R.

    2015-01-01

    We argue that the humanities and digital humanities need to consider certain forms of code as scholarly object and certain types of code authorship as a scholarly activity. It will be essential, therefore, to develop a scholarly mode of evaluating and criticizing these scholarly contributions in

  16. Systematic review of community-based, school-based, and combined delivery modes for reaching school-aged children in mass drug administration programs for schistosomiasis.

    Directory of Open Access Journals (Sweden)

    Michael Burnim

    2017-10-01

    Full Text Available The mainstay of current schistosomiasis control programs is mass preventive chemotherapy of school-aged children with praziquantel. This treatment is delivered through school-based, community-based, or combined school- and community-based systems. Attaining very high coverage rates for children is essential in mass schistosomiasis treatment programs, as is ensuring that there are no persistently untreated subpopulations, a potential challenge for school-based programs in areas with low school enrollment. This review sought to compare the different treatment delivery methods based both on their coverage of school-aged children overall and on their coverage specifically of non-enrolled children. In addition, qualitative community or programmatic factors associated with high or low coverage rates were identified, with suggestions for overall coverage improvement.This review was registered prospectively with PROSPERO (CRD 42015017656. Five hundred forty-nine publication of potential relevance were identified through database searches, reference lists, and personal communications. Eligible studies included those published before October 2015, written in English or French, containing quantitative or qualitative data about coverage rates for MDA of school-aged children with praziquantel. Among the 22 selected studies, combined community- and school-based programs achieved the highest median coverage rates (89%, followed by community-based programs (72%. School-based programs had both the lowest median coverage of children overall (49% and the lowest coverage of the non-enrolled subpopulation of children. Qualitatively, major factors affecting program success included fear of side effects, inadequate education about schistosomiasis, lack of incentives for drug distributors, and inequitable distribution to minority groups.This review provides an evidence-based framework for the development of future schistosomiasis control programs. Based on our results

  17. Systematic review of community-based, school-based, and combined delivery modes for reaching school-aged children in mass drug administration programs for schistosomiasis.

    Science.gov (United States)

    Burnim, Michael; Ivy, Julianne A; King, Charles H

    2017-10-01

    The mainstay of current schistosomiasis control programs is mass preventive chemotherapy of school-aged children with praziquantel. This treatment is delivered through school-based, community-based, or combined school- and community-based systems. Attaining very high coverage rates for children is essential in mass schistosomiasis treatment programs, as is ensuring that there are no persistently untreated subpopulations, a potential challenge for school-based programs in areas with low school enrollment. This review sought to compare the different treatment delivery methods based both on their coverage of school-aged children overall and on their coverage specifically of non-enrolled children. In addition, qualitative community or programmatic factors associated with high or low coverage rates were identified, with suggestions for overall coverage improvement. This review was registered prospectively with PROSPERO (CRD 42015017656). Five hundred forty-nine publication of potential relevance were identified through database searches, reference lists, and personal communications. Eligible studies included those published before October 2015, written in English or French, containing quantitative or qualitative data about coverage rates for MDA of school-aged children with praziquantel. Among the 22 selected studies, combined community- and school-based programs achieved the highest median coverage rates (89%), followed by community-based programs (72%). School-based programs had both the lowest median coverage of children overall (49%) and the lowest coverage of the non-enrolled subpopulation of children. Qualitatively, major factors affecting program success included fear of side effects, inadequate education about schistosomiasis, lack of incentives for drug distributors, and inequitable distribution to minority groups. This review provides an evidence-based framework for the development of future schistosomiasis control programs. Based on our results, a combined

  18. Transionospheric Propagation Code (TIPC)

    Science.gov (United States)

    Roussel-Dupre, Robert; Kelley, Thomas A.

    1990-10-01

    The Transionospheric Propagation Code is a computer program developed at Los Alamos National Lab to perform certain tasks related to the detection of VHF signals following propagation through the ionosphere. The code is written in FORTRAN 77, runs interactively and was designed to be as machine independent as possible. A menu format in which the user is prompted to supply appropriate parameters for a given task has been adopted for the input while the output is primarily in the form of graphics. The user has the option of selecting from five basic tasks, namely transionospheric propagation, signal filtering, signal processing, delta times of arrival (DTOA) study, and DTOA uncertainty study. For the first task a specified signal is convolved against the impulse response function of the ionosphere to obtain the transionospheric signal. The user is given a choice of four analytic forms for the input pulse or of supplying a tabular form. The option of adding Gaussian-distributed white noise of spectral noise to the input signal is also provided. The deterministic ionosphere is characterized to first order in terms of a total electron content (TEC) along the propagation path. In addition, a scattering model parameterized in terms of a frequency coherence bandwidth is also available. In the second task, detection is simulated by convolving a given filter response against the transionospheric signal. The user is given a choice of a wideband filter or a narrowband Gaussian filter. It is also possible to input a filter response. The third task provides for quadrature detection, envelope detection, and three different techniques for time-tagging the arrival of the transionospheric signal at specified receivers. The latter algorithms can be used to determine a TEC and thus take out the effects of the ionosphere to first order. Task four allows the user to construct a table of DTOAs vs TECs for a specified pair of receivers.

  19. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of ROC...

  20. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  1. Perceptions of teamwork among code team members.

    Science.gov (United States)

    Mahramus, Tara; Frewin, Sarah; Penoyer, Daleen Aragon; Sole, Mary Lou

    2013-01-01

    Cardiopulmonary arrest (CPA) teams, known as code teams, provide coordinated and evidenced-based interventions by various disciplines during a CPA. Teamwork behaviors are essential during CPA resuscitation and may have an impact on patient outcomes. The purpose of this study was to explore the perceptions of teamwork during CPA events among code team members and to determine if differences in perception existed between disciplines within the code team. A prospective, descriptive, comparative design using the Code Teamwork Perception Tool online survey was used to assess the perception of teamwork during CPA events by medical residents, critical care nurses, and respiratory therapists. Sixty-six code team members completed the Code Teamwork Perception Tool. Mean teamwork scores were 2.63 on a 5-point scale (0-4). No significant differences were found in mean scores among disciplines. Significant differences among scores were found on 7 items related to code leadership, roles and responsibilities between disciplines, and in those who had participated on a code team for less than 2 years and certified in Advanced Cardiac Life Support for less than 4 years. Teamwork perception among members of the code team was average. Teamwork training for resuscitation with all disciplines on the code team may promote more effective teamwork during actual CPA events. Clinical nurse specialists can aid in resuscitation efforts by actively participating on committees, identifying opportunities for improvement, being content experts, leading the development of team training programs, and conducting research in areas lacking evidence.

  2. Conceptualising holiness in the Gospel of John: The mode and ...

    African Journals Online (AJOL)

    2017-02-24

    ). The fourth and the ultimate objective is the glorification of God (17:4). Conceptualising holiness in the Gospel of John: The mode and objectives of holiness (part 1). Read online: Scan this QR code with your smart phone or.

  3. The Procions` code; Le code Procions

    Energy Technology Data Exchange (ETDEWEB)

    Deck, D.; Samba, G.

    1994-12-19

    This paper presents a new code to simulate plasmas generated by inertial confinement. This multi-kinds kinetic code is done with no angular approximation concerning ions and will work in plan and spherical geometry. First, the physical model is presented, using Fokker-Plank. Then, the numerical model is introduced in order to solve the Fokker-Plank operator under the Rosenbluth form. At the end, several numerical tests are proposed. (TEC). 17 refs., 27 figs.

  4. Blood and Books: Performing Code Switching

    Directory of Open Access Journals (Sweden)

    Jeff Friedman

    2008-05-01

    Full Text Available Code switching is a linguistic term that identifies ways individuals use communication modes and registers to negotiate difference in social relations. This essay suggests that arts-based inquiry, in the form of choreography and performance, provides a suitable and efficacious location within which both verbal and nonverbal channels of code switching can be investigated. Blood and Books, a case study of dance choreography within the context of post-colonial Maori performance in Aotearoa/New Zealand, is described and analyzed for its performance of code switching. The essay is framed by a discussion of how arts-based research within tertiary higher education requires careful negotiation in the form of code switching, as performed by the author's reflexive use of vernacular and formal registers in the essay. URN: urn:nbn:de:0114-fqs0802462

  5. Simultaneous chromatic dispersion and PMD compensation by using coded-OFDM and girth-10 LDPC codes.

    Science.gov (United States)

    Djordjevic, Ivan B; Xu, Lei; Wang, Ting

    2008-07-07

    Low-density parity-check (LDPC)-coded orthogonal frequency division multiplexing (OFDM) is studied as an efficient coded modulation scheme suitable for simultaneous chromatic dispersion and polarization mode dispersion (PMD) compensation. We show that, for aggregate rate of 10 Gb/s, accumulated dispersion over 6500 km of SMF and differential group delay of 100 ps can be simultaneously compensated with penalty within 1.5 dB (with respect to the back-to-back configuration) when training sequence based channel estimation and girth-10 LDPC codes of rate 0.8 are employed.

  6. Development of the SPACE code for nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Ha, Sang Jun [Korea Electric Power Corporation Research Institute, Daejeon (Korea, Republic of); Park, Chan Eok [KEPCO Engineering and Construction Company Inc, Daejeon (Korea, Republic of); Kim, Kyung Doo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Ban, Chang Hwan [Korea Nuclear Fuel, Daejeon (Korea, Republic of)

    2011-02-15

    The Korean nuclear industry is developing a thermal-hydraulic analysis code for safety analysis of pressurized water reactors (PWRs). The new code is called the Safety and Performance Analysis Code for Nuclear Power Plants (SPACE). The SPACE code adopts advanced physical modeling of two-phase flows, mainly two-fluid three-field models which comprise gas, continuous liquid, and droplet fields and has the capability to simulate 3D effects by the use of structured and/or nonstructured meshes. The programming language for the SPACE code is C++ for object-oriented code architecture. The SPACE code will replace outdated vendor supplied codes and will be used for the safety analysis of operating PWRs and the design of advanced reactors. This paper describes the overall features of the SPACE code and shows the code assessment results for several conceptual and separate effect test problems

  7. Coding Theory and Applications : 4th International Castle Meeting

    CERN Document Server

    Malonek, Paula; Vettori, Paolo

    2015-01-01

    The topics covered in this book, written by researchers at the forefront of their field, represent some of the most relevant research areas in modern coding theory: codes and combinatorial structures, algebraic geometric codes, group codes, quantum codes, convolutional codes, network coding and cryptography. The book includes a survey paper on the interconnections of coding theory with constrained systems, written by an invited speaker, as well as 37 cutting-edge research communications presented at the 4th International Castle Meeting on Coding Theory and Applications (4ICMCTA), held at the Castle of Palmela in September 2014. The event’s scientific program consisted of four invited talks and 39 regular talks by authors from 24 different countries. This conference provided an ideal opportunity for communicating new results, exchanging ideas, strengthening international cooperation, and introducing young researchers into the coding theory community.

  8. A Southern Ocean mode of multidecadal variability

    NARCIS (Netherlands)

    Le Bars, D.|info:eu-repo/dai/nl/326165150; Viebahn, J. P.; Dijkstra, H. A.|info:eu-repo/dai/nl/073504467

    2016-01-01

    A 250 year simulation of a strongly eddying global version of the Parallel Ocean Program (POP) model reveals a new mode of intrinsic multidecadal variability, the Southern Ocean Mode (SOM), with a period of 40-50 year. The peak-to-peak difference in the global ocean heat content within a

  9. DLLExternalCode

    Energy Technology Data Exchange (ETDEWEB)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  10. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  11. Tools for developing a quality management program: proactive tools (process mapping, value stream mapping, fault tree analysis, and failure mode and effects analysis).

    Science.gov (United States)

    Rath, Frank

    2008-01-01

    This article examines the concepts of quality management (QM) and quality assurance (QA), as well as the current state of QM and QA practices in radiotherapy. A systematic approach incorporating a series of industrial engineering-based tools is proposed, which can be applied in health care organizations proactively to improve process outcomes, reduce risk and/or improve patient safety, improve through-put, and reduce cost. This tool set includes process mapping and process flowcharting, failure modes and effects analysis (FMEA), value stream mapping, and fault tree analysis (FTA). Many health care organizations do not have experience in applying these tools and therefore do not understand how and when to use them. As a result there are many misconceptions about how to use these tools, and they are often incorrectly applied. This article describes these industrial engineering-based tools and also how to use them, when they should be used (and not used), and the intended purposes for their use. In addition the strengths and weaknesses of each of these tools are described, and examples are given to demonstrate the application of these tools in health care settings.

  12. Code Reuse and Modularity in Python

    Directory of Open Access Journals (Sweden)

    William J. Turkel

    2012-07-01

    Full Text Available Computer programs can become long, unwieldy and confusing without special mechanisms for managing complexity. This lesson will show you how to reuse parts of your code by writing Functions and break your programs into Modules, in order to keep everything concise and easier to debug. Being able to remove a single dysfunctional module can save time and effort.

  13. 41 CFR 101-30.701-2 - Item standardization code.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Item standardization code. 101-30.701-2 Section 101-30.701-2 Public Contracts and Property Management Federal Property Management....7-Item Reduction Program § 101-30.701-2 Item standardization code. Item standardization code (ISC...

  14. Description of ground motion data processing codes: Volume 3

    Energy Technology Data Exchange (ETDEWEB)

    Sanders, M.L.

    1988-02-01

    Data processing codes developed to process ground motion at the Nevada Test Site for the Weapons Test Seismic Investigations Project are used today as part of the program to process ground motion records for the Nevada Nuclear Waste Storage Investigations Project. The work contained in this report documents and lists codes and verifies the ``PSRV`` code. 39 figs.

  15. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    doing formal coding and when doing more “traditional” conversation analysis research based on collections. We are more wary, however, of the implication that coding-based research is the end result of a process that starts with qualitative investigations and ends with categories that can be coded......We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  16. Phonological coding during reading

    Science.gov (United States)

    Leinenger, Mallorie

    2014-01-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early (pre-lexical) or that phonological codes come online late (post-lexical)) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eyetracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model (Van Order, 1987), dual-route model (e.g., Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001), parallel distributed processing model (Seidenberg & McClelland, 1989)) are discussed. PMID:25150679

  17. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  18. Coded Modulation in C and MATLAB

    Science.gov (United States)

    Hamkins, Jon; Andrews, Kenneth S.

    2011-01-01

    This software, written separately in C and MATLAB as stand-alone packages with equivalent functionality, implements encoders and decoders for a set of nine error-correcting codes and modulators and demodulators for five modulation types. The software can be used as a single program to simulate the performance of such coded modulation. The error-correcting codes implemented are the nine accumulate repeat-4 jagged accumulate (AR4JA) low-density parity-check (LDPC) codes, which have been approved for international standardization by the Consultative Committee for Space Data Systems, and which are scheduled to fly on a series of NASA missions in the Constellation Program. The software implements the encoder and decoder functions, and contains compressed versions of generator and parity-check matrices used in these operations.

