WorldWideScience

Sample records for q codes

  1. New multilevel codes over GF(q)

    Science.gov (United States)

    Wu, Jiantian; Costello, Daniel J., Jr.

    1992-01-01

    Set partitioning to multi-dimensional signal spaces over GF(q), particularly GF sup q-1(q) and GF sup q (q), and show how to construct both multi-level block codes and multi-level trellis codes over GF(q). Two classes of multi-level (n, k, d) block codes over GF(q) with block length n, number of information symbols k, and minimum distance d sub min greater than or = d, are presented. These two classes of codes use Reed-Solomon codes as component codes. They can be easily decoded as block length q-1 Reed-Solomon codes or block length q or q + 1 extended Reed-Solomon codes using multi-stage decoding. Many of these codes have larger distances than comparable q-ary block codes, as component codes. Low rate q-ary convolutional codes, work error correcting convolutional codes, and binary-to-q-ary convolutional codes can also be used to construct multi-level trellis codes over GF(q) or binary-to-q-ary trellis codes, some of which have better performance than the above block codes. All of the new codes have simple decoding algorithms based on hard decision multi-stage decoding.

  2. Skew cyclic codes over F_q+uF_q+vF_q+uvF_q

    Directory of Open Access Journals (Sweden)

    Ting Yao

    2015-09-01

    Full Text Available In this paper, we study skew cyclic codes over the ring $R=F_q+uF_q+vF_q+uvF_q$, where $u^{2}=u,v^{2}=v,uv=vu$, $q=p^{m}$ and $p$ is an odd prime. We investigate the structural properties of skew cyclic codes over $R$ through a decomposition theorem. Furthermore, we give a formula for the number of skew cyclic codes of length $n$ over $R.$

  3. New multi-level codes over GF(q)

    Science.gov (United States)

    Wu, Jiantian; Costello, Daniel J., Jr.

    1990-01-01

    Set partitioning to multi-dimensional signal spaces over GF(q), particularly GF sup q-1(q) and GF sup q (q), and show how to construct both multi-level block codes and multi-level trellis codes over GF(q). Two classes of multi-level (n, k, d) block codes over GF(q) with block length n, number of information symbols k, and minimum distance d sub min greater than or = d, are presented. These two classes of codes use Reed-Solomon codes as component codes. They can be easily decoded as block length q-1 Reed-Solomon codes or block length q or q + 1 extended Reed-Solomon codes using multi-stage decoding. Many of these codes have larger distances than comparable q-ary block codes, as component codes. Low rate q-ary convolutional codes, work error correcting convolutional codes, and binary-to-q-ary convolutional codes can also be used to construct multi-level trellis codes over GF(q) or binary-to-q-ary trellis codes, some of which have better performance than the above block codes. All of the new codes have simple decoding algorithms based on hard decision multi-stage decoding.

  4. QAM modulations with q-ary turbo codes

    Institute of Scientific and Technical Information of China (English)

    张豫伟; 王新梅

    1997-01-01

    A new concept of q-ary (q = 2’) turbo codes and the corresponding decoding aglorithm are presented. With QAM modulations, the proposed algorithm avoids the information loss caused by a pragmatic approach usually used for a binary code to split the channel measurement information into coding bits. So better performance is achieved. Because of the parallel operation property, the decoding can be speeded up by the proposed algorithm. In addition, a method to reduce the average number of iterations is also considered.

  5. New q-ary quantum MDS codes with distances bigger than q/2

    Science.gov (United States)

    He, Xianmang; Xu, Liqing; Chen, Hao

    2016-07-01

    The construction of quantum MDS codes has been studied by many authors. We refer to the table in page 1482 of (IEEE Trans Inf Theory 61(3):1474-1484, 2015) for known constructions. However, there have been constructed only a few q-ary quantum MDS [[n,n-2d+2,d

  6. On linear $q$-ary completely regular codes with $\\rho=2$ and dual antipodal

    CERN Document Server

    Borges, Joaquim; Zinoviev, Victor

    2010-01-01

    We characterize all linear $q$-ary completely regular codes with covering radius $\\rho=2$ when the dual codes are antipodal. These completely regular codes are extensions of linear completely regular codes with covering radius 1, which are all classified. For $\\rho=2$, we give a list of all such codes known to us. This also gives the characterization of two weight linear antipodal codes.

  7. Minimal Binary Abelian Codes of length $p^m q^n$

    CERN Document Server

    Chalom, Gladys; Guerreiro, Marinês; Milies, César Polcino

    2012-01-01

    We consider binary abelian codes of length $p^m q^n$, where $p$ and $q$ are prime rational integers under some restrictive hypotheses. In this case, we determine the idempotents generating minimal codes and either the respective weights or bounds of these weights. We give examples showing that these bounds are attained in some cases.

  8. Q&A From ASCO's Coding and Reimbursement Hotline

    OpenAIRE

    2005-01-01

    This column provides oncology practitioners and their staff with important information about reimbursement, coding, coverage, and regulatory policies. Questions for future issues should be sent to or by calling the coding and reimbursement hotline at 703-299-1050.

  9. Generalized hypercube graph $\\Q_n(S$, graph products and self-orthogonal codes

    Directory of Open Access Journals (Sweden)

    Pani Seneviratne

    2016-01-01

    Full Text Available A generalized hypercube graph $\\Q_n(S$ has $\\F_{2}^{n}=\\{0,1\\}^n$ as the vertex set and two vertices being adjacent whenever their mutual Hamming distance belongs to $S$, where $n \\ge 1$ and $S\\subseteq \\{1,2,\\ldots, n\\}$. The graph $\\Q_n(\\{1\\}$ is the $n$-cube, usually denoted by $\\Q_n$.We study graph boolean products $G_1 = \\Q_n(S\\times \\Q_1, G_2 = \\Q_{n}(S\\wedge \\Q_1$, $G_3 = \\Q_{n}(S[\\Q_1]$ and show that binary codes from neighborhood designs of $G_1, G_2$ and $G_3$ are self-orthogonal for all choices of $n$ and $S$. More over, we show that the class of codes $C_1$ are self-dual. Further we find subgroups of the automorphism group of these graphs and use these subgroups to obtain PD-sets for permutation decoding. As an example we find a full error-correcting PD set for the binary $[32, 16, 8]$ extremal self-dual code.

  10. "ON ALGEBRAIC DECODING OF Q-ARY REED-MULLER AND PRODUCT REED-SOLOMON CODES"

    Energy Technology Data Exchange (ETDEWEB)

    SANTHI, NANDAKISHORE [Los Alamos National Laboratory

    2007-01-22

    We consider a list decoding algorithm recently proposed by Pellikaan-Wu for q-ary Reed-Muller codes RM{sub q}({ell}, m, n) of length n {le} q{sup m} when {ell} {le} q. A simple and easily accessible correctness proof is given which shows that this algorithm achieves a relative error-correction radius of {tau} {le} (1-{radical}{ell}q{sup m-1}/n). This is an improvement over the proof using one-point Algebraic-Geometric decoding method given in. The described algorithm can be adapted to decode product Reed-Solomon codes. We then propose a new low complexity recursive aJgebraic decoding algorithm for product Reed-Solomon codes and Reed-Muller codes. This algorithm achieves a relative error correction radius of {tau} {le} {Pi}{sub i=1}{sup m} (1 - {radical}k{sub i}/q). This algorithm is then proved to outperform the Pellikaan-Wu algorithm in both complexity and error correction radius over a wide range of code rates.

  11. Structure of a Code Related to $Sp(4,q),q$ even

    Indian Academy of Sciences (India)

    N S Narasimha Sastry; R P Shukla

    2007-11-01

    We determine the socle and the radical series of the binary code associated with a finite regular generalized quadrangle of even order, considered as a module for the commutator of each of the orthogonal subgroups in the corresponding symplectic group.

  12. THE Q-MATRIX LOW-DENSITY PARITY-CHECK CODES

    Institute of Scientific and Technical Information of China (English)

    Peng Li; Zhu Guangxi

    2006-01-01

    This paper presents a matrix permuting approach to the construction of Low-Density Parity-Check (LDPC) code. It investigates the structure of the sparse parity-check matrix defined by Gallager. It is discovered that the problem of constructing the sparse parity-check matrix requires an algorithm that is efficient in search environments and also is able to work with constraint satisfaction problem. The definition of Q-matrix is given, and it is found that the queen algorithm enables to search the Q-matrix. With properly permuting Q-matrix as sub-matrix, the sparse parity-check matrix which satisfied constraint condition is created, and the good regular-LDPC code that is called the Q-matrix LDPC code is generated. The result of this paper is significant not only for designing low complexity encoder, improving performance and reducing complexity of iterative decoding arithmetic, but also for building practical system of encodable and decodable LDPC code.

  13. Variation in conserved non-coding sequences on chromosome 5q andsusceptibility to asthma and atopy

    Energy Technology Data Exchange (ETDEWEB)

    Donfack, Joseph; Schneider, Daniel H.; Tan, Zheng; Kurz,Thorsten; Dubchak, Inna; Frazer, Kelly A.; Ober, Carole

    2005-09-10

    Background: Evolutionarily conserved sequences likely havebiological function. Methods: To determine whether variation in conservedsequences in non-coding DNA contributes to risk for human disease, westudied six conserved non-coding elements in the Th2 cytokine cluster onhuman chromosome 5q31 in a large Hutterite pedigree and in samples ofoutbred European American and African American asthma cases and controls.Results: Among six conserved non-coding elements (>100 bp,>70percent identity; human-mouse comparison), we identified one singlenucleotide polymorphism (SNP) in each of two conserved elements and sixSNPs in the flanking regions of three conserved elements. We genotypedour samples for four of these SNPs and an additional three SNPs each inthe IL13 and IL4 genes. While there was only modest evidence forassociation with single SNPs in the Hutterite and European Americansamples (P<0.05), there were highly significant associations inEuropean Americans between asthma and haplotypes comprised of SNPs in theIL4 gene (P<0.001), including a SNP in a conserved non-codingelement. Furthermore, variation in the IL13 gene was strongly associatedwith total IgE (P = 0.00022) and allergic sensitization to mold allergens(P = 0.00076) in the Hutterites, and more modestly associated withsensitization to molds in the European Americans and African Americans (P<0.01). Conclusion: These results indicate that there is overalllittle variation in the conserved non-coding elements on 5q31, butvariation in IL4 and IL13, including possibly one SNP in a conservedelement, influence asthma and atopic phenotypes in diversepopulations.

  14. A quasi-3D viscous-inviscid interaction code: Q3UIC

    DEFF Research Database (Denmark)

    Ramos García, Néstor; Sørensen, Jens Nørkær; Shen, Wen Zhong

    2014-01-01

    and inviscid parts. The rotational effects generated by centrifugal and Coriolis forces are introduced in Q3UIC via the streamwise and spanwise integral boundary layer momentum equations. A special inviscid version of the code has been developed to cope with massive separation. To check the ability of the code...

  15. On the dual code of points and generators on the Hermitian variety $\\mathcal{H}(2n+1,q^2)$

    OpenAIRE

    De Boeck, Maarten; Vandendriessche, Peter

    2016-01-01

    We study the dual linear code of points and generators on a non-singular Hermitian variety $\\mathcal{H}(2n+1,q^2)$. We improve the earlier results for $n=2$, we solve the minimum distance problem for general $n$, we classify the $n$ smallest types of code words and we characterize the small weight code words as being a linear combination of these $n$ types.

  16. Analysis and Compensation of Transmitter and Receiver I/Q Imbalances in Space-Time Coded Multiantenna OFDM Systems

    Directory of Open Access Journals (Sweden)

    Zou Yaning

    2008-01-01

    Full Text Available Abstract The combination of orthogonal frequency division multiplexing (OFDM and multiple-input multiple-output (MIMO techniques has been widely considered as the most promising approach for building future wireless transmission systems. The use of multiple antennas poses then big restrictions on the size and cost of individual radio transmitters and receivers, to keep the overall transceiver implementation feasible. This results in various imperfections in the analog radio front ends. One good example is the so-called I/Q imbalance problem related to the amplitude and phase matching of the transceiver I and Q chains. This paper studies the performance of space-time coded (STC multiantenna OFDM systems under I/Q imbalance, covering both the transmitter and the receiver sides of the link. The challenging case of frequency-selective I/Q imbalances is assumed, being an essential ingredient in future wideband wireless systems. As a practical example, the Alamouti space-time coded OFDM system with two transmit and M receive antennas is examined in detail and a closed-form solution for the resulting signal-to-interference ratio (SIR at the detector input due to I/Q imbalance is derived. This offers a valuable analytical tool for assessing the I/Q imbalance effects in any STC-OFDM system, without lengthy data or system simulations. In addition, the impact of I/Q imbalances on the channel estimation in the STC-OFDM context is also analyzed analytically. Furthermore, based on the derived signal models, a practical pilot-based I/Q imbalance compensation scheme is also proposed, being able to jointly mitigate the effects of frequency-selective I/Q imbalances as well as channel estimation errors. The performance of the compensator is analyzed using extensive computer simulations, and it is shown to virtually reach the perfectly matched reference system performance with low pilot overhead.

  17. Analysis and Compensation of Transmitter and Receiver I/Q Imbalances in Space-Time Coded Multiantenna OFDM Systems

    Directory of Open Access Journals (Sweden)

    Yaning Zou

    2007-12-01

    Full Text Available The combination of orthogonal frequency division multiplexing (OFDM and multiple-input multiple-output (MIMO techniques has been widely considered as the most promising approach for building future wireless transmission systems. The use of multiple antennas poses then big restrictions on the size and cost of individual radio transmitters and receivers, to keep the overall transceiver implementation feasible. This results in various imperfections in the analog radio front ends. One good example is the so-called I/Q imbalance problem related to the amplitude and phase matching of the transceiver I and Q chains. This paper studies the performance of space-time coded (STC multiantenna OFDM systems under I/Q imbalance, covering both the transmitter and the receiver sides of the link. The challenging case of frequency-selective I/Q imbalances is assumed, being an essential ingredient in future wideband wireless systems. As a practical example, the Alamouti space-time coded OFDM system with two transmit and M receive antennas is examined in detail and a closed-form solution for the resulting signal-to-interference ratio (SIR at the detector input due to I/Q imbalance is derived. This offers a valuable analytical tool for assessing the I/Q imbalance effects in any STC-OFDM system, without lengthy data or system simulations. In addition, the impact of I/Q imbalances on the channel estimation in the STC-OFDM context is also analyzed analytically. Furthermore, based on the derived signal models, a practical pilot-based I/Q imbalance compensation scheme is also proposed, being able to jointly mitigate the effects of frequency-selective I/Q imbalances as well as channel estimation errors. The performance of the compensator is analyzed using extensive computer simulations, and it is shown to virtually reach the perfectly matched reference system performance with low pilot overhead.

  18. Code interoperability and standard data formats in quantum chemistry and quantum dynamics: The Q5/D5Cost data model.

    Science.gov (United States)

    Rossi, Elda; Evangelisti, Stefano; Laganà, Antonio; Monari, Antonio; Rampino, Sergio; Verdicchio, Marco; Baldridge, Kim K; Bendazzoli, Gian Luigi; Borini, Stefano; Cimiraglia, Renzo; Angeli, Celestino; Kallay, Peter; Lüthi, Hans P; Ruud, Kenneth; Sanchez-Marin, José; Scemama, Anthony; Szalay, Peter G; Tajti, Attila

    2014-03-30

    Code interoperability and the search for domain-specific standard data formats represent critical issues in many areas of computational science. The advent of novel computing infrastructures such as computational grids and clouds make these issues even more urgent. The design and implementation of a common data format for quantum chemistry (QC) and quantum dynamics (QD) computer programs is discussed with reference to the research performed in the course of two Collaboration in Science and Technology Actions. The specific data models adopted, Q5Cost and D5Cost, are shown to work for a number of interoperating codes, regardless of the type and amount of information (small or large datasets) to be exchanged. The codes are either interfaced directly, or transfer data by means of wrappers; both types of data exchange are supported by the Q5/D5Cost library. Further, the exchange of data between QC and QD codes is addressed. As a proof of concept, the H + H2 reaction is discussed. The proposed scheme is shown to provide an excellent basis for cooperative code development, even across domain boundaries. Moreover, the scheme presented is found to be useful also as a production tool in the grid distributed computing environment.

  19. Variation in conserved non-coding sequences on chromosome 5q and susceptibility to asthma and atopy

    Directory of Open Access Journals (Sweden)

    Dubchak Inna

    2005-12-01

    Full Text Available Abstract Background Evolutionarily conserved sequences likely have biological function. Methods To determine whether variation in conserved sequences in non-coding DNA contributes to risk for human disease, we studied six conserved non-coding elements in the Th2 cytokine cluster on human chromosome 5q31 in a large Hutterite pedigree and in samples of outbred European American and African American asthma cases and controls. Results Among six conserved non-coding elements (>100 bp, >70% identity; human-mouse comparison, we identified one single nucleotide polymorphism (SNP in each of two conserved elements and six SNPs in the flanking regions of three conserved elements. We genotyped our samples for four of these SNPs and an additional three SNPs each in the IL13 and IL4 genes. While there was only modest evidence for association with single SNPs in the Hutterite and European American samples (P IL4 gene (P IL13 gene was strongly associated with total IgE (P = 0.00022 and allergic sensitization to mold allergens (P = 0.00076 in the Hutterites, and more modestly associated with sensitization to molds in the European Americans and African Americans (P Conclusion These results indicate that there is overall little variation in the conserved non-coding elements on 5q31, but variation in IL4 and IL13, including possibly one SNP in a conserved element, influence asthma and atopic phenotypes in diverse populations.

  20. Decoding and optimized implementation of SECDED codes over GF(q)

    Energy Technology Data Exchange (ETDEWEB)

    Ward, H Lee; Ganti, Anand; Resnick, David R

    2014-11-18

    A plurality of columns for a check matrix that implements a distance d linear error correcting code are populated by providing a set of vectors from which to populate the columns, and applying to the set of vectors a filter operation that reduces the set by eliminating therefrom all vectors that would, if used to populate the columns, prevent the check matrix from satisfying a column-wise linear independence requirement associated with check matrices of distance d linear codes. One of the vectors from the reduced set may then be selected to populate one of the columns. The filtering and selecting repeats iteratively until either all of the columns are populated or the number of currently unpopulated columns exceeds the number of vectors in the reduced set. Columns for the check matrix may be processed to reduce the amount of logic needed to implement the check matrix in circuit logic.

  1. Design, decoding and optimized implementation of SECDED codes over GF(q)

    Energy Technology Data Exchange (ETDEWEB)

    Ward, H Lee; Ganti, Anand; Resnick, David R

    2014-06-17

    A plurality of columns for a check matrix that implements a distance d linear error correcting code are populated by providing a set of vectors from which to populate the columns, and applying to the set of vectors a filter operation that reduces the set by eliminating therefrom all vectors that would, if used to populate the columns, prevent the check matrix from satisfying a column-wise linear independence requirement associated with check matrices of distance d linear codes. One of the vectors from the reduced set may then be selected to populate one of the columns. The filtering and selecting repeats iteratively until either all of the columns are populated or the number of currently unpopulated columns exceeds the number of vectors in the reduced set. Columns for the check matrix may be processed to reduce the amount of logic needed to implement the check matrix in circuit logic.

  2. Decoding and optimized implementation of SECDED codes over GF(q)

    Energy Technology Data Exchange (ETDEWEB)

    Ward, H. Lee; Ganti, Anand; Resnick, David R

    2013-10-22

    A plurality of columns for a check matrix that implements a distance d linear error correcting code are populated by providing a set of vectors from which to populate the columns, and applying to the set of vectors a filter operation that reduces the set by eliminating therefrom all vectors that would, if used to populate the columns, prevent the check matrix from satisfying a column-wise linear independence requirement associated with check matrices of distance d linear codes. One of the vectors from the reduced set may then be selected to populate one of the columns. The filtering and selecting repeats iteratively until either all of the columns are populated or the number of currently unpopulated columns exceeds the number of vectors in the reduced set. Columns for the check matrix may be processed to reduce the amount of logic needed to implement the check matrix in circuit logic.

  3. Decoding and optimized implementation of SECDED codes over GF(q)

    Science.gov (United States)

    Ward, H. Lee; Ganti, Anand; Resnick, David R

    2013-10-22

    A plurality of columns for a check matrix that implements a distance d linear error correcting code are populated by providing a set of vectors from which to populate the columns, and applying to the set of vectors a filter operation that reduces the set by eliminating therefrom all vectors that would, if used to populate the columns, prevent the check matrix from satisfying a column-wise linear independence requirement associated with check matrices of distance d linear codes. One of the vectors from the reduced set may then be selected to populate one of the columns. The filtering and selecting repeats iteratively until either all of the columns are populated or the number of currently unpopulated columns exceeds the number of vectors in the reduced set. Columns for the check matrix may be processed to reduce the amount of logic needed to implement the check matrix in circuit logic.

  4. Simulations of the C-2/C-2U Field Reversed Configurations with the Q2D code

    Science.gov (United States)

    Onofri, Marco; Dettrick, Sean; Barnes, Daniel; Tajima, Toshiki; TAE Team

    2015-11-01

    C-2U was built to sustain advanced beam-driven FRCs for 5 + ms. The Q2D transport code is used to simulate the evolution of C-2U discharges and to study sustainment via fast ion current and pressure, with the latter comparable to the thermal plasma pressure. The code solves the MHD equations together with source terms due to neutral beams, which are calculated by a Monte Carlo method. We compare simulations with experimental results obtained in the HPF14 regime of C-2 (6 neutral beams with energy of 20 keV and total power of 4.2 MW). All simulations start from an initial equilibrium and transport coefficients are chosen to match experimental data. The best agreement is obtained when utilizing an enhanced energy transfer between fast ions and the plasma, which may be an indication of anomalous heating due to beneficial beam-plasma instabilities. Similar simulations of C-2U (neutral beam power increased to 10 + MW and angled beam injection) are compared with experimental results, where a steady state has been obtained for 5 + ms, correlated with the neutral beam pulse and limited by engineering constraints.

  5. An imprinted non-coding genomic cluster at 14q32 defines clinically relevant molecular subtypes in osteosarcoma across multiple independent datasets.

    Science.gov (United States)

    Hill, Katherine E; Kelly, Andrew D; Kuijjer, Marieke L; Barry, William; Rattani, Ahmed; Garbutt, Cassandra C; Kissick, Haydn; Janeway, Katherine; Perez-Atayde, Antonio; Goldsmith, Jeffrey; Gebhardt, Mark C; Arredouani, Mohamed S; Cote, Greg; Hornicek, Francis; Choy, Edwin; Duan, Zhenfeng; Quackenbush, John; Haibe-Kains, Benjamin; Spentzos, Dimitrios

    2017-05-15

    A microRNA (miRNA) collection on the imprinted 14q32 MEG3 region has been associated with outcome in osteosarcoma. We assessed the clinical utility of this miRNA set and their association with methylation status. We integrated coding and non-coding RNA data from three independent annotated clinical osteosarcoma cohorts (n = 65, n = 27, and n = 25) and miRNA and methylation data from one in vitro (19 cell lines) and one clinical (NCI Therapeutically Applicable Research to Generate Effective Treatments (TARGET) osteosarcoma dataset, n = 80) dataset. We used time-dependent receiver operating characteristic (tdROC) analysis to evaluate the clinical value of candidate miRNA profiles and machine learning approaches to compare the coding and non-coding transcriptional programs of high- and low-risk osteosarcoma tumors and high- versus low-aggressiveness cell lines. In the cell line and TARGET datasets, we also studied the methylation patterns of the MEG3 imprinting control region on 14q32 and their association with miRNA expression and tumor aggressiveness. In the tdROC analysis, miRNA sets on 14q32 showed strong discriminatory power for recurrence and survival in the three clinical datasets. High- or low-risk tumor classification was robust to using different microRNA sets or classification methods. Machine learning approaches showed that genome-wide miRNA profiles and miRNA regulatory networks were quite different between the two outcome groups and mRNA profiles categorized the samples in a manner concordant with the miRNAs, suggesting potential molecular subtypes. Further, miRNA expression patterns were reproducible in comparing high-aggressiveness versus low-aggressiveness cell lines. Methylation patterns in the MEG3 differentially methylated region (DMR) also distinguished high-aggressiveness from low-aggressiveness cell lines and were associated with expression of several 14q32 miRNAs in both the cell lines and the large TARGET clinical dataset

  6. A Class of New q-ary Quantum MDS Codes%一类新的q元量子MDS码

    Institute of Scientific and Technical Information of China (English)

    牛刚; 亓延峰

    2016-01-01

    量子纠错码在量子信息处理和量子计算中有着重要的应用.q元量子MDS码是一类重要的最优量子纠错码,此类量子码的参数满足相应的量子Singleton界.构造q元量子MDS码具有重要的理论和应用意义.但构造码长q+1的q元量子MDS码是比较困难的,许多码长(q+1)(q-1)/m的q元量子MDS码,其中m整除q+1或q-1,已经被构造出来.在HE Xiangming等构造出的q元量子MDS码的基础上,给出了几类q元量子MDS码的具体实例,这些量子MDS码具有码长(q+1)(q-1)/m,其中m整除(q+1)(q-1),但m不整除q-1,也不整除q+1.

