WorldWideScience

Sample records for public domain code

  1. Fast resolution of the neutron diffusion equation through public domain Ode codes

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, V.M.; Vidal, V.; Garayoa, J. [Universidad Politecnica de Valencia, Departamento de Sistemas Informaticos, Valencia (Spain); Verdu, G. [Universidad Politecnica de Valencia, Departamento de Ingenieria Quimica y Nuclear, Valencia (Spain); Gomez, R. [I.E.S. de Tavernes Blanques, Valencia (Spain)

    2003-07-01

    The time-dependent neutron diffusion equation is a partial differential equation with source terms. The resolution method usually includes discretizing the spatial domain, obtaining a large system of linear, stiff ordinary differential equations (ODEs), whose resolution is computationally very expensive. Some standard techniques use a fixed time step to solve the ODE system. This can result in errors (if the time step is too large) or in long computing times (if the time step is too little). To speed up the resolution method, two well-known public domain codes have been selected: DASPK and FCVODE that are powerful codes for the resolution of large systems of stiff ODEs. These codes can estimate the error after each time step, and, depending on this estimation can decide which is the new time step and, possibly, which is the integration method to be used in the next step. With these mechanisms, it is possible to keep the overall error below the chosen tolerances, and, when the system behaves smoothly, to take large time steps increasing the execution speed. In this paper we address the use of the public domain codes DASPK and FCVODE for the resolution of the time-dependent neutron diffusion equation. The efficiency of these codes depends largely on the preconditioning of the big systems of linear equations that must be solved. Several pre-conditioners have been programmed and tested; it was found that the multigrid method is the best of the pre-conditioners tested. Also, it has been found that DASPK has performed better than FCVODE, being more robust for our problem.We can conclude that the use of specialized codes for solving large systems of ODEs can reduce drastically the computational work needed for the solution; and combining them with appropriate pre-conditioners, the reduction can be still more important. It has other crucial advantages, since it allows the user to specify the allowed error, which cannot be done in fixed step implementations; this, of course

  2. A high-order public domain code for direct numerical simulations of turbulent combustion

    CERN Document Server

    Babkovskaia, N; Brandenburg, A

    2010-01-01

    A high-order scheme for direct numerical simulations of turbulent combustion is discussed. Its implementation in the massively parallel and publicly available Pencil Code is validated with the focus on hydrogen combustion. Ignition delay times (0D) and laminar flame velocities (1D) are calculated and compared with results from the commercially available Chemkin code. The scheme is verified to be fifth order in space. Upon doubling the resolution, a 32-fold increase in the accuracy of the flame front is demonstrated. Finally, also turbulent and spherical flame front velocities are calculated and the implementation of the non-reflecting so-called Navier-Stokes Characteristic Boundary Condition is validated in all three directions.

  3. Production of radioactive phantoms using a standard inkjet printer and the public domain multi-printing code GENIA.

    Science.gov (United States)

    Scafè, R; Auer, P; Bennati, P; La Porta, L; Pisacane, F; Cinti, M N; Pellegrini, R; De Vincentis, G; Conte, G; Pani, R

    2011-10-01

    The public domain code GENIA, based on multi-printing method for producing surface sources with appropriate radioactivity, is described. The conventional technique, running on standard inkjet printer with radio-marked ink filling, is improved by repeating elementary printing commands in the same band. Well outlined sources with adjustable radioactivity can be obtained without refilling. The intrinsic limitation of printable radioactivity, depending on the value available at nozzles at printing time, was overcome. In addition the method permits the accurate calibration of the amount of activity released onto the paper.

  4. PUBLIC DOMAIN PROTECTION. USES AND REUSES OF PUBLIC DOMAIN WORKS

    OpenAIRE

    Monica Adriana LUPAȘCU

    2015-01-01

    This study tries to highlight the necessity of an awareness of the right of access to the public domain, particularly using the example of works whose protection period has expired, as well as the ones which the law considers to be excluded from protection. Such works are used not only by large libraries from around the world, but also by rights holders, via different means of use, including incorporations into original works or adaptations. However, the reuse that follows these uses often on...

  5. A Pixel Domain Video Coding based on Turbo code and Arithmetic code

    Directory of Open Access Journals (Sweden)

    Cyrine Lahsini

    2012-05-01

    Full Text Available In recent years, with emerging applications such as multimedia sensors networks, wirelesslow-power surveillance and mobile camera phones, the traditional video coding architecture in beingchallenged. In fact, these applications have different requirements than those of the broadcast videodelivery systems: a low power consumption at the encoder side is essential.In this context, we propose a pixel-domain video coding scheme which fits well in these senarios.In this system, both the arithmetic and turbo codes are used to encode the video sequence's frames.Simulations results show significant gains over Pixel-domain Wyner-Ziv video codeingr.

  6. Evaluation Codes from Order Domain Theory

    DEFF Research Database (Denmark)

    Andersen, Henning Ejnar; Geil, Hans Olav

    2008-01-01

    bound is easily extended to deal with any generalized Hamming weights. We interpret our methods into the setting of order domain theory. In this way we fill in an obvious gap in the theory of order domains. [28] T. Shibuya and K. Sakaniwa, A Dual of Well-Behaving Type Designed Minimum Distance, IEICE...

  7. Generalized Sudan's List Decoding for Order Domain Codes

    DEFF Research Database (Denmark)

    Geil, Hans Olav; Matsumoto, Ryutaroh

    2007-01-01

    We generalize Sudan's list decoding algorithm without multiplicity to evaluation codes coming from arbitrary order domains. The number of correctable errors by the proposed method is larger than the original list decoding without multiplicity.......We generalize Sudan's list decoding algorithm without multiplicity to evaluation codes coming from arbitrary order domains. The number of correctable errors by the proposed method is larger than the original list decoding without multiplicity....

  8. Generalized Sudan's List Decoding for Order Domain Codes

    DEFF Research Database (Denmark)

    Geil, Hans Olav; Matsumoto, Ryutaroh

    2007-01-01

    We generalize Sudan's list decoding algorithm without multiplicity to evaluation codes coming from arbitrary order domains. The number of correctable errors by the proposed method is larger than the original list decoding without multiplicity.......We generalize Sudan's list decoding algorithm without multiplicity to evaluation codes coming from arbitrary order domains. The number of correctable errors by the proposed method is larger than the original list decoding without multiplicity....

  9. Central Decoding for Multiple Description Codes based on Domain Partitioning

    Directory of Open Access Journals (Sweden)

    M. Spiertz

    2006-01-01

    Full Text Available Multiple Description Codes (MDC can be used to trade redundancy against packet loss resistance for transmitting data over lossy diversity networks. In this work we focus on MD transform coding based on domain partitioning. Compared to Vaishampayan’s quantizer based MDC, domain based MD coding is a simple approach for generating different descriptions, by using different quantizers for each description. Commonly, only the highest rate quantizer is used for reconstruction. In this paper we investigate the benefit of using the lower rate quantizers to enhance the reconstruction quality at decoder side. The comparison is done on artificial source data and on image data. 

  10. Scalable-to-lossless transform domain distributed video coding

    DEFF Research Database (Denmark)

    Huang, Xin; Ukhanova, Ann; Veselov, Anton;

    2010-01-01

    Distributed video coding (DVC) is a novel approach providing new features as low complexity encoding by mainly exploiting the source statistics at the decoder based on the availability of decoder side information. In this paper, scalable-tolossless DVC is presented based on extending a lossy...... TransformDomain Wyner-Ziv (TDWZ) distributed video codec with feedback.The lossless coding is obtained by using a reversible integer DCT.Experimental results show that the performance of the proposed scalable-to-lossless TDWZ video codec can outperform alternatives based on the JPEG 2000 standard. The TDWZ...... codec provides frame by frame encoding. Comparing the lossless coding efficiency, the proposed scalable-to-lossless TDWZ video codec can save up to 5%-13% bits compared to JPEG LS and H.264 Intra frame lossless coding and do so as a scalable-to-lossless coding....

  11. Agents unleashed a public domain look at agent technology

    CERN Document Server

    Wayner, Peter

    1995-01-01

    Agents Unleashed: A Public Domain Look at Agent Technology covers details of building a secure agent realm. The book discusses the technology for creating seamlessly integrated networks that allow programs to move from machine to machine without leaving a trail of havoc; as well as the technical details of how an agent will move through the network, prove its identity, and execute its code without endangering the host. The text also describes the organization of the host's work processing an agent; error messages, bad agent expulsion, and errors in XLISP-agents; and the simulators of errors, f

  12. Cultural Heritage and the Public Domain

    Directory of Open Access Journals (Sweden)

    Bas Savenije

    2012-09-01

    by providing their resources on the Internet” (Berlin Declaration 2003. Therefore, in the spirit of the Berlin Declaration, the ARL encourages its members’ libraries to grant all non-commercial users “a free, irrevocable, worldwide, right of access to, and a license to copy, use, distribute, transmit and display the work publicly and to make and distribute derivative works, in any digital medium for any responsible purpose, subject to proper attribution of authorship”. And: “If fees are to be assessed for the use of digitised public domain works, those fees should only apply to commercial uses” (ARL Principles July 2010. In our view, cultural heritage institutions should make public domain material digitised with public funding as widely available as possible for access and reuse. The public sector has the primary responsibility to fund digitisation. The involvement of private partners, however, is encouraged by ARL as well as the Comité des Sages. Private funding for digitisation is a complement to the necessary public investment, especially in times of economic crisis, but should not be seen as a substitute for public funding. As we can see from these reports there are a number of arguments in favour of digitisation and also of providing maximum accessibility to the digitised cultural heritage. In this paper we will investigate the legal aspects of digitisation of cultural heritage, especially public domain material. On the basis of these we will make an inventory of policy considerations regarding reuse. Furthermore, we will describe the conclusions the National Library of the Netherlands (hereafter: KB has formulated and the arguments that support these. In this context we will review public-private partnerships and also the policy of the KB. We will conclude with recommendations for cultural heritage institutions concerning a reuse policy for digitised public domain material.

  13. Enforcement Dilemma: Voluntary Nature of Public Relations Codes.

    Science.gov (United States)

    Wright, Donald K.

    1993-01-01

    Argues that, although valuable, ethical codes in public relations are unenforceable. Suggests that, with or without professional codes of conduct, most people who practice public relations will choose to be ethical because they believe in themselves and want others to respect them. (SR)

  14. Preserving the positive functions of the public domain in science

    Directory of Open Access Journals (Sweden)

    Pamela Samuelson

    2003-11-01

    Full Text Available Science has advanced in part because data and scientific methodologies have traditionally not been subject to intellectual property protection. In recent years, intellectual property has played a greater role in scientific work. While intellectual property rights may have a positive role to play in some fields of science, so does the public domain. This paper will discuss some of the positive functions of the public domain and ways in which certain legal developments may negatively impact the public domain. It suggests some steps that scientists can take to preserve the positive functions of the public domain for science.

  15. Student Dress Codes in Public Schools: A Selective Annotated Bibliography

    National Research Council Canada - National Science Library

    Joan Pedzich

    2002-01-01

    P1 In an attempt to curb the rising presence of gangs in public schools and to reduce disciplinary conflicts, officials in school districts across the United States are implementing dress codes or introducing uniforms...

  16. The DTFE public software: The Delaunay Tessellation Field Estimator code

    NARCIS (Netherlands)

    Cautun, Marius C.; van de Weygaert, Rien

    2011-01-01

    We present the DTFE public software, a code for reconstructing fields from a discrete set of samples/measurements using the maximum of information contained in the point distribution. The code is written in C++ using the CGAL library and is parallelized using OpenMP. The software was designed for th

  17. The DTFE public software : The Delaunay Tessellation Field Estimator code

    NARCIS (Netherlands)

    Cautun, Marius C.; van de Weygaert, Rien

    2011-01-01

    We present the DTFE public software, a code for reconstructing fields from a discrete set of samples/measurements using the maximum of information contained in the point distribution. The code is written in C++ using the CGAL library and is parallelized using OpenMP. The software was designed for th

  18. THE PUBLIC DEFENDER OFFICE IN THE NEW CIVIL PROCEDURE CODE

    Directory of Open Access Journals (Sweden)

    Renan Barros dos Reis

    2015-12-01

    Full Text Available It is objective and descriptive study about the main forecasts of the New Code of Civil Procedure on the Public Defender Office, as well as their influences and consequences in the work of the Public Defender in the civil lawsuit. Starting from the analysis of the Public Defender Office as essential to justice institution with the task of promoting the rights of the needy, the study is to discuss the importance of the institution as a subject standalone process, its function as a special curator, as well as systematize the prerogatives and responsibilities of Public Defender in the New Code of Civil Procedure

  19. The Definition, Dimensions, and Domain of Public Relations.

    Science.gov (United States)

    Hutton, James G.

    1999-01-01

    Discusses how the field of public relations has left itself vulnerable to other fields that are making inroads into public relations' traditional domain, and to critics who are filling in their own definitions of public relations. Proposes a definition and a three-dimensional framework to compare competing philosophies of public relations and to…

  20. Coded Statutory Data Sets for Evaluation of Public Health Law

    Science.gov (United States)

    Costich, Julia Field

    2012-01-01

    Background and objectives: The evaluation of public health law requires reliable accounts of underlying statutes and regulations. States often enact public health-related statutes with nonuniform provisions, and variation in the structure of state legal codes can foster inaccuracy in evaluating the impact of specific categories of law. The optimal…

  1. Privacy with Public Access: Digital Memorials on QR Codes

    DEFF Research Database (Denmark)

    Gotved, Stine

    2015-01-01

    takes the departure in gravestones with QR-codes; objects at once physical and digital, underhandedly putting presumably private content within public reach. A plethora of issues of privacy and publicness are at play within the study's two connected but rather different empirical spaces: the physical...... in the borderland between private and public is exemplified, and with the presentation, we are ensuring a continued discussion on privacy as well as legacy in our digital society....

  2. Code domains in tandem repetitive DNA sequence structures.

    Science.gov (United States)

    Vogt, P

    1992-10-01

    Traditionally, many people doing research in molecular biology attribute coding properties to a given DNA sequence if this sequence contains an open reading frame for translation into a sequence of amino acids. This protein coding capability of DNA was detected about 30 years ago. The underlying genetic code is highly conserved and present in every biological species studied so far. Today, it is obvious that DNA has a much larger coding potential for other important tasks. Apart from coding for specific RNA molecules such as rRNA, snRNA and tRNA molecules, specific structural and sequence patterns of the DNA chain itself express distinct codes for the regulation and expression of its genetic activity. A chromatin code has been defined for phasing of the histone-octamer protein complex in the nucleosome. A translation frame code has been shown to exist that determines correct triplet counting at the ribosome during protein synthesis. A loop code seems to organize the single stranded interaction of the nascent RNA chain with proteins during the splicing process, and a splicing code phases successive 5' and 3' splicing sites. Most of these DNA codes are not exclusively based on the primary DNA sequence itself, but also seem to include specific features of the corresponding higher order structures. Based on the view that these various DNA codes are genetically instructive for specific molecular interactions or processes, important in the nucleus during interphase and during cell division, the coding capability of tandem repetitive DNA sequences has recently been reconsidered.

  3. Cross-band noise model refinement for transform domain Wyner–Ziv video coding

    DEFF Research Database (Denmark)

    Huang, Xin; Forchhammer, Søren

    2012-01-01

    Distributed Video Coding (DVC) is a new video coding paradigm, which mainly exploits the source statistics at the decoder based on the availability of decoder side information. One approach to DVC is feedback channel based Transform Domain Wyner–Ziv (TDWZ) video coding. The efficiency of current ...

  4. Transform domain Wyner-Ziv video coding with refinement of noise residue and side information

    DEFF Research Database (Denmark)

    Huang, Xin; Forchhammer, Søren

    2010-01-01

    Distributed Video Coding (DVC) is a video coding paradigm which mainly exploits the source statistics at the decoder based on the availability of side information at the decoder. This paper considers feedback channel based Transform Domain Wyner-Ziv (TDWZ) DVC. The coding efficiency of TDWZ video...

  5. The missing evaluation codes from order domain theory

    DEFF Research Database (Denmark)

    Andersen, Henning Ejnar; Geil, Olav

    The Feng-Rao bound gives a lower bound on the minimum distance of codes defined by means of their parity check matrices. From the Feng-Rao bound it is clear how to improve a large family of codes by leaving out certain rows in their parity check matrices. In this paper we derive a simple lower...... bound on the minimum distance of codes defined by means of their generator matrices. From our bound it is clear how to improve a large family of codes by adding certain rows to their generator matrices. Actually our result not only deals with the minimum distance but gives lower bounds on any...

  6. Privacy with Public Access: Digital Memorials on QR Codes

    DEFF Research Database (Denmark)

    Gotved, Stine

    2015-01-01

    Digital memorials are part of a bigger picture of changing rituals for mourning, remembrance, and legacy. However, the focus of this presentation is how digital memorials perforate the (already uneasy) distinction between private and public, both in physical and emotional space. The ongoing study...... takes the departure in gravestones with QR-codes; objects at once physical and digital, underhandedly putting presumably private content within public reach. A plethora of issues of privacy and publicness are at play within the study's two connected but rather different empirical spaces: the physical...

  7. Compressed Domain Packet Loss Concealment of Sinusoidally Coded Speech

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Christensen, Mads Græsbøll; Andersen, Søren Vang

    2003-01-01

    We consider the problem of packet loss concealment for voice over IP (VoIP). The speech signal is compressed at the transmitter using a sinusoidal coding scheme working at 8 kbit/s. At the receiver, packet loss concealment is carried out working directly on the quantized sinusoidal parameters......, based on time-scaling of the packets surrounding the missing ones. Subjective listening tests show promising results indicating the potential of sinusoidal speech coding for VoIP....

  8. Coded optical time domain reflectometry: principle and applications

    Science.gov (United States)

    Park, Namkyoo; Lee, Jeonghwan; Park, Jonghan; Shim, Jae Gwang; Yoon, Hosung; Kim, Jin Hee; Kim, Kyoungmin; Byun, Jae-Oh; Bolognini, Gabriele; Lee, Duckey; Di Pasquale, Fabrizio

    2007-11-01

    In this paper, we will briefly outline our contributions for the physical realization of coded OTDR, along with its principles and also highlight recent key results related with its applications. For the communication network application, we report a multi-port / multi-wavelength, high-speed supervisory system for the in-service monitoring of a bidirectional WDM-PON system transmission line up to 16 ports x 32 nodes (512 users) capacity. Monitoring of individual branch traces up to 60 km was achieved with the application of a 127-bit simplex code, corresponding to a 7.5dB SNR coding gain effectively reducing the measurement time about 30 times when compared to conventional average mode OTDR. Transmission experiments showed negligible penalty from the monitoring system to the transmission signal quality, at a 2.5Gbps / 125Mbps (down / up stream) data rate. As an application to sensor network, a Raman scattering based coded-OTDR distributed temperature sensor system will be presented. Utilizing a 255-bit Simplex coded OTDR together with optimized sensing link (composed of cascaded fibers with different Raman coefficients), significant enhancement in the interrogation distance (19.5km from coding gain, and 9.6km from link-combination optimization) was achieved to result a total sensing range of 37km (at 17m/3K spatial/temperature resolution), employing a conventional off-shelf low power (80mW) laser diode.

  9. Honoring Native American Code Talkers: The Road to the Code Talkers Recognition Act of 2008 (Public Law 110-420)

    Science.gov (United States)

    Meadows, William C.

    2011-01-01

    Interest in North American Indian code talkers continues to increase. In addition to numerous works about the Navajo code talkers, several publications on other groups of Native American code talkers--including the Choctaw, Comanche, Hopi, Meskwaki, Canadian Cree--and about code talkers in general have appeared. This article chronicles recent…

  10. New MoM code incorporating multiple domain basis functions

    CSIR Research Space (South Africa)

    Lysko, AA

    2011-08-01

    Full Text Available . A. Lysko, A Method of Operating a Computing Device to Perform Memoization, PCT Patent Application No PCT/IB2009/055650, 2009. 11. M. Donald, "Memo Functions and Machine Learning," Nature, No. 218, 1968, pp. 19-22. 12. A. A. Lysko, Cache... to support financial sustainability for their providers. A particular problem is that the run times for specialized structures, including curved or corrugated elements, may be unnecessarily long due to the inability of the codes to support such structures...

  11. Molecular codes defining rostrocaudal domains in the embryonic mouse hypothalamus

    Directory of Open Access Journals (Sweden)

    José L E Ferran

    2015-04-01

    Full Text Available The prosomeric model proposes that the hypothalamus is a rostral forebrain entity, placed ventral to the telencephalon and rostral to the diencephalon. Gene expression markers differentially label molecularly distinct dorsoventral progenitor domains, which represent continuous longitudinal bands across the hypothalamic alar and basal regions. There is also circumstantial support for a rostrocaudal subdivision of the hypothalamus into transverse peduncular (caudal and terminal (rostral territories (PHy, THy. In addition, there is evidence for a specialized acroterminal domain at the rostral midline of the terminal hypothalamus (ATD. The PHy and THy transverse structural units are presently held to form part of two hypothalamo-telencephalic prosomeres (hp1 and hp2, respectively, which end dorsally at the telencephalic septocommissural roof. PHy and THy have distinct adult nuclei, at all dorsoventral levels. Here we report the results of data mining from the Allen Developing Mouse Brain Atlas database, looking for genes expressed differentially in the PHy, THy and ATD regions of the hypothalamus at several developmental stages. This search allowed us to identify additional molecular evidence supporting the postulated fundamental rostrocaudal bipartition of the mouse hypothalamus into the PHy and THy, and also corroborated molecularly the singularity of the ATD. A number of markers were expressed in Thy (Fgf15, Gsc, Nkx6.2, Otx1, Zic1/5, but were absent in PHy, while other genes showed the converse pattern (Erbb4, Irx1/3/5, Lmo4, Mfap4, Plagl1, Pmch. We also identified markers that selectively label the ATD (Fgf8/10/18, Otx2, Pomc, Rax, Six6. On the whole, these data help to explain why, irrespective of the observed continuity of all dorsoventral molecular hypothalamic subdivisions across PHy and THy, different nuclear structures originate within each of these two domains, and also why singular structures arise at the ATD, e.g., the suprachiasmatic

  12. Development and Initial Validation of Public Domain Basic Interest Markers

    Science.gov (United States)

    Liao, Hsin-Ya; Armstrong, Patrick Ian; Rounds, James

    2008-01-01

    Goldberg (Goldberg, L. R. (1999). "A broad-bandwidth, public-domain, personality inventory measuring the lower-level facets of several five-factor models." In: I. Mervielde, I. Deary, F. De Fruyt, & F. Ostendorf (Eds.), "Personality psychology in Europe" (Vol. 7, pp. 7-28). Tilburg, The Netherlands: Tilburg University Press) has argued that the…

  13. Domain-specific modeling enabling full code generation

    CERN Document Server

    Kelly, Steven

    2007-01-01

    Domain-Specific Modeling (DSM) is the latest approach tosoftware development, promising to greatly increase the speed andease of software creation. Early adopters of DSM have been enjoyingproductivity increases of 500–1000% in production for over adecade. This book introduces DSM and offers examples from variousfields to illustrate to experienced developers how DSM can improvesoftware development in their teams. Two authorities in the field explain what DSM is, why it works,and how to successfully create and use a DSM solution to improveproductivity and quality. Divided into four parts, the book covers:background and motivation; fundamentals; in-depth examples; andcreating DSM solutions. There is an emphasis throughout the book onpractical guidelines for implementing DSM, including how toidentify the nece sary language constructs, how to generate fullcode from models, and how to provide tool support for a new DSMlanguage. The example cases described in the book are available thebook's Website, www.dsmbook....

  14. DCT domain filtering method for multi-antenna code acquisition

    Institute of Scientific and Technical Information of China (English)

    Xiaojie Li; Luping Xu; Shibin Song; Hua Zhang

    2013-01-01

    For global navigation satel ite system (GNSS) signals in Gaussian and Rayleigh fading channel, a novel signal detection al-gorithm is proposed. Under the low frequency uncertainty case, af-ter performing discrete cosine transform (DCT) to the outputs of the partial matched filter (PMF) for every antenna, the high order com-ponents in the transforming domain wil be filtered, then the equal-gain (EG) combination for the inverse discrete cosine transform (IDCT) reconstructed signal would be done subsequently. Thus, due to the different frequency distribution characteristics between the noise and signals, after EG combination, the energy of signals has almost no loss and the noise energy is greatly reduced. The theoretical analysis and simulation results show that the detection algorithm can effectively improve the signal-to-noise ratio of the captured signal and increase the probability of detection under the same false alarm probability. In addition, it should be pointed out that this method can also be applied to Rayleigh fading channels with moving antenna.

  15. Trellis-coded quantization for public-key steganography

    CERN Document Server

    Guelvouit, Gaëtan Le

    2008-01-01

    This paper deals with public-key steganography in the presence of a passive warden. The aim is to hide secret messages within cover-documents without making the warden suspicious, and without any preliminar secret key sharing. Whereas a practical attempt has been already done to provide a solution to this problem, it suffers of poor flexibility (since embedding and decoding steps highly depend on cover-signals statistics) and of little capacity compared to recent data hiding techniques. Using the same framework, this paper explores the use of trellis-coded quantization techniques (TCQ and turbo TCQ) to design a more efficient public-key scheme. Experiments on audio signals show great improvements considering Cachin's security criterion.

  16. Copyright and the Value of the Public Domain

    OpenAIRE

    Erickson, Kristofer; Heald, Paul; Homberg, Fabian; Kretschmer, Martin; Mendis, Dinusha

    2015-01-01

    This research report documents the results of a year-long knowledge exchange initiative undertaken between the Intellectual Property Office, researchers at the University of Glasgow CREATe Centre, and more than two dozen UK businesses and innovators, to explore how value is generated from the public domain. The study was supported by the Economic and Social Research Council (ESRC) and the Intellectual Property Office (IPO). The core research team consisted of Dr. Kristofer Erickson (Lord Kelv...

  17. Mutiple LDPC Decoding using Bitplane Correlation for Transform Domain Wyner-Ziv Video Coding

    DEFF Research Database (Denmark)

    Luong, Huynh Van; Huang, Xin; Forchhammer, Søren

    2011-01-01

    Distributed video coding (DVC) is an emerging video coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. This paper considers a Low Density Parity Check (LDPC) based Transform Domain Wyner-Ziv (TDWZ) video...... codec. To improve the LDPC coding performance in the context of TDWZ, this paper proposes a Wyner-Ziv video codec using bitplane correlation through multiple parallel LDPC decoding. The proposed scheme utilizes inter bitplane correlation to enhance the bitplane decoding performance. Experimental results...

  18. Multi-hypothesis Transform Domain Wyner-Ziv Video Coding including Optical Flow

    DEFF Research Database (Denmark)

    Huang, Xin; Rakêt, Lars Lau; Luong, Huynh Van

    2011-01-01

    Transform Domain Wyner-Ziv (TDWZ) video coding is an efficient Distributed Video coding solution providing new features such as low complexity encoding, by mainly exploiting the source statistics at the decoder based on the availability of decoder side information. The accuracy of the decoder side...... information has a major impact on the performance of TDWZ. In this paper, a novel multi-hypothesis based TDWZ video coding is presented to exploit the redundancy between multiple side information and the source information. The decoder used optical flow for side information calculation. Compared with the best...

  19. Mutiple LDPC Decoding using Bitplane Correlation for Transform Domain Wyner-Ziv Video Coding

    DEFF Research Database (Denmark)

    Luong, Huynh Van; Huang, Xin; Forchhammer, Søren

    2011-01-01

    Distributed video coding (DVC) is an emerging video coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. This paper considers a Low Density Parity Check (LDPC) based Transform Domain Wyner-Ziv (TDWZ) video...... codec. To improve the LDPC coding performance in the context of TDWZ, this paper proposes a Wyner-Ziv video codec using bitplane correlation through multiple parallel LDPC decoding. The proposed scheme utilizes inter bitplane correlation to enhance the bitplane decoding performance. Experimental results...

  20. Efficient Dual Domain Decoding of Linear Block Codes Using Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Ahmed Azouaoui

    2012-01-01

    Full Text Available A computationally efficient algorithm for decoding block codes is developed using a genetic algorithm (GA. The proposed algorithm uses the dual code in contrast to the existing genetic decoders in the literature that use the code itself. Hence, this new approach reduces the complexity of decoding the codes of high rates. We simulated our algorithm in various transmission channels. The performance of this algorithm is investigated and compared with competitor decoding algorithms including Maini and Shakeel ones. The results show that the proposed algorithm gives large gains over the Chase-2 decoding algorithm and reach the performance of the OSD-3 for some quadratic residue (QR codes. Further, we define a new crossover operator that exploits the domain specific information and compare it with uniform and two point crossover. The complexity of this algorithm is also discussed and compared to other algorithms.

  1. Computing the Feng-Rao distances for codes from order domains

    DEFF Research Database (Denmark)

    Ruano Benito, Diego

    2007-01-01

    We compute the Feng–Rao distance of a code coming from an order domain with a simplicial value semigroup. The main tool is the Apéry set of a semigroup that can be computed using a Gröbner basis....

  2. Dress Codes in the Public Schools: Principals, Policies, and Precepts.

    Science.gov (United States)

    DeMitchell, Todd A.; Fossey, Richard; Cobb, Casey

    2000-01-01

    Responses from 157 principals (65 percent of a national sample) showed strong support for dress codes. Research focuses on the perception of school principals regarding dress codes, analyzes dress codes for common features, and proposes a constitutional standard of review for contested dress codes. (58 footnotes) (MLF)

  3. Towards development of a high quality public domain global roads database

    Directory of Open Access Journals (Sweden)

    Andrew Nelson

    2006-12-01

    Full Text Available There is clear demand for a global spatial public domain roads data set with improved geographic and temporal coverage, consistent coding of road types, and clear documentation of sources. The currently best available global public domain product covers only one-quarter to one-third of the existing road networks, and this varies considerably by region. Applications for such a data set span multiple sectors and would be particularly valuable for the international economic development, disaster relief, and biodiversity conservation communities, not to mention national and regional agencies and organizations around the world. The building blocks for such a global product are available for many countries and regions, yet thus far there has been neither strategy nor leadership for developing it. This paper evaluates the best available public domain and commercial data sets, assesses the gaps in global coverage, and proposes a number of strategies for filling them. It also identifies stakeholder organizations with an interest in such a data set that might either provide leadership or funding for its development. It closes with a proposed set of actions to begin the process.

  4. Fourier Domain Decoding Algorithm of Non-Binary LDPC codes for Parallel Implementation

    CERN Document Server

    Kasai, Kenta

    2010-01-01

    For decoding non-binary low-density parity check (LDPC) codes, logarithm-domain sum-product (Log-SP) algorithms were proposed for reducing quantization effects of SP algorithm in conjunction with FFT. Since FFT is not applicable in the logarithm domain, the computations required at check nodes in the Log-SP algorithms are computationally intensive. What is worth, check nodes usually have higher degree than variable nodes. As a result, most of the time for decoding is used for check node computations, which leads to a bottleneck effect. In this paper, we propose a Log-SP algorithm in the Fourier domain. With this algorithm, the role of variable nodes and check nodes are switched. The intensive computations are spread over lower-degree variable nodes, which can be efficiently calculated in parallel. Furthermore, we develop a fast calculation method for the estimated bits and syndromes in the Fourier domain.

  5. Domain Decomposition of a Constructive Solid Geometry Monte Carlo Transport Code

    Energy Technology Data Exchange (ETDEWEB)

    O' Brien, M J; Joy, K I; Procassini, R J; Greenman, G M

    2008-12-07

    Domain decomposition has been implemented in a Constructive Solid Geometry (CSG) Monte Carlo neutron transport code. Previous methods to parallelize a CSG code relied entirely on particle parallelism; but in our approach we distribute the geometry as well as the particles across processors. This enables calculations whose geometric description is larger than what could fit in memory of a single processor, thus it must be distributed across processors. In addition to enabling very large calculations, we show that domain decomposition can speed up calculations compared to particle parallelism alone. We also show results of a calculation of the proposed Laser Inertial-Confinement Fusion-Fission Energy (LIFE) facility, which has 5.6 million CSG parts.

  6. Brillouin optical time-domain analyzer for extended sensing range using probe dithering and cyclic coding

    Science.gov (United States)

    Iribas, Haritz; Loayssa, Alayn; Sauser, Florian; Llera, Miguel; Le Floch, Sébastien

    2017-04-01

    We present an enhanced performance Brillouin optical time-domain analysis sensor that uses dual probes waves with optical frequency modulation and cyclic coding. The frequency modulation serves to increase the probe power that can be injected in the fiber before the onset of non-local effects and noise generated by spontaneous Brillouin scattering. This leads to higher detected signal-to-noise ratio (SNR), which is further increased by the coding gain. The enhanced SNR translates to extended range for the sensor, with experiments demonstrating 1-m spatial resolution over a 164 km fiber loop with a 3-MHz Brillouin frequency shift measurement precision at the worst contrast position. In addition, we introduce a study of the power limits that can be injected in the fiber with cyclic coding before the appearance of distortions in the decoded signal.

  7. Domain and range decomposition methods for coded aperture x-ray coherent scatter imaging

    Science.gov (United States)

    Odinaka, Ikenna; Kaganovsky, Yan; O'Sullivan, Joseph A.; Politte, David G.; Holmgren, Andrew D.; Greenberg, Joel A.; Carin, Lawrence; Brady, David J.

    2016-05-01

    Coded aperture X-ray coherent scatter imaging is a novel modality for ascertaining the molecular structure of an object. Measurements from different spatial locations and spectral channels in the object are multiplexed through a radiopaque material (coded aperture) onto the detectors. Iterative algorithms such as penalized expectation maximization (EM) and fully separable spectrally-grouped edge-preserving reconstruction have been proposed to recover the spatially-dependent coherent scatter spectral image from the multiplexed measurements. Such image recovery methods fall into the category of domain decomposition methods since they recover independent pieces of the image at a time. Ordered subsets has also been utilized in conjunction with penalized EM to accelerate its convergence. Ordered subsets is a range decomposition method because it uses parts of the measurements at a time to recover the image. In this paper, we analyze domain and range decomposition methods as they apply to coded aperture X-ray coherent scatter imaging using a spectrally-grouped edge-preserving regularizer and discuss the implications of the increased availability of parallel computational architecture on the choice of decomposition methods. We present results of applying the decomposition methods on experimental coded aperture X-ray coherent scatter measurements. Based on the results, an underlying observation is that updating different parts of the image or using different parts of the measurements in parallel, decreases the rate of convergence, whereas using the parts sequentially can accelerate the rate of convergence.

  8. A Smad action turnover switch operated by WW domain readers of a phosphoserine code.

    Science.gov (United States)

    Aragón, Eric; Goerner, Nina; Zaromytidou, Alexia-Ileana; Xi, Qiaoran; Escobedo, Albert; Massagué, Joan; Macias, Maria J

    2011-06-15

    When directed to the nucleus by TGF-β or BMP signals, Smad proteins undergo cyclin-dependent kinase 8/9 (CDK8/9) and glycogen synthase kinase-3 (GSK3) phosphorylations that mediate the binding of YAP and Pin1 for transcriptional action, and of ubiquitin ligases Smurf1 and Nedd4L for Smad destruction. Here we demonstrate that there is an order of events-Smad activation first and destruction later-and that it is controlled by a switch in the recognition of Smad phosphoserines by WW domains in their binding partners. In the BMP pathway, Smad1 phosphorylation by CDK8/9 creates binding sites for the WW domains of YAP, and subsequent phosphorylation by GSK3 switches off YAP binding and adds binding sites for Smurf1 WW domains. Similarly, in the TGF-β pathway, Smad3 phosphorylation by CDK8/9 creates binding sites for Pin1 and GSK3, then adds sites to enhance Nedd4L binding. Thus, a Smad phosphoserine code and a set of WW domain code readers provide an efficient solution to the problem of coupling TGF-β signal delivery to turnover of the Smad signal transducers.

  9. Machine-Learning Algorithms to Code Public Health Spending Accounts.

    Science.gov (United States)

    Brady, Eoghan S; Leider, Jonathon P; Resnick, Beth A; Alfonso, Y Natalia; Bishai, David

    Government public health expenditure data sets require time- and labor-intensive manipulation to summarize results that public health policy makers can use. Our objective was to compare the performances of machine-learning algorithms with manual classification of public health expenditures to determine if machines could provide a faster, cheaper alternative to manual classification. We used machine-learning algorithms to replicate the process of manually classifying state public health expenditures, using the standardized public health spending categories from the Foundational Public Health Services model and a large data set from the US Census Bureau. We obtained a data set of 1.9 million individual expenditure items from 2000 to 2013. We collapsed these data into 147 280 summary expenditure records, and we followed a standardized method of manually classifying each expenditure record as public health, maybe public health, or not public health. We then trained 9 machine-learning algorithms to replicate the manual process. We calculated recall, precision, and coverage rates to measure the performance of individual and ensembled algorithms. Compared with manual classification, the machine-learning random forests algorithm produced 84% recall and 91% precision. With algorithm ensembling, we achieved our target criterion of 90% recall by using a consensus ensemble of ≥6 algorithms while still retaining 93% coverage, leaving only 7% of the summary expenditure records unclassified. Machine learning can be a time- and cost-saving tool for estimating public health spending in the United States. It can be used with standardized public health spending categories based on the Foundational Public Health Services model to help parse public health expenditure information from other types of health-related spending, provide data that are more comparable across public health organizations, and evaluate the impact of evidence-based public health resource allocation.

  10. Public-domain software for root image analysis

    Directory of Open Access Journals (Sweden)

    Mirian Cristina Gomes Costa

    2014-10-01

    Full Text Available In the search for high efficiency in root studies, computational systems have been developed to analyze digital images. ImageJ and Safira are public-domain systems that may be used for image analysis of washed roots. However, differences in root properties measured using ImageJ and Safira are supposed. This study compared values of root length and surface area obtained with public-domain systems with values obtained by a reference method. Root samples were collected in a banana plantation in an area of a shallower Typic Carbonatic Haplic Cambisol (CXk, and an area of a deeper Typic Haplic Ta Eutrophic Cambisol (CXve, at six depths in five replications. Root images were digitized and the systems ImageJ and Safira used to determine root length and surface area. The line-intersect method modified by Tennant was used as reference; values of root length and surface area measured with the different systems were analyzed by Pearson's correlation coefficient and compared by the confidence interval and t-test. Both systems ImageJ and Safira had positive correlation coefficients with the reference method for root length and surface area data in CXk and CXve. The correlation coefficient ranged from 0.54 to 0.80, with lowest value observed for ImageJ in the measurement of surface area of roots sampled in CXve. The IC (95 % revealed that root length measurements with Safira did not differ from that with the reference method in CXk (-77.3 to 244.0 mm. Regarding surface area measurements, Safira did not differ from the reference method for samples collected in CXk (-530.6 to 565.8 mm² as well as in CXve (-4231 to 612.1 mm². However, measurements with ImageJ were different from those obtained by the reference method, underestimating length and surface area in samples collected in CXk and CXve. Both ImageJ and Safira allow an identification of increases or decreases in root length and surface area. However, Safira results for root length and surface area are

  11. Canadian geothermal code for public reporting: reporting of exploration results, geothermal resources and geothermal reserves

    Energy Technology Data Exchange (ETDEWEB)

    Deibert, Lee [Meridian Environmental Consulting Ltd. (Canada); Hjartarson, Arnar [Mannvit Engineering (Canada); McDonald, Ian; Toohey, Brian [Nexen Inc. (Canada); McIlveen, John [Jacob Securities, (Canada); Thompson, Alison [Magma Energy Corp. (Canada); Yang, Daniel [Borealis Geopower Inc. (Canada)

    2010-07-01

    In December 2008, the Canadian geothermal code committee sponsored by the Canadian Geothermal Energy Association (CanGEA) was created with the intention of developing a code for public reporting of geothermal resources and reserves. The code was based on key elements of the Australian code which was developed in 2008 by the Australian Geothermal Energy Association in collaboration with the Australian Geothermal Energy Group. The Canadian Code was developed with the purpose of being applicable to both Canadian and international geothermal plays and to offer a reporting basis which satisfies investors, shareholders and capital markets. The Canadian Geothermal Reporting Code for Public Reporting is provided herein, it is intended for all Canadian companies and their competitors. Since reporting of geothermal results is a recent activity, this Code will require further input during its implementation.

  12. Dress and Appearance Codes in Public Secondary School Handbooks.

    Science.gov (United States)

    Herbon, Beth; Workman, Jane E.

    2000-01-01

    Analyzed and compared dress and appearance codes from 154 secondary school handbooks. Unacceptable dress and appearance was listed more frequently that acceptable or required dress; concerns about health, safety, and modesty were reflected; and 80 percent included a statement that dress should not be disruptive to the educational process.…

  13. Codes of conduct in public schools: a legal perspective

    African Journals Online (AJOL)

    Erna Kinsey

    different picture, one that is marred by countless incidents at disor- ganised and .... Discipline is indispensable for effective teaching and learning in a school, but .... A copy of the code of conduct must be sent to the education autho- rities, and ...

  14. A Novel Filter Dependent CFR Scheme with Waterfilling Based Code Domain Compensation

    Science.gov (United States)

    Chang, Hyung Min; Lee, Won Cheol

    This paper proposes a novel crest factor reduction (CFR) algorithm applicable to currently deployed W-CDMA base stations. The peak-to-average ratio (PAR) reduction of the multiple carrier mixed signal, namely CFR, has been an issue in order to convey the benefit of using low-cost power amplifiers. The simple final clipping method (SFCM) as a conventional method has been widely utilized due to its simplicity and effectiveness. However, the SFCM degrades the adjacent channel leakage ratio (ACLR) characteristic as well as the signal quality indicated by either the error vector magnitude (EVM) or the peak code domain error (PCDE). Conventionally, in order to alleviate this undesired deterioration, extra channel filtering and signal quality enhancement followed by CFR might be processed in an open-loop style. Alternatively, to perform CFR by maintaining the PAR as low as possible subject to satisfying the prescribed ACLR and EVM/PCDE performance, this paper introduces the prediction filter dependent peak reduction (PFDPR) process collaboratively working with dynamic waterfilling-based code domain compensation (DWCDC). To verify the superiority of the proposed CFR algorithm, tentative simulations are conducted while maintaining the rules of legitimate W-CDMA base station test specifications.

  15. Cross-domain expression recognition based on sparse coding and transfer learning

    Science.gov (United States)

    Yang, Yong; Zhang, Weiyi; Huang, Yong

    2017-05-01

    Traditional facial expression recognition methods usually assume that the training set and the test set are independent and identically distributed. However, in actual expression recognition applications, the conditions of independent and identical distribution are hardly satisfied for the training set and test set because of the difference of light, shade, race and so on. In order to solve this problem and improve the performance of expression recognition in the actual applications, a novel method based on transfer learning and sparse coding is applied to facial expression recognition. First of all, a common primitive model, that is, the dictionary is learnt. Then, based on the idea of transfer learning, the learned primitive pattern is transferred to facial expression and the corresponding feature representation is obtained by sparse coding. The experimental results in CK +, JAFFE and NVIE database shows that the transfer learning based on sparse coding method can effectively improve the expression recognition rate in the cross-domain expression recognition task and is suitable for the practical facial expression recognition applications.

  16. STELLA: A domain-specific embedded language for stencil codes on structured grids

    Science.gov (United States)

    Gysi, Tobias; Fuhrer, Oliver; Osuna, Carlos; Cumming, Benjamin; Schulthess, Thomas

    2014-05-01

    Adapting regional weather and climate models (RCMs) for hybrid many-core computing architectures is a formidable challenge. Achieving high performance on different supercomputing architectures while retaining a single source code are often perceived as contradicting goals. Typically, the numerical algorithms employed are tightly inter-twined with hardware dependent implementation choices and optimizations such as for example data-structures and loop order. While Fortran is currently the de-facto standard for programming RCMs, no single such standard for porting such models to graphics processing units (GPUs) has yet emerged. The approaches used can be grouped into three main categories: compiler directives (OpenACC, PGI compiler directives), custom programming languages (CUDA, OpenCL) and domain-specific libraries or languages. STELLA (STencil Loop LAnguage) is a domain-specific embedded language (DSEL) built using generic programming in C++ which is targeted at stencil codes on structured grids. It allows a high-level specification of the algorithm while separating hardware dependent implementation details into back-ends. Currently, a back-end for multi-core CPUs using the OpenMP programming model and a back-end for NVIDIA GPUs using the CUDA programming mode has been developed. We will present the domain-specific language and its features such as software managed caching. With the example of an implementation of the dynamical core of a RCM (COSMO) we will compare performance with respect to the original Fortran implementation both on both CPUs and GPUs. Finally, we will discuss advantages and disadvantages of our approach as compared to other approaches such as source-to-source translators.