  19. Compiler Driven Code Comments and Refactoring

    DEFF Research Database (Denmark)

    Larsen, Per; Ladelsky, Razya; Karlsson, Sven

    2010-01-01

    Helping programmers write parallel software is an urgent problem given the popularity of multi-core architectures. Engineering compilers which automatically parallelize and vectorize code has turned out to be very challenging and consequently compilers are very selective with respect to the coding...... patterns they can optimize. We present an interactive approach which leverages advanced compiler analysis and optimizations while retaining program- mer control over the source code and its transformation. This allows optimization even when programmers refrain from enabling optimizations to preserve...... accurate debug in- formation or to avoid bugs in the compiler. It also allows the source code to carry optimizations from one compiler to another. Secondly, our tool-set provides feedback on why optimizations do not apply to a code fragment and sug- gests workarounds which can be applied automatically. We...

  20. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  1. Decoding of Cyclic Codes,

    Science.gov (United States)

    INFORMATION THEORY, *DECODING), (* DATA TRANSMISSION SYSTEMS , DECODING), STATISTICAL ANALYSIS, STOCHASTIC PROCESSES, CODING, WHITE NOISE, NUMBER THEORY, CORRECTIONS, BINARY ARITHMETIC, SHIFT REGISTERS, CONTROL SYSTEMS, USSR

  2. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  3. Diameter Perfect Lee Codes

    CERN Document Server

    Horak, Peter

    2011-01-01

    Lee codes have been intensively studied for more than 40 years. Interest in these codes has been triggered by the Golomb-Welch conjecture on the existence of perfect error-correcting Lee codes. In this paper we deal with the existence and enumeration of diameter perfect Lee codes. As main results we determine all q for which there exists a linear diameter-4 perfect Lee code of word length n over Z_{q}, and prove that for each n\\geq3 there are unaccountably many diameter-4 perfect Lee codes of word length n over Z. This is in a strict contrast with perfect error-correcting Lee codes of word length n over Z as there is a unique such code for n=3, and its is conjectured that this is always the case when 2n+1 is a prime. Diameter perfect Lee codes will be constructed by an algebraic construction that is based on a group homomorphism. This will allow us to design an efficient algorithm for their decoding.

  4. Expander chunked codes

    Science.gov (United States)

    Tang, Bin; Yang, Shenghao; Ye, Baoliu; Yin, Yitong; Lu, Sanglu

    2015-12-01

    Chunked codes are efficient random linear network coding (RLNC) schemes with low computational cost, where the input packets are encoded into small chunks (i.e., subsets of the coded packets). During the network transmission, RLNC is performed within each chunk. In this paper, we first introduce a simple transfer matrix model to characterize the transmission of chunks and derive some basic properties of the model to facilitate the performance analysis. We then focus on the design of overlapped chunked codes, a class of chunked codes whose chunks are non-disjoint subsets of input packets, which are of special interest since they can be encoded with negligible computational cost and in a causal fashion. We propose expander chunked (EC) codes, the first class of overlapped chunked codes that have an analyzable performance, where the construction of the chunks makes use of regular graphs. Numerical and simulation results show that in some practical settings, EC codes can achieve rates within 91 to 97 % of the optimum and outperform the state-of-the-art overlapped chunked codes significantly.

  5. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  6. Delamination of Composite Laminate Plate by Sliding Load Mode

    OpenAIRE

    Kormaníková Eva

    2017-01-01

    The paper presents the mixed-mode delamination response of laminate plate made of two sublaminates. To this purpose a sliding load mode of delamination is proposed as failure model. A quasistatic rate-independent delamination problem of laminate plates with a finite thickness is considered. A rate-independent delamination model for a laminated Kirchhoff-Love plate is obtained. The failure model is implemented in ANSYS code to calculate the mixed-mode delamination response as energy release ra...

  7. Building Energy Codes: Policy Overview and Good Practices

    Energy Technology Data Exchange (ETDEWEB)

    Cox, Sadie [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2016-02-19

    Globally, 32% of total final energy consumption is attributed to the building sector. To reduce energy consumption, energy codes set minimum energy efficiency standards for the building sector. With effective implementation, building energy codes can support energy cost savings and complementary benefits associated with electricity reliability, air quality improvement, greenhouse gas emission reduction, increased comfort, and economic and social development. This policy brief seeks to support building code policymakers and implementers in designing effective building code programs.

  8. On {\\sigma}-LCD codes

    OpenAIRE

    Carlet, Claude; Mesnager, Sihem; Tang, Chunming; Qi, Yanfeng

    2017-01-01

    Linear complementary pairs (LCP) of codes play an important role in armoring implementations against side-channel attacks and fault injection attacks. One of the most common ways to construct LCP of codes is to use Euclidean linear complementary dual (LCD) codes. In this paper, we first introduce the concept of linear codes with $\\sigma$ complementary dual ($\\sigma$-LCD), which includes known Euclidean LCD codes, Hermitian LCD codes, and Galois LCD codes. As Euclidean LCD codes, $\\sigma$-LCD ...

  9. Systems Improved Numerical Fluids Analysis Code

    Science.gov (United States)

    Costello, F. A.

    1990-01-01

    Systems Improved Numerical Fluids Analysis Code, SINFAC, consists of additional routines added to April, 1983, version of SINDA. Additional routines provide for mathematical modeling of active heat-transfer loops. Simulates steady-state and pseudo-transient operations of 16 different components of heat-transfer loops, including radiators, evaporators, condensers, mechanical pumps, reservoirs, and many types of valves and fittings. Program contains property-analysis routine used to compute thermodynamic properties of 20 different refrigerants. Source code written in FORTRAN 77.

  10. Detecting Malicious Code by Binary File Checking

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2014-01-01

    Full Text Available The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects. A direct content change is possible when the intruder knows the structural information of the binary file. The paper describes the structural properties of the binary object files, how the content can be controlled by a possible intruder and what the ways to identify malicious code in such kind of files. Because the object files are inputs in linking processes, early detection of the malicious content is crucial to avoid infection of the binary executable files.

  11. Computer Security: is your code sane?

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    How many of us write code? Software? Programs? Scripts? How many of us are properly trained in this and how well do we do it? Do we write functional, clean and correct code, without flaws, bugs and vulnerabilities*? In other words: are our codes sane?   Figuring out weaknesses is not that easy (see our quiz in an earlier Bulletin article). Therefore, in order to improve the sanity of your code, prevent common pit-falls, and avoid the bugs and vulnerabilities that can crash your code, or – worse – that can be misused and exploited by attackers, the CERN Computer Security team has reviewed its recommendations for checking the security compliance of your code. “Static Code Analysers” are stand-alone programs that can be run on top of your software stack, regardless of whether it uses Java, C/C++, Perl, PHP, Python, etc. These analysers identify weaknesses and inconsistencies including: employing undeclared variables; expressions resu...

  12. GATS Mode 4 Negotiation and Policy Options

    Directory of Open Access Journals (Sweden)

    Kil-Sang Yoo

    2004-06-01

    Full Text Available This study reviews the characteristics and issues of GATS Mode 4 and guesses the effects of Mode 4 liberalization on Korean economy and labor market to suggest policy options to Korea. Mode 4 negotiation started from the trade perspective, however, since Mode 4 involves international labor migration, it also has migration perspective. Thus developed countries, that have competitiveness in service sector, are interested in free movement of skilled workers such as intra-company transferees and business visitors. On the other hand, developing countries, that have little competitiveness in service sector, are interested in free movement of low-skilled workers. Empirical studies predict that the benefits of Mode 4 liberalization will be focused on developed countries rather than developing countries. The latter may suffer from brain drain and reduction of labor supply. Nevertheless developed countries are reluctant to Mode 4 negotiation because they can utilize skilled workers from developing countries by use of their own temporary visa programs. They are interested in Mode 4 related with Mode 3 in order to ease direct investment and movement of natural persons to developing countries. Regardless of the direction of a single undertaking of Mode 4 negotiation, the net effects of Mode 4 liberalization on Korean economy and labor market may be negative. The Korean initial offer on Mode 4 is the same as the UR offer. Since Korean position on Mode 4 is most defensive, it is hard to expect that Korean position will be accepted as the single undertaking of Mode 4 negotiation. Thus Korea has to prepare strategic package measures to minimize the costs of Mode 4 liberalization and improve competitiveness of service sector.

  13. The Role of Thermal Conduction in Tearing Mode Theory

    CERN Document Server

    Connor, J W; Hastie, R J; Liu, Y Q

    2014-01-01

    The role of anisotropic thermal diffusivity on tearing mode stability is analysed in general toroidal geometry. A dispersion relation linking the growth rate to the tearing mode stability parameter, Delta, is derived. By using a resistive MHD code, modified to include such thermal transport, to calculate tearing mode growth rates, the dispersion relation is employed to determine Delta in situations with finite plasma pressure that are stabilised by favourable average curvature in a simple resistive MHD model. We also demonstrate that the same code can also be used to calculate the basis-functions [C J Ham, et al, Plasma Phys. Control. Fusion 54 (2012) 105014] needed to construct Delta.

  14. SNV's modes of ordering

    NARCIS (Netherlands)

    Hummel, John; Duim, van der Rene

    2016-01-01

    This article adopts an aidnographic approach to examine how internal organizational modes of ordering have influenced tourism development practices of SNV Netherlands Development Organisation (SNV). Our research revealed six modes of ordering: administration, project management, enterprising,

  15. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  16. Error Correcting Codes

    Indian Academy of Sciences (India)

    be fixed to define codes over such domains). New decoding schemes that take advantage of such connections can be devised. These may soon show up in a technique called code division multiple access (CDMA) which is proposed as a basis for digital cellular communication. CDMA provides a facility for many users to ...

  17. Codes of Conduct

    Science.gov (United States)

    Million, June

    2004-01-01

    Most schools have a code of conduct, pledge, or behavioral standards, set by the district or school board with the school community. In this article, the author features some schools that created a new vision of instilling code of conducts to students based on work quality, respect, safety and courtesy. She suggests that communicating the code…

  18. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 3. Error Correcting Codes - Reed Solomon Codes. Priti Shankar. Series Article Volume 2 Issue 3 March 1997 pp 33-47. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/002/03/0033-0047 ...

  19. Code Generation = A* + BURS

    NARCIS (Netherlands)

    Nymeyer, Albert; Katoen, Joost P.; Westra, Ymte; Alblas, H.; Gyimóthy, Tibor

    1996-01-01

    A system called BURS that is based on term rewrite systems and a search algorithm A* are combined to produce a code generator that generates optimal code. The theory underlying BURS is re-developed, formalised and explained in this work. The search algorithm uses a cost heuristic that is derived

  20. Dress Codes for Teachers?

    Science.gov (United States)

    Million, June

    2004-01-01

    In this article, the author discusses an e-mail survey of principals from across the country regarding whether or not their school had a formal staff dress code. The results indicate that most did not have a formal dress code, but agreed that professional dress for teachers was not only necessary, but showed respect for the school and had a…

  1. Informal control code logic

    NARCIS (Netherlands)

    Bergstra, J.A.

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical

  2. Interleaved Product LDPC Codes

    OpenAIRE

    Baldi, Marco; Cancellieri, Giovanni; Chiaraluce, Franco

    2011-01-01

    Product LDPC codes take advantage of LDPC decoding algorithms and the high minimum distance of product codes. We propose to add suitable interleavers to improve the waterfall performance of LDPC decoding. Interleaving also reduces the number of low weight codewords, that gives a further advantage in the error floor region.

  3. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alexandre

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  4. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 1. Error Correcting Codes The Hamming Codes. Priti Shankar. Series Article Volume 2 Issue 1 January ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  5. Assessment of the SPACE Code Using the LSTF SGTR Test

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Yo-Han; Yang, Chang-Keum; Ha, Sang Jun [KHNP-CRI, Daejeon (Korea, Republic of)

    2014-10-15

    The Korea Nuclear Hydro and Nuclear Power Co.(KHNP) has developed a multipurpose nuclear safety analysis code, called the Safety and Performance Analysis Code for Nuclear Power Plants (SPACE), with other Korean nuclear industries. The code is a best-estimated two-phase three-field thermal-hydraulic analysis code for the safety or performance analyses of pressurized water reactors (PWRs). The code provides sufficient functions to replace current foreign vendor code systems. As a result of the second phase of the development, the 2.14 version of the code was released through the successive various validation and verification (V-V) programs. The topical report on the code has been prepared for license works. In this study, the steam generator tube rupture (SGTR) test, SB-SG-06, of the Large Scale Test Facility (LSTF) were simulated to evaluate the predictability of the SPACE code on non-loss-of-coolant-accidents (non-LOCA), and the results were compared with the experimental data or those of RELAP5 code simulations. The steam generator tube rupture test of integrated test loops, the Large Scale Test Facility (LSTF), was simulated using the SPACE code as the V-V program. The results of the simulations were compared with the experimental data and those of the other code simulations. Through the simulation, it was concluded that the SPACE code could give reliable calculation results to applicable to PWRs in the case of SGTR accidents.

  6. Instituting code blue drills in the OR.

    Science.gov (United States)

    Lanfranchi, Joy A

    2013-04-01

    A code blue in the OR is a low-volume, high-risk event. To be effective during a code blue event, perioperative personnel must be able to properly execute a response plan and perform seldom-used skills and procedures. I developed and implemented a code blue drill educational experience for OR staff members that included a review of code blue policy, how to use a defibrillator, and simulated code blue scenarios. In addition, I worked with educational facilitators to provide an assessment of the personnel who performed the simulated code blue drills to identify key learning opportunities, such as gaps in communication, poor performance of cardiopulmonary resuscitation, ineffective delegation skills, and lack of assertiveness. One month after the educational experience, all team members passed an observed competency for responding to a code blue in a simulation laboratory. These results show the effectiveness of the educational experience as part of the code blue drills program in the hospital's main OR. Copyright © 2013 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  7. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...... . . . . . . . . . . . . . . . . . . . . . . . 171 4.9 Codes form order domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4.10 One-point geometric Goppa codes . . . . . . . . . . . . . . . . . . . . . . . . 176 4.11 Bibliographical Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 References...

  8. Quantum Synchronizable Codes From Quadratic Residue Codes and Their Supercodes

    OpenAIRE

    Xie, Yixuan; Yuan, Jinhong; Fujiwara, Yuichiro

    2014-01-01

    Quantum synchronizable codes are quantum error-correcting codes designed to correct the effects of both quantum noise and block synchronization errors. While it is known that quantum synchronizable codes can be constructed from cyclic codes that satisfy special properties, only a few classes of cyclic codes have been proved to give promising quantum synchronizable codes. In this paper, using quadratic residue codes and their supercodes, we give a simple construction for quantum synchronizable...

  9. Modes of log gravity

    NARCIS (Netherlands)

    Bergshoeff, Eric A.; Hohm, Olaf; Rosseel, Jan; Townsend, Paul K.

    2011-01-01

    The physical modes of a recently proposed D-dimensional "critical gravity'', linearized about its anti-de Sitter vacuum, are investigated. All "log mode'' solutions, which we categorize as "spin-2'' or "Proca'', arise as limits of the massive spin-2 modes of the noncritical theory. The linearized

  10. DSP code optimization based on cache

    Science.gov (United States)

    Xu, Chengfa; Li, Chengcheng; Tang, Bin

    2013-03-01

    DSP program's running efficiency on board is often lower than which via the software simulation during the program development, which is mainly resulted from the user's improper use and incomplete understanding of the cache-based memory. This paper took the TI TMS320C6455 DSP as an example, analyzed its two-level internal cache, and summarized the methods of code optimization. Processor can achieve its best performance when using these code optimization methods. At last, a specific algorithm application in radar signal processing is proposed. Experiment result shows that these optimization are efficient.