  7. In vivo exploration of the functional activity of the non-coding 8q24 prostate cancer risk locus

    Institute of Scientific and Technical Information of China (English)

    Dolores J. Lamb; Mounia Tannour-Louet

    2010-01-01

    @@ Genome-wide association studies (GWAS) have successfully identified a substantial number of risk variants for prostate cancer [1-10]. In total, more than 20 single nucleotide polymorphisms (SNPs) that predispose to prostate malignancy have been found scat-tered throughout the genome in coding and non-coding regions.

  8. Paraoxonase activity against nerve gases measured by capillary electrophoresis and characterization of human serum paraoxonase (PON1) polymorphism in the coding region (Q192R).

    Science.gov (United States)

    Kanamori-Kataoka, Mieko; Seto, Yasuo

    2009-02-01

    An analytical method for determining paraoxonase activity against sarin, soman and VX was established. We used capillary electrophoresis to measure directly the hydrolysis products: alkyl methylphosphonates. After enzymatic reaction of human serum paraoxonase (PON1) with nerve gas, substrate was removed with dichloromethane, and alkyl methylphoshphonates were quantified by capillary electrophoresis of reversed osmotic flow using cationic detergent and sorbic acid. This method was applied to the characterization of human serum PON1 polymorphism for nerve gas hydrolytic activity in the coding region (Q192R). PON1-192 and PON1-55 genotypes were determined by their gel electrophoretic fragmentation pattern with restriction enzymes after polymerase chain reaction (PCR) of blood leukocyte genomic DNA. Frequencies of genotypes among 63 members of our institutes with PON1-192 and PON1-55 were 9.5% ((192)QQ), 30.1% ((192)QR) and 44.4% ((192)RR), and 82.5% ((55)LL), 17.5% ((55)LM) and 0% ((55)MM), respectively. (192)Q and (192)R enzymes were purified from the respective genotype human plasma, using blue agarose affinity chromatography and diethyl amino ethane (DEAE) anion exchange chromatography. V(max) and K(m) were measured using Lineweaver-Burk plots for hydrolytic activities against sarin, soman and VX at pH 7.4 and 25 degrees C. For sarin and soman, the V(max) for (192)Q PON1 were 3.5- and 1.5-fold higher than those for (192)R PON1; and k(cat)/K(m) for (192)Q PON1 were 1.3- and 2.8-fold higher than those for (192)R PON1. For VX, there was little difference in V(max) and k(cat)/K(m) between (192)Q and (192)R PON1, and VX hydrolyzing activity was significantly lower than those for sarin and soman. PON1 hydrolyzed sarin and soman more effectively than paraoxon.

  9. 利用域间映射的多元QC-LDPC码构造%Construction of Q-ary QC-LDPC Codes with Galois Filed Mapping

    Institute of Scientific and Technical Information of China (English)

    洪冰清; 刘聪聪; 陈海强; 覃新贤

    2016-01-01

    An approach to construct Q-ary quasi-cyclic( QC) low density parity check( LDPC) codes with low decoding complexity is presented by defining a mapping relationship over Galois field. With this meth-od,the parity check matrix over a higher order Galois field can be mapped to a designated Galois field, which can keep its structural property and density degree. Codes constructed by this method have low deco-ding complexity and quasi-cyclic characteristic,which can be easily implemented by shift registers. Simula-tion results show that the constructed codes have good performance over additive white Gaussian noise ( AWGN) channel. Compared with the original codes,QC-LDPC codes with rate 0. 765 at targeted field GF (8) can achieve a performance gain about 0. 2 dB around 10-6 bit error rate(BER).%通过定义有限域间的映射关系,提出了一种低复杂度的多元准循环奇偶校验码( QC-LDPC )的构造方法。利用这种方法可将较高阶数有限域的校验矩阵映射到指定的较低有限域上,且能保持原矩阵的结构性与稀疏特性。所构造的多元LDPC码不仅具有较低的译码复杂度且具有准循环特性,在硬件上也易于用移位寄存器实现。在高斯白噪声( AWGN)信道下的仿真结果表明,所构造的多元QC-LDPC码具有良好的编译码性能。当误码率为10-6时,码率为0.765的QC-LDPC码在目标域GF(8)上能获得0.2 dB的性能增益。

  10. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe...... the codes succinctly using Gröbner bases....

  11. Q-LDPC Code for UAV TT & C Transmission System%应用于无人机测控传输系统的多元LDPC码

    Institute of Scientific and Technical Information of China (English)

    朱铁林; 秦凡; 李凤翔; 温金苗

    2014-01-01

    针对无人机巡查区域地理环境复杂、信道特性多变、突发衰减严重的问题,设计了一种基于多元低密度奇偶校验( Q-LDPC)码的无人机测控传输系统。为减小置信传播( BP)类译码算法中振荡变量节点引入的错误传播,采用加权因子校正迭代前后的变量信息,从而减小短环对遥测、遥控等中短码字译码性能的影响,提高无人机测控传输系统可靠性。基于突发衰减信道建立系统仿真模型,仿真结果表明,所提方案通过将连续的突发比特错误转换为数量较小的符号错误,能够有效抵御快速衰落,降低误码率,为无人机对地观测提供安全保障。%In unmanned aerial vehicle( UAV) inspection,wireless communication is one of most challenging tasks because the channels are often subject to geographical environment complexity,channel characteristic varying and severe burst fading. Here in this paper a UAV TT&C transmission system is specifically de-signed based on Q-LDPC code. In order to decrease error propagation brought by oscillating variable nodes in Log-FFT-BP decoding algorithm,weight factor is introduced to check previous priori probabilities and current posteriori probabilities after iteration. And consequently it reduces effects of small girth on decoding performance of short and middle length codes( telemetry and remote control data,etc. ) ,as well as improves the reliability of UAV TT&C system. A system simulation model driven by burst fading channel is estab-lished. Simulation results show that the proposed scheme can not only efficiently withstand burst error,but also reduce bit error rate( BER) through converting continuous bit error to less symbol error. Accordingly, the proposed scheme can supply better guarantee for UAV earth observation.

  12. qRT-PCR检测结核分枝杆菌蛋白抗原编码基因表达水平%The coding gene's expression level of proteantigen in Mycobacterium tuberculosis by qRT-PCR

    Institute of Scientific and Technical Information of China (English)

    陈伟; 王远志; 李永祥; 米利古; 张辉; 张娟; 魏克娜; 袁俐

    2011-01-01

    Objective Use quantitative realiin e polym erase chain reaction m eihod for detecting the coding gene' s expression ]evel of A g85B ,38kD a and M PT64 in M ycobacterium tuberculosis and expbre variability of their proteantigen in transcriptional level bete een the drug-resistant and the sensitive ,bete een the Beijng genotype and non-Beijng genotype and the value of use quantitative reartin e polym erase chain reaction diagnosing live M ycobacteiim tubercubsis .M ethods The specific prin ers of fbpB ,pstsl ,m pt64 and Siga were designed accoirding to GenBank database .The gene fragments were cbned to pMD18-T sin p]e vector respectively, and ream binant plaan idsweie purified and quantified spectophotm eteicalry .W e established theme1hod of detecting the expressbn of fbpB,pstsl,mpt64 by using SYBR Green I,and then selected 46 M ycobacterim tubercubsis strains and theN ontubercubsis m ycobacterk(2 ) to do study .qRT-PCR m eihod was used to detecthg 1he gene' s expressbn of fbpB ,ps1sl ,m pi64 in 46 M ycobacteriim tuber-cubsis,international standard strain H37Rv and 2 Nontubereubsismycobacterk. Results The amplification result h live M ycobacterim tibereubsis is S curve ,The deaih and Nontubereubsis m ycobacterk can' t detecting fluorescencal signal and the curve is linear.The gene's expressbn of m pt64 in diug-rssistant strains is downreguhted compare to sensitive strahs and H 37Rv,The result have statistical significance (t= 3 .093 (P<0 .01) ; t=2 .545 ( P<0 .05)) .The gene's expressbn of psisl in Beijing genoiype is downregulated compare to nornB eijng genoiype and H 37Rv,The result have statistical significance (t= 3 .093 (P<0 .01); t=2 .545 (P

  13. Proposals for an effective application of the continuous improvement at the ININ according to the IAEA 50-C/SG-Q new code; Propuestas para una aplicacion efectiva del proceso de mejora continua en el ININ, de acuerdo al nuevo codigo 50-C/SG-Q del OIEA

    Energy Technology Data Exchange (ETDEWEB)

    Cardenas A, B.M.; Olivares O, L.A. [Instituto Nacional de Investigaciones Nucleares, A.P. 18-1027, 11801 Mexico D.F. (Mexico)

    1997-07-01

    This work contains the requirements of continuous improvement contained in the IAEA new code {sup Q}uality assurance for safety in nuclear power plants and other nuclear installations, code 50-C/SG-Q. Assuming that it was the base for to elaborate the review No. 5 of the Quality assurance plan at ININ, it was done an analysis to give proposals for the application of continuous improvement in effective way. The relevant points which must be taken in account at the continuous improvement process are: Direction responsibility, involucring of all personnel, process planning, education and training, elaboration of improvement projects, investigation of processes which can be improved, continuation of the improvement process and its evaluation. With the implantation of an effective continuous improvement system it will be obtained to get a better quality and a more efficient safety. (Author)

  14. Some new ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2017-07-01

    Full Text Available Let an $[n,k,d]_q$ code be a linear code of length $n$, dimension $k$ and minimum Hamming distance $d$ over $GF(q$. One of the most important problems in coding theory is to construct codes with optimal minimum distances. In this paper 22 new ternary linear codes are presented. Two of them are optimal. All new codes improve the respective lower bounds in [11].

  15. On Q

    NARCIS (Netherlands)

    Visser, A.

    In this paper we study the theory Q. We prove a basic result that says that, in a sense explained in the paper, Q can be split into two parts. We prove some consequences of this result. (i) Q is not a poly-pair theory. This means that, in a strong sense, pairing cannot be defined in Q. (ii) Q does

  16. On Q

    NARCIS (Netherlands)

    Visser, A.

    2015-01-01

    In this paper we study the theory Q. We prove a basic result that says that, in a sense explained in the paper, Q can be split into two parts. We prove some consequences of this result. (i) Q is not a poly-pair theory. This means that, in a strong sense, pairing cannot be defined in Q. (ii) Q does

  17. A class of constacyclic BCH codes and new quantum codes

    Science.gov (United States)

    liu, Yang; Li, Ruihu; Lv, Liangdong; Ma, Yuena

    2017-03-01

    Constacyclic BCH codes have been widely studied in the literature and have been used to construct quantum codes in latest years. However, for the class of quantum codes of length n=q^{2m}+1 over F_{q^2} with q an odd prime power, there are only the ones of distance δ ≤ 2q^2 are obtained in the literature. In this paper, by a detailed analysis of properties of q2-ary cyclotomic cosets, maximum designed distance δ _{max} of a class of Hermitian dual-containing constacyclic BCH codes with length n=q^{2m}+1 are determined, this class of constacyclic codes has some characteristic analog to that of primitive BCH codes over F_{q^2}. Then we can obtain a sequence of dual-containing constacyclic codes of designed distances 2q^2 2q^2 can be constructed from these dual-containing codes via Hermitian Construction. These newly obtained quantum codes have better code rate compared with those constructed from primitive BCH codes.

  18. On Q

    NARCIS (Netherlands)

    Visser, Albert

    2015-01-01

    In this paper we study Robinson’s Arithmetic Q. We prove a basic result that says that, in a sense explained in the paper, Q can be split into two parts. We prove some consequences of this result. (i) Q is not a poly-pair theory. This means that, in a strong sense, pairing cannot be defined in Q.

  19. Bone marrow ectopic expression of a non-coding RNA in childhood T-cell acute lymphoblastic leukemia with a novel t(2;11(q11.2;p15.1 translocation

    Directory of Open Access Journals (Sweden)

    Leszl Anna

    2008-10-01

    Full Text Available Abstract Chromosomal translocations play a crucial role in tumorigenesis, often resulting in the formation of chimeric genes or in gene deregulation through position effects. T-cell acute lymphoblastic leukemia (T-ALL is associated with a large number of such rearrangements. We report the ectopic expression of the 3' portion of EST DA926692 in the bone marrow of a childhood T-ALL case showing a t(2;11(q11.2;p15.1 translocation as the sole chromosome abnormality. The breakpoints, defined at the sequence level, mapped within HPS5 (Hermansky Pudlak syndrome 5 intron 1 at 11p15.1, and DA926692 exon 2 at 2q11.2. The translocation was accompanied by a submicroscopic inversion that brought the two genes into the same transcriptional orientation. No chimeric trancript was detected. Interestingly, Real-Time Quantitative (RQ-PCR detected, in the patient's bone marrow, expression of a 173 bp product corresponding to the 3' portion of DA926692. Samples from four T-ALL cases with a normal karyotype and normal bone marrow used as controls were negative. It might be speculated that the juxtaposition of this genomic segment to the CpG island located upstream HPS5 activated DA92669 expression. RQ-PCR analysis showed expression positivity in 6 of 23 human tissues examined. Bioinformatic analysis excluded that this small non-coding RNA is a precursor of micro-RNA, although it is conceivable that it has a different, yet unknown, functional role. To the best of our knowledge, this is the first report, in cancer, of the activation of a small non-coding RNA as a result of a chromosomal translocation.

  20. Characterization of tissue expression and full-length coding sequence of a novel human gene mapping at 3q12.1 and transcribed in oligodendrocytes.

    Science.gov (United States)

    Fayein, Nicole-Adeline; Stankoff, Bruno; Auffray, Charles; Devignes, Marie-Dominique

    2002-05-01

    Macro-array differential hybridization of a collection of 5058 human gene transcripts represented in an IMAGE infant brain cDNA library has led to the identification of transcripts displaying preferential or specific expression in brain (Genome Res. 9 (1999) 195; http://idefix.upr420.vjf.cnrs.fr/IMAGE). Most of these genes correspond to as yet undescribed functions. Detailed characterization of the expression, sequence, and genome assignment of one of these genes named C3orf4, is reported here. The full-length sequence of the transcript was obtained by 5' extension RT-PCR. The gene transcript (2.8 kb) encodes a 253 amino acid long protein, with four transmembrane domains. The position of the C3orf4 gene was determined at 3q12.1 thanks to the draft sequence of the human genome. It is composed of five exons spanning more than 7 kb. No TATAA box but a CpG island was found upstream of the beginning of the gene. Northern blot analysis and in situ hybridization revealed a predominant expression in myelinated structures such as corpus callosum and spinal cord. RT-PCR showed expression of the C3orf4 gene in rat optic nerve and cultured oligodendrocytes, the myelinating cells of the central nervous system, but not in astrocytes. This work supports further investigations aimed at determining the role of the C3orf4 gene in myelinating cells.

  1. Maturity-onset diabetes of the young caused by a balanced translocation where the 20q12 break point results in disruption upstream of the coding region of hepatocyte nuclear factor-4alpha (HNF4A) gene.

    Science.gov (United States)

    Gloyn, Anna L; Ellard, Sian; Shepherd, Maggie; Howell, Rodney T; Parry, Elizabeth M; Jefferson, Andrew; Levy, Elaine R; Hattersley, Andrew T

    2002-07-01

    Monogenic human disorders have been used as paradigms for complex genetic disease and as tools for establishing important insights into mechanisms of gene regulation and transcriptional control. Maturity-onset diabetes of the young (MODY) is a monogenic dominantly inherited form of diabetes that is characterized by defective insulin secretion from the pancreatic beta-cells. A wide variety of mutation types in five different genes have been identified that result in this condition. There have been no reports of a chromosome deletion or translocation resulting in MODY. We report a pedigree where MODY cosegregates with a balanced translocation [karyotype 46, XX t(3;20) (p21.2;q12)]. The chromosome 20 break point, 20q12, is within the region of one of the known MODY genes, hepatocyte nuclear factor-4alpha (HNF4A). Fluorescence in situ hybridization analysis demonstrated that the break point does not disrupt the coding region of this gene, but it lies at least 6 kb upstream of the conventional promoter (P1). We propose that this mutation disrupts the spatial relationship between the recently described alternate distal pancreatic promoter (P2) and HNF4A. This is the first case of MODY due to a balanced translocation, and it provides evidence to confirm the crucial role of an upstream regulator of HNF4A gene expression in the beta-cell.

  2. Q fever

    Science.gov (United States)

    ... Coxiella burnetii . These bacteria can infect: Sheep Goats Cattle Dogs Cats Birds Rodents Ticks Infected animals shed ... The main treatment for Q fever is antibiotics. For early-stage Q ... If you have the infection for more than 6 months, it is called ...

  3. On Asymmetric Quantum MDS Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Ling, San

    2010-01-01

    Assuming the validity of the MDS Conjecture, the weight distribution of all MDS codes is known. Using a recently-established characterization of asymmetric quantum error-correcting codes, linear MDS codes can be used to construct asymmetric quantum MDS codes with $d_{z} \\geq d_{x}\\geq 2$ for all possible values of length $n$ for which linear MDS codes over $\\F_{q}$ are known to exist.

  4. On Maximum Lee Distance Codes

    OpenAIRE

    Alderson, Tim L.; Svenja Huntemann

    2013-01-01

    Singleton-type upper bounds on the minimum Lee distance of general (not necessarily linear) Lee codes over ℤq are discussed. Two bounds known for linear codes are shown to also hold in the general case, and several new bounds are established. Codes meeting these bounds are investigated and in some cases characterised.

  5. The Weights in MDS Codes

    CERN Document Server

    Ezerman, Martianus Frederic; Sole, Patrick

    2009-01-01

    The weights in MDS codes of length n and dimension k over the finite field GF(q) are studied. Up to some explicit exceptional cases, the MDS codes with parameters given by the MDS conjecture are shown to contain all k weights in the range n-k+1 to n. The proof uses the covering radius of the dual code

  6. Some new quasi-twisted ternary linear codes

    Directory of Open Access Journals (Sweden)

    Rumen Daskalov

    2015-09-01

    Full Text Available Let [n, k, d]_q code be a linear code of length n, dimension k and minimum Hamming distance d over GF(q. One of the basic and most important problems in coding theory is to construct codes with best possible minimum distances. In this paper seven quasi-twisted ternary linear codes are constructed. These codes are new and improve the best known lower bounds on the minimum distance in [6].

  7. Cyclic Codes of Length 2

    Indian Academy of Sciences (India)

    Manju Pruthi

    2001-11-01

    In this paper explicit expressions of + 1 idempotents in the ring $R = F_q[X]/\\langle X^{2^m}-1\\rangle$ are given. Cyclic codes of length 2 over the finite field , of odd characteristic, are defined in terms of their generator polynomials. The exact minimum distance and the dimension of the codes are obtained.

  8. On Expanded Cyclic Codes

    CERN Document Server

    Wu, Yingquan

    2008-01-01

    The paper has a threefold purpose. The first purpose is to present an explicit description of expanded cyclic codes defined in $\\GF(q^m)$. The proposed explicit construction of expanded generator matrix and expanded parity check matrix maintains the symbol-wise algebraic structure and thus keeps many important original characteristics. The second purpose of this paper is to identify a class of constant-weight cyclic codes. Specifically, we show that a well-known class of $q$-ary BCH codes excluding the all-zero codeword are constant-weight cyclic codes. Moreover, we show this class of codes achieve the Plotkin bound. The last purpose of the paper is to characterize expanded cyclic codes utilizing the proposed expanded generator matrix and parity check matrix. We analyze the properties of component codewords of a codeword and particularly establish the precise conditions under which a codeword can be represented by a subbasis. With the new insights, we present an improved lower bound on the minimum distance of...

  9. Multiple blocking sets in PG(n,q), n>=3

    DEFF Research Database (Denmark)

    Barat, Janos

    2004-01-01

    This article discusses minimal s-fold blocking sets B in PG (n, q), q = ph, p prime, q > 661, n > 3, of size |B| > sq + cp q2/3 - (s - 1) (s - 2)/2 (s > min (cp q1/6, q1/4/2)). It is shown that these s-fold blocking sets contain the disjoint union of a collection of s lines and/or Baer subplanes...... of Hamada and Helleseth on codes meeting the Griesmer bound....

  10. Coding Partitions

    Directory of Open Access Journals (Sweden)

    Fabio Burderi

    2007-05-01

    Full Text Available Motivated by the study of decipherability conditions for codes weaker than Unique Decipherability (UD, we introduce the notion of coding partition. Such a notion generalizes that of UD code and, for codes that are not UD, allows to recover the ``unique decipherability" at the level of the classes of the partition. By tacking into account the natural order between the partitions, we define the characteristic partition of a code X as the finest coding partition of X. This leads to introduce the canonical decomposition of a code in at most one unambiguouscomponent and other (if any totally ambiguouscomponents. In the case the code is finite, we give an algorithm for computing its canonical partition. This, in particular, allows to decide whether a given partition of a finite code X is a coding partition. This last problem is then approached in the case the code is a rational set. We prove its decidability under the hypothesis that the partition contains a finite number of classes and each class is a rational set. Moreover we conjecture that the canonical partition satisfies such a hypothesis. Finally we consider also some relationships between coding partitions and varieties of codes.

  11. Multi-structural QR code recognition based on ELM%基于 ELM 的多结构变形Q R码分类校正研究

    Institute of Scientific and Technical Information of China (English)

    许刚; 沈宇超; 谈元鹏

    2016-01-01

    针对不同曲面上QR码变形多样化、识别率低的问题,考虑到极限学习机(ELM)对大量数据的快速分类能力,提出了一种基于ELM的多结构变形QR码分类校正算法。在欧氏距离量化变形特征后,运用ELM算法把变形结构分为平面变形、半曲面变形和全曲面变形三类,并利用不同分类系数改进QR码坐标透视变换算法,得到校正坐标值。实验结果表明,此方法不仅提高了QR码在曲面上的校正准确率,而且通过分类提高了曲面变形和平面变形QR码的校正速度。%Since the traditional QR code recognition methods fail to fulfill the recognition task on multi-structural deformation deformed QR code cases,this paper presented a novel QR code recognition algorithm based on extreme learning machine.This method calculated Euclidean distance of feature points as deformation characteristics.And employed extreme learning machine to classify the deformation type.It determined the transform coefficients of each type,which were used for coordinates map-ping.Then obtained real coordinates by perspective mapping with different transform coefficients,thus the code were recon-structed.Experimental results demonstrate that this method holds a satisfactory performance on both of recognition rate and time consuming.