  17. Assessment of current cybersecurity practices in the public domain : cyber indications and warnings domain.

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R.; Keliiaa, Curtis M.

    2010-09-01

    This report assesses current public domain cyber security practices with respect to cyber indications and warnings. It describes cybersecurity industry and government activities, including cybersecurity tools, methods, practices, and international and government-wide initiatives known to be impacting current practice. Of particular note are the U.S. Government's Trusted Internet Connection (TIC) and 'Einstein' programs, which are serving to consolidate the Government's internet access points and to provide some capability to monitor and mitigate cyber attacks. Next, this report catalogs activities undertaken by various industry and government entities. In addition, it assesses the benchmarks of HPC capability and other HPC attributes that may lend themselves to assist in the solution of this problem. This report draws few conclusions, as it is intended to assess current practice in preparation for future work, however, no explicit references to HPC usage for the purpose of analyzing cyber infrastructure in near-real-time were found in the current practice. This report and a related SAND2010-4766 National Cyber Defense High Performance Computing and Analysis: Concepts, Planning and Roadmap report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

  18. Game-Coding Workshops in New Zealand Public Libraries: Evaluation of a Pilot Project

    Science.gov (United States)

    Bolstad, Rachel

    2016-01-01

    This report evaluates a game coding workshop offered to young people and adults in seven public libraries round New Zealand. Participants were taken step by step through the process of creating their own simple 2D videogame, learning the basics of coding, computational thinking, and digital game design. The workshops were free and drew 426 people…

  19. Code and papers: computing publication patterns in the LHC era

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Publications in scholarly journals establish the body of knowledge deriving from scientific research; they also play a fundamental role in the career path of scientists and in the evaluation criteria of funding agencies. This presentation reviews the evolution of computing-oriented publications in HEP following the start of operation of LHC. Quantitative analyses are illustrated, which document the production of scholarly papers on computing-related topics by HEP experiments and core tools projects (including distributed computing R&D), and the citations they receive. Several scientometric indicators are analyzed to characterize the role of computing in HEP literature. Distinctive features of scholarly publication production in the software-oriented and hardware-oriented experimental HEP communities are highlighted. Current patterns and trends are compared to the situation in previous generations' HEP experiments at LEP, Tevatron and B-factories. The results of this scientometric analysis document objec...

  20. An outlook on the nature of mental creations after belonging to public domain

    Directory of Open Access Journals (Sweden)

    Pedjman Mohammadi

    2015-05-01

    Full Text Available The public domain of copyright which considers the end of protection period, attempts to cause balance among the rights of authors, society and third parties. So at the end of financial rights of author’s protection period the possibility of free utilization of these literary works will be possible. But in this situation one of the controversial difficulties is the nature of these kinds of literary works which, according to some scholars, after belonging to public domain, they will change in to the Allowable. To approve their idea, they focus on common features existing in these literary works(works relating to public domain and the Allowable. On the other hand it is believed that literary works after belonging to public domain essentially works after belonging to public domain essentially due to lacking of scarcity element are not considered property at all.

  1. You Need a Code of Ethics! Not Your Publication, You!

    Science.gov (United States)

    Eveslage, Thomas

    2003-01-01

    Proposes that student journalists should clarify in writing journalism standards that characterize their publication and the moral reasoning guiding the staff. Contends that responsible journalism also requires a statement of personal values that helps define ethical behavior even when a staff member is not in journalism class or working on the…

  2. CodeSlinger: a case study in domain-driven interactive tool design for biomedical coding scheme exploration and use.

    Science.gov (United States)

    Flowers, Natalie L

    2010-01-01

    CodeSlinger is a desktop application that was developed to aid medical professionals in the intertranslation, exploration, and use of biomedical coding schemes. The application was designed to provide a highly intuitive, easy-to-use interface that simplifies a complex business problem: a set of time-consuming, laborious tasks that were regularly performed by a group of medical professionals involving manually searching coding books, searching the Internet, and checking documentation references. A workplace observation session with a target user revealed the details of the current process and a clear understanding of the business goals of the target user group. These goals drove the design of the application's interface, which centers on searches for medical conditions and displays the codes found in the application's database that represent those conditions. The interface also allows the exploration of complex conceptual relationships across multiple coding schemes.

  3. 77 FR 67628 - National Fire Codes: Request for Public Input for Revision of Codes and Standards

    Science.gov (United States)

    2012-11-13

    ... Meeting. Public input Document--edition Document title closing date NFPA 2--2011 Hydrogen Technologies 1/4... Standard for the 7/8/2013 Production, Storage, and Handling of Liquefied Natural Gas (LNG). NFPA 72--2013... Water Reactor Electric Generating Plants. NFPA 805--2010 Performance-Based 1/4/2013 Standard for...

  4. GENERATION OF COMPLEMENTARY CODES AND DOUBLY CO-OPERATIVE TERNARY SEQUENCES AND THEIR COMPARITIVE STUDY IN AMBIGUITY DOMAIN

    Directory of Open Access Journals (Sweden)

    K. SRIHARI RAO,

    2011-03-01

    Full Text Available Pulse coding and linear frequency modulation in analog or discrete form are widely used in radar systems for pulse compression to achieve high range resolution. Such coded waveforms are detected by a threshold detector after matched filtering. Complementary codes, which use multiple binary sequences exhibit the most desirable characteristics, so that they achieve perfect side lobe cancellation.Here generation of complementary codes is presented whose sum of autocorrelation functions is double the length of the sequence for zero shift and zero for other shifts and pairs of doubly co-operative ternary sequences which are co-operative not only in the utocorrelation domain but also in the signal domain is presented. Theenergy efficiency of the sequences is found as unity or 100%. The hoice of the selection of the sequence in the case of complementary sequences is restricted to a few number of sequences where as in doubly co-operative sequences, the choice is broader. This is due to the property of the co-operative sequence is slightly relaxedfrom complementary codes as side lobe is relaxed to ±1 from zero in the case of complementary codes. The radar ambiguity function epresents the output of the matched filter used by the radar esigners which provides information about how different waveforms may be suitable for various radar applications. The behaviour of complementary sequences and doubly co-operative sequences is studied in ambiguity domain.

  5. Domain Decomposition strategy for pin-wise full-core Monte Carlo depletion calculation with the reactor Monte Carlo Code

    Energy Technology Data Exchange (ETDEWEB)

    Liang, Jingang; Wang, Kan; Qiu, Yishu [Dept. of Engineering Physics, LiuQing Building, Tsinghua University, Beijing (China); Chai, Xiao Ming; Qiang, Sheng Long [Science and Technology on Reactor System Design Technology Laboratory, Nuclear Power Institute of China, Chengdu (China)

    2016-06-15

    Because of prohibitive data storage requirements in large-scale simulations, the memory problem is an obstacle for Monte Carlo (MC) codes in accomplishing pin-wise three-dimensional (3D) full-core calculations, particularly for whole-core depletion analyses. Various kinds of data are evaluated and quantificational total memory requirements are analyzed based on the Reactor Monte Carlo (RMC) code, showing that tally data, material data, and isotope densities in depletion are three major parts of memory storage. The domain decomposition method is investigated as a means of saving memory, by dividing spatial geometry into domains that are simulated separately by parallel processors. For the validity of particle tracking during transport simulations, particles need to be communicated between domains. In consideration of efficiency, an asynchronous particle communication algorithm is designed and implemented. Furthermore, we couple the domain decomposition method with MC burnup process, under a strategy of utilizing consistent domain partition in both transport and depletion modules. A numerical test of 3D full-core burnup calculations is carried out, indicating that the RMC code, with the domain decomposition method, is capable of pin-wise full-core burnup calculations with millions of depletion regions.

  6. The Use and Abuse of Research in the Public Domain

    Science.gov (United States)

    Reid, Alan

    2016-01-01

    In Australia, education think tanks have become increasingly influential in policy circles through "reports" to government, and in public debate through the mainstream media. Invariably think-tanks draw on educational research to lend authority and legitimacy to their work. This is desirable if the research deepens understandings about…

  7. Use of the Means/Ends Test to Evaluate Public School Dress-Code Policies

    Science.gov (United States)

    Workman, Jane E.; Studak, Cathryn M.

    2008-01-01

    The purpose of this article is to explain how a means/ends test can be adapted for the school environment. Public school officials can use a means/ends test to document an analysis of whether dress-code policies will be effective in diminishing risks to the health, safety, or morality of the school population. Elements of policy evaluation--ends,…

  8. Improved virtual channel noise model for transform domain Wyner-Ziv video coding

    DEFF Research Database (Denmark)

    Huang, Xin; Forchhammer, Søren

    2009-01-01

    Distributed video coding (DVC) has been proposed as a new video coding paradigm to deal with lossy source coding using side information to exploit the statistics at the decoder to reduce computational demands at the encoder. A virtual channel noise model is utilized at the decoder to estimate...

  9. Suburban development – a search for public domains in Danish suburban neighbourhoods

    DEFF Research Database (Denmark)

    Melgaard, Bente; Bech-Danielsen, Claus

    , potentials for bridge-building across the enclaves of the suburb are looked for through a combined architectural-anthropological mapping of public spaces in a specific suburb in Denmark, the analyses being carried out in the light of Hajer & Reijndorp’s definition of public domains and the term exchange....... The results so far show that suburban spaces with a potential for creating bridge-building across the segregated enclaves do exist but that, among other things, focus on spatial design is needed before actual public domains creating the basis for exchange are achieved....

  10. Specific and Modular Binding Code for Cytosine Recognition in Pumilio/FBF (PUF) RNA-binding Domains

    Energy Technology Data Exchange (ETDEWEB)

    Dong, Shuyun; Wang, Yang; Cassidy-Amstutz, Caleb; Lu, Gang; Bigler, Rebecca; Jezyk, Mark R.; Li, Chunhua; Tanaka Hall, Traci M.; Wang, Zefeng (NIH); (Beijing U); (UNC)

    2011-10-28

    Pumilio/fem-3 mRNA-binding factor (PUF) proteins possess a recognition code for bases A, U, and G, allowing designed RNA sequence specificity of their modular Pumilio (PUM) repeats. However, recognition side chains in a PUM repeat for cytosine are unknown. Here we report identification of a cytosine-recognition code by screening random amino acid combinations at conserved RNA recognition positions using a yeast three-hybrid system. This C-recognition code is specific and modular as specificity can be transferred to different positions in the RNA recognition sequence. A crystal structure of a modified PUF domain reveals specific contacts between an arginine side chain and the cytosine base. We applied the C-recognition code to design PUF domains that recognize targets with multiple cytosines and to generate engineered splicing factors that modulate alternative splicing. Finally, we identified a divergent yeast PUF protein, Nop9p, that may recognize natural target RNAs with cytosine. This work deepens our understanding of natural PUF protein target recognition and expands the ability to engineer PUF domains to recognize any RNA sequence.

  11. Specific and modular binding code for cytosine recognition in Pumilio/FBF (PUF) RNA-binding domains.

    Science.gov (United States)

    Dong, Shuyun; Wang, Yang; Cassidy-Amstutz, Caleb; Lu, Gang; Bigler, Rebecca; Jezyk, Mark R; Li, Chunhua; Hall, Traci M Tanaka; Wang, Zefeng

    2011-07-29

    Pumilio/fem-3 mRNA-binding factor (PUF) proteins possess a recognition code for bases A, U, and G, allowing designed RNA sequence specificity of their modular Pumilio (PUM) repeats. However, recognition side chains in a PUM repeat for cytosine are unknown. Here we report identification of a cytosine-recognition code by screening random amino acid combinations at conserved RNA recognition positions using a yeast three-hybrid system. This C-recognition code is specific and modular as specificity can be transferred to different positions in the RNA recognition sequence. A crystal structure of a modified PUF domain reveals specific contacts between an arginine side chain and the cytosine base. We applied the C-recognition code to design PUF domains that recognize targets with multiple cytosines and to generate engineered splicing factors that modulate alternative splicing. Finally, we identified a divergent yeast PUF protein, Nop9p, that may recognize natural target RNAs with cytosine. This work deepens our understanding of natural PUF protein target recognition and expands the ability to engineer PUF domains to recognize any RNA sequence.

  12. Materialities of Law: Celebrity Production and the Public Domain

    Directory of Open Access Journals (Sweden)

    Esther Milne

    2009-12-01

    Full Text Available Celebrity production and consumption are powerful socio-economic forces. The celebrity functions as a significant economic resource for the commercial sector and plays a fundamental symbolic role within culture by providing a shared ‘vocabulary’ through which to understand contemporary social relations. A pivotal element of this allure is the process by which the celebrity figure is able to forge an intimate link with its audience, often producing public expressions of profound compassion, respect or revulsion. This process, however, is complicated by emerging participatory media forms whose impact is experienced as new conditions of possibility for celebrity production and consumption. As Marshall argues, video mash-ups of celebrity interviews, such as those of Christian Bale or Tom Cruise, are dramatically changing the relation between celebrity and audience (Marshall, 2006: 640. Meanings produced by these audience remixes challenge the extent to which a celebrity might control her image. So is the celebrity personality, therefore, a public or private commodity? Who owns the celebrity image within remix culture? Although the celebrity figure has been thoroughly researched in relation to its patterns of consumption; semiotic power; and industry construction; less attention has been focused on the forms of celebrity governance enabled by legislative and case law settings. How might the law deal with the significant economic and cultural power exercised within celebrity culture?

  13. Decay-ratio calculation in the frequency domain with the LAPUR code using 1D-kinetics

    Energy Technology Data Exchange (ETDEWEB)

    Munoz-Cobo, J. L.; Escriva, A.; Garcia, C.; Berna, C. [Instituto de Ingenieria Energetica, Universitat Politecnica de Valencia, Camino de Vera s/n, Valencia 46022 (Spain); Melara, J. [IBERDROLA Ingenieria Y Construccion, C/ Jose Bardasano Baos 9, 28016 Madrid (Spain)

    2012-07-01

    This paper deals with the problem of computing the Decay Ratio in the frequency domain codes as the LAPUR code. First, it is explained how to calculate the feedback reactivity in the frequency domain using slab-geometry i.e. 1D kinetics, also we show how to perform the coupling of the 1D kinetics with the thermal-hydraulic part of the LAPUR code in order to obtain the reactivity feedback coefficients for the different channels. In addition, we show how to obtain the reactivity variation in the complex domain by solving the eigenvalue equation in the frequency domain and we compare this result with the reactivity variation obtained in first order perturbation theory using the 1D neutron fluxes of the base case. Because LAPUR works in the linear regime, it is assumed that in general the perturbations are small. There is also a section devoted to the reactivity weighting factors used to couple the reactivity contribution from the different channels to the reactivity of the entire reactor core in point kinetics and 1D kinetics. Finally we analyze the effects of the different approaches on the DR value. (authors)

  14. Experimental Electrically Reconfigurable Time-Domain Spectral Amplitude Encoding/Decoding in an Optical Code Division Multiple Access System

    Science.gov (United States)

    Tainta, Santiago; Erro, María J.; Garde, María J.; Muriel, Miguel A.

    2013-11-01

    An electrically reconfigurable time-domain spectral amplitude encoding/decoding scheme is proposed herein. The setup is based on the concept of temporally pulse shaping dual to spatial arrangements. The transmitter is based on a short pulse source and uses two conjugate dispersive fiber gratings and an electro-optic intensity modulator placed in between. Proof of concept results are shown for an optical pulse train operating at 1.25 Gbps using codes from the Hadamard family with a length of eight chips. The system is electrically reconfigurable, compatible with fiber systems, and permits scalability in the size of the codes by modifying only the modulator velocity.

  15. Safety features in nuclear power plants to eliminate the need of emergency planning in public domain

    Indian Academy of Sciences (India)

    P K Vijayan; M T Kamble; A K Nayak; K K Vaze; R K Sinha

    2013-10-01

    Following the Fukushima accident, the safety features of Nuclear Power Plants (NPP) are being re-examined worldwide including India to demonstrate capabilities to cope with severe accidents. In order to restore public confidence and support for nuclear power, it is felt necessary to design future NPPs with near zero impact outside the plant boundary and thus enabling elimination of emergency planning in public domain. Authors have identified a set of safety features which are needed to be incorporated in advanced reactors to achieve this goal. These features enabling prevention, termination, mitigation and containment of radioactivity for beyond design basis accidents arising from extreme natural events are essential for achieving the goal of elimination of emergency planning in public domain. Inherent safety characteristics, passive and engineered safety features to achieve these functions are discussed in this paper. Present trends and future developments in this direction are also described briefly.

  16. A public code for general relativistic, polarised radiative transfer around spinning black holes

    Science.gov (United States)

    Dexter, Jason

    2016-10-01

    Ray tracing radiative transfer is a powerful method for comparing theoretical models of black hole accretion flows and jets with observations. We present a public code, GRTRANS, for carrying out such calculations in the Kerr metric, including the full treatment of polarised radiative transfer and parallel transport along geodesics. The code is written in FORTRAN 90 and efficiently parallelises with OPENMP, and the full code and several components have PYTHON interfaces. We describe several tests which are used for verifiying the code, and we compare the results for polarised thin accretion disc and semi-analytic jet problems with those from the literature as examples of its use. Along the way, we provide accurate fitting functions for polarised synchrotron emission and transfer coefficients from thermal and power-law distribution functions, and compare results from numerical integration and quadrature solutions of the polarised radiative transfer equations. We also show that all transfer coefficients can play an important role in predicted images and polarisation maps of the Galactic centre black hole, Sgr A*, at submillimetre wavelengths.

  17. 37 CFR 201.26 - Recordation of documents pertaining to computer shareware and donation of public domain computer...

    Science.gov (United States)

    2010-07-01

    ... pertaining to computer shareware and donation of public domain computer software. 201.26 Section 201.26... GENERAL PROVISIONS § 201.26 Recordation of documents pertaining to computer shareware and donation of public domain computer software. (a) General. This section prescribes the procedures for submission of...

  18. 32 CFR 644.24 - Acquisition by Transfer from other Government Departments or Agencies (except Public Domain).

    Science.gov (United States)

    2010-07-01

    ... Departments or Agencies (except Public Domain). 644.24 Section 644.24 National Defense Department of Defense... Departments or Agencies (except Public Domain). When a requirement develops for the acquisition of Government... of existing improvements, the estimated cost of the proposed construction, attitude of the...

  19. A Two-Dimensional Fem Code for Impedance Calculation in High Frequency Domain

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Lanfa; /SLAC; Lee, Lie-Quan; /SLAC; Stupakov, Gennady; /SLAC

    2010-08-25

    A new method, using the parabolic equation (PE), for the calculation of both high-frequency impedances of small-angle taper (or collimator) is developed in [1]. One of the most important advantages of the PE approach is that it eliminates the spatial scale of the small wavelength from the problem. As a result, only coarser spatial meshes are needed in calculating the numerical solution of the PE. We developed a new code based on Finite Element Method (FEM) which can handle arbitrary profile of a transition and speed up the calculation by orders of magnitude. As a first step, we completed and benchmarked a two-dimensional code. It can be upgraded to three-dimensional geometry.

  20. Multi-hypothesis Transform Domain Wyner-Ziv Video Coding including Optical Flow

    DEFF Research Database (Denmark)

    Huang, Xin; Rakêt, Lars Lau; Luong, Huynh Van;

    2011-01-01

    information has a major impact on the performance of TDWZ. In this paper, a novel multi-hypothesis based TDWZ video coding is presented to exploit the redundancy between multiple side information and the source information. The decoder used optical flow for side information calculation. Compared with the best...... available single estimation mode TDWZ, the proposed multi-hypothesis based TDWZ achieves robustly better Rate-Distortion (RD) performance and the overall improvement is up to 0.6 dB at high bitrate and up to 2 dB compared with the DISCOVER TDWZ video codec....

  1. The Moral Reasoning of Public Accountants in the Development of a Code of Ethics: the Case of Indonesia

    Directory of Open Access Journals (Sweden)

    A. S. L. Lindawati

    2012-03-01

    Full Text Available The objective of this study is to explore the user’s perceptions of the role of moral reasoning in influencing the implementation of codes of ethics as standards and guidance for professional audit practice by Indonesian public accountants. The study focuses on two important aspects of influence: (i the key factors influencing professional public accountants in implementing a code of ethics as a standard for audit practice, and (ii the key activities performed by public accountants as moral agents for establishing awareness of professional values. Two theoretical approaches/models are used as guides for exploring the influence of moral reasoning of public accountants: first, Kolhberg’s model of moral development (Kolhberg 1982 and, secondly, the American Institute of Certified Public Accountants (AICPA’s Code of Conduct, especially the five principles of the code of ethics (1992, 2004. The study employs a multiple case study model to analyse the data collected from interviewing 15 financial managers of different company categories (as users. The findings indicate that (i moral development is an important component in influencing the moral reasoning of the individual public accountants, (ii the degree of professionalism of public accountants is determined by the degree of the development of their moral reasoning, and (iii moral reasoning of individuals influences both Indonesian public accountants and company financial managers in building and improving the effectiveness of the implementation of codes of conduct. It is concluded that the role of moral reasoning is an important influence on achieving ethical awareness in public accountants and financial managers. The development of a full code of ethics and an effective compliance monitoring system is essential for Indonesia if it is to play a role in the emerging global economy.

  2. Application of multi-thread computing and domain decomposition to the 3-D neutronics Fem code Cronos

    Energy Technology Data Exchange (ETDEWEB)

    Ragusa, J.C. [CEA Saclay, Direction de l' Energie Nucleaire, Service d' Etudes des Reacteurs et de Modelisations Avancees (DEN/SERMA), 91 - Gif sur Yvette (France)

    2003-07-01

    The purpose of this paper is to present the parallelization of the flux solver and the isotopic depletion module of the code, either using Message Passing Interface (MPI) or OpenMP. Thread parallelism using OpenMP was used to parallelize the mixed dual FEM (finite element method) flux solver MINOS. Investigations regarding the opportunity of mixing parallelism paradigms will be discussed. The isotopic depletion module was parallelized using domain decomposition and MPI. An attempt at using OpenMP was unsuccessful and will be explained. This paper is organized as follows: the first section recalls the different types of parallelism. The mixed dual flux solver and its parallelization are then presented. In the third section, we describe the isotopic depletion solver and its parallelization; and finally conclude with some future perspectives. Parallel applications are mandatory for fine mesh 3-dimensional transport and simplified transport multigroup calculations. The MINOS solver of the FEM neutronics code CRONOS2 was parallelized using the directive based standard OpenMP. An efficiency of 80% (resp. 60%) was achieved with 2 (resp. 4) threads. Parallelization of the isotopic depletion solver was obtained using domain decomposition principles and MPI. Efficiencies greater than 90% were reached. These parallel implementations were tested on a shared memory symmetric multiprocessor (SMP) cluster machine. The OpenMP implementation in the solver MINOS is only the first step towards fully using the SMPs cluster potential with a mixed mode parallelism. Mixed mode parallelism can be achieved by combining message passing interface between clusters with OpenMP implicit parallelism within a cluster.

  3. DCT Transform Domain Filtering Code Acquisition Method%DCT变换域滤波码捕获方法

    Institute of Scientific and Technical Information of China (English)

    李小捷; 许录平

    2012-01-01

    Focusing on the satellite signal acquisition with low tune and frequency uncertainty, we propose a novel code acquisition algorithm based on discrete cosine transform (DCT). Firstly, we obtained a set of time-domain related vectors by partial matched filter (IMF). Then we performed the transform domain filtering and signal reconstruction for every candidate code phase. Because the signals and noise produced by PMF have different time-varying property, noise is greatly reduced and the signals nave almost no loss, thereby increasing the probability of detection under the same probability of false alarm. The theoretical analysis and simulation results show that the detection algorithm can effectively improve the detection probability,and has a lower complexity.%针对较小时频不确定度的卫星信号捕获,提出了一种结合离散余弦变换(DCT)的码捕获算法.首先对信号进行部分匹配滤波(PMF),然后对各个码相位对应的PMF输出矢量进行DCT变换域滤波及信号重构,最后对信号进行基于能量的检测.由于PMF输出信号和噪声时变特性不同,滤波重构后信号能量几乎无损,而噪声能量得到了明显降低,从而提高了相同虚警概率下的捕获概率.理论分析和仿真结果表明本文检测算法可以有效提升检测概率,并且具有较低的复杂度.

  4. Numeral series hidden in the distribution of atomic mass of amino acids to codon domains in the genetic code.

    Science.gov (United States)

    Wohlin, Åsa

    2015-03-21

    The distribution of codons in the nearly universal genetic code is a long discussed issue. At the atomic level, the numeral series 2x(2) (x=5-0) lies behind electron shells and orbitals. Numeral series appear in formulas for spectral lines of hydrogen. The question here was if some similar scheme could be found in the genetic code. A table of 24 codons was constructed (synonyms counted as one) for 20 amino acids, four of which have two different codons. An atomic mass analysis was performed, built on common isotopes. It was found that a numeral series 5 to 0 with exponent 2/3 times 10(2) revealed detailed congruency with codon-grouped amino acid side-chains, simultaneously with the division on atom kinds, further with main 3rd base groups, backbone chains and with codon-grouped amino acids in relation to their origin from glycolysis or the citrate cycle. Hence, it is proposed that this series in a dynamic way may have guided the selection of amino acids into codon domains. Series with simpler exponents also showed noteworthy correlations with the atomic mass distribution on main codon domains; especially the 2x(2)-series times a factor 16 appeared as a conceivable underlying level, both for the atomic mass and charge distribution. Furthermore, it was found that atomic mass transformations between numeral systems, possibly interpretable as dimension degree steps, connected the atomic mass of codon bases with codon-grouped amino acids and with the exponent 2/3-series in several astonishing ways. Thus, it is suggested that they may be part of a deeper reference system.

  5. Optimal-Rate Coding Theorem For Adversarial Networks in the Public-Key Setting

    CERN Document Server

    Amir, Yair; Ostrovksy, Rafail

    2008-01-01

    In this paper, we establish an optimal-rate (interactive) coding theorem in the public-key setting for synchronous networks in the presence of a malicious poly-time adversary for dynamically changing networks. Namely, even if the majority of the nodes are controlled by a malicious adversary and the topology of the network is changing at each round, then as long as there is some path of non-corrupted nodes connecting the sender and receiver at each round (though this path may change at every round) we construct a protocol with bounded memory per processor that achieves optimal transfer rate and negligible decoding error. This protocol will transmit polynomially many messages of polynomial size with constant overhead per bit. We stress that our protocol assumes no knowledge of which nodes are corrupted nor which path is reliable at any round. Our interactive coding theorem states that our protocol cannot be affected in a meaningful way by any polynomial-time malicious adversary whose goal is to disrupt and dest...

  6. Molecular scaffold analysis of natural products databases in the public domain.

    Science.gov (United States)

    Yongye, Austin B; Waddell, Jacob; Medina-Franco, José L

    2012-11-01

    Natural products represent important sources of bioactive compounds in drug discovery efforts. In this work, we compiled five natural products databases available in the public domain and performed a comprehensive chemoinformatic analysis focused on the content and diversity of the scaffolds with an overview of the diversity based on molecular fingerprints. The natural products databases were compared with each other and with a set of molecules obtained from in-house combinatorial libraries, and with a general screening commercial library. It was found that publicly available natural products databases have different scaffold diversity. In contrast to the common concept that larger libraries have the largest scaffold diversity, the largest natural products collection analyzed in this work was not the most diverse. The general screening library showed, overall, the highest scaffold diversity. However, considering the most frequent scaffolds, the general reference library was the least diverse. In general, natural products databases in the public domain showed low molecule overlap. In addition to benzene and acyclic compounds, flavones, coumarins, and flavanones were identified as the most frequent molecular scaffolds across the different natural products collections. The results of this work have direct implications in the computational and experimental screening of natural product databases for drug discovery.

  7. Integrating NASA's Land Analysis System (LAS) image processing software with an appropriate Geographic Information System (GIS): A review of candidates in the public domain

    Science.gov (United States)

    Rochon, Gilbert L.

    1989-01-01

    A user requirements analysis (URA) was undertaken to determine and appropriate public domain Geographic Information System (GIS) software package for potential integration with NASA's LAS (Land Analysis System) 5.0 image processing system. The necessity for a public domain system was underscored due to the perceived need for source code access and flexibility in tailoring the GIS system to the needs of a heterogenous group of end-users, and to specific constraints imposed by LAS and its user interface, Transportable Applications Executive (TAE). Subsequently, a review was conducted of a variety of public domain GIS candidates, including GRASS 3.0, MOSS, IEMIS, and two university-based packages, IDRISI and KBGIS. The review method was a modified version of the GIS evaluation process, development by the Federal Interagency Coordinating Committee on Digital Cartography. One IEMIS-derivative product, the ALBE (AirLand Battlefield Environment) GIS, emerged as the most promising candidate for integration with LAS. IEMIS (Integrated Emergency Management Information System) was developed by the Federal Emergency Management Agency (FEMA). ALBE GIS is currently under development at the Pacific Northwest Laboratory under contract with the U.S. Army Corps of Engineers' Engineering Topographic Laboratory (ETL). Accordingly, recommendations are offered with respect to a potential LAS/ALBE GIS linkage and with respect to further system enhancements, including coordination with the development of the Spatial Analysis and Modeling System (SAMS) GIS in Goddard's IDM (Intelligent Data Management) developments in Goddard's National Space Science Data Center.

  8. Daas: A Web-based System for User-specific Dietary Analysis and Advice for the Public Healthcare Domain

    Institute of Scientific and Technical Information of China (English)

    Deirdre Nugent; Kudakwashe Dube; Wu Bing

    2003-01-01

    This paper presents a Dietary Analysis and Advice System (DAAS), a web-based system for providing, within the public healthcare domain, user-specific diet advice based on a preliminary analysis of current diet or eating habits and lifestyle, using knowledge from domain expertise and experts' interpretation of national dietary guidelines.

  9. Open access high throughput drug discovery in the public domain: a Mount Everest in the making.

    Science.gov (United States)

    Roy, Anuradha; McDonald, Peter R; Sittampalam, Sitta; Chaguturu, Rathnam

    2010-11-01

    High throughput screening (HTS) facilitates screening large numbers of compounds against a biochemical target of interest using validated biological or biophysical assays. In recent years, a significant number of drugs in clinical trails originated from HTS campaigns, validating HTS as a bona fide mechanism for hit finding. In the current drug discovery landscape, the pharmaceutical industry is embracing open innovation strategies with academia to maximize their research capabilities and to feed their drug discovery pipeline. The goals of academic research have therefore expanded from target identification and validation to probe discovery, chemical genomics, and compound library screening. This trend is reflected in the emergence of HTS centers in the public domain over the past decade, ranging in size from modestly equipped academic screening centers to well endowed Molecular Libraries Probe Centers Network (MLPCN) centers funded by the NIH Roadmap initiative. These centers facilitate a comprehensive approach to probe discovery in academia and utilize both classical and cutting-edge assay technologies for executing primary and secondary screening campaigns. The various facets of academic HTS centers as well as their implications on technology transfer and drug discovery are discussed, and a roadmap for successful drug discovery in the public domain is presented. New lead discovery against therapeutic targets, especially those involving the rare and neglected diseases, is indeed a Mount Everestonian size task, and requires diligent implementation of pharmaceutical industry's best practices for a successful outcome.

  10. Domain Decomposition Strategy for Pin-wise Full-Core Monte Carlo Depletion Calculation with the Reactor Monte Carlo Code

    Directory of Open Access Journals (Sweden)

    Jingang Liang

    2016-06-01

    Full Text Available Because of prohibitive data storage requirements in large-scale simulations, the memory problem is an obstacle for Monte Carlo (MC codes in accomplishing pin-wise three-dimensional (3D full-core calculations, particularly for whole-core depletion analyses. Various kinds of data are evaluated and quantificational total memory requirements are analyzed based on the Reactor Monte Carlo (RMC code, showing that tally data, material data, and isotope densities in depletion are three major parts of memory storage. The domain decomposition method is investigated as a means of saving memory, by dividing spatial geometry into domains that are simulated separately by parallel processors. For the validity of particle tracking during transport simulations, particles need to be communicated between domains. In consideration of efficiency, an asynchronous particle communication algorithm is designed and implemented. Furthermore, we couple the domain decomposition method with MC burnup process, under a strategy of utilizing consistent domain partition in both transport and depletion modules. A numerical test of 3D full-core burnup calculations is carried out, indicating that the RMC code, with the domain decomposition method, is capable of pin-wise full-core burnup calculations with millions of depletion regions.

  11. Odyssey: A Public GPU-Based Code for General-Relativistic Radiative Transfer in Kerr Spacetime

    CERN Document Server

    Pu, Hung-Yi; Younsi, Ziri; Yoon, Suk-Jin

    2016-01-01

    General-relativistic radiative transfer (GRRT) calculations coupled with the calculation of geodesics in the Kerr spacetime are an essential tool for determining the images, spectra and light curves from matter in the vicinity of black holes. Such studies are especially important for ongoing and upcoming millimeter/submillimeter (mm/sub-mm) Very Long Baseline Interferometry (VLBI) observations of the supermassive black holes at the centres of Sgr A^{*} and M87. To this end we introduce Odyssey, a Graphics Processing Unit(GPU)-based code for ray tracing and radiative transfer in the Kerr spacetime. On a single GPU, the performance of Odyssey can exceed 1 nanosecond per photon, per Runge-Kutta integration step. Odyssey is publicly available, fast, accurate, and flexible enough to be modified to suit the specific needs of new users. Along with a Graphical User Interface (GUI) powered by a video-accelerated display architecture, we also present an educational software tool, Odyssey_Edu, for showing in real time h...

  12. Odyssey: A Public GPU-based Code for General Relativistic Radiative Transfer in Kerr Spacetime

    Science.gov (United States)

    Pu, Hung-Yi; Yun, Kiyun; Younsi, Ziri; Yoon, Suk-Jin

    2016-04-01

    General relativistic radiative transfer calculations coupled with the calculation of geodesics in the Kerr spacetime are an essential tool for determining the images, spectra, and light curves from matter in the vicinity of black holes. Such studies are especially important for ongoing and upcoming millimeter/submillimeter very long baseline interferometry observations of the supermassive black holes at the centers of Sgr A* and M87. To this end we introduce Odyssey, a graphics processing unit (GPU) based code for ray tracing and radiative transfer in the Kerr spacetime. On a single GPU, the performance of Odyssey can exceed 1 ns per photon, per Runge-Kutta integration step. Odyssey is publicly available, fast, accurate, and flexible enough to be modified to suit the specific needs of new users. Along with a Graphical User Interface powered by a video-accelerated display architecture, we also present an educational software tool, Odyssey_Edu, for showing in real time how null geodesics around a Kerr black hole vary as a function of black hole spin and angle of incidence onto the black hole.

  13. ODYSSEY: A PUBLIC GPU-BASED CODE FOR GENERAL RELATIVISTIC RADIATIVE TRANSFER IN KERR SPACETIME

    Energy Technology Data Exchange (ETDEWEB)

    Pu, Hung-Yi [Institute of Astronomy and Astrophysics, Academia Sinica, 11F of Astronomy-Mathematics Building, AS/NTU No. 1, Taipei 10617, Taiwan (China); Yun, Kiyun; Yoon, Suk-Jin [Department of Astronomy and Center for Galaxy Evolution Research, Yonsei University, Seoul 120-749 (Korea, Republic of); Younsi, Ziri [Institut für Theoretische Physik, Max-von-Laue-Straße 1, D-60438 Frankfurt am Main (Germany)

    2016-04-01

    General relativistic radiative transfer calculations coupled with the calculation of geodesics in the Kerr spacetime are an essential tool for determining the images, spectra, and light curves from matter in the vicinity of black holes. Such studies are especially important for ongoing and upcoming millimeter/submillimeter very long baseline interferometry observations of the supermassive black holes at the centers of Sgr A* and M87. To this end we introduce Odyssey, a graphics processing unit (GPU) based code for ray tracing and radiative transfer in the Kerr spacetime. On a single GPU, the performance of Odyssey can exceed 1 ns per photon, per Runge–Kutta integration step. Odyssey is publicly available, fast, accurate, and flexible enough to be modified to suit the specific needs of new users. Along with a Graphical User Interface powered by a video-accelerated display architecture, we also present an educational software tool, Odyssey-Edu, for showing in real time how null geodesics around a Kerr black hole vary as a function of black hole spin and angle of incidence onto the black hole.

  14. The Creative Commons. A Third Way between Public Domain and Community ?

    Directory of Open Access Journals (Sweden)

    Clément Bert-Erboul

    2016-04-01

    Full Text Available How have the Creative Commons’ ownership rules used by free websites like Wikipedia or Flickr and in 3D printer projects or in alternative kitchen gardens, been develo­ped? Internet users and technological experimentation communities rely heavily on these free tools, but the ideologies of the public domain and online communities that allowed their birth often remain obscure. In this article we used American legal doctri­ne, the scientific literature and specialized press archives. From these sources we analyzed the links between Copyright reforms and the institutionalization of the activity of free software developers, at the origin of Creative Commons licenses. The case of intangible goods property applied to tangibles goods shows how the community members and institutions legitimize their IT practices by means of several producers of norms, such as States or communities.

  15. Systematic analysis of public domain compound potency data identifies selective molecular scaffolds across druggable target families.

    Science.gov (United States)

    Hu, Ye; Wassermann, Anne Mai; Lounkine, Eugen; Bajorath, Jürgen

    2010-01-28

    Molecular scaffolds that yield target family-selective compounds are of high interest in pharmaceutical research. There continues to be considerable debate in the field as to whether chemotypes with a priori selectivity for given target families and/or targets exist and how they might be identified. What do currently available data tell us? We present a systematic and comprehensive selectivity-centric analysis of public domain target-ligand interactions. More than 200 molecular scaffolds are identified in currently available active compounds that are selective for established target families. A subset of these scaffolds is found to produce compounds with high selectivity for individual targets among closely related ones. These scaffolds are currently underrepresented in approved drugs.

  16. The international river interface cooperative: Public domain flow and morphodynamics software for education and applications

    Science.gov (United States)

    Nelson, Jonathan M.; Shimizu, Yasuyuki; Abe, Takaaki; Asahi, Kazutake; Gamou, Mineyuki; Inoue, Takuya; Iwasaki, Toshiki; Kakinuma, Takaharu; Kawamura, Satomi; Kimura, Ichiro; Kyuka, Tomoko; McDonald, Richard R.; Nabi, Mohamed; Nakatsugawa, Makoto; Simões, Francisco R.; Takebayashi, Hiroshi; Watanabe, Yasunori

    2016-07-01

    This paper describes a new, public-domain interface for modeling flow, sediment transport and morphodynamics in rivers and other geophysical flows. The interface is named after the International River Interface Cooperative (iRIC), the group that constructed the interface and many of the current solvers included in iRIC. The interface is entirely free to any user and currently houses thirteen models ranging from simple one-dimensional models through three-dimensional large-eddy simulation models. Solvers are only loosely coupled to the interface so it is straightforward to modify existing solvers or to introduce other solvers into the system. Six of the most widely-used solvers are described in detail including example calculations to serve as an aid for users choosing what approach might be most appropriate for their own applications. The example calculations range from practical computations of bed evolution in natural rivers to highly detailed predictions of the development of small-scale bedforms on an initially flat bed. The remaining solvers are also briefly described. Although the focus of most solvers is coupled flow and morphodynamics, several of the solvers are also specifically aimed at providing flood inundation predictions over large spatial domains. Potential users can download the application, solvers, manuals, and educational materials including detailed tutorials at www.-i-ric.org. The iRIC development group encourages scientists and engineers to use the tool and to consider adding their own methods to the iRIC suite of tools.

  17. The international river interface cooperative: Public domain flow and morphodynamics software for education and applications

    Science.gov (United States)

    Nelson, Jonathan M.; Shimizu, Yasuyuki; Abe, Takaaki; Asahi, Kazutake; Gamou, Mineyuki; Inoue, Takuya; Iwasaki, Toshiki; Kakinuma, Takaharu; Kawamura, Satomi; Kimura, Ichiro; Kyuka, Tomoko; McDonald, Richard R.; Nabi, Mohamed; Nakatsugawa, Makoto; Simoes, Francisco J.; Takebayashi, Hiroshi; Watanabe, Yasunori

    2016-01-01

    This paper describes a new, public-domain interface for modeling flow, sediment transport and morphodynamics in rivers and other geophysical flows. The interface is named after the International River Interface Cooperative (iRIC), the group that constructed the interface and many of the current solvers included in iRIC. The interface is entirely free to any user and currently houses thirteen models ranging from simple one-dimensional models through three-dimensional large-eddy simulation models. Solvers are only loosely coupled to the interface so it is straightforward to modify existing solvers or to introduce other solvers into the system. Six of the most widely-used solvers are described in detail including example calculations to serve as an aid for users choosing what approach might be most appropriate for their own applications. The example calculations range from practical computations of bed evolution in natural rivers to highly detailed predictions of the development of small-scale bedforms on an initially flat bed. The remaining solvers are also briefly described. Although the focus of most solvers is coupled flow and morphodynamics, several of the solvers are also specifically aimed at providing flood inundation predictions over large spatial domains. Potential users can download the application, solvers, manuals, and educational materials including detailed tutorials at www.-i-ric.org. The iRIC development group encourages scientists and engineers to use the tool and to consider adding their own methods to the iRIC suite of tools.

  18. Addressing Hate Speech and Hate Behaviors in Codes of Conduct: A Model for Public Institutions.

    Science.gov (United States)

    Neiger, Jan Alan; Palmer, Carolyn; Penney, Sophie; Gehring, Donald D.

    1998-01-01

    As part of a larger study, researchers collected campus codes prohibiting hate crimes, which were then reviewed to determine whether the codes presented constitutional problems. Based on this review, the authors develop and present a model policy that is content neutral and does not use language that could be viewed as unconstitutionally vague or…

  19. Project of decree relative to the licensing and statement system of nuclear activities and to their control and bearing various modifications of the public health code and working code; Projet de decret relatif au regime d'autorisation et de declaration des activites nucleaires et a leur controle et portant diverses modifications du code de la sante publique et du code du travail

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This decree concerns the control of high level sealed radioactive sources and orphan sources. It has for objective to introduce administrative simplification, especially the radiation sources licensing and statement system, to reinforce the control measures planed by the public health code and by the employment code, to bring precision and complements in the editing of several already existing arrangements. (N.C.)

  20. Assessing water availability over peninsular Malaysia using public domain satellite data products

    Science.gov (United States)

    Ali, M. I.; Hashim, M.; Zin, H. S. M.

    2014-02-01

    Water availability monitoring is an essential task for water resource sustainability and security. In this paper, the assessment of satellite remote sensing technique for determining water availability is reported. The water-balance analysis is used to compute the spatio-temporal water availability with main inputs; the precipitation and actual evapotranspiration rate (AET), both fully derived from public-domain satellite products of Tropical Rainfall Measurement Mission (TRMM) and MODIS, respectively. Both these satellite products were first subjected to calibration to suit corresponding selected local precipitation and AET samples. Multi-temporal data sets acquired 2000-2010 were used in this study. The results of study, indicated strong agreement of monthly water availability with the basin flow rate (r2 = 0.5, p < 0.001). Similar agreements were also noted between the estimated annual average water availability with the in-situ measurement. It is therefore concluded that the method devised in this study provide a new alternative for water availability mapping over large area, hence offers the only timely and cost-effective method apart from providing comprehensive spatio-temporal patterns, crucial in water resource planning to ensure water security.

  1. Public domain small-area cancer incidence data for New York State, 2005-2009

    Directory of Open Access Journals (Sweden)

    Francis P. Boscoe

    2016-04-01

    Full Text Available There has long been a demand for cancer incidence data at a fine geographic resolution for use in etiologic hypothesis generation and testing, methodological evaluation and teaching. In this paper we describe a public domain dataset containing data for 23 anatomic sites of cancer diagnosed in New York State, USA between 2005 and 2009 at the census block group level. The dataset includes 524,503 tumours distributed across 13,823 block groups with an average population of about 1400. In addition, the data have been linked with race/ethnicity and with socioeconomic indicators such as income, educational attainment and language proficiency. We demonstrate the application of the dataset by confirming two well-established relationships: that between breast cancer and median household income and that between stomach cancer and Asian race. We foresee that this dataset will serve as the basis for a wide range of spatial analyses and as a benchmark for evaluating spatial methods in the future.