  11. Pyramid image codes

    Science.gov (United States)

    Watson, Andrew B.

    1990-01-01

    All vision systems, both human and machine, transform the spatial image into a coded representation. Particular codes may be optimized for efficiency or to extract useful image features. Researchers explored image codes based on primary visual cortex in man and other primates. Understanding these codes will advance the art in image coding, autonomous vision, and computational human factors. In cortex, imagery is coded by features that vary in size, orientation, and position. Researchers have devised a mathematical model of this transformation, called the Hexagonal oriented Orthogonal quadrature Pyramid (HOP). In a pyramid code, features are segregated by size into layers, with fewer features in the layers devoted to large features. Pyramid schemes provide scale invariance, and are useful for coarse-to-fine searching and for progressive transmission of images. The HOP Pyramid is novel in three respects: (1) it uses a hexagonal pixel lattice, (2) it uses oriented features, and (3) it accurately models most of the prominent aspects of primary visual cortex. The transform uses seven basic features (kernels), which may be regarded as three oriented edges, three oriented bars, and one non-oriented blob. Application of these kernels to non-overlapping seven-pixel neighborhoods yields six oriented, high-pass pyramid layers, and one low-pass (blob) layer.

  12. Streaming tearing mode

    Science.gov (United States)

    Shigeta, M.; Sato, T.; Dasgupta, B.

    1985-01-01

    The magnetohydrodynamic stability of streaming tearing mode is investigated numerically. A bulk plasma flow parallel to the antiparallel magnetic field lines and localized in the neutral sheet excites a streaming tearing mode more strongly than the usual tearing mode, particularly for the wavelength of the order of the neutral sheet width (or smaller), which is stable for the usual tearing mode. Interestingly, examination of the eigenfunctions of the velocity perturbation and the magnetic field perturbation indicates that the streaming tearing mode carries more energy in terms of the kinetic energy rather than the magnetic energy. This suggests that the streaming tearing mode instability can be a more feasible mechanism of plasma acceleration than the usual tearing mode instability.

  13. Mode selection laser

    DEFF Research Database (Denmark)

    2014-01-01

    The invention relates to a semiconductor mode selection laser, particularly to a VCSEL laser (200) having mode selection properties. The mode selection capability of the laser is achieved by configuring one of the reflectors (15,51) in the resonance cavity so that a reflectivity of the reflector...... (15) varies spatially in one dimension or two dimensions. Accordingly, the reflector (15) with spatially varying reflectivity is part both of the resonance cavity and the mode selection functionality of the laser. A plurality of the lasers configured with different mode selectors, i.e. different...... spatial reflector variations, may be combined to generate a laser beam containing a plurality of orthogonal modes. The laser beam may be injected into a few- mode optical fiber, e.g. for the purpose of optical communication. The VCSEL may have intra-cavity contacts (31,37) and a Tunnel junction (33...

  14. Delamination of laminate plate under tearing load mode

    OpenAIRE

    Kormaníková Eva; Kotrasová Kamila

    2017-01-01

    The paper presents the mixed mode delamination of laminate plate made of two sublaminates. To this purpose the load mode III of delamination is proposed as failure orthotropic model. Sublaminates are modeled by using shear deformable elements in program ANSYS. The response mixed-mode components of vector of energy release rates along the delamination front are calculated.

  15. Delamination of laminate plate under tearing load mode

    Directory of Open Access Journals (Sweden)

    Kormaníková Eva

    2017-01-01

    Full Text Available The paper presents the mixed mode delamination of laminate plate made of two sublaminates. To this purpose the load mode III of delamination is proposed as failure orthotropic model. Sublaminates are modeled by using shear deformable elements in program ANSYS. The response mixed-mode components of vector of energy release rates along the delamination front are calculated.

  16. Computer Code for Nanostructure Simulation

    Science.gov (United States)

    Filikhin, Igor; Vlahovic, Branislav

    2009-01-01

    Due to their small size, nanostructures can have stress and thermal gradients that are larger than any macroscopic analogue. These gradients can lead to specific regions that are susceptible to failure via processes such as plastic deformation by dislocation emission, chemical debonding, and interfacial alloying. A program has been developed that rigorously simulates and predicts optoelectronic properties of nanostructures of virtually any geometrical complexity and material composition. It can be used in simulations of energy level structure, wave functions, density of states of spatially configured phonon-coupled electrons, excitons in quantum dots, quantum rings, quantum ring complexes, and more. The code can be used to calculate stress distributions and thermal transport properties for a variety of nanostructures and interfaces, transport and scattering at nanoscale interfaces and surfaces under various stress states, and alloy compositional gradients. The code allows users to perform modeling of charge transport processes through quantum-dot (QD) arrays as functions of inter-dot distance, array order versus disorder, QD orientation, shape, size, and chemical composition for applications in photovoltaics and physical properties of QD-based biochemical sensors. The code can be used to study the hot exciton formation/relation dynamics in arrays of QDs of different shapes and sizes at different temperatures. It also can be used to understand the relation among the deposition parameters and inherent stresses, strain deformation, heat flow, and failure of nanostructures.

  17. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  18. Quantum coding theorems

    Science.gov (United States)

    Holevo, A. S.

    1998-12-01

    ContentsI. IntroductionII. General considerations § 1. Quantum communication channel § 2. Entropy bound and channel capacity § 3. Formulation of the quantum coding theorem. Weak conversionIII. Proof of the direct statement of the coding theorem § 1. Channels with pure signal states § 2. Reliability function § 3. Quantum binary channel § 4. Case of arbitrary states with bounded entropyIV. c-q channels with input constraints § 1. Coding theorem § 2. Gauss channel with one degree of freedom § 3. Classical signal on quantum background noise Bibliography

  19. Code cases for implementing risk-based inservice testing in the ASME OM code

    Energy Technology Data Exchange (ETDEWEB)

    Rowley, C.W.

    1996-12-01

    Historically inservice testing has been reasonably effective, but quite costly. Recent applications of plant PRAs to the scope of the IST program have demonstrated that of the 30 pumps and 500 valves in the typical plant IST program, less than half of the pumps and ten percent of the valves are risk significant. The way the ASME plans to tackle this overly-conservative scope for IST components is to use the PRA and plant expert panels to create a two tier IST component categorization scheme. The PRA provides the quantitative risk information and the plant expert panel blends the quantitative and deterministic information to place the IST component into one of two categories: More Safety Significant Component (MSSC) or Less Safety Significant Component (LSSC). With all the pumps and valves in the IST program placed in MSSC or LSSC categories, two different testing strategies will be applied. The testing strategies will be unique for the type of component, such as centrifugal pump, positive displacement pump, MOV, AOV, SOV, SRV, PORV, HOV, CV, and MV. A series of OM Code Cases are being developed to capture this process for a plant to use. One Code Case will be for Component Importance Ranking. The remaining Code Cases will develop the MSSC and LSSC testing strategy for type of component. These Code Cases are planned for publication in early 1997. Later, after some industry application of the Code Cases, the alternative Code Case requirements will gravitate to the ASME OM Code as appendices.

  20. Certifying Auto-Generated Flight Code

    Science.gov (United States)

    Denney, Ewen

    2008-01-01

    itself is generic, and parametrized with respect to a library of coding patterns that depend on the safety policies and the code generator. The patterns characterize the notions of definitions and uses that are specific to the given safety property. For example, for initialization safety, definitions correspond to variable initializations while uses are statements which read a variable, whereas for array bounds safety, definitions are the array declarations, while uses are statements which access an array variable. The inferred annotations are thus highly dependent on the actual program and the properties being proven. The annotations, themselves, need not be trusted, but are crucial to obtain the automatic formal verification of the safety properties without requiring access to the internals of the code generator. The approach has been applied to both in-house and commercial code generators, but is independent of the particular generator used. It is currently being adapted to flight code generated using MathWorks Real-Time Workshop, an automatic code generator that translates from Simulink/Stateflow models into embedded C code.

  1. CBP PHASE I CODE INTEGRATION

    Energy Technology Data Exchange (ETDEWEB)

    Smith, F.; Brown, K.; Flach, G.; Sarkar, S.

    2011-09-30

    The goal of the Cementitious Barriers Partnership (CBP) is to develop a reasonable and credible set of software tools to predict the structural, hydraulic, and chemical performance of cement barriers used in nuclear applications over extended time frames (greater than 100 years for operating facilities and greater than 1000 years for waste management). The simulation tools will be used to evaluate and predict the behavior of cementitious barriers used in near surface engineered waste disposal systems including waste forms, containment structures, entombments, and environmental remediation. These cementitious materials are exposed to dynamic environmental conditions that cause changes in material properties via (i) aging, (ii) chloride attack, (iii) sulfate attack, (iv) carbonation, (v) oxidation, and (vi) primary constituent leaching. A set of state-of-the-art software tools has been selected as a starting point to capture these important aging and degradation phenomena. Integration of existing software developed by the CBP partner organizations was determined to be the quickest method of meeting the CBP goal of providing a computational tool that improves the prediction of the long-term behavior of cementitious materials. These partner codes were selected based on their maturity and ability to address the problems outlined above. The GoldSim Monte Carlo simulation program (GTG 2010a, GTG 2010b) was chosen as the code integration platform (Brown & Flach 2009b). GoldSim (current Version 10.5) is a Windows based graphical object-oriented computer program that provides a flexible environment for model development (Brown & Flach 2009b). The linking of GoldSim to external codes has previously been successfully demonstrated (Eary 2007, Mattie et al. 2007). GoldSim is capable of performing deterministic and probabilistic simulations and of modeling radioactive decay and constituent transport. As part of the CBP project, a general Dynamic Link Library (DLL) interface was

  2. Coded ultrasound for blood flow estimation using subband processing

    DEFF Research Database (Denmark)

    Gran, F.; Udesen, J.; Jensen, J.A.

    2008-01-01

    This paper investigates the use of coded excitation for blood flow estimation in medical ultrasound. Traditional autocorrelation estimators use narrow-band excitation signals to provide sufficient signal-to-noise-ratio (SNR) and velocity estimation performance. In this paper, broadband coded...... the excitation signal is broadband and has good spatial resolution after pulse compression. This means that time can be saved by using the same data for B-mode imaging and blood flow estimation. Two different coding schemes are used in this paper, Barker codes and Golay codes. The performance of the codes...... for velocity estimation is compared with a conventional approach transmitting a narrow-band pulse. The study was carried out using an experimental ultrasound scanner and a commercial linear array 7 MHz transducer. A circulating flow rig was scanned with a beam-to-flow angle of 60 degrees. The flow in the rig...

  3. Coded Ultrasound for Blood Flow Estimation Using Subband Processing

    DEFF Research Database (Denmark)

    Gran, Fredrik; Udesen, Jesper; Nielsen, Michael Bachamnn

    2008-01-01

    This paper investigates the use of coded excitation for blood flow estimation in medical ultrasound. Traditional autocorrelation estimators use narrow-band excitation signals to provide sufficient signal-to-noise-ratio (SNR) and velocity estimation performance. In this paper, broadband coded...... the excitation signal is broadband and has good spatial resolution after pulse compression. This means that time can be saved by using the same data for B-mode imaging and blood flow estimation. Two different coding schemes are used in this paper, Barker codes and Golay codes. The performance of the codes...... for velocity estimation is compared with a conventional approach transmitting a narrow-band pulse. The study was carried out using an experimental ultrasound scanner and a commercial linear array 7 MHz transducer. A circulating flow rig was scanned with a beam-to-flow angle of 60°. The flow in the rig...

  4. ... An example of flawed code

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Do you recall our small exercise in the last issue of the Bulletin?   We were wondering how well written the following code was:     1 /* Safely Exec program: drop privileges to user uid and group 2 * gid, and use chroot to restrict file system access to jail 3 * directory. Also, don’t allow program to run as a 4 * privileged user or group */ 5 void ExecUid(int uid, int gid, char *jailDir, char *prog, char *const argv[]) 6 { 7 if (uid == 0 || gid == 0) { 8 FailExit(“ExecUid: root uid or gid not allowed”); 9 } 10 11 chroot(jailDir); /* restrict access to this dir */ 12 13 setuid(uid); /* drop privs */ 14 setgid(gid); 15 16 fprintf(LOGFILE, “Execvp of %s as uid=%d gid=%d\

  5. Generating Customized Verifiers for Automatically Generated Code

    Science.gov (United States)

    Denney, Ewen; Fischer, Bernd

    2008-01-01

    Program verification using Hoare-style techniques requires many logical annotations. We have previously developed a generic annotation inference algorithm that weaves in all annotations required to certify safety properties for automatically generated code. It uses patterns to capture generator- and property-specific code idioms and property-specific meta-program fragments to construct the annotations. The algorithm is customized by specifying the code patterns and integrating them with the meta-program fragments for annotation construction. However, this is difficult since it involves tedious and error-prone low-level term manipulations. Here, we describe an annotation schema compiler that largely automates this customization task using generative techniques. It takes a collection of high-level declarative annotation schemas tailored towards a specific code generator and safety property, and generates all customized analysis functions and glue code required for interfacing with the generic algorithm core, thus effectively creating a customized annotation inference algorithm. The compiler raises the level of abstraction and simplifies schema development and maintenance. It also takes care of some more routine aspects of formulating patterns and schemas, in particular handling of irrelevant program fragments and irrelevant variance in the program structure, which reduces the size, complexity, and number of different patterns and annotation schemas that are required. The improvements described here make it easier and faster to customize the system to a new safety property or a new generator, and we demonstrate this by customizing it to certify frame safety of space flight navigation code that was automatically generated from Simulink models by MathWorks' Real-Time Workshop.

  6. Tearing mode stability calculations with pressure flattening

    CERN Document Server

    Ham, C J; Cowley, S C; Hastie, R J; Hender, T C; Liu, Y Q

    2013-01-01

    Calculations of tearing mode stability in tokamaks split conveniently into an external region, where marginally stable ideal MHD is applicable, and a resonant layer around the rational surface where sophisticated kinetic physics is needed. These two regions are coupled by the stability parameter. Pressure and current perturbations localized around the rational surface alter the stability of tearing modes. Equations governing the changes in the external solution and - are derived for arbitrary perturbations in axisymmetric toroidal geometry. The relationship of - with and without pressure flattening is obtained analytically for four pressure flattening functions. Resistive MHD codes do not contain the appropriate layer physics and therefore cannot predict stability directly. They can, however, be used to calculate -. Existing methods (Ham et al. 2012 Plasma Phys. Control. Fusion 54 025009) for extracting - from resistive codes are unsatisfactory when there is a finite pressure gradient at the rational surface ...