  12. Holographic codes

    CERN Document Server

    Latorre, Jose I

    2015-01-01

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  13. Sharing code

    OpenAIRE

    Kubilius, Jonas

    2014-01-01

    Sharing code is becoming increasingly important in the wake of Open Science. In this review I describe and compare two popular code-sharing utilities, GitHub and Open Science Framework (OSF). GitHub is a mature, industry-standard tool but lacks focus towards researchers. In comparison, OSF offers a one-stop solution for researchers but a lot of functionality is still under development. I conclude by listing alternative lesser-known tools for code and materials sharing.

  14. Defining Z in Q

    CERN Document Server

    Koenigsmann, Jochen

    2010-01-01

    We show that ${\\mathbb Z}$ is definable in ${\\mathbb Q}$ by a universal first-order formula in the language of rings. We also present an $\\forall\\exists$-formula for ${\\mathbb Z}$ in ${\\mathbb Q}$ with just one universal quantifier. We exhibit new diophantine subsets of ${\\mathbb Q}$ like the set of non-squares or the complement of the image of the norm map under a quadratic extension. Finally, we show that there is no existential formula for ${\\mathbb Z}$ in ${\\mathbb Q}$, provided one assumes a strong variant of the Bombieri-Lang Conjecture for varieties over ${\\mathbb Q}$ with many ${\\mathbb Q}$-rational points.

  15. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    Speaking Code begins by invoking the “Hello World” convention used by programmers when learning a new language, helping to establish the interplay of text and code that runs through the book. Interweaving the voice of critical writing from the humanities with the tradition of computing and software...

  16. Polar Codes

    Science.gov (United States)

    2014-12-01

    QPSK Gaussian channels . .......................................................................... 39 vi 1. INTRODUCTION Forward error correction (FEC...Capacity of BSC. 7 Figure 5. Capacity of AWGN channel . 8 4. INTRODUCTION TO POLAR CODES Polar codes were introduced by E. Arikan in [1]. This paper...Under authority of C. A. Wilgenbusch, Head ISR Division EXECUTIVE SUMMARY This report describes the results of the project “More reliable wireless

  17. Q fever in Greenland

    DEFF Research Database (Denmark)

    Koch, Anders; Svendsen, Claus Bo; Christensen, Jens Jorgen

    2010-01-01

    We report a patient with Q fever endocarditis in a settlement in eastern Greenland (Isortoq, Ammassalik area). Likely animal sources include sled dogs and seals. Q fever may be underdiagnosed in Arctic areas but may also represent an emerging infection.......We report a patient with Q fever endocarditis in a settlement in eastern Greenland (Isortoq, Ammassalik area). Likely animal sources include sled dogs and seals. Q fever may be underdiagnosed in Arctic areas but may also represent an emerging infection....

  18. Q fever in Greenland

    DEFF Research Database (Denmark)

    Koch, Anders; Svendsen, Claus Bo; Christensen, Jens Jorgen

    2010-01-01

    We report a patient with Q fever endocarditis in a settlement in eastern Greenland (Isortoq, Ammassalik area). Likely animal sources include sled dogs and seals. Q fever may be underdiagnosed in Arctic areas but may also represent an emerging infection.......We report a patient with Q fever endocarditis in a settlement in eastern Greenland (Isortoq, Ammassalik area). Likely animal sources include sled dogs and seals. Q fever may be underdiagnosed in Arctic areas but may also represent an emerging infection....

  19. Q-instantons

    NARCIS (Netherlands)

    Bergshoeff, E. A.; Hartong, J.; Ploegh, A.; Sorokin, D.

    2008-01-01

    We construct the half-supersymmetric instanton solutions that are electric-magnetically dual to the recently discussed half-supersymmetric Q7-branes. We call these instantons "Q-instantons". Whereas the D-instanton is most conveniently described using the RR axion chi and the dilaton phi, the Q-inst

  20. On the second weight of generalized Reed-Muller codes

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Not much is known about theweight distribution of the generalized Reed-Muller code RMq (s,m) when q > 2, s > 2 and m ≥ 2. Even the second weight is only known for values of s being smaller than or equal to q/2. In this paper we establish the second weight for values of s being smaller than q. For...

  1. Information sets as permutation cycles for quadratic residue codes

    Directory of Open Access Journals (Sweden)

    Richard A. Jenson

    1982-01-01

    Full Text Available The two cases p=7 and p=23 are the only known cases where the automorphism group of the [p+1,   (p+1/2] extended binary quadratic residue code, O(p, properly contains PSL(2,p. These codes have some of their information sets represented as permutation cycles from Aut(Q(p. Analysis proves that all information sets of Q(7 are so represented but those of Q(23 are not.

  2. Speech coding

    Energy Technology Data Exchange (ETDEWEB)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  3. Optimization of Mapping Rule of Bit-Interleaved Turbo Coded Modulation with 16QAM

    Institute of Scientific and Technical Information of China (English)

    FEI Ze-song; YANG Yu; LIU Lin-nan; KUANG Jing-ming

    2005-01-01

    Optimization of mapping rule of bit-interleaved Turbo coded modulation with 16 quadrature amplitude modulation (QAM) is investigated based on different impacts of various encoded bits sequence on Turbo decoding performance. Furthermore, bit-interleaved in-phase and quadrature phase (I-Q) Turbo coded modulation scheme are designed similarly with I-Q trellis coded modulation (TCM). Through performance evaluation and analysis, it can be seen that the novel mapping rule outperforms traditional one and the I-Q Turbo coded modulation can not achieve good performance as expected. Therefore, there is not obvious advantage in using I-Q method in bit-interleaved Turbo coded modulation.

  4. Q-tubes, Q-rings and Q-crusts

    CERN Document Server

    Sakai, Nobuyuki; Nakao, Ken-ichi

    2010-01-01

    We re-analyse scalar field theories which allow Q-ball solutions. We find new types of non-topological solitons: tube-shaped in SO(2) models, ring-shaped in SO(3) models, and crust-shaped in SO(3)\\times U(1) models. Although their field configurations are analogous to cosmic global strings or global monopoles, their gravitational mass are finite without gauge fields.

  5. Speaking Code

    DEFF Research Database (Denmark)

    Cox, Geoff

    ; alternatives to mainstream development, from performances of the live-coding scene to the organizational forms of commons-based peer production; the democratic promise of social media and their paradoxical role in suppressing political expression; and the market’s emptying out of possibilities for free...... development, Speaking Code unfolds an argument to undermine the distinctions between criticism and practice, and to emphasize the aesthetic and political aspects of software studies. Not reducible to its functional aspects, program code mirrors the instability inherent in the relationship of speech...... expression in the public realm. The book’s line of argument defends language against its invasion by economics, arguing that speech continues to underscore the human condition, however paradoxical this may seem in an era of pervasive computing....

  6. Code properties from holographic geometries

    CERN Document Server

    Pastawski, Fernando

    2016-01-01

    Almheiri, Dong, and Harlow [hep-th/1411.7041] proposed a highly illuminating connection between the AdS/CFT holographic correspondence and operator algebra quantum error correction (OAQEC). Here we explore this connection further. We derive some general results about OAQEC, as well as results that apply specifically to quantum codes which admit a holographic interpretation. We introduce a new quantity called `price', which characterizes the support of a protected logical system, and find constraints on the price and the distance for logical subalgebras of quantum codes. We show that holographic codes defined on bulk manifolds with asymptotically negative curvature exhibit `uberholography', meaning that a bulk logical algebra can be supported on a boundary region with a fractal structure. We argue that, for holographic codes defined on bulk manifolds with asymptotically flat or positive curvature, the boundary physics must be highly nonlocal, an observation with potential implications for black holes and for q...

  7. The Aster code; Code Aster

    Energy Technology Data Exchange (ETDEWEB)

    Delbecq, J.M

    1999-07-01

    The Aster code is a 2D or 3D finite-element calculation code for structures developed by the R and D direction of Electricite de France (EdF). This dossier presents a complete overview of the characteristics and uses of the Aster code: introduction of version 4; the context of Aster (organisation of the code development, versions, systems and interfaces, development tools, quality assurance, independent validation); static mechanics (linear thermo-elasticity, Euler buckling, cables, Zarka-Casier method); non-linear mechanics (materials behaviour, big deformations, specific loads, unloading and loss of load proportionality indicators, global algorithm, contact and friction); rupture mechanics (G energy restitution level, restitution level in thermo-elasto-plasticity, 3D local energy restitution level, KI and KII stress intensity factors, calculation of limit loads for structures), specific treatments (fatigue, rupture, wear, error estimation); meshes and models (mesh generation, modeling, loads and boundary conditions, links between different modeling processes, resolution of linear systems, display of results etc..); vibration mechanics (modal and harmonic analysis, dynamics with shocks, direct transient dynamics, seismic analysis and aleatory dynamics, non-linear dynamics, dynamical sub-structuring); fluid-structure interactions (internal acoustics, mass, rigidity and damping); linear and non-linear thermal analysis; steels and metal industry (structure transformations); coupled problems (internal chaining, internal thermo-hydro-mechanical coupling, chaining with other codes); products and services. (J.S.)

  8. Finite q-oscillator

    Energy Technology Data Exchange (ETDEWEB)

    Atakishiyev, Natig M [Centro de Ciencias FIsicas, UNAM, Apartado Postal 48-3, 62251 Cuernavaca, Morelos (Mexico); Klimyk, Anatoliy U [Centro de Ciencias FIsicas, UNAM, Apartado Postal 48-3, 62251 Cuernavaca, Morelos (Mexico); Wolf, Kurt Bernardo [Centro de Ciencias FIsicas, UNAM, Apartado Postal 48-3, 62251 Cuernavaca, Morelos (Mexico)

    2004-05-28

    The finite q-oscillator is a model that obeys the dynamics of the harmonic oscillator, with the operators of position, momentum and Hamiltonian being functions of elements of the q-algebra su{sub q}(2). The spectrum of position in this discrete system, in a fixed representation j, consists of 2j + 1 'sensor'-points x{sub s} = 1/2 [2s]{sub q}, s element of {l_brace}-j, -j+1, ..., j{r_brace}, and similarly for the momentum observable. The spectrum of energies is finite and equally spaced, so the system supports coherent states. The wavefunctions involve dual q-Kravchuk polynomials, which are solutions to a finite-difference Schroedinger equation. Time evolution (times a phase) defines the fractional Fourier-q-Kravchuk transform. In the classical limit as q {yields} 1 we recover the finite oscillator Lie algebra, the N = 2j {yields} {infinity} limit returns the Macfarlane-Biedenharn q-oscillator and both limits contract the generators to the standard quantum-mechanical harmonic oscillator.

  9. Double Q-learning

    NARCIS (Netherlands)

    Hasselt, H. van

    2010-01-01

    In some stochastic environments the well-known reinforcement learning algorithm Q-learning performs very poorly. This poor performance is caused by large overestimations of action values, which result from a positive bias that is introduced because Q-learning uses the maximum action value as an appr

  10. 22q11-deletionssyndrom

    DEFF Research Database (Denmark)

    Olesen, Charlotte; Agergaard, Peter; Boers, Maria

    2010-01-01

    22q11 deletion syndrome (formerly named CATCH22, DiGeorge, Velo-Cardio-Facial, Caylor, Kinouchi and Shprintzen syndrome) occurs in approximately 1/2000 to 4000 children. The genetic lesion is remarkably uniform, occurring mainly as 3 or 1.5 MB deletions in the 22q11.2 region. However, the clinical...

  11. RecQ Helicases

    DEFF Research Database (Denmark)

    Larsen, Nicolai Balle; Hickson, Ian D

    2013-01-01

    The RecQ family of DNA helicases is highly conserved throughout -evolution, and is important for the maintenance of genome stability. In humans, five RecQ family members have been identified: BLM, WRN, RECQ4, RECQ1 and RECQ5. Defects in three of these give rise to Bloom's syndrome (BLM), Werner...

  12. Partial deletion 11q

    DEFF Research Database (Denmark)

    Hertz, Jens Michael; Tommerup, N; Sørensen, F B;

    1995-01-01

    We describe the cytogenetic findings and the dysmorphic features in a stillborn girl with a large de novo terminal deletion of the long arm of chromosome 11. The karyotype was 46,XX,del(11)(q21qter). By reviewing previous reports of deletion 11q, we found that cleft lip and palate are most...

  13. Proton magnetic resonance spectroscopy in 22q11 deletion syndrome.

    Directory of Open Access Journals (Sweden)

    Fabiana da Silva Alves

    Full Text Available OBJECTIVE: People with velo-cardio-facial syndrome or 22q11 deletion syndrome (22q11DS have behavioral, cognitive and psychiatric problems. Approximately 30% of affected individuals develop schizophrenia-like psychosis. Glutamate dysfunction is thought to play a crucial role in schizophrenia. However, it is unknown if and how the glutamate system is altered in 22q11DS. People with 22q11DS are vulnerable for haploinsufficiency of PRODH, a gene that codes for an enzyme converting proline into glutamate. Therefore, it can be hypothesized that glutamatergic abnormalities may be present in 22q11DS. METHOD: We employed proton magnetic resonance spectroscopy ((1H-MRS to quantify glutamate and other neurometabolites in the dorsolateral prefrontal cortex (DLPFC and hippocampus of 22 adults with 22q11DS (22q11DS SCZ+ and without (22q11DS SCZ- schizophrenia and 23 age-matched healthy controls. Also, plasma proline levels were determined in the 22q11DS group. RESULTS: We found significantly increased concentrations of glutamate and myo-inositol in the hippocampal region of 22q11DS SCZ+ compared to 22q11DS SCZ-. There were no significant differences in levels of plasma proline between 22q11DS SCZ+ and 22q11DS SCZ-. There was no relationship between plasma proline and cerebral glutamate in 22q11DS. CONCLUSION: This is the first in vivo(1H-MRS study in 22q11DS. Our results suggest vulnerability of the hippocampus in the psychopathology of 22q11DS SCZ+. Altered hippocampal glutamate and myo-inositol metabolism may partially explain the psychotic symptoms and cognitive impairments seen in this group of patients.

  14. Upper and Lower Bounds on the Minimum Distance of Expander Codes

    CERN Document Server

    Frolov, Alexey

    2011-01-01

    The minimum distance of expander codes over GF(q) is studied. A new upper bound on the minimum distance of expander codes is derived. The bound is shown to lie under the Varshamov-Gilbert (VG) bound while q >= 32. Lower bounds on the minimum distance of some families of expander codes are obtained. A lower bound on the minimum distance of low-density parity-check (LDPC) codes with a Reed--Solomon constituent code over GF(q) is obtained. The bound is shown to be very close to the VG bound and to lie above the upper bound for expander codes.

  15. On the Concatenation of Non-Binary Random Linear Fountain Codes with Maximum Distance Separable Codes

    CERN Document Server

    Blasco, Francisco Lazaro

    2011-01-01

    A novel fountain coding scheme has been introduced. The scheme consists of a parallel concatenation of a MDS block code with a LRFC code, both constructed over the same field, $F_q$. The performance of the concatenated fountain coding scheme has been analyzed through derivation of tight bounds on the probability of decoding failure as a function of the overhead. It has been shown how the concatenated scheme performs as well as LRFC codes in channels characterized by high erasure probabilities, whereas they provide failure probabilities lower by several orders of magnitude at moderate/low erasure probabilities.

  16. Finite q-oscillator

    Science.gov (United States)

    Atakishiyev, Natig M.; Klimyk, Anatoliy U.; Wolf, Kurt Bernardo

    2004-05-01

    The finite q-oscillator is a model that obeys the dynamics of the harmonic oscillator, with the operators of position, momentum and Hamiltonian being functions of elements of the q-algebra suq(2). The spectrum of position in this discrete system, in a fixed representation j, consists of 2j + 1 'sensor'-points x_s={\\case12}[2s]_q, s\\in\\{-j,-j+1,\\ldots,j\\} , and similarly for the momentum observable. The spectrum of energies is finite and equally spaced, so the system supports coherent states. The wavefunctions involve dual q-Kravchuk polynomials, which are solutions to a finite-difference Schrödinger equation. Time evolution (times a phase) defines the fractional Fourier-q-Kravchuk transform. In the classical limit as q rarr 1 we recover the finite oscillator Lie algebra, the N = 2j rarr infin limit returns the Macfarlane-Biedenharn q-oscillator and both limits contract the generators to the standard quantum-mechanical harmonic oscillator.

  17. Compact Q-balls

    CERN Document Server

    Bazeia, D; Marques, M A; Menezes, R; da Rocha, R

    2016-01-01

    In this work we deal with non-topological solutions of the Q-ball type in two space-time dimensions, in models described by a single complex scalar field that engenders global symmetry. The main novelty is the presence of stable Q-balls solutions that live in a compact interval of the real line and appear from a family of models controlled by two distinct parameters. We find analytical solutions and study their charge and energy, and show how to control the parameters to make the Q-balls classically and quantum mechanically stable.

  18. Decoding Hermitian Codes with Sudan's Algorithm

    DEFF Research Database (Denmark)

    Høholdt, Tom; Nielsen, Rasmus Refslund

    1999-01-01

    We present an efficient implementation of Sudan's algorithm for list decoding Hermitian codes beyond half the minimum distance. The main ingredients are an explicit method to calculate so-called increasing zero bases, an efficient interpolation algorithm for finding the Q-polynomial......, and a reduction of the problem of factoring the Q-polynomial to the problem of factoring a univariate polynomial over a large finite field....

  19. Q fever - early

    Science.gov (United States)

    ... if untreated. Other complications can include: Bone infection ( osteomyelitis ) Brain infection ( encephalitis ) Liver infection (chronic hepatitis) Lung ... 2015:chap 190. Read More Encephalitis Endocarditis Flu Osteomyelitis Pneumonia - adults (community acquired) Q fever Tick bite ...

  20. Coenzyme Q10 (PDQ)

    Science.gov (United States)

    ... Liver Lung Cancer Lymphoma Pancreatic Cancer Prostate Cancer Skin Cancer Thyroid Cancer Uterine Cancer All Cancer Types ... healthy. The body also uses CoQ10 as an antioxidant . An antioxidant is a substance that protects cells ...

  1. FEMA Q3 Floodways

    Data.gov (United States)

    Minnesota Department of Natural Resources — The Q3 Flood Data are derived from the Flood Insurance Rate Maps (FIRMs) published by the Federal Emergency Management Agency (FEMA). The file is georeferenced to...

  2. The Spirituality of Q

    African Journals Online (AJOL)

    2015-07-01

    Jul 1, 2015 ... definitions have tended to emphasise the continuous nature of the experience under ... discussed in Q. Instead it is necessary to examine the material .... method – disclosure through the son who has privileged knowledge of ...

  3. Deletion (2)(q37)

    Energy Technology Data Exchange (ETDEWEB)

    Stratton, R.F.; Tolworthy, J.A.; Young, R.S. [South Texas Genetics Center, San Antonio, TX (United States)

    1994-06-01

    We report on a 5-month-old girl with widely spaced nipples, redundant nuchal skin, coarctation of the aorta, anal atresia with distal fistula, postnatal growth retardation, hypotonia, and sparse scalp hair. Initial clinical assessment suggested the diagnosis of Ullrich-Turner syndrome. Chromosome analysis showed a 46,XX,del(2)(q37) karyotype in peripheral lymphocytes. We compare her findings to those of other reported patients with terminal deletions of 2q. 8 refs., 2 figs., 1 tab.

  4. Emergence of Q Fever

    Directory of Open Access Journals (Sweden)

    E Angelakis

    2011-09-01

    Full Text Available Q fever is a worldwide zoonosis with many acute and chronic manifestations caused by the pathogen Coxiella burnetii. Farm animals and pets are the main reservoirs of infection, and transmission to human beings is mainly accomplished through inhalation of contaminated aerosols. Persons at greatest risk are those in contact with farm animals and include farmers, abattoir workers, and veterinarians. The organs most commonly affected during Q fever are the heart, the arteries, the bones and the liver. The most common clinical presentation is an influenza-like illness with varying degrees of pneumonia and hepatitis. Although acute disease is usually self-limiting, people do occasionally die from this condition. Endocarditis is the most serious and most frequent clinical presentation of chronic Q fever. Vascular infection is the second most frequent presentation of Q fever. The diagnosis of Q fever is based on a significant increase in serum antibody titers. The treatment is effective and well tolerated, but must be adapted to the acute or chronic pattern with the tetracyclines to be considered the mainstay of antibiotic therapy. For the treatment of Q fever during pregnancy the use of long-term cotrimoxazole therapy is proposed.

  5. NOVEL BIPHASE CODE -INTEGRATED SIDELOBE SUPPRESSION CODE

    Institute of Scientific and Technical Information of China (English)

    Wang Feixue; Ou Gang; Zhuang Zhaowen

    2004-01-01

    A kind of novel binary phase code named sidelobe suppression code is proposed in this paper. It is defined to be the code whose corresponding optimal sidelobe suppression filter outputs the minimum sidelobes. It is shown that there do exist sidelobe suppression codes better than the conventional optimal codes-Barker codes. For example, the sidelobe suppression code of length 11 with filter of length 39 has better sidelobe level up to 17dB than that of Barker code with the same code length and filter length.

  6. From concatenated codes to graph codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom

    2004-01-01

    We consider codes based on simple bipartite expander graphs. These codes may be seen as the first step leading from product type concatenated codes to more complex graph codes. We emphasize constructions of specific codes of realistic lengths, and study the details of decoding by message passing...

  7. q-ultraspherical polynomials for q a root of unity

    CERN Document Server

    Spiridonov, V P

    1996-01-01

    Properties of the q-ultraspherical polynomials for q being a primitive root of unity are derived using a formalism of the so_q(3) algebra. The orthogonality condition for these polynomials provides a new class of trigonometric identities representing discrete finite-dimensional analogs of q-beta integrals of Ramanujan.

  8. Good Codes From Generalised Algebraic Geometry Codes

    CERN Document Server

    Jibril, Mubarak; Ahmed, Mohammed Zaki; Tjhai, Cen

    2010-01-01

    Algebraic geometry codes or Goppa codes are defined with places of degree one. In constructing generalised algebraic geometry codes places of higher degree are used. In this paper we present 41 new codes over GF(16) which improve on the best known codes of the same length and rate. The construction method uses places of small degree with a technique originally published over 10 years ago for the construction of generalised algebraic geometry codes.

  9. Q-MOHRA

    DEFF Research Database (Denmark)

    Kulkarni, Nandkumar P.; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    . This paper presents a novel heuristic routing algorithm known as QoS Assured Multi-Objective Hybrid Routing Algorithm (Q-MOHRA) for Heterogeneous WSN. Q-MOHRA takes into account the link (energy, hop count, link quality indicator etc.) and path (jitter) metrics for optimal path selection. The performance...... of Q-MOHRA is evaluated through intensive simulation and equated with Simple Hybrid Routing Protocol (SHRP) and Dynamic Multi-objective Routing Algorithm (DyMORA). The metrics such as Average Energy Consumption, Residual Energy, Packet Delivery Ratio, Jitter, and Normalized Routing Load are used...... for comparison. The performance of Q-MOHRA has been observed to outclass SHRP and DyMORA. It improves the Packet Delivery Ratio (PDR) by 13.72% as compared to SHRP and 28 % as compared to DyMORA. Q-MOHRA outperforms SHRP and DyMORA in terms of Average Energy Consumption (AEC) by a factor of 4.2 % and 2.3 %....