  2. Preserving Madagascar's Natural Heritage: The Importance of Keeping the Island's Vertebrate Fossils in the Public Domain

    Directory of Open Access Journals (Sweden)

    Karen E. Samonds

    2006-12-01

    Full Text Available The origin of Madagascar’s highly endemic vertebrate fauna remains one of the great unsolved mysteries of natural history. From what landmasses did the basal stocks of this unique and imbalanced fauna come? When and how did the ancestral populations arrive on the island? How rapidly did they diversify, and why? The most direct means of addressing these questions, and other enigmas concerning the evolutionary and biogeographic history of Madagascar’s vertebrate fauna, is through discovery of fossils from a sequence of well-dated geological horizons. Many fossils relevant to these queries have been discovered by paleontologists in recent years ... but many more are being lost to commercial enterprises, both foreign and domestic, that have little or no regard for the scientific significance of fossils. The objectives of this essay are to 1 provide an overview of Madagascar’s vertebrate fossil record and its importance, 2 raise awareness concerning the illegal collection, exportation, and sale of vertebrate fossils, and 3 stress the importance of keeping vertebrate fossils from the island in the public domain. In light of these issues, we underscore the necessity for development of adequate repositories and support infrastructure in Madagascar to safeguard and display the country’s vertebrate fossil collections; doing so would ensure the preservation and appreciation of Madagascar’s rich natural heritage for future generations of scientists and Malagasy citizens alike.

  3. A simple technique for morphological measurement of cerebral arterial circle variations using public domain software (Osiris).

    Science.gov (United States)

    Ansari, Saeed; Dadmehr, Majid; Eftekhar, Behzad; McConnell, Douglas J; Ganji, Sarah; Azari, Hassan; Kamali-Ardakani, Shahab; Hoh, Brian L; Mocco, J

    2011-12-01

    This article describes a straightforward method to measure the dimensions and identify morphological variations in the cerebral arterial circle using the general-purpose software program Osiris. This user-friendly and portable program displays, manipulates, and analyzes medical digital images, and it has the capability to determine morphometric properties of selected blood vessels (or other anatomical structures) in humans and animals. To ascertain morphometric variations in the cerebral arterial circle, 132 brains of recently deceased fetuses, infants, and adults were dissected. The dissection procedure was first digitized, and then the dimensions were measured with Osiris software. Measurements of each vessel's length and external diameters were used to identify and classify morphological variations in the cerebral arterial circle. The most commonly observed anatomical variations were uni- and bilateral hypoplasia of the posterior communicating artery. This study demonstrates that public domain software can be used to measure and classify cerebral arterial circle vessels. This method could be extended to examine other anatomical regions or to study other animals. Additionally, knowledge of variations within the circle could be applied clinically to enhance diagnostic and treatment specificity.

  4. Developing a personal computer-based data visualization system using public domain software

    Science.gov (United States)

    Chen, Philip C.

    1999-03-01

    The current research will investigate the possibility of developing a computing-visualization system using a public domain software system built on a personal computer. Visualization Toolkit (VTK) is available on UNIX and PC platforms. VTK uses C++ to build an executable. It has abundant programming classes/objects that are contained in the system library. Users can also develop their own classes/objects in addition to those existing in the class library. Users can develop applications with any of the C++, Tcl/Tk, and JAVA environments. The present research will show how a data visualization system can be developed with VTK running on a personal computer. The topics will include: execution efficiency; visual object quality; availability of the user interface design; and exploring the feasibility of the VTK-based World Wide Web data visualization system. The present research will feature a case study showing how to use VTK to visualize meteorological data with techniques including, iso-surface, volume rendering, vector display, and composite analysis. The study also shows how the VTK outline, axes, and two-dimensional annotation text and title are enhancing the data presentation. The present research will also demonstrate how VTK works in an internet environment while accessing an executable with a JAVA application programing in a webpage.

  5. The public understanding of nanotechnology in the food domain: the hidden role of views on science, technology, and nature.

    Science.gov (United States)

    Vandermoere, Frederic; Blanchemanche, Sandrine; Bieberstein, Andrea; Marette, Stephan; Roosen, Jutta

    2011-03-01

    In spite of great expectations about the potential of nanotechnology, this study shows that people are rather ambiguous and pessimistic about nanotechnology applications in the food domain. Our findings are drawn from a survey of public perceptions about nanotechnology food and nanotechnology food packaging (N = 752). Multinomial logistic regression analyses further reveal that knowledge about food risks and nanotechnology significantly influences people's views about nanotechnology food packaging. However, knowledge variables were unrelated to support for nanofood, suggesting that an increase in people's knowledge might not be sufficient to bridge the gap between the excitement some business leaders in the food sector have and the restraint of the public. Additionally, opposition to nanofood was not related to the use of heuristics but to trust in governmental agencies. Furthermore, the results indicate that public perceptions of nanoscience in the food domain significantly relate to views on science, technology, and nature.

  6. Sources of financial pressure and up coding behavior in French public hospitals.

    Science.gov (United States)

    Georgescu, Irène; Hartmann, Frank G H

    2013-05-01

    Drawing upon role theory and the literature concerning unintended consequences of financial pressure, this study investigates the effects of health care decision pressure from the hospital's administration and from the professional peer group on physician's inclination to engage in up coding. We explore two kinds of up coding, information-related and action-related, and develop hypothesis that connect these kinds of data manipulation to the sources of pressure via the intermediate effect of role conflict. Qualitative data from initial interviews with physicians and subsequent questionnaire evidence from 578 physicians in 14 French hospitals suggest that the source of pressure is a relevant predictor of physicians' inclination to engage in data-manipulation. We further find that this effect is partly explained by the extent to which these pressures create role conflict. Given the concern about up coding in treatment-based reimbursement systems worldwide, our analysis adds to understanding how the design of the hospital's management control system may enhance this undesired type of behavior.

  7. Optical noise-free image encryption based on quick response code and high dimension chaotic system in gyrator transform domain

    Science.gov (United States)

    Sui, Liansheng; Xu, Minjie; Tian, Ailing

    2017-04-01

    A novel optical image encryption scheme is proposed based on quick response code and high dimension chaotic system, where only the intensity distribution of encoded information is recorded as ciphertext. Initially, the quick response code is engendered from the plain image and placed in the input plane of the double random phase encoding architecture. Then, the code is encrypted to the ciphertext with noise-like distribution by using two cascaded gyrator transforms. In the process of encryption, the parameters such as rotation angles and random phase masks are generated as interim variables and functions based on Chen system. A new phase retrieval algorithm is designed to reconstruct the initial quick response code in the process of decryption, in which a priori information such as three position detection patterns is used as the support constraint. The original image can be obtained without any energy loss by scanning the decrypted code with mobile devices. The ciphertext image is the real-valued function which is more convenient for storing and transmitting. Meanwhile, the security of the proposed scheme is enhanced greatly due to high sensitivity of initial values of Chen system. Extensive cryptanalysis and simulation have performed to demonstrate the feasibility and effectiveness of the proposed scheme.

  8. HCV IRES domain IIb affects the configuration of coding RNA in the 40S subunit's decoding groove.

    Science.gov (United States)

    Filbin, Megan E; Kieft, Jeffrey S

    2011-07-01

    Hepatitis C virus (HCV) uses a structured internal ribosome entry site (IRES) RNA to recruit the translation machinery to the viral RNA and begin protein synthesis without the ribosomal scanning process required for canonical translation initiation. Different IRES structural domains are used in this process, which begins with direct binding of the 40S ribosomal subunit to the IRES RNA and involves specific manipulation of the translational machinery. We have found that upon initial 40S subunit binding, the stem-loop domain of the IRES that contains the start codon unwinds and adopts a stable configuration within the subunit's decoding groove. This configuration depends on the sequence and structure of a different stem-loop domain (domain IIb) located far from the start codon in sequence, but spatially proximal in the IRES•40S complex. Mutation of domain IIb results in misconfiguration of the HCV RNA in the decoding groove that includes changes in the placement of the AUG start codon, and a substantial decrease in the ability of the IRES to initiate translation. Our results show that two distal regions of the IRES are structurally communicating at the initial step of 40S subunit binding and suggest that this is an important step in driving protein synthesis.

  9. 版权法上的公共领域研究%On public domain in copyright law

    Institute of Scientific and Technical Information of China (English)

    黄汇

    2009-01-01

    Public domain is a core rule of copyright law, under which various creative materials are available for an author to use without charge or liability for infringement, hence ensuring the effective implementation of copyright law.Public domain is characterized by openness, public ownership, irrevocability and formality. Based on the premise that the author's work will not be interfered, public domain ultimately aims at the enlargement of its own universe and prosperity of the culture of human society. Its introduction into copyright law satisfies both historical and logical demands. Without its acknowledgement,copyright cannot be justified. In that sense, public domain and copyright can be deemed as twins. Public domain is not only an existing institution, but also an ideological tendency or a methodology. It has evaluative and inspective values towards copyright. It is an important precondition of copy-rights, and what is more, an important measure for controlling the expansion and realizing the purpose of copyright.%公共领域是版权法的核心,它是保证作者有效运用各种创作素材从而使版权的其余部分得以良好运转的工具.公共领域具有开放性、有主性、不可撤销性和程序性等特征,它以保证作者的创作为前提,却最终以自身的不断扩大和人类社会的文化繁衍为依归.公共领域在版权法上的生成既是历史的,更是逻辑的.没有公共领域的被承认,也就没有版权的正当性可言,因此公共领域和版权实际上一同诞生.公共领域不仅是一种制度存在物,它更是一种思想倾向和方法论,公共领域对版权具有评价和检视功能,它既是版权运行的重要前提,又是控制版权扩张和实现版权目的的重要手段.

  10. Extending a serial 3D two-phase CFD code to parallel execution over MPI by using the PETSc library for domain decomposition

    CERN Document Server

    Ervik, Åsmund; Müller, Bernhard

    2014-01-01

    To leverage the last two decades' transition in High-Performance Computing (HPC) towards clusters of compute nodes bound together with fast interconnects, a modern scalable CFD code must be able to efficiently distribute work amongst several nodes using the Message Passing Interface (MPI). MPI can enable very large simulations running on very large clusters, but it is necessary that the bulk of the CFD code be written with MPI in mind, an obstacle to parallelizing an existing serial code. In this work we present the results of extending an existing two-phase 3D Navier-Stokes solver, which was completely serial, to a parallel execution model using MPI. The 3D Navier-Stokes equations for two immiscible incompressible fluids are solved by the continuum surface force method, while the location of the interface is determined by the level-set method. We employ the Portable Extensible Toolkit for Scientific Computing (PETSc) for domain decomposition (DD) in a framework where only a fraction of the code needs to be a...

  11. 78 FR 6811 - Country Code Top-Level Domain (ccTLD) for the United States; Policies and Requirements; Comments...

    Science.gov (United States)

    2013-01-31

    ... development for the usTLD space. Background Country code TLDs (ccTLDs) are two-letter suffixes based on the... using this locality name such as tourism.ci.baltimore.md.us to be operated by local registrants. The us... into the development of policies and processes is an important component to the management...

  12. ACUTRI: a computer code for assessing doses to the general public due to acute tritium releases

    Energy Technology Data Exchange (ETDEWEB)

    Yokoyama, Sumi; Noguchi, Hiroshi [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment; Ryufuku, Susumu; Sasaki, Toshihisa; Kurosawa, Naohiro [Visible Information Center, Inc., Tokai, Ibaraki (Japan)

    2002-11-01

    Tritium, which is used as a fuel of a D-T burning fusion reactor, is the most important radionuclide for the safety assessment of a nuclear fusion experimental reactor such as ITER. Thus, a computer code, ACUTRI, which calculates the radiological impact of tritium released accidentally to the atmosphere, has been developed, aiming to be of use in a discussion of licensing of a fusion experimental reactor and an environmental safety evaluation method in Japan. ACUTRI calculates an individual tritium dose based on transfer models specific to tritium in the environment and ICRP dose models. In this calculation it is also possible to analyze statistically on meteorology in the same way as a conventional dose assessment method according to the meteorological guide of the Nuclear Safety Commission of Japan. A Gaussian plume model is used for calculating the atmospheric dispersion of tritium gas (HT) and/or tritiated water (HTO). The environmental pathway model in ACUTRI considers the following internal exposures: inhalation from a primary plume (HT and/or HTO) released from the facilities and inhalation from a secondary plume (HTO) reemitted from the ground following deposition of HT and HTO. This report describes an outline of the ACUTRI code, a user guide and the results of test calculation. (author)

  13. Dress Codes Blues: An Exploration of Urban Students' Reactions to a Public High School Uniform Policy

    Science.gov (United States)

    DaCosta, Kneia

    2006-01-01

    This qualitative investigation explores the responses of 22 U.S. urban public high school students when confronted with their newly imposed school uniform policy. Specifically, the study assessed students' appraisals of the policy along with compliance and academic performance. Guided by ecological human development perspectives and grounded in…

  14. ACUTRI a computer code for assessing doses to the general public due to acute tritium releases

    CERN Document Server

    Yokoyama, S; Noguchi, H; Ryufuku, S; Sasaki, T

    2002-01-01

    Tritium, which is used as a fuel of a D-T burning fusion reactor, is the most important radionuclide for the safety assessment of a nuclear fusion experimental reactor such as ITER. Thus, a computer code, ACUTRI, which calculates the radiological impact of tritium released accidentally to the atmosphere, has been developed, aiming to be of use in a discussion of licensing of a fusion experimental reactor and an environmental safety evaluation method in Japan. ACUTRI calculates an individual tritium dose based on transfer models specific to tritium in the environment and ICRP dose models. In this calculation it is also possible to analyze statistically on meteorology in the same way as a conventional dose assessment method according to the meteorological guide of the Nuclear Safety Commission of Japan. A Gaussian plume model is used for calculating the atmospheric dispersion of tritium gas (HT) and/or tritiated water (HTO). The environmental pathway model in ACUTRI considers the following internal exposures: i...

  15. Improved Frequency Domain Parallel Code Acquisition Algorithm for GPS Signal%GPS频域并行码捕获改进算法

    Institute of Scientific and Technical Information of China (English)

    赵丽; 陈小惠; 潘树国

    2011-01-01

    This paper proposes an improved frequency domain parallel code acquisition algorithm for GPS LI signal, which could overcome poor acquisition real-time of GPS software receiver based on FPGA. According to the frequency domain parallel code acquisition algorithm, the improved algorithm samples 5 714 points of data to 1 024 points during one period using average sampling technique. Subsequently, we utilize Altera FFT IP core to work out Fourier transform of 1024 points of data. Simulation experiment implemented to test the optimized algorithm by using ModelSim simulator. Simulation results indicate that the proposed approach could obviously reduce the calculating amount and largely increase acquisition speed. It doesn't affect the final result of tracking process because only a little C/A code phase errors exist.%针对基于FPGA平台的GPS L1信号的软件接收机捕获实时性差的问题,设计并实现了改进的GPS信号频域并行码相位捕获算法.首先分析了频域并行码相位捕获的理论模型,在此基础上采用平均采样方法对5 714点的数据进行下采样,平均采样后为1 024点,用Altera FFT IP核实现1 024点数据的FFT计算,实现算法的改进.利用ModelSim进行了仿真,仿真结果表明改进的算法降低了运算量,极大地提高了捕获速度,尽管平均采样造成了一定的C/A码相位误差,但不影响跟踪的结果,保证了捕获的正确性.

  16. PARAVT: Parallel Voronoi tessellation code

    Science.gov (United States)

    González, R. E.

    2016-10-01

    In this study, we present a new open source code for massive parallel computation of Voronoi tessellations (VT hereafter) in large data sets. The code is focused for astrophysical purposes where VT densities and neighbors are widely used. There are several serial Voronoi tessellation codes, however no open source and parallel implementations are available to handle the large number of particles/galaxies in current N-body simulations and sky surveys. Parallelization is implemented under MPI and VT using Qhull library. Domain decomposition takes into account consistent boundary computation between tasks, and includes periodic conditions. In addition, the code computes neighbors list, Voronoi density, Voronoi cell volume, density gradient for each particle, and densities on a regular grid. Code implementation and user guide are publicly available at https://github.com/regonzar/paravt.

  17. Domain of the Gods: Do traditional beliefs hinder public acceptance of the human role in climate change?

    Science.gov (United States)

    Donner, S.

    2008-12-01

    Public acceptance of new scientific discoveries like natural selection, plate tectonics, or the human role in climate change naturally lags behind the pace of the discoveries. In the case of climate change, unease or outright rejection of the scientific evidence for the role of human activity in climate change has been a hindrance to mitigation and adaptation efforts. This skepticism is normally attributed to everything from the quality of science education, to disinformation campaigns by representatives of the coal and gas industry, to individual resistance to behavioral change, to the nature of the modern information culture. This skepticism of scientific evidence for climate change, though often inspired by politics, economics and the particular dynamics of climate change, may actually be rooted in ancient beliefs that the climate is beyond the influence of humans. In this presentation, I will outline how the notion that humans control or influence the weather runs contrary to thousands of years of belief in a separation between the earth - the domain of man - and sky - the domain of the gods. Evidence from religious history, traditional villages in the Pacific (Fjij and Kiribati) and from public discourse in North America all indicates that the millennia-old belief in an earth-sky separation hinders people's acceptance that human activity is affecting the climate. The human role in climate change therefore represents a substantial paradigm shift, similar to the role of natural selection in human evolution. These deep roots of climate change skepticism must be factored into public climate change education efforts.

  18. TURBO AIDED CYCLIC PREFIX RECONSTRUCTION FOR CODED SINGLE-CARRIER SYSTEMS WITH FREQUENCY-DOMAIN EQUALIZATION (SC-FDE)

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In this paper, a Turbo aided Cyclic Prefix (CP) reconstruction scheme, termed Turbo-CPR, is proposed for Single-Carrier systems with Frequency-Domain Equalization (SC-FDE) that employ insufficient CP in the transmitter. In Turbo-CPR, the decoder output is incorporated in the process of equalization, i.e. Turbo equalizer is employed. It is shown in the simulation results that Turbo-CPR not only recovers the performance loss due to insufficiency of CP, but also provides extra gains over the lower bound of performance for conventional CP reconstruction schemes.

  19. The Maritime Public Domain - concept and implementation in diferent national legal systems.

    Directory of Open Access Journals (Sweden)

    Marco Gameiro Antunes

    2014-05-01

    The paper will also describe how the ownership (public vs. private of coastal and estuarine margins is seen in some legal systems, considering the contribution of MPD to the protection of estuarine water and to the biodiversity resources.

  20. 32 CFR 705.35 - Armed Forces participation in events in the public domain.

    Science.gov (United States)

    2010-07-01

    ... Department of Defense to ensure compliance with public law, to assure equitable distribution of resources to... primary attraction. (4) Armed Forces participation is authorized in a fund-raising event only when the...

  1. [Standard legal regulation and creation of a law code as the most important stage of public health reformation].

    Science.gov (United States)

    Gerasimenko, N F; Grigor'ev, Iu I

    2002-01-01

    The significance of a law-making process is substantially increasing under the conditions of intensified expansion of the scope of standard legal regulation in the field of human health care in the Russian Federation. The authors state that any law-making process should begin with the definition of the subject-matter of a future law, its role and value in medical law creation and also indicate that the choice of the subject-matter of a future law is of priority and the most important stage of its preparation from the points of both contents-rich and standard legal views. Moreover, the paper presents main groups of issues that can determine the subjects of sociomedical laws and states the basic rules how reflect systemic relations in legislation. The paper shows it important to create a code of laws in the field of health protection for legal assurance of health public reforms.

  2. Citing National Publications as a metrics for localization of Science: A Study on Scholar Journals of Social Science Domain in Iran from 2002 to 2010

    Directory of Open Access Journals (Sweden)

    Mohammad Tavakolizadeh-Ravari

    2015-02-01

    Conclusion: Based on this metric, the tendency toward the use of national publications in the social science domain is constant despite the number of scientific productions is growing in Iran. This means that the Iranian social science domain not only doesn’t tend to the science localization but its use of foreign science is growing in the span of time as well.

  3. Changing Perceptions of Homesteading as a Policy of Public Domain Disposal

    Science.gov (United States)

    Edwards, Richard

    2009-01-01

    The inspiring story of homesteaders claiming free land and realizing their dreams became one of the enduring narratives of American history. But scholars who have studied homesteading have often been much more ambivalent, even harshly negative, about how successful it was in practice. While the public often views our history differently from…

  4. Digital Watermarking based on Fractal Coding in Wavelet Domain%小波域分形编码数字水印的研究

    Institute of Scientific and Technical Information of China (English)

    李杨; 都思丹

    2006-01-01

    Digital watermarking technology has attracted a great deal of attention in recent years,because watermarking is good way to protect the intellectual property rights of digital media. The information carried by the watermark can be accessed by using a detection algorithm with the secret key provided. An important property of a watermarking is its robustness with respect to image distortions.This means that the watermark should be readable from images that undergo common image processing operations, such as filtering, lossy compression, noise adding, histogram manipulation, and various geometrical transformations. The fractal theory has proved to be suitable in the field of image coding and watermarking. In general terms, a fractal coder exploits the spatial redundancy within the images by establishing a relationship among its similar parts. It is assumed that many objects can be closely approximated by self-similarity objects that might be generated by use of Iterated Function System (IFS) transformations. According this assumption, the IFS can be seen as a relationship between the whole image and its parts. Thus the main problem is how to find a set of transformations to describe the relationship, in other words, how to define the IFS. Employing the invariant parameters of the fractal transformation, the watermark embedded into the original image can be extracted form the retrieved image. But mosaic effect and bad image quality can be brought by fractal transformation in spatial domain.A novel digital image watermarking method based on fractal coding-decoding and wavelet transformation is presented in this paper. A fractal coding-decoding algorithm in the coefficients of detail images in wavelet domain is presented and studied. On the basis of it, a watermarking scheme is proposed. The watermarking method uses the fractal code which is generated by calculating an Iterated Function System from the detail image. Employing the invariance of the Iterated Function

  5. 41 CFR 102-75.100 - When an agency holds land withdrawn or reserved from the public domain and determines that it no...

    Science.gov (United States)

    2010-07-01

    ... land withdrawn or reserved from the public domain and determines that it no longer needs this land, what must it do? 102-75.100 Section 102-75.100 Public Contracts and Property Management Federal... it no longer needs this land, what must it do? An agency holding unneeded land withdrawn or...

  6. Asthma in Urban Children: Epidemiology, Environmental Risk Factors, and the Public Health Domain.

    Science.gov (United States)

    Milligan, Ki Lee; Matsui, Elizabeth; Sharma, Hemant

    2016-04-01

    Asthma is the most commonly reported chronic condition of childhood in developed countries, with 6.5 million children affected in the USA. A disparate burden of childhood asthma is seen among socioeconomically disadvantaged youth, often concentrated in urban areas with high poverty rates. Host factors that predispose a child to asthma include atopy, male gender, parental history of asthma, and also race, ethnicity, and genetic and epigenetic susceptibilities. Environmental factors, such as improved hygiene, ambient air pollution, and early life exposures to microbes and aeroallergens, also influence the development of asthma. With greater than 90% of time spent indoors, home exposures (such as cockroach, rodent, and indoor air pollution) are highly relevant for urban asthma. Morbidity reduction may require focused public health initiatives for environmental intervention in high priority risk groups and the addition of immune modulatory agents in children with poorly controlled disease.

  7. Collection of regulatory texts relative to radiation protection. Part 2: orders and decisions taken in application of the Public Health Code and Labour Code concerning the protection of populations, patients and workers against the risks of ionizing radiations; Recueil de textes reglementaires relatifs a la radioprotection. Partie 2: arretes et decisions pris en application du Code de Sante Publique et du Code du Travail concernant la protection de la population, des patients et des travailleurs contre les dangers des rayonnements ionisants

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-05-15

    This collection of texts includes the general measures of population protection, exposure to natural radiations, general system of authorizations and statements, protection of persons exposed to ionizing radiations for medical purpose, situations of radiological emergency and long exposure to ionizing radiations, penal dispositions, application of the Public Health code and application of the Labour code. Chronological contents by date of publication is given. (N.C.)

  8. Development of mooring-anchor program in public domain for coupling with floater program for FOWTs (Floating Offshore Wind Turbines)

    Energy Technology Data Exchange (ETDEWEB)

    Kim, MooHyun [American Bureau of Shipping (ABS), Houston, TX (United States)

    2014-08-01

    This report presents the development of offshore anchor data sets which are intended to be used to develop a database that allows preliminary selection and sizing of anchors for the conceptual design of floating offshore wind turbines (FOWTs). The study is part of a project entitled “Development of Mooring-Anchor Program in Public Domain for Coupling with Floater Program for FOWTs (Floating Offshore Wind Turbines)”, under the direction of Dr. Moo-Hyun Kim at the Texas A&M University and with the sponsorship from the US Department of Energy (Contract No. DE-EE0005479, CFDA # 81.087 for DE-FOA-0000415, Topic Area 1.3: Subsurface Mooring and Anchoring Dynamics Models).

  9. Open window: when easily identifiable genomes and traits are in the public domain.

    Directory of Open Access Journals (Sweden)

    Misha Angrist

    Full Text Available "One can't be of an enquiring and experimental nature, and still be very sensible."--Charles Fort. As the costs of personal genetic testing "self-quantification" fall, publicly accessible databases housing people's genotypic and phenotypic information are gradually increasing in number and scope. The latest entrant is openSNP, which allows participants to upload their personal genetic/genomic and self-reported phenotypic data. I believe the emergence of such open repositories of human biological data is a natural reflection of inquisitive and digitally literate people's desires to make genomic and phenotypic information more easily available to a community beyond the research establishment. Such unfettered databases hold the promise of contributing mightily to science, science education and medicine. That said, in an age of increasingly widespread governmental and corporate surveillance, we would do well to be mindful that genomic DNA is uniquely identifying. Participants in open biological databases are engaged in a real-time experiment whose outcome is unknown.

  10. Evolution of Industry Knowledge in the Public Domain: Prior Art Searching for Software Patents

    Directory of Open Access Journals (Sweden)

    Jinseok Park

    2005-03-01

    Full Text Available Searching prior art is a key part of the patent application and examination processes. A comprehensive prior art search gives the inventor ideas as to how he can improve or circumvent existing technology by providing up to date knowledge on the state of the art. It also enables the patent applicant to minimise the likelihood of an objection from the patent office. This article explores the characteristics of prior art associated with software patents, dealing with difficulties in searching prior art due to the lack of resources, and considers public contribution to the formation of prior art databases. It addresses the evolution of electronic prior art in line with technological development, and discusses laws and practices in the EPO, USPTO, and the JPO in relation to the validity of prior art resources on the Internet. This article also investigates the main features of searching sources and tools in the three patent offices as well as non-patent literature databases. Based on the analysis of various searching databases, it provides some strategies of efficient prior art searching that should be considered for software-related inventions.

  11. Monitoring Urban Tree Cover Using Object-Based Image Analysis and Public Domain Remotely Sensed Data

    Directory of Open Access Journals (Sweden)

    Meghan Halabisky

    2011-10-01

    Full Text Available Urban forest ecosystems provide a range of social and ecological services, but due to the heterogeneity of these canopies their spatial extent is difficult to quantify and monitor. Traditional per-pixel classification methods have been used to map urban canopies, however, such techniques are not generally appropriate for assessing these highly variable landscapes. Landsat imagery has historically been used for per-pixel driven land use/land cover (LULC classifications, but the spatial resolution limits our ability to map small urban features. In such cases, hyperspatial resolution imagery such as aerial or satellite imagery with a resolution of 1 meter or below is preferred. Object-based image analysis (OBIA allows for use of additional variables such as texture, shape, context, and other cognitive information provided by the image analyst to segment and classify image features, and thus, improve classifications. As part of this research we created LULC classifications for a pilot study area in Seattle, WA, USA, using OBIA techniques and freely available public aerial photography. We analyzed the differences in accuracies which can be achieved with OBIA using multispectral and true-color imagery. We also compared our results to a satellite based OBIA LULC and discussed the implications of per-pixel driven vs. OBIA-driven field sampling campaigns. We demonstrated that the OBIA approach can generate good and repeatable LULC classifications suitable for tree cover assessment in urban areas. Another important finding is that spectral content appeared to be more important than spatial detail of hyperspatial data when it comes to an OBIA-driven LULC.

  12. Cloning and characterization of a cDNA coding for the lipoprotein-associated coagulation inhibitor shows that it consists of three tandem Kunitz-type inhibitory domains

    Energy Technology Data Exchange (ETDEWEB)

    Wun, T.C.; Kretzmer, K.K.; Girard, T.J.; Miletich, J.P.; Broze, G.J. Jr.

    1988-05-05

    Human plasma contains a lipoprotein-associated coagulation inhibitor (LACI) which inactivates factor X/sub a/ directly, and in a X/sub a/-dependent fashion also inhibits the VII/sub a/-tissue factor complex of the extrinsic coagulation pathway. Rabbit polyclonal anti-LACI antiserum was used to screen human placental and fetal liver lambdagt11 cDNA libraries for the expression of LACI antigens. Immunologically positive clones were further tested for their ability to bind /sup 125/I-factor X/sub a/. Seven clones were obtained which are immunologically and functionally active. The longest cDNA insert (lambdaP9) of these isolates is 1.4 kilobases (kb) while other clones are 1.0 kb in length. Nucleotide sequence analysis shows that lambdaP9 consists of 1431 bases that include a 5'-noncoding sequence of 132 nucleotides, an open reading frame of 912 nucleotides, and a 3'-noncoding region of 387 nucleotides. The predicted sequence of mature LACI contains 18 cysteines and three potential N-linked glycosylation sites. The amino acid sequence analysis of purified LACI's NH/sub 2/ terminus and two of its proteolytic fragments match exactly those deduced from the cDNA sequence, indicating that the cDNA codes for LACI. The translated amino acid sequence of LACI shows several discernible domains, including a highly negatively charged NH/sub 2/ terminus, three tandem Kunitz-type inhibitory domains, and a highly positively charged carboxyl terminus. Northern blot analysis shows that the following liver-derived cell lines, Chang liver, HepG2 hepatoma, and SK hepatoma all, contain two major species of mRNA which hybridize with LACI cDNA.

  13. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...

  14. Use of media and public-domain Internet sources for detection and assessment of plant health threats

    Directory of Open Access Journals (Sweden)

    David M. Hartley

    2011-09-01

    Full Text Available Event-based biosurveillance is a recognized approach to early warning and situational awareness of emerging health threats. In this study, we build upon previous human and animal health work to develop a new approach to plant pest and pathogen surveillance. We show that monitoring public domain electronic media for indications and warning of epidemics and associated social disruption can provide information about the emergence and progression of plant pest infestation or disease outbreak. The approach is illustrated using a case study, which describes a plant pest and pathogen epidemic in China and Vietnam from February 2006 to December 2007, and the role of ducks in contributing to zoonotic virus spread in birds and humans. This approach could be used as a complementary method to traditional plant pest and pathogen surveillance to aid global and national plant protection officials and political leaders in early detection and timely response to significant biological threats to plant health, economic vitality, and social stability. This study documents the inter-relatedness of health in human, animal, and plant populations and emphasizes the importance of plant health surveillance.

  15. How Large Is the "Public Domain"? A Comparative Analysis of Ringer's 1961 Copyright Renewal Study and HathiTrust CRMS Data

    Science.gov (United States)

    Wilkin, John P.

    2017-01-01

    The 1961 Copyright Office study on renewals, authored by Barbara Ringer, has cast an outsized influence on discussions of the U.S. 1923-1963 public domain. As more concrete data emerge from initiatives such as the large-scale determination process in the Copyright Review Management System (CRMS) project, questions are raised about the reliability…

  16. 整数小波域湿纸码自适应信息隐藏算法%Wet Paper Code Based Adaptive Steganography in IWT Domain

    Institute of Scientific and Technical Information of China (English)

    奚玲; 平西建; 张涛

    2011-01-01

    By analyzing the security of some nowadays adaptive steganographies, a new wet paper code ( WPC) based adaptive steganography in IWT domain is proposed in order to enhance the security. The scheme calculates the threshold according to the quantity of the secrete message and the cover element's characteristic, then adaptively chooses the complex texture region as embedding position, embedding secrete data by two layer WPC steganography, and adopt a new histogram adjustment strategy to prevent distortion. By such way, the capability of resisting steganalysis is improved. Quantities of experiments show that under average embedding rate of 100% , the new algorithm behaves better in visual and statistical imperceptibility.%通过对一些已有的自适应隐写算法进行分析,提出一种旨在提高安全性的整数小波域自适应信息隐藏算法.根据隐藏的数据量和载体单元特性确定阈值,自适应地在图像整数小波高频子带系数中选择合适的隐藏位置;利用湿纸码双层嵌入法嵌入秘密数据,并采用直方图调整策略保持小波高频子带系数直方图特性,由此从多方面提高了信息隐藏算法的安全性.大量与同类算法的对比实验表明,在嵌入率小于100%的条件下,该算法具有较强的视觉隐蔽性和抗统计检测的能力.

  17. Abiding by codes of ethics and codes of conduct imposed on members of learned and professional geoscience institutions and - a tiresome formality or a win-win for scientific and professional integrity and protection of the public?

    Science.gov (United States)

    Allington, Ruth; Fernandez, Isabel

    2015-04-01

    In 2012, the International Union of Geological Sciences (IUGS) formed the Task Group on Global Geoscience Professionalism ("TG-GGP") to bring together the expanding network of organizations around the world whose primary purpose is self-regulation of geoscience practice. An important part of TG-GGP's mission is to foster a shared understanding of aspects of professionalism relevant to individual scientists and applied practitioners working in one or more sectors of the wider geoscience profession (e.g. research, teaching, industry, geoscience communication and government service). These may be summarised as competence, ethical practice, and professional, technical and scientific accountability. Legal regimes for the oversight of registered or licensed professionals differ around the world and in many jurisdictions there is no registration or licensure with the force of law. However, principles of peer-based self-regulation universally apply. This makes professional geoscience organisations ideal settings within which geoscientists can debate and agree what society should expect of us in the range of roles we fulfil. They can provide the structures needed to best determine what expectations, in the public interest, are appropriate for us collectively to impose on each other. They can also provide the structures for the development of associated procedures necessary to identify and discipline those who do not live up to the expected standards of behaviour established by consensus between peers. Codes of Ethics (sometimes referred to as Codes of Conduct), to which all members of all major professional and/or scientific geoscience organizations are bound (whether or not they are registered or hold professional qualifications awarded by those organisations), incorporate such traditional tenets as: safeguarding the health and safety of the public, scientific integrity, and fairness. Codes also increasingly include obligations concerning welfare of the environment and

  18. PNA-mediated modulation and redirection of Her-2 pre-mRNA splicing: specific skipping of erbB-2 exon 19 coding for the ATP catalytic domain

    DEFF Research Database (Denmark)

    Pankratova, Stanislava; Nielsen, Birgit N; Shiraishi, Takehiko;

    2010-01-01

    The Her-2 receptor coded for by the proto-oncogenic erbB-2 gene is a clinically validated target for treatment of a significant genetic subclass of breast cancers, and Her-2 is also overexpressed or mutated in a range of other cancers. In an approach to exploit antisense mediated splicing...... oligomers that specifically induce skipping of exon 19 as this exon is coding for the ATP catalytic domain of Her-2, and if expressed such truncated version of the Her-2 protein should be functionally inactive in a dominant negative fashion. Therefore, antisense compounds having efficient erbB-2 exon 19...

  19. Estimating and modelling bias of the hierarchical partitioning public-domain software: implications in environmental management and conservation.

    Directory of Open Access Journals (Sweden)

    Pedro P Olea

    Full Text Available BACKGROUND: Hierarchical partitioning (HP is an analytical method of multiple regression that identifies the most likely causal factors while alleviating multicollinearity problems. Its use is increasing in ecology and conservation by its usefulness for complementing multiple regression analysis. A public-domain software "hier.part package" has been developed for running HP in R software. Its authors highlight a "minor rounding error" for hierarchies constructed from >9 variables, however potential bias by using this module has not yet been examined. Knowing this bias is pivotal because, for example, the ranking obtained in HP is being used as a criterion for establishing priorities of conservation. METHODOLOGY/PRINCIPAL FINDINGS: Using numerical simulations and two real examples, we assessed the robustness of this HP module in relation to the order the variables have in the analysis. Results indicated a considerable effect of the variable order on the amount of independent variance explained by predictors for models with >9 explanatory variables. For these models the nominal ranking of importance of the predictors changed with variable order, i.e. predictors declared important by its contribution in explaining the response variable frequently changed to be either most or less important with other variable orders. The probability of changing position of a variable was best explained by the difference in independent explanatory power between that variable and the previous one in the nominal ranking of importance. The lesser is this difference, the more likely is the change of position. CONCLUSIONS/SIGNIFICANCE: HP should be applied with caution when more than 9 explanatory variables are used to know ranking of covariate importance. The explained variance is not a useful parameter to use in models with more than 9 independent variables. The inconsistency in the results obtained by HP should be considered in future studies as well as in those

  20. Domains of quality of life: results of a three-stage Delphi consensus procedure among patients, family of patients, clinicians, scientists and the general public.

    Science.gov (United States)

    Pietersma, Suzanne; de Vries, Marieke; van den Akker-van Marle, M Elske

    2014-06-01

    Our key objective is to identify the core domains of health-related quality of life (QoL). Health-related QoL utility scales are commonly used in economic evaluations to assess the effectiveness of health-care interventions. However, health-care interventions are likely to affect QoL in a broader sense than is quantifiable with traditional scales. Therefore, measures need to go beyond these scales. Unfortunately, there is no consensus in the scientific literature on the essential domains of QoL. We conducted a three-stage online Delphi consensus procedure to identify the key domains of health-related QoL. Five stakeholder groups (i.e., patients, family of patients, clinicians, scientists and general public) were asked, on three consecutive occasions, what they perceive as the most important domains of health-related QoL. An analysis of existing (health-related) QoL and well-being measurements formed the basis of the Delphi-procedure. In total, 42 domains of QoL were judged, covering physical, mental and social aspects. All participants rated 'self-acceptance', 'self-esteem' and 'good social contacts' as essential. Strikingly, mental and social domains are perceived as more essential than physical domains across stakeholders groups. In traditionally used health-related QoL utility measures, physical domains like 'mobility' are prominently present. The Delphi-procedure shows that health-related QoL (utility) scales need to put sufficient emphasis on mental and social domains to capture aspects of QoL that are essential to people.

  1. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    ; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...... development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech...... expression in the public realm. The book’s line of argument defends language against its invasion by economics, arguing that speech continues to underscore the human condition, however paradoxical this may seem in an era of pervasive computing....

  2. Principles for a Code of Conduct for the Sustainable Management of Mangrove Ecosystems: A Work in Progress for Public Discussion

    DEFF Research Database (Denmark)

    Nielsen, Thomas

    The Principles for a Code of Conduct for Sustainable Management of Mangrove Ecosystems is a guide to assist states, local and national non-governmental organizations and other stakeholders to develop cooperatively local codes, laws and/or regulations to protect mangroves and the critical functions...... they serve. Mangroves contribute significantly to local livelihoods, biodiversity conservation, fisheries productivity and coastal protection. But these economic and environmental benefits are only achievable through greater awareness that mangroves must be managed sustainably. The objective is to help bring...... attention to the importance of mangrove ecosystems, particularly to policy makers, to help arrest and reverse their loss. The Principles, being a work in progress, are being discussed in a range of forums that involve representatives from governments, NGOs, multilateral organizations, research institutions...

  3. Principles for a code of conduct for the sustainable management of mangrove ecosystems: a work in progress for public discussion

    DEFF Research Database (Denmark)

    Nielsen, Thomas

    The Principles for a Code of Conduct for Sustainable Management of Mangrove Ecosystems is a guide to assist states, local and national non-governmental organizations and other stakeholders to develop cooperatively local codes, laws and/or regulations to protect mangroves and the critical functions...... they serve with regard to contributions to local livelihood, biodiversity conservation and coastal protection though sustainable management. The objective is to help bring attention to the importance of mangrove ecosystems, particularly to policy makers, to help arrest and reverse their loss. The Principles...... mangrove management experience, about fifteen country case studies from all regions where mangroves exist, and seven regional workshops to date. The purpose of the presentation at this ReNED forum is gain additional feedback from researchers, in particular, to provide input on the content of the Principles...

  4. Principles for a code of conduct for the sustainable management of mangrove ecosystems: a work in progress for public discussion

    DEFF Research Database (Denmark)

    Nielsen, Thomas

    The Principles for a Code of Conduct for Sustainable Management of Mangrove Ecosystems is a guide to assist states, local and national non-governmental organizations and other stakeholders to develop cooperatively local codes, laws and/or regulations to protect mangroves and the critical functions...... they serve with regard to contributions to local livelihood, biodiversity conservation and coastal protection though sustainable management. The objective is to help bring attention to the importance of mangrove ecosystems, particularly to policy makers, to help arrest and reverse their loss. The Principles...... mangrove management experience, about fifteen country case studies from all regions where mangroves exist, and seven regional workshops to date. The purpose of the presentation at this ReNED forum is gain additional feedback from researchers, in particular, to provide input on the content of the Principles...

  5. Principles for a Code of Conduct for the Sustainable Management of Mangrove Ecosystems: A Work in Progress for Public Discussion

    DEFF Research Database (Denmark)

    Nielsen, Thomas

    The Principles for a Code of Conduct for Sustainable Management of Mangrove Ecosystems is a guide to assist states, local and national non-governmental organizations and other stakeholders to develop cooperatively local codes, laws and/or regulations to protect mangroves and the critical functions......, grassroots organizations and other interested individuals and groups. The Principles were formulated based on a review of global mangrove management experience, about fifteen country case studies, including Auastralia, from all regions where mangroves exist, and seven regional workshops to date. The purpose...... of making a presentation on the Mangrove Principles at IMPAC is to gain additional feedback from interested stakeholders and experts, in particular, to provide inputs to the content of the Principles and recommendations for activities to promote their use as a management tool. The Principles and many...

  6. Combining Public Domain and Professional Panoramic Imagery for the Accurate and Dense 3d Reconstruction of the Destroyed Bel Temple in Palmyra

    Science.gov (United States)

    Wahbeh, W.; Nebiker, S.; Fangi, G.

    2016-06-01

    This paper exploits the potential of dense multi-image 3d reconstruction of destroyed cultural heritage monuments by either using public domain touristic imagery only or by combining the public domain imagery with professional panoramic imagery. The focus of our work is placed on the reconstruction of the temple of Bel, one of the Syrian heritage monuments, which was destroyed in September 2015 by the so called "Islamic State". The great temple of Bel is considered as one of the most important religious buildings of the 1st century AD in the East with a unique design. The investigations and the reconstruction were carried out using two types of imagery. The first are freely available generic touristic photos collected from the web. The second are panoramic images captured in 2010 for documenting those monuments. In the paper we present a 3d reconstruction workflow for both types of imagery using state-of-the art dense image matching software, addressing the non-trivial challenges of combining uncalibrated public domain imagery with panoramic images with very wide base-lines. We subsequently investigate the aspects of accuracy and completeness obtainable from the public domain touristic images alone and from the combination with spherical panoramas. We furthermore discuss the challenges of co-registering the weakly connected 3d point cloud fragments resulting from the limited coverage of the touristic photos. We then describe an approach using spherical photogrammetry as a virtual topographic survey allowing the co-registration of a detailed and accurate single 3d model of the temple interior and exterior.

  7. Cloud Computing for Complex Performance Codes.

    Energy Technology Data Exchange (ETDEWEB)

    Appel, Gordon John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hadgu, Teklu [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Klein, Brandon Thorin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Miner, John Gifford [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    This report describes the use of cloud computing services for running complex public domain performance assessment problems. The work consisted of two phases: Phase 1 was to demonstrate complex codes, on several differently configured servers, could run and compute trivial small scale problems in a commercial cloud infrastructure. Phase 2 focused on proving non-trivial large scale problems could be computed in the commercial cloud environment. The cloud computing effort was successfully applied using codes of interest to the geohydrology and nuclear waste disposal modeling community.

  8. MODTOHAFSD — A GUI based JAVA code for gravity analysis of strike limited sedimentary basins by means of growing bodies with exponential density contrast-depth variation: A space domain approach

    Science.gov (United States)

    Chakravarthi, V.; Sastry, S. Rajeswara; Ramamma, B.