  7. Code Parallelization with CAPO: A User Manual

    Science.gov (United States)

    Jin, Hao-Qiang; Frumkin, Michael; Yan, Jerry; Biegel, Bryan (Technical Monitor)

    2001-01-01

    A software tool has been developed to assist the parallelization of scientific codes. This tool, CAPO, extends an existing parallelization toolkit, CAPTools developed at the University of Greenwich, to generate OpenMP parallel codes for shared memory architectures. This is an interactive toolkit to transform a serial Fortran application code to an equivalent parallel version of the software - in a small fraction of the time normally required for a manual parallelization. We first discuss the way in which loop types are categorized and how efficient OpenMP directives can be defined and inserted into the existing code using the in-depth interprocedural analysis. The use of the toolkit on a number of application codes ranging from benchmark to real-world application codes is presented. This will demonstrate the great potential of using the toolkit to quickly parallelize serial programs as well as the good performance achievable on a large number of toolkit to quickly parallelize serial programs as well as the good performance achievable on a large number of processors. The second part of the document gives references to the parameters and the graphic user interface implemented in the toolkit. Finally a set of tutorials is included for hands-on experiences with this toolkit.

  8. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  9. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  10. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  11. OCA Code Enforcement

    Data.gov (United States)

    Montgomery County of Maryland — The Office of the County Attorney (OCA) processes Code Violation Citations issued by County agencies. The citations can be viewed by issued department, issued date...

  12. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    , in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded......The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered...... as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  13. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  14. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  15. An introduction to using QR codes in scholarly journals

    Directory of Open Access Journals (Sweden)

    Jae Hwa Chang

    2014-08-01

    Full Text Available The Quick Response (QR code was first developed in 1994 by Denso Wave Incorporated, Japan. From that point on, it came into general use as an identification mark for all kinds of commercial products, advertisements, and other public announcements. In scholarly journals, the QR code is used to provide immediate direction to the journal homepage or specific content such as figures or videos. To produce a QR code and print it in the print version or upload to the web is very simple. Using a QR code producing program, an editor can add simple information to a website. After that, a QR code is produced. A QR code is very stable, such that it can be used for a long time without loss of quality. Producing and adding QR codes to a journal costs nothing; therefore, to increase the visibility of their journals, it is time for editors to add QR codes to their journals.

  16. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  17. Code de conduite

    International Development Research Centre (IDRC) Digital Library (Canada)

    irocca

    son point de vue, dans un esprit d'accueil et de respect. NOTRE CODE DE CONDUITE. Le CRDI s'engage à adopter un comportement conforme aux normes d'éthique les plus strictes dans toutes ses activités. Le Code de conduite reflète notre mission, notre philosophie en matière d'emploi et les résultats des discussions ...

  18. Fully three-dimensional ideal magnetohydrodynamic stability analysis of low-n modes and Mercier modes in stellarators

    Science.gov (United States)

    Fu, G. Y.; Cooper, W. A.; Gruber, R.; Schwenn, U.; Anderson, D. V.

    1992-06-01

    The terpsichore three-dimensional linear ideal magnetohydrodynamic (MHD) stability code [Theory of Fusion Plasmas, Proceedings of the Joint Varenna-Lausanne International Workshop, Chexbres, Switzerland, 1988 (Editrice Compositori, Bologna, Italy, 1989), p. 93; Controlled Fusion and Plasma Heating, Proceedings of the 17th European Conference, Amsterdam, The Netherlands (European Physical Society, Petit-Lancy, Switzerland, 1990), Vol. 14B, Part II, p. 931; Theory of Fusion Plasmas, Proceedings of the Joint Varenna-Lausanne International Workshop, Valla Monastero, Varenna, Italy, 1990 (Editrice Compositori, Bologna, Italy, 1990), p. 655] has been extended to the full MHD equations. The new code is used to calculate the physical growth rates of nonlocal low-n modes for l=2 torsatron configurations. A comprehensive investigation of the relation between the Mercier modes and the low-n modes has been performed. The unstable localized low-n modes are found to be correlated with the Mercier criterion. Finite growth rates of the low-n modes correspond to finite values of the Mercier criterion parameter. Near the Mercier marginal stability boundary, the low-n modes tend to be weakly unstable with very small growth rates. However, the stability of global-type low-n modes is found to be decorrelated from that of Mercier modes. The low-n modes with global radial structures can be more stable or more unstable than Mercier modes.

  19. Open Coding Descriptions

    Directory of Open Access Journals (Sweden)

    Barney G. Glaser, PhD, Hon PhD

    2016-12-01

    Full Text Available Open coding is a big source of descriptions that must be managed and controlled when doing GT research. The goal of generating a GT is to generate an emergent set of concepts and their properties that fit and work with relevancy to be integrated into a theory. To achieve this goal, the researcher begins his research with open coding, that is coding all his data in every possible way. The consequence of this open coding is a multitude of descriptions for possible concepts that often do not fit in the emerging theory. Thus in this case the researcher ends up with many irrelevant descriptions for concepts that do not apply. To dwell on descriptions for inapplicable concepts ruins the GT theory as it starts. It is hard to stop. Confusion easily sets in. Switching the study to a QDA is a simple rescue. Rigorous focusing on emerging concepts is vital before being lost in open coding descriptions. It is important, no matter how interesting the description may become. Once a core is possible, selective coding can start which will help control against being lost in multiple descriptions.

  20. A Case for Dynamic Reverse-code Generation

    DEFF Research Database (Denmark)

    Lee, Jooyong

    2007-01-01

    . These implementations, however, inherently do not scale. As has often been said, the ultimate solution for backtracking is to use reverse code: executing the reverse code restores the previous states of a program. In our earlier work, we presented a method to generate reverse code on the fly while running a debugger....... This article presents a case study of dynamic reverse-code generation. We compare the memory usage of various backtracking methods in a simple but nontrivial example, a bounded-buffer program. In the case of non-deterministic programs such as this bounded-buffer program, our dynamic reverse-code generation can...... outperform the existing backtracking methods in terms of memory efficiency...

  1. Hall effect on tearing mode instabilities in tokamak

    Science.gov (United States)

    Zhang, W.; Ma, Z. W.; Wang, S.

    2017-10-01

    The tearing mode instability is one of the most important dynamic processes in space and laboratory plasmas. Hall effects, resulting from the decoupling of electron and ion motions, can cause fast development and rotation of the perturbation structure of the tearing mode. A high-accuracy nonlinear magnetohydrodynamics code is developed to study Hall effects on the evolution of tearing modes in the Tokamak geometry. It is found that the linear growth rate increases with the increase in the ion skin depth and the self-consistently generated rotation can greatly alter the dynamic behavior of the double tearing mode.

  2. Improving a Power Line Communications Standard with LDPC Codes

    Directory of Open Access Journals (Sweden)

    Praveen Jain

    2007-01-01

    Full Text Available We investigate a power line communications (PLC scheme that could be used to enhance the HomePlug 1.0 standard, specifically its ROBO mode which provides modest throughput for the worst case PLC channel. The scheme is based on using a low-density parity-check (LDPC code, in lieu of the concatenated Reed-Solomon and convolutional codes in ROBO mode. The PLC channel is modeled with multipath fading and Middleton's class A noise. Clipping is introduced to mitigate the effect of impulsive noise. A simple and effective method is devised to estimate the variance of the clipped noise for LDPC decoding. Simulation results show that the proposed scheme outperforms the HomePlug 1.0 ROBO mode and has lower computational complexity. The proposed scheme also dispenses with the repetition of information bits in ROBO mode to gain time diversity, resulting in 4-fold increase in physical layer throughput.

  3. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Health Records (EHR) Incentive Program Physician Quality Reporting System Value-Based Payment Modifier ... Practice Management Practice Management Practice Management CPT Coding Bulletin Articles ...

  4. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Maintenance of Certification Quality Quality Quality Electronic Health Records (EHR) Incentive Program ... Practice Management Practice Management Practice Management CPT Coding Bulletin Articles ...

  5. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Global Codes and Data Collection New Medicare Card Project Medicare Enrollment and ... Quality Electronic Health Records (EHR) Incentive Program Physician Quality Reporting ...

  6. Mixed Mode cohesive law with interface dilatation

    DEFF Research Database (Denmark)

    Sørensen, Bent F.; Goutianos, Stergios

    2014-01-01

    Experimental investigations of adhesive joints and fibre composites have shown that under Mode II cracking, the fracture process induces a displacement normal to the fracture plane. This effect can be attributed e.g. to roughness of the fracture surface under dominating tangential crack face disp...... is implemented in the commercial finite element program Abaqus. The model is validated and tested against experimental results under various mode mixities. © 2013 Elsevier Ltd. All rights reserved....

  7. Automatic code generator for higher order integrators

    Science.gov (United States)

    Mushtaq, Asif; Olaussen, Kåre

    2014-05-01

    Some explicit algorithms for higher order symplectic integration of a large class of Hamilton's equations have recently been discussed by Mushtaq et al. Here we present a Python program for automatic numerical implementation of these algorithms for a given Hamiltonian, both for double precision and multiprecision computations. We provide examples of how to use this program, and illustrate behavior of both the code generator and the generated solver module(s).

  8. Dual-Mode Combustor

    Science.gov (United States)

    Trefny, Charles J (Inventor); Dippold, Vance F (Inventor)

    2013-01-01

    A new dual-mode ramjet combustor used for operation over a wide flight Mach number range is described. Subsonic combustion mode is usable to lower flight Mach numbers than current dual-mode scramjets. High speed mode is characterized by supersonic combustion in a free-jet that traverses the subsonic combustion chamber to a variable nozzle throat. Although a variable combustor exit aperture is required, the need for fuel staging to accommodate the combustion process is eliminated. Local heating from shock-boundary-layer interactions on combustor walls is also eliminated.

  9. Particle Distribution Modification by Low Amplitude Modes

    Energy Technology Data Exchange (ETDEWEB)

    White, R. B.; Gorelenkov, N.; Heidbrink, W. W.; Van Zeeland, M. A.

    2009-08-28

    Modification of a high energy particle distribution by a spectrum of low amplitude modes is investigated using a guiding center code. Only through resonance are modes effective in modifying the distribution. Diagnostics are used to illustrate the mode-particle interaction and to find which effects are relevant in producing significant resonance, including kinetic Poincare plots and plots showing those orbits with time averaged mode-particle energy transfer. Effects of pitch angle scattering and drag are studied, as well as plasma rotation and time dependence of the equilibrium and mode frequencies. A specific example of changes observed in a DIII-D deuterium beam distribution in the presence of low amplitude experimentally validated Toroidal Alfven (TAE) eigenmodes and Reversed Shear Alfven (RSAE) eigenmodes is examined in detail. Comparison with experimental data shows that multiple low amplitude modes can account for significant modification of high energy beam particle distributions. It is found that there is a stochastic threshold for beam profile modification, and that the experimental amplitudes are only slightly above this threshold.

  10. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  11. 75 FR 20833 - Building Energy Codes

    Science.gov (United States)

    2010-04-21

    ... of Energy Efficiency and Renewable Energy Building Energy Codes AGENCY: Office of Energy Efficiency and Renewable Energy, Department of Energy. ACTION: Request for Information. SUMMARY: The U.S... Efficiency and Renewable Energy, Building Technologies Program, Mailstop EE-2J, 1000 Independence Avenue, SW...

  12. Wing-Design And -Analysis Code

    Science.gov (United States)

    Darden, Christine M.; Carlson, Harry W.

    1990-01-01

    WINGDES2 computer program provides wing-design algorithm based on modified linear theory taking into account effects of attainable leading-edge thrust. Features improved numerical accuracy and additional capabilities. Provides analysis as well as design capability and applicable to both subsonic and supersonic flow. Replaces earlier wing-design code designated WINGDES (see LAR-13315). Written in FORTRAN V.

  13. An Accessible User Interface for Geoscience and Programming

    Science.gov (United States)

    Sevre, E. O.; Lee, S.

    2012-12-01

    The goal of this research is to develop an interface that will simplify user interaction with software for scientists. The motivating factor of the research is to develop tools that assist scientists with limited motor skills with the efficient generation and use of software tools. Reliance on computers and programming is increasing in the world of geology, and it is increasingly important for geologists and geophysicists to have the computational resources to use advanced software and edit programs for their research. I have developed a prototype of a program to help geophysicists write programs using a simple interface that requires only simple single-mouse-clicks to input code. It is my goal to minimize the amount of typing necessary to create simple programs and scripts to increase accessibility for people with disabilities limiting fine motor skills. This interface can be adapted for various programming and scripting languages. Using this interface will simplify development of code for C/C++, Java, and GMT, and can be expanded to support any other text based programming language. The interface is designed around the concept of maximizing the amount of code that can be written using a minimum number of clicks and typing. The screen is split into two sections: a list of click-commands is on the left hand side, and a text area is on the right hand side. When the user clicks on a command on the left hand side the applicable code is automatically inserted at the insertion point in the text area. Currently in the C/C++ interface, there are commands for common code segments that are often used, such as for loops, comments, print statements, and structured code creation. The primary goal is to provide an interface that will work across many devices for developing code. A simple prototype has been developed for the iPad. Due to the limited number of devices that an iOS application can be used with, the code has been re-written in Java to run on a wider range of devices

  14. Code blue: seizures.

    Science.gov (United States)

    Hoerth, Matthew T; Drazkowski, Joseph F; Noe, Katherine H; Sirven, Joseph I

    2011-06-01

    Eyewitnesses frequently perceive seizures as life threatening. If an event occurs on the hospital premises, a "code blue" can be called which consumes considerable resources. The purpose of this study was to determine the frequency and characteristics of code blue calls for seizures and seizure mimickers. A retrospective review of a code blue log from 2001 through 2008 identified 50 seizure-like events, representing 5.3% of all codes. Twenty-eight (54%) occurred in inpatients; the other 22 (44%) events involved visitors or employees on the hospital premises. Eighty-six percent of the events were epileptic seizures. Seizure mimickers, particularly psychogenic nonepileptic seizures, were more common in the nonhospitalized group. Only five (17.9%) inpatients had a known diagnosis of epilepsy, compared with 17 (77.3%) of the nonhospitalized patients. This retrospective survey provides insights into how code blues are called on hospitalized versus nonhospitalized patients for seizure-like events. Copyright © 2011. Published by Elsevier Inc.

  15. Error coding simulations

    Science.gov (United States)

    Noble, Viveca K.

    1993-11-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  16. Twisted Reed-Solomon Codes

    DEFF Research Database (Denmark)

    Beelen, Peter; Puchinger, Sven; Rosenkilde ne Nielsen, Johan

    2017-01-01

    We present a new general construction of MDS codes over a finite field Fq. We describe two explicit subclasses which contain new MDS codes of length at least q/2 for all values of q ≥ 11. Moreover, we show that most of the new codes are not equivalent to a Reed-Solomon code.......We present a new general construction of MDS codes over a finite field Fq. We describe two explicit subclasses which contain new MDS codes of length at least q/2 for all values of q ≥ 11. Moreover, we show that most of the new codes are not equivalent to a Reed-Solomon code....

  17. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  18. Manufacturer Identification Code (MID) - ACE

    Data.gov (United States)

    Department of Homeland Security — The ACE Manufacturer Identification Code (MID) application is used to track and control identifications codes for manufacturers. A manufacturer is identified on an...

  19. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  20. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  1. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  2. Microbubble Surface Modes

    NARCIS (Netherlands)

    Versluis, Michel; Palanchon, P.; Goertz, D.; van der Meer, S.M.; Chin, C.T.; Lohse, Detlef; de Jong, N.