  10. Interacting Q-balls

    CERN Document Server

    Brihaye, Yves

    2007-01-01

    We construct explicit examples of new axially symmetric, non-spinning Q-ball solutions that have not been studied so far. These solutions can be interpreted as angular excitations of the fundamental Q-balls and are related to the spherical harmonics. Correspondingly, they have higher energy and their energy densities possess two local maxima on the positive z-axis. We also study two Q-balls interacting via a potential term in 3+1 dimensions and construct examples of stationary, solitonic-like objects in (3+1)-dimensional flat space-time that consist of two interacting global scalar fields. We concentrate on configurations composed of one spinning and one non-spinning Q-ball and study the parameter-dependence of the energy and charges of the configuration. In addition, we present numerical evidence that for fixed values of the coupling constants two different types of 2-Q-ball solutions exist: solutions with defined parity, but also solutions which are asymmetric with respect to reflexion through the x-y-axis.

  11. 实时定量PCR技术检测结核分枝杆菌蛋白编码基因表达水平研究%Level of expression of the genes coding for proteins in Mycobacterium tuberculosis according to qRT-PCR

    Institute of Scientific and Technical Information of China (English)

    陈伟; 刘艳; 杨紧根; 刘金菊; 王远志; 袁俐

    2012-01-01

    [目的]运用实时定量PCR(qRT-PCR)检测66株结核分枝杆菌蛋白编码基因(fbpB,psts1,mpt64)的表达水平,探讨结核分枝杆菌耐药菌株与敏感菌株,北京基因型菌株与非北京基因型菌株的蛋白抗原在转录水平的差异.[方法]根据GenBank提供的序列,设计特异性引物,扩增目的基因片段,克隆人载体,重组质粒经纯化及梯度稀释,应用qRTPCR检测基因的表达水平.[结果]北京基因型菌株psts1基因表达水平与非北京基因型菌株比较差异有统计学意义(t=3.721,P<0.01);耐药菌株mpt64基因表达水平与敏感菌株比较差异有统计学意义(t=3.951,P<0.01).结核分枝杆菌活菌的扩增曲线呈典型的S型,结核分枝杆菌死菌和非结核分枝杆菌呈水平直线,未检测到荧光信号.[结论]北京基因型结核分枝杆菌psts1基因的表达量低于非北京基因型,结核分枝杆菌耐药菌株mpt64基因的表达量低于敏感株.%Objectives To use quantitative real-time PCR to detect the level of expression of the genes fbpB, pstsl, and mpt64 coding for proteins in 66 strains of Mycobacterium tuberculosis and to explore variability in protein antigens of the Beijing genotype and non-Beijing genotype at the transcriptional level in drug-resistant strains and sensitive strains. Methods Specific primers were designed in accordance with the GenBank database. The amplified PCR fragments were cloned into respective vectors, and recombinant plasmids were purified and serially diluted. Levels of gene expression were detected using qRT-PCR. Results There was a statistically significant difference (t= 3. 721, P<0.01)in the expression of pstsl in the Beijing genotype compared to the non-Beijing genotype. There was a statistically significant difference (t=3. 951, P<0.01)in the expression of mpt64 in drug-resistant strains compared to sensitive strains. The amplification curve for live M. tuberculosis was a characteristic S curve. The curve for

  12. Measurements of the Q

    Energy Technology Data Exchange (ETDEWEB)

    P.L. Anthony; R.Greg Arnold; Todd Averett; H.R. Band; M.C. Berisso; H. Borel; Peter Bosted; S.L. Bultmann; M. Buenerd; T. Chupp; Steve Churchwell; G.R. Court; Donald Crabb; Donal Day; P. Decowski; P. DePietro; R. Erbacher; R. Erickson; A. Feltham; Helene Fonvieille; Emil Frlez; R. Gearhart; V. Ghazikhanian; Javier Gomez; Keith Griffioen; Chris Harris; M.A. Houlden; E.W. Hughes; Charles Hyde-Wright; G. Igo; Sebastian Incerti; John Jensen; J.R. Johnson; P.M. King; Yu.G. Kolomensky; Sebastian E. Kuhn; Richard Lindgren; R.M. Lombard-Nelsen; Jacques Marroncle; James McCarthy; Paul McKee; W. Meyer; G.S. Mitchell; Joseph Mitchell; M. Olson; S. Penttila; Gerald Peterson; Gerassimos G. Petratos; R. Pitthan; Dinko Pocanic; R. Prepost; Charles Y. Prescott; Liming Qin; Brian Raue; D. Reyna; L.S. Rochester; Stephen Rock; Oscar Rondon-Aramayo; Franck Sabatie; Ingo Sick; Timothy Smith; Lee Sorrell; F. Staley; S. St. Lorant; L.M. Stuart; Z. Szalata; Y. Terrien; Al Tobias; Luminita Todor; T. Toole; S. Trentalange; D. Walz; Robert Welsh; Frank Wesselmann; T.R. Wright; C.C. Young; Marko Zeier; Hongguo Zhu; Beni Zihlmann

    1999-11-01

    The structure functions g1p and g1n have been measured over the range 0.014 < x < 0.9 and 1 < Q2 < 40 GeV2 using deep-inelastic scattering of 48 GeV longitudinally polarized electrons from polarized protons and deuterons. We find that the Q2 dependence of g1p (g1n) at fixed x is very similar to that of the spin-averaged structure function F1p (F1n). From a NLO QCD fit to all available data we find Gamma{sub 1}{sup p} Gamma{sub 1}{sup n}=0.176 {+-} 0.003 {+-} 0.007$ at Q2=5 GeV2, in agreement with the Bjorken sum rule prediction of 0.182 {+-} 0.005.

  13. Coenzyme Q and Mitochondrial Disease

    Science.gov (United States)

    Quinzii, Catarina M.; Hirano, Michio

    2010-01-01

    Coenzyme Q[subscript 10] (CoQ[subscript 10]) is an essential electron carrier in the mitochondrial respiratory chain and an important antioxidant. Deficiency of CoQ[subscript 10] is a clinically and molecularly heterogeneous syndrome, which, to date, has been found to be autosomal recessive in inheritance and generally responsive to CoQ[subscript…

  14. 1Q84

    Institute of Scientific and Technical Information of China (English)

    谈墨者

    2011-01-01

    1Q84年——我就这么来称呼这个新世界吧。不管喜欢还是不喜欢,目前我已经置身于这"1Q84年"。我必须尽快适应这个带着问号的世界,像被放进陌生森林中的动物一样,为了生存下去,得尽快了解并顺应这里的规则。

  15. RecQ Helicases

    DEFF Research Database (Denmark)

    Larsen, Nicolai Balle; Hickson, Ian D

    2013-01-01

    The RecQ family of DNA helicases is highly conserved throughout -evolution, and is important for the maintenance of genome stability. In humans, five RecQ family members have been identified: BLM, WRN, RECQ4, RECQ1 and RECQ5. Defects in three of these give rise to Bloom's syndrome (BLM), Werner's...... a perturbed S-phase. Finally BLM also plays a role in the suppression and/or resolution of ultra-fine anaphase DNA bridges that form between sister-chromatids during mitosis....

  16. Split Q-balls

    Science.gov (United States)

    Bazeia, D.; Losano, L.; Marques, M. A.; Menezes, R.

    2017-02-01

    We investigate the presence of non-topological solutions of the Q-ball type in (1 , 1) spacetime dimensions. The model engenders the global U (1) symmetry and is of the k-field type, since it contains a new term, of the fourth-order power in the derivative of the complex scalar field. It supports analytical solution of the Q-ball type which is stable quantum mechanically. The new solution engenders an interesting behavior, with the charge and energy densities unveiling a splitting profile.

  17. De novo dup(7)(q21q22.2) and cytogenetics of 7q21q34 duplications.

    Science.gov (United States)

    Rivera, H

    2013-01-01

    We report on a constitutional dup(7)(q21q22.2) and compile 25 similar mid-7q imbalances in order to sort out relevant cytogenetic aspects. The propositus was first karyotyped elsewhere at 2 years of age and found to have a de novo 7q+ chromosome. When reassessed at 22 years of age, he exhibited overt mental disability, marked speech delay, mild short stature, frontal bossing, and mild dysmorphisms. The patient's chromosomes were analyzed in metaphases from a lymphocyte culture by means of G-banding and FISH assays with a wcp 7 and two dual probes, namely ELN (7q11)/D7S2686 (7q22) and ELN (7q11)/D7S486, D7S522 (q31). G-bands revealed a 7q21q22.2 direct duplication that was confirmed by FISH: the 7q+ was entirely painted with the wcp and had two 7q22 signals but a single 7q31 signal. Thus, the patient's karyotype was 46,XY, dup(7)(q21q22.2).ish dup(7)(q21 q22.2)(wcp7+, ELN+, D7S2686++, D7S486+)dn. Among 26 interstitial duplications confined to the segment 7q21q34, 13 were contiguous de novo duplications, one was due to a de novo ins (19;7), and 12 were inherited from carriers of inter-/intrachromosomal insertions or complex rearrangements. Mean paternal and maternal ages in de novo contiguous duplications of paternal/unknown (n = 9) or maternal/unknown (n = 10) descent were 33.44 and 30.9 yr whereas median ages were 29 and 30, respectively. The patient's clinical picture confirms the mild or moderate phenotypical repercussion of mid-7q duplications; among 25 patients born alive, 24 (including six teenagers or older) were still alive when reported on.

  18. Duplication 9q34 syndrome.

    OpenAIRE

    Allderdice, P. W.; Eales, B; Onyett, H; Sprague, W; Henderson, K; Lefeuvre, P A; PAL G

    1983-01-01

    Phenotypic, karyotypic, and developmental homology between affected children of carriers of an inverted insertion (9) (q22.1q34.3q34.1) led to recognition of a new chromosome syndrome: dup 9q34. Individuals with dup 9q34 have slight psychomotor retardation, understand simple directions, and acquire a limited vocabulary. In childhood, many are hyperactive. Clinical features include low birth weight, normal birth length, and initial poor feeding and thriving. Musculo-skeletal systems are affect...

  19. Q03I METAR

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — METAR is a routine scheduled observation and is the primary observation code used in the United States to satisfy requirements for reporting surface meteorological...

  20. K87Q METAR

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — METAR is a routine scheduled observation and is the primary observation code used in the United States to satisfy requirements for reporting surface meteorological...

  1. On the subfield subcodes of Hermitian codes

    DEFF Research Database (Denmark)

    Pinero, Fernando; Janwa, Heeralal

    2014-01-01

    We present a fast algorithm using Gröbner basis to compute the dimensions of subfield subcodes of Hermitian codes. With these algorithms we are able to compute the exact values of the dimension of all subfield subcodes up to q ≤ 32 and length up to 215. We show that some of the subfield subcodes ...

  2. Space Time Codes from Permutation Codes

    CERN Document Server

    Henkel, Oliver

    2006-01-01

    A new class of space time codes with high performance is presented. The code design utilizes tailor-made permutation codes, which are known to have large minimal distances as spherical codes. A geometric connection between spherical and space time codes has been used to translate them into the final space time codes. Simulations demonstrate that the performance increases with the block lengths, a result that has been conjectured already in previous work. Further, the connection to permutation codes allows for moderate complex en-/decoding algorithms.

  3. Classification of minimal 1-saturating sets in $PG(2,q)$, $q\\leq 23$

    CERN Document Server

    Bartoli, Daniele; Pambianco, Fernanda

    2012-01-01

    Minimal 1-saturating sets in the projective plane $PG(2,q)$ are considered. They correspond to covering codes which can be applied to many branches of combinatorics and information theory, as data compression, compression with distortion, broadcasting in interconnection network, write-once memory or steganography (see \\cite{Coh} and \\cite{BF2008}). The full classification of all the minimal 1-saturating sets in PG(2,9) and PG(2,11) and the classification of minimal 1-saturating sets of smallest size in PG(2,q), $16\\leq q\\leq 23$ are given. These results have been found using a computer-based exhaustive search that exploits projective equivalence properties.

  4. Fundamentals of convolutional coding

    CERN Document Server

    Johannesson, Rolf

    2015-01-01

    Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field * Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding * Viterbi, BCJR, BEAST, list, and sequential decoding of convolutional codes * Distance properties of convolutional codes * Includes a downloadable solutions manual

  5. List-Message Passing Achieves Capacity on the q-ary Symmetric Channel for Large q

    CERN Document Server

    Zhang, Fan

    2008-01-01

    We discuss and analyze a list-message-passing decoder with verification for low-density parity-check (LDPC) codes on the q-ary symmetric channel (q-SC). Rather than passing messages consisting of symbol probabilities, we pass lists of possible symbols and mark very likely symbols as verified. The density evolution (DE) equations for this decoder are derived and used to compute decoding thresholds. If the maximum list-size is unbounded, then we find that any capacity-achieving LDPC code for the binary erasure channel can be used to achieve capacity on the q-SC for large q. The decoding thresholds are also computed via DE for the case where each list is truncated to satisfy a maximum list-size constraint. We observe that one of the algorithms proposed in [7] is analyzed incorrectly and derive the correct analysis. The probability of false verification (FV) is also considered and techniques are discussed to mitigate the FV. Optimization of the degree distribution is also used to improve the threshold for a fixed...

  6. Discrete logarithm computations over finite fields using Reed-Solomon codes

    OpenAIRE

    Augot, Daniel; Morain, François

    2012-01-01

    Cheng and Wan have related the decoding of Reed-Solomon codes to the computation of discrete logarithms over finite fields, with the aim of proving the hardness of their decoding. In this work, we experiment with solving the discrete logarithm over GF(q^h) using Reed-Solomon decoding. For fixed h and q going to infinity, we introduce an algorithm (RSDL) needing O~(h! q^2) operations over GF(q), operating on a q x q matrix with (h+2) q non-zero coefficients. We give faster variants including a...

  7. Strong Trinucleotide Circular Codes

    Directory of Open Access Journals (Sweden)

    Christian J. Michel

    2011-01-01

    Full Text Available Recently, we identified a hierarchy relation between trinucleotide comma-free codes and trinucleotide circular codes (see our previous works. Here, we extend our hierarchy with two new classes of codes, called DLD and LDL codes, which are stronger than the comma-free codes. We also prove that no circular code with 20 trinucleotides is a DLD code and that a circular code with 20 trinucleotides is comma-free if and only if it is a LDL code. Finally, we point out the possible role of the symmetric group ∑4 in the mathematical study of trinucleotide circular codes.

  8. Joint source channel coding using arithmetic codes

    CERN Document Server

    Bi, Dongsheng

    2009-01-01

    Based on the encoding process, arithmetic codes can be viewed as tree codes and current proposals for decoding arithmetic codes with forbidden symbols belong to sequential decoding algorithms and their variants. In this monograph, we propose a new way of looking at arithmetic codes with forbidden symbols. If a limit is imposed on the maximum value of a key parameter in the encoder, this modified arithmetic encoder can also be modeled as a finite state machine and the code generated can be treated as a variable-length trellis code. The number of states used can be reduced and techniques used fo

  9. Model Children's Code.

    Science.gov (United States)

    New Mexico Univ., Albuquerque. American Indian Law Center.

    The Model Children's Code was developed to provide a legally correct model code that American Indian tribes can use to enact children's codes that fulfill their legal, cultural and economic needs. Code sections cover the court system, jurisdiction, juvenile offender procedures, minor-in-need-of-care, and termination. Almost every Code section is…

  10. Hermitian Self-Orthogonal Constacyclic Codes over Finite Fields

    Directory of Open Access Journals (Sweden)

    Amita Sahni

    2014-01-01

    Full Text Available Necessary and sufficient conditions for the existence of Hermitian self-orthogonal constacyclic codes of length n over a finite field Fq2, n coprime to q, are found. The defining sets and corresponding generator polynomials of these codes are also characterised. A formula for the number of Hermitian self-orthogonal constacyclic codes of length n over a finite field Fq2 is obtained. Conditions for the existence of numerous MDS Hermitian self-orthogonal constacyclic codes are obtained. The defining set and the number of such MDS codes are also found.

  11. Analysis of t(9;17)(q33.2;q25.3) chromosomal breakpoint regions and genetic association reveals novel candidate genes for bipolar disorder

    DEFF Research Database (Denmark)

    Rajkumar, A.P.; Christensen, Jane H.; Mattheisen, Manuel

    2015-01-01

    ,856) data. Genetic associations between these disorders and single nucleotide polymorphisms within these breakpoint regions were analysed by BioQ, FORGE, and RegulomeDB programmes. RESULTS: Four protein-coding genes [coding for (endonuclease V (ENDOV), neuronal pentraxin I (NPTX1), ring finger protein 213...

  12. Q Fever Update, Maritime Canada

    Science.gov (United States)

    Marrie, Thomas J.; Campbell, Nancy; McNeil, Shelly A.; Webster, Duncan

    2008-01-01

    Since the 1990s, reports of Q fever in Nova Scotia, Canada, have declined. Passive surveillance for Q fever in Nova Scotia and its neighboring provinces in eastern Canada indicates that the clinical manifestation of Q fever in the Maritime provinces is pneumonia and that incidence of the disease may fluctuate. PMID:18258080

  13. Speeding up Q (λ)- learning

    NARCIS (Netherlands)

    Wiering, M.A.; Schmidhuber, J.

    1998-01-01

    Q(λ)learning uses TD(λ)methods to accelerate Q-learning. The worst case complexity for a single update step of previous online Q(λ) implementations based on lookup tables is bounded by the size of the state action space.Our faster algorithm's worst case complexity is bounded by the number of

  14. Fast Online Q(lambda)

    NARCIS (Netherlands)

    Wiering, M.A.; Schmidhuber, J.

    1998-01-01

    Q(lambda)-learning uses TD(lambda)-methods to accelerate Q-learning. The update complexity of previous online Q(lambda)implementations based on lookup-tables is bounded by the size of the state-action space. Our faster algorithm's update complexity is bounded by the number of actions. The method is

  15. A q-rious positivity

    CERN Document Server

    Warnaar, S Ole

    2010-01-01

    The $q$-binomial coefficients $\\qbinom{n}{m}=\\prod_{i=1}^m(1-q^{n-m+i})/(1-q^i)$, for integers $0\\le m\\le n$, are known to be polynomials with non-negative integer coefficients. This readily follows from the $q$-binomial theorem, or the many combinatorial interpretations of $\\qbinom{n}{m}$. In this note we conjecture an arithmetically motivated generalisation of the non-negativity property for products of ratios of $q$-factorials that happen to be polynomials.

  16. Rateless feedback codes

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Koike-Akino, Toshiaki; Orlik, Philip

    2012-01-01

    This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both...... the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding....

  17. Mutation screening and association analysis of six candidate genes for autism on chromosome 7q

    DEFF Research Database (Denmark)

    Bonora, Elena; Lamb, Janine A; Barnby, Gabrielle;

    2005-01-01

    Genetic studies have provided evidence for an autism susceptibility locus (AUTS1) on chromosome 7q. Screening for mutations in six genes mapping to 7q, CUTL1, SRPK2, SYPL, LAMB1, NRCAM and PTPRZ1 in 48 unrelated individuals with autism led to the identification of several new coding variants...

  18. Mutation screening and association analysis of six candidate genes for autism on chromosome 7q

    DEFF Research Database (Denmark)

    Bonora, E.; Lamb, J.A.; Barnby, G.;

    2005-01-01

    Genetic studies have provided evidence for an autism susceptibility locus (AUTS1) on chromosome 7q. Screening for mutations in six genes mapping to 7q, CUTL1, SRPK2, SYPL, LAMB1, NRCAM and PTPRZ1 in 48 unrelated individuals with autism led to the identification of several new coding variants in t...

  19. 78 FR 59098 - Proposed Collection; Comment Request for Form 5300 and Schedule Q (Form 5300)

    Science.gov (United States)

    2013-09-25

    ..., Application for Determination for Employee Benefit Plan, and Schedule Q (Form 5300), Elective Determination... Determination for Employee Benefit Plan (Form 5300), and Elective Determination Requests (Schedule Q (Form 5300... Code sections 401(a) and 501(a) set out requirements for qualification of employee benefit trusts...

  20. Coding for dummies

    CERN Document Server

    Abraham, Nikhil

    2015-01-01

    Hands-on exercises help you learn to code like a pro No coding experience is required for Coding For Dummies,your one-stop guide to building a foundation of knowledge inwriting computer code for web, application, and softwaredevelopment. It doesn't matter if you've dabbled in coding or neverwritten a line of code, this book guides you through the basics.Using foundational web development languages like HTML, CSS, andJavaScript, it explains in plain English how coding works and whyit's needed. Online exercises developed by Codecademy, a leading online codetraining site, help hone coding skill

  1. Advanced video coding systems

    CERN Document Server

    Gao, Wen

    2015-01-01

    This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AV

  2. Quantum internet using code division multiple access

    Science.gov (United States)

    Zhang, Jing; Liu, Yu-xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-01-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels. PMID:23860488

  3. The Spirituality of Q

    Directory of Open Access Journals (Sweden)

    Paul Foster

    2015-03-01

    Full Text Available The term spirituality is notoriously difficult to define, as is evidenced by the discussions between contemporary sociologists of religion. If there are any central elements to such a definition, they revolve around the search for the sacred, and the view that certain practices or beliefs lead to humans being placed in a position of privileged access to the transcendent dimension. Often such spiritual experiences and insights are the result of practices that seek deeper communication with the divine, or stem from contemplative reflection upon one’s purpose in a broader context of universal ontology. This discussion seeks to probe Q for its understanding of spirituality, both in terms of the way the text promotes communication with the divine, as well as offering heightened spiritual experience for adherents to its teaching. In essence, this is an exploration of the way the new religious movement reflected in Q offered its followers contact with the transcendent within the context of everyday human life.

  4. Production and Decay of (Q Q Qbar Qbar) States

    CERN Document Server

    Karliner, Marek; Nussinov, Shmuel

    2016-01-01

    The question of whether there exist bound states of two heavy quarks $Q=(c,b)$ and antiquarks $\\bar Q = (\\bar c, \\bar b)$, distinct from a pair of quark-antiquark mesons, has been debated for more than forty years. We suggest some means of producing and observing $Q_1 Q_2 \\bar Q_3 \\bar Q_4$ resonant states, concentrating on the $c c \\bar c \\bar c$ channel which is most easily produced and the $b b \\bar b \\bar b$ channel which has a better chance of being relatively narrow. We obtain $M_{(cc)(\\bar c \\bar c)} = 6,192 \\pm 25$ MeV and $M_{(bb)(\\bar b \\bar b)} = 18,826 \\pm 25$ MeV, for the charmed and bottom tetraquarks, respectively. Experimental search for these states in the relevant mass region is highly desirable.

  5. Effective Q-Q Interactions in Constituent Quark Models

    CERN Document Server

    Glozman, L Ya; Plessas, W; Varga, K; Wagenbrun, R F

    1998-01-01

    We study the performance of some recent potential models suggested as effective interactions between constituent quarks. In particular, we address constituent quark models for baryons with hybrid Q-Q interactions stemming from one-gluon plus meson exchanges. Upon recalculating two of such models we find them to fail in describing the N and \\Delta spectra. Our calculations are based on accurate solutions of the three-quark systems in both a variational Schrödinger and a rigorous Faddeev approach. It is argued that hybrid {Q-Q} interactions encounter difficulties in describing baryon spectra due to the specific contributions from one-gluon and pion exchanges together. In contrast, a chiral constituent quark model with a Q-Q interaction solely derived from Goldstone-boson exchange is capable of providing a unified description of both the N and \\Delta spectra in good agreement with phenomenology.