    2013-07-01

    Based on the principles of modeling and inversion, two interpretation methods are developed in the space domain along with a GUI based JAVA code, MODTOHAFSD, to analyze the gravity anomalies of strike limited sedimentary basins using a prescribed exponential density contrast-depth function. A stack of vertical prisms all having equal widths, but each one possesses its own limited strike length and thickness, describes the structure of a sedimentary basin above the basement complex. The thicknesses of prisms represent the depths to the basement and are the unknown parameters to be estimated from the observed gravity anomalies. Forward modeling is realized in the space domain using a combination of analytical and numerical approaches. The algorithm estimates the initial depths of a sedimentary basin and improves them, iteratively, based on the differences between the observed and modeled gravity anomalies within the specified convergence criteria. The present code, works on Model-View-Controller (MVC) pattern, reads the Bouguer gravity anomalies, constructs/modifies regional gravity background in an interactive approach, estimates residual gravity anomalies and performs automatic modeling or inversion based on user specification for basement topography. Besides generating output in both ASCII and graphical forms, the code displays (i) the changes in the depth structure, (ii) nature of fit between the observed and modeled gravity anomalies, (iii) changes in misfit, and (iv) variation of density contrast with iteration in animated forms. The code is used to analyze both synthetic and real field gravity anomalies. The proposed technique yielded information that is consistent with the assumed parameters in case of synthetic structure and with available drilling depths in case of field example. The advantage of the code is that it can be used to analyze the gravity anomalies of sedimentary basins even when the profile along which the interpretation is intended fails to

  9. The Modified Minsum Decoding Algorithm of LDPC Code in the Simplified Difference-domain%基于修正最小和的简化差分域LDPC译码算法

    Institute of Scientific and Technical Information of China (English)

    高兴龙; 王中训; 颜飞; 殷熔煌; 陈明阳

    2013-01-01

    The modified minsum decoding algorithm of LDPC (Low-Density Parity-Check) code in the simplified difference-domain on the basis of detailed analysis of LDPC decoding algorithm in difference-domain was proposed.The simulation indicates that the proposed decoding algorithm offers almost no performance degradation compared with the BP(Belief Propagation) decoding algorithm in log-domain and the decoding algorithm in difference-domain and offers better performance than minsum decoding algorithm in log-domain and greatly reduces the computation complexity in AWGN(Additive White Gaussian Noise) channel and under BPSK(Binary Phase Shift Keying) modulation.%在深刻分析差分域LDPC译码算法的基础上,提出了基于修正最小和的简化差分域LDPC译码算法.仿真结果表明,在加性高斯白噪声信道环境下,BPSK调制时,提出的译码算法在极大地降低计算复杂度的情况下,性能明显优于对数域的最小和算法并且相比对数域置信算法和差分域译码算法几乎没有性能损失.

  10. Education--Due Process for Washington Public School Students--Wash. Ad. Code ch. 180-40 (1972)

    Science.gov (United States)

    Talmadge, Philip

    1975-01-01

    In Washington, legislative and administrative rules of the State Board of Education have conferred protections of constitutional due process on public school students. The author examines the regulatory framework and effects concluding that the Washington due process rules should serve as a model for other states. (JT)

  11. The PR-Set7 binding domain of Riz1 is required for the H4K20me1-H3K9me1 trans-tail 'histone code' and Riz1 tumor suppressor function.

    Science.gov (United States)

    Congdon, Lauren M; Sims, Jennifer K; Tuzon, Creighton T; Rice, Judd C

    2014-04-01

    PR-Set7/Set8/KMT5a is the sole histone H4 lysine 20 monomethyltransferase (H4K20me1) in metazoans and is essential for proper cell division and genomic stability. We unexpectedly discovered that normal cellular levels of monomethylated histone H3 lysine 9 (H3K9me1) were also dependent on PR-Set7, but independent of its catalytic activity. This observation suggested that PR-Set7 interacts with an H3K9 monomethyltransferase to establish the previously reported H4K20me1-H3K9me1 trans-tail 'histone code'. Here we show that PR-Set7 specifically and directly binds the C-terminus of the Riz1/PRDM2/KMT8 tumor suppressor and demonstrate that the N-terminal PR/SET domain of Riz1 preferentially monomethylates H3K9. The PR-Set7 binding domain was required for Riz1 nuclear localization and maintenance of the H4K20me1-H3K9me1 trans-tail 'histone code'. Although Riz1 can function as a repressor, Riz1/H3K9me1 was dispensable for the repression of genes regulated by PR-Set7/H4K20me1. Frameshift mutations resulting in a truncated Riz1 incapable of binding PR-Set7 occur frequently in various aggressive cancers. In these cancer cells, expression of wild-type Riz1 restored tumor suppression by decreasing proliferation and increasing apoptosis. These phenotypes were not observed in cells expressing either the Riz1 PR/SET domain or PR-Set7 binding domain indicating that Riz1 methyltransferase activity and PR-Set7 binding domain are both essential for Riz1 tumor suppressor function.

  12. A Domain-Specific Programming Language for Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Nielsen, Janus Dam; Schwartzbach, Michael Ignatieff

    2007-01-01

    We present a domain-specific programming language for Secure Multiparty Computation (SMC). Information is a resource of vital importance and considerable economic value to individuals, public administration, and private companies. This means that the confidentiality of information is crucial...... application development. The language is implemented in a prototype compiler that generates Java code exploiting a distributed cryptographic runtime....

  13. 40 Gb/s, secure optical communication based upon fast reconfigurable time domain spectral phase en/decoding with 40 Gchip/s optical code and symbol overlapping.

    Science.gov (United States)

    Gao, Zhensen; Dai, Bo; Wang, Xu; Kataoka, Nobuyuki; Wada, Naoya

    2011-11-15

    We propose and experimentally demonstrate a 40 Gb/s secure optical communication system with on-off-keying (OOK) modulation format by using a time domain spectral phase en/decoding scheme, which employs a highly dispersive element and high-speed phase modulator for introducing significant symbol overlapping for both the encoded and incorrectly decoded noiselike signals to enhance the information security against eavesdropping using a power detector. The influence of dispersion and chip modulation rate on the symbol overlapping of the incorrectly decoded signal has been analytically investigated and experimentally verified. Security enhancement for 40 Gb/s OOK data using fast reconfigurable 40 Gchip/s optical codes with code lengths of up to 1024 has been demonstrated and compared with a 10 Gb/s system.

  14. Signal to Noise Ratio (SNR Enhancement Comparison of Impulse-, Coding- and Novel Linear-Frequency-Chirp-Based Optical Time Domain Reflectometry (OTDR for Passive Optical Network (PON Monitoring Based on Unique Combinations of Wavelength Selective Mirrors

    Directory of Open Access Journals (Sweden)

    Christopher M. Bentz

    2014-03-01

    Full Text Available We compare optical time domain reflectometry (OTDR techniques based on conventional single impulse, coding and linear frequency chirps concerning their signal to noise ratio (SNR enhancements by measurements in a passive optical network (PON with a maximum one-way attenuation of 36.6 dB. A total of six subscribers, each represented by a unique mirror pair with narrow reflection bandwidths, are installed within a distance of 14 m. The spatial resolution of the OTDR set-up is 3.0 m.

  15. Defending public interests in private lands: compliance, costs and potential environmental consequences of the Brazilian Forest Code in Mato Grosso.

    Science.gov (United States)

    Stickler, Claudia M; Nepstad, Daniel C; Azevedo, Andrea A; McGrath, David G

    2013-06-01

    Land-use regulations are a critical component of forest governance and conservation strategies, but their effectiveness in shaping landholder behaviour is poorly understood. We conducted a spatial and temporal analysis of the Brazilian Forest Code (BFC) to understand the patterns of regulatory compliance over time and across changes in the policy, and the implications of these compliance patterns for the perceived costs to landholders and environmental performance of agricultural landscapes in the southern Amazon state of Mato Grosso. Landholdings tended to remain in compliance or not according to their status at the beginning of the study period. The perceived economic burden of BFC compliance on soya bean and beef producers (US$3-5.6 billion in net present value of the land) may in part explain the massive, successful campaign launched by the farm lobby to change the BFC. The ecological benefits of compliance (e.g. greater connectivity and carbon) with the BFC are diffuse and do not compete effectively with the economic benefits of non-compliance that are perceived by landholders. Volatile regulation of land-use decisions that affect billions in economic rent that could be captured is an inadequate forest governance instrument; effectiveness of such regulations may increase when implemented in tandem with positive incentives for forest conservation.

  16. Multiple description video coding research based on complementary segmentation in compressed domain%基于压缩域互补分割的视频多描述编码研究

    Institute of Scientific and Technical Information of China (English)

    江玉珍; 朱映辉; 欧阳春娟

    2009-01-01

    Due to the information relativity of digital video in space domain and time domain, a new multiple description video coding method is presented integrating the video compression process. Based on H. 263 criterion, the algorithm is realized by distributing the DCT domain coefficient of image blocks and motion estimation. With redistributing a few important coefficients, the receiving quality of single description is guaranteed. Meanwhile, the diagonal distribution of coefficient domain can improve their signal complementary. Experimental results show that the algorithm has good MDC characteristics such as low redundancy, rapid coding and decoding, and high compression ratio. It is an effective approach to ensure the security and real-time character in video communication.%鉴于数字视频在空间域及时间域上的信息相关性,提出在视频压缩过程中实现多描述编码的方法.算法以H.263为参考标准,在图块及运动估计的DCT域上进行系数划分,通过对少量重要信号的重复分配来保证单个描述的接收质量.同时,系数域的对角分割又使各个描述间具有较强的信号互补性.实验结果表明,算法具有描述冗余率低、编/解码直接快速、压缩率高等良好的MDC特性,是保障视频传输业务可靠性和实时性的有效方法.

  17. Comparing verbal autopsy cause of death findings as determined by physician coding and probabilistic modelling: a public health analysis of 54 000 deaths in Africa and Asia

    Directory of Open Access Journals (Sweden)

    Peter Byass

    2015-06-01

    between InterVA–4 and physician–coded findings over this large and diverse data set. Although these analyses cannot prove that either approach constitutes absolute truth, there was high public health equivalence between the findings. Given the urgent need for adequate cause of death data from settings where deaths currently pass unregistered, and since the WHO 2012 verbal autopsy standard and InterVA–4 tools represent relatively simple, cheap and available methods for determining cause of death on a large scale, they should be used as current tools of choice to fill gaps in cause of death data.

  18. Introduction of temporal sub-stepping in the Multi-Level Multi-Domain semi-implicit Particle-In-Cell code Parsek2D-MLMD

    Science.gov (United States)

    Innocenti, M. E.; Beck, A.; Ponweiser, T.; Markidis, S.; Lapenta, G.

    2015-04-01

    In this paper, the introduction of temporal sub-stepping in Multi-Level Multi-Domain (MLMD) simulations of plasmas is discussed. The MLMD method addresses the multi-scale nature of space plasmas by simulating a problem at different levels of resolution. A large-domain "coarse grid" is simulated with low resolution to capture large-scale, slow processes. Smaller scale, local processes are obtained through a "refined grid" which uses higher resolution. Very high jumps in the resolution used at the different levels can be achieved thanks to the Implicit Moment Method and appropriate grid interlocking operations. Up to now, the same time step was used at all the levels. Now, with temporal sub-stepping, the different levels can also benefit from the use of different temporal resolutions. This saves further resources with respect to "traditional" simulations done using the same spatial and temporal stepping on the entire domain. It also prevents the levels from working at the limits of the stability condition of the Implicit Moment Method. The temporal sub-stepping is tested with simulations of magnetic reconnection in space. It is shown that, thanks to the reduced costs of MLMD simulations with respect to single-level simulations, it becomes possible to verify with realistic mass ratios scaling laws previously verified only for reduced mass ratios. Performance considerations are also provided.

  19. Practices in Code Discoverability

    CERN Document Server

    Teuben, Peter; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Much of scientific progress now hinges on the reliability, falsifiability and reproducibility of computer source codes. Astrophysics in particular is a discipline that today leads other sciences in making useful scientific components freely available online, including data, abstracts, preprints, and fully published papers, yet even today many astrophysics source codes remain hidden from public view. We review the importance and history of source codes in astrophysics and previous efforts to develop ways in which information about astrophysics codes can be shared. We also discuss why some scientist coders resist sharing or publishing their codes, the reasons for and importance of overcoming this resistance, and alert the community to a reworking of one of the first attempts for sharing codes, the Astrophysics Source Code Library (ASCL). We discuss the implementation of the ASCL in an accompanying poster paper. We suggest that code could be given a similar level of referencing as data gets in repositories such ...

  20. 报刊公共领域与邹韬奋%The public domain of newspaper and journal and Zou Taofen

    Institute of Scientific and Technical Information of China (English)

    董亚秋

    2012-01-01

      众所周知,邹韬奋是我国卓越的新闻记者、出版家,更是一名进步爱国的政论家。他主编的《生活》周刊、《大众生活》和《全民抗战》刊物,由于其客观的立场、报刊的公共性和其注重与读者平等的讨论,构成了报刊公共领域。作为这一公共领域中的发言人角色,邹韬奋积极发表新闻评论,设立读者信箱和小言论等精品栏目,与读者和同仁进行交流。这些编辑出版活动充分展现了邹韬奋在报刊公共空间中的舆论引导作用。%  As we all know, Zou Tao-fen is an excellent journalist, publishing house, was a progressive patriotic political commentators. He published in life magazine, the public and the National Journal of the war, due to its objective of publicity and its focus on position, press and reader discussions on an equal footing, forming the newspaper of the public domain. Role as spokesman in this public area, Zou Tao-fen news positive comments, set up reader mail and small boutique, such as columns, communicate with colleagues and readers. These activities have fully demonstrated Zou taofen's editing and publishing in the newspaper public opinion to guide the role of the public space.

  1. The sailor, the turtle and the jungle man - striking the balance between protection and public domain in fictional character merchandising

    OpenAIRE

    Preiss LL.M., Sven

    2013-01-01

    What is it that ‘Popeye the Sailor’, the ‘Teenage Mutant Hero Turtles’ and ‘Tarzan’ have in common? Besides being well-known fictitious characters, each of them is overwhelmingly successful in terms of entertainment (for the public) and revenue (for the industry behind it). They exemplify the possibility of the fictional characters’ owners not only using them for their basic purpose, i.e. in books, comics, movies, broadcasts, etc., but also of secondary exploitation of the characters’ gained ...

  2. MIVIS image geocoding experience on merging position attitude system data and public domain GPS stream (ASI-GeoDAF

    Directory of Open Access Journals (Sweden)

    S. Pignatti

    2006-06-01

    Full Text Available The use of airborne scanners involves geo-referencing problems, which are difficult because of the need to know the exact platform position and attitude for each scan line. The errors of the onboard navigation system are normally corrected using ground control point on the image. This post-processing correction procedure is too long in case of multiple flight campaigns, and besides it implies the need to have available 1:10000 orthophotoimages or maps in digital format. To optimize the above procedure a new method to correct MIVIS navigational data in the post-processing phase has been implemented. The procedure takes into consideration the GPS stream in Rinex format of common knowledge and findable on the web, acquired at the ground stations of the Geodetic Data Archiving Facilities provided by ASI. The application of this correction entails the assumption that the environmental variables affecting both onboard and geodetic GPS equally affect the position measurements. The airborne data correction was carried out merging the two data sets (onboard and ground station GPS to achieve a more precise aircraft trajectory. The present study compares the geo-coded images obtained by means of the two post-processing methods.

  3. An assessment of mercury in estuarine sediment and tissue in Southern New Jersey using public domain data

    Science.gov (United States)

    Ng, Kara; Szabo, Zoltan; Reilly, Pamela A.; Barringer, Julia; Smalling, Kelly L.

    2016-01-01

    Mercury (Hg) is considered a contaminant of global concern for coastal environments due to its toxicity, widespread occurrence in sediment, and bioaccumulation in tissue. Coastal New Jersey, USA, is characterized by shallow bays and wetlands that provide critical habitat for wildlife but share space with expanding urban landscapes. This study was designed as an assessment of the magnitude and distribution of Hg in coastal New Jersey sediments and critical species using publicly available data to highlight potential data gaps. Mercury concentrations in estuary sediments can exceed 2 μg/g and correlate with concentrations of other metals. Based on existing data, the concentrations of Hg in mussels in southern New Jersey are comparable to those observed in other urbanized Atlantic Coast estuaries. Lack of methylmercury data for sediments, other media, and tissues are data gaps needing to be filled for a clearer understanding of the impacts of Hg inputs to the ecosystem.

  4. Assessment of the measurement performance of the in-vessel system of gap 6 of the ITER plasma position reflectometer using a finite-difference time-domain Maxwell full-wave code.

    Science.gov (United States)

    da Silva, F; Heuraux, S; Ricardo, E; Quental, P; Ferreira, J

    2016-11-01

    We conducted a first assessment of the measurement performance of the in-vessel components at gap 6 of the ITER plasma position reflectometry with the aid of a synthetic Ordinary Mode (O-mode) broadband frequency-modulated continuous-wave reflectometer implemented with REFMUL, a 2D finite-difference time-domain full-wave Maxwell code. These simulations take into account the system location within the vacuum vessel as well as its access to the plasma. The plasma case considered is a baseline scenario from Fusion for Energy. We concluded that for the analyzed scenario, (i) the plasma curvature and non-equatorial position of the antenna have neglectable impact on the measurements; (ii) the cavity-like space surrounding the antenna can cause deflection and splitting of the probing beam; and (iii) multi-reflections on the blanket wall cause a substantial error preventing the system from operating within the required error margin.

  5. Assessment of the measurement performance of the in-vessel system of gap 6 of the ITER plasma position reflectometer using a finite-difference time-domain Maxwell full-wave code

    Science.gov (United States)

    da Silva, F.; Heuraux, S.; Ricardo, E.; Quental, P.; Ferreira, J.

    2016-11-01

    We conducted a first assessment of the measurement performance of the in-vessel components at gap 6 of the ITER plasma position reflectometry with the aid of a synthetic Ordinary Mode (O-mode) broadband frequency-modulated continuous-wave reflectometer implemented with REFMUL, a 2D finite-difference time-domain full-wave Maxwell code. These simulations take into account the system location within the vacuum vessel as well as its access to the plasma. The plasma case considered is a baseline scenario from Fusion for Energy. We concluded that for the analyzed scenario, (i) the plasma curvature and non-equatorial position of the antenna have neglectable impact on the measurements; (ii) the cavity-like space surrounding the antenna can cause deflection and splitting of the probing beam; and (iii) multi-reflections on the blanket wall cause a substantial error preventing the system from operating within the required error margin.

  6. Domains and domain loss

    DEFF Research Database (Denmark)

    Haberland, Hartmut

    2005-01-01

    The domain concept, originally suggested by Schmidt-Rohr in the 1930’s (as credited in Fishman’s writings in the 1970s), was an attempt to sort out different areas of language use in multilingual societies, which are relevant for language choice. In Fishman’s version, domains were considered...... not described in terms of domains, and recent research e.g. about the multilingual communities in the Danish-German border area seems to confirm this....

  7. Current limitations of SNP data from the public domain for studies of complex disorders: a test for ten candidate genes for obesity and osteoporosis

    Directory of Open Access Journals (Sweden)

    Xiao Peng

    2004-02-01

    Full Text Available Abstract Background Public SNP databases are frequently used to choose SNPs for candidate genes in the association and linkage studies of complex disorders. However, their utility for such studies of diseases with ethnic-dependent background has never been evaluated. Results To estimate the accuracy and completeness of SNP public databases, we analyzed the allele frequencies of 41 SNPs in 10 candidate genes for obesity and/or osteoporosis in a large American-Caucasian sample (1,873 individuals from 405 nuclear families by PCR-invader assay. We compared our results with those from the databases and other published studies. Of the 41 SNPs, 8 were monomorphic in our sample. Twelve were reported for the first time for Caucasians and the other 29 SNPs in our sample essentially confirmed the respective allele frequencies for Caucasians in the databases and previous studies. The comparison of our data with other ethnic groups showed significant differentiation between the three major world ethnic groups at some SNPs (Caucasians and Africans differed at 3 of the 18 shared SNPs, and Caucasians and Asians differed at 13 of the 22 shared SNPs. This genetic differentiation may have an important implication for studying the well-known ethnic differences in the prevalence of obesity and osteoporosis, and complex disorders in general. Conclusion A comparative analysis of the SNP data of the candidate genes obtained in the present study, as well as those retrieved from the public domain, suggests that the databases may currently have serious limitations for studying complex disorders with an ethnic-dependent background due to the incomplete and uneven representation of the candidate SNPs in the databases for the major ethnic groups. This conclusion attests to the imperative necessity of large-scale and accurate characterization of these SNPs in different ethnic groups.

  8. Establishing the Public Sphere and Abolishing the Private Domain:The Rise of a Doctrine and Its Social Significance in the Spring and Autumn Period

    Institute of Scientific and Technical Information of China (English)

    Liu Zehua

    2006-01-01

    The dominant views regarding the concepts of "the public"(gong)and"the private"(si) took shape in the Spring and Autumn period and matured in the succeeding years of the Warring States period.This paper is an attempt to trace both the growth of the vocabulary containing "gong"and "si"and the development of philosophical views regarding issues that center on the relation between the individual and the larger social/communal/political body,of which that individual is a member;it also touches on issues related to the proper handling of public afrairs and the relation between state,sovereign,and the individual.The era is often characterized as"The Contention of the Hundred Schools of Thought,"notwithstanding it ended with but one view that is universally accepted by thinkers of diverse persuasion,namely,si is the source of all social evil and.therefore,should be condemned.This is the doctrine known as ligong miesi(abolishing si so gong may be established),which contributed to the orthodox for that era and the millennium to come.By extolling gong and condemning si.it painted a portrait of the Pair as two irreconcilable nomas or forces in social and political life;it provided a iustification for the then emerging new social arrangement and Ways of distribution of power and resources.and it also led to acute conflicts between the sovereign andthe state,the ruledandthe ruler,the stateandthe subject,as well as the public sphere and the private domain.

  9. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  10. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  11. Improved Decoding Algorithm of Non-binary LDPC Codes Based on Logarithm Domain%基于对数域的多进制LDPC码改进译码算法

    Institute of Scientific and Technical Information of China (English)

    贺刚; 柏鹏; 彭卫东; 赵红言; 苏兮; 林晋福; 王明芳; 何苹

    2013-01-01

    为了进一步降低多进制LDPC码译码的复杂度,分析了扩展最小和算法(EMS)存在的不足,提出了一种基于对数域的多进制LDPC码的改进译码算法.该算法一方面根据每次迭代中变量节点的概率分布对的平均方差自适应选择FHT的阶数;另一方面算法中校验节点的更新运算由乘法转化为基于对数域上的加法运算,从而更易于硬件实现.仿真结果表明,与EMS算法相比,该算法性能与收敛速率均有明显改进.%To reduce the complexity of decoding algorithm for non-binary LDPC codes and overcome the drawback of the extended min-sum (EMS) algorithm, an improved EMS decoding algorithm based on logarithm domain is proposed. The algorithm adaptively chooses the rank of FHT in each iteration step according to the average variance of bit nodes' probability pairs. It translates the multiplication calculation for updating parity-check notes into addition calculation based on logarithm domain. It makes the hardware easier to realize. The simulation shows the proposed algorithm can achieve better performance and converge faster than EMS algorithm.

  12. Genome cartography through domain annotation.

    Science.gov (United States)

    Ponting, C P; Dickens, N J

    2001-01-01

    The evolutionary history of eukaryotic proteins involves rapid sequence divergence, addition and deletion of domains, and fusion and fission of genes. Although the protein repertoires of distantly related species differ greatly, their domain repertoires do not. To account for the great diversity of domain contexts and an unexpected paucity of ortholog conservation, we must categorize the coding regions of completely sequenced genomes into domain families, as well as protein families.

  13. A Secure Public-key Image Authentication Plan

    Institute of Scientific and Technical Information of China (English)

    YANG Qing; CHEN Ke-fei

    2005-01-01

    Digital watermark can be used for image ownership verification or authentication. In this paper, we propose a new image authentication plan concentrating on its security performance. Digital watermark is first turbo coded, scaled and then processed in wavelet domain. To enhance security level, public key cryptosystem is utilized to replace traditional watermark key. Simulation results are finally given by experiment.

  14. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  15. 网络微博中公共领域与私人领域的融合%The Fusion of the Public Domain and Private Sphere in Network Micro Blog

    Institute of Scientific and Technical Information of China (English)

    石良

    2012-01-01

    It is clarified that based on the public domain and the private sphere,the paper chooses the micro blog as a starting point,takes examples from sociological theory such as discursive power,social role,and opinion leaders,the fusion tendency of the public domain-private sector in the network——the public domain personal and private sector public is clarified.And it is analyzed that based on reality,the effect is brought to the society by fusion of the public or private field.%把微博作为切入点,借鉴话语权、社会角色、意见领袖等社会学理论阐释了网络中公共领域和私人领域融合的趋势——公共领域私人化与私人领域公共化。并且立足现实,分析了公私领域融合给社会带来的现实影响。

  16. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well...... as conceptions of good governance from other international organizations. While values converge, they are balanced and communicated differently, and seem to some extent to be translated into the national cultures. The set of global public values derived from this analysis include public interest, regime dignity...

  17. Holographic codes

    CERN Document Server

    Latorre, Jose I

    2015-01-01

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  18. Sharing code

    OpenAIRE

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  19. Public health accreditation and metrics for ethics: a case study on environmental health and community engagement.

    Science.gov (United States)

    Bernheim, Ruth Gaare; Stefanak, Matthew; Brandenburg, Terry; Pannone, Aaron; Melnick, Alan

    2013-01-01

    As public health departments around the country undergo accreditation using the Public Health Accreditation Board standards, the process provides a new opportunity to integrate ethics metrics into day-to-day public health practice. While the accreditation standards do not explicitly address ethics, ethical tools and considerations can enrich the accreditation process by helping health departments and their communities understand what ethical principles underlie the accreditation standards and how to use metrics based on these ethical principles to support decision making in public health practice. We provide a crosswalk between a public health essential service, Public Health Accreditation Board community engagement domain standards, and the relevant ethical principles in the Public Health Code of Ethics (Code). A case study illustrates how the accreditation standards and the ethical principles in the Code together can enhance the practice of engaging the community in decision making in the local health department.

  20. 45 CFR 162.1011 - Valid code sets.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Valid code sets. 162.1011 Section 162.1011 Public... ADMINISTRATIVE REQUIREMENTS Code Sets § 162.1011 Valid code sets. Each code set is valid within the dates specified by the organization responsible for maintaining that code set....

  1. Replacing the wild type loxP site in BACs from the public domain with lox66 using a lox66 transposon

    Directory of Open Access Journals (Sweden)

    Stennett Naima

    2010-02-01

    Full Text Available Abstract Background Chromatin adjoining the site of integration of a transgene affects expression and renders comparisons of closely related transgenes, such as those derived from a BAC deletion series retrofitted with enhancer-traps, unreliable. Gene targeting to a pre-determined site on the chromosome is likely to alleviate the problem. Findings A general procedure to replace the loxP site located at one end of genomic DNA inserts in BACs with lox66 is described. Truncating insert DNA from the loxP end with a Tn10 transposon carrying a lox66 site simultaneously substitutes the loxP with a lox66 sequence. The replacement occurs with high stringency, and the procedure should be applicable to all BACs in the public domain. Cre recombination of loxP with lox66 or lox71 was found to be as efficient as another loxP site during phage P1 transduction of small plasmids containing those sites. However the end-deletion of insert DNA in BACs using a lox66 transposon occurred at no more than 20% the efficiency observed with a loxP transposon. Differences in the ability of Cre protein available at different stages of the P1 life cycle to recombine identical versus non-identical lox-sites is likely responsible for this discrepancy. A possible mechanism to explain these findings is discussed. Conclusions The loxP/lox66 replacement procedure should allow targeting BACs to a pre-positioned lox71 site in zebrafish chromosomes; a system where homologous recombination-mediated "knock-in" technology is unavailable.

  2. Efficient convolutional sparse coding

    Energy Technology Data Exchange (ETDEWEB)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  3. Scalable motion vector coding

    Science.gov (United States)

    Barbarien, Joeri; Munteanu, Adrian; Verdicchio, Fabio; Andreopoulos, Yiannis; Cornelis, Jan P.; Schelkens, Peter

    2004-11-01

    Modern video coding applications require transmission of video data over variable-bandwidth channels to a variety of terminals with different screen resolutions and available computational power. Scalable video coding is needed to optimally support these applications. Recently proposed wavelet-based video codecs employing spatial domain motion compensated temporal filtering (SDMCTF) provide quality, resolution and frame-rate scalability while delivering compression performance comparable to that of the state-of-the-art non-scalable H.264-codec. These codecs require scalable coding of the motion vectors in order to support a large range of bit-rates with optimal compression efficiency. Scalable motion vector coding algorithms based on the integer wavelet transform followed by embedded coding of the wavelet coefficients were recently proposed. In this paper, a new and fundamentally different scalable motion vector codec (MVC) using median-based motion vector prediction is proposed. Extensive experimental results demonstrate that the proposed MVC systematically outperforms the wavelet-based state-of-the-art solutions. To be able to take advantage of the proposed scalable MVC, a rate allocation mechanism capable of optimally dividing the available rate among texture and motion information is required. Two rate allocation strategies are proposed and compared. The proposed MVC and rate allocation schemes are incorporated into an SDMCTF-based video codec and the benefits of scalable motion vector coding are experimentally demonstrated.

  4. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  5. Polar Codes

    Science.gov (United States)

    2014-12-01

    QPSK Gaussian channels . .......................................................................... 39 vi 1. INTRODUCTION Forward error correction (FEC...Capacity of BSC. 7 Figure 5. Capacity of AWGN channel . 8 4. INTRODUCTION TO POLAR CODES Polar codes were introduced by E. Arikan in [1]. This paper...Under authority of C. A. Wilgenbusch, Head ISR Division EXECUTIVE SUMMARY This report describes the results of the project “More reliable wireless

  6. Recommendations to Public Speaking Instructors for the Negotiation of Code-Switching Practices among Black English-Speaking African American Students

    Science.gov (United States)

    Greene, Deric M.; Walker, Felicia R.

    2004-01-01

    Six recommendations that instructors can employ to encourage effective classroom code-switching practices among Black English-speaking students in the basic communication course are discussed. These include reconsidering attitudes, communicating expectations, demonstrating model language behavior, affirming students' language, creating culturally…

  7. Importance of Building Code

    Directory of Open Access Journals (Sweden)

    Reshmi Banerjee

    2015-06-01

    Full Text Available A building code, or building control, is a set of rules that specify the minimum standards for constructed objects such as buildings and non building structures. The main purpose of building codes are to protect public health, safety and general welfare as they relate to the construction and occupancy of buildings and structures. The building code becomes law of a particular jurisdiction when formally enacted by the appropriate governmental or private authority. Building codes are generally intended to be applied by architects, engineers, constructors and regulators but are also used for various purposes by safety inspectors, environmental scientists, real estate developers, subcontractors, manufacturers of building products and materials, insurance companies, facility managers, tenants and others.

  8. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  9. Domain analysis

    DEFF Research Database (Denmark)

    Hjørland, Birger

    2017-01-01

    The domain-analytic approach to knowledge organization (KO) (and to the broader field of library and information science, LIS) is outlined. The article reviews the discussions and proposals on the definition of domains, and provides an example of a domain-analytic study in the field of art studie....... Varieties of domain analysis as well as criticism and controversies are presented and discussed....

  10. Expanding the landscape of chromatin modification (CM-related functional domains and genes in human.

    Directory of Open Access Journals (Sweden)

    Shuye Pu

    Full Text Available Chromatin modification (CM plays a key role in regulating transcription, DNA replication, repair and recombination. However, our knowledge of these processes in humans remains very limited. Here we use computational approaches to study proteins and functional domains involved in CM in humans. We analyze the abundance and the pair-wise domain-domain co-occurrences of 25 well-documented CM domains in 5 model organisms: yeast, worm, fly, mouse and human. Results show that domains involved in histone methylation, DNA methylation, and histone variants are remarkably expanded in metazoan, reflecting the increased demand for cell type-specific gene regulation. We find that CM domains tend to co-occur with a limited number of partner domains and are hence not promiscuous. This property is exploited to identify 47 potentially novel CM domains, including 24 DNA-binding domains, whose role in CM has received little attention so far. Lastly, we use a consensus Machine Learning approach to predict 379 novel CM genes (coding for 329 proteins in humans based on domain compositions. Several of these predictions are supported by very recent experimental studies and others are slated for experimental verification. Identification of novel CM genes and domains in humans will aid our understanding of fundamental epigenetic processes that are important for stem cell differentiation and cancer biology. Information on all the candidate CM domains and genes reported here is publicly available.

  11. The exploration on code of public hospital president under the background of new round health reform in China%新医改背景下公立医院院长行为规范初探

    Institute of Scientific and Technical Information of China (English)

    李晓燕

    2013-01-01

    研究公立医院改革背景下,“权力归队”后,公立医院院长在承担岗位职责时应遵守的行为规范和准则。相关文献资料和《中国公立医院院长岗位职责、行为规范和领导力标准》研究结果。公立医院院长行为规范涵盖政治法律行为规范、职业道德行为规范和业务行为规范等三大类,包括坚持科学发展观、坚持依法办院、以全心全意为人民健康服务为宗旨、具有改革开放意识、奉公守法、文明修养、团结协作、民主集中、坚持战略管理理念、合理充分授权、科学决策、有效控制和顺畅协调等13条行为准则。%The study explore the code that the presidentofthepublic hospitalsshouldcomply with under the background of the new round public hospital reform. Literature review and the findings of the research named the responsibilities,code and leadership standards of public hospital presidentin China”.The code of public hospital presidentcovers the 3 types such aspolitical and legalcode,professional ethicalcode andimplementation code, which includesthe following 13 code:adhering tothescientific development concept, managing hospital by law,serving the health ofallthe people,having consciousnessof reform and opening, carrying out official duties and laws,civilization accomplishment,unity and cooperation,democratic centralism,being awareness of strategic management,reasonably sufficien tauthorization,scientific decision-making, effective control and smooth coordination of conduct, etc.

  12. Making your code citable with the Astrophysics Source Code Library

    Science.gov (United States)

    Allen, Alice; DuPrie, Kimberly; Schmidt, Judy; Berriman, G. Bruce; Hanisch, Robert J.; Mink, Jessica D.; Nemiroff, Robert J.; Shamir, Lior; Shortridge, Keith; Taylor, Mark B.; Teuben, Peter J.; Wallin, John F.

    2016-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) is a free online registry of codes used in astronomy research. With nearly 1,200 codes, it is the largest indexed resource for astronomy codes in existence. Established in 1999, it offers software authors a path to citation of their research codes even without publication of a paper describing the software, and offers scientists a way to find codes used in refereed publications, thus improving the transparency of the research. It also provides a method to quantify the impact of source codes in a fashion similar to the science metrics of journal articles. Citations using ASCL IDs are accepted by major astronomy journals and if formatted properly are tracked by ADS and other indexing services. The number of citations to ASCL entries increased sharply from 110 citations in January 2014 to 456 citations in September 2015. The percentage of code entries in ASCL that were cited at least once rose from 7.5% in January 2014 to 17.4% in September 2015. The ASCL's mid-2014 infrastructure upgrade added an easy entry submission form, more flexible browsing, search capabilities, and an RSS feeder for updates. A Changes/Additions form added this past fall lets authors submit links for papers that use their codes for addition to the ASCL entry even if those papers don't formally cite the codes, thus increasing the transparency of that research and capturing the value of their software to the community.

  13. La apropiación del dominio público y las posibilidades de acceso a los bienes culturales | The appropriation of the public domain and the possibilities of access to cultural goods

    Directory of Open Access Journals (Sweden)

    Joan Ramos Toledano

    2017-06-01

    Full Text Available Resumen: Las normas de propiedad intelectual y copyright prevén un periodo de protección otorgando unos derechos económicos exclusivos y temporales. Pasado un plazo determinado, las obras protegidas entran en lo que se denomina dominio público. Éste suele ser considerado como el momento en el que los bienes culturales pasan a estar bajo el dominio y control de la sociedad en conjunto. El presente trabajo pretende argumentar que, dado nuestro actual sistema económico, en realidad el dominio público funciona más como una posibilidad de negocio para determinadas empresas que como una verdadera opción para que el público pueda acceder a las obras. Abstract: The legislation of continental intellectual property and copyright provide for a period of protection granting exclusive and temporary economic rights. After a certain period, protected works enter into what is called the public domain. This is often considered as the moment in which the cultural goods come under the control and domain of society as a whole. The present paper pretends to argue that, given our current economic system, the public domain actually functions more as a business opportunity for certain companies than as a real option for the public to access artistic and intellectual works.  

  14. Energy information data base: report number codes

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-09-01

    Each report processed by the US DOE Technical Information Center is identified by a unique report number consisting of a code plus a sequential number. In most cases, the code identifies the originating installation. In some cases, it identifies a specific program or a type of publication. Listed in this publication are all codes that have been used by DOE in cataloging reports. This compilation consists of two parts. Part I is an alphabetical listing of report codes identified with the issuing installations that have used the codes. Part II is an alphabetical listing of installations identified with codes each has used. (RWR)

  15. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 4.2 Affine variety codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 4.3 Some Gr¨obner basis theoretical tools . . . . . . . . . . . . . . . . . . . . . . . 155 4.4 A bound on the minimum distance of C(I,L) . . . . . . . . . . . . . . . . . . 157 4.5 The Feng-Rao bound...... for C(I,L)? . . . . . . . . . . . . . . . . . . . . . . . . 160 4.6 Using weighted degree orderings . . . . . . . . . . . . . . . . . . . . . . . . . 163 4.7 The order domain conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 4.8 Weight functions and order domains...

  16. 78 FR 18321 - International Code Council: The Update Process for the International Codes and Standards

    Science.gov (United States)

    2013-03-26

    ..., 2013 in Dallas, TX at the Sheraton Dallas Hotel. This will be followed by the Public Comment Hearings... Action Hearings in Dallas, TX at the Sheraton Dallas Hotel and the Public Comment Hearings in Atlantic... Fuel Gas Code. International Green Construction Code. International Mechanical Code. ICC Performance...

  17. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  18. New QC-LDPC codes based Niederreiter cryptography scheme by using dual public-key%基于QC-LD PC码的双公钥 Niederreiter密码方案

    Institute of Scientific and Technical Information of China (English)

    李冲; 韩益亮

    2016-01-01

    As an important research ofpost-quantum cryptography,code-based cryptography had excellent characteristics of low complexity and high security.With the code-based cryptosystem as the core knowledge,we constructed a new QC-LDPC codes based Niederreiter cryptography scheme by using dual public-key.And the safety analysis shows that the new scheme not only resists the common method of attack,but also meets the IND-CCA2 security.The analysis of performance of the scheme is also given.We can get the conclusions that public key sizes reduce by 63%and the information rate increase by 47%.%基于编码的公钥密码体制作为抗量子攻击密码理论的重要研究内容,具有加/解密复杂性低和安全性高的优异特性。针对Niederreiter公钥密码体制进行了研究,利用QC-LDPC码和双公钥的相关知识构造了一种新的Niederreiter加密方案。安全性分析表明,加密方案能抵抗常见攻击方法的同时满足随机预言机模型下的IND-CCA2安全。最后对方案的性能进行分析,较原有Niederreiter密码的公钥量减少63%和信息率提高47%的结论。

  19. Modeling Guidelines for Code Generation in the Railway Signaling Context

    Science.gov (United States)

    Ferrari, Alessio; Bacherini, Stefano; Fantechi, Alessandro; Zingoni, Niccolo

    2009-01-01

    Modeling guidelines constitute one of the fundamental cornerstones for Model Based Development. Their relevance is essential when dealing with code generation in the safety-critical domain. This article presents the experience of a railway signaling systems manufacturer on this issue. Introduction of Model-Based Development (MBD) and code generation in the industrial safety-critical sector created a crucial paradigm shift in the development process of dependable systems. While traditional software development focuses on the code, with MBD practices the focus shifts to model abstractions. The change has fundamental implications for safety-critical systems, which still need to guarantee a high degree of confidence also at code level. Usage of the Simulink/Stateflow platform for modeling, which is a de facto standard in control software development, does not ensure by itself production of high-quality dependable code. This issue has been addressed by companies through the definition of modeling rules imposing restrictions on the usage of design tools components, in order to enable production of qualified code. The MAAB Control Algorithm Modeling Guidelines (MathWorks Automotive Advisory Board)[3] is a well established set of publicly available rules for modeling with Simulink/Stateflow. This set of recommendations has been developed by a group of OEMs and suppliers of the automotive sector with the objective of enforcing and easing the usage of the MathWorks tools within the automotive industry. The guidelines have been published in 2001 and afterwords revisited in 2007 in order to integrate some additional rules developed by the Japanese division of MAAB [5]. The scope of the current edition of the guidelines ranges from model maintainability and readability to code generation issues. The rules are conceived as a reference baseline and therefore they need to be tailored to comply with the characteristics of each industrial context. Customization of these

  20. The moving mesh code Shadowfax

    CERN Document Server

    Vandenbroucke, Bert

    2016-01-01

    We introduce the moving mesh code Shadowfax, which can be used to evolve a mixture of gas, subject to the laws of hydrodynamics and gravity, and any collisionless fluid only subject to gravity, such as cold dark matter or stars. The code is written in C++ and its source code is made available to the scientific community under the GNU Affero General Public License. We outline the algorithm and the design of our implementation, and demonstrate its validity through the results of a set of basic test problems, which are also part of the public version. We also compare Shadowfax with a number of other publicly available codes using different hydrodynamical integration schemes, illustrating the advantages and disadvantages of the moving mesh technique.

  1. The moving mesh code SHADOWFAX

    Science.gov (United States)

    Vandenbroucke, B.; De Rijcke, S.

    2016-07-01

    We introduce the moving mesh code SHADOWFAX, which can be used to evolve a mixture of gas, subject to the laws of hydrodynamics and gravity, and any collisionless fluid only subject to gravity, such as cold dark matter or stars. The code is written in C++ and its source code is made available to the scientific community under the GNU Affero General Public Licence. We outline the algorithm and the design of our implementation, and demonstrate its validity through the results of a set of basic test problems, which are also part of the public version. We also compare SHADOWFAX with a number of other publicly available codes using different hydrodynamical integration schemes, illustrating the advantages and disadvantages of the moving mesh technique.

  2. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  3. Time Domain Induced Polarization

    DEFF Research Database (Denmark)

    Fiandaca, Gianluca; Auken, Esben; Christiansen, Anders Vest

    2012-01-01

    Time-domain-induced polarization has significantly broadened its field of reference during the last decade, from mineral exploration to environmental geophysics, e.g., for clay and peat identification and landfill characterization. Though, insufficient modeling tools have hitherto limited the use...... of time-domaininduced polarization for wider purposes. For these reasons, a new forward code and inversion algorithm have been developed using the full-time decay of the induced polarization response, together with an accurate description of the transmitter waveform and of the receiver transfer function......%. Furthermore, the presence of low-pass filters in time-domain-induced polarization instruments affects the early times of the acquired decays (typically up to 100 ms) and has to be modeled in the forward response to avoid significant loss of resolution. The developed forward code has been implemented in a 1D...

  4. Domains of quality of life: Results of a three-stage Delphi consensus-procedure amongst patients, family of patients, clinicians, scientists and the general public

    NARCIS (Netherlands)

    Pietersma, S.; de Vries, M.; Akker van den, M.E.

    2014-01-01

    Purpose Our key objective is to identify the core domains of health-related quality of life (QoL). Health-related QoL utility scales are commonly used in economic evaluations to assess the effectiveness of health-care interventions. However, health-care interventions are likely to affect QoL in a

  5. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe...... the codes succinctly using Gröbner bases....

  6. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory textto algebraic coding theory. In the first chapter, you'll gain insideknowledge of coding fundamentals, which is essential for a deeperunderstanding of state-of-the-art coding systems.This book is a quick reference for those who are unfamiliar withthis topic, as well as for use with specific applications such as cryptographyand communication. Linear error-correcting block codesthrough elementary principles span eleven chapters of the text.Cyclic codes, some finite field algebra, Goppa codes, algebraic decodingalgorithms, and applications in public-key cryptography andsecret-key cryptography are discussed, including problems and solutionsat the end of each chapter. Three appendices cover the Gilbertbound and some related derivations, a derivation of the Mac-Williams' identities based on the probability of undetected error,and two important tools for algebraic decoding-namely, the finitefield Fourier transform and the Euclidean algorithm for polynomials.