    2004-01-01

    We have investigated surface vibrations generated by ultrasound excitation of individual unencapsulated micron-sized bubbles. In addition, we present surface modes (n=2 and 3) observed for phospholipid-coated ultrasound contrast agents excited through excitation of radial modes at frequencies

  3. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes...

  4. Mode decomposition evolution equations.

    Science.gov (United States)

    Wang, Yang; Wei, Guo-Wei; Yang, Siyang

    2012-03-01

    Partial differential equation (PDE) based methods have become some of the most powerful tools for exploring the fundamental problems in signal processing, image processing, computer vision, machine vision and artificial intelligence in the past two decades. The advantages of PDE based approaches are that they can be made fully automatic, robust for the analysis of images, videos and high dimensional data. A fundamental question is whether one can use PDEs to perform all the basic tasks in the image processing. If one can devise PDEs to perform full-scale mode decomposition for signals and images, the modes thus generated would be very useful for secondary processing to meet the needs in various types of signal and image processing. Despite of great progress in PDE based image analysis in the past two decades, the basic roles of PDEs in image/signal analysis are only limited to PDE based low-pass filters, and their applications to noise removal, edge detection, segmentation, etc. At present, it is not clear how to construct PDE based methods for full-scale mode decomposition. The above-mentioned limitation of most current PDE based image/signal processing methods is addressed in the proposed work, in which we introduce a family of mode decomposition evolution equations (MoDEEs) for a vast variety of applications. The MoDEEs are constructed as an extension of a PDE based high-pass filter (Europhys. Lett., 59(6): 814, 2002) by using arbitrarily high order PDE based low-pass filters introduced by Wei (IEEE Signal Process. Lett., 6(7): 165, 1999). The use of arbitrarily high order PDEs is essential to the frequency localization in the mode decomposition. Similar to the wavelet transform, the present MoDEEs have a controllable time-frequency localization and allow a perfect reconstruction of the original function. Therefore, the MoDEE operation is also called a PDE transform. However, modes generated from the present approach are in the spatial or time domain and can be

  5. Code of Medical Ethics

    Directory of Open Access Journals (Sweden)

    . SZD-SZZ

    2017-03-01

    Full Text Available Te Code was approved on December 12, 1992, at the 3rd regular meeting of the General Assembly of the Medical Chamber of Slovenia and revised on April 24, 1997, at the 27th regular meeting of the General Assembly of the Medical Chamber of Slovenia. The Code was updated and harmonized with the Medical Association of Slovenia and approved on October 6, 2016, at the regular meeting of the General Assembly of the Medical Chamber of Slovenia.

  6. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause/receive inter......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause...

  7. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  8. Shaft mode shape demonstration

    Science.gov (United States)

    Grissom, R.

    1985-01-01

    The dynamic response of a rotating machine is directly influenced by its geometric configuration and all aspects of the rotor construction. These determine two significant parameters, mass distribution and stiffness, which yield a spectrum of natural frequencies and mode shapes. The mode shapes can be presented as snapshots of the characteristic amplitude/phase reponse patterns of the shaft, due to the major forcing function of unbalance, at different rotative speeds. To demonstrate the three shaft mode shapes of the rotor rig using the Shaft Mode Demonstrator and oscilloscopes. The synchronous (1X) amplitude and phase of the rotor vibration in the vertical direction from several points along the shaft is displayed on corresponding points of the demonstrator. Unfiltered vibration from vertical and horizontal probe pairs is displayed on the oscilloscopes in orbit format for a dynamic presentation of the mode shape.

  9. Higher Order Mode Fibers

    DEFF Research Database (Denmark)

    Israelsen, Stine Møller

    This PhD thesis considers higher order modes (HOMs) in optical fibers. That includes their excitation and characteristics. Within the last decades, HOMs have been applied both for space multiplexing in optical communications, group velocity dispersion management and sensing among others....... The research presented in this thesis falls in three parts. In the first part, a first time demonstration of the break of the azimuthal symmetry of the Bessel-like LP0X modes is presented. This effect, known as the bowtie effect, causes the mode to have an azimuthal dependence as well as a quasi......-radial polarization as opposed to the linear polarization of the LP0X modes. The effect is investigated numerically in a double cladding fiber with an outer aircladding using a full vectorial modesolver. Experimentally, the bowtie modes are excited using a long period grating and their free space characteristics...

  10. Segmented Liner to Control Mode Scattering

    Science.gov (United States)

    Gerhold, Carl H.; Jones, Michael G.; Brown, Martha C.

    2013-01-01

    The acoustic performance of duct liners can be improved by segmenting the treatment. In a segmented liner treatment, one stage of liner reduces the target sound and scatters energy into other acoustic modes, which are attenuated by a subsequent stage. The Curved Duct Test Rig is an experimental facility in which sound incident on the liner can be generated in a specific mode and the scatter of energy into other modes can be quantified. A series of experiments is performed in which the baseline configuration is asymmetric, that is, a liner is on one side wall of the test duct and the wall opposite is acoustically hard. Segmented liner treatment is achieved by progressively replacing sections of the hard wall opposite with liner in the axial direction, from 25% of the wall surface to 100%. It is found that the energy scatter from the (0,0) to the (0,1) mode reduces as the percentage of opposite wall treatment increases, and the frequency of peak attenuation shifts toward higher frequency. Similar results are found when the incident mode is of order (0,1) and scatter is into the (0,0) mode. The propagation code CDUCT-LaRC is used to predict the effect of liner segmenting on liner performance. The computational results show energy scatter and the effect of liner segmentation that agrees with the experimental results. The experiments and computations both show that segmenting the liner treatment is effective to control the scatter of incident mode energy into other modes. CDUCT-LaRC is shown to be a valuable tool to predict trends of liner performance with liner configuration.

  11. Ensuring that User Defined Code does not See Uninitialized Fields

    DEFF Research Database (Denmark)

    Nielsen, Anders Bach

    2007-01-01

    Initialization of objects is commonly handled by user code, often in special routines known as constructors. This applies even in a virtual machine with multiple concurrent execution engines that all share the same heap. But for a language where run-time values play a role in the type system......, no user defined code can be allowed to use a field before it is initialized. This paper presents an approach which ensures that user code will not see uninitialized fields. It uses a dual-mode execution model to maintain a reasonable level of performance....

  12. Methodology for bus layout for topological quantum error correcting codes

    Energy Technology Data Exchange (ETDEWEB)

    Wosnitzka, Martin; Pedrocchi, Fabio L.; DiVincenzo, David P. [RWTH Aachen University, JARA Institute for Quantum Information, Aachen (Germany)

    2016-12-15

    Most quantum computing architectures can be realized as two-dimensional lattices of qubits that interact with each other. We take transmon qubits and transmission line resonators as promising candidates for qubits and couplers; we use them as basic building elements of a quantum code. We then propose a simple framework to determine the optimal experimental layout to realize quantum codes. We show that this engineering optimization problem can be reduced to the solution of standard binary linear programs. While solving such programs is a NP-hard problem, we propose a way to find scalable optimal architectures that require solving the linear program for a restricted number of qubits and couplers. We apply our methods to two celebrated quantum codes, namely the surface code and the Fibonacci code. (orig.)

  13. Improving the Automated Detection and Analysis of Secure Coding Violations

    Science.gov (United States)

    2014-06-01

    vulnerabilities in the National Vulnerability Database in 2004 were caused by programming errors. The CERT Division’s Source Code Analysis Laboratory (SCALe...was as follows: 1. Modify SCALe workflow, infrastructure, and database (s) to support data collection and in- strumentation, such as the measurement of...12A DISTRIBUTION/AVAILABILITY STATEMENT Unclassified/Unlimited, DTIC, NTIS 12B DISTRIBUTION CODE 13. ABSTRACT (MAXIMUM 200 WORDS) Coding errors

  14. Dynamic Compilation of C++ Template Code

    Directory of Open Access Journals (Sweden)

    Martin J. Cole

    2003-01-01

    Full Text Available Generic programming using the C++ template facility has been a successful method for creating high-performance, yet general algorithms for scientific computing and visualization. However, adding template code tends to require more template code in surrounding structures and algorithms to maintain generality. Compiling all possible expansions of these templates can lead to massive template bloat. Furthermore, compile-time binding of templates requires that all possible permutations be known at compile time, limiting the runtime extensibility of the generic code. We present a method for deferring the compilation of these templates until an exact type is needed. This dynamic compilation mechanism will produce the minimum amount of compiled code needed for a particular application, while maintaining the generality and performance that templates innately provide. Through a small amount of supporting code within each templated class, the proper templated code can be generated at runtime without modifying the compiler. We describe the implementation of this goal within the SCIRun dataflow system. SCIRun is freely available online for research purposes.

  15. Zip Code Manager

    Data.gov (United States)

    Office of Personnel Management — The system used to associate what Federal Employees Health Benefits Program (FEHBP) and Federal Employees Dental/Vision Program (FEDVIP) health, dental, and vision...

  16. Ptolemy Coding Style

    Science.gov (United States)

    2014-09-05

    because this would combine Ptolemy II with the GPL’d code and thus encumber Ptolemy II with the GPL. Another GNU license is the GNU Library General...permission on the source.eecs.berkeley.edu repositories, then use your local repository. bash-3.2$ svn co svn+ ssh ://source.eecs.berkeley.edu/chess

  17. Error Correcting Codes

    Indian Academy of Sciences (India)

    The images, which came from Oailleo's flyby of the moon on June 26-27. 1996 are reported to be 20 times better than those obtained from the Voyager. Priti Shankar .... a systematic way. Thus was born a brand new field,which has since been ..... mathematically oriented, compact book on coding, containing a few topics not ...

  18. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  19. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  20. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  1. Error Correcting Codes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 1; Issue 10. Error Correcting Codes How Numbers Protect Themselves. Priti Shankar. Series Article Volume 1 ... Author Affiliations. Priti Shankar1. Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India ...

  2. Video Coding for ESL.

    Science.gov (United States)

    King, Kevin

    1992-01-01

    Coding tasks, a valuable technique for teaching English as a Second Language, are presented that enable students to look at patterns and structures of marital communication as well as objectively evaluate the degree of happiness or distress in the marriage. (seven references) (JL)

  3. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  4. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    Computer Science and. Automation, liSe. Their research addresses various aspects of algebraic and combinatorial coding theory. 1 low Density Parity Check ..... lustrating how the variable Xd is decoded. As mentioned earlier, this algorithm runs iteratively. To start with, in the first iteration, only bits in the first level of the ...

  5. Student Dress Codes.

    Science.gov (United States)

    Uerling, Donald F.

    School officials see a need for regulations that prohibit disruptive and inappropriate forms of expression and attire; students see these regulations as unwanted restrictions on their freedom. This paper reviews court litigation involving constitutional limitations on school authority, dress and hair codes, state law constraints, and school…

  6. Dress Codes and Uniforms.

    Science.gov (United States)

    Lumsden, Linda; Miller, Gabriel

    2002-01-01

    Students do not always make choices that adults agree with in their choice of school dress. Dress-code issues are explored in this Research Roundup, and guidance is offered to principals seeking to maintain a positive school climate. In "Do School Uniforms Fit?" Kerry White discusses arguments for and against school uniforms and summarizes the…

  7. Dress Codes. Legal Brief.

    Science.gov (United States)

    Zirkel, Perry A.

    2000-01-01

    As illustrated by two recent decisions, the courts in the past decade have demarcated wide boundaries for school officials considering dress codes, whether in the form of selective prohibitions or required uniforms. Administrators must warn the community, provide legitimate justification and reasonable clarity, and comply with state law. (MLH)

  8. Decoding Codes on Graphs

    Indian Academy of Sciences (India)

    titled 'A Mathematical Theory of Communication' in the Bell Systems Technical Journal in 1948. The paper set up a ... 'existential' result but nota 'constructive' one. The construction of such a code evolved from the work ... several papers on hyperbolic geometry. He shifted to the Department of Pure Mathematics at Calcutta.

  9. Cracking the Codes

    Science.gov (United States)

    Heathcote, Dorothy

    1978-01-01

    Prescribes an attitude that teachers can take to help students "crack the code" of a dramatic work, combining a flexible teaching strategy, the suspension of beliefs or preconceived notions about the work, focusing on the drams's text, and choosing a reading strategy appropriate to the dramatic work. (RL)

  10. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  11. Coded SQUID arrays

    NARCIS (Netherlands)

    Podt, M.; Weenink, J.; Weenink, J.; Flokstra, Jakob; Rogalla, Horst

    2001-01-01

    We report on a superconducting quantum interference device (SQUID) system to read out large arrays of cryogenic detectors. In order to reduce the number of SQUIDs required for an array of these detectors, we used code-division multiplexing. This simplifies the electronics because of a significantly

  12. Reed-Solomon convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Schmale, W

    2005-01-01

    In this paper we will introduce a specific class of cyclic convolutional codes. The construction is based on Reed-Solomon block codes. The algebraic parameters as well as the distance of these codes are determined. This shows that some of these codes are optimal or near optimal.

  13. H.264 SVC Complexity Reduction Based on Likelihood Mode Decision

    Directory of Open Access Journals (Sweden)

    L. Balaji

    2015-01-01

    Full Text Available H.264 Advanced Video Coding (AVC was prolonged to Scalable Video Coding (SVC. SVC executes in different electronics gadgets such as personal computer, HDTV, SDTV, IPTV, and full-HDTV in which user demands various scaling of the same content. The various scaling is resolution, frame rate, quality, heterogeneous networks, bandwidth, and so forth. Scaling consumes more encoding time and computational complexity during mode selection. In this paper, to reduce encoding time and computational complexity, a fast mode decision algorithm based on likelihood mode decision (LMD is proposed. LMD is evaluated in both temporal and spatial scaling. From the results, we conclude that LMD performs well, when compared to the previous fast mode decision algorithms. The comparison parameters are time, PSNR, and bit rate. LMD achieve time saving of 66.65% with 0.05% detriment in PSNR and 0.17% increment in bit rate compared with the full search method.

  14. Technology cool women who code

    CERN Document Server

    Diehn, Andi

    2015-01-01

    Do you listen to music with an MP3 player or read books on a tablet? Do you play multiplayer video games with people on the other side of the world? Do you have a robot cleaning your kitchen? Maybe not yet, but someday! In Technology: Cool Women Who Code, kids in grades four through six learn about the thrilling effort that goes into researching, inventing, programming, and producing the technology we use today, from iPods to mechanical limbs. Young readers discover exactly what technology is, how it evolved, and where the future may lead. They also meet three women who have contributed to the field in critical ways, including Grace Hopper and Shaundra Bryant Daily. Technology: Cool Women Who Code combines high-interest content with links to online primary sources and essential questions that further expand kids' knowledge and understanding of a topic they come in contact with every day. Compelling portraits of women who have excelled in meeting the challenges of their field keep kids interested and infused w...

  15. Nonlinear saturation of ballooning modes in tokamaks and stellarators

    Science.gov (United States)

    Bauer, F.; Garabedian, P.; Betancourt, O.