  6. q-Bernoulli numbers and q-Bernoulli polynomials revisited

    Directory of Open Access Journals (Sweden)

    Kim Taekyun

    2011-01-01

    Full Text Available Abstract This paper performs a further investigation on the q-Bernoulli numbers and q-Bernoulli polynomials given by Acikgöz et al. (Adv Differ Equ, Article ID 951764, 9, 2010, some incorrect properties are revised. It is point out that the generating function for the q-Bernoulli numbers and polynomials is unreasonable. By using the theorem of Kim (Kyushu J Math 48, 73-86, 1994 (see Equation 9, some new generating functions for the q-Bernoulli numbers and polynomials are shown. Mathematics Subject Classification (2000 11B68, 11S40, 11S80

  7. Gauged Q balls

    Energy Technology Data Exchange (ETDEWEB)

    Lee, K.; Stein-Schabes, J.A.; Watkins, R.; Widrow, L.M.

    1989-03-15

    Classical nontopological soliton configurations are considered within the theory of a complex scalar field with a gauged U(1) symmetry. Their existence and stability against dispersion are demonstrated and some of their properties are investigated analytically and numerically. The soliton configuration is such that inside the soliton the local U(1) symmetry is broken, the gauge field becomes massive, and for a range of values of the coupling constants the soliton becomes a superconductor pushing the charge to the surface. Furthermore, because of the repulsive Coulomb force, there is a maximum size for these objects, making impossible the existence of Q matter in bulk form. We also briefly discuss solitons with fermions in a U(1) gauge theory.

  8. Gauged Q-balls

    Science.gov (United States)

    Lee, Kimyeong; Stein-Schabes, Jaime A.; Watkins, Richard; Widrow, Lawrence M.

    1988-01-01

    Classical non-topological soliton configurations are considered within the theory of a complex scalar field with a gauged U symmetry. Their existence and stability against dispersion are demonstrated and some of their properties are investigated analytically and numerically. The soliton configuration is such that inside the soliton the local U symmetry is broken, the gauge field becomes massive and for a range of values of the coupling constants the soliton becomes a superconductor pushing the charge to the surface. Furthermore, because of the repulsive Coulomb force, there is a maximum size for these objects, making impossible the existence of Q-matter in bulk form. Also briefly discussed are solitons with fermions in a U gauge theory.

  9. Gauged Q-balls

    Energy Technology Data Exchange (ETDEWEB)

    Lee, K.; Stein-Schabes, J.A.; Watkins, R.; Widrow, L.M.

    1988-09-01

    Classical non-topological soliton configurations are considered within the theory of a complex scalar field with a gauged U symmetry. Their existence and stability against dispersion are demonstrated and some of their properties are investigated analytically and numerically. The soliton configuration is such that inside the soliton the local U symmetry is broken, the gauge field becomes massive and for a range of values of the coupling constants the soliton becomes a superconductor pushing the charge to the surface. Furthermore, because of the repulsive Coulomb force, there is a maximum size for these objects, making impossible the existence of Q-matter in bulk form. Also briefly discussed are solitons with fermions in a U gauge theory.

  10. Locally Orderless Registration Code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  11. Locally orderless registration code

    DEFF Research Database (Denmark)

    2012-01-01

    This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows.......This is code for the TPAMI paper "Locally Orderless Registration". The code requires intel threadding building blocks installed and is provided for 64 bit on mac, linux and windows....

  12. Efficient data compression from statistical physics of codes over finite fields

    CERN Document Server

    Braunstein, Alfredo; Zecchina, Riccardo

    2011-01-01

    In this paper we discuss a novel data compression technique for binary symmetric sources based on the cavity method over a Galois Field of order q (GF(q)). We present a scheme of low complexity and near optimal empirical performance. The compression step is based on a reduction of sparse low density parity check codes over GF(q) and is done through the so called reinforced belief-propagation equations. These reduced codes appear to have a non-trivial geometrical modification of the space of codewords which makes such compression computationally feasible. The computational complexity is O(d.n.q.log(q)) per iteration, where d is the average degree of the check nodes and n is the number of bits. For our code ensemble, decompression can be done in a time linear in the code's length by a simple leaf-removal algorithm.

  13. A new upper bound on the query complexity for testing generalized Reed-Muller codes

    CERN Document Server

    Ron-Zewi, Noga

    2012-01-01

    Over a finite field $\\F_q$ the $(n,d,q)$-Reed-Muller code is the code given by evaluations of $n$-variate polynomials of total degree at most $d$ on all points (of $\\F_q^n$). The task of testing if a function $f:\\F_q^n \\to \\F_q$ is close to a codeword of an $(n,d,q)$-Reed-Muller code has been of central interest in complexity theory and property testing. The query complexity of this task is the minimal number of queries that a tester can make (minimum over all testers of the maximum number of queries over all random choices) while accepting all Reed-Muller codewords and rejecting words that are $\\delta$-far from the code with probability $\\Omega(\\delta)$. (In this work we allow the constant in the $\\Omega$ to depend on $d$.) In this work we give a new upper bound of $(c q)^{(d+1)/q}$ on the query complexity, where $c$ is a universal constant. In the process we also give new upper bounds on the "spanning weight" of the dual of the Reed-Muller code (which is also a Reed-Muller code). The spanning weight of a co...

  14. QR Codes 101

    Science.gov (United States)

    Crompton, Helen; LaFrance, Jason; van 't Hooft, Mark

    2012-01-01

    A QR (quick-response) code is a two-dimensional scannable code, similar in function to a traditional bar code that one might find on a product at the supermarket. The main difference between the two is that, while a traditional bar code can hold a maximum of only 20 digits, a QR code can hold up to 7,089 characters, so it can contain much more…

  15. Constructing quantum codes

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Quantum error correcting codes are indispensable for quantum information processing and quantum computation.In 1995 and 1996,Shor and Steane gave first several examples of quantum codes from classical error correcting codes.The construction of efficient quantum codes is now an active multi-discipline research field.In this paper we review the known several constructions of quantum codes and present some examples.

  16. Duplication 9q34 syndrome.

    Science.gov (United States)

    Allderdice, P W; Eales, B; Onyett, H; Sprague, W; Henderson, K; Lefeuvre, P A; Pal, G

    1983-09-01

    Phenotypic, karyotypic, and developmental homology between affected children of carriers of an inverted insertion (9) (q22.1q34.3q34.1) led to recognition of a new chromosome syndrome: dup 9q34. Individuals with dup 9q34 have slight psychomotor retardation, understand simple directions, and acquire a limited vocabulary. In childhood, many are hyperactive. Clinical features include low birth weight, normal birth length, and initial poor feeding and thriving. Musculo-skeletal systems are affected: there are joint contractures, long thin limbs, and striking arachnodactyly. There is abnormal implantation of the thumb, increased space between the first and second fingers, and excess digital creases. Marfan syndrome was a provisional diagnosis for several cases prior to cytogenetic analysis. Cardiovascular and ocular systems are minimally affected, erythema and heart murmurs occur, and ptosis and strabismus are frequent, but lens dislocation is not observed. Features at birth include: dolichocephaly, facial asymmetry, narrow horizontal palpebral fissures, microphthalmia, prominent nasal bridge, small mouth, thin upper lip with down-turned corners, and slight retrognathia. In older children, retrognathia is diminished and the nose becomes long and narrow. The new culture and chromosome banding techniques enable sorting of cases with the distal dup 9q phenotype into two groups. The cases with a longer dup 9q are more likely to develop with life-threatening congenital anomalies. The cases with the shorter dup 9q34 have a less severe long-term prognosis and will benefit, together with their parents, from special education. Female carriers of the inv ins(9) (q22.1q34.3q34.1) have about a 31% risk in each pregnancy to conceive a fetus affected by the dup 9q34 syndrome. A comparable figure is not yet available for male carriers.

  17. Q-bank phytoplasma database

    DEFF Research Database (Denmark)

    Contaldo, Nicoletta; Bertaccini, Assunta; Nicolaisen, Mogens

    2014-01-01

    The setting of the Q-Bank database free available on line for quarantine phytoplasma and also for general phytoplasma identification is described. The tool was developed in the frame of the EU-FP7 project Qbol and is linked with a new project Q-collect in order to made widely available the identi......The setting of the Q-Bank database free available on line for quarantine phytoplasma and also for general phytoplasma identification is described. The tool was developed in the frame of the EU-FP7 project Qbol and is linked with a new project Q-collect in order to made widely available...

  18. Q3/Q4 2016 Solar Industry Update

    Energy Technology Data Exchange (ETDEWEB)

    Feldman, David; Boff, Daniel; Margolis, Robert

    2016-12-21

    This technical presentation provides an update on the major trends that occurred in the solar industry in the Q3 and Q4 of 2016. Major topics of focus include global and U.S. supply and demand, module and system price, investment trends and business models, and updates on U.S. government programs supporting the solar industry.

  19. Q2/Q3 2016 Solar Industry Update

    Energy Technology Data Exchange (ETDEWEB)

    Feldman, David; Boff, Daniel; Margolis, Robert

    2016-10-11

    This technical presentation provides an update on the major trends that occurred in the solar industry in the Q2 and Q3 of 2016. Major topics of focus include global and U.S. supply and demand, module and system price, investment trends and business models, and updates on U.S. government programs supporting the solar industry.

  20. Turbo Codes Extended with Outer BCH Code

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1996-01-01

    The "error floor" observed in several simulations with the turbo codes is verified by calculation of an upper bound to the bit error rate for the ensemble of all interleavers. Also an easy way to calculate the weight enumerator used in this bound is presented. An extended coding scheme is proposed...

  1. Discrete logarithm computations over finite fields using Reed-Solomon codes

    CERN Document Server

    Augot, Daniel

    2012-01-01

    Cheng and Wan have related the decoding of Reed-Solomon codes to the computation of discrete logarithms over finite fields, with the aim of proving the hardness of their decoding. In this work, we experiment with solving the discrete logarithm over GF(q^h) using Reed-Solomon decoding. For fixed h and q going to infinity, we introduce an algorithm (RSDL) needing O (h! q^2) operations over GF(q), operating on a q x q matrix with (h+2) q non-zero coefficients. We give faster variants including an incremental version and another one that uses auxiliary finite fields that need not be subfields of GF(q^h); this variant is very practical for moderate values of q and h. We include some numerical results of our first implementations.

  2. Hybrid Noncoherent Network Coding

    CERN Document Server

    Skachek, Vitaly; Nedic, Angelia

    2011-01-01

    We describe a novel extension of subspace codes for noncoherent networks, suitable for use when the network is viewed as a communication system that introduces both dimension and symbol errors. We show that when symbol erasures occur in a significantly large number of different basis vectors transmitted through the network and when the min-cut of the networks is much smaller then the length of the transmitted codewords, the new family of codes outperforms their subspace code counterparts. For the proposed coding scheme, termed hybrid network coding, we derive two upper bounds on the size of the codes. These bounds represent a variation of the Singleton and of the sphere-packing bound. We show that a simple concatenated scheme that represents a combination of subspace codes and Reed-Solomon codes is asymptotically optimal with respect to the Singleton bound. Finally, we describe two efficient decoding algorithms for concatenated subspace codes that in certain cases have smaller complexity than subspace decoder...

  3. Exact-MSR Codes for Distributed Storage with Low Repair Complexity

    CERN Document Server

    Xie, Hongmei

    2012-01-01

    In this paper, we propose two new constructions of exact-repair minimum storage regenerating (exact-MSR) codes. For both constructions, the encoded symbols are obtained by treating the message vector over GF(q) as a linearized polynomial and evaluating it over an extension field GF(q^m). For our exact-MSR codes, data repair does not need matrix inversion, and can be implemented by additions and multiplications over GF$(q)$ as well as cyclic shifts when a normal basis is used. The two constructions assume a base field of GF(q) (q>2) and GF(2), respectively. In contrast to existing constructions of exact-MSR codes, the former construction works for arbitrary code parameters, provided that $q$ is large enough. This is the first construction of exact-MSR codes with arbitrary code parameters, to the best of our knowledge. In comparison to existing exact-MSR codes, while data construction of our exact-MSR codes has a higher complexity, the complexity of data repair is lower. Thus, they are attractive for applicatio...

  4. Weight hierarchies of linear codes satisfying the almost chain condition

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    The weight hierarchy of a linear [n, k; q] code C over GF(q) is the sequence (d1, d2,…,dk) where dr is the size of the smallest support of an r-dimensional subcode of C. An [n, k; q] codehas dimension r and support of size dr for all r. Further, C satisfies the almost chain condition ifit does not satisfy the chain condition, but there exist subcodes Dr of dimension r and support offor a sequence to be the weight hierarchy of a code satisfying the almost chain condition is given.Further, explicit constructions of such codes are given, showing that in almost all cases, the necessaryconditions are also sufficient.

  5. Ternary codes associated with symplectic groups and power moments of Kloosterman sums with square arguments

    OpenAIRE

    Kim, Dae San; Kim, Ji Hyun

    2011-01-01

    In this paper, we construct two ternary linear codes associated with the symplectic groups Sp(2,q) and Sp(4,q). Here q is a power of three. Then we obtain recursive formulas for the power moments of Kloosterman sums with square arguments and for the even power moments of those in terms of the frequencies of weights in the codes. This is done via Pless power moment identity and by utilizing the explicit expressions of "Gauss sums" for the symplectic groups Sp(2n,q).

  6. Q-bank phytoplasma database

    DEFF Research Database (Denmark)

    Contaldo, Nicoletta; Bertaccini, Assunta; Nicolaisen, Mogens

    2014-01-01

    The setting of the Q-Bank database free available on line for quarantine phytoplasma and also for general phytoplasma identification is described. The tool was developed in the frame of the EU-FP7 project Qbol and is linked with a new project Q-collect in order to made widely available...

  7. On Q-derived polynomials

    NARCIS (Netherlands)

    R.J. Stroeker (Roel)

    2002-01-01

    textabstractA Q-derived polynomial is a univariate polynomial, defined over the rationals, with the property that its zeros, and those of all its derivatives are rational numbers. There is a conjecture that says that Q-derived polynomials of degree 4 with distinct roots for themselves and all their

  8. On Q-derived polynomials

    NARCIS (Netherlands)

    R.J. Stroeker (Roel)

    2006-01-01

    textabstractA Q-derived polynomial is a univariate polynomial, defined over the rationals, with the property that its zeros, and those of all its derivatives are rational numbers. There is a conjecture that says that Q-derived polynomials of degree 4 with distinct roots for themselves and all their

  9. Q fever: The Dutch Policy

    NARCIS (Netherlands)

    Bruschke, C.J.M.; Roest, H.I.J.; Coutinho, R.A.

    2016-01-01

    Between 2007 and 2010, the Netherlands experienced an unprecedented outbreak of Q fever of more than 4000 human cases. Q fever infections of dairy goats, leading to abortion waves, were considered to be the cause of this outbreak. Measures to combat the outbreak had to be taken based on limited scie

  10. Network coding for computing: Linear codes

    CERN Document Server

    Appuswamy, Rathinakumar; Karamchandani, Nikhil; Zeger, Kenneth

    2011-01-01

    In network coding it is known that linear codes are sufficient to achieve the coding capacity in multicast networks and that they are not sufficient in general to achieve the coding capacity in non-multicast networks. In network computing, Rai, Dey, and Shenvi have recently shown that linear codes are not sufficient in general for solvability of multi-receiver networks with scalar linear target functions. We study single receiver networks where the receiver node demands a target function of the source messages. We show that linear codes may provide a computing capacity advantage over routing only when the receiver demands a `linearly-reducible' target function. % Many known target functions including the arithmetic sum, minimum, and maximum are not linearly-reducible. Thus, the use of non-linear codes is essential in order to obtain a computing capacity advantage over routing if the receiver demands a target function that is not linearly-reducible. We also show that if a target function is linearly-reducible,...

  11. Analysis of t(9;17)(q33.2;q25.3) chromosomal breakpoint regions and genetic association reveals novel candidate genes for bipolar disorder

    DEFF Research Database (Denmark)

    Rajkumar, A.P.; Christensen, Jane H.; Mattheisen, Manuel

    2015-01-01

    OBJECTIVES: Breakpoints of chromosomal abnormalities facilitate identification of novel candidate genes for psychiatric disorders. Genome-wide significant evidence supports the linkage between chromosome 17q25.3 and bipolar disorder (BD). Co-segregation of translocation t(9;17)(q33.2;q25.......3) with psychiatric disorders has been reported. We aimed to narrow down these chromosomal breakpoint regions and to investigate the associations between single nucleotide polymorphisms within these regions and BD as well as schizophrenia (SZ) in large genome-wide association study samples. METHODS: We cross......,856) data. Genetic associations between these disorders and single nucleotide polymorphisms within these breakpoint regions were analysed by BioQ, FORGE, and RegulomeDB programmes. RESULTS: Four protein-coding genes [coding for (endonuclease V (ENDOV), neuronal pentraxin I (NPTX1), ring finger protein 213...

  12. Practices in Code Discoverability

    CERN Document Server

    Teuben, Peter; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Much of scientific progress now hinges on the reliability, falsifiability and reproducibility of computer source codes. Astrophysics in particular is a discipline that today leads other sciences in making useful scientific components freely available online, including data, abstracts, preprints, and fully published papers, yet even today many astrophysics source codes remain hidden from public view. We review the importance and history of source codes in astrophysics and previous efforts to develop ways in which information about astrophysics codes can be shared. We also discuss why some scientist coders resist sharing or publishing their codes, the reasons for and importance of overcoming this resistance, and alert the community to a reworking of one of the first attempts for sharing codes, the Astrophysics Source Code Library (ASCL). We discuss the implementation of the ASCL in an accompanying poster paper. We suggest that code could be given a similar level of referencing as data gets in repositories such ...

  13. Coding for optical channels

    CERN Document Server

    Djordjevic, Ivan; Vasic, Bane

    2010-01-01

    This unique book provides a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory and optical communication.

  14. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  15. Refactoring test code

    NARCIS (Netherlands)

    A. van Deursen (Arie); L.M.F. Moonen (Leon); A. van den Bergh; G. Kok

    2001-01-01

    textabstractTwo key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from

  16. Informal Control code logic

    CERN Document Server

    Bergstra, Jan A

    2010-01-01

    General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

  17. Gauge color codes

    DEFF Research Database (Denmark)

    Bombin Palomo, Hector

    2015-01-01

    Color codes are topological stabilizer codes with unusual transversality properties. Here I show that their group of transversal gates is optimal and only depends on the spatial dimension, not the local geometry. I also introduce a generalized, subsystem version of color codes. In 3D they allow...

  18. Refactoring test code

    NARCIS (Netherlands)

    Deursen, A. van; Moonen, L.M.F.; Bergh, A. van den; Kok, G.

    2001-01-01

    Two key aspects of extreme programming (XP) are unit testing and merciless refactoring. Given the fact that the ideal test code / production code ratio approaches 1:1, it is not surprising that unit tests are being refactored. We found that refactoring test code is different from refactoring product

  19. ARC Code TI: CODE Software Framework

    Data.gov (United States)

    National Aeronautics and Space Administration — CODE is a software framework for control and observation in distributed environments. The basic functionality of the framework allows a user to observe a distributed...

  20. ARC Code TI: ROC Curve Code Augmentation

    Data.gov (United States)

    National Aeronautics and Space Administration — ROC (Receiver Operating Characteristic) curve Code Augmentation was written by Rodney Martin and John Stutz at NASA Ames Research Center and is a modification of ROC...

  1. Fountain Codes: LT And Raptor Codes Implementation

    Directory of Open Access Journals (Sweden)

    Ali Bazzi, Hiba Harb

    2017-01-01

    Full Text Available Digital fountain codes are a new class of random error correcting codes designed for efficient and reliable data delivery over erasure channels such as internet. These codes were developed to provide robustness against erasures in a way that resembles a fountain of water. A digital fountain is rateless in a way that sender can send limitless number of encoded packets. The receiver doesn’t care which packets are received or lost as long as the receiver gets enough packets to recover original data. In this paper, the design of the fountain codes is explored with its implementation of the encoding and decoding algorithm so that the performance in terms of encoding/decoding symbols, reception overhead, data length, and failure probability is studied.

  2. Fragility in the 14q21q translocation region

    Directory of Open Access Journals (Sweden)

    Stacy R. Denison

    2002-01-01

    Full Text Available Aphidicolin (APC-induced chromosomal breakage was analyzed for women representing three generations of a single family and carrying a Robertsonian translocation rob(14q21q. Fluorescence in situ hybridization (FISH analysis confirmed the dicentric constitution of the derived chromosome and indicated the absence of beta-satellite signal at the translocation region. Per-individual analysis of metaphases from APC-treated peripheral blood lymphocyte cultures identified significantly nonrandom chromosomal breakage at the translocation region in all three individuals examined. The APC-inducible fragility at the 14q21q translocation region suggests that this rearrangement was the result of chromosomal mutation at fragile site(s in the progenitor chromosomes, or that this fragility was the result of the fusion of nonfragile progenitor chromosomes.

  3. Universal Rateless Codes From Coupled LT Codes

    CERN Document Server

    Aref, Vahid

    2011-01-01

    It was recently shown that spatial coupling of individual low-density parity-check codes improves the belief-propagation threshold of the coupled ensemble essentially to the maximum a posteriori threshold of the underlying ensemble. We study the performance of spatially coupled low-density generator-matrix ensembles when used for transmission over binary-input memoryless output-symmetric channels. We show by means of density evolution that the threshold saturation phenomenon also takes place in this setting. Our motivation for studying low-density generator-matrix codes is that they can easily be converted into rateless codes. Although there are already several classes of excellent rateless codes known to date, rateless codes constructed via spatial coupling might offer some additional advantages. In particular, by the very nature of the threshold phenomenon one expects that codes constructed on this principle can be made to be universal, i.e., a single construction can uniformly approach capacity over the cl...

  4. Software Certification - Coding, Code, and Coders

    Science.gov (United States)

    Havelund, Klaus; Holzmann, Gerard J.

    2011-01-01

    We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. The flight software that controls these spacecraft is considered to be mission critical. We argue that the goal of a software certification process cannot be the development of "perfect" software, i.e., software that can be formally proven to be correct under all imaginable and unimaginable circumstances. More realistically, the goal is to guarantee a software development process that is conducted by knowledgeable engineers, who follow generally accepted procedures to control known risks, while meeting agreed upon standards of workmanship. We target three specific issues that must be addressed in such a certification procedure: the coding process, the code that is developed, and the skills of the coders. The coding process is driven by standards (e.g., a coding standard) and tools. The code is mechanically checked against the standard with the help of state-of-the-art static source code analyzers. The coders, finally, are certified in on-site training courses that include formal exams.

  5. The Genetic Codes: Mathematical Formulae and an Inverse Symmetry-Information Relationship

    Directory of Open Access Journals (Sweden)

    Tidjani Négadi

    2016-12-01

    Full Text Available First, mathematical formulae faithfully describing the distributions of amino acids and codons and reproducing the degeneracies in the various known genetic codes, including the standard genetic code, are constructed, by hand. Second, we summarize another mathematical approach relying on the use of q-deformations to describe these same genetic codes, and add a new application not considered before. Third, by considering these same genetic codes, we find, qualitatively, that an inverse symmetry-information relationship exists.

  6. Coding for Electronic Mail

    Science.gov (United States)

    Rice, R. F.; Lee, J. J.

    1986-01-01

    Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.

  7. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  8. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2009-01-01

    Property testing was initially studied from various motivations in 1990's.A code C (∩)GF(r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector's coordinates.The problem of testing codes was firstly studied by Blum,Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs).How to characterize locally testable codes is a complex and challenge problem.The local tests have been studied for Reed-Solomon (RS),Reed-Muller (RM),cyclic,dual of BCH and the trace subcode of algebraicgeometric codes.In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions).We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  9. Chinese remainder codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Aili; LIU Xiufeng

    2006-01-01

    Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory.The new type of linear codes take the congruence class in the congruence class ring R/I1 ∩ I2 ∩…∩ In for the information bit,embed R/Ji into R/I1 ∩ I2 ∩…∩ In,and assign the cosets of R/Ji as the subring of R/I1 ∩ I2 ∩…∩ In and the cosets of R/Ji in R/I1 ∩ I2 ∩…∩ In as check lines.Many code classes exist in the Chinese remainder codes that have high code rates.Chinese remainder codes are the essential generalization of Sun Zi codes.