  7. Opening of energy markets: consequences on the missions of public utility and of security of supplies in the domain of electric power and gas; Ouverture des marches energetiques: consequences sur les missions de service public et de securite d'approvisionnement pour l'electricite et le gaz

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This conference was jointly organized by the International Energy Agency (IEA) and the French ministry of economy, finances, and industry (general direction of energy and raw materials, DGEMP). It was organized in 6 sessions dealing with: 1 - the public utility in the domain of energy: definition of the public utility missions, experience feedback about liberalized markets, public utility obligation and pricing regulation; 2 - the new US energy policy and the lessons learnt from the California crisis; 3 - the security of electric power supplies: concepts of security of supplies, opinion of operators, security of power supplies versus liberalization and investments; 4 - security of gas supplies: markets liberalization and investments, long-term contracts and security of supplies; 5 - debate: how to integrate the objectives of public utility and of security of supplies in a competing market; 6 - conclusions. This document brings together the available talks and transparencies presented at the conference. (J.S.)

  8. De-coding and re-coding RNA recognition by PUF and PPR repeat proteins.

    Science.gov (United States)

    Hall, Traci M Tanaka

    2016-02-01

    PUF and PPR proteins are two families of α-helical repeat proteins that recognize single-stranded RNA sequences. Both protein families hold promise as scaffolds for designed RNA-binding domains. A modular protein RNA recognition code was apparent from the first crystal structures of a PUF protein in complex with RNA, and recent studies continue to advance our understanding of natural PUF protein recognition (de-coding) and our ability to engineer specificity (re-coding). Degenerate recognition motifs make de-coding specificity of individual PPR proteins challenging. Nevertheless, re-coding PPR protein specificity using a consensus recognition code has been successful.

  9. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  10. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  11. Public-key Encryption Based on Extending Discrete Chebyshev Polynomials' Definition Domain to Real Number%基于实数域扩散离散Chebyshev多项式的公钥加密算法

    Institute of Scientific and Technical Information of China (English)

    陈宇; 韦鹏程

    2011-01-01

    将Chebyshev多项式与模运算相结合,对其定义在实数域上进行了扩展,经过理论验证和数据分析,总结出实数域多项式应用于公钥密码的一些性质.利用RSA公钥算法和EIGamal公钥算法的算法结构,提出基于有限域离散Chebyshev多项式的公钥密码算法.该算法结构类似于RSA算法,其安全性基于大数因式分解的难度或者与El-Gamal的离散对数难度相当,能够抵抗对于RSA的选择密文攻击,并且易于软件实现.%By combining Chebyshev polynomials with modulus compute,extending Chebyshev polynomials' definition domain to real number, some conclusions were drawn by theoretic verification and data analysis. Making use of the framework of the traditional public-key algorithm RSA and ElGamal, proposed a chaotic public-key encryption algorithm based on extending discrete Chebyshev polynomials' definition domain to Real number. Its security is based on the intractability of the integer factorization problem as RSA,and it is able to resist the chosen cipher-text attack against RSA and easy to be implemented.

  12. Phylogenetic relationships in the mushroom genus Coprinus and dark-spored allies based on sequence data from the nuclear gene coding for the large ribosomal subunit RNA: divergent domains, outgroups, and monophyly.

    Science.gov (United States)

    Hopple, J S; Vilgalys, R

    1999-10-01

    Phylogenetic relationships were investigated in the mushroom genus Coprinus based on sequence data from the nuclear encoded large-subunit rDNA gene. Forty-seven species of Coprinus and 19 additional species from the families Coprinaceae, Strophariaceae, Bolbitiaceae, Agaricaceae, Podaxaceae, and Montagneaceae were studied. A total of 1360 sites was sequenced across seven divergent domains and intervening sequences. A total of 302 phylogenetically informative characters was found. Ninety-eight percent of the average divergence between taxa was located within the divergent domains, with domains D2 and D8 being most divergent and domains D7 and D10 the least divergent. An empirical test of phylogenetic signal among divergent domains also showed that domains D2 and D3 had the lowest levels of homoplasy. Two equally most parsimonious trees were resolved using Wagner parsimony. A character-state weighted analysis produced 12 equally most parsimonious trees similar to those generated by Wagner parsimony. Phylogenetic analyses employing topological constraints suggest that none of the major taxonomic systems proposed for subgeneric classification is able to completely reflect phylogenetic relationships in Coprinus. A strict consensus integration of the two Wagner trees demonstrates the problematic nature of choosing outgroups within dark-spored mushrooms. The genus Coprinus is found to be polyphyletic and is separated into three distinct clades. Most Coprinus taxa belong to the first two clades, which together form a larger monophyletic group with Lacrymaria and Psathyrella in basal positions. A third clade contains members of Coprinus section Comati as well as the genus Leucocoprinus, Podaxis pistillaris, Montagnea arenaria, and Agaricus pocillator. This third clade is separated from the other species of Coprinus by members of the families Strophariaceae and Bolbitiaceae and the genus Panaeolus.

  13. Predictors of Biased Self-perception in Individuals with High Social Anxiety: The Effect of Self-consciousness in the Private and Public Self Domains.

    Science.gov (United States)

    Nordahl, Henrik; Plummer, Alice; Wells, Adrian

    2017-01-01

    "Biased self-perception," the tendency to perceive one's social performance as more negative than observers do, is characteristic of socially anxious individuals. Self-attention processes are hypothesised to underlie biased self-perception, however, different models emphasise different aspects of self-attention, with attention to the public aspects of the self being prominent. The current study aimed to investigate the relative contribution of two types of dispositional self-attention; public- and private self-consciousness to biased self-perception in a high (n = 48) versus a low (n = 48) social anxiety group undergoing an interaction task. The main finding was that private self-consciousness explained substantial and unique variance in biased negative self-perception in individuals with high social anxiety, while public self-consciousness did not. This relationship was independent of increments in state anxiety. Private self-consciousness appeared to have a specific association with bias related to overestimation of negative social performance rather than underestimation of positive social performance. The implication of this finding is that current treatment models of Social anxiety disorder might include broader aspects of self-focused attention, especially in the context of formulating self-evaluation biases.

  14. Predictors of Biased Self-perception in Individuals with High Social Anxiety: The Effect of Self-consciousness in the Private and Public Self Domains

    Directory of Open Access Journals (Sweden)

    Henrik Nordahl

    2017-07-01

    Full Text Available “Biased self-perception,” the tendency to perceive one’s social performance as more negative than observers do, is characteristic of socially anxious individuals. Self-attention processes are hypothesised to underlie biased self-perception, however, different models emphasise different aspects of self-attention, with attention to the public aspects of the self being prominent. The current study aimed to investigate the relative contribution of two types of dispositional self-attention; public- and private self-consciousness to biased self-perception in a high (n = 48 versus a low (n = 48 social anxiety group undergoing an interaction task. The main finding was that private self-consciousness explained substantial and unique variance in biased negative self-perception in individuals with high social anxiety, while public self-consciousness did not. This relationship was independent of increments in state anxiety. Private self-consciousness appeared to have a specific association with bias related to overestimation of negative social performance rather than underestimation of positive social performance. The implication of this finding is that current treatment models of Social anxiety disorder might include broader aspects of self-focused attention, especially in the context of formulating self-evaluation biases.

  15. Network Hatred:Obstruction and Decomposition of Order Construction in Virtual Public Domain%网络怨恨:虚拟公共领域秩序建构的梗阻与消解

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    网络怨恨既是一种情感体验,也是一种生存状态。越来越多的虚拟社会现象表明,网络怨恨已经出现了一定程度上的弥散,虚拟公共领域秩序建构因而面临着无法回避的现实梗阻。网络怨恨导致无直接利益冲突的网络暴力频现,基于网络民粹主义的阶层对抗遭遇激化,同时网络空间出现颠覆性的价值位移。究其根源,网络怨恨与网络世界的平等理念、现代社会的竞争意识和难以克服的现实困境密切相关。需要通过提升虚拟公共领域的公共理性,适度满足网络怨恨的宣泄需求,构建包容性发展的网络监督体系,纠正虚拟公共领域中的价值位移等途径,才能真正消解网络怨恨,实现虚拟公共领域的秩序化运行。%Network hatred is not only an emotional experience , but also a living state.It is suggested by more and more virtual social phenomenon that network hatred has been dispersing in the new public domain and has become virtual social emotions in the keynote.Thus, order construction in the virtual public domain has been ex-posed to practical obstructions which cannot be evaded.As a result of network hatred , network violence , which has no direct conflict of interests , frequently shows up , and network populism-based hierarchical confrontation is triggered , and concurrently , subversive value displacement shows up in network space.Tracing to the source , network hatred is closely related to the equality philosophy of network world , the sense of competition in the modern society and the insurmountable practical difficulties.Only by such channels as improving public reason of the virtual public domain , moderately satisfying the needs for unbosoming network hatred , constructing net-work supervision system under inclusive development and correcting value displacement in the virtual public do -main, can network hatred be truly decomposed and regularized operation of the

  16. L'apprentissage des langues médiatisé par les technologies (ALMT – Étude d'un domaine de recherche émergent à travers les publications de la revue Alsic Technology-mediated language learning: an emergent research domain under study through the review of a French scientific journal's publications

    Directory of Open Access Journals (Sweden)

    Nicolas Guichon

    2012-11-01

    Full Text Available Dans cette étude, il est postulé que l'apprentissage des langues médiatisé par les technologies (ALMT est un domaine de recherche qui s'intéresse au développement et à l'intégration des technologies dans l'enseignement-apprentissage d'une langue. Ce domaine étant émergent, la présente recherche vise tout d'abord à comprendre comment s'est formée la communauté de chercheurs autour de cet objet. Puis, à travers l'analyse critique de 79 articles publiés dans la revue en ligne francophone Alsic entre 1998 et 2010, la présente contribution s'emploie à définir les contours épistémologiques de ce domaine en étudiant les moyens de production de connaissance.In this study, it is postulated that technology mediated language learning is a research domain that focuses on the design and integration of technologies for language learning and teaching. Because this domain is emergent, the present study first aims at understanding how a community of researchers has developed around this object. Then, thanks to the critical analysis of 79 articles published in Alsic, a French-speaking online journal, the present article endeavours to define the epistemological contours of this research domain by studying the means employed to produce knowledge.

  17. Good Codes From Generalised Algebraic Geometry Codes

    CERN Document Server

    Jibril, Mubarak; Ahmed, Mohammed Zaki; Tjhai, Cen

    2010-01-01

    Algebraic geometry codes or Goppa codes are defined with places of degree one. In constructing generalised algebraic geometry codes places of higher degree are used. In this paper we present 41 new codes over GF(16) which improve on the best known codes of the same length and rate. The construction method uses places of small degree with a technique originally published over 10 years ago for the construction of generalised algebraic geometry codes.

  18. THEORETICAL ASPECTS REGARDING THE NEW OFFENSE COVERED BY ART. 246 OF THE CRIMINAL CODE MISSAPPROPRIATION OF PUBLIC AUCTIONS AND OFFENCES COVERED BY ART. 65 OF LAW NO. 21/1996 REPUBLISHED. COMPETITION LAW

    Directory of Open Access Journals (Sweden)

    Rodica Aida POPA

    2016-06-01

    Full Text Available The present study aims to bring to the attention of the legal law specialists the theoretical aspects related to a new incrimination as the one covered by art. 246 of the Penal Code, the misappropriation of public auctions, as well as aspects of yet another incrimination, that is the one covered by art. 65 of Law no. 21/1996 republished-competition law, trying thus to prevent certain different interpretations about the typicality of the two incriminations and encourage the possibility of highlighting other arguments that will lead to an application as accurate as possible of the two incriminations. Presently there is no case law for the two incriminations therefore the theoretical analysis has to present interpretation arguments which will help the judicial bodies to easily classify the factual basis of the content of the two constitutive laws offering the possibility of a more detailed and contextual interpretation in relation to the reality. The way the public auctions take place is a constant preoccupation not only for the participants who are involved in the procedure and directly interested in abiding the under law and ensuring a fair competitive climate but also for the public opinion which is as equally interested in ensuring fair social-economical relationships based on the market principles. Simultaneously, the way the legal conditions of the second incriminations-that is the one from art.65 Law no.21/1996 republished - are interpreted in relation with the competition practices will lead to the clarification of the norm and its correct enforcement.

  19. Selected DOE headquarters publications

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-07-01

    Selected DOE Headquarters Publications provides cumulative listings, from October 1, 1977 onward, of two groups of publications issued by headquarters organizations of the Department of Energy, and an index to their title keywords. The two groups consist of publications assigned a DOE/XXX-type report number code and headquarters contractor publications, prepared by contractors (and published by DOE) to describe research and development work they have performed for the Department. Publications such as pamphlets, fact sheets, bulletins, newsletters, and telephone directories, are omitted, as are publications issued under the DOE-tr, CONF, DOE/JPL, and DOE/NASA codes. (RWR)

  20. Open-Source Development of the Petascale Reactive Flow and Transport Code PFLOTRAN

    Science.gov (United States)

    Hammond, G. E.; Andre, B.; Bisht, G.; Johnson, T.; Karra, S.; Lichtner, P. C.; Mills, R. T.

    2013-12-01

    Open-source software development has become increasingly popular in recent years. Open-source encourages collaborative and transparent software development and promotes unlimited free redistribution of source code to the public. Open-source development is good for science as it reveals implementation details that are critical to scientific reproducibility, but generally excluded from journal publications. In addition, research funds that would have been spent on licensing fees can be redirected to code development that benefits more scientists. In 2006, the developers of PFLOTRAN open-sourced their code under the U.S. Department of Energy SciDAC-II program. Since that time, the code has gained popularity among code developers and users from around the world seeking to employ PFLOTRAN to simulate thermal, hydraulic, mechanical and biogeochemical processes in the Earth's surface/subsurface environment. PFLOTRAN is a massively-parallel subsurface reactive multiphase flow and transport simulator designed from the ground up to run efficiently on computing platforms ranging from the laptop to leadership-class supercomputers, all from a single code base. The code employs domain decomposition for parallelism and is founded upon the well-established and open-source parallel PETSc and HDF5 frameworks. PFLOTRAN leverages modern Fortran (i.e. Fortran 2003-2008) in its extensible object-oriented design. The use of this progressive, yet domain-friendly programming language has greatly facilitated collaboration in the code's software development. Over the past year, PFLOTRAN's top-level data structures were refactored as Fortran classes (i.e. extendible derived types) to improve the flexibility of the code, ease the addition of new process models, and enable coupling to external simulators. For instance, PFLOTRAN has been coupled to the parallel electrical resistivity tomography code E4D to enable hydrogeophysical inversion while the same code base can be used as a third

  1. CYCLIC CODES OVER THE RING Zp2 OF LENGTH pe

    Institute of Scientific and Technical Information of China (English)

    Shi Minjia; Zhu Shixin

    2008-01-01

    The study of cyclic codes over rings has generated a lot of public interest. In this paper,we study cyclic codes and their dual codes over the ring Zp2 of length pe,and find a set of generators for these codes. The ranks and minimal generator sets of these codes are studied as well,which play an important role in decoding and determining the distance distribution of codes.

  2. Toward a Code of Conduct for Graduate Education

    Science.gov (United States)

    Proper, Eve

    2012-01-01

    Most academic disciplines promulgate codes of ethics that serve as public statements of professional norms of their membership. These codes serve both symbolic and practical purposes, stating to both members and the larger public what a discipline's highest ethics are. This article explores what scholarly society codes of ethics could say about…

  3. Space Time Codes from Permutation Codes

    CERN Document Server

    Henkel, Oliver

    2006-01-01

    A new class of space time codes with high performance is presented. The code design utilizes tailor-made permutation codes, which are known to have large minimal distances as spherical codes. A geometric connection between spherical and space time codes has been used to translate them into the final space time codes. Simulations demonstrate that the performance increases with the block lengths, a result that has been conjectured already in previous work. Further, the connection to permutation codes allows for moderate complex en-/decoding algorithms.

  4. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  5. Two centuries of the Austrian Civil code (1811-2011

    Directory of Open Access Journals (Sweden)

    Nikolić Dušan

    2011-01-01

    Full Text Available Austrian civil code (Allgemeines bürgerliches Gesetzbuch - ABGB, ACC succeeded in resisting the challenges of time for two centuries. A number of factors influenced it's longevity. First of all, prior to adoption of the law, a long lasting and well designed work, which has been described in greater detail in this article, was done. The Code was written gradually, with lots of recalculations, checks and public debates. In legal literature, it is often written about a unique lawmaking experiment, which Austrian authorities made by implementing the Code in one part of the state territory. The Code was written for feudal order, but according to principles of natural law. This second thing has, in addition to widely formulated and flexible legal norms, left enough space for extensive interpretation of outdated rules, and filling in the legal lacunas, whose number was increasing as the time passed. Courts often used this opportunity in a creative manner, contributing to survival of the Code. Many additions and changes were made to the Code, but there were few of those who thought that it should be changed by a new one Code. Austrians are preparing a more detailed revision of the ACC, which will allow modernization of the national law and it's synchronization with trends in current European law, but on the other hand, to preserve the two century old legal heritage. The second part of this article is dedicated to the influence of the Austrian Civil Code on the development of civil law in the former Yugoslavia and Serbia. ACC served as model for adoption of the Serbian Civil Code of 1844. It was applied as a positive law in the first half of XX century, in one part of the territory of today's Autonomous Province of Vojvodina. Formally, legal rules of the Austrian Civil Code can even be applied today, according to the Law on Nullity of Legal Regulations Enacted Prior to 6th of April 1941, and During the Enemy Occupation. However, that possibility is more

  6. 41 CFR 101-30.701-2 - Item standardization code.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Item standardization code....7-Item Reduction Program § 101-30.701-2 Item standardization code. Item standardization code (ISC) means a code assigned an item in the supply system which identifies the item as authorized...

  7. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  8. Multiple Encryption-based Algorithm of Agricultural Product Trace Code

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    To establish a sound traceability system of agricultural products and guarantee security of agricultural products,an algorithm is proposed to encrypt trace code of agricultural products.Original trace code consists of 34 digits indicating such information as place of origin,name of product,date of production and authentication.Area code is used to indicate enterprise information,the encrypted algorithm is designed because of the increasing code length,such coding algorithms as system conversion and section division are applied for the encrypted conversion of code of origin place and production date code,moreover,section identification code and authentication code are permutated and combined to produce check code.Through the multiple encryption and code length compression,34 digits are compressed to 20 on the basis of ensuring complete coding information,shorter code length and better encryption enable the public to know information about agricultural products without consulting professional database.

  9. Coding as literacy metalithikum IV

    CERN Document Server

    Bühlmann, Vera; Moosavi, Vahid

    2015-01-01

    Recent developments in computer science, particularly "data-driven procedures" have opened a new level of design and engineering. This has also affected architecture. The publication collects contributions on Coding as Literacy by computer scientists, mathematicians, philosophers, cultural theorists, and architects. "Self-Organizing Maps" (SOM) will serve as the concrete reference point for all further discussions.

  10. Corrections to the Vienna Code

    Science.gov (United States)

    Since the publication of the Vienna Code, several errors have been noticed. Most are minor punctuation or cross-referencing errors, or, in the Appendices, inconsistencies in abbreviation, but there was one important omission from Art. 37, the misspelling of two specific epithets and the transpositio...

  11. The information capacity of the genetic code: Is the natural code optimal?

    Science.gov (United States)

    Kuruoglu, Ercan E; Arndt, Peter F

    2017-04-21

    We envision the molecular evolution process as an information transfer process and provide a quantitative measure for information preservation in terms of the channel capacity according to the channel coding theorem of Shannon. We calculate Information capacities of DNA on the nucleotide (for non-coding DNA) and the amino acid (for coding DNA) level using various substitution models. We extend our results on coding DNA to a discussion about the optimality of the natural codon-amino acid code. We provide the results of an adaptive search algorithm in the code domain and demonstrate the existence of a large number of genetic codes with higher information capacity. Our results support the hypothesis of an ancient extension from a 2-nucleotide codon to the current 3-nucleotide codon code to encode the various amino acids. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Phase 1 Validation Testing and Simulation for the WEC-Sim Open Source Code

    Science.gov (United States)

    Ruehl, K.; Michelen, C.; Gunawan, B.; Bosma, B.; Simmons, A.; Lomonaco, P.

    2015-12-01

    WEC-Sim is an open source code to model wave energy converters performance in operational waves, developed by Sandia and NREL and funded by the US DOE. The code is a time-domain modeling tool developed in MATLAB/SIMULINK using the multibody dynamics solver SimMechanics, and solves the WEC's governing equations of motion using the Cummins time-domain impulse response formulation in 6 degrees of freedom. The WEC-Sim code has undergone verification through code-to-code comparisons; however validation of the code has been limited to publicly available experimental data sets. While these data sets provide preliminary code validation, the experimental tests were not explicitly designed for code validation, and as a result are limited in their ability to validate the full functionality of the WEC-Sim code. Therefore, dedicated physical model tests for WEC-Sim validation have been performed. This presentation provides an overview of the WEC-Sim validation experimental wave tank tests performed at the Oregon State University's Directional Wave Basin at Hinsdale Wave Research Laboratory. Phase 1 of experimental testing was focused on device characterization and completed in Fall 2015. Phase 2 is focused on WEC performance and scheduled for Winter 2015/2016. These experimental tests were designed explicitly to validate the performance of WEC-Sim code, and its new feature additions. Upon completion, the WEC-Sim validation data set will be made publicly available to the wave energy community. For the physical model test, a controllable model of a floating wave energy converter has been designed and constructed. The instrumentation includes state-of-the-art devices to measure pressure fields, motions in 6 DOF, multi-axial load cells, torque transducers, position transducers, and encoders. The model also incorporates a fully programmable Power-Take-Off system which can be used to generate or absorb wave energy. Numerical simulations of the experiments using WEC-Sim will be

  13. Constructions of quantum Bose Chadhuri Hocquenghem code using spectral techniques

    Science.gov (United States)

    Guo, Ying; Zeng, Guihua; Lee, Moon Ho; Fan, Jianping

    2007-08-01

    A quantum Bose-Chadhuri-Hocquenghem (BCH) code is constructed over Fnpm in the spectrum domain by employing Fourier transform. The constructed code may be employed to describe the characters of the quantum code over Fnp in the time domain. Each quantum state of the proposed code has certain specified consecutive spectral components equalling zeros, and the error-correcting ability of the code can hence be determined by the number of consecutive zeros in its parity spectrums. Moreover, the decoding process may be performed more efficiently by using the spectrum techniques rather than by using the traditional methods.

  14. Public Computation & Boundary Play

    CERN Document Server

    Sengupta, Pratim

    2016-01-01

    In this paper, we introduce 'public computation' as a genre of learning environments that can be used to radically broaden public participation in authentic, computation-enabled STEM disciplinary practices. Our paradigmatic approach utilizes open source software designed for professional scientists, engineers and digital artists, and situates them in an undiluted form, alongside live and archived expert support, in a public space. We present a case study of DigiPlay, a prototypical public computation space we designed at the University of Calgary, where users can interact directly with scientific simulations as well as the underlying open source code using an array of massive multi- touch screens. We argue that in such a space, public interactions with the code can be thought of as boundary work and play, through which public participation becomes legitimate scientific act, as the public engages in scientific creation through truly open-ended explorations with the code.

  15. Beyond cross-domain learning: Multiple-domain nonnegative matrix factorization

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-02-01

    Traditional cross-domain learning methods transfer learning from a source domain to a target domain. In this paper, we propose the multiple-domain learning problem for several equally treated domains. The multiple-domain learning problem assumes that samples from different domains have different distributions, but share the same feature and class label spaces. Each domain could be a target domain, while also be a source domain for other domains. A novel multiple-domain representation method is proposed for the multiple-domain learning problem. This method is based on nonnegative matrix factorization (NMF), and tries to learn a basis matrix and coding vectors for samples, so that the domain distribution mismatch among different domains will be reduced under an extended variation of the maximum mean discrepancy (MMD) criterion. The novel algorithm - multiple-domain NMF (MDNMF) - was evaluated on two challenging multiple-domain learning problems - multiple user spam email detection and multiple-domain glioma diagnosis. The effectiveness of the proposed algorithm is experimentally verified. © 2013 Elsevier Ltd. All rights reserved.

  16. Strong Trinucleotide Circular Codes

    Directory of Open Access Journals (Sweden)

    Christian J. Michel

    2011-01-01

    Full Text Available Recently, we identified a hierarchy relation between trinucleotide comma-free codes and trinucleotide circular codes (see our previous works. Here, we extend our hierarchy with two new classes of codes, called DLD and LDL codes, which are stronger than the comma-free codes. We also prove that no circular code with 20 trinucleotides is a DLD code and that a circular code with 20 trinucleotides is comma-free if and only if it is a LDL code. Finally, we point out the possible role of the symmetric group ∑4 in the mathematical study of trinucleotide circular codes.

  17. Distributed Video Coding: CODEC Architecture and Implementation

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Kodavalla

    2011-03-01

    Full Text Available Distributed Video Coding (DVC is a new coding paradigm for video compression, based on Slepian-Wolf (lossless coding and Wyner-Ziv (lossy coding information theoretic results. DVC is useful foremerging applications such as wireless video cameras, wireless low-power surveillance networks anddisposable video cameras for medical applications etc. The primary objective of DVC is low-complexityvideo encoding, where bulk of computation is shifted to the decoder, as opposed to low-complexitydecoder in conventional video compression standards such as H.264 and MPEG etc. There are couple ofearly architectures and implementations of DVC from Stanford University[2][3] in 2002, BerkeleyUniversity PRISM (Power-efficient, Robust, hIgh-compression, Syndrome-based Multimedia coding[4][5]in 2002 and European project DISCOVER (DIStributed COding for Video SERvices[6] in 2007.Primarily there are two types of DVC techniques namely pixel domain and transform domain based.Transform domain design will have better rate-distortion (RD performance as it exploits spatialcorrelation between neighbouring samples and compacts the block energy into as few transformcoefficients as possible (aka energy compaction. In this paper, architecture, implementation details and“C” model results of our transform domain DVC are presented.

  18. Trusted Domain

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Torbensen, Rune

    2012-01-01

    that enables secure end-to-end communication with home automation devices, and it supports device revocations as well as a structure of intersecting sets of nodes for scalability. Devices in the Trusted Domain are registered in a list that is distributed using a robust epidemic protocol optimized...

  19. Domain crossing

    DEFF Research Database (Denmark)

    Schraefel, M. C.; Rouncefield, Mark; Kellogg, Wendy

    2012-01-01

    In CSCW, how much do we need to know about another domain/culture before we observe, intersect and intervene with designs. What optimally would that other culture need to know about us? Is this a “how long is a piece of string” question, or an inquiry where we can consider a variety of contexts a...

  20. THE PUBLIC OFFICER - THE ACTIVE SUBJECT OF A CRIME

    Directory of Open Access Journals (Sweden)

    NICOLETA-ELENA BUZATU

    2011-04-01

    Full Text Available The present study intends to analyze the active subject of the crime committed by an individual - the public officer, for example - during his daily duty program or with reference to the attributions he has versus the public office he holds, in the light of the regulations provided not only by the Penal Code in force but also by the future New Penal Code, as, among the important amendments it provides, the definition of the public officer is also mentioned. In the case of such a trespassing, the active subject shall hold the quality of a public officer the way this quality is regulated by the Penal Code, even if the definition is much ampler as compared to the one given by the Statute of the Public Officers. According to Art 147, paragraph 1 Penal Code, a public officer is any individual who permanently or temporarily exercises - irrespective of his/her rank or of the way this office was appointed, a paid or unpaid task of no matter what nature or importance - in the service of a department Art 145 refers to. The regulation proposed in perfect agreement with the solutions offered by other international legislations and conventions in the domain, the definition of a public officer refers to the individual who - permanently or temporarily appointed, paid or unpaid - shall exercise attributions specific to the legislative, executive or judiciary powers, a function of public dignity or a function of any other type - alone or in a group - within a self-governing management of another economic agent or of a legal person with a whole or a greater capital, or belonging to a legally declared person capital or to a legal person considered to be of public utility - attributions connected with the object of the latter’s activity.

  1. Joint source channel coding using arithmetic codes

    CERN Document Server

    Bi, Dongsheng

    2009-01-01

    Based on the encoding process, arithmetic codes can be viewed as tree codes and current proposals for decoding arithmetic codes with forbidden symbols belong to sequential decoding algorithms and their variants. In this monograph, we propose a new way of looking at arithmetic codes with forbidden symbols. If a limit is imposed on the maximum value of a key parameter in the encoder, this modified arithmetic encoder can also be modeled as a finite state machine and the code generated can be treated as a variable-length trellis code. The number of states used can be reduced and techniques used fo

  2. Mapping Knowledge Domain on Subject Headings of Public Sentiment Research Based on Multi-dimensional Scaling%基于多维尺度分析的舆情研究主题词知识图谱

    Institute of Scientific and Technical Information of China (English)

    孙艳; 田丽梅

    2016-01-01

    为了对舆情的研究现状进行客观梳理,总结研究文献内在的联系和科学结构,文中选取近5年来中国知网收录的“中文核心期刊”和“CSSCI”相关研究文献展开研究。首先,进行前期数据准备,包括准备的步骤与方法及其相关的数学模型;然后,将相异系数矩阵输入到SPSS中进行多维尺度分析并绘制知识图谱;最后,从维度定义和空间分布特点两个方面对知识图谱进行分析。结果表明,当前舆情研究主要集中于4个方向,舆情直接相关研究是重点与热点,媒体相关的研究领域也较活跃,但一些细分的研究方向成果比较分散。%In order to conduct objective comb for the current situation of public sentiment research and summarize the intrinsic links and science structure of researched literatures,it researches on"Chinese Core Journals" and"CSSCI" relevant research literatures included in CNKI in the past five years in this paper. First,preliminary data should be prepared,comprising the steps and methods of preparation and associated mathematical model. Then,the dissimilarity coefficient matrix is input into SPSS software to carry on multi dimensional scaling and draw mapping knowledge domain. Finally,mapping knowledge domain must be analyzed from two aspects of dimension definition and spatial distribution. The results show that the current public sentiment research has focused on four directions,and direct relevant re-search of public sentiment is the focus and hotspot,and media-related field of study is more active,but some results of research direction of segmentation are more dispersed.

  3. Domain Specific Language Support for Exascale

    Energy Technology Data Exchange (ETDEWEB)

    Sadayappan, Ponnuswamy [The Ohio State Univ., Columbus, OH (United States)

    2017-02-24

    Domain-Specific Languages (DSLs) offer an attractive path to Exascale software since they provide expressive power through appropriate abstractions and enable domain-specific optimizations. But the advantages of a DSL compete with the difficulties of implementing a DSL, even for a narrowly defined domain. The DTEC project addresses how a variety of DSLs can be easily implemented to leverage existing compiler analysis and transformation capabilities within the ROSE open source compiler as part of a research program focusing on Exascale challenges. The OSU contributions to the DTEC project are in the area of code generation from high-level DSL descriptions, as well as verification of the automatically-generated code.

  4. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  5. Australasian code for reporting of mineral resources and ore reserves (the JORC code)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-06-01

    The latest revision of the Code first published in 1989 becomes effective in September 1999. It was prepared by the Joint Ores Reserves Committee of the Australasian Institute of Mining and Metallurgy, Australian Institute of Geoscientists and Minerals Council of Australia (JORC). It sets out minimum standards, recommendations and guidelines for public reporting of exploration results, mineral resources and ore reserves in Australasia. In this edition, the guidelines, which were previously separated from the Code, have been placed after the respective Code clauses. The Code is applicable to all solid minerals, including diamonds, other gemstones and coal for which public reporting is required by the Australian and New Zealand Stock Exchanges.

  6. Lossless Compression of JPEG Coded Photo Collections.

    Science.gov (United States)

    Wu, Hao; Sun, Xiaoyan; Yang, Jingyu; Zeng, Wenjun; Wu, Feng

    2016-04-06

    The explosion of digital photos has posed a significant challenge to photo storage and transmission for both personal devices and cloud platforms. In this paper, we propose a novel lossless compression method to further reduce the size of a set of JPEG coded correlated images without any loss of information. The proposed method jointly removes inter/intra image redundancy in the feature, spatial, and frequency domains. For each collection, we first organize the images into a pseudo video by minimizing the global prediction cost in the feature domain. We then present a hybrid disparity compensation method to better exploit both the global and local correlations among the images in the spatial domain. Furthermore, the redundancy between each compensated signal and the corresponding target image is adaptively reduced in the frequency domain. Experimental results demonstrate the effectiveness of the proposed lossless compression method. Compared to the JPEG coded image collections, our method achieves average bit savings of more than 31%.

  7. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  8. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  9. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  10. The optimal code searching method with an improved criterion of coded exposure for remote sensing image restoration

    Science.gov (United States)

    He, Lirong; Cui, Guangmang; Feng, Huajun; Xu, Zhihai; Li, Qi; Chen, Yueting

    2015-03-01

    Coded exposure photography makes the motion de-blurring a well-posed problem. The integration pattern of light is modulated using the method of coded exposure by opening and closing the shutter within the exposure time, changing the traditional shutter frequency spectrum into a wider frequency band in order to preserve more image information in frequency domain. The searching method of optimal code is significant for coded exposure. In this paper, an improved criterion of the optimal code searching is proposed by analyzing relationship between code length and the number of ones in the code, considering the noise effect on code selection with the affine noise model. Then the optimal code is obtained utilizing the method of genetic searching algorithm based on the proposed selection criterion. Experimental results show that the time consuming of searching optimal code decreases with the presented method. The restoration image is obtained with better subjective experience and superior objective evaluation values.

  11. Predicting domain-domain interaction based on domain profiles with feature selection and support vector machines

    Directory of Open Access Journals (Sweden)

    Liao Li

    2010-10-01

    Full Text Available Abstract Background Protein-protein interaction (PPI plays essential roles in cellular functions. The cost, time and other limitations associated with the current experimental methods have motivated the development of computational methods for predicting PPIs. As protein interactions generally occur via domains instead of the whole molecules, predicting domain-domain interaction (DDI is an important step toward PPI prediction. Computational methods developed so far have utilized information from various sources at different levels, from primary sequences, to molecular structures, to evolutionary profiles. Results In this paper, we propose a computational method to predict DDI using support vector machines (SVMs, based on domains represented as interaction profile hidden Markov models (ipHMM where interacting residues in domains are explicitly modeled according to the three dimensional structural information available at the Protein Data Bank (PDB. Features about the domains are extracted first as the Fisher scores derived from the ipHMM and then selected using singular value decomposition (SVD. Domain pairs are represented by concatenating their selected feature vectors, and classified by a support vector machine trained on these feature vectors. The method is tested by leave-one-out cross validation experiments with a set of interacting protein pairs adopted from the 3DID database. The prediction accuracy has shown significant improvement as compared to InterPreTS (Interaction Prediction through Tertiary Structure, an existing method for PPI prediction that also uses the sequences and complexes of known 3D structure. Conclusions We show that domain-domain interaction prediction can be significantly enhanced by exploiting information inherent in the domain profiles via feature selection based on Fisher scores, singular value decomposition and supervised learning based on support vector machines. Datasets and source code are freely available on

  12. The block cipher NSABC (public domain)

    CERN Document Server

    Nguyenova-Stepanikova, Alice

    2011-01-01

    We introduce NSABC/w -- Nice-Structured Algebraic Block Cipher using w-bit word arithmetic, a 4w-bit analogous of Skipjack [NSA98] with 5w-bit key. The Skipjack's internal 4-round Feistel structure is replaced with a w-bit, 2-round cascade of a binary operation (x,z)\\mapsto(x\\boxdot z)\\lll(w/2) that permutes a text word x under control of a key word z. The operation \\boxdot, similarly to the multiplication in IDEA [LM91, LMM91], bases on an algebraic group over w-bit words, so it is also capable of decrypting by means of the inverse element of z in the group. The cipher utilizes a secret 4w-bit tweak -- an easily changeable parameter with unique value for each block encrypted under the same key [LRW02] -- that is derived from the block index and an additional 4w -bit key. A software implementation for w=64 takes circa 9 clock cycles per byte on x86-64 processors.

  13. 22 CFR 120.11 - Public domain.

    Science.gov (United States)

    2010-04-01

    .... Government and specific access and dissemination controls protecting information resulting from the research... published information; (3) Through second class mailing privileges granted by the U.S. Government; (4) At.... Government access and dissemination controls. University research will not be considered fundamental...

  14. Practices in source code sharing in astrophysics

    CERN Document Server

    Shamir, Lior; Allen, Alice; Berriman, Bruce; Teuben, Peter; Nemiroff, Robert J; Mink, Jessica; Hanisch, Robert J; DuPrie, Kimberly

    2013-01-01

    While software and algorithms have become increasingly important in astronomy, the majority of authors who publish computational astronomy research do not share the source code they develop, making it difficult to replicate and reuse the work. In this paper we discuss the importance of sharing scientific source code with the entire astrophysics community, and propose that journals require authors to make their code publicly available when a paper is published. That is, we suggest that a paper that involves a computer program not be accepted for publication unless the source code becomes publicly available. The adoption of such a policy by editors, editorial boards, and reviewers will improve the ability to replicate scientific results, and will also make the computational astronomy methods more available to other researchers who wish to apply them to their data.

  15. A Fast Fractal Image Compression Coding Method

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Fast algorithms for reducing encoding complexity of fractal image coding have recently been an important research topic. Search of the best matched domain block is the most computation intensive part of the fractal encoding process. In this paper, a fast fractal approximation coding scheme implemented on a personal computer based on matching in range block's neighbours is presented. Experimental results show that the proposed algorithm is very simple in implementation, fast in encoding time and high in compression ratio while PSNR is almost the same as compared with Barnsley's fractal block coding .

  16. Overcoming Challenges in Engineering the Genetic Code.

    Science.gov (United States)

    Lajoie, M J; Söll, D; Church, G M

    2016-02-27

    Withstanding 3.5 billion years of genetic drift, the canonical genetic code remains such a fundamental foundation for the complexity of life that it is highly conserved across all three phylogenetic domains. Genome engineering technologies are now making it possible to rationally change the genetic code, offering resistance to viruses, genetic isolation from horizontal gene transfer, and prevention of environmental escape by genetically modified organisms. We discuss the biochemical, genetic, and technological challenges that must be overcome in order to engineer the genetic code.

  17. Analysis of quantum error-correcting codes: Symplectic lattice codes and toric codes

    Science.gov (United States)

    Harrington, James William

    Quantum information theory is concerned with identifying how quantum mechanical resources (such as entangled quantum states) can be utilized for a number of information processing tasks, including data storage, computation, communication, and cryptography. Efficient quantum algorithms and protocols have been developed for performing some tasks (e.g. , factoring large numbers, securely communicating over a public channel, and simulating quantum mechanical systems) that appear to be very difficult with just classical resources. In addition to identifying the separation between classical and quantum computational power, much of the theoretical focus in this field over the last decade has been concerned with finding novel ways of encoding quantum information that are robust against errors, which is an important step toward building practical quantum information processing devices. In this thesis I present some results on the quantum error-correcting properties of oscillator codes (also described as symplectic lattice codes) and toric codes. Any harmonic oscillator system (such as a mode of light) can be encoded with quantum information via symplectic lattice codes that are robust against shifts in the system's continuous quantum variables. I show the existence of lattice codes whose achievable rates match the one-shot coherent information over the Gaussian quantum channel. Also, I construct a family of symplectic self-dual lattices and search for optimal encodings of quantum information distributed between several oscillators. Toric codes provide encodings of quantum information into two-dimensional spin lattices that are robust against local clusters of errors and which require only local quantum operations for error correction. Numerical simulations of this system under various error models provide a calculation of the accuracy threshold for quantum memory using toric codes, which can be related to phase transitions in certain condensed matter models. I also present

  18. Universal Ethics Code: Both Possible and Feasible.

    Science.gov (United States)

    Kruckeberg, Dean

    1993-01-01

    Argues that no insurmountable barriers preclude the development of a binding code within the public relations professional community. Suggests a professional model similar to that used by Certified Public Accountants as more appropriate, because it recognizes that not all the activities of its practitioners can be exclusionary and limited to those…

  19. Performance evaluation of MPEG internet video coding

    Science.gov (United States)

    Luo, Jiajia; Wang, Ronggang; Fan, Kui; Wang, Zhenyu; Li, Ge; Wang, Wenmin

    2016-09-01

    Internet Video Coding (IVC) has been developed in MPEG by combining well-known existing technology elements and new coding tools with royalty-free declarations. In June 2015, IVC project was approved as ISO/IEC 14496-33 (MPEG- 4 Internet Video Coding). It is believed that this standard can be highly beneficial for video services in the Internet domain. This paper evaluates the objective and subjective performances of IVC by comparing it against Web Video Coding (WVC), Video Coding for Browsers (VCB) and AVC High Profile. Experimental results show that IVC's compression performance is approximately equal to that of the AVC High Profile for typical operational settings, both for streaming and low-delay applications, and is better than WVC and VCB.

  20. Locally Orderless Registration Code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  1. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  2. A Study of Code-switching in the College English Classroom

    Institute of Scientific and Technical Information of China (English)

    LEI Chun-xiao

    2015-01-01

    Code-switching is an important domain in the sociolingusitics. Since the 1970s, lots of linguists and experts has at⁃tached great importance to it. This paper is a tentative study of code-switching in the teaching English as a second language (TESL) from such aspects: the review of code-switching, principles adhered to the code-switching, factors which leads to the code-switching, and attitudes and functions of code-switching in the TESL.

  3. Quantization of wavelet packet audio coding

    Institute of Scientific and Technical Information of China (English)

    Tan Jianguo; Zhang Wenjun; Liu Peilin

    2006-01-01

    The method of quantization noise control of audio coding in the wavelet domain is proposed. Using the inverse Discrete Fourier Transform (DFT), it converts the masking threshold coming from MPEG psycho-acoustic model in the frequency domain to the signal in the time domain; the Discrete Wavelet Packet Transform (DWPT) is performed; the energy in each subband is regarded as the maximum allowed quantization noise energy. The experimental result shows that the proposed method can attain the nearly transparent audio quality below 64kbps for the most testing audio signals.

  4. Reusable State Machine Code Generator

    Science.gov (United States)

    Hoffstadt, A. A.; Reyes, C.; Sommer, H.; Andolfato, L.

    2010-12-01

    The State Machine model is frequently used to represent the behaviour of a system, allowing one to express and execute this behaviour in a deterministic way. A graphical representation such as a UML State Chart diagram tames the complexity of the system, thus facilitating changes to the model and communication between developers and domain experts. We present a reusable state machine code generator, developed by the Universidad Técnica Federico Santa María and the European Southern Observatory. The generator itself is based on the open source project architecture, and uses UML State Chart models as input. This allows for a modular design and a clean separation between generator and generated code. The generated state machine code has well-defined interfaces that are independent of the implementation artefacts such as the middle-ware. This allows using the generator in the substantially different observatory software of the Atacama Large Millimeter Array and the ESO Very Large Telescope. A project-specific mapping layer for event and transition notification connects the state machine code to its environment, which can be the Common Software of these projects, or any other project. This approach even allows to automatically create tests for a generated state machine, using techniques from software testing, such as path-coverage.

  5. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  6. Constructing quantum codes

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Quantum error correcting codes are indispensable for quantum information processing and quantum computation.In 1995 and 1996,Shor and Steane gave first several examples of quantum codes from classical error correcting codes.The construction of efficient quantum codes is now an active multi-discipline research field.In this paper we review the known several constructions of quantum codes and present some examples.

  7. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-04-11

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaickingand 4D light field view synthesis.

  8. .Gov Domains API

    Data.gov (United States)

    General Services Administration — This dataset offers the list of all .gov domains, including state, local, and tribal .gov domains. It does not include .mil domains, or other federal domains outside...

  9. 78 FR 37848 - ASME Code Cases Not Approved for Use

    Science.gov (United States)

    2013-06-24

    ... COMMISSION ASME Code Cases Not Approved for Use AGENCY: Nuclear Regulatory Commission. ACTION: Draft... public comment draft regulatory guide (DG), DG-1233, ``ASME Code Cases not Approved for Use.'' This regulatory guide lists the American Society of Mechanical Engineers (ASME) Code Cases that the NRC...