    1988-01-01

    The spectral code BETAS computes plasma equilibrium in a toroidal magnetic field B = [unk]s × [unk]Ψ with remarkable accuracy because the finite difference scheme employed in the radial direction allows for discontinuities of the flux function Ψ across the nested surfaces s = const. Instability of higher modes in stellarators like the Heliotron E can be detected in roughly an hour on the best supercomputers by calculating bifurcated equilibria that are defined over just one field period. The method has been validated by comparing results about nonlinear saturation of ballooning modes in tokamaks with numerical data from the PEST code. PMID:16593984

  16. Hardware Assisted ROP Detection Mode (HARD Mode)

    Science.gov (United States)

    2013-08-01

    stack-smashing techniques as described in the original 1996 Phrack article by Aleph One[1]. ROP redirects program flow into arbitrary places of program...model should be considered for additional research. References [1] “ Aleph One”. Smashing The Stack For Fun And Profit. Phrack, 7(49), November 1996 [2

  17. Mode choice model parameters estimation

    OpenAIRE

    Strnad, Irena

    2010-01-01

    The present work focuses on parameter estimation of two mode choice models: multinomial logit and EVA 2 model, where four different modes and five different trip purposes are taken into account. Mode choice model discusses the behavioral aspect of mode choice making and enables its application to a traffic model. Mode choice model includes mode choice affecting trip factors by using each mode and their relative importance to choice made. When trip factor values are known, it...

  18. Phonon Mode Conversion Across Dimensionally Mismatched Interfaces: Carbon Nanotube Graphene Junction (Preprint)

    Science.gov (United States)

    2017-06-12

    i.e., they partially convert different phonon modes into graphene after the transmission. For instance, the longitudinal acoustic (LA) mode incident...Unclassified b. ABSTRACT Unclassified c. THIS PAGE Unclassified Kurt Eyink 19b. TELEPHONE NUMBER (Include Area Code ) (937) 656-5710...packet method. Surprisingly, we have observed phonon mode conversion behavior for all incident phonon modes from CNT, i.e., they partially convert

  19. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Education Cancer Education Cancer Programs Conference: Creating a Culture of Quality CoC Events Quality Education Quality Education ... OR EHR Incentive Program Global Codes and Data Collection New Medicare Card Project Medicare Enrollment and Participation ...

  20. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... My OR EHR Incentive Program Global Codes and Data Collection New Medicare Card Project Medicare Enrollment and Participation ... self-care checklist Evaluation (Complete the Ostomy Patient Survey . We need your opinion!) Program outcomes The ACS ...

  1. Causation, constructors and codes.

    Science.gov (United States)

    Hofmeyr, Jan-Hendrik S

    2017-09-13

    Relational biology relies heavily on the enriched understanding of causal entailment that Robert Rosen's formalisation of Aristotle's four causes has made possible, although to date efficient causes and the rehabilitation of final cause have been its main focus. Formal cause has been paid rather scant attention, but, as this paper demonstrates, is crucial to our understanding of many types of processes, not necessarily biological. The graph-theoretic relational diagram of a mapping has played a key role in relational biology, and the first part of the paper is devoted to developing an explicit representation of formal cause in the diagram and how it acts in combination with efficient cause to form a mapping. I then use these representations to show how Von Neumann's universal constructor can be cast into a relational diagram in a way that avoids the logical paradox that Rosen detected in his own representation of the constructor in terms of sets and mappings. One aspect that was absent from both Von Neumann's and Rosen's treatments was the necessity of a code to translate the description (the formal cause) of the automaton to be constructed into the construction process itself. A formal definition of codes in general, and organic codes in particular, allows the relational diagram to be extended so as to capture this translation of formal cause into process. The extended relational diagram is used to exemplify causal entailment in a diverse range of processes, such as enzyme action, construction of automata, communication through the Morse code, and ribosomal polypeptide synthesis through the genetic code. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. OSCAR a Matlab based optical FFT code

    Science.gov (United States)

    Degallaix, Jérôme

    2010-05-01

    Optical simulation softwares are essential tools for designing and commissioning laser interferometers. This article aims to introduce OSCAR, a Matlab based FFT code, to the experimentalist community. OSCAR (Optical Simulation Containing Ansys Results) is used to simulate the steady state electric fields in optical cavities with realistic mirrors. The main advantage of OSCAR over other similar packages is the simplicity of its code requiring only a short time to master. As a result, even for a beginner, it is relatively easy to modify OSCAR to suit other specific purposes. OSCAR includes an extensive manual and numerous detailed examples such as simulating thermal aberration, calculating cavity eigen modes and diffraction loss, simulating flat beam cavities and three mirror ring cavities. An example is also provided about how to run OSCAR on the GPU of modern graphic cards instead of the CPU, making the simulation up to 20 times faster.

  3. Review of current nuclear fallout codes.

    Science.gov (United States)

    Auxier, Jerrad P; Auxier, John D; Hall, Howard L

    2017-05-01

    The importance of developing a robust nuclear forensics program to combat the illicit use of nuclear material that may be used as an improvised nuclear device is widely accepted. In order to decrease the threat to public safety and improve governmental response, government agencies have developed fallout-analysis codes to predict the fallout particle size, dose, and dispersion and dispersion following a detonation. This paper will review the different codes that have been developed for predicting fallout from both chemical and nuclear weapons. This will decrease the response time required for the government to respond to the event. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  4. Two-Level Semantics and Code Generation

    DEFF Research Database (Denmark)

    Nielson, Flemming; Nielson, Hanne Riis

    1988-01-01

    A two-level denotational metalanguage that is suitable for defining the semantics of Pascal-like languages is presented. The two levels allow for an explicit distinction between computations taking place at compile-time and computations taking place at run-time. While this distinction is perhaps...... not absolutely necessary for describing the input-output semantics of programming languages, it is necessary when issues such as data flow analysis and code generation are considered. For an example stack-machine, the authors show how to generate code for the run-time computations and still perform the compile...

  5. Surface modes in physics

    CERN Document Server

    Sernelius, Bo E

    2011-01-01

    Electromagnetic surface modes are present at all surfaces and interfaces between material of different dielectric properties. These modes have very important effects on numerous physical quantities: adhesion, capillary force, step formation and crystal growth, the Casimir effect etc. They cause surface tension and wetting and they give rise to forces which are important e.g. for the stability of colloids.This book is a useful and elegant approach to the topic, showing how the concept of electromagnetic modes can be developed as a unifying theme for a range of condensed matter physics. The

  6. Probabilistic performance analysis using the SLEUTH fuel modelling code

    Energy Technology Data Exchange (ETDEWEB)

    Palmer, I.D.

    1986-01-01

    The paper describes the development and sample use of a computer code which automates both the Monte Carlo and response surface approaches to probabilistic fuel performance modelling utilising the SLEUTH-82 deterministic program. A number of the statistical procedures employed, which have been prepared as independent computer codes, are also described. These are of general applicability in many areas of probabilistic assessment.

  7. A solution for automatic parallelization of sequential assembly code

    Directory of Open Access Journals (Sweden)

    Kovačević Đorđe

    2013-01-01

    Full Text Available Since modern multicore processors can execute existing sequential programs only on a single core, there is a strong need for automatic parallelization of program code. Relying on existing algorithms, this paper describes one new software solution tool for parallelization of sequential assembly code. The main goal of this paper is to develop the parallelizator which reads sequential assembler code and at the output provides parallelized code for MIPS processor with multiple cores. The idea is the following: the parser translates assembler input file to program objects suitable for further processing. After that the static single assignment is done. Based on the data flow graph, the parallelization algorithm separates instructions on different cores. Once sequential code is parallelized by the parallelization algorithm, registers are allocated with the algorithm for linear allocation, and the result at the end of the program is distributed assembler code on each of the cores. In the paper we evaluate the speedup of the matrix multiplication example, which was processed by the parallelizator of assembly code. The result is almost linear speedup of code execution, which increases with the number of cores. The speed up on the two cores is 1.99, while on 16 cores the speed up is 13.88.

  8. Monte Carlo simulation code modernization

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    The continual development of sophisticated transport simulation algorithms allows increasingly accurate description of the effect of the passage of particles through matter. This modelling capability finds applications in a large spectrum of fields from medicine to astrophysics, and of course HEP. These new capabilities however come at the cost of a greater computational intensity of the new models, which has the effect of increasing the demands of computing resources. This is particularly true for HEP, where the demand for more simulation are driven by the need of both more accuracy and more precision, i.e. better models and more events. Usually HEP has relied on the "Moore's law" evolution, but since almost ten years the increase in clock speed has withered and computing capacity comes in the form of hardware architectures of many-core or accelerated processors. To harness these opportunities we need to adapt our code to concurrent programming models taking advantages of both SIMD and SIMT architectures. Th...

  9. A new type of alternating code for incoherent scatter measurements

    Science.gov (United States)

    Sulzer, Michael P.

    1993-11-01

    An alternating code set is employed as one of several possible techniques used in incoherent scatter radar transmissions to obtain ambiguity-free measurements of autocorrelation functions or spectra with good range resolution. An alternating code set consists of several codes; typically, each successive radar pulse is modulated with a different code in the sequence. This technique is useful in other types of radar transmissions when the target is overspread, assuming the targets have certain statistical properties. Code sets for a new type of alternating code are presented for code lengths 8-12. This new type of alternating code differs from the first kind in two ways: it is subject to a slightly different condition for the elimination of ambiguity, and it is not restricted to lengths that are powers of 2. The new lengths are useful because they allow greater freedom in designing a multipurpose radar waveform best utilizing the available duty cycle of the radar. The alternating code technique is described in detail sufficient to allow an understanding of the two types and to show that the new condition for ambiguity-free measurements is a useful one. A search program was used to find the new sets; the aspects of the program important for decreasing the size of the search space are described. The code sets are presented, and their significance and uses are discussed.

  10. Essential idempotents and simplex codes

    Directory of Open Access Journals (Sweden)

    Gladys Chalom

    2017-01-01

    Full Text Available We define essential idempotents in group algebras and use them to prove that every mininmal abelian non-cyclic code is a repetition code. Also we use them to prove that every minimal abelian code is equivalent to a minimal cyclic code of the same length. Finally, we show that a binary cyclic code is simplex if and only if is of length of the form $n=2^k-1$ and is generated by an essential idempotent.

  11. Coding Theory and Projective Spaces

    Science.gov (United States)

    Silberstein, Natalia

    2008-05-01

    The projective space of order n over a finite field F_q is a set of all subspaces of the vector space F_q^{n}. In this work, we consider error-correcting codes in the projective space, focusing mainly on constant dimension codes. We start with the different representations of subspaces in the projective space. These representations involve matrices in reduced row echelon form, associated binary vectors, and Ferrers diagrams. Based on these representations, we provide a new formula for the computation of the distance between any two subspaces in the projective space. We examine lifted maximum rank distance (MRD) codes, which are nearly optimal constant dimension codes. We prove that a lifted MRD code can be represented in such a way that it forms a block design known as a transversal design. The incidence matrix of the transversal design derived from a lifted MRD code can be viewed as a parity-check matrix of a linear code in the Hamming space. We find the properties of these codes which can be viewed also as LDPC codes. We present new bounds and constructions for constant dimension codes. First, we present a multilevel construction for constant dimension codes, which can be viewed as a generalization of a lifted MRD codes construction. This construction is based on a new type of rank-metric codes, called Ferrers diagram rank-metric codes. Then we derive upper bounds on the size of constant dimension codes which contain the lifted MRD code, and provide a construction for two families of codes, that attain these upper bounds. We generalize the well-known concept of a punctured code for a code in the projective space to obtain large codes which are not constant dimension. We present efficient enumerative encoding and decoding techniques for the Grassmannian. Finally we describe a search method for constant dimension lexicodes.

  12. HOTSPOT Health Physics codes for the PC

    Energy Technology Data Exchange (ETDEWEB)

    Homann, S.G.

    1994-03-01

    The HOTSPOT Health Physics codes were created to provide Health Physics personnel with a fast, field-portable calculation tool for evaluating accidents involving radioactive materials. HOTSPOT codes are a first-order approximation of the radiation effects associated with the atmospheric release of radioactive materials. HOTSPOT programs are reasonably accurate for a timely initial assessment. More importantly, HOTSPOT codes produce a consistent output for the same input assumptions and minimize the probability of errors associated with reading a graph incorrectly or scaling a universal nomogram during an emergency. The HOTSPOT codes are designed for short-term (less than 24 hours) release durations. Users requiring radiological release consequences for release scenarios over a longer time period, e.g., annual windrose data, are directed to such long-term models as CAPP88-PC (Parks, 1992). Users requiring more sophisticated modeling capabilities, e.g., complex terrain; multi-location real-time wind field data; etc., are directed to such capabilities as the Department of Energy`s ARAC computer codes (Sullivan, 1993). Four general programs -- Plume, Explosion, Fire, and Resuspension -- calculate a downwind assessment following the release of radioactive material resulting from a continuous or puff release, explosive release, fuel fire, or an area contamination event. Other programs deal with the release of plutonium, uranium, and tritium to expedite an initial assessment of accidents involving nuclear weapons. Additional programs estimate the dose commitment from the inhalation of any one of the radionuclides listed in the database of radionuclides; calibrate a radiation survey instrument for ground-survey measurements; and screen plutonium uptake in the lung (see FIDLER Calibration and LUNG Screening sections).

  13. MRPP: multiregion processing plant code. [MSBR

    Energy Technology Data Exchange (ETDEWEB)

    Kee, C. W.; McNeese, L. E.

    1976-09-01

    The report describes the machine solution of a large number (approximately 52,000) of simultaneous linear algebraic equations in which the unknowns are the concentrations of nuclides in the fuel salt of a fluid-fueled reactor (MSBR) having a continuous fuel processing plant. Most of the equations define concentrations at various points in the processing plant. The code allows as input a generalized description of a processing plant flowsheet; it also performs the iterative adjustment of flowsheet parameters for determination of concentrations throughout the flowsheet, and the associated effect of the specified processing mode on the overall reactor operation.

  14. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...

  15. FLECHT SEASET program. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Hochreiter, L E

    1985-11-01

    This report presents the highlights and main findings of the USNRC, EPRI, and Westinghouse cooperative FLECHT SEASET program. The report indicates areas in which the results of the program can contribute to revising the current licensing requirements for Loss of Coolant (LOCA) safety analysis for PWRs. Also identified are several technical areas in which the new FLECHT SEASET data and analysis can lead to improved safety analysis modeling, and thereby to predicted PWR response for postulated accident scenarios. Significant progress has been made in the modeling areas of nonequilibrium dispersed two-phase flow during reflood. Improved models and understanding of this rod bundle cooling regime are summarized in this report. Another important result of the FLECHT SEASET program arises from the natural circulation test series, which investigated single-phase, two-phase, and reflux condensation cooling modes of a scaled PWR under small-break LOCA conditions. The tests and subsequent analysis constitute one of few complete sets of data for these cooling modes in which full-height, multitube steam generators with sufficient instrumentation were used to examine primary-to-secondary heat transfer in the generators. It is believed that the natural circulation test data will be extremely useful to benchmark the improved post-TMI small-break LOCA computer codes. 170 figs., 13 tabs.