  10. Chinese Remainder Codes

    Institute of Scientific and Technical Information of China (English)

    张爱丽; 刘秀峰; 靳蕃

    2004-01-01

    Chinese Remainder Codes are constructed by applying weak block designs and Chinese Remainder Theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I1∩I2∩…∩In for the information bit, embed R/Ji into R/I1∩I2∩…∩In, and asssign the cosets of R/Ji as the subring of R/I1∩I2∩…∩In and the cosets of R/Ji in R/I1∩I2∩…∩In as check lines. There exist many code classes in Chinese Remainder Codes, which have high code rates. Chinese Remainder Codes are the essential generalization of Sun Zi Codes.

  11. Code of Ethics

    DEFF Research Database (Denmark)

    Adelstein, Jennifer; Clegg, Stewart

    2016-01-01

    Ethical codes have been hailed as an explicit vehicle for achieving more sustainable and defensible organizational practice. Nonetheless, when legal compliance and corporate governance codes are conflated, codes can be used to define organizational interests ostentatiously by stipulating norms...... for employee ethics. Such codes have a largely cosmetic and insurance function, acting subtly and strategically to control organizational risk management and protection. In this paper, we conduct a genealogical discourse analysis of a representative code of ethics from an international corporation...... to understand how management frames expectations of compliance. Our contribution is to articulate the problems inherent in codes of ethics, and we make some recommendations to address these to benefit both an organization and its employees. In this way, we show how a code of ethics can provide a foundation...

  12. Defeating the coding monsters.

    Science.gov (United States)

    Colt, Ross

    2007-02-01

    Accuracy in coding is rapidly becoming a required skill for military health care providers. Clinic staffing, equipment purchase decisions, and even reimbursement will soon be based on the coding data that we provide. Learning the complicated myriad of rules to code accurately can seem overwhelming. However, the majority of clinic visits in a typical outpatient clinic generally fall into two major evaluation and management codes, 99213 and 99214. If health care providers can learn the rules required to code a 99214 visit, then this will provide a 90% solution that can enable them to accurately code the majority of their clinic visits. This article demonstrates a step-by-step method to code a 99214 visit, by viewing each of the three requirements as a monster to be defeated.

  13. Testing algebraic geometric codes

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Property testing was initially studied from various motivations in 1990’s. A code C  GF (r)n is locally testable if there is a randomized algorithm which can distinguish with high possibility the codewords from a vector essentially far from the code by only accessing a very small (typically constant) number of the vector’s coordinates. The problem of testing codes was firstly studied by Blum, Luby and Rubinfeld and closely related to probabilistically checkable proofs (PCPs). How to characterize locally testable codes is a complex and challenge problem. The local tests have been studied for Reed-Solomon (RS), Reed-Muller (RM), cyclic, dual of BCH and the trace subcode of algebraicgeometric codes. In this paper we give testers for algebraic geometric codes with linear parameters (as functions of dimensions). We also give a moderate condition under which the family of algebraic geometric codes cannot be locally testable.

  14. Serially Concatenated IRA Codes

    CERN Document Server

    Cheng, Taikun; Belzer, Benjamin J

    2007-01-01

    We address the error floor problem of low-density parity check (LDPC) codes on the binary-input additive white Gaussian noise (AWGN) channel, by constructing a serially concatenated code consisting of two systematic irregular repeat accumulate (IRA) component codes connected by an interleaver. The interleaver is designed to prevent stopping-set error events in one of the IRA codes from propagating into stopping set events of the other code. Simulations with two 128-bit rate 0.707 IRA component codes show that the proposed architecture achieves a much lower error floor at higher SNRs, compared to a 16384-bit rate 1/2 IRA code, but incurs an SNR penalty of about 2 dB at low to medium SNRs. Experiments indicate that the SNR penalty can be reduced at larger blocklengths.

  15. Q fever in French Guiana.

    Science.gov (United States)

    Eldin, Carole; Mahamat, Aba; Demar, Magalie; Abboud, Philippe; Djossou, Félix; Raoult, Didier

    2014-10-01

    Coxiella burnetii, the causative agent of Q fever, is present worldwide. Recent studies have shown that this bacterium is an emerging pathogen in French Guiana and has a high prevalence (24% of community-acquired pneumonia). In this review, we focus on the peculiar epidemiology of Q fever in French Guiana. We place it in the context of the epidemiology of the disease in the surrounding countries of South America. We also review the clinical features of Q fever in this region, which has severe initial presentation but low mortality rates. These characteristics seem to be linked to a unique genotype (genotype 17). Finally, we discuss the issue of the animal reservoir of C. burnetii in French Guiana, which is still unknown. Further studies are necessary to identify this reservoir. Identification of this reservoir will improve the understanding of the Q fever epidemic in French Guiana and will provide new tools to control this public health problem.

  16. Q Vara ehitab tootmismaad laopargiks

    Index Scriptorium Estoniae

    2007-01-01

    Kinnisvarafirma Q Vara OÜ alustab 2007. a. mais Rae vallas Tallinna ringtee ääres asuva 168000 m2 suuruse tootmismaa ümberehitamist laopargiks. Ettevõtte projektijuhi Jaak Puistma sõnul jagatakse laopark 22 krundiks

  17. Minimum Q Electrically Small Antennas

    DEFF Research Database (Denmark)

    Kim, O. S.

    2012-01-01

    for a multiarm spherical helix antenna confirm the theoretical predictions. For example, a 4-arm spherical helix antenna with a magnetic-coated perfectly electrically conducting core (ka=0.254) exhibits the Q of 0.66 times the Chu lower bound, or 1.25 times the minimum Q.......Theoretically, the minimum radiation quality factor Q of an isolated resonance can be achieved in a spherical electrically small antenna by combining TM1m and TE1m spherical modes, provided that the stored energy in the antenna spherical volume is totally suppressed. Using closed-form expressions...... for the stored energies obtained through the vector spherical wave theory, it is shown that a magnetic-coated metal core reduces the internal stored energy of both TM1m and TE1m modes simultaneously, so that a self-resonant antenna with the Q approaching the fundamental minimum is created. Numerical results...

  18. FEMA Q3 Flood Data

    Data.gov (United States)

    Kansas Data Access and Support Center — The Q3 Flood Data are derived from the Flood Insurance Rate Maps (FIRMS) published by the Federal Emergency Management Agency (FEMA). The file is georeferenced to...

  19. pyJacqQ: Python Implementation of Jacquez's Q-Statistics for Space-Time Clustering of Disease Exposure in Case-Control Studies

    OpenAIRE

    Jirjies, Saman; Wallstrom, Garrick; Rolf U. Halden; Scotch, Matthew

    2016-01-01

    Jacquez's Q is a set of statistics for detecting the presence and location of space-time clusters of disease exposure. Until now, the only implementation was available in the proprietary SpaceStat software which is not suitable for a pipeline Linux environment. We have developed an open source implementation of Jacquez's Q statistics in Python using an object-oriented approach. The most recent source code for the implementation is available at https://github.com/sjirjies/pyJacqQ under the GPL...

  20. Civilsamfundets ABC: Q for Quango

    DEFF Research Database (Denmark)

    Lund, Anker Brink; Meyer, Gitte

    2016-01-01

    Bogstaveligt talt: Hvad er civilsamfundet? Anker Brink Lund og Gitte Meyer fra CBS Center for Civil Society Studies gennemgår civilsamfundet bogstav for bogstav. Vi er nået til Q for Quango.......Bogstaveligt talt: Hvad er civilsamfundet? Anker Brink Lund og Gitte Meyer fra CBS Center for Civil Society Studies gennemgår civilsamfundet bogstav for bogstav. Vi er nået til Q for Quango....

  1. q-ary compressive sensing

    OpenAIRE

    Mroueh, Youssef; Rosasco, Lorenzo

    2013-01-01

    We introduce q-ary compressive sensing, an extension of 1-bit compressive sensing. We propose a novel sensing mechanism and a corresponding recovery procedure. The recovery properties of the proposed approach are analyzed both theoretically and empirically. Results in 1-bit compressive sensing are recovered as a special case. Our theoretical results suggest a tradeoff between the quantization parameter q, and the number of measurements m in the control of the error of the resulting recovery a...

  2. Some properties of deformed q-numbers

    OpenAIRE

    Lobão, Thierry C. Petit; Cardoso, Pedro G. S.; Pinho, Suani T. R.; Borges, Ernesto P.

    2009-01-01

    p. 402/407 Nonextensive statistical mechanics has been a source of investigation in mathematical structures such as deformed algebraic structures. In this work, we present some consequences of q-operations on the construction of q-numbers for all numerical sets. Based on such a construction, we present a new product that distributes over the q-sum. Finally, we present different patterns of q-Pascal’s triangles, based on q-sum, whose elements are q-numbers.

  3. Some properties of deformed $q$-numbers

    OpenAIRE

    Lobão, Thierry C. Petit; Cardoso, Pedro G. S.; Pinho, Suani T. R.; Borges, Ernesto P.

    2009-01-01

    Nonextensive statistical mechanics has been a source of investigation in mathematical structures such as deformed algebraic structures. In this work, we present some consequences of $q$-operations on the construction of $q$-numbers for all numerical sets. Based on such a construction, we present a new product that distributes over the $q$-sum. Finally, we present different patterns of $q$-Pascal's triangles, based on $q$-sum, whose elements are $q$-numbers.

  4. Coagulation factor VII, serum-triglycerides and the R/Q353 polymorphism: Differences between older men and women

    NARCIS (Netherlands)

    Mennen, L.I.; Maat, M.P.M. de; Schouten, E.G.; Kluft, C.; Jong, P.T.V.M. de; Hofman, A.; Grobbee, D.E.

    1997-01-01

    Coagulation factor VII activity (FVII:C) is a risk indicator for cardiovascular disease. It is related to serum-triglycerides and the R/Q353 polymorphism (alleles R and Q) in the gene coding for factor VII is strongly associated with factor VU[. The association of serum-triglycerides with factor VII

  5. Coagulation factor VII, serum-triglycerides and the R/Q353 polymorphism: Differences between older men and women

    NARCIS (Netherlands)

    Mennen, L.I.; Maat, M.P.M. de; Schouten, E.G.; Kluft, C.; Jong, P.T.V.M. de; Hofman, A.; Grobbee, D.E.

    1997-01-01

    Coagulation factor VII activity (FVII:C) is a risk indicator for cardiovascular disease. It is related to serum-triglycerides and the R/Q353 polymorphism (alleles R and Q) in the gene coding for factor VII is strongly associated with factor VU[. The association of serum-triglycerides with factor VII

  6. Energy-Dependent Fission Q Values Generalized for All Actinides

    Energy Technology Data Exchange (ETDEWEB)

    Vogt, R

    2008-09-25

    We generalize Madland's parameterization of the energy release in fission to obtain the dependence of the fission Q values on incident neutron energy, E{sub n}, for all major and minor actinides. These Q(E{sub n}) parameterizations are included in the ENDL2008 release. This paper describes calculations of energy-dependent fission Q values based on parameterizations of the prompt energy release in fission [1], developed by Madland [1] to describe the prompt energy release in neutron-induced fission of {sup 235}U, {sup 238}U, and {sup 239}Pu. The energy release is then related to the energy deposited during fission so that experimentally measurable quantities can be used to obtain the Q values. A discussion of these specific parameterizations and their implementation in the processing code for Monte Carlo neutron transport, MCFGEN, [2] is described in Ref. [3]. We extend this model to describe Q(E) for all actinides, major and minor, in the Evaluated Nuclear Data Library (ENDL) 2008 release, ENDL2008.

  7. Rewriting the Genetic Code.

    Science.gov (United States)

    Mukai, Takahito; Lajoie, Marc J; Englert, Markus; Söll, Dieter

    2017-09-08

    The genetic code-the language used by cells to translate their genomes into proteins that perform many cellular functions-is highly conserved throughout natural life. Rewriting the genetic code could lead to new biological functions such as expanding protein chemistries with noncanonical amino acids (ncAAs) and genetically isolating synthetic organisms from natural organisms and viruses. It has long been possible to transiently produce proteins bearing ncAAs, but stabilizing an expanded genetic code for sustained function in vivo requires an integrated approach: creating recoded genomes and introducing new translation machinery that function together without compromising viability or clashing with endogenous pathways. In this review, we discuss design considerations and technologies for expanding the genetic code. The knowledge obtained by rewriting the genetic code will deepen our understanding of how genomes are designed and how the canonical genetic code evolved.

  8. On Polynomial Remainder Codes

    CERN Document Server

    Yu, Jiun-Hung

    2012-01-01

    Polynomial remainder codes are a large class of codes derived from the Chinese remainder theorem that includes Reed-Solomon codes as a special case. In this paper, we revisit these codes and study them more carefully than in previous work. We explicitly allow the code symbols to be polynomials of different degrees, which leads to two different notions of weight and distance. Algebraic decoding is studied in detail. If the moduli are not irreducible, the notion of an error locator polynomial is replaced by an error factor polynomial. We then obtain a collection of gcd-based decoding algorithms, some of which are not quite standard even when specialized to Reed-Solomon codes.

  9. Generating code adapted for interlinking legacy scalar code and extended vector code

    Science.gov (United States)

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  10. The aeroelastic code FLEXLAST

    Energy Technology Data Exchange (ETDEWEB)

    Visser, B. [Stork Product Eng., Amsterdam (Netherlands)

    1996-09-01

    To support the discussion on aeroelastic codes, a description of the code FLEXLAST was given and experiences within benchmarks and measurement programmes were summarized. The code FLEXLAST has been developed since 1982 at Stork Product Engineering (SPE). Since 1992 FLEXLAST has been used by Dutch industries for wind turbine and rotor design. Based on the comparison with measurements, it can be concluded that the main shortcomings of wind turbine modelling lie in the field of aerodynamics, wind field and wake modelling. (au)

  11. Opening up codings?

    DEFF Research Database (Denmark)

    Steensig, Jakob; Heinemann, Trine

    2015-01-01

    We welcome Tanya Stivers’s discussion (Stivers, 2015/this issue) of coding social interaction and find that her descriptions of the processes of coding open up important avenues for discussion, among other things of the precise ad hoc considerations that researchers need to bear in mind, both when....... Instead we propose that the promise of coding-based research lies in its ability to open up new qualitative questions....

  12. Industrial Computer Codes

    Science.gov (United States)

    Shapiro, Wilbur

    1996-01-01

    This is an overview of new and updated industrial codes for seal design and testing. GCYLT (gas cylindrical seals -- turbulent), SPIRALI (spiral-groove seals -- incompressible), KTK (knife to knife) Labyrinth Seal Code, and DYSEAL (dynamic seal analysis) are covered. CGYLT uses G-factors for Poiseuille and Couette turbulence coefficients. SPIRALI is updated to include turbulence and inertia, but maintains the narrow groove theory. KTK labyrinth seal code handles straight or stepped seals. And DYSEAL provides dynamics for the seal geometry.

  13. ARC Code TI: ACCEPT

    Data.gov (United States)

    National Aeronautics and Space Administration — ACCEPT consists of an overall software infrastructure framework and two main software components. The software infrastructure framework consists of code written to...

  14. QR codes for dummies

    CERN Document Server

    Waters, Joe

    2012-01-01

    Find out how to effectively create, use, and track QR codes QR (Quick Response) codes are popping up everywhere, and businesses are reaping the rewards. Get in on the action with the no-nonsense advice in this streamlined, portable guide. You'll find out how to get started, plan your strategy, and actually create the codes. Then you'll learn to link codes to mobile-friendly content, track your results, and develop ways to give your customers value that will keep them coming back. It's all presented in the straightforward style you've come to know and love, with a dash of humor thrown

  15. Tokamak Systems Code

    Energy Technology Data Exchange (ETDEWEB)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  16. MORSE Monte Carlo code

    Energy Technology Data Exchange (ETDEWEB)

    Cramer, S.N.

    1984-01-01

    The MORSE code is a large general-use multigroup Monte Carlo code system. Although no claims can be made regarding its superiority in either theoretical details or Monte Carlo techniques, MORSE has been, since its inception at ORNL in the late 1960s, the most widely used Monte Carlo radiation transport code. The principal reason for this popularity is that MORSE is relatively easy to use, independent of any installation or distribution center, and it can be easily customized to fit almost any specific need. Features of the MORSE code are described.

  17. Partial monosomy 8q and partial trisomy 9q due to the maternal translocation t(8;9(q24.3;q34.1)

    DEFF Research Database (Denmark)

    Tos, T; Alp, M Y; Eker, H K;

    2014-01-01

    Partial trisomy 9q34-qter and partial monosomy 8q24.3-qter are very rare chromosomal abnormalities. Characteristic features of partial trisomy 9q34-qter are hypotonia, developmental delay, mild intellectual disability, dolichocephaly, distinct facial phenotype, long and thin fingers, and cardiac...... anomalies. Unlike the partial trisomy 9q34-qter, partial monosomy 8q24.3-qter has no distinct phenotype. Here we report a four years old female patient with partial trisomy 9q34-qter and partial monosomy 8q24.3-qter due to the maternal translocation t(8;9)(q24.3;q34. I). She has developmental delay......, brachycephaly, facial dysmorphism, hand and foot anomalies, bilateral hearing loss, cardiac defect and abnormal brain MRI findings. To the best of our knowledge, this is the first report of the combination of partial trisomy 9q and partial monosomy 8q....

  18. Delineation of a deletion region critical for corpus callosal abnormalities in chromosome 1q43-q44.

    Science.gov (United States)

    Nagamani, Sandesh C Sreenath; Erez, Ayelet; Bay, Carolyn; Pettigrew, Anjana; Lalani, Seema R; Herman, Kristin; Graham, Brett H; Nowaczyk, Malgorzata Jm; Proud, Monica; Craigen, William J; Hopkins, Bobbi; Kozel, Beth; Plunkett, Katie; Hixson, Patricia; Stankiewicz, Pawel; Patel, Ankita; Cheung, Sau Wai

    2012-02-01

    Submicroscopic deletions involving chromosome 1q43-q44 result in cognitive impairment, microcephaly, growth restriction, dysmorphic features, and variable involvement of other organ systems. A consistently observed feature in patients with this deletion are the corpus callosal abnormalities (CCAs), ranging from thinning and hypoplasia to complete agenesis. Previous studies attempting to delineate the critical region for CCAs have yielded inconsistent results. We conducted a detailed clinical and molecular characterization of seven patients with deletions of chromosome 1q43-q44. Using array comparative genomic hybridization, we mapped the size, extent, and genomic content of these deletions. Four patients had CCAs, and shared the smallest region of overlap that contains only three protein coding genes, CEP170, SDCCAG8, and ZNF238. One patient with a small deletion involving SDCCAG8 and AKT3, and another patient with an intragenic deletion of AKT3 did not have any CCA, implying that the loss of these two genes is unlikely to be the cause of CCA. CEP170 is expressed extensively in the brain, and encodes for a protein that is a component of the centrosomal complex. ZNF238 is involved in control of neuronal progenitor cells and survival of cortical neurons. Our results rule out the involvement of AKT3, and implicate CEP170 and/or ZNF238 as novel genes causative for CCA in patients with a terminal 1q deletion.

  19. Pure partial trisomy 4q syndrome in a child with der(9)ins(9;4)(q34.3;q26q35.2)mat.

    Science.gov (United States)

    Topcu, V; Ilgin-Ruhi, H; Yurur-Kutlay, N; Ekici, C; Vicdan, A; Tukun, F A

    2014-01-01

    Pure partial trisomy 4q syndrome in a child with der(9)ins(9;4)(q34.3;q26q35.2)mat: Partial trisomy 4q is a rare chromosomal abnormality and mostly results from unbalanced inheritance of balanced parental chromosomal translocations. Here, we present a 5-year-old boy with partial trisomy 4q who exhibited distinctive features of 'pure' partial trisomy 4q syndrome including moderate mental and growth retardation, microcephaly, peculiar face appearance, tooth anomaly, cleft palate, language handicap, preaxial polydactyly, and urogenital anomaly. Karyotype analysis of the child revealed der(9)ins(9;4)(q34.3;q26q35.2) inherited from mother carrying ins(9;4)(q34.3;q26q35.2) resulting in trisomy of the 4q26qter segment. Whole chromosome painting, locus specific, and subtelomeric FISH analysis in mother proved that q26qter of the chromosome 4 segment was directly inserted into the telomeric sequence in chromosome 9, and depending on nature of the rearrangement in mother, karyotype of the child was determined to be pure partial 4q trisomy. This is the first report of this kind of rearrangement causing pure partial trisomy 4q with accompanying white matter change demonstrated by MRI and bilateral preaxial polydactyly of both hands.

  20. Wave-equation Q tomography

    KAUST Repository

    Dutta, Gaurav

    2016-10-12

    Strong subsurface attenuation leads to distortion of amplitudes and phases of seismic waves propagating inside the earth. The amplitude and the dispersion losses from attenuation are often compensated for during prestack depth migration. However, most attenuation compensation or Qcompensation migration algorithms require an estimate of the background Q model. We have developed a wave-equation gradient optimization method that inverts for the subsurface Q distribution by minimizing a skeletonized misfit function ∈, where ∈ is the sum of the squared differences between the observed and the predicted peak/centroid-frequency shifts of the early arrivals. The gradient is computed by migrating the observed traces weighted by the frequency shift residuals. The background Q model is perturbed until the predicted and the observed traces have the same peak frequencies or the same centroid frequencies. Numerical tests determined that an improved accuracy of the Q model by wave-equation Q tomography leads to a noticeable improvement in migration image quality. © 2016 Society of Exploration Geophysicists.

  1. Research on universal combinatorial coding.

    Science.gov (United States)

    Lu, Jun; Zhang, Zhuo; Mo, Juan

    2014-01-01

    The conception of universal combinatorial coding is proposed. Relations exist more or less in many coding methods. It means that a kind of universal coding method is objectively existent. It can be a bridge connecting many coding methods. Universal combinatorial coding is lossless and it is based on the combinatorics theory. The combinational and exhaustive property make it closely related with the existing code methods. Universal combinatorial coding does not depend on the probability statistic characteristic of information source, and it has the characteristics across three coding branches. It has analyzed the relationship between the universal combinatorial coding and the variety of coding method and has researched many applications technologies of this coding method. In addition, the efficiency of universal combinatorial coding is analyzed theoretically. The multicharacteristic and multiapplication of universal combinatorial coding are unique in the existing coding methods. Universal combinatorial coding has theoretical research and practical application value.

  2. Multivariable q-Racah polynomials

    CERN Document Server

    Van Diejen, J F

    1996-01-01

    The Koornwinder-Macdonald multivariable generalization of the Askey-Wilson polynomials is studied for parameters satisfying a truncation condition such that the orthogonality measure becomes discrete with support on a finite grid. For this parameter regime the polynomials may be seen as a multivariable counterpart of the (one-variable) q-Racah polynomials. We present the discrete orthogonality measure, expressions for the normalization constants converting the polynomials into an orthonormal system (in terms of the normalization constant for the unit polynomial), and we discuss the limit q\\rightarrow 1 leading to multivariable Racah type polynomials. Of special interest is the situation that q lies on the unit circle; in that case it is found that there exists a natural parameter domain for which the discrete orthogonality measure (which is complex in general) becomes real-valued and positive. We investigate the properties of a finite-dimensional discrete integral transform for functions over the grid, whose ...

  3. Q-enhanced racetrack microresonators

    Science.gov (United States)

    Chamorro-Posada, P.