  10. 1 CFR 12.2 - Code of Federal Regulations.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Code of Federal Regulations. 12.2 Section 12.2... REGISTER PUBLICATIONS OFFICIAL DISTRIBUTION WITHIN FEDERAL GOVERNMENT § 12.2 Code of Federal Regulations. (a) Copies of the Code of Federal Regulations in paper or microfiche form shall be made available...

  11. 1 CFR 11.3 - Code of Federal Regulations.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Code of Federal Regulations. 11.3 Section 11.3... REGISTER PUBLICATIONS SUBSCRIPTIONS § 11.3 Code of Federal Regulations. (a) The subscription price for a complete set of the Code of Federal Regulations is $1,019 per year for the bound, paper edition, or...

  12. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  13. Hybrid Noncoherent Network Coding

    CERN Document Server

    Skachek, Vitaly; Nedic, Angelia

    2011-01-01

    We describe a novel extension of subspace codes for noncoherent networks, suitable for use when the network is viewed as a communication system that introduces both dimension and symbol errors. We show that when symbol erasures occur in a significantly large number of different basis vectors transmitted through the network and when the min-cut of the networks is much smaller then the length of the transmitted codewords, the new family of codes outperforms their subspace code counterparts. For the proposed coding scheme, termed hybrid network coding, we derive two upper bounds on the size of the codes. These bounds represent a variation of the Singleton and of the sphere-packing bound. We show that a simple concatenated scheme that represents a combination of subspace codes and Reed-Solomon codes is asymptotically optimal with respect to the Singleton bound. Finally, we describe two efficient decoding algorithms for concatenated subspace codes that in certain cases have smaller complexity than subspace decoder...

  14. Towards Preserving Model Coverage and Structural Code Coverage

    Directory of Open Access Journals (Sweden)

    Raimund Kirner

    2009-01-01

    Full Text Available Embedded systems are often used in safety-critical environments. Thus, thorough testing of them is mandatory. To achieve a required structural code-coverage criteria it is beneficial to derive the test data at a higher program-representation level than machine code. Higher program-representation levels include, beside the source-code level, languages of domain-specific modeling environments with automatic code generation. For a testing framework with automatic generation of test data this will enable high retargetability of the framework. In this article we address the challenge of ensuring that the structural code coverage achieved at a higher program representation level is preserved during the code generations and code transformations down to machine code. We define the formal properties that have to be fullfilled by a code transformation to guarantee preservation of structural code coverage. Based on these properties we discuss how to preserve code coverage achieved at source-code level. Additionally, we discuss how structural code coverage at model level could be preserved. The results presented in this article are aimed toward the integration of support for preserving structural code coverage into compilers and code generators.

  15. 41 CFR 101-27.205 - Shelf-life codes.

    Science.gov (United States)

    2010-07-01

    ...-Management of Shelf-Life Materials § 101-27.205 Shelf-life codes. Shelf-life items shall be identified by use... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Shelf-life codes. 101-27.205 Section 101-27.205 Public Contracts and Property Management Federal Property Management...

  16. 45 CFR 74.42 - Codes of conduct.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Codes of conduct. 74.42 Section 74.42 Public..., AND COMMERCIAL ORGANIZATIONS Post-Award Requirements Procurement Standards § 74.42 Codes of conduct. The recipient shall maintain written standards of conduct governing the performance of its employees...

  17. Molecular Cloning,Bioinformatics of the DuckYAP 1 Gene cDNA Coding Domain Sequence,and Its Differential Expression Profiles in Tissues%鸭YAP 1基因编码区的克隆、生物信息分析及其组织表达特性

    Institute of Scientific and Technical Information of China (English)

    邱佳闵; 刘贺贺; 王继文

    2015-01-01

    【目的】旨在克隆鸭YAP 1基因,预测其蛋白结构、功能及其组织表达特性。【方法】以北京肉鸭为材料,采用RT-PCR 技术克隆鸭YAP 1基因 CDS 区,利用多种生物信息学分析软件预测其结构与功能,并应用荧光定量 PCR检测其组织表达特性。【结果】结果表明:鸭YAP 1基因 CDS 全长1248 bp,编码415个氨基酸,氨基酸水平上与鸡相似性最高,达99.7%;氨基酸序列分析发现鸭 YAP1蛋白相对分子量为45417.5 Da,主要定位在细胞核,属水溶性蛋白,不属于分泌蛋白;预测鸭 YAP1氨基酸含有磷酸化、糖基化位点各30个;含两个 WW 结构域,且不同物种间结构域较保守;二级结构以无规则卷曲为主,三级结构呈弯曲状螺旋结构;荧光定量结果显示,YAP 1在胰脏中表达量最高,肌肉组织中最低。【结论】鸭YAP 1基因非常保守,结构、功能与哺乳动物具较高一致性。%Objective]The study was to clone the duckYAP 1 gene cDNA coding domain sequence and predict its structure,function and expression profiles.[Method]We took Peking duck for material,using RT-PCR cloned the duck YAP 1 coding domain sequence (CDS),predicted its protein structure and functions over several bioinformatics tools and analyzed its expression in 10 tissues of duck using real-time PCR.[Results]The results showed that the duckYAP 1 CDS con-sists of 1 248 nucleotides that encode 415 amino acids residues,and the amino acid homology of duck YAP 1 shares 99.7% identity with chicken.The analysis of amino acid sequence revealed that the duckYAP 1 encoded water-soluble protein and its relative molecular weight was 45 417.5 Da.Subcellular location of YAP1 was in the nucleus,and it did not belong to the secreted pro-tein.The YAP1 protein contained 30 phosphorylation sites,30 glycosylation sites and 2 WW do-mains which are relatively conserved in species.The secondary structure of YAP1 was mainly

  18. 批判与再筑:公私二元性别规范的省思——以兰西·弗雷泽公共领域观为视角%Critique and Re -building. Reflections on the Public-Private Duality of Gender Norms--- From the Perspective of the Public Domain Concept of Lancey Fraser

    Institute of Scientific and Technical Information of China (English)

    丁慧

    2012-01-01

    公共领域和私人领域的二元划分,作为哈贝马斯的理想图景,发挥其重要的理论建构作用,在学界引起广泛影响,同时也引起了持久的争论,并且受到多方的质疑和挑战。其中,女性主义对公共领域概念进行了颠覆性的改造。女性主义对此问题的关注,主要集中在女性与社会关系、女性的社会地位等方面,以社会性别的分析视角反思单一的总括性公共领域构想,女性作为弱势群体的作用长期被忽略了。公共领域既是形成话语意见的场所,也是形成社会身份的场所。由于在历史发展过程中,女性始终处于一种无语的状态,女性的话题一直被遮蔽在权力关系之外,即使自由主义时期,家务劳动的价值没有得到确认和展开。性别偏置的问题没有得到根本性改观,基于公共领域意志所形成的性别规范和性别制度必然呈现男权主义的特征。因此,公私二元的理论修正,对于性别平等这一价值和原则而言,是重要的理论支点。%The dual division of public and private spheres, as Habermas's ideal picture, played an important role in the theoretical construction and caused widespread impacts in the academic community and a long debate, which were questioned and challenged by the parties. Among them, the concept of feminism car- ried out disruptive transformation to the concept of the public domain. Attention of feminism focuses mainly on women and social relations and women's social status. Reflecting on a single, overarching public sphere concept by gender analysis perspective we find the role of women as vulnerable groups have long been ignored. The public sphere is not only the place to form the words and views, but also the place to form the social identity. In the course of historical development women are always in a state of loss of speech, and the topic of women has been obscured in power relations~ even if in the liberal period, the val- ue of

  19. Publicity and public relations

    Science.gov (United States)

    Fosha, Charles E.

    1990-01-01

    This paper addresses approaches to using publicity and public relations to meet the goals of the NASA Space Grant College. Methods universities and colleges can use to publicize space activities are presented.

  20. Totally Coded Method for Signal Flow Graph Algorithm

    Institute of Scientific and Technical Information of China (English)

    XU Jing-bo; ZHOU Mei-hua

    2002-01-01

    After a code-table has been established by means of node association information from signal flow graph, the totally coded method (TCM) is applied merely in the domain of code operation beyond any figure-earching algorithm. The code-series (CS) have the holoinformation nature, so that both the content and the sign of each gain- term can be determined via the coded method. The principle of this method is simple and it is suited for computer programming. The capability of the computer-aided analysis for switched current network(SIN) can be enhanced.

  1. A repository of codes of ethics and technical standards in health informatics.

    Science.gov (United States)

    Samuel, Hamman W; Zaïane, Osmar R

    2014-01-01

    We present a searchable repository of codes of ethics and standards in health informatics. It is built using state-of-the-art search algorithms and technologies. The repository will be potentially beneficial for public health practitioners, researchers, and software developers in finding and comparing ethics topics of interest. Public health clinics, clinicians, and researchers can use the repository platform as a one-stop reference for various ethics codes and standards. In addition, the repository interface is built for easy navigation, fast search, and side-by-side comparative reading of documents. Our selection criteria for codes and standards are two-fold; firstly, to maintain intellectual property rights, we index only codes and standards freely available on the internet. Secondly, major international, regional, and national health informatics bodies across the globe are surveyed with the aim of understanding the landscape in this domain. We also look at prevalent technical standards in health informatics from major bodies such as the International Standards Organization (ISO) and the U. S. Food and Drug Administration (FDA). Our repository contains codes of ethics from the International Medical Informatics Association (IMIA), the iHealth Coalition (iHC), the American Health Information Management Association (AHIMA), the Australasian College of Health Informatics (ACHI), the British Computer Society (BCS), and the UK Council for Health Informatics Professions (UKCHIP), with room for adding more in the future. Our major contribution is enhancing the findability of codes and standards related to health informatics ethics by compilation and unified access through the health informatics ethics repository.

  2. Network coding for computing: Linear codes

    CERN Document Server

    Appuswamy, Rathinakumar; Karamchandani, Nikhil; Zeger, Kenneth

    2011-01-01

    In network coding it is known that linear codes are sufficient to achieve the coding capacity in multicast networks and that they are not sufficient in general to achieve the coding capacity in non-multicast networks. In network computing, Rai, Dey, and Shenvi have recently shown that linear codes are not sufficient in general for solvability of multi-receiver networks with scalar linear target functions. We study single receiver networks where the receiver node demands a target function of the source messages. We show that linear codes may provide a computing capacity advantage over routing only when the receiver demands a `linearly-reducible' target function. % Many known target functions including the arithmetic sum, minimum, and maximum are not linearly-reducible. Thus, the use of non-linear codes is essential in order to obtain a computing capacity advantage over routing if the receiver demands a target function that is not linearly-reducible. We also show that if a target function is linearly-reducible,...

  3. Searching in one billion vectors: re-rank with source coding

    CERN Document Server

    Jégou, Hervé; Douze, Matthijs; Amsaleg, Laurent

    2011-01-01

    Recent indexing techniques inspired by source coding have been shown successful to index billions of high-dimensional vectors in memory. In this paper, we propose an approach that re-ranks the neighbor hypotheses obtained by these compressed-domain indexing methods. In contrast to the usual post-verification scheme, which performs exact distance calculation on the short-list of hypotheses, the estimated distances are refined based on short quantization codes, to avoid reading the full vectors from disk. We have released a new public dataset of one billion 128-dimensional vectors and proposed an experimental setup to evaluate high dimensional indexing algorithms on a realistic scale. Experiments show that our method accurately and efficiently re-ranks the neighbor hypotheses using little memory compared to the full vectors representation.

  4. kspectrum: an open-source code for high-resolution molecular absorption spectra production

    Science.gov (United States)

    Eymet, V.; Coustet, C.; Piaud, B.

    2016-01-01

    We present the kspectrum, scientific code that produces high-resolution synthetic absorption spectra from public molecular transition parameters databases. This code was originally required by the atmospheric and astrophysics communities, and its evolution is now driven by new scientific projects among the user community. Since it was designed without any optimization that would be specific to any particular application field, its use could also be extended to other domains. kspectrum produces spectral data that can subsequently be used either for high-resolution radiative transfer simulations, or for producing statistic spectral model parameters using additional tools. This is a open project that aims at providing an up-to-date tool that takes advantage of modern computational hardware and recent parallelization libraries. It is currently provided by Méso-Star (http://www.meso-star.com) under the CeCILL license, and benefits from regular updates and improvements.

  5. Domain Decomposition Based High Performance Parallel Computing

    CERN Document Server

    Raju, Mandhapati P

    2009-01-01

    The study deals with the parallelization of finite element based Navier-Stokes codes using domain decomposition and state-ofart sparse direct solvers. There has been significant improvement in the performance of sparse direct solvers. Parallel sparse direct solvers are not found to exhibit good scalability. Hence, the parallelization of sparse direct solvers is done using domain decomposition techniques. A highly efficient sparse direct solver PARDISO is used in this study. The scalability of both Newton and modified Newton algorithms are tested.

  6. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  7. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  8. Automatic derivation of domain terms and concept location based on the analysis of the identifiers

    CERN Document Server

    Vaclavik, Peter; Mezei, Marek

    2010-01-01

    Developers express the meaning of the domain ideas in specifically selected identifiers and comments that form the target implemented code. Software maintenance requires knowledge and understanding of the encoded ideas. This paper presents a way how to create automatically domain vocabulary. Knowledge of domain vocabulary supports the comprehension of a specific domain for later code maintenance or evolution. We present experiments conducted in two selected domains: application servers and web frameworks. Knowledge of domain terms enables easy localization of chunks of code that belong to a certain term. We consider these chunks of code as "concepts" and their placement in the code as "concept location". Application developers may also benefit from the obtained domain terms. These terms are parts of speech that characterize a certain concept. Concepts are encoded in "classes" (OO paradigm) and the obtained vocabulary of terms supports the selection and the comprehension of the class' appropriate identifiers. ...

  9. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  10. Informal Control code logic

    CERN Document Server

    Bergstra, Jan A

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  11. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  12. Refactoring test code

    NARCIS (Netherlands)

    Deursen, A. van; Moonen, L.M.F.; Bergh, A. van den; Kok, G.

    2001-01-01

    Two key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from refactoring product

  13. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a distributed...

  14. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of ROC...

  15. Fountain Codes: LT And Raptor Codes Implementation

    Directory of Open Access Journals (Sweden)

    Ali Bazzi, Hiba Harb

    2017-01-01

    Full Text Available Digital fountain codes are a new class of random error correcting codes designed for efficient and reliable data delivery over erasure channels such as internet. These codes were developed to provide robustness against erasures in a way that resembles a fountain of water. A digital fountain is rateless in a way that sender can send limitless number of encoded packets. The receiver doesn’t care which packets are received or lost as long as the receiver gets enough packets to recover original data. In this paper, the design of the fountain codes is explored with its implementation of the encoding and decoding algorithm so that the performance in terms of encoding/decoding symbols, reception overhead, data length, and failure probability is studied.

  16. Time-domain radio pulses from particle showers

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez-Muniz, Jaime [Depto. de Fisica de Particulas and Instituto Galego de Fisica de Altas Enerxias, Universidade de Santiago de Compostela, 15782 Santiago de Compostela (Spain); Romero-Wolf, Andres, E-mail: rw.andres@gmail.com [Department of Physics and Astronomy, University of Hawaii at Manoa, Honolulu, HI 96822 (United States); Zas, Enrique [Depto. de Fisica de Particulas and Instituto Galego de Fisica de Altas Enerxias, Universidade de Santiago de Compostela, 15782 Santiago de Compostela (Spain)

    2012-01-11

    The time-domain properties of the far-field coherent radio emission from electromagnetic showers are studied in depth. A purely time-domain technique for mapping the electromagnetic fields of charged tracks is developed. The method is applied to the ZHS shower code to produce electric fields. It is demonstrated that the technique is equivalent to the frequency domain methods used in the ZHS code and produces consistent results. In addition, a model for mapping the longitudinal charge profile of a shower to a time-domain electromagnetic field is developed. It is shown that the model is in good agreement to the results of shower simulation.

  17. QR Codes in the Library: Are They Worth the Effort? Analysis of a QR Code Pilot Project

    OpenAIRE

    Wilson, Andrew M

    2012-01-01

    The literature is filled with potential uses for Quick Response (QR) codes in the library. Setting, but few library QR code projects have publicized usage statistics. A pilot project carried out in the Eda Kuhn Loeb Music Library of the Harvard College Library sought to determine whether library patrons actually understand and use QR codes. Results and analysis of the pilot project are provided, attempting to answer the question as to whether QR codes are worth the effort for libraries.

  18. The Network of French Legal Codes

    CERN Document Server

    Mazzega, Pierre; Boulet, Romain; 10.1145/1568234.1568271

    2012-01-01

    We propose an analysis of the codified Law of France as a structured system. Fifty two legal codes are selected on the basis of explicit legal criteria and considered as vertices with their mutual quotations forming the edges in a network which properties are analyzed relying on graph theory. We find that a group of 10 codes are simultaneously the most citing and the most cited by other codes, and are also strongly connected together so forming a "rich club" sub-graph. Three other code communities are also found that somewhat partition the legal field is distinct thematic sub-domains. The legal interpretation of this partition is opening new untraditional lines of research. We also conjecture that many legal systems are forming such new kind of networks that share some properties in common with small worlds but are far denser. We propose to call "concentrated world".

  19. Universal Rateless Codes From Coupled LT Codes

    CERN Document Server

    Aref, Vahid

    2011-01-01

    It was recently shown that spatial coupling of individual low-density parity-check codes improves the belief-propagation threshold of the coupled ensemble essentially to the maximum a posteriori threshold of the underlying ensemble. We study the performance of spatially coupled low-density generator-matrix ensembles when used for transmission over binary-input memoryless output-symmetric channels. We show by means of density evolution that the threshold saturation phenomenon also takes place in this setting. Our motivation for studying low-density generator-matrix codes is that they can easily be converted into rateless codes. Although there are already several classes of excellent rateless codes known to date, rateless codes constructed via spatial coupling might offer some additional advantages. In particular, by the very nature of the threshold phenomenon one expects that codes constructed on this principle can be made to be universal, i.e., a single construction can uniformly approach capacity over the cl...

  20. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  1. Binary Coded Web Access Pattern Tree in Education Domain

    Science.gov (United States)

    Gomathi, C.; Moorthi, M.; Duraiswamy, K.

    2008-01-01

    Web Access Pattern (WAP), which is the sequence of accesses pursued by users frequently, is a kind of interesting and useful knowledge in practice. Sequential Pattern mining is the process of applying data mining techniques to a sequential database for the purposes of discovering the correlation relationships that exist among an ordered list of…

  2. Code of ethics for dental researchers.

    Science.gov (United States)

    2014-01-01

    The International Association for Dental Research, in 2009, adopted a code of ethics. The code applies to members of the association and is enforceable by sanction, with the stated requirement that members are expected to inform the association in cases where they believe misconduct has occurred. The IADR code goes beyond the Belmont and Helsinki statements by virtue of covering animal research. It also addresses issues of sponsorship of research and conflicts of interest, international collaborative research, duty of researchers to be informed about applicable norms, standards of publication (including plagiarism), and the obligation of "whistleblowing" for the sake of maintaining the integrity of the dental research enterprise as a whole. The code is organized, like the ADA code, into two sections. The IADR principles are stated, but not defined, and number 12, instead of the ADA's five. The second section consists of "best practices," which are specific statements of expected or interdicted activities. The short list of definitions is useful.

  3. Fractional baud-length coding

    Directory of Open Access Journals (Sweden)

    J. Vierinen

    2011-06-01

    Full Text Available We present a novel approach for modulating radar transmissions in order to improve target range and Doppler estimation accuracy. This is achieved by using non-uniform baud lengths. With this method it is possible to increase sub-baud range-resolution of phase coded radar measurements while maintaining a narrow transmission bandwidth. We first derive target backscatter amplitude estimation error covariance matrix for arbitrary targets when estimating backscatter in amplitude domain. We define target optimality and discuss different search strategies that can be used to find well performing transmission envelopes. We give several simulated examples of the method showing that fractional baud-length coding results in smaller estimation errors than conventional uniform baud length transmission codes when estimating the target backscatter amplitude at sub-baud range resolution. We also demonstrate the method in practice by analyzing the range resolved power of a low-altitude meteor trail echo that was measured using a fractional baud-length experiment with the EISCAT UHF system.

  4. Proceedings of the Third International Workshop on Proof-Carrying Code and Software Certification

    Science.gov (United States)

    Ewen, Denney, W. (Editor); Jensen, Thomas (Editor)

    2009-01-01

    This NASA conference publication contains the proceedings of the Third International Workshop on Proof-Carrying Code and Software Certification, held as part of LICS in Los Angeles, CA, USA, on August 15, 2009. Software certification demonstrates the reliability, safety, or security of software systems in such a way that it can be checked by an independent authority with minimal trust in the techniques and tools used in the certification process itself. It can build on existing validation and verification (V&V) techniques but introduces the notion of explicit software certificates, Vvilich contain all the information necessary for an independent assessment of the demonstrated properties. One such example is proof-carrying code (PCC) which is an important and distinctive approach to enhancing trust in programs. It provides a practical framework for independent assurance of program behavior; especially where source code is not available, or the code author and user are unknown to each other. The workshop wiII address theoretical foundations of logic-based software certification as well as practical examples and work on alternative application domains. Here "certificate" is construed broadly, to include not just mathematical derivations and proofs but also safety and assurance cases, or any fonnal evidence that supports the semantic analysis of programs: that is, evidence about an intrinsic property of code and its behaviour that can be independently checked by any user, intermediary, or third party. These guarantees mean that software certificates raise trust in the code itself, distinct from and complementary to any existing trust in the creator of the code, the process used to produce it, or its distributor. In addition to the contributed talks, the workshop featured two invited talks, by Kelly Hayhurst and Andrew Appel. The PCC 2009 website can be found at http://ti.arc.nasa.gov /event/pcc 091.

  5. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  6. Ubiquitin domain proteins in disease

    DEFF Research Database (Denmark)

    Klausen, Louise Kjær; Schulze, Andrea; Seeger, Michael

    2007-01-01

    The human genome encodes several ubiquitin-like (UBL) domain proteins (UDPs). Members of this protein family are involved in a variety of cellular functions and many are connected to the ubiquitin proteasome system, an essential pathway for protein degradation in eukaryotic cells. Despite their s...... and cancer. Publication history: Republished from Current BioData's Targeted Proteins database (TPdb; http://www.targetedproteinsdb.com).......The human genome encodes several ubiquitin-like (UBL) domain proteins (UDPs). Members of this protein family are involved in a variety of cellular functions and many are connected to the ubiquitin proteasome system, an essential pathway for protein degradation in eukaryotic cells. Despite...

  7. The reactor dynamics code DYN3D

    Energy Technology Data Exchange (ETDEWEB)

    Kliem, Soeren; Bilodid, Yuri; Fridman, Emil; Baier, Silvio; Grahn, Alexander; Gommlich, Andre; Nikitin, Evgeny; Rohde, Ulrich [Helmholtz-Zentrum Dresden-Rossendorf e.V., Dresden (Germany)

    2016-05-15

    The article provides an overview on the code DYN3D which is a three-dimensional core model for steady-state, dynamic and depletion calculations in reactor cores with quadratic or hexagonal fuel assembly geometry being developed by the Helmholtz-Zentrum Dresden-Rossendorf for more than 20 years. The current paper gives an overview on the basic DYN3D models and the available code couplings. The verification and validation status is shortly outlined. The paper concludes with the current developments of the DYN3D code. For more detailed information the reader is referred to the publications cited in the corresponding chapters.

  8. [Ethics code of the Chilean Biological Society].

    Science.gov (United States)

    de Etica, C; Valenzuela, C; Cruz-Coke, R; Ureta, T; Bull, R

    1997-01-01

    The Chilean Biological Society has approved an ethics code for researchers, elaborated by its Ethic Committee. The text, with 16 articles, undertakes the main ethical problems that researchers must solve, such as institutional, professional or societal ethics, scientific fraud, breaches in collaborative work, relationships between researchers, participation in juries and committees, ethical breaches in scientific publications, scientific responsibility and punishments. This code declares its respect and valorization of all life forms and adheres to international biomedical ethical codes. It declares that all knowledge, created or obtained by researchers is mankind's heritage.

  9. Towards Clone Detection in UML Domain Models

    DEFF Research Database (Denmark)

    Störrle, Harald

    2013-01-01

    Code clones (i.e., duplicate fragments of code) have been studied for long, and there is strong evidence that they are a major source of software faults. Anecdotal evidence suggests that this phenomenon occurs similarly in models, suggesting that model clones are as detrimental to model quality...... as they are to code quality. However, programming language code and visual models have significant differences that make it difficult to directly transfer notions and algorithms developed in the code clone arena to model clones. In this article, we develop and propose a definition of the notion of “model clone” based...... on the thorough analysis of practical scenarios. We propose a formal definition of model clones, specify a clone detection algorithm for UML domain models, and implement it prototypically. We investigate different similarity heuristics to be used in the algorithm, and report the performance of our approach. While...

  10. QC-LDPC code-based cryptography

    CERN Document Server

    Baldi, Marco

    2014-01-01

    This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several techniques for their design are presented, while tools for assessing the error correction performance of these codes are also described. Some families of QC-LDPC codes that are best suited for use in cryptography are also presented. The second part of the book focuses on the McEliece and Niederreiter cryptosystems, both in their original forms and in some subsequent variants. The applicability of QC-LDPC codes in these frameworks is investigated by means of theoretical analyses and numerical tools, in order to assess their benefits and drawbacks in terms of system efficiency and security. Several examples of QC-LDPC code-based public key cryptosystems are prese...

  11. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  12. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2009-01-01

    Property testing was initially studied from various motivations in 1990's.A code C (∩)GF(r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector's coordinates.The problem of testing codes was firstly studied by Blum,Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs).How to characterize locally testable codes is a complex and challenge problem.The local tests have been studied for Reed-Solomon (RS),Reed-Muller (RM),cyclic,dual of BCH and the trace subcode of algebraicgeometric codes.In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions).We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  13. Chinese remainder codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Aili; LIU Xiufeng

    2006-01-01

    Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory.The new type of linear codes take the congruence class in the congruence class ring R/I1 ∩ I2 ∩…∩ In for the information bit,embed R/Ji into R/I1 ∩ I2 ∩…∩ In,and assign the cosets of R/Ji as the subring of R/I1 ∩ I2 ∩…∩ In and the cosets of R/Ji in R/I1 ∩ I2 ∩…∩ In as check lines.Many code classes exist in the Chinese remainder codes that have high code rates.Chinese remainder codes are the essential generalization of Sun Zi codes.

  14. Chinese Remainder Codes

    Institute of Scientific and Technical Information of China (English)

    张爱丽; 刘秀峰; 靳蕃

    2004-01-01

    Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I1∩I2∩…∩In for the information bit, embed R/Ji into R/I1∩I2∩…∩In, and asssign the cosets of R/Ji as the subring of R/I1∩I2∩…∩In and the cosets of R/Ji in R/I1∩I2∩…∩In as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes.

  15. Code of Ethics

    DEFF Research Database (Denmark)

    Adelstein, Jennifer; Clegg, Stewart

    2016-01-01

    Ethical codes have been hailed as an explicit vehicle for achieving more sustainable and defensible organizational practice. Nonetheless, when legal compliance and corporate governance codes are conflated, codes can be used to define organizational interests ostentatiously by stipulating norms...... for employee ethics. Such codes have a largely cosmetic and insurance function, acting subtly and strategically to control organizational risk management and protection. In this paper, we conduct a genealogical discourse analysis of a representative code of ethics from an international corporation...... to understand how management frames expectations of compliance. Our contribution is to articulate the problems inherent in codes of ethics, and we make some recommendations to address these to benefit both an organization and its employees. In this way, we show how a code of ethics can provide a foundation...

  16. Defeating the coding monsters.

    Science.gov (United States)

    Colt, Ross

    2007-02-01

    Accuracy in coding is rapidly becoming a required skill for military health care providers. Clinic staffing, equipment purchase decisions, and even reimbursement will soon be based on the coding data that we provide. Learning the complicated myriad of rules to code accurately can seem overwhelming. However, the majority of clinic visits in a typical outpatient clinic generally fall into two major evaluation and management codes, 99213 and 99214. If health care providers can learn the rules required to code a 99214 visit, then this will provide a 90% solution that can enable them to accurately code the majority of their clinic visits. This article demonstrates a step-by-step method to code a 99214 visit, by viewing each of the three requirements as a monster to be defeated.

  17. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Property testing was initially studied from various motivations in 1990’s. A code C  GF (r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector’s coordinates. The problem of testing codes was firstly studied by Blum, Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs). How to characterize locally testable codes is a complex and challenge problem. The local tests have been studied for Reed-Solomon (RS), Reed-Muller (RM), cyclic, dual of BCH and the trace subcode of algebraicgeometric codes. In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions). We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  18. Serially Concatenated IRA Codes

    CERN Document Server

    Cheng, Taikun; Belzer, Benjamin J

    2007-01-01

    We address the error floor problem of low-density parity check (LDPC) codes on the binary-input additive white Gaussian noise (AWGN) channel, by constructing a serially concatenated code consisting of two systematic irregular repeat accumulate (IRA) component codes connected by an interleaver. The interleaver is designed to prevent stopping-set error events in one of the IRA codes from propagating into stopping set events of the other code. Simulations with two 128-bit rate 0.707 IRA component codes show that the proposed architecture achieves a much lower error floor at higher SNRs, compared to a 16384-bit rate 1/2 IRA code, but incurs an SNR penalty of about 2 dB at low to medium SNRs. Experiments indicate that the SNR penalty can be reduced at larger blocklengths.

  19. A Novel User Authentication Scheme Based on QR-Code

    Directory of Open Access Journals (Sweden)

    Kuan-Chieh Liao

    2010-08-01

    Full Text Available User authentication is one of the fundamental procedures to ensure secure communications and share system resources over an insecure public network channel.  Thus, a simple and efficient authentication mechanism is required for securing the network system in the real environment. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access. Especially, the purpose of the one-time password is to make it more difficult to gain unauthorized access to restricted resources. Instead of using the password file as conventional authentication systems, many researchers have devoted to implement various one-time password schemes using smart cards, time-synchronized token or short message service in order to reduce the risk of tampering and maintenance cost.  However, these schemes are impractical because of the far from ubiquitous hardware devices or the infrastructure requirements. To remedy these weaknesses, the attraction of the QR-code technique can be introduced into our one-time password authentication protocol. Not the same as before, the proposed scheme based on QR code not only eliminates the usage of the password verification table, but also is a cost effective solution since most internet users already have mobile phones. For this reason, instead of carrying around a separate hardware token for each security domain, the superiority of handiness benefit from the mobile phone makes our approach more practical and convenient.

  20. Coding potential of the products of alternative splicing in human.

    KAUST Repository

    Leoni, Guido

    2011-01-20

    BACKGROUND: Analysis of the human genome has revealed that as much as an order of magnitude more of the genomic sequence is transcribed than accounted for by the predicted and characterized genes. A number of these transcripts are alternatively spliced forms of known protein coding genes; however, it is becoming clear that many of them do not necessarily correspond to a functional protein. RESULTS: In this study we analyze alternative splicing isoforms of human gene products that are unambiguously identified by mass spectrometry and compare their properties with those of isoforms of the same genes for which no peptide was found in publicly available mass spectrometry datasets. We analyze them in detail for the presence of uninterrupted functional domains, active sites as well as the plausibility of their predicted structure. We report how well each of these strategies and their combination can correctly identify translated isoforms and derive a lower limit for their specificity, that is, their ability to correctly identify non-translated products. CONCLUSIONS: The most effective strategy for correctly identifying translated products relies on the conservation of active sites, but it can only be applied to a small fraction of isoforms, while a reasonably high coverage, sensitivity and specificity can be achieved by analyzing the presence of non-truncated functional domains. Combining the latter with an assessment of the plausibility of the modeled structure of the isoform increases both coverage and specificity with a moderate cost in terms of sensitivity.

  1. Verified OS Interface Code Synthesis

    Science.gov (United States)

    2016-12-01

    5c.  PROGRAM ELEMENT NUMBER 61102F 6. AUTHOR(S) Gerwin Klein, Toby Murray 5d.  PROJECT NUMBER 5e.  TASK NUMBER 5f.  WORK UNIT NUMBER 7. PERFORMING...llisapi.dll Verified OS Interface Code Synthesis Final Report for AFOSR AOARD Grant FA2386-14-1-4093 Gerwin Klein, Ramana Kumar, Toby Murray gerwin.klein... Murray t +61 2 8306 0550 e gerwin.klein@data61.csiro.au w trustworthy.systems DISTRIBUTION A. Approved for public release: distribution unlimited.

  2. A typology of public engagement mechanisms

    NARCIS (Netherlands)

    Rowe, G.; Frewer, L.J.

    2005-01-01

    Imprecise definition of key terms in the "public participation" domain have hindered the conduct of good research and militated against the development and implementation of effective participation practices. In this article, we define key concepts in the domain: public communication, public consult

  3. Certifying Auto-Generated Flight Code

    Science.gov (United States)

    Denney, Ewen

    2008-01-01

    Model-based design and automated code generation are being used increasingly at NASA. Many NASA projects now use MathWorks Simulink and Real-Time Workshop for at least some of their modeling and code development. However, there are substantial obstacles to more widespread adoption of code generators in safety-critical domains. Since code generators are typically not qualified, there is no guarantee that their output is correct, and consequently the generated code still needs to be fully tested and certified. Moreover, the regeneration of code can require complete recertification, which offsets many of the advantages of using a generator. Indeed, manual review of autocode can be more challenging than for hand-written code. Since the direct V&V of code generators is too laborious and complicated due to their complex (and often proprietary) nature, we have developed a generator plug-in to support the certification of the auto-generated code. Specifically, the AutoCert tool supports certification by formally verifying that the generated code is free of different safety violations, by constructing an independently verifiable certificate, and by explaining its analysis in a textual form suitable for code reviews. The generated documentation also contains substantial tracing information, allowing users to trace between model, code, documentation, and V&V artifacts. This enables missions to obtain assurance about the safety and reliability of the code without excessive manual V&V effort and, as a consequence, eases the acceptance of code generators in safety-critical contexts. The generation of explicit certificates and textual reports is particularly well-suited to supporting independent V&V. The primary contribution of this approach is the combination of human-friendly documentation with formal analysis. The key technical idea is to exploit the idiomatic nature of auto-generated code in order to automatically infer logical annotations. The annotation inference algorithm

  4. Wavelet transform domain communication systems

    Science.gov (United States)

    Orr, Richard S.; Pike, Cameron; Lyall, Michael J.

    1995-04-01

    In this paper we introduce a new class of communications systems called wavelet transform domain (WTD) systems. WTD systems are transmultiplexer (TMUX) structures in which information to be communicated over a channel is encoded, via an inverse discrete wavelet transform (IDWT), as the wavelet coefficients of the transmitted signal, and extracted at the receiver by a discrete wavelet transform (DWT). WTD constructs can be used for covert, or low probability of intercept/detection (LPI/D) communications, baseband bandwidth efficient communications, or code-division multiple access (CDMA). This paper concentrates on the spread spectrum applications.

  5. Rewriting the Genetic Code.

    Science.gov (United States)

    Mukai, Takahito; Lajoie, Marc J; Englert, Markus; Söll, Dieter

    2017-09-08

    The genetic code-the language used by cells to translate their genomes into proteins that perform many cellular functions-is highly conserved throughout natural life. Rewriting the genetic code could lead to new biological functions such as expanding protein chemistries with noncanonical amino acids (ncAAs) and genetically isolating synthetic organisms from natural organisms and viruses. It has long been possible to transiently produce proteins bearing ncAAs, but stabilizing an expanded genetic code for sustained function in vivo requires an integrated approach: creating recoded genomes and introducing new translation machinery that function together without compromising viability or clashing with endogenous pathways. In this review, we discuss design considerations and technologies for expanding the genetic code. The knowledge obtained by rewriting the genetic code will deepen our understanding of how genomes are designed and how the canonical genetic code evolved.

  6. On Polynomial Remainder Codes

    CERN Document Server

    Yu, Jiun-Hung

    2012-01-01

    Polynomial remainder codes are a large class of codes derived from the Chinese remainder theorem that includes Reed-Solomon codes as a special case. In this paper, we revisit these codes and study them more carefully than in previous work. We explicitly allow the code symbols to be polynomials of different degrees, which leads to two different notions of weight and distance. Algebraic decoding is studied in detail. If the moduli are not irreducible, the notion of an error locator polynomial is replaced by an error factor polynomial. We then obtain a collection of gcd-based decoding algorithms, some of which are not quite standard even when specialized to Reed-Solomon codes.

  7. Public Education, Public Good.

    Science.gov (United States)

    Tomlinson, John

    1986-01-01

    Criticizes policies which would damage or destroy a public education system. Examines the relationship between government-provided education and democracy. Concludes that privatization of public education would emphasize self-interest and selfishness, further jeopardizing the altruism and civic mindedness necessary for the public good. (JDH)

  8. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  9. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  10. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  11. Industrial Computer Codes

    Science.gov (United States)

    Shapiro, Wilbur

    1996-01-01

    This is an overview of new and updated industrial codes for seal design and testing. GCYLT (gas cylindrical seals -- turbulent), SPIRALI (spiral-groove seals -- incompressible), KTK (knife to knife) Labyrinth Seal Code, and DYSEAL (dynamic seal analysis) are covered. CGYLT uses G-factors for Poiseuille and Couette turbulence coefficients. SPIRALI is updated to include turbulence and inertia, but maintains the narrow groove theory. KTK labyrinth seal code handles straight or stepped seals. And DYSEAL provides dynamics for the seal geometry.

  12. What to do with a Dead Research Code

    Science.gov (United States)

    Nemiroff, Robert J.

    2016-01-01

    The project has ended -- should all of the computer codes that enabled the project be deleted? No. Like research papers, research codes typically carry valuable information past project end dates. Several possible end states to the life of research codes are reviewed. Historically, codes are typically left dormant on an increasingly obscure local disk directory until forgotten. These codes will likely become any or all of: lost, impossible to compile and run, difficult to decipher, and likely deleted when the code's proprietor moves on or dies. It is argued here, though, that it would be better for both code authors and astronomy generally if project codes were archived after use in some way. Archiving is advantageous for code authors because archived codes might increase the author's ADS citable publications, while astronomy as a science gains transparency and reproducibility. Paper-specific codes should be included in the publication of the journal papers they support, just like figures and tables. General codes that support multiple papers, possibly written by multiple authors, including their supporting websites, should be registered with a code registry such as the Astrophysics Source Code Library (ASCL). Codes developed on GitHub can be archived with a third party service such as, currently, BackHub. An important code version might be uploaded to a web archiving service like, currently, Zenodo or Figshare, so that this version receives a Digital Object Identifier (DOI), enabling it to found at a stable address into the future. Similar archiving services that are not DOI-dependent include perma.cc and the Internet Archive Wayback Machine at archive.org. Perhaps most simply, copies of important codes with lasting value might be kept on a cloud service like, for example, Google Drive, while activating Google's Inactive Account Manager.

  13. WEC3: Wave Energy Converter Code Comparison Project: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Combourieu, Adrien; Lawson, Michael; Babarit, Aurelien; Ruehl, Kelley; Roy, Andre; Costello, Ronan; Laporte Weywada, Pauline; Bailey, Helen

    2017-01-01

    This paper describes the recently launched Wave Energy Converter Code Comparison (WEC3) project and present preliminary results from this effort. The objectives of WEC3 are to verify and validate numerical modelling tools that have been developed specifically to simulate wave energy conversion devices and to inform the upcoming IEA OES Annex VI Ocean Energy Modelling Verification and Validation project. WEC3 is divided into two phases. Phase 1 consists of a code-to-code verification and Phase II entails code-to-experiment validation. WEC3 focuses on mid-fidelity codes that simulate WECs using time-domain multibody dynamics methods to model device motions and hydrodynamic coefficients to model hydrodynamic forces. Consequently, high-fidelity numerical modelling tools, such as Navier-Stokes computational fluid dynamics simulation, and simple frequency domain modelling tools were not included in the WEC3 project.

  14. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  15. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  16. Tokamak Systems Code

    Energy Technology Data Exchange (ETDEWEB)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  17. MORSE Monte Carlo code

    Energy Technology Data Exchange (ETDEWEB)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described.

  18. Interaction Design for Public Spaces

    DEFF Research Database (Denmark)

    Kortbek, Karen Johanne

    2008-01-01

    In this abstract I describe the doctorial research project "Interaction Design for Public Spaces". The objective of the project is to explore and design interaction contexts in culture related public spaces such as museums, experience centres and festivals. As a perspective on this domain, I...... will help interaction designers when designing for bodily movement, and communicating and staging interactive content in public spaces....

  19. 45 CFR 2543.42 - Codes of conduct.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Codes of conduct. 2543.42 Section 2543.42 Public Welfare Regulations Relating to Public Welfare (Continued) CORPORATION FOR NATIONAL AND COMMUNITY SERVICE GRANTS AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, AND OTHER NON-PROFIT...

  20. Deciphering the genetic regulatory code using an inverse error control coding framework.

    Energy Technology Data Exchange (ETDEWEB)

    Rintoul, Mark Daniel; May, Elebeoba Eni; Brown, William Michael; Johnston, Anna Marie; Watson, Jean-Paul

    2005-03-01

    We have found that developing a computational framework for reconstructing error control codes for engineered data and ultimately for deciphering genetic regulatory coding sequences is a challenging and uncharted area that will require advances in computational technology for exact solutions. Although exact solutions are desired, computational approaches that yield plausible solutions would be considered sufficient as a proof of concept to the feasibility of reverse engineering error control codes and the possibility of developing a quantitative model for understanding and engineering genetic regulation. Such evidence would help move the idea of reconstructing error control codes for engineered and biological systems from the high risk high payoff realm into the highly probable high payoff domain. Additionally this work will impact biological sensor development and the ability to model and ultimately develop defense mechanisms against bioagents that can be engineered to cause catastrophic damage. Understanding how biological organisms are able to communicate their genetic message efficiently in the presence of noise can improve our current communication protocols, a continuing research interest. Towards this end, project goals include: (1) Develop parameter estimation methods for n for block codes and for n, k, and m for convolutional codes. Use methods to determine error control (EC) code parameters for gene regulatory sequence. (2) Develop an evolutionary computing computational framework for near-optimal solutions to the algebraic code reconstruction problem. Method will be tested on engineered and biological sequences.

  1. Improved side information generation for distributed video coding

    DEFF Research Database (Denmark)

    Huang, Xin; Forchhammer, Søren

    2008-01-01

    information generation method, fewer bits will be requested from the encoder and more reliable decoded frames will be obtained. In this paper, a side information generation method is introduced to further improve the rate-distortion (RD) performance of transform domain distributed video coding. This algorithm......As a new coding paradigm, distributed video coding (DVC) deals with lossy source coding using side information to exploit the statistics at the decoder to reduce computational demands at the encoder. The performance of DVC highly depends on the quality of side information. With a better side...

  2. Noise Residual Learning for Noise Modeling in Distributed Video Coding

    DEFF Research Database (Denmark)

    Luong, Huynh Van; Forchhammer, Søren

    2012-01-01

    Distributed video coding (DVC) is a coding paradigm which exploits the source statistics at the decoder side to reduce the complexity at the encoder. The noise model is one of the inherently difficult challenges in DVC. This paper considers Transform Domain Wyner-Ziv (TDWZ) coding and proposes...... decoding. A residual refinement step is also introduced to take advantage of correlation of DCT coefficients. Experimental results show that the proposed techniques robustly improve the coding efficiency of TDWZ DVC and for GOP=2 bit-rate savings up to 35% on WZ frames are achieved compared with DISCOVER....

  3. An introduction to using QR codes in scholarly journals

    Directory of Open Access Journals (Sweden)

    Jae Hwa Chang

    2014-08-01

    Full Text Available The Quick Response (QR code was first developed in 1994 by Denso Wave Incorporated, Japan. From that point on, it came into general use as an identification mark for all kinds of commercial products, advertisements, and other public announcements. In scholarly journals, the QR code is used to provide immediate direction to the journal homepage or specific content such as figures or videos. To produce a QR code and print it in the print version or upload to the web is very simple. Using a QR code producing program, an editor can add simple information to a website. After that, a QR code is produced. A QR code is very stable, such that it can be used for a long time without loss of quality. Producing and adding QR codes to a journal costs nothing; therefore, to increase the visibility of their journals, it is time for editors to add QR codes to their journals.