  16. Code-Switching and Pausing: An Interdisciplinary Study

    Science.gov (United States)

    Gardner-Chloros, Penelope; McEntee-Atalianis, Lisa; Paraskeva, Marilena

    2013-01-01

    This study considers code-switching (CS) and pausing in two sociolinguistically distinct groups in London and Cyprus, bilingual in Greek-Cypriot Dialect (GCD) and English. The characteristics of their speech are examined both in monolingual and bilingual modes (Grosjean, 2001). It was hypothesised that in London Greek-Cypriots, where CS is a…

  17. Ducted-Fan Engine Acoustic Predictions using a Navier-Stokes Code

    Science.gov (United States)

    Rumsey, C. L.; Biedron, R. T.; Farassat, F.; Spence, P. L.

    1998-01-01

    A Navier-Stokes computer code is used to predict one of the ducted-fan engine acoustic modes that results from rotor-wake/stator-blade interaction. A patched sliding-zone interface is employed to pass information between the moving rotor row and the stationary stator row. The code produces averaged aerodynamic results downstream of the rotor that agree well with a widely used average-passage code. The acoustic mode of interest is generated successfully by the code and is propagated well upstream of the rotor; temporal and spatial numerical resolution are fine enough such that attenuation of the signal is small. Two acoustic codes are used to find the far-field noise. Near-field propagation is computed by using Eversman's wave envelope code, which is based on a finite-element model. Propagation to the far field is accomplished by using the Kirchhoff formula for moving surfaces with the results of the wave envelope code as input data. Comparison of measured and computed far-field noise levels show fair agreement in the range of directivity angles where the peak radiation lobes from the inlet are observed. Although only a single acoustic mode is targeted in this study, the main conclusion is a proof-of-concept: Navier-Stokes codes can be used both to generate and propagate rotor/stator acoustic modes forward through an engine, where the results can be coupled to other far-field noise prediction codes.

  18. Assembly processor program converts symbolic programming language to machine language

    Science.gov (United States)

    Pelto, E. V.

    1967-01-01

    Assembly processor program converts symbolic programming language to machine language. This program translates symbolic codes into computer understandable instructions, assigns locations in storage for successive instructions, and computer locations from symbolic addresses.

  19. Influence of toroidal rotation on tearing modes

    Science.gov (United States)

    Cai, Huishan; Cao, Jintao; Li, Ding

    2017-10-01

    Tearing modes stability analysis including toroidal rotation is studied. It is found that rotation affects the stability of tearing modes mainly through the interaction with resistive inner region of tearing mode. The coupling of magnetic curvature with centrifugal force and Coriolis force provides a perturbed perpendicular current, and a return parallel current is induced to affect the stability of tearing modes. Toroidal rotation plays a stable role, which depends on the magnitude of Mach number and adiabatic index Γ, and is independent on the direction of toroidal rotation. For Γ >1, the scaling of growth rate is changed for typical Mach number in present tokamaks. For Γ = 1 , the scaling keeps unchanged, and the effect of toroidal rotation is much less significant, compared with that for Γ >1. National Magnetic Confinement Fusion Science Program and National Science Foundation of China under Grants No. 2014GB106004, No. 2013GB111000, No. 11375189, No. 11075161 and No. 11275260, and Youth Innovation Promotion Association CAS.

  20. Entanglement-assisted quantum MDS codes constructed from negacyclic codes

    Science.gov (United States)

    Chen, Jianzhang; Huang, Yuanyuan; Feng, Chunhui; Chen, Riqing

    2017-12-01

    Recently, entanglement-assisted quantum codes have been constructed from cyclic codes by some scholars. However, how to determine the number of shared pairs required to construct entanglement-assisted quantum codes is not an easy work. In this paper, we propose a decomposition of the defining set of negacyclic codes. Based on this method, four families of entanglement-assisted quantum codes constructed in this paper satisfy the entanglement-assisted quantum Singleton bound, where the minimum distance satisfies q+1 ≤ d≤ n+2/2. Furthermore, we construct two families of entanglement-assisted quantum codes with maximal entanglement.

  1. Mode Gaussian beam tracing

    Science.gov (United States)

    Trofimov, M. Yu.; Zakharenko, A. D.; Kozitskiy, S. B.

    2016-10-01

    A mode parabolic equation in the ray centered coordinates for 3D underwater sound propagation is developed. The Gaussian beam tracing in this case is constructed. The test calculations are carried out for the ASA wedge benchmark and proved an excellent agreement with the source images method in the case of cross-slope propagation. But in the cases of wave propagation at some angles to the cross-slope direction an account of mode interaction becomes necessary.

  2. Just-in-Time Compilation-Inspired Methodology for Parallelization of Compute Intensive Java Code

    OpenAIRE

    GHULAM MUSTAFA; WAQAR MAHMOOD; MUHAMMAD USMAN GHANI

    2017-01-01

    Compute intensive programs generally consume significant fraction of execution time in a small amount of repetitive code. Such repetitive code is commonly known as hotspot code. We observed that compute intensive hotspots often possess exploitable loop level parallelism. A JIT (Just-in-Time) compiler profiles a running program to identify its hotspots. Hotspots are then translated into native code, for efficient execution. Using similar approach, we propose a methodology to identify hotspots ...

  3. Coding vs non-coding: Translatability of short ORFs found in putative non-coding transcripts.

    Science.gov (United States)

    Kageyama, Yuji; Kondo, Takefumi; Hashimoto, Yoshiko

    2011-11-01

    Genome analysis has identified a number of putative non-protein-coding transcripts that do not contain ORFs longer than 100 codons. Although evidence strongly suggests that non-coding RNAs are important in a variety of biological phenomena, the discovery of small peptide-coding mRNAs confirms that some transcripts that have been assumed to be non-coding actually have coding potential. Their abundance and importance in biological phenomena makes the sorting of non-coding RNAs from small peptide-coding mRNAs a key issue in functional genomics. However, validating the coding potential of small peptide-coding RNAs is complicated, because their ORF sequences are usually too short for computational analysis. In this review, we discuss computational and experimental methods for validating the translatability of these non-coding RNAs. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  4. Technology Infusion of CodeSonar into the Space Network Ground Segment

    Science.gov (United States)

    Benson, Markland J.

    2009-01-01

    This slide presentation reviews the applicability of CodeSonar to the Space Network software. CodeSonar is a commercial off the shelf system that analyzes programs written in C, C++ or Ada for defects in the code. Software engineers use CodeSonar results as an input to the existing source code inspection process. The study is focused on large scale software developed using formal processes. The systems studied are mission critical in nature but some use commodity computer systems.

  5. Dynamic Load-balancing and GPU Computing With the Particle-In-Cell Code PSC

    Science.gov (United States)

    Germaschewski, K.; Ruhl, H.; Raeder, J.; Bhattacharjee, A.

    2011-12-01

    We have developed a new version of the Particle Simulation Code (PSC), originally written by H. Ruhl. The new code is designed with contemporary state-of-the-art and future massively parallel high-performance computers in mind, and has extensible support for various physics modules, e.g., modeling collisions. At its core, the code uses the explicit particle-in-cell method to solve the Vlasov-Maxwell equations in 3D and in reduced dimensions. We recently developed a novel dynamic load balancing method based on space-filling curves that reduces the imbalance of a sample production run from a factor of larger than 2 to just a few percent. Graphics Processing Units (GPUs) have shown large promise in achieving substantially enhanced performance over conventional processors, but it is hard to find particle-in-cell algorithms that efficiently exploit the fine-grained parallelism provided through nvidia's CUDA programming model. We will present different algorithms and evaluate the performance achieved, with a focus on the charge-conservative current deposition step used in PSC. As an application, we numerically investigate the stability of the kinetic mirror mode, which is often observed in Earth's magnetosphere. We study the dependence of the growth rate on electron and ion pressure anisotropy.

  6. Neutronics code VALE for two-dimensional triagonal (hexagonal) and three-dimensional geometries

    Energy Technology Data Exchange (ETDEWEB)

    Vondy, D.R.; Fowler, T.B.

    1981-08-01

    This report documents the computer code VALE designed to solve multigroup neutronics problems with the diffusion theory approximation to neutron transport for a triagonal arrangement of mesh points on planes in two- and three-dimensional geometry. This code parallels the VENTURE neutronics code in the local computation system, making exposure and fuel management capabilities available. It uses and generates interface data files adopted in the cooperative effort sponsored by Reactor Physics RRT Division of the US DOE. The programming in FORTRAN is straightforward, although data is transferred in blocks between auxiliary storage devices and main core, and direct access schemes are used. The size of problems which can be handled is essentially limited only by cost of calculation since the arrays are variably dimensioned. The memory requirement is held down while data transfer during iteration is increased only as necessary with problem size. There is provision for the more common boundary conditions including the repeating boundary, 180/sup 0/ rotational symmetry, and the rotational symmetry conditions for the 30/sup 0/, 60/sup 0/, and 120/sup 0/ triangular grids on planes. A variety of types of problems may be solved: the usual neutron flux eignevalue problem, or a direct criticality search on the buckling, on a reciprocal velocity absorber (prompt mode), or on nuclide concentrations. The adjoint problem and fixed source problem may be solved, as well as the dominating higher harmonic, or the importance problem for an arbitrary fixed source.

  7. Efficient Enhancement for Spatial Scalable Video Coding Transmission

    Directory of Open Access Journals (Sweden)

    Mayada Khairy

    2017-01-01

    Full Text Available Scalable Video Coding (SVC is an international standard technique for video compression. It is an extension of H.264 Advanced Video Coding (AVC. In the encoding of video streams by SVC, it is suitable to employ the macroblock (MB mode because it affords superior coding efficiency. However, the exhaustive mode decision technique that is usually used for SVC increases the computational complexity, resulting in a longer encoding time (ET. Many other algorithms were proposed to solve this problem with imperfection of increasing transmission time (TT across the network. To minimize the ET and TT, this paper introduces four efficient algorithms based on spatial scalability. The algorithms utilize the mode-distribution correlation between the base layer (BL and enhancement layers (ELs and interpolation between the EL frames. The proposed algorithms are of two categories. Those of the first category are based on interlayer residual SVC spatial scalability. They employ two methods, namely, interlayer interpolation (ILIP and the interlayer base mode (ILBM method, and enable ET and TT savings of up to 69.3% and 83.6%, respectively. The algorithms of the second category are based on full-search SVC spatial scalability. They utilize two methods, namely, full interpolation (FIP and the full-base mode (FBM method, and enable ET and TT savings of up to 55.3% and 76.6%, respectively.

  8. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well...... as conceptions of good governance from other international organizations. While values converge, they are balanced and communicated differently, and seem to some extent to be translated into the national cultures. The set of global public values derived from this analysis include public interest, regime dignity...

  9. Synthetic histone code.

    Science.gov (United States)

    Fischle, Wolfgang; Mootz, Henning D; Schwarzer, Dirk

    2015-10-01

    Chromatin is the universal template of genetic information in all eukaryotic cells. This complex of DNA and histone proteins not only packages and organizes genomes but also regulates gene expression. A multitude of posttranslational histone modifications and their combinations are thought to constitute a code for directing distinct structural and functional states of chromatin. Methods of protein chemistry, including protein semisynthesis, amber suppression technology, and cysteine bioconjugation, have enabled the generation of so-called designer chromatin containing histones in defined and homogeneous modification states. Several of these approaches have matured from proof-of-concept studies into efficient tools and technologies for studying the biochemistry of chromatin regulation and for interrogating the histone code. We summarize pioneering experiments and recent developments in this exciting field of chemical biology. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Efficient convolutional sparse coding

    Science.gov (United States)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  11. Generating Consistent Program Tutorials

    DEFF Research Database (Denmark)

    Vestdam, Thomas

    2002-01-01

    In this paper we present a tool that supports construction of program tutorials. A program tutorial provides the reader with an understanding of an example program by interleaving fragments of source code and explaining text. An example program can for example illustrate how to use a library...... or a framework. We present a means for specifying the fragments of a program that are to be in-lined in the tutorial text. These in-line fragments are defined by addressing named syntactical elements, such as classes and methods, but it is also possible to address individual code lines by labeling them...... with source markers. The tool helps ensuring consistency between program tutorial and example programs by extracting fragments of source code based on the fragment specifications and by detecting when a program tutorial is addressing program fragments that do not exist. The program tutorials are presented...

  12. [Coding, nomenclatures, PMSI, medical records, cards with microprocessors: what coherence?].

    Science.gov (United States)

    Mennerat, F

    1996-01-01

    Computerization of information on health care delivery is being implemented in France. Within hospitals, the PMSI program aimed at coding and storing medical information on patients and their treatment has started. More recently was launched a program for computerizing outpatient care (coding and storing information on medical acts, pathologies and prescriptions). Patient individual cards with microprocessor have been implemented. The challenge ahead is how to coordinate all these processes to make them compatible, and coherent and to avoid wasteful disorders.

  13. FIFPC, a fast ion Fokker--Planck code

    Energy Technology Data Exchange (ETDEWEB)

    Fowler, R.H.; Callen, J.D.; Rome, J.A.; Smith, J.

    1976-07-01

    A computer code is described which solves the Fokker--Planck equation for the velocity space distribution of fast ions injected into a tokamak plasma. The numerical techniques are described and use of the code is outlined. The program is written in FORTRAN IV and is modularized in order to provide greater flexibility to the user. A program listing is provided and the results of sample cases are presented.

  14. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  15. Hydra Code Release

    OpenAIRE

    Couchman, H. M. P.; Pearce, F. R.; Thomas, P. A.

    1996-01-01

    Comment: A new version of the AP3M-SPH code, Hydra, is now available as a tar file from the following sites; http://coho.astro.uwo.ca/pub/hydra/hydra.html , http://star-www.maps.susx.ac.uk/~pat/hydra/hydra.html . The release now also contains a cosmological initial conditions generator, documentation, an installation guide and installation tests. A LaTex version of the documentation is included here

  16. Adaptive Hybrid Picture Coding.

    Science.gov (United States)

    1983-02-05

    process, namely displacement or motion detection and estimation. DWSPLACEENT AD MOTION Simply stated, motion is defined to be a time series of spatial...regressive model in that the prediction is made with respect to a time series . That is future values of a time series are to be predicted on...B8 - 90. Robbins, John D., and Netravali, Arun N., "Interframe Telivision Coding Using Movement Compensation," Internation Conference on

  17. Modern X86 assembly language programming 32-bit, 64-bit, SSE, and AVX

    CERN Document Server

    Kusswurm, Daniel

    2014-01-01

    Modern X86 Assembly Language Programming shows the fundamentals of x86 assembly language programming. It focuses on the aspects of the x86 instruction set that are most relevant to application software development. The book's structure and sample code are designed to help the reader quickly understand x86 assembly language programming and the computational capabilities of the x86 platform. Major topics of the book include the following: 32-bit core architecture, data types, internal registers, memory addressing modes, and the basic instruction setX87 core architecture, register stack, special

  18. Algorithmic differentiation of pragma-defined parallel regions differentiating computer programs containing OpenMP

    CERN Document Server

    Förster, Michael

    2014-01-01

    Numerical programs often use parallel programming techniques such as OpenMP to compute the program's output values as efficient as possible. In addition, derivative values of these output values with respect to certain input values play a crucial role. To achieve code that computes not only the output values simultaneously but also the derivative values, this work introduces several source-to-source transformation rules. These rules are based on a technique called algorithmic differentiation. The main focus of this work lies on the important reverse mode of algorithmic differentiation. The inh

  19. Building codes as barriers to solar heating and cooling of buildings

    Energy Technology Data Exchange (ETDEWEB)

    Meeker, F.O. III

    1978-04-01

    The application of building codes to solar energy systems for heating and cooling of buildings is discussed, using as typical codes the three model building codes most widely adopted by states and localities. Some potential barriers to solar energy systems are found, federal and state programs to deal with these barriers are discussed, and alternatives are suggested. To remedy this, a federal program is needed to encourage state adoption of standards and acceptance of certification of solar systems for code approval, and to encourage revisions to codes based on model legislation prepared for the federal government by the model codes groups.