    2017-03-01

    A Q-enhancement strategy for racetrack microresonators is put forward. The design is based on the modification of the resonator geometry in order to mitigate the two main sources of radiation loss in the presence of curved waveguides: the discontinuities at the junctions between straight waveguides and the bent sections, and the continuous loss at the curved waveguide sectors. At the same time, the modifications of the geometry do not affect the versatility of coupling of racetrack resonators in integrated optical circuits, which is their main advantage over ring microresonators. The proposal is applied to the design of high-Q racetrack resonators for the silicon nitride CMOS-compatible platform having bent radii amenable for large-scale photonic integration. Numerical calculations show over 100% improvement of the Q factor in Si3N4/SiO2 resonators.

  4. Safety Code A12

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that the Safety Code A12 (Code A12) entitled "THE SAFETY COMMISSION (SC)" is available on the web at the following url: https://edms.cern.ch/document/479423/LAST_RELEASED Paper copies can also be obtained from the SC Unit Secretariat, e-mail: sc.secretariat@cern.ch SC Secretariat

  5. Dress Codes for Teachers?

    Science.gov (United States)

    Million, June

    2004-01-01

    In this article, the author discusses an e-mail survey of principals from across the country regarding whether or not their school had a formal staff dress code. The results indicate that most did not have a formal dress code, but agreed that professional dress for teachers was not only necessary, but showed respect for the school and had a…

  6. Nuremberg code turns 60

    OpenAIRE

    Thieren, Michel; Mauron, Alex

    2007-01-01

    This month marks sixty years since the Nuremberg code – the basic text of modern medical ethics – was issued. The principles in this code were articulated in the context of the Nuremberg trials in 1947. We would like to use this anniversary to examine its ability to address the ethical challenges of our time.

  7. Pseudonoise code tracking loop

    Science.gov (United States)

    Laflame, D. T. (Inventor)

    1980-01-01

    A delay-locked loop is presented for tracking a pseudonoise (PN) reference code in an incoming communication signal. The loop is less sensitive to gain imbalances, which can otherwise introduce timing errors in the PN reference code formed by the loop.

  8. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  9. Scrum Code Camps

    DEFF Research Database (Denmark)

    Pries-Heje, Jan; Pries-Heje, Lene; Dahlgaard, Bente

    2013-01-01

    is required. In this paper we present the design of such a new approach, the Scrum Code Camp, which can be used to assess agile team capability in a transparent and consistent way. A design science research approach is used to analyze properties of two instances of the Scrum Code Camp where seven agile teams...

  10. READING A NEURAL CODE

    NARCIS (Netherlands)

    BIALEK, W; RIEKE, F; VANSTEVENINCK, RRD; WARLAND, D

    1991-01-01

    Traditional approaches to neural coding characterize the encoding of known stimuli in average neural responses. Organisms face nearly the opposite task - extracting information about an unknown time-dependent stimulus from short segments of a spike train. Here the neural code was characterized from

  11. The materiality of Code

    DEFF Research Database (Denmark)

    Soon, Winnie

    2014-01-01

    , Twitter and Facebook). The focus is not to investigate the functionalities and efficiencies of the code, but to study and interpret the program level of code in order to trace the use of various technological methods such as third-party libraries and platforms’ interfaces. These are important...

  12. An Efficient Construction of Self-Dual Codes

    CERN Document Server

    Lee, Yoonjin

    2012-01-01

    We complete the building-up construction for self-dual codes by resolving the open cases over $GF(q)$ with $q \\equiv 3 \\pmod 4$, and over $\\Z_{p^m}$ and Galois rings $\\GR(p^m,r)$ with an odd prime $p$ satisfying $p \\equiv 3 \\pmod 4$ with $r$ odd. We also extend the building-up construction for self-dual codes to finite chain rings. Our building-up construction produces many new interesting self-dual codes. In particular, we construct 945 new extremal self-dual ternary $[32,16,9]$ codes, each of which has a trivial automorphism group. We also obtain many new self-dual codes over $\\mathbb Z_9$ of lengths $12, 16, 20$ all with minimum Hamming weight 6, which is the best possible minimum Hamming weight that free self-dual codes over $\\Z_9$ of these lengths can attain. From the constructed codes over $\\mathbb Z_9$, we reconstruct optimal Type I lattices of dimensions $12, 16, 20,$ and 24 using Construction $A$; this shows that our building-up construction can make a good contribution for finding optimal Type I lat...

  13. Electron beam quality kQ,Q0 factors for various ionization chambers: a Monte Carlo investigation with penelope

    Science.gov (United States)

    Erazo, F.; Brualla, L.; Lallena, A. M.

    2014-11-01

    In this work we calculate the beam quality correction factor {{k}\\text{Q,{{\\text{Q}}0}}} for various plane-parallel ionization chambers. A set of Monte Carlo calculations using the code penelope/penEasy have been carried out to calculate the overall correction factor fc,Q for eight electron beams corresponding to a Varian Clinac 2100 C/D, with nominal energies ranging between 6 MeV and 22 MeV, for a 60Co beam, that has been used as the reference quality Q0 and also for eight monoenergetic electron beams reproducing the quality index R50 of the Clinac beams. Two field sizes, 10 × 10 cm2 and 20 × 20 cm2 have been considered. The {{k}\\text{Q,{{\\text{Q}}0}}} factors have been calculated as the ratio between fc,Q and {{f}\\text{c,{{\\text{Q}}0}}} . Values for the Exradin A10, A11, A11TW, P11, P11TW, T11 and T11TW ionization chambers, manufactured by Standard Imaging, as well as for the NACP-02 have been obtained. The results found with the Clinac beams for the two field sizes analyzed show differences below 0.6%, even in the case of the higher energy electron beams. The {{k}\\text{Q,{{\\text{Q}}0}}} values obtained with the Clinac beams are 1% larger than those found with the monoenergetic beams for the higher energies, above 12 MeV. This difference can be ascribed to secondary photons produced in the linac head and the air path towards the phantom. Contrary to what was quoted in a previous work (Sempau et al 2004 Phys. Med. Biol. 49 4427-44), the beam quality correction factors obtained with the complete Clinac geometries and with the monoenergetic beams differ significantly for energies above 12 MeV. Material differences existing between chambers that have the same geometry produce non-negligible modifications in the value of these correction factors.

  14. Certain Properties of q-Hypergeometric Functions

    Directory of Open Access Journals (Sweden)

    Uzoamaka A. Ezeafulukwe

    2015-01-01

    Full Text Available The quotients of certain q-hypergeometric functions are presented as g-fractions which converge uniformly in the unit disc. These results lead to the existence of certain q-hypergeometric functions in the class of either q-convex functions, PCq, or q-starlike functions PSq*.

  15. q-exponentials on quantum spaces

    Energy Technology Data Exchange (ETDEWEB)

    Wachter, H. [Ludwig-Maximilians-Universitaet, Sektion Physik, Muenchen (Germany)

    2004-10-01

    We present explicit formulae for q-exponentials on quantum spaces which could be of particular importance in physics, i.e. the q-deformed Minkowski space and the q-deformed Euclidean space with two, three or four dimensions. Furthermore, these formulae can be viewed as 2-, 3- or 4-dimensional analogues of the well-known q-exponential function. (orig.)

  16. Transformation invariant sparse coding

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard

    2011-01-01

    Sparse coding is a well established principle for unsupervised learning. Traditionally, features are extracted in sparse coding in specific locations, however, often we would prefer invariant representation. This paper introduces a general transformation invariant sparse coding (TISC) model....... The model decomposes images into features invariant to location and general transformation by a set of specified operators as well as a sparse coding matrix indicating where and to what degree in the original image these features are present. The TISC model is in general overcomplete and we therefore invoke...... sparse coding to estimate its parameters. We demonstrate how the model can correctly identify components of non-trivial artificial as well as real image data. Thus, the model is capable of reducing feature redundancies in terms of pre-specified transformations improving the component identification....

  17. The SIFT Code Specification

    Science.gov (United States)

    1983-01-01

    The specification of Software Implemented Fault Tolerance (SIFT) consists of two parts, the specifications of the SIFT models and the specifications of the SIFT PASCAL program which actually implements the SIFT system. The code specifications are the last of a hierarchy of models describing the operation of the SIFT system and are related to the SIFT models as well as the PASCAL program. These Specifications serve to link the SIFT models to the running program. The specifications are very large and detailed and closely follow the form and organization of the PASCAL code. In addition to describing each of the components of the SIFT code, the code specifications describe the assumptions of the upper SIFT models which are required to actually prove that the code will work as specified. These constraints are imposed primarily on the schedule tables.

  18. The Aesthetics of Coding

    DEFF Research Database (Denmark)

    Andersen, Christian Ulrik

    2007-01-01

    discusses code as the artist’s material and, further, formulates a critique of Cramer. The seductive magic in computer-generated art does not lie in the magical expression, but nor does it lie in the code/material/text itself. It lies in the nature of code to do something – as if it was magic......Computer art is often associated with computer-generated expressions (digitally manipulated audio/images in music, video, stage design, media facades, etc.). In recent computer art, however, the code-text itself – not the generated output – has become the artwork (Perl Poetry, ASCII Art, obfuscated...... avant-garde’. In line with Cramer, the artists Alex McLean and Adrian Ward (aka Slub) declare: “art-oriented programming needs to acknowledge the conditions of its own making – its poesis.” By analysing the Live Coding performances of Slub (where they program computer music live), the presentation...

  19. Combustion chamber analysis code

    Science.gov (United States)

    Przekwas, A. J.; Lai, Y. G.; Krishnan, A.; Avva, R. K.; Giridharan, M. G.

    1993-05-01

    A three-dimensional, time dependent, Favre averaged, finite volume Navier-Stokes code has been developed to model compressible and incompressible flows (with and without chemical reactions) in liquid rocket engines. The code has a non-staggered formulation with generalized body-fitted-coordinates (BFC) capability. Higher order differencing methodologies such as MUSCL and Osher-Chakravarthy schemes are available. Turbulent flows can be modeled using any of the five turbulent models present in the code. A two-phase, two-liquid, Lagrangian spray model has been incorporated into the code. Chemical equilibrium and finite rate reaction models are available to model chemically reacting flows. The discrete ordinate method is used to model effects of thermal radiation. The code has been validated extensively against benchmark experimental data and has been applied to model flows in several propulsion system components of the SSME and the STME.

  20. Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Berriman, Bruce; Hanisch, Robert J; Mink, Jessica; Teuben, Peter J

    2012-01-01

    The Astrophysics Source Code Library (ASCL), founded in 1999, is a free on-line registry for source codes of interest to astronomers and astrophysicists. The library is housed on the discussion forum for Astronomy Picture of the Day (APOD) and can be accessed at http://ascl.net. The ASCL has a comprehensive listing that covers a significant number of the astrophysics source codes used to generate results published in or submitted to refereed journals and continues to grow. The ASCL currently has entries for over 500 codes; its records are citable and are indexed by ADS. The editors of the ASCL and members of its Advisory Committee were on hand at a demonstration table in the ADASS poster room to present the ASCL, accept code submissions, show how the ASCL is starting to be used by the astrophysics community, and take questions on and suggestions for improving the resource.

  1. Q98 人类学

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Q985 2005062743脑源性神经营养因子及其受体在人卵巢的表达与卵泡发育的关系=Expression of brain-derived neurotrophin factor and its receptor-tyrosine kinase receptor B in human ovary and their significance;Q987 2005062744强直性脊柱炎的新易感基因识别研究=Recognition and study of susceptible gene to ankylosing spondylitis;……

  2. Exploring possibly existing $q q \\bar b \\bar b$ tetraquark states with $q q = ud, ss, cc$

    CERN Document Server

    Peters, Antje; Cichy, Krzysztof; Wagenbach, Björn; Wagner, Marc

    2015-01-01

    We compute potentials of two static antiquarks in the presence of two quarks $qq$ of finite mass using lattice QCD. In a second step we solve the Schr\\"odinger equation, to determine, whether the resulting potentials are sufficiently attractive to host a bound state, which would indicate the existence of a stable $q q \\bar b \\bar b$ tetraquark. We find a bound state for $qq=(ud-du)/\\sqrt{2}$ with corresponding quantum numbers $I(J^ P)=0(1^+)$ and evidence against the existence of bound states with isospin $I=1$ or $qq \\in \\{cc,ss \\}$

  3. Multiple q-Zeta Brackets

    Directory of Open Access Journals (Sweden)

    Wadim Zudilin

    2015-03-01

    Full Text Available The multiple zeta values (MZVs possess a rich algebraic structure of algebraic relations, which is conjecturally determined by two different (shuffle and stuffle products of a certain algebra of noncommutative words. In a recent work, Bachmann constructed a q-analogue of the MZVs—the so-called bi-brackets—for which the two products are dual to each other, in a very natural way. We overview Bachmann’s construction and discuss the radial asymptotics of the bi-brackets, its links to the MZVs, and related linear (independence questions of the q-analogue.

  4. Moments of q-Normal and conditional q-Normal distributions

    OpenAIRE

    2015-01-01

    We calculate moments and moment generating functions of two distributions: the so called $q-$Normal and the so called conditional $q-$Normal distributions. These distributions generalize both Normal ($q=1),$ Wigner ($% q=0,$ $q-$Normal) and Kesten-McKay ($q=0,$ conditional $q-$Normal) distributions. As a by product we get asymptotic properties of some expansions in modified Bessel functions.

  5. On a q-Analogue of the Elzaki Transform Called Mangontarum q-Transform

    Directory of Open Access Journals (Sweden)

    Mahid M. Mangontarum

    2014-01-01

    Full Text Available Two q-analogues of the Elzaki transform, called Mangontarum q-transforms, are introduced in this paper. Properties such as the transforms of q-trigonometric functions, transform of q-derivatives, duality relation, convolution identity, q-derivative of transforms, and transform of the Heaviside function are derived and presented. Moreover, we will consider applications of the Mangontarum q-transform of the first kind to some ordinary q-differential equations with initial values.

  6. Group Delay of High Q Antennas

    DEFF Research Database (Denmark)

    Bahramzy, Pevand; Pedersen, Gert Frølund

    2013-01-01

    become an issue, when working with high Q antennas, because of the steep phase shift over the frequency. In this paper, it is measured how large group delay variations can become, when going from a low Q antenna to a high Q antenna. The group delay of a low Q antenna is shown to be around 1.3 ns, whereas...... a high Q antenna has group delay of around 22 ns. It is due to this huge group delay variation characteristics of high Q antennas, that signal distortion might occur in the radio system with high Q antennas....

  7. Coexistent t(8;21)(q22;q22) Translocation and 5q Deletion in Acute Myeloid Leukemia.

    Science.gov (United States)

    Yamamoto, Katsuya; Yakushijin, Kimikazu; Sanada, Yukinari; Kawamoto, Shinichiro; Matsuoka, Hiroshi; Minami, Hironobu

    2015-01-01

    The t(8;21)(q22;q22) translocation is specifically observed in acute myeloid leukemia (AML) M2 subtype, whereas del(5q) is one of the most common cytogenetic aberrations in myelodysplastic syndromes (MDS). Thus, t(8;21)(q22;q22) and del(5q) appear to be mutually exclusive, and the association between them has not been characterized yet. Here, we report an 81-year-old woman with coexistent t(8;21)(q22;q22) and del(5q) at initial diagnosis. The bone marrow was infiltrated with 18.4% myeloblasts, and showed marked myeloid and erythroid dysplasia. Myeloblasts were positive for CD19 and CD56 as well as CD13, CD33, CD34 and HLA-DR. G-banding and spectral karyotyping showed 46,XX,del(5)(q?),t(8;21)(q22;q22)[18]/46,XX[2]. Both del(5)(q?) and t(8;21)(q22;q22) were present in a single clone. Fluorescence in situ hybridization (FISH) on metaphase spreads detected a RUNX1/RUNX1T1 fusion signal on the der(8)t(8;21)(q22;q22), and confirmed deletion of CSF1R signaling at 5q33-q34 on the del(5)(q?). Furthermore, FISH on interphase nuclei revealed that the RUNX1/RUNX1T1 fusion signal and deletion of CSF1R signaling were found in 66.0% and 58.0% of interphase cells, respectively, suggesting that del(5)(q?) occurred in cells with RUNX1/RUNX1T1. These results indicated a diagnosis of AML with t(8;21)(q22;q22)/RUNX1/RUNX1T1 rather than MDS, even though the percentage of bone marrow myeloblasts was less than 20%. Based on these findings, together with those of other reported cases, del(5q) seems to be an extremely rare but recurrent secondary aberration in AML with t(8;21)(q22;q22).

  8. On Codes with w-identifiable Parent Property

    Institute of Scientific and Technical Information of China (English)

    MA Jun; XIONG Yu

    2008-01-01

    A code is said to be a w-identifiable parent property code (or w-IPP code for short) if whenever d is a descendant of w (or fewer) codewords, and one can always identify at least one of the parents of d. Let C be an (N, w + 1, q)-code and C* an (w + 1)-color graph for C. If a graph G is a subgraph of C* and consists of w + 1 edges with different colors, then G is called a (w + 1)-pattern of C*. In this paper, we proved that C is a w-IPP code if and only if there exists at most one vertex with color degree more than 1 in any (w + 1)-pattern of C*.

  9. Comparative analysis of vertebrate EIF2AK2 (PKR genes and assignment of the equine gene to ECA15q24–q25 and the bovine gene to BTA11q12–q15

    Directory of Open Access Journals (Sweden)

    Zharkikh Andrey A

    2006-09-01

    Full Text Available Abstract The structures of the canine, rabbit, bovine and equine EIF2AK2 genes were determined. Each of these genes has a 5' non-coding exon as well as 15 coding exons. All of the canine, bovine and equine EIF2AK2 introns have consensus donor and acceptor splice sites. In the equine EIF2AK2 gene, a unique single nucleotide polymorphism that encoded a Tyr329Cys substitution was detected. Regulatory elements predicted in the promoter region were conserved in ungulates, primates, rodents, Afrotheria (elephant and Insectifora (shrew. Western clawed frog and fugu EIF2AK2 gene sequences were detected in the USCS Genome Browser and compared to those of other vertebrate EIF2AK2 genes. A comparison of EIF2AK2 protein domains in vertebrates indicates that the kinase catalytic domains were evolutionarily more conserved than the nucleic acid-binding motifs. Nucleotide substitution rates were uniform among the vertebrate sequences with the exception of the zebrafish and goldfish EIF2AK2 genes, which showed substitution rates about 20% higher than those of other vertebrates. FISH was used to physically assign the horse and cattle genes to chromosome locations, ECA15q24–q25 and BTA11q12–15, respectively. Comparative mapping data confirmed conservation of synteny between ungulates, humans and rodents.

  10. Embedded foveation image coding.

    Science.gov (United States)

    Wang, Z; Bovik, A C

    2001-01-01

    The human visual system (HVS) is highly space-variant in sampling, coding, processing, and understanding. The spatial resolution of the HVS is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. By taking advantage of this fact, it is possible to remove considerable high-frequency information redundancy from the peripheral regions and still reconstruct a perceptually good quality image. Great success has been obtained previously by a class of embedded wavelet image coding algorithms, such as the embedded zerotree wavelet (EZW) and the set partitioning in hierarchical trees (SPIHT) algorithms. Embedded wavelet coding not only provides very good compression performance, but also has the property that the bitstream can be truncated at any point and still be decoded to recreate a reasonably good quality image. In this paper, we propose an embedded foveation image coding (EFIC) algorithm, which orders the encoded bitstream to optimize foveated visual quality at arbitrary bit-rates. A foveation-based image quality metric, namely, foveated wavelet image quality index (FWQI), plays an important role in the EFIC system. We also developed a modified SPIHT algorithm to improve the coding efficiency. Experiments show that EFIC integrates foveation filtering with foveated image coding and demonstrates very good coding performance and scalability in terms of foveated image quality measurement.

  11. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity in the net...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof.......Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...

  12. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  13. Self-Inverse Interleavers for Turbo Codes

    CERN Document Server

    Sakzad, Amin; Panario, Daniel; Eshghi, Nasim

    2010-01-01

    In this work we introduce and study a set of new interleavers based on permutation polynomials and functions with known inverses over a finite field $\\mathbb{F}_q$ for using in turbo code structures. We use Monomial, Dickson, M\\"{o}bius and R\\'edei functions in order to get new interleavers. In addition we employ Skolem sequences in order to find new interleavers with known cycle structure. As a byproduct we give an exact formula for the inverse of every R\\'edei function. The cycle structure of R\\'edei functions are also investigated. Finally, self-inverse versions of permutation functions are used to construct interleavers. These interleavers are their own de-interleavers and are useful for turbo coding and turbo decoding. Experiments carried out for self-inverse interleavers constructed using these kind of permutation polynomials and functions show excellent agreement with our theoretical results.

  14. Q methodology in health economics.

    Science.gov (United States)

    Baker, Rachel; Thompson, Carl; Mannion, Russell

    2006-01-01

    The recognition that health economists need to understand the meaning of data if they are to adequately understand research findings which challenge conventional economic theory has led to the growth of qualitative modes of enquiry in health economics. The use of qualitative methods of exploration and description alongside quantitative techniques gives rise to a number of epistemological, ontological and methodological challenges: difficulties in accounting for subjectivity in choices, the need for rigour and transparency in method, and problems of disciplinary acceptability to health economists. Q methodology is introduced as a means of overcoming some of these challenges. We argue that Q offers a means of exploring subjectivity, beliefs and values while retaining the transparency, rigour and mathematical underpinnings of quantitative techniques. The various stages of Q methodological enquiry are outlined alongside potential areas of application in health economics, before discussing the strengths and limitations of the approach. We conclude that Q methodology is a useful addition to economists' methodological armoury and one that merits further consideration and evaluation in the study of health services.

  15. Application of RS Codes in Decoding QR Code

    Institute of Scientific and Technical Information of China (English)

    Zhu Suxia(朱素霞); Ji Zhenzhou; Cao Zhiyan

    2003-01-01

    The QR Code is a 2-dimensional matrix code with high error correction capability. It employs RS codes to generate error correction codewords in encoding and recover errors and damages in decoding. This paper presents several QR Code's virtues, analyzes RS decoding algorithm and gives a software flow chart of decoding the QR Code with RS decoding algorithm.

  16. Evaluation Codes from an Affine Veriety Code Perspective

    DEFF Research Database (Denmark)

    Geil, Hans Olav

    2008-01-01

    Evaluation codes (also called order domain codes) are traditionally introduced as generalized one-point geometric Goppa codes. In the present paper we will give a new point of view on evaluation codes by introducing them instead as particular nice examples of affine variety codes. Our study...

  17. Distributed multiple description coding

    CERN Document Server

    Bai, Huihui; Zhao, Yao

    2011-01-01

    This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC,

  18. Cryptography cracking codes

    CERN Document Server

    2014-01-01

    While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryption-essentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

  19. Coded MapReduce

    OpenAIRE

    Li, Songze; Maddah-Ali, Mohammad Ali; Avestimehr, A. Salman

    2015-01-01

    MapReduce is a commonly used framework for executing data-intensive jobs on distributed server clusters. We introduce a variant implementation of MapReduce, namely "Coded MapReduce", to substantially reduce the inter-server communication load for the shuffling phase of MapReduce, and thus accelerating its execution. The proposed Coded MapReduce exploits the repetitive mapping of data blocks at different servers to create coding opportunities in the shuffling phase to exchange (key,value) pair...

  20. Classical Holographic Codes

    CERN Document Server

    Brehm, Enrico M

    2016-01-01

    In this work, we introduce classical holographic codes. These can be understood as concatenated probabilistic codes and can be represented as networks uniformly covering hyperbolic space. In particular, classical holographic codes can be interpreted as maps from bulk degrees of freedom to boundary degrees of freedom. Interestingly, they are shown to exhibit features similar to those expected from the AdS/CFT correspondence. Among these are a version of the Ryu-Takayanagi formula and intriguing properties regarding bulk reconstruction and boundary representations of bulk operations. We discuss the relation of our findings with expectations from AdS/CFT and, in particular, with recent results from quantum error correction.