  4. Protein domain prediction

    NARCIS (Netherlands)

    Ingolfsson, Helgi; Yona, Golan

    2008-01-01

    Domains are considered to be the building blocks of protein structures. A protein can contain a single domain or multiple domains, each one typically associated with a specific function. The combination of domains determines the function of the protein, its subcellular localization and the interacti

  5. Research on universal combinatorial coding.

    Science.gov (United States)

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value.

  6. Using context to improve protein domain identification

    Directory of Open Access Journals (Sweden)

    Llinás Manuel

    2011-03-01

    Full Text Available Abstract Background Identifying domains in protein sequences is an important step in protein structural and functional annotation. Existing domain recognition methods typically evaluate each domain prediction independently of the rest. However, the majority of proteins are multidomain, and pairwise domain co-occurrences are highly specific and non-transitive. Results Here, we demonstrate how to exploit domain co-occurrence to boost weak domain predictions that appear in previously observed combinations, while penalizing higher confidence domains if such combinations have never been observed. Our framework, Domain Prediction Using Context (dPUC, incorporates pairwise "context" scores between domains, along with traditional domain scores and thresholds, and improves domain prediction across a variety of organisms from bacteria to protozoa and metazoa. Among the genomes we tested, dPUC is most successful at improving predictions for the poorly-annotated malaria parasite Plasmodium falciparum, for which over 38% of the genome is currently unannotated. Our approach enables high-confidence annotations in this organism and the identification of orthologs to many core machinery proteins conserved in all eukaryotes, including those involved in ribosomal assembly and other RNA processing events, which surprisingly had not been previously known. Conclusions Overall, our results demonstrate that this new context-based approach will provide significant improvements in domain and function prediction, especially for poorly understood genomes for which the need for additional annotations is greatest. Source code for the algorithm is available under a GPL open source license at http://compbio.cs.princeton.edu/dpuc/. Pre-computed results for our test organisms and a web server are also available at that location.

  7. Structured hints : extracting and abstracting domain expertise.

    Energy Technology Data Exchange (ETDEWEB)

    Hereld, M.; Stevens, R.; Sterling, T.; Gao, G. R.; Mathematics and Computer Science; California Inst. of Tech.; Louisiana State Univ.; Univ. of Delaware

    2009-03-16

    We propose a new framework for providing information to help optimize domain-specific application codes. Its design addresses problems that derive from the widening gap between the domain problem statement by domain experts and the architectural details of new and future high-end computing systems. The design is particularly well suited to program execution models that incorporate dynamic adaptive methodologies for live tuning of program performance and resource utilization. This new framework, which we call 'structured hints', couples a vocabulary of annotations to a suite of performance metrics. The immediate target is development of a process by which a domain expert describes characteristics of objects and methods in the application code that would not be readily apparent to the compiler; the domain expert provides further information about what quantities might provide the best indications of desirable effect; and the interactive preprocessor identifies potential opportunities for the domain expert to evaluate. Our development of these ideas is progressing in stages from case study, through manual implementation, to automatic or semi-automatic implementation. In this paper we discuss results from our case study, an examination of a large simulation of a neural network modeled after the neocortex.

  8. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  9. Dress Codes for Teachers?

    Science.gov (United States)

    Million, June

    2004-01-01

    In this article, the author discusses an e-mail survey of principals from across the country regarding whether or not their school had a formal staff dress code. The results indicate that most did not have a formal dress code, but agreed that professional dress for teachers was not only necessary, but showed respect for the school and had a…

  10. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alex

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  11. Pseudonoise code tracking loop

    Science.gov (United States)

    Laflame, D. T. (Inventor)

    1980-01-01

    A delay-locked loop is presented for tracking a pseudonoise (PN) reference code in an incoming communication signal. The loop is less sensitive to gain imbalances, which can otherwise introduce timing errors in the PN reference code formed by the loop.

  12. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  13. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  14. READING A NEURAL CODE

    NARCIS (Netherlands)

    BIALEK, W; RIEKE, F; VANSTEVENINCK, RRD; WARLAND, D

    1991-01-01

    Traditional approaches to neural coding characterize the encoding of known stimuli in average neural responses. Organisms face nearly the opposite task - extracting information about an unknown time-dependent stimulus from short segments of a spike train. Here the neural code was characterized from

  15. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...

  16. Membrane binding domains

    OpenAIRE

    Hurley, James H.

    2006-01-01

    Eukaryotic signaling and trafficking proteins are rich in modular domains that bind cell membranes. These binding events are tightly regulated in space and time. The structural, biochemical, and biophysical mechanisms for targeting have been worked out for many families of membrane binding domains. This review takes a comparative view of seven major classes of membrane binding domains, the C1, C2, PH, FYVE, PX, ENTH, and BAR domains. These domains use a combination of specific headgroup inter...

  17. Transformation invariant sparse coding

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard

    2011-01-01

    Sparse coding is a well established principle for unsupervised learning. Traditionally, features are extracted in sparse coding in specific locations, however, often we would prefer invariant representation. This paper introduces a general transformation invariant sparse coding (TISC) model....... The model decomposes images into features invariant to location and general transformation by a set of specified operators as well as a sparse coding matrix indicating where and to what degree in the original image these features are present. The TISC model is in general overcomplete and we therefore invoke...... sparse coding to estimate its parameters. We demonstrate how the model can correctly identify components of non-trivial artificial as well as real image data. Thus, the model is capable of reducing feature redundancies in terms of pre-specified transformations improving the component identification....

  18. The SIFT Code Specification

    Science.gov (United States)

    1983-01-01

    The specification of Software Implemented Fault Tolerance (SIFT) consists of two parts, the specifications of the SIFT models and the specifications of the SIFT PASCAL program which actually implements the SIFT system. The code specifications are the last of a hierarchy of models describing the operation of the SIFT system and are related to the SIFT models as well as the PASCAL program. These Specifications serve to link the SIFT models to the running program. The specifications are very large and detailed and closely follow the form and organization of the PASCAL code. In addition to describing each of the components of the SIFT code, the code specifications describe the assumptions of the upper SIFT models which are required to actually prove that the code will work as specified. These constraints are imposed primarily on the schedule tables.

  19. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    discusses code as the artist’s material and, further, formulates a critique of Cramer. The seductive magic in computer-generated art does not lie in the magical expression, but nor does it lie in the code/material/text itself. It lies in the nature of code to do something – as if it was magic......Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  20. Combustion chamber analysis code

    Science.gov (United States)

    Przekwas, A. J.; Lai, Y. G.; Krishnan, A.; Avva, R. K.; Giridharan, M. G.

    1993-05-01

    A three-dimensional, time dependent, Favre averaged, finite volume Navier-Stokes code has been developed to model compressible and incompressible flows (with and without chemical reactions) in liquid rocket engines. The code has a non-staggered formulation with generalized body-fitted-coordinates (BFC) capability. Higher order differencing methodologies such as MUSCL and Osher-Chakravarthy schemes are available. Turbulent flows can be modeled using any of the five turbulent models present in the code. A two-phase, two-liquid, Lagrangian spray model has been incorporated into the code. Chemical equilibrium and finite rate reaction models are available to model chemically reacting flows. The discrete ordinate method is used to model effects of thermal radiation. The code has been validated extensively against benchmark experimental data and has been applied to model flows in several propulsion system components of the SSME and the STME.

  1. Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Berriman, Bruce; Hanisch, Robert J; Mink, Jessica; Teuben, Peter J

    2012-01-01

    The Astrophysics Source Code Library (ASCL), founded in 1999, is a free on-line registry for source codes of interest to astronomers and astrophysicists. The library is housed on the discussion forum for Astronomy Picture of the Day (APOD) and can be accessed at http://ascl.net. The ASCL has a comprehensive listing that covers a significant number of the astrophysics source codes used to generate results published in or submitted to refereed journals and continues to grow. The ASCL currently has entries for over 500 codes; its records are citable and are indexed by ADS. The editors of the ASCL and members of its Advisory Committee were on hand at a demonstration table in the ADASS poster room to present the ASCL, accept code submissions, show how the ASCL is starting to be used by the astrophysics community, and take questions on and suggestions for improving the resource.

  2. ZooKeys, unlocking Earth's incredible biodiversity and building a sustainable bridge into the public domain: From "€œprint-based"€ to "web-based" taxonomy, systematics, and natural history

    NARCIS (Netherlands)

    Penev, L.; Erwin, T.; Thompson, F.C.; Sues, H.-D.; Engel, M.S.; Agosti, D.; Pyle, R.; Ivie, M.; Assmann, T.; Henry, T.; Miller, J.; Ananjeva, N.B.; Casale, A.; Lourenco, W.; Golovatch, S.; Fagerholm, H.-P.; Taiti, S.; Alonso-Zarazaga, M.; Nieukerken, van E.

    2008-01-01

    Publishing taxonomic and systematics studies in the digital era faces major challenges and requires new approaches, many of which are currently stimulating spirited discussions amongst taxonomists and systematists. New amendments to the International Code of Zoological Nomenclature are expected to r

  3. Bring out your codes! Bring out your codes! (Increasing Software Visibility and Re-use)

    CERN Document Server

    Allen, Alice; Brunner, Robert; Burger, Dan; DuPrie, Kimberly; Hanisch, Robert J; Mann, Robert; Mink, Jessica; Sandin, Christer; Shortridge, Keith; Teuben, Peter

    2012-01-01

    Progress is being made in code discoverability and preservation, but as discussed at ADASS XXI, many codes still remain hidden from public view. With the Astrophysics Source Code Library (ASCL) now indexed by the SAO/NASA Astrophysics Data System (ADS), the introduction of a new journal, Astronomy & Computing, focused on astrophysics software, and the increasing success of education efforts such as Software Carpentry and SciCoder, the community has the opportunity to set a higher standard for its science by encouraging the release of software for examination and possible reuse. We assembled representatives of the community to present issues inhibiting code release and sought suggestions for tackling these factors. The session began with brief statements by panelists; the floor was then opened for discussion and ideas. Comments covered a diverse range of related topics and points of view, with apparent support for the propositions that algorithms should be readily available, code used to produce published ...

  4. Public Speech.

    Science.gov (United States)

    Green, Thomas F.

    1994-01-01

    Discusses the importance of public speech in society, noting the power of public speech to create a world and a public. The paper offers a theory of public speech, identifies types of public speech, and types of public speech fallacies. Two ways of speaking of the public and of public life are distinguished. (SM)

  5. Embedded foveation image coding.

    Science.gov (United States)

    Wang, Z; Bovik, A C

    2001-01-01

    The human visual system (HVS) is highly space-variant in sampling, coding, processing, and understanding. The spatial resolution of the HVS is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. By taking advantage of this fact, it is possible to remove considerable high-frequency information redundancy from the peripheral regions and still reconstruct a perceptually good quality image. Great success has been obtained previously by a class of embedded wavelet image coding algorithms, such as the embedded zerotree wavelet (EZW) and the set partitioning in hierarchical trees (SPIHT) algorithms. Embedded wavelet coding not only provides very good compression performance, but also has the property that the bitstream can be truncated at any point and still be decoded to recreate a reasonably good quality image. In this paper, we propose an embedded foveation image coding (EFIC) algorithm, which orders the encoded bitstream to optimize foveated visual quality at arbitrary bit-rates. A foveation-based image quality metric, namely, foveated wavelet image quality index (FWQI), plays an important role in the EFIC system. We also developed a modified SPIHT algorithm to improve the coding efficiency. Experiments show that EFIC integrates foveation filtering with foveated image coding and demonstrates very good coding performance and scalability in terms of foveated image quality measurement.

  6. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity in the net...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof.......Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...

  7. Application of RS Codes in Decoding QR Code

    Institute of Scientific and Technical Information of China (English)

    Zhu Suxia(朱素霞); Ji Zhenzhou; Cao Zhiyan

    2003-01-01

    The QR Code is a 2-dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code's virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm.

  8. 鹅AKR1D1基因编码区克隆、序列分析及在卵泡中的表达特性研究%Molecular Cloning,Bioinformatics of the Goose AKR1D1 Gene cDNA Coding Domain Sequence,and Its Differential Expression Profiles in Ovarian Follicles of Different Stages

    Institute of Scientific and Technical Information of China (English)

    张文捷; 李欣欣; 刘贺贺; 王继文

    2016-01-01

    [Objective]The study was to clone the A K R 1D1 gene's cDNA coding domain sequence of geese and predict its structure,function and expression profiles.[Methods]Using Tianfu meat-type geese as materials,we cloned the goose's A KR1D1 coding domain sequence (CDS) by RTPCR,and predicted its protein structure and functions through several bioinformational tools and analyzed its expression in ovarian follicles of different stages of goose by real-time quantitative PCR.[Results]The results showed that the goose's AKR1D1 CDS consisted of 981 nucleotides that encoded 326 amino acids residues, and the amino acid homology of goose A KR1D1 shared 95.71% identity with chicken. The analysis of amino acid sequence revealed that the goose AKR1D1 encoded water-soluble protein and its relative molecular weight was 37 263.7 Da. Subcellular location of A KR1D1 was primarily in the cytoplasm and chondriosome,and it did not belong to the secreted protein. It is predicted that the AKR1D1 protein contained 18 phosphorylation sites,3 glycosylation sites. The secondary structure of AKR1D1 was mainly composed of random coil,while the tertiary structure of domain area showed a formic form helix structure. The results of real-time quantitative PCR revealed that goose AKR1D1 expressed most in theca layer and granulosa layer with 2~4 mm,at the lowest in theca layer of F5 and granulosa layer of F1.[Conclusion]A KR1D1 may play an important role in the recruitment,selection,screening,atresia and ovulation of the follicle by regulating the dynamic balance of steroid hormones.%【目的】克隆鹅AKR1D1基因编码区序列,预测其蛋白结构、功能,并研究其在鹅各等级卵泡中的表达特性。【方法】以天府肉鹅母系为材料,采用RT-PCR技术克隆鹅AKR1D1基因编码区序列,利用多种生物信息学分析软件预测其结构与功能,并应用荧光定量PCR技术检测其在各等级卵泡中的表达特性。【结果】结果表明:鹅AKR1D1

  9. Distributed multiple description coding

    CERN Document Server

    Bai, Huihui; Zhao, Yao

    2011-01-01

    This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC,

  10. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  11. Coded MapReduce

    OpenAIRE

    Li, Songze; Maddah-Ali, Mohammad Ali; Avestimehr, A. Salman

    2015-01-01

    MapReduce is a commonly used framework for executing data-intensive jobs on distributed server clusters. We introduce a variant implementation of MapReduce, namely "Coded MapReduce", to substantially reduce the inter-server communication load for the shuffling phase of MapReduce, and thus accelerating its execution. The proposed Coded MapReduce exploits the repetitive mapping of data blocks at different servers to create coding opportunities in the shuffling phase to exchange (key,value) pair...

  12. Classical Holographic Codes

    CERN Document Server

    Brehm, Enrico M

    2016-01-01

    In this work, we introduce classical holographic codes. These can be understood as concatenated probabilistic codes and can be represented as networks uniformly covering hyperbolic space. In particular, classical holographic codes can be interpreted as maps from bulk degrees of freedom to boundary degrees of freedom. Interestingly, they are shown to exhibit features similar to those expected from the AdS/CFT correspondence. Among these are a version of the Ryu-Takayanagi formula and intriguing properties regarding bulk reconstruction and boundary representations of bulk operations. We discuss the relation of our findings with expectations from AdS/CFT and, in particular, with recent results from quantum error correction.

  13. DOE headquarters publications

    Energy Technology Data Exchange (ETDEWEB)

    None

    1978-12-01

    This bibliography provides listings of (mainly policy and programmatic) publications issued from the U.S. Department of Energy, Washington, D.C. The listings are arranged by the report number assigned to each publication. All of the publications listed, except for those shown as still in preparation, may be seen in the Energy Library. A title index arranged by title keywords follows the listings. Certain publications have been omitted. They include such items as pamphlets, fact sheets, bulletins and weekly/monthly issuances of DOE's Energy Information Administration and Economic Regulatory Administration, and employee bulletins and newsletters. Omitted from the bibliography altogether are headquarters publications assigned other types of report codes--e.g., HCP (Headquarters Contractor Publication) and CONF (conference proceedings).

  14. Interaction between Functional Domains of Bacillus thuringiensis Insecticidal Crystal Proteins

    Science.gov (United States)

    Rang, Cécile; Vachon, Vincent; de Maagd, Ruud A.; Villalon, Mario; Schwartz, Jean-Louis; Bosch, Dirk; Frutos, Roger; Laprade, Raynald

    1999-01-01

    Interactions among the three structural domains of Bacillus thuringiensis Cry1 toxins were investigated by functional analysis of chimeric proteins. Hybrid genes were prepared by exchanging the regions coding for either domain I or domain III among Cry1Ab, Cry1Ac, Cry1C, and Cry1E. The activity of the purified trypsin-activated chimeric toxins was evaluated by testing their effects on the viability and plasma membrane permeability of Sf9 cells. Among the parental toxins, only Cry1C was active against these cells and only chimeras possessing domain II from Cry1C were functional. Combination of domain I from Cry1E with domains II and III from Cry1C, however, resulted in an inactive toxin, indicating that domain II from an active toxin is necessary, but not sufficient, for activity. Pores formed by chimeric toxins in which domain I was from Cry1Ab or Cry1Ac were slightly smaller than those formed by toxins in which domain I was from Cry1C. The properties of the pores formed by the chimeras are therefore likely to result from an interaction between domain I and domain II or III. Domain III appears to modulate the activity of the chimeric toxins: combination of domain III from Cry1Ab with domains I and II of Cry1C gave a protein which was more strongly active than Cry1C. PMID:10388684

  15. Domains via Graphs

    Institute of Scientific and Technical Information of China (English)

    ZHANG Guoqiang; CHEN Yixiang

    2001-01-01

    This paper provides a concrete and simple introduction to two pillars of domain theory: (1) solving recursive domain equations, and (2) universal and saturated domains. Our exposition combines Larsen and Winskel's idea on solving domain equations using information systems with Girard's idea of stable domain theory in the form of coherence spaces, or graphs.Detailed constructions are given for universal and even homogeneous objects in two categories of graphs: one representing binary complete, prime algebraic domains with complete primes covering the bottom; the other representing ω-algebraic, prime algebraic lattices. The backand-forth argument in model theory helps to enlighten the constructions.

  16. Public Ethics Adjustment in Urbanization:From Ethical Code Awing to System Awing%农民市民化进程中的公共伦理调适:从礼教敬畏到制度敬畏

    Institute of Scientific and Technical Information of China (English)

    贺一松

    2016-01-01

    In the process of urbanization,farmers’ citizenship means not merely the exterior change of geo⁃graphical environment,but also the transformation of deep cultural ethics. With the existence of “degenerating culture”,farmers have to undergo a process of public ethics adjustment before they are citizenized. A public ethical adjustment model of new citizens,which is based on time axis,is established. Farmers’ citizenship in⁃cludes two nodes:exterior urbanization and intrinsic urbanization,which divide the urbanization ( public ethics dimension) process into three stages.Then,based on an order of time,these three stages are described as fol⁃lows:traditional ethical social period, public ethical adjustment period and modern good order social period. And from the perspective of contemporary significance of awe,new citizens experienced the periodical state of“environmental vigilance” and “non⁃awed consciousness” during the period of public ethical adjustment.%城市化过程中,农民转化为市民不仅涉及表象的地理环境转变,而且涉及深层次的文化伦理转变。由于“文化堕距”的存在,农民的市民化需要一个公共伦理调适过程。根据以时间为轴建立的新市民公共伦理调适模型,农民转化为市民有表象城市化和本质城市化两个节点,并将人的城市化(公共伦理维度)进程划分为3个阶段,按时间递进顺序描述为传统伦理社会期———公共伦理调适期———现代良序社会期。其中在公共伦理调适期,从敬畏之心的当代意义视角,新市民存在“环境戒惕”和“敬畏缺失”的阶段性状态。

  17. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  18. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  19. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  20. GOOGLE SUMMER OF CODE

    National Research Council Canada - National Science Library

    Leslie Hawthorn

    2008-01-01

      This article examines the Google Summer of Code (GSoC) program, the world's first global initiative to introduce College and University students to free/libre open source software (F/LOSS) development...

  1. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  2. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    , in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded......The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered...... as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  3. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  4. Annotated Raptor Codes

    CERN Document Server

    Mahdaviani, Kaveh; Tellambura, Chintha

    2011-01-01

    In this paper, an extension of raptor codes is introduced which keeps all the desirable properties of raptor codes, including the linear complexity of encoding and decoding per information bit, unchanged. The new design, however, improves the performance in terms of the reception rate. Our simulations show a 10% reduction in the needed overhead at the benchmark block length of 64,520 bits and with the same complexity per information bit.

  5. Public Claims: A Legal Evaluation

    Directory of Open Access Journals (Sweden)

    Tamer Budak

    2011-04-01

    Full Text Available In order for a claim to exist, the host there has to be two parties. In case of public claims one of the parties is the state, special provincial administration and municipalities; while the debtor consists of the natural and legal persons. The definition of public claims is provided by The Procedure Law of Collection of Public Claims. One claims, the quality of the public claims not cause any, may be excluded from the scope of Law No. 6183. All the claims of public administration are not public claims. However, any private claim can have the security of a public claim. For this reason the criteria used to define a public claim differ. Arrangements, which can render a public claim a privileged claim, exist in the relevant Code. The aim of this study is to define the concept of public claim expressed in the relevant code and to determine the conditions under which a claim not stated in the Code can be considered a public claim in the light of court decisions.

  6. Robust Nonlinear Neural Codes

    Science.gov (United States)

    Yang, Qianli; Pitkow, Xaq

    2015-03-01

    Most interesting natural sensory stimuli are encoded in the brain in a form that can only be decoded nonlinearly. But despite being a core function of the brain, nonlinear population codes are rarely studied and poorly understood. Interestingly, the few existing models of nonlinear codes are inconsistent with known architectural features of the brain. In particular, these codes have information content that scales with the size of the cortical population, even if that violates the data processing inequality by exceeding the amount of information entering the sensory system. Here we provide a valid theory of nonlinear population codes by generalizing recent work on information-limiting correlations in linear population codes. Although these generalized, nonlinear information-limiting correlations bound the performance of any decoder, they also make decoding more robust to suboptimal computation, allowing many suboptimal decoders to achieve nearly the same efficiency as an optimal decoder. Although these correlations are extremely difficult to measure directly, particularly for nonlinear codes, we provide a simple, practical test by which one can use choice-related activity in small populations of neurons to determine whether decoding is suboptimal or optimal and limited by correlated noise. We conclude by describing an example computation in the vestibular system where this theory applies. QY and XP was supported by a grant from the McNair foundation.

  7. On Expanded Cyclic Codes

    CERN Document Server

    Wu, Yingquan

    2008-01-01

    The paper has a threefold purpose. The first purpose is to present an explicit description of expanded cyclic codes defined in $\\GF(q^m)$. The proposed explicit construction of expanded generator matrix and expanded parity check matrix maintains the symbol-wise algebraic structure and thus keeps many important original characteristics. The second purpose of this paper is to identify a class of constant-weight cyclic codes. Specifically, we show that a well-known class of $q$-ary BCH codes excluding the all-zero codeword are constant-weight cyclic codes. Moreover, we show this class of codes achieve the Plotkin bound. The last purpose of the paper is to characterize expanded cyclic codes utilizing the proposed expanded generator matrix and parity check matrix. We analyze the properties of component codewords of a codeword and particularly establish the precise conditions under which a codeword can be represented by a subbasis. With the new insights, we present an improved lower bound on the minimum distance of...

  8. Domains of laminin

    DEFF Research Database (Denmark)

    Engvall, E; Wewer, U M

    1996-01-01

    Extracellular matrix molecules are often very large and made up of several independent domains, frequently with autonomous activities. Laminin is no exception. A number of globular and rod-like domains can be identified in laminin and its isoforms by sequence analysis as well as by electron...... microscopy. Here we present the structure-function relations in laminins by examination of their individual domains. This approach to viewing laminin is based on recent results from several laboratories. First, some mutations in laminin genes that cause disease have affected single laminin domains, and some...... laminin isoforms lack particular domains. These mutants and isoforms are informative with regard to the activities of the mutated and missing domains. These mutants and isoforms are informative with regard to the activities of the mutated and missing domains. Second, laminin-like domains have now been...

  9. User Instructions for the CiderF Individual Dose Code and Associated Utility Codes

    Energy Technology Data Exchange (ETDEWEB)

    Eslinger, Paul W.; Napier, Bruce A.

    2013-08-30

    Historical activities at facilities producing nuclear materials for weapons released radioactivity into the air and water. Past studies in the United States have evaluated the release, atmospheric transport and environmental accumulation of 131I from the nuclear facilities at Hanford in Washington State and the resulting dose to members of the public (Farris et al. 1994). A multi-year dose reconstruction effort (Mokrov et al. 2004) is also being conducted to produce representative dose estimates for members of the public living near Mayak, Russia, from atmospheric releases of 131I at the facilities of the Mayak Production Association. The approach to calculating individual doses to members of the public from historical releases of airborne 131I has the following general steps: • Construct estimates of releases 131I to the air from production facilities. • Model the transport of 131I in the air and subsequent deposition on the ground and vegetation. • Model the accumulation of 131I in soil, water and food products (environmental media). • Calculate the dose for an individual by matching the appropriate lifestyle and consumption data for the individual to the concentrations of 131I in environmental media at their residence location. A number of computer codes were developed to facilitate the study of airborne 131I emissions at Hanford. The RATCHET code modeled movement of 131I in the atmosphere (Ramsdell Jr. et al. 1994). The DECARTES code modeled accumulation of 131I in environmental media (Miley et al. 1994). The CIDER computer code estimated annual doses to individuals (Eslinger et al. 1994) using the equations and parameters specific to Hanford (Snyder et al. 1994). Several of the computer codes developed to model 131I releases from Hanford are general enough to be used for other facilities. This document provides user instructions for computer codes calculating doses to members of the public from atmospheric 131I that have two major differences from the

  10. The Particle Accelerator Simulation Code PyORBIT

    Energy Technology Data Exchange (ETDEWEB)

    Gorlov, Timofey V [ORNL; Holmes, Jeffrey A [ORNL; Cousineau, Sarah M [ORNL; Shishlo, Andrei P [ORNL

    2015-01-01

    The particle accelerator simulation code PyORBIT is presented. The structure, implementation, history, parallel and simulation capabilities, and future development of the code are discussed. The PyORBIT code is a new implementation and extension of algorithms of the original ORBIT code that was developed for the Spallation Neutron Source accelerator at the Oak Ridge National Laboratory. The PyORBIT code has a two level structure. The upper level uses the Python programming language to control the flow of intensive calculations performed by the lower level code implemented in the C++ language. The parallel capabilities are based on MPI communications. The PyORBIT is an open source code accessible to the public through the Google Open Source Projects Hosting service.

  11. Bring out your codes! Bring out your codes! (Increasing Software Visibility and Re-use)

    Science.gov (United States)

    Allen, A.; Berriman, B.; Brunner, R.; Burger, D.; DuPrie, K.; Hanisch, R. J.; Mann, R.; Mink, J.; Sandin, C.; Shortridge, K.; Teuben, P.

    2013-10-01

    Progress is being made in code discoverability and preservation, but as discussed at ADASS XXI, many codes still remain hidden from public view. With the Astrophysics Source Code Library (ASCL) now indexed by the SAO/NASA Astrophysics Data System (ADS), the introduction of a new journal, Astronomy & Computing, focused on astrophysics software, and the increasing success of education efforts such as Software Carpentry and SciCoder, the community has the opportunity to set a higher standard for its science by encouraging the release of software for examination and possible reuse. We assembled representatives of the community to present issues inhibiting code release and sought suggestions for tackling these factors. The session began with brief statements by panelists; the floor was then opened for discussion and ideas. Comments covered a diverse range of related topics and points of view, with apparent support for the propositions that algorithms should be readily available, code used to produce published scientific results should be made available, and there should be discovery mechanisms to allow these to be found easily. With increased use of resources such as GitHub (for code availability), ASCL (for code discovery), and a stated strong preference from the new journal Astronomy & Computing for code release, we expect to see additional progress over the next few years.

  12. Rate-embedded differential space-time-frequency coding scheme

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In multiple-input-multiple-output orthogonal-frequency-division-multiplexing (MIMO-OFDM) system, a rate-embedded differential space-time-frequency (DSTF) coding scheme was proposed. Both the conventional space-time codes and coding techniques in frequency domain were employed to build high rate and low rate space-time-frequency message matrices. Then both types of message matrices were differentially transmitted alternately in the frequency domain. Consequently, the total transmission rate could be improved greatly. At receiver, a simple decision feedback differential detector (SDF-DD) was adopted to further enhance the total error performance with approximate DD complexity. Simulation results verified that the proposed scheme can implement high rate and high reliability differential transmission. Compared with the conventional DSTF coding schemes, the proposed scheme achieves higher spectral efficiency and much better error performance.

  13. Hominoid-specific de novo protein-coding genes originating from long non-coding RNAs.

    Directory of Open Access Journals (Sweden)

    Chen Xie

    2012-09-01

    Full Text Available Tinkering with pre-existing genes has long been known as a major way to create new genes. Recently, however, motherless protein-coding genes have been found to have emerged de novo from ancestral non-coding DNAs. How these genes originated is not well addressed to date. Here we identified 24 hominoid-specific de novo protein-coding genes with precise origination timing in vertebrate phylogeny. Strand-specific RNA-Seq analyses were performed in five rhesus macaque tissues (liver, prefrontal cortex, skeletal muscle, adipose, and testis, which were then integrated with public transcriptome data from human, chimpanzee, and rhesus macaque. On the basis of comparing the RNA expression profiles in the three species, we found that most of the hominoid-specific de novo protein-coding genes encoded polyadenylated non-coding RNAs in rhesus macaque or chimpanzee with a similar transcript structure and correlated tissue expression profile. According to the rule of parsimony, the majority of these hominoid-specific de novo protein-coding genes appear to have acquired a regulated transcript structure and expression profile before acquiring coding potential. Interestingly, although the expression profile was largely correlated, the coding genes in human often showed higher transcriptional abundance than their non-coding counterparts in rhesus macaque. The major findings we report in this manuscript are robust and insensitive to the parameters used in the identification and analysis of de novo genes. Our results suggest that at least a portion of long non-coding RNAs, especially those with active and regulated transcription, may serve as a birth pool for protein-coding genes, which are then further optimized at the transcriptional level.

  14. Hominoid-specific de novo protein-coding genes originating from long non-coding RNAs.

    Directory of Open Access Journals (Sweden)

    Chen Xie

    2012-09-01

    Full Text Available Tinkering with pre-existing genes has long been known as a major way to create new genes. Recently, however, motherless protein-coding genes have been found to have emerged de novo from ancestral non-coding DNAs. How these genes originated is not well addressed to date. Here we identified 24 hominoid-specific de novo protein-coding genes with precise origination timing in vertebrate phylogeny. Strand-specific RNA-Seq analyses were performed in five rhesus macaque tissues (liver, prefrontal cortex, skeletal muscle, adipose, and testis, which were then integrated with public transcriptome data from human, chimpanzee, and rhesus macaque. On the basis of comparing the RNA expression profiles in the three species, we found that most of the hominoid-specific de novo protein-coding genes encoded polyadenylated non-coding RNAs in rhesus macaque or chimpanzee with a similar transcript structure and correlated tissue expression profile. According to the rule of parsimony, the majority of these hominoid-specific de novo protein-coding genes appear to have acquired a regulated transcript structure and expression profile before acquiring coding potential. Interestingly, although the expression profile was largely correlated, the coding genes in human often showed higher transcriptional abundance than their non-coding counterparts in rhesus macaque. The major findings we report in this manuscript are robust and insensitive to the parameters used in the identification and analysis of de novo genes. Our results suggest that at least a portion of long non-coding RNAs, especially those with active and regulated transcription, may serve as a birth pool for protein-coding genes, which are then further optimized at the transcriptional level.

  15. Non-Binary Polar Codes using Reed-Solomon Codes and Algebraic Geometry Codes

    CERN Document Server

    Mori, Ryuhei

    2010-01-01

    Polar codes, introduced by Arikan, achieve symmetric capacity of any discrete memoryless channels under low encoding and decoding complexity. Recently, non-binary polar codes have been investigated. In this paper, we calculate error probability of non-binary polar codes constructed on the basis of Reed-Solomon matrices by numerical simulations. It is confirmed that 4-ary polar codes have significantly better performance than binary polar codes on binary-input AWGN channel. We also discuss an interpretation of polar codes in terms of algebraic geometry codes, and further show that polar codes using Hermitian codes have asymptotically good performance.

  16. Distributed Video Coding: Iterative Improvements

    DEFF Research Database (Denmark)

    Luong, Huynh Van

    Nowadays, emerging applications such as wireless visual sensor networks and wireless video surveillance are requiring lightweight video encoding with high coding efficiency and error-resilience. Distributed Video Coding (DVC) is a new coding paradigm which exploits the source statistics...

  17. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... that are subcodes of the binary Reed-Muller codes and can be very simply instrumented, 3) a new class of constacyclic codes that are subcodes of thep-ary "Reed-Muller codes," 4) two new classes of binary convolutional codes with large "free distance" derived from known binary cyclic codes, 5) two new classes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm....

  18. The amendment of the Labour Code

    Directory of Open Access Journals (Sweden)

    Jana Mervartová

    2012-01-01

    Full Text Available The amendment of the Labour Code, No. 365/2011 Coll., effective as from 1st January 2012, brings some of fundamental changes in labour law. The amendment regulates relation between the Labour Code and the Civil Code; and is also formulates principles of labour law relations newly. The basic period by fixed-term contract of employment is extended and also frequency its conclusion is limited. The length of trial period and the amount of redundancy payment are graduated. An earlier legislative regulation which an employee is temporarily assign to work for different employer has been returned. The number of hours by agreement to perform work is increased. The monetary compensation by competitive clause is reduced. The other changes are realised in part of collective labour law. The authoress of article notifies of the most important changes. She compares new changes of the Labour Code and former legal system and she also evaluates their advantages and disadvantages. The main objective of changes ensures labour law relations to be more flexible. And it should motivate creation of new jobs opening by employers. Amended provisions are aimed to reduction expenses of employers under the reform of the public finances. Also changes are expected in the Labour Code in connection with the further new Civil Code.

  19. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes.......Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  20. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  1. Algebraic geometric codes with applications

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2007-01-01

    The theory of linear error-correcting codes from algebraic geomet-ric curves (algebraic geometric (AG) codes or geometric Goppa codes) has been well-developed since the work of Goppa and Tsfasman, Vladut, and Zink in 1981-1982. In this paper we introduce to readers some recent progress in algebraic geometric codes and their applications in quantum error-correcting codes, secure multi-party computation and the construction of good binary codes.

  2. Implementation of Effective Code Converters using Reversible Logic Gates

    Directory of Open Access Journals (Sweden)

    Ponnuru Koteswara Rao

    2016-05-01

    Full Text Available aThe development in the field of nanometer technology leads to minimize the power consumption of logic circuits. Reversible logic design has been one of the promising technologies gaining greater interest due to less dissipation of heat and low power consumption. In the digital design, the code converters are widely used process. So, the reversible logic gates and reversible circuits for realizing code converters like as Binary to Gray code, Gray to Binary code, BCD to Excess 3 code, Excess 3 to BCD codes using reversible logic gates is proposed. Designing of reversible logic circuit is challenging task, since not enough number of gates are available for design. Reversible processor design needs its building blocks should be reversible in this view the designing of reversible code converters became essential one. In the digital domain, data or information is represented by a combination of 0’s and 1’s. A code is basically the pattern of these 0’s and 1’s used to represent the data. Code converters are a class of combinational digital circuits that are used to convert one type of code in to another. The proposed design leads to the reduction of power consumption compared with conventional logic circuits

  3. Pathways of Genetic Code Evolution in Ancient and Modern Organisms.

    Science.gov (United States)

    Sengupta, Supratim; Higgs, Paul G

    2015-06-01

    There have been two distinct phases of evolution of the genetic code: an ancient phase--prior to the divergence of the three domains of life, during which the standard genetic code was established--and a modern phase, in which many alternative codes have arisen in specific groups of genomes that differ only slightly from the standard code. Here we discuss the factors that are most important in these two phases, and we argue that these are substantially different. In the modern phase, changes are driven by chance events such as tRNA gene deletions and codon disappearance events. Selection acts as a barrier to prevent changes in the code. In contrast, in the ancient phase, selection for increased diversity of amino acids in the code can be a driving force for addition of new amino acids. The pathway of code evolution is constrained by avoiding disruption of genes that are already encoded by earlier versions of the code. The current arrangement of the standard code suggests that it evolved from a four-column code in which Gly, Ala, Asp, and Val were the earliest encoded amino acids.

  4. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  5. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  6. 78 FR 11202 - Medicare Program; Public Meetings in Calendar Year 2013 for All New Public Requests for Revisions...

    Science.gov (United States)

    2013-02-15

    ... & Definitions'' which illustrates, in a flow diagram format, HCPCS coding standards as described in our Coding... information regarding the establishment of the public meeting process for DME. It is our intent to distribute... meeting process provides an opportunity for the public to become aware of coding changes under...

  7. NDSPMHD Smoothed Particle Magnetohydrodynamics Code

    Science.gov (United States)

    Price, Daniel J.

    2011-01-01

    This paper presents an overview and introduction to Smoothed Particle Hydrodynamics and Magnetohydrodynamics in theory and in practice. Firstly, we give a basic grounding in the fundamentals of SPH, showing how the equations of motion and energy can be self-consistently derived from the density estimate. We then show how to interpret these equations using the basic SPH interpolation formulae and highlight the subtle difference in approach between SPH and other particle methods. In doing so, we also critique several 'urban myths' regarding SPH, in particular the idea that one can simply increase the 'neighbour number' more slowly than the total number of particles in order to obtain convergence. We also discuss the origin of numerical instabilities such as the pairing and tensile instabilities. Finally, we give practical advice on how to resolve three of the main issues with SPMHD: removing the tensile instability, formulating dissipative terms for MHD shocks and enforcing the divergence constraint on the particles, and we give the current status of developments in this area. Accompanying the paper is the first public release of the NDSPMHD SPH code, a 1, 2 and 3 dimensional code designed as a testbed for SPH/SPMHD algorithms that can be used to test many of the ideas and used to run all of the numerical examples contained in the paper.

  8. Golden Coded Multiple Beamforming

    CERN Document Server

    Li, Boyu

    2010-01-01

    The Golden Code is a full-rate full-diversity space-time code, which achieves maximum coding gain for Multiple-Input Multiple-Output (MIMO) systems with two transmit and two receive antennas. Since four information symbols taken from an M-QAM constellation are selected to construct one Golden Code codeword, a maximum likelihood decoder using sphere decoding has the worst-case complexity of O(M^4), when the Channel State Information (CSI) is available at the receiver. Previously, this worst-case complexity was reduced to O(M^(2.5)) without performance degradation. When the CSI is known by the transmitter as well as the receiver, beamforming techniques that employ singular value decomposition are commonly used in MIMO systems. In the absence of channel coding, when a single symbol is transmitted, these systems achieve the full diversity order provided by the channel. Whereas this property is lost when multiple symbols are simultaneously transmitted. However, uncoded multiple beamforming can achieve the full div...

  9. Coded source neutron imaging

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; Santos-Villalobos, Hector J [ORNL

    2011-01-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100 m) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100um and 10um aperture hole diameters show resolutions matching the hole diameters.

  10. Coded source neutron imaging

    Science.gov (United States)

    Bingham, Philip; Santos-Villalobos, Hector; Tobin, Ken

    2011-03-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100μm) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100μm and 10μm aperture hole diameters show resolutions matching the hole diameters.

  11. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  12. A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes

    CERN Document Server

    Gauthier, Valérie; Tillich, Jean-Pierre

    2012-01-01

    Bogdanov and Lee suggested a homomorphic public-key encryption scheme based on error correcting codes. The underlying public code is a modified Reed-Solomon code obtained from inserting a zero submatrix in the Vandermonde generating matrix defining it. The columns that define this submatrix are kept secret and form a set $L$. We give here a distinguisher that detects if one or several columns belong to $L$ or not. This distinguisher is obtained by considering the code generated by component-wise products of codewords of the public code (the so called "square code"). This operation is applied to punctured versions of this square code obtained by picking a subset $I$ of the whole set of columns. It turns out that the dimension of the punctured square code is directly related to the cardinality of the intersection of $I$ with $L$. This allows an attack which recovers the full set $L$ and which can then decrypt any ciphertext.

  13. NEW BINARY USER CODES FOR DS CDMA COMMUNICATION

    Directory of Open Access Journals (Sweden)

    NEELAM SRIVASTAVA

    2011-12-01

    Full Text Available Spread spectrum (SS is a modulation technique in which the signal occupies a bandwidth much larger than the minimum necessary to send the information. A synchronized reception with the code at the receiver is used for despreading the information before data recovery. From a long period, Walsh codes and Gold codes have been used as spread spectrum codes in Code Division Multiple Access (CDMA communications because of their ease of generation than the efficiency of these codes. Walsh codes are perfectly orthogonal binary user codes that have many popular applications in synchronous multicarrier communications although they perform poorly for asynchronous multi-user communications. Therefore, the nearly orthogonal Gold codes with their superior performance are the preferred user codes in asynchronous CDMA communications with small number of simultaneous users in the system due to their good auto-correlation (intracode correlation and cross-correlation (inter-code properties. Major drawback of these codes is that they are limited in number and in their lengths. In this paper, we performed MATLAB (7.1version algorithm to obtain the new orthogonal sets of binary space for multiuser spread-spectrum communications. We compared their performance with existing codes like Gold and Walsh code families. Our comparisons include their time domain properties like auto and cross-correlations along with bit error rate (BER performances in additive white Gaussian noise (AWGN and Rayleigh channel for the synchronous and asynchronous DS-CDMA communications. It is shown that these codes outperform the Walsh codes significantly and they match in performance with the popular nearly orthogonal Gold codes closely for asynchronous multiuser communications in AWGN noise. It is also shown that all of the binary code families considered performed comparable for Rayleigh flat-fading channels. So these new codes can be used both for asynchronous and synchronous direct sequence

  14. Phase-coded pulse aperiodic transmitter coding

    Directory of Open Access Journals (Sweden)

    I. I. Virtanen

    2009-07-01

    Full Text Available Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC, whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF. When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers – about seven milliseconds – whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  15. Public Values

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Rutgers, Mark R.

    2015-01-01

    administration is approached in terms of processes guided or restricted by public values and as public value creating: public management and public policy-making are both concerned with establishing, following and realizing public values. To study public values a broad perspective is needed. The article suggest......This article provides the introduction to a symposium on contemporary public values research. It is argued that the contribution to this symposium represent a Public Values Perspective, distinct from other specific lines of research that also use public value as a core concept. Public...... a research agenda for this encompasing kind of public values research. Finally the contributions to the symposium are introduced....

  16. Patterns, principles, and practices of domain-driven design

    CERN Document Server

    Millett, Scott

    2015-01-01

    Methods for managing complex software construction following the practices, principles and patterns of Domain-Driven Design with code examples in C# This book presents the philosophy of Domain-Driven Design (DDD) in a down-to-earth and practical manner for experienced developers building applications for complex domains. A focus is placed on the principles and practices of decomposing a complex problem space as well as the implementation patterns and best practices for shaping a maintainable solution space. You will learn how to build effective domain models through the use of tactical pat

  17. Nested Quantum Error Correction Codes

    CERN Document Server

    Wang, Zhuo; Fan, Hen; Vedral, Vlatko

    2009-01-01

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  18. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  19. Autocatalysis, information and coding.

    Science.gov (United States)

    Wills, P R

    2001-01-01

    Autocatalytic self-construction in macromolecular systems requires the existence of a reflexive relationship between structural components and the functional operations they perform to synthesise themselves. The possibility of reflexivity depends on formal, semiotic features of the catalytic structure-function relationship, that is, the embedding of catalytic functions in the space of polymeric structures. Reflexivity is a semiotic property of some genetic sequences. Such sequences may serve as the basis for the evolution of coding as a result of autocatalytic self-organisation in a population of assignment catalysts. Autocatalytic selection is a mechanism whereby matter becomes differentiated in primitive biochemical systems. In the case of coding self-organisation, it corresponds to the creation of symbolic information. Prions are present-day entities whose replication through autocatalysis reflects aspects of biological semiotics less obvious than genetic coding.