  20. Network coding for multi-resolution multicast

    DEFF Research Database (Denmark)

    2013-01-01

    A method, apparatus and computer program product for utilizing network coding for multi-resolution multicast is presented. A network source partitions source content into a base layer and one or more refinement layers. The network source receives a respective one or more push-back messages from one...... or more network destination receivers, the push-back messages identifying the one or more refinement layers suited for each one of the one or more network destination receivers. The network source computes a network code involving the base layer and the one or more refinement layers for at least one...... of the one or more network destination receivers, and transmits the network code to the one or more network destination receivers in accordance with the push-back messages....

  1. GAPCON-THERMAL-3 code description

    Energy Technology Data Exchange (ETDEWEB)

    Lanning, D.D.; Mohr, C.L.; Panisko, F.E.; Stewart, K.B.

    1978-01-01

    GAPCON-3 is a computer program that predicts the thermal and mechanical behavior of an operating fuel rod during its normal lifetime. The code calculates temperatures, dimensions, stresses, and strains for the fuel and the cladding in both the radial and axial directions for each step of the user specified power history. The method of weighted residuals is for the steady state temperature calculation, and is combined with a finite difference approximation of the time derivative for transient conditions. The stress strain analysis employs an iterative axisymmetric finite element procedure that includes plasticity and creep for normal and pellet-clad mechanical interaction loads. GAPCON-3 can solve steady state and operational transient problems. Comparisons of GAPCON-3 predictions to both closed form analytical solutions and actual inpile instrumented fuel rod data have demonstrated the ability of the code to calculate fuel rod behavior. GAPCON-3 features a restart capability and an associated plot package unavailable in previous GAPCON series codes.

  2. Ideal MHD Stability and Characteristics of Edge Localized Modes on CFETR

    Science.gov (United States)

    Li, Zeyu; Chan, Vincent; Xu, Xueqiao; Wang, Xiaogang; Cfetr Physics Team

    2017-10-01

    Investigation on the equilibrium operation regime, its ideal magnetohydrodynamics (MHD) stability and edge localized modes (ELM) characteristics is performed for China Fusion Engineering Test Reactor (CFETR). The CFETR operation regime study starts with a baseline scenario derived from multi-code integrated modeling, with key parameters varied to build a systematic database. These parameters, under profile and pedestal constraints, provide the foundation for engineering design. The linear stabilities of low-n and intermediate-n peeling-ballooning modes for CFETR baseline scenario are analyzed. Multi-code benchmarking, including GATO, ELITE, BOUT + + and NIMROD, demonstrated good agreement in predicting instabilities. Nonlinear behavior of ELMs for the baseline scenario is simulated using BOUT + + . Instabilities are found both at the pedestal top and inside the pedestal region, which lead to a mix of grassy and type I ELMs. Pedestal structures extending inward beyond the pedestal top are also varied to study the influence on ELM characteristic. Preliminary results on the dependence of the Type-I ELM divertor heat load scaling on machine size and pedestal pressure will also be presented. Prepared by LLNL under Contract DE-AC52-07NA27344 and National Magnetic Confinement Fusion Research Program of China (Grant No. 2014GB110003 and 2014GB107004).

  3. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  4. Edge-based intramode selection for depth-map coding in 3D-HEVC.

    Science.gov (United States)

    Park, Chun-Su

    2015-01-01

    The 3D video extension of High Efficiency Video Coding (3D-HEVC) is the state-of-the-art video coding standard for the compression of the multiview video plus depth format. In the 3D-HEVC design, new depth-modeling modes (DMMs) are utilized together with the existing intraprediction modes for depth intracoding. The DMMs can provide more accurate prediction signals and thereby achieve better compression efficiency. However, testing the DMMs in the intramode decision process causes a drastic increase in the computational complexity. In this paper, we propose a fast mode decision algorithm for depth intracoding. The proposed algorithm first performs a simple edge classification in the Hadamard transform domain. Then, based on the edge classification results, the proposed algorithm selectively omits unnecessary DMMs in the mode decision process. Experimental results demonstrate that the proposed algorithm speeds up the mode decision process by up to 37.65% with negligible loss of coding efficiency.

  5. Vibration modes and frequencies of structures

    Science.gov (United States)

    Durling, R. J.; Kvaternik, R. G.

    1980-01-01

    SUDAN, Substructuring in Direct Analysis, analyzes natural modes and frequencies of vibration of structural systems. Based on direct method of analysis that employs substructures methodology, program is used with structures that may be represented as equivalent system of beam, springs, and rigid bodies.

  6. New tools to analyze overlapping coding regions.

    Science.gov (United States)

    Bayegan, Amir H; Garcia-Martin, Juan Antonio; Clote, Peter

    2016-12-13

    Retroviruses transcribe messenger RNA for the overlapping Gag and Gag-Pol polyproteins, by using a programmed -1 ribosomal frameshift which requires a slippery sequence and an immediate downstream stem-loop secondary structure, together called frameshift stimulating signal (FSS). It follows that the molecular evolution of this genomic region of HIV-1 is highly constrained, since the retroviral genome must contain a slippery sequence (sequence constraint), code appropriate peptides in reading frames 0 and 1 (coding requirements), and form a thermodynamically stable stem-loop secondary structure (structure requirement). We describe a unique computational tool, RNAsampleCDS, designed to compute the number of RNA sequences that code two (or more) peptides p,q in overlapping reading frames, that are identical (or have BLOSUM/PAM similarity that exceeds a user-specified value) to the input peptides p,q. RNAsampleCDS then samples a user-specified number of messenger RNAs that code such peptides; alternatively, RNAsampleCDS can exactly compute the position-specific scoring matrix and codon usage bias for all such RNA sequences. Our software allows the user to stipulate overlapping coding requirements for all 6 possible reading frames simultaneously, even allowing IUPAC constraints on RNA sequences and fixing GC-content. We generalize the notion of codon preference index (CPI) to overlapping reading frames, and use RNAsampleCDS to generate control sequences required in the computation of CPI. Moreover, by applying RNAsampleCDS, we are able to quantify the extent to which the overlapping coding requirement in HIV-1 [resp. HCV] contribute to the formation of the stem-loop [resp. double stem-loop] secondary structure known as the frameshift stimulating signal. Using our software, we confirm that certain experimentally determined deleterious HCV mutations occur in positions for which our software RNAsampleCDS and RNAiFold both indicate a single possible nucleotide. We

  7. On Some Ternary LCD Codes

    OpenAIRE

    Darkunde, Nitin S.; Patil, Arunkumar R.

    2018-01-01

    The main aim of this paper is to study $LCD$ codes. Linear code with complementary dual($LCD$) are those codes which have their intersection with their dual code as $\\{0\\}$. In this paper we will give rather alternative proof of Massey's theorem\\cite{8}, which is one of the most important characterization of $LCD$ codes. Let $LCD[n,k]_3$ denote the maximum of possible values of $d$ among $[n,k,d]$ ternary $LCD$ codes. In \\cite{4}, authors have given upper bound on $LCD[n,k]_2$ and extended th...

  8. Design of convolutional tornado code

    Science.gov (United States)

    Zhou, Hui; Yang, Yao; Gao, Hongmin; Tan, Lu

    2017-09-01

    As a linear block code, the traditional tornado (tTN) code is inefficient in burst-erasure environment and its multi-level structure may lead to high encoding/decoding complexity. This paper presents a convolutional tornado (cTN) code which is able to improve the burst-erasure protection capability by applying the convolution property to the tTN code, and reduce computational complexity by abrogating the multi-level structure. The simulation results show that cTN code can provide a better packet loss protection performance with lower computation complexity than tTN code.

  9. Allele coding in genomic evaluation

    DEFF Research Database (Denmark)

    Standen, Ismo; Christensen, Ole Fredslund

    2011-01-01

    this centered allele coding. This study considered effects of different allele coding methods on inference. Both marker-based and equivalent models were considered, and restricted maximum likelihood and Bayesian methods were used in inference. \\paragraph*{Results:} Theoretical derivations showed that parameter...... coding methods imply different models. Finally, allele coding affects the mixing of Markov chain Monte Carlo algorithms, with the centered coding being the best. \\paragraph*{Conclusions:} Different allele coding methods lead to the same inference in the marker-based and equivalent models when a fixed...

  10. Polynomial weights and code constructions.

    Science.gov (United States)

    Massey, J. L.; Costello, D. J., Jr.; Justesen, J.

    1973-01-01

    Study of certain polynomials with the 'weight-retaining' property that any linear combination of these polynomials with coefficients in a general finite field has Hamming weight at least as great as that of the minimum-degree polynomial included. This fundamental property is used in applications to Reed-Muller codes, a new class of 'repeated-root' binary cyclic codes, two new classes of binary convolutional codes derived from binary cyclic codes, and two new classes of binary convolutional codes derived from Reed-Solomon codes.

  11. Delamination of Composite Laminate Plate by Sliding Load Mode

    Directory of Open Access Journals (Sweden)

    Kormaníková Eva

    2017-06-01

    Full Text Available The paper presents the mixed-mode delamination response of laminate plate made of two sublaminates. To this purpose a sliding load mode of delamination is proposed as failure model. A quasistatic rate-independent delamination problem of laminate plates with a finite thickness is considered. A rate-independent delamination model for a laminated Kirchhoff-Love plate is obtained. The failure model is implemented in ANSYS code to calculate the mixed-mode delamination response as energy release rate along the lamination front.

  12. Seismic diagnosis from gravity modes strongly affected by rotation

    Science.gov (United States)

    Prat, Vincent; Mathis, Stéphane; Lignières, François; Ballot, Jérôme; Culpin, Pierre-Marie

    2017-10-01

    Most of the information we have about the internal rotation of stars comes from modes that are weakly affected by rotation, for example by using rotational splittings. In contrast, we present here a method, based on the asymptotic theory of Prat et al. (2016), which allows us to analyse the signature of rotation where its effect is the most important, that is in low-frequency gravity modes that are strongly affected by rotation. For such modes, we predict two spectral patterns that could be confronted to observed spectra and those computed using fully two-dimensional oscillation codes.

  13. Construction of new quantum MDS codes derived from constacyclic codes

    Science.gov (United States)

    Taneja, Divya; Gupta, Manish; Narula, Rajesh; Bhullar, Jaskaran

    Obtaining quantum maximum distance separable (MDS) codes from dual containing classical constacyclic codes using Hermitian construction have paved a path to undertake the challenges related to such constructions. Using the same technique, some new parameters of quantum MDS codes have been constructed here. One set of parameters obtained in this paper has achieved much larger distance than work done earlier. The remaining constructed parameters of quantum MDS codes have large minimum distance and were not explored yet.

  14. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes.......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  15. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K......Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  16. New Code Matched Interleaver for Turbo Codes with Short Frames

    Directory of Open Access Journals (Sweden)

    LAZAR, G. A.

    2010-02-01

    Full Text Available Turbo codes are a parallel concatenation of two or more convolutional codes, separated by interleavers, therefore their performance is not influenced just by the constituent encoders, but also by the interleaver. For short frame turbo codes, the selection of a proper interleaver becomes critical. This paper presents a new algorithm of obtaining a code matched interleaver leading to a very high minimum distance and improved performance.

  17. Flexible Animation Computer Program

    Science.gov (United States)

    Stallcup, Scott S.

    1990-01-01

    FLEXAN (Flexible Animation), computer program animating structural dynamics on Evans and Sutherland PS300-series graphics workstation with VAX/VMS host computer. Typical application is animation of spacecraft undergoing structural stresses caused by thermal and vibrational effects. Displays distortions in shape of spacecraft. Program displays single natural mode of vibration, mode history, or any general deformation of flexible structure. Written in FORTRAN 77.

  18. Development of platform to compare different wall heat transfer packages for system analysis codes

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Min-Gil; Lee, Won Woong; Lee, Jeong Ik [KAIST, Daejeon (Korea, Republic of); Shin, Sung Gil [Hanyang University, Seoul (Korea, Republic of)

    2016-10-15

    System thermal hydraulic (STH) analysis code is used for analyzing and evaluating the safety of a designed nuclear system. The system thermal hydraulic analysis code typically solves mass, momentum and energy conservation equations for multiple phases with sets of selected empirical constitutive equations to close the problem. Several STH codes are utilized in academia, industry and regulators, such as MARS-KS, SPACE, RELAP5, COBRA-TF, TRACE, and so on. Each system thermal hydraulic code consists of different sets of governing equations and correlations. However, the packages and sets of correlations of each code are not compared quantitatively yet. Wall heat transfer mode transition maps of SPACE and MARS-KS have a little difference for the transition from wall nucleate heat transfer mode to wall film heat transfer mode. Both codes have the same heat transfer packages and correlations in most region except for wall film heat transfer mode. Most of heat transfer coefficients calculated for the range of selected variables of SPACE are the same with those of MARS-KS. For the intervals between 500K and 540K of wall temperature, MARS-KS selects the wall film heat transfer mode and Bromley correlation but SPACE select the wall nucleate heat transfer mode and Chen correlation. This is because the transition from nucleate boiling to film boiling of MARS-KS is earlier than SPACE. More detailed analysis of the heat transfer package and flow regime package will be followed in the near future.

  19. Static Code Analysis with Gitlab-CI

    CERN Document Server

    Datko, Szymon Tomasz

    2016-01-01

    Static Code Analysis is a simple but efficient way to ensure that application’s source code is free from known flaws and security vulnerabilities. Although such analysis tools are often coming with more advanced code editors, there are a lot of people who prefer less complicated environments. The easiest solution would involve education – where to get and how to use the aforementioned tools. However, counting on the manual usage of such tools still does not guarantee their actual usage. On the other hand, reducing the required effort, according to the idea “setup once, use anytime without sweat” seems like a more promising approach. In this paper, the approach to automate code scanning, within the existing CERN’s Gitlab installation, is described. For realization of that project, the Gitlab-CI service (the “CI” stands for "Continuous Integration"), with Docker assistance, was employed to provide a variety of static code analysers for different programming languages. This document covers the gene...

  20. Computer codes for beam dynamics analysis of cyclotronlike accelerators

    Science.gov (United States)

    Smirnov, V.

    2017-12-01

    Computer codes suitable for the study of beam dynamics in cyclotronlike (classical and isochronous cyclotrons, synchrocyclotrons, and fixed field alternating gradient) accelerators are reviewed. Computer modeling of cyclotron segments, such as the central zone, acceleration region, and extraction system is considered. The author does not claim to give a full and detailed description of the methods and algorithms used in the codes. Special attention is paid to the codes already proven and confirmed at the existing accelerating facilities. The description of the programs prepared in the worldwide known accelerator centers is provided. The basic features of the programs available to users and limitations of their applicability are described.