  20. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  1. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  2. Spread codes and spread decoding in network coding

    OpenAIRE

    Manganiello, F; Gorla, E.; Rosenthal, J.

    2008-01-01

    In this paper we introduce the class of spread codes for the use in random network coding. Spread codes are based on the construction of spreads in finite projective geometry. The major contribution of the paper is an efficient decoding algorithm of spread codes up to half the minimum distance.

  3. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes...

  4. An Empirical Research on Periodic Fluctuation of Public Opinion on Microblogging and Other Domains%微博舆情跨域周期波动实证研究

    Institute of Scientific and Technical Information of China (English)

    盛宇

    2015-01-01

    Combining the period of microblogging public opinion and the period of objective factors triggering the microblogging events, this paper conducts a cross-field research on periodic fluctuation of online and offline. The paper puts forward a complete set of research ideas and research methods, and conducts an empirical research to test the feasibility of the ideas, taking the haze event on microblogging as an example. The conclusion implies the interactive rules between the periods of microblogging public opinion and objective factors, and proposes a microblogging public opinion forecasting model. The study deepens the theory of periodic microblogging public opinion, and provides a new way for the early warning of microblogging public opinion, and the paper has significant values in both theoretical and practical aspects.%以生命周期理论为基础,将微博舆情周期与触发事件客观因素周期相联系,进行线上线下的跨域周期波动研究,提出一整套研究思路和研究方法,并以微博雾霾事件为例进行实证分析,考察了思路的可行性,实证结论揭示了微博雾霾舆情周期与客观因素周期之间的互动规律,提出微博舆情预测模型。深化了微博舆情周期理论,并为微博舆情预警提供了新思路,在理论性和实用性方面都具有重要价值。

  5. Development of environmental dose assessment system (EDAS) code of PC version

    CERN Document Server

    Taki, M; Kobayashi, H; Yamaguchi, T

    2003-01-01

    A computer code (EDAS) was developed to assess the public dose for the safety assessment to get the license of nuclear reactor operation. This code system is used for the safety analysis of public around the nuclear reactor in normal operation and severe accident. This code was revised and composed for personal computer user according to the Nuclear Safety Guidelines reflected the ICRP1990 recommendation. These guidelines are revised by Nuclear Safety Commission on March, 2001, which are 'Weather analysis guideline for the safety assessment of nuclear power reactor', 'Public dose around the facility assessment guideline corresponding to the objective value for nuclear power light water reactor' and 'Public dose assessment guideline for safety review of nuclear power light water reactor'. This code has been already opened for public user by JAERI, and English version code and user manual are also prepared. This English version code is helpful for international cooperation concerning the nuclear safety assessme...

  6. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  7. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  8. Análisis de dominio de la revista mexicana Investigación Bibliotecológica Domain analysis by the mexican publication Investigación Bibliotecológica

    Directory of Open Access Journals (Sweden)

    Félix de Moya-Anegón

    2001-12-01

    Full Text Available El análisis de dominio esta compuesto por un conjunto de metodologías que permiten delinear la estructura de relaciones existente en una determinada disciplina. El objetivo del presente trabajo es brindar un análisis de dominio de la disciplina Bibliotecología y Documentación (ByD en México. Para ello se analizará la bibliografía citaa por la revista Investigación Bibliotecológica (IB. Entre los elementos a analizar se encuentran: producción, autoría, coautoría, fuentes citadas y cocitación de revistas.The domain analysis involved a set of methods that show the structure of relations in a specific discipline. The aim of this paper is to provide the domain analysis of Library and Information Science (LIS in México. For that purpose, the bibliography of the Investigación Bibliotecológica (IB journal is analized. We analize the production, autorship, co-autorship, quoted sources, and joint quotation of journals.

  9. JPEG2000 COMPRESSION CODING USING HUMAN VISUAL SYSTEM MODEL

    Institute of Scientific and Technical Information of China (English)

    Xiao Jiang; Wu Chengke

    2005-01-01

    In order to apply the Human Visual System (HVS) model to JPEG2000 standard,several implementation alternatives are discussed and a new scheme of visual optimization isintroduced with modifying the slope of rate-distortion. The novelty is that the method of visual weighting is not lifting the coefficients in wavelet domain, but is complemented by code stream organization. It remains all the features of Embedded Block Coding with Optimized Truncation (EBCOT) such as resolution progressive, good robust for error bit spread and compatibility of lossless compression. Well performed than other methods, it keeps the shortest standard codestream and decompression time and owns the ability of VIsual Progressive (VIP) coding.

  10. THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES

    Directory of Open Access Journals (Sweden)

    Vedat Şiap

    2011-12-01

    Full Text Available Public-key cryptosystems form an important part of cryptography. In these systems, every user has a public and a private key. The public key allows other users to encrypt messages, which can only be decoded using the secret private key. In that way, public-key cryptosystems allow easy and secure communication between all users without the need to actually meet and exchange keys. One such system is the McEliece Public-Key cryptosystem, sometimes also called McEliece Scheme. However, as we live in the information age, coding is used in order to protecet or correct the messages in the transferring or the storing processes. So, linear codes are important in the transferring or the storing. Due to richness of their structure array codes which are linear are also an important codes. However, the information is then transferred into the source more securely by increasing the error correction capability with array codes. In this paper, we combine two interesting topics, McEliece cryptosystem and array codes.

  11. Code cases for implementing risk-based inservice testing in the ASME OM code

    Energy Technology Data Exchange (ETDEWEB)

    Rowley, C.W.

    1996-12-01

    Historically inservice testing has been reasonably effective, but quite costly. Recent applications of plant PRAs to the scope of the IST program have demonstrated that of the 30 pumps and 500 valves in the typical plant IST program, less than half of the pumps and ten percent of the valves are risk significant. The way the ASME plans to tackle this overly-conservative scope for IST components is to use the PRA and plant expert panels to create a two tier IST component categorization scheme. The PRA provides the quantitative risk information and the plant expert panel blends the quantitative and deterministic information to place the IST component into one of two categories: More Safety Significant Component (MSSC) or Less Safety Significant Component (LSSC). With all the pumps and valves in the IST program placed in MSSC or LSSC categories, two different testing strategies will be applied. The testing strategies will be unique for the type of component, such as centrifugal pump, positive displacement pump, MOV, AOV, SOV, SRV, PORV, HOV, CV, and MV. A series of OM Code Cases are being developed to capture this process for a plant to use. One Code Case will be for Component Importance Ranking. The remaining Code Cases will develop the MSSC and LSSC testing strategy for type of component. These Code Cases are planned for publication in early 1997. Later, after some industry application of the Code Cases, the alternative Code Case requirements will gravitate to the ASME OM Code as appendices.

  12. A methodology for the rigorous verification of plasma simulation codes

    Science.gov (United States)

    Riva, Fabio

    2016-10-01

    The methodology used to assess the reliability of numerical simulation codes constitutes the Verification and Validation (V&V) procedure. V&V is composed by two separate tasks: the verification, which is a mathematical issue targeted to assess that the physical model is correctly solved, and the validation, which determines the consistency of the code results, and therefore of the physical model, with experimental data. In the present talk we focus our attention on the verification, which in turn is composed by the code verification, targeted to assess that a physical model is correctly implemented in a simulation code, and the solution verification, that quantifies the numerical error affecting a simulation. Bridging the gap between plasma physics and other scientific domains, we introduced for the first time in our domain a rigorous methodology for the code verification, based on the method of manufactured solutions, as well as a solution verification based on the Richardson extrapolation. This methodology was applied to GBS, a three-dimensional fluid code based on a finite difference scheme, used to investigate the plasma turbulence in basic plasma physics experiments and in the tokamak scrape-off layer. Overcoming the difficulty of dealing with a numerical method intrinsically affected by statistical noise, we have now generalized the rigorous verification methodology to simulation codes based on the particle-in-cell algorithm, which are employed to solve Vlasov equation in the investigation of a number of plasma physics phenomena.

  13. Internal Corrosion Control of Water Supply Systems Code of Practice

    Science.gov (United States)

    This Code of Practice is part of a series of publications by the IWA Specialist Group on Metals and Related Substances in Drinking Water. It complements the following IWA Specialist Group publications: 1. Best Practice Guide on the Control of Lead in Drinking Water 2. Best Prac...

  14. Internal Corrosion Control of Water Supply Systems Code of Practice

    Science.gov (United States)

    This Code of Practice is part of a series of publications by the IWA Specialist Group on Metals and Related Substances in Drinking Water. It complements the following IWA Specialist Group publications: 1. Best Practice Guide on the Control of Lead in Drinking Water 2. Best Prac...

  15. New code match strategy for wideband code division multiple access code tree management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%.

  16. Direct GPS P-Code Acquisition Method Based on FFT

    Institute of Scientific and Technical Information of China (English)

    LI Hong; LU Mingquan; FENG Zhenming

    2008-01-01

    Recently, direct acquisition of GPS P-code has received considerable attention to enhance the anti-jamming and anti-spoofing capabilities of GPS receivers. This paper describes a P-code acquisition method that uses block searches with large-scale FFT to search code phases and carrier frequency offsets in parallel. To limit memory use, especially when implemented in hardware, only the largest correlation result with its position information was preserved after searching a block of resolution cells in both the time and frequency domains. A second search was used to solve the code phase slip problem induced by the code frequency offset. Simulation results demonstrate that the probability of detection is above 0.99 for carrier-to-noise density ratios in excess of 40 dB- Hz when the predetection integration time is 0.8 ms and 6 non-coherent integrations are used in the analysis.

  17. Astrophysics Source Code Library: Here we grow again!

    CERN Document Server

    Allen, Alice; DuPrie, Kimberly; Mink, Jessica; Nemiroff, Robert; Robitaille, Thomas; Schmidt, Judy; Shamir, Lior; Shortridge, Keith; Taylor, Mark; Teuben, Peter; Wallin, John

    2016-01-01

    The Astrophysics Source Code Library (ASCL) is a free online registry of research codes; it is indexed by ADS and Web of Science and has over 1300 code entries. Its entries are increasingly used to cite software; citations have been doubling each year since 2012 and every major astronomy journal accepts citations to the ASCL. Codes in the resource cover all aspects of astrophysics research and many programming languages are represented. In the past year, the ASCL added dashboards for users and administrators, started minting Digital Objective Identifiers (DOIs) for software it houses, and added metadata fields requested by users. This presentation covers the ASCL's growth in the past year and the opportunities afforded it as one of the few domain libraries for science research codes.

  18. Reed-Solomon convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Schmale, W

    2005-01-01

    In this paper we will introduce a specific class of cyclic convolutional codes. The construction is based on Reed-Solomon block codes. The algebraic parameters as well as the distance of these codes are determined. This shows that some of these codes are optimal or near optimal.

  19. ZooKeys, unlocking Earth’s incredible biodiversity and building a sustainable bridge into the public domain: From “print-based” to “web-based” taxonomy, systematics, and natural history. ZooKeys Editorial Opening Paper

    Directory of Open Access Journals (Sweden)

    Lyubomir Penev

    2008-07-01

    Full Text Available Publishing taxonomic and systematics studies in the digital era faces major challenges and requires new approaches, many of which are currently stimulating spirited discussions amongst taxonomists and systematists. New amendments to the International Code of Zoological Nomenclature are expected to regulate electronic publishing of new taxa and create a standard form for their registration (ZooBank. Responding to a perceived need, this editorial announces establishment of ZooKeys – a new online and print journal in zoological taxonomy and systematics, which aims to quickly respond and adapt to the newest developments in taxonomic publishing. Open Access is accepted as mandatory for ZooKeys. Th e rationale for and concept of ZooKeys is discussed in detail.

  20. Functional domains of the poliovirus receptor

    Energy Technology Data Exchange (ETDEWEB)

    Koike, Satoshi; Ise, Iku; Nomoto, Akio (Tokyo Metropolitan Institute of Medical Science (Japan))

    1991-05-15

    A number of mutant cDNAs of the human poliovirus receptor were constructed to identify essential regions of the molecule as the receptor. All mutant cDNAs carrying the sequence coding for the entire N-terminal immunoglobulin-like domain (domain I) confer permissiveness for poliovirus to mouse L cells, but a mutant cDNA lacking the sequence for domain I does not. The transformants permissive for poliovirus were able to bind the virus and were also recognized by monoclonal antibody D171, which competes with poliovirus for the cellular receptor. These results strongly suggest that the poliovirus binding site resides in domain I of the receptor. Mutant cDNAs for the sequence encoding the intracellular peptide were also constructed and expressed in mouse L cells. Susceptibility of these cells to poliovirus revealed that the entire putative cytoplasmic domain is not essential for virus infection. Thus, the cytoplasmic domain of the molecule appears not to play a role in the penetration of poliovirus.

  1. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  2. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  3. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and compositi

  4. Polar Code Validation

    Science.gov (United States)

    1989-09-30

    SUMMARY OF POLAR ACHIEVEMENTS ..... .......... 3 3. POLAR CODE PHYSICAL MODELS ..... ............. 5 3.1 PL- ASMA Su ^"ru5 I1LS SH A...of this problem. 1.1. The Charge-2 Rocket The Charge-2 payload was launched on a Black Brant VB from White Sands Mis- sile Range in New Mexico in

  5. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  6. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  7. Corner neutronic code

    Directory of Open Access Journals (Sweden)

    V.P. Bereznev

    2015-10-01

    An iterative solution process is used, including external iterations for the fission source and internal iterations for the scattering source. The paper presents the results of a cross-verification against the Monte Carlo MMK code [3] and on a model of the BN-800 reactor core.

  8. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  9. Focusing Automatic Code Inspections

    NARCIS (Netherlands)

    Boogerd, C.J.

    2010-01-01

    Automatic Code Inspection tools help developers in early detection of defects in software. A well-known drawback of many automatic inspection approaches is that they yield too many warnings and require a clearer focus. In this thesis, we provide such focus by proposing two methods to prioritize

  10. Translation domains in multiferroics

    OpenAIRE

    Meier, D; Leo, N; Jungk, T.; Soergel, E.; Becker, P.; Bohaty, L.; Fiebig, M.

    2010-01-01

    Translation domains differing in the phase but not in the orientation of the corresponding order parameter are resolved in two types of multiferroics. Hexagonal (h-) YMnO$_3$ is a split-order-parameter multiferroic in which commensurate ferroelectric translation domains are resolved by piezoresponse force microscopy whereas MnWO$_4$ is a joint-order-parameter multiferroic in which incommensurate magnetic translation domains are observed by optical second harmonic generation. The pronounced ma...

  11. Frustratingly Easy Domain Adaptation

    CERN Document Server

    Daumé, Hal

    2009-01-01

    We describe an approach to domain adaptation that is appropriate exactly in the case when one has enough ``target'' data to do slightly better than just using only ``source'' data. Our approach is incredibly simple, easy to implement as a preprocessing step (10 lines of Perl!) and outperforms state-of-the-art approaches on a range of datasets. Moreover, it is trivially extended to a multi-domain adaptation problem, where one has data from a variety of different domains.

  12. Staggered domain wall fermions

    CERN Document Server

    Hoelbling, Christian

    2016-01-01

    We construct domain wall fermions with a staggered kernel and investigate their spectral and chiral properties numerically in the Schwinger model. In some relevant cases we see an improvement of chirality by more than an order of magnitude as compared to usual domain wall fermions. Moreover, we present first results for four-dimensional quantum chromodynamics, where we also observe significant reductions of chiral symmetry violations for staggered domain wall fermions.

  13. code_swarm: a design study in organic software visualization.

    Science.gov (United States)

    Ogawa, Michael; Ma, Kwan-Liu

    2009-01-01

    In May of 2008, we published online a series of software visualization videos using a method called code_swarm. Shortly thereafter, we made the code open source and its popularity took off. This paper is a study of our code swarm application, comprising its design, results and public response. We share our design methodology, including why we chose the organic information visualization technique, how we designed for both developers and a casual audience, and what lessons we learned from our experiment. We validate the results produced by code_swarm through a qualitative analysis and by gathering online user comments. Furthermore, we successfully released the code as open source, and the software community used it to visualize their own projects and shared their results as well. In the end, we believe code_swarm has positive implications for the future of organic information design and open source information visualization practice.

  14. Optical encryption of personal identification information using orthogonal code

    Science.gov (United States)

    Islam, Mohammed N.; Alam, Mohammad S.

    2006-05-01

    Optical information processing techniques have been developed for information security and fraud deterrent applications. Several encryption methods have been proposed in the literature, which includes optical double random-phase encryption, polarization encoding, encryption and verification using a multiplexed minimum average correlation energy phase-encrypted filter. All these reports employed a pseudo-random number for the code. But as such numbers are not uncorrelated, the security is not guaranteed because a wrong code may also extract some of the features of the coded information. The objective of the paper is to develop an optical security system employing orthogonal code for protection of personal identification information. As the orthogonal codes have zero or minimum cross-correlation depending on the offset between the codes, a wrong code can not decrypt any information. Here a simple encryption technique is proposed in spatial domain, where the input images are first spread in one dimension using an optical lens and then multiplied by the respective code. Finally, the individual encrypted images are superimposed on a common spatial domain. The individual images can then be decrypted by correlating the received signal with the respective address code. Computer simulation results show that any information containing binary characters can be encrypted and then decrypted successfully. The encrypted images are found to be secure, because no unwanted reproduction is possible without having the appropriate code. The technique also offers an efficient use of the storage or transmission capacity. Therefore, the proposed optical encryption technique can be applied to securing personal identification or similar information.

  15. Pragmatic circuits frequency domain

    CERN Document Server

    Eccles, William

    2006-01-01

    Pragmatic Circuits: Frequency Domain goes through the Laplace transform to get from the time domain to topics that include the s-plane, Bode diagrams, and the sinusoidal steady state. This second of three volumes ends with a-c power, which, although it is just a special case of the sinusoidal steady state, is an important topic with unique techniques and terminology. Pragmatic Circuits: Frequency Domain is focused on the frequency domain. In other words, time will no longer be the independent variable in our analysis. The two other volumes in the Pragmatic Circuits series include titles on DC

  16. Application of Fuzzy Algebra in Coding Theory

    Directory of Open Access Journals (Sweden)

    Kharatti Lal

    2016-01-01

    Full Text Available Fuzziness means different things depending upon the domain of application and the way it is measured. By means of fuzzy sets, vague notions can be described mathematically now a vigorous area of research with manifold applications. It should be mentioned that there are natural ways (not necessarily trivial to fuzzily various mathematical structures such as topological spaces, algebraic structure etc. The notion of L-fuzzy sets later more generalizations were also made using various membership sets and operations. In this section we let F denote the field of integers module 2, we define a fuzzy code as a fuzzy subset of Fn where F n = {(a1, ....an | a i  F, i = 1, ...n} and n is a fixed arbitrary positive integers we recall that Fn is a vector space over F. We give an analysis of the Hamming distance between two fuzzy code words and the error – correcting capability of a code in terms of its corresponding fuzzy codes. The results appearing in the first part of this section are from [17].

  17. Measuring Modularity in Open Source Code Bases

    Directory of Open Access Journals (Sweden)

    Roberto Milev

    2009-03-01

    Full Text Available Modularity of an open source software code base has been associated with growth of the software development community, the incentives for voluntary code contribution, and a reduction in the number of users who take code without contributing back to the community. As a theoretical construct, modularity links OSS to other domains of research, including organization theory, the economics of industry structure, and new product development. However, measuring the modularity of an OSS design has proven difficult, especially for large and complex systems. In this article, we describe some preliminary results of recent research at Carleton University that examines the evolving modularity of large-scale software systems. We describe a measurement method and a new modularity metric for comparing code bases of different size, introduce an open source toolkit that implements this method and metric, and provide an analysis of the evolution of the Apache Tomcat application server as an illustrative example of the insights gained from this approach. Although these results are preliminary, they open the door to further cross-discipline research that quantitatively links the concerns of business managers, entrepreneurs, policy-makers, and open source software developers.

  18. Fundamentals of coding and reimbursement.

    Science.gov (United States)

    Price, Paula

    2002-01-01

    After completing this introduction to radiology coding and reimbursement, readers will: Understand how health care reimbursement evolved over the past 50 years. Know the importance of documenting the patient's history. Have an overall picture of the standardized numerical coding system. Understand how accurate coding affects reimbursement. Understand coding functions as they pertain to regulatory compliance in the radiology department. Be familiar with the U.S. Justice Department's use of coding in tracking health care fraud.

  19. On Asymmetric Quantum MDS Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Ling, San

    2010-01-01

    Assuming the validity of the MDS Conjecture, the weight distribution of all MDS codes is known. Using a recently-established characterization of asymmetric quantum error-correcting codes, linear MDS codes can be used to construct asymmetric quantum MDS codes with $d_{z} \\geq d_{x}\\geq 2$ for all possible values of length $n$ for which linear MDS codes over $\\F_{q}$ are known to exist.

  20. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  1. Visualizing domain wall and reverse domain superconductivity.

    Science.gov (United States)

    Iavarone, M; Moore, S A; Fedor, J; Ciocys, S T; Karapetrov, G; Pearson, J; Novosad, V; Bader, S D

    2014-08-28

    In magnetically coupled, planar ferromagnet-superconductor (F/S) hybrid structures, magnetic domain walls can be used to spatially confine the superconductivity. In contrast to a superconductor in a uniform applied magnetic field, the nucleation of the superconducting order parameter in F/S structures is governed by the inhomogeneous magnetic field distribution. The interplay between the superconductivity localized at the domain walls and far from the walls leads to effects such as re-entrant superconductivity and reverse domain superconductivity with the critical temperature depending upon the location. Here we use scanning tunnelling spectroscopy to directly image the nucleation of superconductivity at the domain wall in F/S structures realized with Co-Pd multilayers and Pb thin films. Our results demonstrate that such F/S structures are attractive model systems that offer the possibility to control the strength and the location of the superconducting nucleus by applying an external magnetic field, potentially useful to guide vortices for computing application.

  2. Soliton coding for secured optical communication link

    CERN Document Server

    Amiri, Iraj Sadegh; Idrus, Sevia Mahdaliza

    2015-01-01

    Nonlinear behavior of light such as chaos can be observed during propagation of a laser beam inside the microring resonator (MRR) systems. This Brief highlights the design of a system of MRRs to generate a series of logic codes. An optical soliton is used to generate an entangled photon. The ultra-short soliton pulses provide the required communication signals to generate a pair of polarization entangled photons required for quantum keys. In the frequency domain, MRRs can be used to generate optical millimetre-wave solitons with a broadband frequency of 0?100 GHz. The soliton signals are multi

  3. Suppressing the Numerical Cherenkov Instability in FDTD PIC Codes

    CERN Document Server

    Godfrey, Brendan B

    2014-01-01

    A procedure for largely suppressing the numerical Cherenkov instability in finite difference time-domain (FDTD) particle-in-cell (PIC) simulations of cold, relativistic beams is derived, and residual growth rates computed and compared with WARP code simulation results. Sample laser-plasma acceleration simulation output is provided to further validate the new procedure.

  4. Fountain Codes with Multiplicatively Repeated Non-Binary LDPC Codes

    CERN Document Server

    Kasai, Kenta

    2010-01-01

    We study fountain codes transmitted over the binary-input symmetric-output channel. For channels with small capacity, receivers needs to collects many channel outputs to recover information bits. Since a collected channel output yields a check node in the decoding Tanner graph, the channel with small capacity leads to large decoding complexity. In this paper, we introduce a novel fountain coding scheme with non-binary LDPC codes. The decoding complexity of the proposed fountain code does not depend on the channel. Numerical experiments show that the proposed codes exhibit better performance than conventional fountain codes, especially for small number of information bits.

  5. Quantum codes from linear codes over finite chain rings

    Science.gov (United States)

    Liu, Xiusheng; Liu, Hualu

    2017-10-01

    In this paper, we provide two methods of constructing quantum codes from linear codes over finite chain rings. The first one is derived from the Calderbank-Shor-Steane (CSS) construction applied to self-dual codes over finite chain rings. The second construction is derived from the CSS construction applied to Gray images of the linear codes over finite chain ring {\\mathbb {F}}_{p^{2m}}+u{\\mathbb {F}}_{p^{2m}}. The good parameters of quantum codes from cyclic codes over finite chain rings are obtained.

  6. 76 FR 6727 - Proposed Amendments to the Water Quality Regulations, Water Code and Comprehensive Plan To...

    Science.gov (United States)

    2011-02-08

    ... COMMISSION 18 CFR Part 410 Proposed Amendments to the Water Quality Regulations, Water Code and Comprehensive... and locations for public hearings on proposed amendments to its Water Quality Regulations, Water Code... amendments to the Commission's Water Quality Regulations, Water Code and Comprehensive Plan relating to...

  7. 42 CFR 405.512 - Carriers' procedural terminology and coding systems.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Carriers' procedural terminology and coding systems... Determining Reasonable Charges § 405.512 Carriers' procedural terminology and coding systems. (a) General. Procedural terminology and coding systems are designed to provide physicians and third party payers with...

  8. The enterprise engineering domain

    CSIR Research Space (South Africa)

    De Vries, M

    2015-06-01

    Full Text Available representation of the EE domain within the emerging EE discipline. We used a questionnaire to gather the views of EE and enterprise architecture (EA) researchers and practitioners on the EE domain. The main contributions of this article include: (1...

  9. Domain wall filters

    CERN Document Server

    Bär, O; Neuberger, H; Witzel, O; Baer, Oliver; Narayanan, Rajamani; Neuberger, Herbert; Witzel, Oliver

    2007-01-01

    We propose using the extra dimension separating the domain walls carrying lattice quarks of opposite handedness to gradually filter out the ultraviolet fluctuations of the gauge fields that are felt by the fermionic excitations living in the bulk. This generalization of the homogeneous domain wall construction has some theoretical features that seem nontrivial.

  10. Domain Walls on Singularities

    CERN Document Server

    Halyo, Edi

    2009-01-01

    We describe domain walls that live on $A_2$ and $A_3$ singularities. The walls are BPS if the singularity is resolved and non--BPS if it is deformed and fibered. We show that these domain walls may interpolate between vacua that support monopoles and/or vortices.

  11. Domains of Learning.

    Science.gov (United States)

    Gagne, Robert M.

    In planning educational research, recognition needs to be made of five domains of learning: (1) motor skills, (2) verbal information, (3) intellectual skills, (4) cognitive strategies, and (5) attitudes. In being cognizant of these domains, the researcher is able to distinguish the parts of a content area which are subject to different…

  12. A Domain Analysis Bibliography

    Science.gov (United States)

    1990-06-01

    Bauhaus , a prototype CASE workstation for D-SAPS development. [ARAN88A] Guillermo F. Arango. Domain Engineering for Software Reuse. PhD thesis...34 VITA90B: Domain Analysis within the ISEC Rapid Center 48 CMU/SEI-90-SR-3 Appendix III Alphabetical by Organization/Project BAUHAUS * ALLE87A

  13. Reserved-Length Prefix Coding

    CERN Document Server

    Baer, Michael B

    2008-01-01

    Huffman coding finds an optimal prefix code for a given probability mass function. Consider situations in which one wishes to find an optimal code with the restriction that all codewords have lengths that lie in a user-specified set of lengths (or, equivalently, no codewords have lengths that lie in a complementary set). This paper introduces a polynomial-time dynamic programming algorithm that finds optimal codes for this reserved-length prefix coding problem. This has applications to quickly encoding and decoding lossless codes. In addition, one modification of the approach solves any quasiarithmetic prefix coding problem, while another finds optimal codes restricted to the set of codes with g codeword lengths for user-specified g (e.g., g=2).

  14. Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes

    CERN Document Server

    Senger, Christian; Bossert, Martin; Zyablov, Victor

    2008-01-01

    Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one...

  15. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  16. Epetra developers coding guidelines.

    Energy Technology Data Exchange (ETDEWEB)

    Heroux, Michael Allen; Sexton, Paul Michael

    2003-12-01

    Epetra is a package of classes for the construction and use of serial and distributed parallel linear algebra objects. It is one of the base packages in Trilinos. This document describes guidelines for Epetra coding style. The issues discussed here go beyond correct C++ syntax to address issues that make code more readable and self-consistent. The guidelines presented here are intended to aid current and future development of Epetra specifically. They reflect design decisions that were made in the early development stages of Epetra. Some of the guidelines are contrary to more commonly used conventions, but we choose to continue these practices for the purposes of self-consistency. These guidelines are intended to be complimentary to policies established in the Trilinos Developers Guide.

  17. Decoding the productivity code

    DEFF Research Database (Denmark)

    Hansen, David

    .e., to be prepared to initiate improvement. The study shows how the effectiveness of the improvement system depends on the congruent fit between the five elements as well as the bridging coherence between the improvement system and the work system. The bridging coherence depends on how improvements are activated...... approach often ends up with demanding intense employee focus to sustain improvement and engagement. Likewise, a single-minded employee development approach often ends up demanding rationalization to achieve the desired financial results. These ineffective approaches make organizations react like pendulums...... that swing between rationalization and employee development. The productivity code is the lack of alternatives to this ineffective approach. This thesis decodes the productivity code based on the results from a 3-year action research study at a medium-sized manufacturing facility. During the project period...

  18. Confocal coded aperture imaging

    Energy Technology Data Exchange (ETDEWEB)

    Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

    2001-01-01

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  19. DOE headquarters publications

    Energy Technology Data Exchange (ETDEWEB)

    None

    1978-09-01

    This bibliography provides listings of (mainly policy and programmatic) publications issued from the U.S. Department of Energy, Washington, D.C. The listings are arranged by the ''report code'' assigned to each of the major organizations at DOE Headquarters, followed by the three categories of environmental reports issued from DOE Headquarters. All of the publications listed, except for those shown as still ''in preparation,'' may be seen in the Energy Library. A title index arranged by title keywords follows the listings. Certain publications are omitted. They include such items as pamphlets, ''fact sheets,'' bulletins and weekly/monthly issuances of DOE's Energy Information Administration and Economic Regulatory Administration, and employee bulletins and newsletters. Omitted from the bibliography altogether are headquarters publications assigned other types of report codes--e.g., ''HCP'' (Headquarters Contractor Publication) and ''CONF'' (conference proceedings). (RWR)

  20. The Phantom SPH code

    Science.gov (United States)

    Price, Daniel; Wurster, James; Nixon, Chris

    2016-05-01

    I will present the capabilities of the Phantom SPH code for global simulations of dust and gas in protoplanetary discs. I will present our new algorithms for simulating both small and large grains in discs, as well as our progress towards simulating evolving grain populations and coupling with radiation. Finally, I will discuss our recent applications to HL Tau and the physics of dust gap opening.

  1. The Liege Oscillation Code

    CERN Document Server

    Scuflaire, R; Théado, S; Bourge, P -O; Miglio, A; Godart, M; Thoul, A; Noels, A

    2007-01-01

    The Liege Oscillation code can be used as a stand-alone program or as a library of subroutines that the user calls from a Fortran main program of his own to compute radial and non-radial adiabatic oscillations of stellar models. We describe the variables and the equations used by the program and the methods used to solve them. A brief account is given of the use and the output of the program.

  2. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  3. Public lighting.

    NARCIS (Netherlands)

    Schreuder, D.A.

    1986-01-01

    The function of public lighting and the relationship between public lighting and accidents are considered briefly as aspects of effective countermeasures. Research needs and recent developments in installation and operational described. Public lighting is an efficient accident countermeasure, but

  4. ARQ for Network Coding

    CERN Document Server

    Sundararajan, Jay Kumar; Médard, Muriel

    2008-01-01

    A new coding and queue management algorithm is proposed for communication networks that employ linear network coding. The algorithm has the feature that the encoding process is truly online, as opposed to a block-by-block approach. The setup assumes a packet erasure broadcast channel with stochastic arrivals and full feedback, but the proposed scheme is potentially applicable to more general lossy networks with link-by-link feedback. The algorithm guarantees that the physical queue size at the sender tracks the backlog in degrees of freedom (also called the virtual queue size). The new notion of a node "seeing" a packet is introduced. In terms of this idea, our algorithm may be viewed as a natural extension of ARQ schemes to coded networks. Our approach, known as the drop-when-seen algorithm, is compared with a baseline queuing approach called drop-when-decoded. It is shown that the expected queue size for our approach is $O(\\frac1{1-\\rho})$ as opposed to $\\Omega(\\frac1{(1-\\rho)^2})$ for the baseline approach...

  5. The Influence of Gender and Ethnicity on the Choice of Language in the Transaction Domain of Language Use: The Case of Undergraduates

    Directory of Open Access Journals (Sweden)

    Mehdi Granhemat

    2015-09-01

    Full Text Available Multilingual individuals, consciously or unconsciously, are often confronted with having to select one linguistic code over another from within their linguistic repertoires. The choice of a proper linguistic code enables effective communication and could also lead to the promotion of solidarity among interlocutors. The focus of this study was to examine the influence of gender and ethnicity on the choices of languages of Malaysian youths in the transaction domain of language use. In sociolinguistic studies, Domain as a theoretical concept can be employed to explain how language choices and some individual factors—in case of this study gender and ethnicity—related to language choices of multilinguals. Based on a random proportional stratified sampling strategy, a total of 498 undergraduate local students in a Malaysian public university were selected as respondents of the study. The male and female respondents mostly belonged to the three main ethnic groups, i.e. the Malays, Chinese, and Indians. Also some other ethnic minority groups’ members were included in the study. Data about the demographic profiles of the respondents and the choices of languages in the transaction domain of language use was collected through a self administrated questionnaire survey. SPSS software was used to run analyses such as determining the respondents’ most used languages and Chi-Square Test to find out the relationships between variables. According to the results, the linguistic situation in Malaysia is similar to a diglossic situation. Besides, the factor of ethnicity was found to be influential in the choice and use of linguistic codes among the Malaysian youths. But gender was not found to be a determinant of language choice in the transaction domain of language use. Key Words: multilinguals, transaction domain of language use, choices of languages, ethnicity, gender

  6. 45 CFR Appendix B to Part 73 - Code of Ethics for Government Service

    Science.gov (United States)

    2010-10-01

    ... private word which can be binding on public duty. VII. Engage in no business with the Government, either... 45 Public Welfare 1 2010-10-01 2010-10-01 false Code of Ethics for Government Service B Appendix B... CONDUCT Pt. 73, App. B Appendix B to Part 73—Code of Ethics for Government Service Any person in...

  7. QOI8/456: Quality Criteria for Electronic Publications in Medicine

    Science.gov (United States)

    Schulz, S; Auhuber, T; Schrader, U; Koop, A; Kreutz, R; Oppermann, R; Simm, H; Klar, R

    1999-01-01

    If compared with printed media, the prospect for the success of health-related WWW publications lies in the added value of motivation and efficacy, due to the multi-modal coding of contents, in the possibility to provide search facilities and the flexibility of interaction with the user. An important advantage over the off-line distribution of disks or CD-ROMs is the automated diffusion and update of the contents. Whereas more and more medical WWW sites are launched, their acceptance and utilisation, especially in medical education is still unsatisfactory. Obviously, one reason for this phenomenon is the lack of quality. Many authors, developers and software publishers ignore that the design of high-quality electronic publications is a cost-intensive process. As key qualifications we identify: domain competence, software engineering skills, media production proficiency, GUI design competence, and didactic qualifications. On behalf of the German Association of Medical Informatics, Biometry and Epidemiology (GMDS), the authors have co-ordinated the development of a catalogue of "Quality Criteria for Electronic Publications in Medicine". This catalogue defines as Electronic Publications in Medicine any software containing health-related generic knowledge, with WWW publications being an important group. The criteria catalogue is divided into the sections contents, technical aspects, coding of information, ergonomy, dialogue and didactics. According to these items, typical faults and deficiencies of medical electronic publications are elucidated and possible solutions are given. Our criteria are intended to support the formative evaluation during the development of electronic publications, and to provide a basis for the summative evaluation of medical WWW and offline publications. The catalogue of "Quality Criteria for Electronic Publications in Medicine" is available in German, English, Portuguese and Spanish, at: http://www.imbi.uni-freiburg.de/medinf/gmdsqc/.

  8. low bit rate video coding low bit rate video coding

    African Journals Online (AJOL)

    eobe

    ariable length bit rate (VLBR) broadly encompasses video coding which broadly encompasses ... for motion estimation and compensation to reduce the prediction sation to reduce the ... a special interest among the video coding community ...

  9. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  10. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  11. ClinicalCodes: an online clinical codes repository to improve the validity and reproducibility of research using electronic medical records.

    Directory of Open Access Journals (Sweden)

    David A Springate

    Full Text Available Lists of clinical codes are the foundation for research undertaken using electronic medical records (EMRs. If clinical code lists are not available, reviewers are unable to determine the validity of research, full study replication is impossible, researchers are unable to make effective comparisons between studies, and the construction of new code lists is subject to much duplication of effort. Despite this, the publication of clinical codes is rarely if ever a requirement for obtaining grants, validating protocols, or publishing research. In a representative sample of 450 EMR primary research articles indexed on PubMed, we found that only 19 (5.1% were accompanied by a full set of published clinical codes and 32 (8.6% stated that code lists were available on request. To help address these problems, we have built an online repository where researchers using EMRs can upload and download lists of clinical codes. The repository will enable clinical researchers to better validate EMR studies, build on previous code lists and compare disease definitions across studies. It will also assist health informaticians in replicating database studies, tracking changes in disease definitions or clinical coding practice through time and sharing clinical code information across platforms and data sources as research objects.

  12. Trademarks, consumer protection and domain names on the Internet

    Directory of Open Access Journals (Sweden)

    Hana Kelblová

    2007-01-01

    Full Text Available The article deals with current problems of the conflict of domain names on the Internet with trade marks in relation to the consumer protection. The aim of the article is to refer to ways and means of protection against of the speculative registration of a domain name. In the Czech legal order these means represent legal regulation of the unfair competition in Commercial Code, regulation of liability for damage together with the Trademarks Act.

  13. Using theory to explore facilitators and barriers to delayed prescribing in Australia: a qualitative study using the Theoretical Domains Framework and the Behaviour Change Wheel.

    Science.gov (United States)

    Sargent, Lucy; McCullough, Amanda; Del Mar, Chris; Lowe, John

    2017-02-13

    Delayed antibiotic prescribing reduces antibiotic use for acute respiratory infections in trials in general practice, but the uptake in clinical practice is low. The aim of the study was to identify facilitators and barriers to general practitioners' (GPs') use of delayed prescribing and to gain pharmacists' and the public's views about delayed prescribing in Australia. This study used the Theoretical Domains Framework and the Behaviour Change Wheel to explore facilitators and barriers to delayed prescribing in Australia. Forty-three semi-structured, face-to-face interviews with general practitioners, pharmacists and patients were conducted. Responses were coded into domains of the Theoretical Domains Framework, and specific criteria from the Behaviour Change Wheel were used to identify which domains were relevant to increasing the use of delayed prescribing by GPs. The interviews revealed nine key domains that influence GPs' use of delayed prescribing: knowledge; cognitive and interpersonal skills; memory, attention and decision-making processes; optimism; beliefs about consequences; intentions; goals; emotion; and social influences: GPs knew about delayed prescribing; however, they did not use it consistently, preferring to bring patients back for review and only using it with patients in a highly selective way. Pharmacists would support GPs and the public in delayed prescribing but would fill the prescription if people insisted. The public said they would delay taking their antibiotics if asked by their GP and given the right information on managing symptoms and when to take antibiotics. Using a theory-driven approach, we identified nine key domains that influence GPs' willingness to provide a delayed prescription to patients with an acute respiratory infection presenting to general practice. These data can be used to develop a structured intervention to change this behaviour and thus reduce antibiotic use for acute respiratory infections in general practice.

  14. Convolutional coding techniques for data protection

    Science.gov (United States)

    Massey, J. L.

    1975-01-01

    Results of research on the use of convolutional codes in data communications are presented. Convolutional coding fundamentals are discussed along with modulation and coding interaction. Concatenated coding systems and data compression with convolutional codes are described.

  15. Managed behavioral health care: an instrument to characterize critical elements of public sector programs.

    Science.gov (United States)

    Ridgely, M Susan; Giard, Julienne; Shern, David; Mulkern, Virginia; Burnam, M Audrey

    2002-08-01

    To develop an instrument to characterize public sector managed behavioral health care arrangements to capture key differences between managed and "unmanaged" care and among managed care arrangements. The instrument was developed by a multi-institutional group of collaborators with participation of an expert panel. Included are six domains predicted to have an impact on access, service utilization, costs, and quality. The domains are: characteristics of the managed care plan, enrolled population, benefit design, payment and risk arrangements, composition of provider networks, and accountability. Data are collected at three levels: managed care organization, subcontractor, and network of service providers. Data are collected through contract abstraction and key informant interviews. A multilevel coding scheme is used to organize the data into a matrix along key domains, which is then reviewed and verified by the key informants. This instrument can usefully differentiate between and among Medicaid fee-for-service programs and Medicaid managed care plans along key domains of interest. Beyond documenting basic features of the plans and providing contextual information, these data will support the refinement and testing of hypotheses about the impact of public sector managed care on access, quality, costs, and outcomes of care. If managed behavioral health care research is to advance beyond simple case study comparisons, a well-conceptualized set of instruments is necessary.

  16. Code Flows : Visualizing Structural Evolution of Source Code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual met

  17. Code flows : Visualizing structural evolution of source code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual met

  18. MEMOPS: data modelling and automatic code generation.

    Science.gov (United States)

    Fogh, Rasmus H; Boucher, Wayne; Ionides, John M C; Vranken, Wim F; Stevens, Tim J; Laue, Ernest D

    2010-03-25

    In recent years the amount of biological data has exploded to the point where much useful information can only be extracted by complex computational analyses. Such analyses are greatly facilitated by metadata standards, both in terms of the ability to compare data originating from different sources, and in terms of exchanging data in standard forms, e.g. when running processes on a distributed computing infrastructure. However, standards thrive on stability whereas science tends to constantly move, with new methods being developed and old ones modified. Therefore maintaining both metadata standards, and all the code that is required to make them useful, is a non-trivial problem. Memops is a framework that uses an abstract definition of the metadata (described in UML) to generate internal data structures and subroutine libraries for data access (application programming interfaces--APIs--currently in Python, C and Java) and data storage (in XML files or databases). For the individual project these libraries obviate the need for writing code for input parsing, validity checking or output. Memops also ensures that the code is always internally consistent, massively reducing the need for code reorganisation. Across a scientific domain a Memops-supported data model makes it easier to support complex standards that can capture all the data produced in a scientific area, share them among all programs in a complex software pipeline, and carry them forward to deposition in an archive. The principles behind the Memops generation code will be presented, along with example applications in Nuclear Magnetic Resonance (NMR) spectroscopy and structural biology.

  19. The Popeye domain-containing gene family.

    Science.gov (United States)

    Brand, Thomas

    2005-01-01

    The Popeye domain-containing gene family has been isolated on the basis of a subtractive screen aiming at the identification of novel genes with a heart-restricted gene expression pattern. The gene family codes for membrane proteins containing three transmembrane domains. The carboxy-terminal part of the protein is localized to the cytoplasm and contains a protein domain with high sequence conservation named the Popeye domain. This domain is involved in protein homo dimerization. The gene family is expressed in heart and skeletal muscle cells as well as smooth muscle cells. In addition, Popdc genes are expressed in other cell types such as neuronal cells in restricted areas of the brain, spinal cord, and dorsal root ganglia, and in various epithelial cells. Recently, it has been proposed that Popdc proteins may function as a novel family of adhesion proteins. That the expression pattern has been conserved during evolution and is very similar in all vertebrate classes and also in basal chordates suggests that Popdc proteins play an important role in cardiac and skeletal muscle.

  20. Efficient Signal-Time Coding Design and its Application in Wireless Gaussian Relay Networks

    CERN Document Server

    Fan, Pingyi; Letaief, Khaled Ben

    2009-01-01

    Signal-time coding, which combines the traditional encoding/modulation mode in the signal domain with signal pulse phase modulation in the time domain, was proposed to improve the information flow rate in relay networks. In this paper, we mainly focus on the efficient signal-time coding design. We first derive an explicit iterative algorithm to estimate the maximum number of available codes given the code length of signal-time coding, and then present an iterative construction method of codebooks. It is shown that compared with conventional computer search, the proposed iterative construction method can reduce the complexity greatly. Numerical results will also indicate that the new constructed codebook is optimal in terms of coding rate. To minimize the buffer size needed to store the codebook while keeping a relatively high efficiency, we shall propose a combinatorial construction method. We will then consider applications in wireless Gaussian relay networks. It will be shown that in the three node network ...