  1. Novel ZEB2-BCL11B Fusion Gene Identified by RNA-Sequencing in Acute Myeloid Leukemia with t(2;14(q22;q32.

    Directory of Open Access Journals (Sweden)

    Synne Torkildsen

    Full Text Available RNA-sequencing of a case of acute myeloid leukemia with the bone marrow karyotype 46,XY,t(2;14(q22;q32[5]/47,XY,idem,+?4,del(6(q13q21[cp6]/46,XY[4] showed that the t(2;14 generated a ZEB2-BCL11B chimera in which exon 2 of ZEB2 (nucleotide 595 in the sequence with accession number NM_014795.3 was fused to exon 2 of BCL11B (nucleotide 554 in the sequence with accession number NM_022898.2. RT-PCR together with Sanger sequencing verified the presence of the above-mentioned fusion transcript. All functional domains of BCL11B are retained in the chimeric protein. Abnormal expression of BCL11B coding regions subjected to control by the ZEB2 promoter seems to be the leukemogenic mechanism behind the translocation.

  2. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  3. VT ZIP Code Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) A ZIP Code Tabulation Area (ZCTA) is a statistical geographic entity that approximates the delivery area for a U.S. Postal Service five-digit...

  4. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  5. GOOGLE SUMMER OF CODE

    National Research Council Canada - National Science Library

    Leslie Hawthorn

    2008-01-01

      This article examines the Google Summer of Code (GSoC) program, the world's first global initiative to introduce College and University students to free/libre open source software (F/LOSS) development...

  6. Importance of Building Code

    Directory of Open Access Journals (Sweden)

    Reshmi Banerjee

    2015-06-01

    Full Text Available A building code, or building control, is a set of rules that specify the minimum standards for constructed objects such as buildings and non building structures. The main purpose of building codes are to protect public health, safety and general welfare as they relate to the construction and occupancy of buildings and structures. The building code becomes law of a particular jurisdiction when formally enacted by the appropriate governmental or private authority. Building codes are generally intended to be applied by architects, engineers, constructors and regulators but are also used for various purposes by safety inspectors, environmental scientists, real estate developers, subcontractors, manufacturers of building products and materials, insurance companies, facility managers, tenants and others.

  7. Bandwidth efficient coding

    CERN Document Server

    Anderson, John B

    2017-01-01

    Bandwidth Efficient Coding addresses the major challenge in communication engineering today: how to communicate more bits of information in the same radio spectrum. Energy and bandwidth are needed to transmit bits, and bandwidth affects capacity the most. Methods have been developed that are ten times as energy efficient at a given bandwidth consumption as simple methods. These employ signals with very complex patterns and are called "coding" solutions. The book begins with classical theory before introducing new techniques that combine older methods of error correction coding and radio transmission in order to create narrowband methods that are as efficient in both spectrum and energy as nature allows. Other topics covered include modulation techniques such as CPM, coded QAM and pulse design.

  8. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    , in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded......The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered...... as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  9. Code Disentanglement: Initial Plan

    Energy Technology Data Exchange (ETDEWEB)

    Wohlbier, John Greaton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kelley, Timothy M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rockefeller, Gabriel M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Calef, Matthew Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-27

    The first step to making more ambitious changes in the EAP code base is to disentangle the code into a set of independent, levelized packages. We define a package as a collection of code, most often across a set of files, that provides a defined set of functionality; a package a) can be built and tested as an entity and b) fits within an overall levelization design. Each package contributes one or more libraries, or an application that uses the other libraries. A package set is levelized if the relationships between packages form a directed, acyclic graph and each package uses only packages at lower levels of the diagram (in Fortran this relationship is often describable by the use relationship between modules). Independent packages permit independent- and therefore parallel|development. The packages form separable units for the purposes of development and testing. This is a proven path for enabling finer-grained changes to a complex code.

  10. Molecular diagnosis of coenzyme Q10 deficiency.

    Science.gov (United States)

    Yubero, Delia; Montero, Raquel; Armstrong, Judith; Espinós, Carmen; Palau, Francesc; Santos-Ocaña, Carlos; Salviati, Leonardo; Navas, Placido; Artuch, Rafael

    2015-01-01

    Coenzyme Q10 (CoQ) deficiency syndromes comprise a growing number of neurological and extraneurological disorders. Primary-genetic but also secondary CoQ deficiencies have been reported. The biochemical determination of CoQ is a good tool for the rapid identification of CoQ deficiencies but does not allow the selection of candidate genes for molecular diagnosis. Moreover, the metabolic pathway for CoQ synthesis is an intricate and not well-understood process, where a large number of genes are implicated. Thus, only next-generation sequencing techniques (either genetic panels of whole-exome and -genome sequencing) are at present appropriate for a rapid and realistic molecular diagnosis of these syndromes. The potential treatability of CoQ deficiency strongly supports the necessity of a rapid molecular characterization of patients, since primary CoQ deficiencies may respond well to CoQ treatment.

  11. Lossy Source Compression of Non-Uniform Binary Sources Using GQ-LDGM Codes

    CERN Document Server

    Cappellari, Lorenzo

    2010-01-01

    In this paper, we study the use of GF(q)-quantized LDGM codes for binary source coding. By employing quantization, it is possible to obtain binary codewords with a non-uniform distribution. The obtained statistics is hence suitable for optimal, direct quantization of non-uniform Bernoulli sources. We employ a message-passing algorithm combined with a decimation procedure in order to perform compression. The experimental results based on GF(q)-LDGM codes with regular degree distributions yield performances quite close to the theoretical rate-distortion bounds.

  12. Q?

    African Journals Online (AJOL)

    Arsenic concentrations in undistributcd soils range lrom (H to ')7ing/kg (Shacltlcttc ... acid rain cause leaching ot' heavy metals to sediments and suspension in the water .... Environmental Metal Poisoning, Environmental. Pollution 50, 139-161.

  13. Annotated Raptor Codes

    CERN Document Server

    Mahdaviani, Kaveh; Tellambura, Chintha

    2011-01-01

    In this paper, an extension of raptor codes is introduced which keeps all the desirable properties of raptor codes, including the linear complexity of encoding and decoding per information bit, unchanged. The new design, however, improves the performance in terms of the reception rate. Our simulations show a 10% reduction in the needed overhead at the benchmark block length of 64,520 bits and with the same complexity per information bit.

  14. Robust Nonlinear Neural Codes

    Science.gov (United States)

    Yang, Qianli; Pitkow, Xaq

    2015-03-01

    Most interesting natural sensory stimuli are encoded in the brain in a form that can only be decoded nonlinearly. But despite being a core function of the brain, nonlinear population codes are rarely studied and poorly understood. Interestingly, the few existing models of nonlinear codes are inconsistent with known architectural features of the brain. In particular, these codes have information content that scales with the size of the cortical population, even if that violates the data processing inequality by exceeding the amount of information entering the sensory system. Here we provide a valid theory of nonlinear population codes by generalizing recent work on information-limiting correlations in linear population codes. Although these generalized, nonlinear information-limiting correlations bound the performance of any decoder, they also make decoding more robust to suboptimal computation, allowing many suboptimal decoders to achieve nearly the same efficiency as an optimal decoder. Although these correlations are extremely difficult to measure directly, particularly for nonlinear codes, we provide a simple, practical test by which one can use choice-related activity in small populations of neurons to determine whether decoding is suboptimal or optimal and limited by correlated noise. We conclude by describing an example computation in the vestibular system where this theory applies. QY and XP was supported by a grant from the McNair foundation.

  15. Scalable motion vector coding

    Science.gov (United States)

    Barbarien, Joeri; Munteanu, Adrian; Verdicchio, Fabio; Andreopoulos, Yiannis; Cornelis, Jan P.; Schelkens, Peter

    2004-11-01

    Modern video coding applications require transmission of video data over variable-bandwidth channels to a variety of terminals with different screen resolutions and available computational power. Scalable video coding is needed to optimally support these applications. Recently proposed wavelet-based video codecs employing spatial domain motion compensated temporal filtering (SDMCTF) provide quality, resolution and frame-rate scalability while delivering compression performance comparable to that of the state-of-the-art non-scalable H.264-codec. These codecs require scalable coding of the motion vectors in order to support a large range of bit-rates with optimal compression efficiency. Scalable motion vector coding algorithms based on the integer wavelet transform followed by embedded coding of the wavelet coefficients were recently proposed. In this paper, a new and fundamentally different scalable motion vector codec (MVC) using median-based motion vector prediction is proposed. Extensive experimental results demonstrate that the proposed MVC systematically outperforms the wavelet-based state-of-the-art solutions. To be able to take advantage of the proposed scalable MVC, a rate allocation mechanism capable of optimally dividing the available rate among texture and motion information is required. Two rate allocation strategies are proposed and compared. The proposed MVC and rate allocation schemes are incorporated into an SDMCTF-based video codec and the benefits of scalable motion vector coding are experimentally demonstrated.

  16. A MacWilliams type identity for m-spotty generalized Lee weight enumerators over $\\mathbb{Z}_q$ q

    CERN Document Server

    Ozen, Mehmet

    2012-01-01

    Burst errors are very common in practice. There have been many designs in order to control and correct such errors. Recently, a new class of byte error control codes called spotty byte error control codes has been specifically designed to fit the large capacity memory systems that use high-density random access memory (RAM) chips with input/output data of 8, 16, and 32 bits. The MacWilliams identity describes how the weight enumerator of a linear code and the weight enumerator of its dual code are related. Also, Lee metric which has attracted many researchers due to its applications. In this paper, we combine these two interesting topics and introduce the m-spotty generalized Lee weights and the m-spotty generalized Lee weight enumerators of a code over Z q and prove a MacWilliams type identity. This generalization includes both the case of the identity given in the paper [I. Siap, MacWilliams identity for m-spotty Lee weight enumerators, Appl. Math. Lett. 23 (1) (2010) 13-16] and the identity given in the pa...

  17. q-deformed harmonic and Clifford analysis and the q-Hermite and Laguerre polynomials

    CERN Document Server

    Coulembier, Kevin

    2010-01-01

    We define a q-deformation of the Dirac operator, inspired by the one dimensional q-derivative. This implies a q-deformation of the partial derivatives. By taking the square of this Dirac operator we find a q-deformation of the Laplace operator. This allows to construct q-deformed Schroedinger equations in higher dimensions. The equivalence of these Schroedinger equations with those defined on q-Euclidean space in quantum variables is shown. We also define the m-dimensional q-Clifford-Hermite polynomials and show their connection with the q-Laguerre polynomials. These polynomials are orthogonal with respect to an m-dimensional q-integration, which is related to integration on q-Euclidean space. The q-Laguerre polynomials are the eigenvectors of an su_q(1|1)-representation.

  18. Unification of integrable q-difference equations

    Directory of Open Access Journals (Sweden)

    Burcu Silindir

    2015-10-01

    Full Text Available This article presents a unifying framework for q-discrete equations. We introduce a generalized q-difference equation in Hirota bilinear form and develop the associated three-q-soliton solutions which are described in polynomials of power functions by utilizing Hirota direct method. Furthermore, we present that the generalized q-difference soliton equation reduces to q-analogues of Toda, KdV and sine-Gordon equations equipped with their three-q-soliton solutions by appropriate

  19. Non-Binary Polar Codes using Reed-Solomon Codes and Algebraic Geometry Codes

    CERN Document Server

    Mori, Ryuhei

    2010-01-01

    Polar codes, introduced by Arikan, achieve symmetric capacity of any discrete memoryless channels under low encoding and decoding complexity. Recently, non-binary polar codes have been investigated. In this paper, we calculate error probability of non-binary polar codes constructed on the basis of Reed-Solomon matrices by numerical simulations. It is confirmed that 4-ary polar codes have significantly better performance than binary polar codes on binary-input AWGN channel. We also discuss an interpretation of polar codes in terms of algebraic geometry codes, and further show that polar codes using Hermitian codes have asymptotically good performance.

  20. Chromosome alterations in breast carcinomas: frequent involvement of DNA losses including chromosomes 4q and 21q.

    OpenAIRE

    Schwendel, A.; Richard, F.; Langreck, H.; Kaufmann, O.; Lage, H.; Winzer, K.J.; Petersen, I; Dietel, M

    1998-01-01

    Comparative genomic hybridization was applied to map DNA gains and losses in 39 invasive ductal breast carcinomas. Frequent abnormalities included gains on chromosomal regions 1q, 8q, 11q12-13, 16p, 19, 20q and X as well as frequent losses on 1p, 5q, 6q, 9p, 11q, 13q and 16q. Furthermore, frequent losses on 4q (20 cases) and 21q (14 cases) were found for the first time in this tumour type. High copy number amplifications were observed at 8q12-24, 11q11-13 and 20q13-ter. Highly differentiated ...

  1. Distributed Video Coding: Iterative Improvements

    DEFF Research Database (Denmark)

    Luong, Huynh Van

    Nowadays, emerging applications such as wireless visual sensor networks and wireless video surveillance are requiring lightweight video encoding with high coding efficiency and error-resilience. Distributed Video Coding (DVC) is a new coding paradigm which exploits the source statistics...

  2. Polynomial weights and code constructions

    DEFF Research Database (Denmark)

    Massey, J; Costello, D; Justesen, Jørn

    1973-01-01

    polynomial included. This fundamental property is then used as the key to a variety of code constructions including 1) a simplified derivation of the binary Reed-Muller codes and, for any primepgreater than 2, a new extensive class ofp-ary "Reed-Muller codes," 2) a new class of "repeated-root" cyclic codes...... that are subcodes of the binary Reed-Muller codes and can be very simply instrumented, 3) a new class of constacyclic codes that are subcodes of thep-ary "Reed-Muller codes," 4) two new classes of binary convolutional codes with large "free distance" derived from known binary cyclic codes, 5) two new classes...... of long constraint length binary convolutional codes derived from2^r-ary Reed-Solomon codes, and 6) a new class ofq-ary "repeated-root" constacyclic codes with an algebraic decoding algorithm....

  3. A stationary q-metric

    CERN Document Server

    Toktarbay, Saken

    2015-01-01

    We present a stationary generalization of the static $q-$metric, the simplest generalization of the Schwarzschild solution that contains a quadrupole parameter. It possesses three independent parameters that are related to the mass, quadrupole moment and angular momentum. We investigate the geometric and physical properties of this exact solution of Einstein's vacuum equations, and show that it can be used to describe the exterior gravitational field of rotating, axially symmetric, compact objects.

  4. A stationary q-metric

    Science.gov (United States)

    Toktarbay, S.; Quevedo, H.

    2014-10-01

    We present a stationary generalization of the static $q-$metric, the simplest generalization of the Schwarzschild solution that contains a quadrupole parameter. It possesses three independent parameters that are related to the mass, quadrupole moment and angular momentum. We investigate the geometric and physical properties of this exact solution of Einstein's vacuum equations, and show that it can be used to describe the exterior gravitational field of rotating, axially symmetric, compact objects.

  5. Electrochemistry of Q-graphene.

    Science.gov (United States)

    Randviir, Edward P; Brownson, Dale A C; Gómez-Mingot, Maria; Kampouris, Dimitrios K; Iniesta, Jesús; Banks, Craig E

    2012-10-21

    A newly synthesised type of graphene, Q-Graphene, has been physically and electrochemically characterised with Scanning and Transmission Electron Microscopy (SEM, TEM), X-ray Photoelectron Spectroscopy (XPS) and Cyclic Voltammetry (CV). Interpretation of SEM, TEM and XPS data reveal the material to consist of hollow carbon nanospheres of multi-layer graphene (viz. graphite), which exhibit a total oxygen content of ca. 36.0% (atomic weight via XPS). In addition to the carbon structures present, spherical magnesium oxide particles of ≤50 nm in diameter are abundantly present in the sample (ca. 16.2%). Interestingly, although the TEM/SEM images show macroporous carbon structures, Raman spectroscopy shows peaks typically characteristic of graphene, which suggests the material is highly heterogeneous and consists of many types of carbon allotropes. Q-Graphene is electrochemically characterised using both inner-sphere and outer-sphere electrochemical redox probes, namely potassium ferrocyanide(II), hexaammine-ruthenium(III) chloride and hexachloroiridate(III), in addition to the biologically relevant and electroactive analytes, norepinephrine, β-nicotinamide adenine dinucleotide (NADH) and l-ascorbic acid. The electrochemical response of Q-Graphene is benchmarked against edge plane- and basal plane-pyrolytic graphite (EPPG and BPPG respectively), pristine graphene and graphite alternatives. Q-Graphene is found to exhibit fast electron transfer kinetics, likely due to its high proportion of folded edges and surface defects, exhibiting a response similar to that of EPPG - which exhibits fast electron transfer rates due to the high proportion of edge plane sites it possesses. Furthermore, we demonstrate that the specific oxygen content plays a pivotal role in dictating the observed electrochemical response, which is analyte dependant. Consequently there is potential for this new member of the graphene family to be beneficially utilised in various electrochemical

  6. The two-loop helicity amplitudes for $q \\bar q' \\to V_1 V_2 \\to 4~\\mathrm{leptons}$

    CERN Document Server

    Gehrmann, Thomas; Tancredi, Lorenzo

    2015-01-01

    We compute the two-loop massless QCD corrections to the helicity amplitudes for the production of two massive vector bosons in quark-antiquark annihilation, allowing for an arbitrary virtuality of the vector bosons: $q \\bar q' \\to V_1V_2$. Combining with the leptonic decay currents, we obtain the full two-loop QCD description of the corresponding electroweak four-lepton production processes. The calculation is performed by projecting the two-loop diagrams onto an appropriate basis of Lorentz structures. All two-loop Feynman integrals are reduced to a basis of master integrals, which are then computed using the differential equations method and optimised for numerical performance. We provide a public C++ code which allows for fast and precise numerical evaluations of the amplitudes.

  7. Triply heavy tetraquark states with the QQ anti Q anti q configuration

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Kan; Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Liu, Yan-Rui; Wu, Jing [Shandong University, School of Physics and Key Laboratory of Particle Physics and Particle Irradiation (MOE), Jinan (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2017-01-15

    In the framework of the color-magnetic interaction, we systematically investigate the mass splittings of the QQ anti Q anti q tetraquark states and estimate their rough masses in this work. These systems include the explicitly exotic states cc anti b anti q and bb anti c anti q and the hidden exotic states cc anti c anti q, cb anti b anti q, bc anti c anti q, and bb anti b anti q. If a state around the estimated mass region can be observed, its nature as a genuine tetraquark is favored. The strong decay patterns shown here will be helpful to the experimental search for these exotic states. (orig.)

  8. I-Love-Q forever

    CERN Document Server

    Maselli, Andrea; Ferrari, Valeria; Gualtieri, Leonardo; Pani, Paolo

    2013-01-01

    Neutron stars are extremely relativistic objects which abound in our universe and yet are poorly understood, due to the high uncertainty on how matter behaves in the extreme conditions which prevail in the stellar core. It has recently been pointed out that the moment of inertia I, the Love number lambda and the spin-induced quadrupole moment Q of an isolated neutron star, are related through functions which are practically independent of the equation of state. These surprising universal I-lambda-Q relations pave the way for a better understanding of neutron stars, most notably via gravitational-wave emission. Gravitational-wave observations will probe highly-dynamical binaries and it is important to understand whether the universality of the I-lambda-Q relations survive strong-field and finite-size effects. We apply a Post-Newtonian-Affine approach to model tidal deformations in compact binaries and show that the I-lambda relation depends on the inspiral frequency, but is insensitive to the equation of state...

  9. Product Codes for Optical Communication

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    2002-01-01

    Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes.......Many optical communicaton systems might benefit from forward-error-correction. We present a hard-decision decoding algorithm for the "Block Turbo Codes", suitable for optical communication, which makes this coding-scheme an alternative to Reed-Solomon codes....

  10. Algebraic geometric codes with applications

    Institute of Scientific and Technical Information of China (English)

    CHEN Hao

    2007-01-01

    The theory of linear error-correcting codes from algebraic geomet-ric curves (algebraic geometric (AG) codes or geometric Goppa codes) has been well-developed since the work of Goppa and Tsfasman, Vladut, and Zink in 1981-1982. In this paper we introduce to readers some recent progress in algebraic geometric codes and their applications in quantum error-correcting codes, secure multi-party computation and the construction of good binary codes.

  11. Optical coding theory with Prime

    CERN Document Server

    Kwong, Wing C

    2013-01-01

    Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory-until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and networks. Learn How to Construct

  12. Algebraic and stochastic coding theory

    CERN Document Server

    Kythe, Dave K

    2012-01-01

    Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.

  13. Golden Coded Multiple Beamforming

    CERN Document Server

    Li, Boyu

    2010-01-01

    The Golden Code is a full-rate full-diversity space-time code, which achieves maximum coding gain for Multiple-Input Multiple-Output (MIMO) systems with two transmit and two receive antennas. Since four information symbols taken from an M-QAM constellation are selected to construct one Golden Code codeword, a maximum likelihood decoder using sphere decoding has the worst-case complexity of O(M^4), when the Channel State Information (CSI) is available at the receiver. Previously, this worst-case complexity was reduced to O(M^(2.5)) without performance degradation. When the CSI is known by the transmitter as well as the receiver, beamforming techniques that employ singular value decomposition are commonly used in MIMO systems. In the absence of channel coding, when a single symbol is transmitted, these systems achieve the full diversity order provided by the channel. Whereas this property is lost when multiple symbols are simultaneously transmitted. However, uncoded multiple beamforming can achieve the full div...

  14. Coded source neutron imaging

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; Santos-Villalobos, Hector J [ORNL

    2011-01-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100 m) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100um and 10um aperture hole diameters show resolutions matching the hole diameters.

  15. Coded source neutron imaging

    Science.gov (United States)

    Bingham, Philip; Santos-Villalobos, Hector; Tobin, Ken

    2011-03-01

    Coded aperture techniques have been applied to neutron radiography to address limitations in neutron flux and resolution of neutron detectors in a system labeled coded source imaging (CSI). By coding the neutron source, a magnified imaging system is designed with small spot size aperture holes (10 and 100μm) for improved resolution beyond the detector limits and with many holes in the aperture (50% open) to account for flux losses due to the small pinhole size. An introduction to neutron radiography and coded aperture imaging is presented. A system design is developed for a CSI system with a development of equations for limitations on the system based on the coded image requirements and the neutron source characteristics of size and divergence. Simulation has been applied to the design using McStas to provide qualitative measures of performance with simulations of pinhole array objects followed by a quantitative measure through simulation of a tilted edge and calculation of the modulation transfer function (MTF) from the line spread function. MTF results for both 100μm and 10μm aperture hole diameters show resolutions matching the hole diameters.

  16. Partial 1q Duplications and Associated Phenotype

    Science.gov (United States)

    Morris, Marcos L.M.; Baroneza, José E.; Teixeira, Patricia; Medina, Cristina T.N.; Cordoba, Mara S.; Versiani, Beatriz R.; Roese, Liege L.; Freitas, Erika L.; Fonseca, Ana C.S.; dos Santos, Maria C.G.; Pic-Taylor, Aline; Rosenberg, Carla; Oliveira, Silviene F.; Ferrari, Iris; Mazzeu, Juliana F.

    2016-01-01

    Duplications of the long arm of chromosome 1 are rare. Distal duplications are the most common and have been reported as either pure trisomy or unbalanced translocations. The paucity of cases with pure distal 1q duplications has made it difficult to delineate a partial distal trisomy 1q syndrome. Here, we report 2 patients with overlapping 1q duplications detected by G-banding. Array CGH and FISH were performed to characterize the duplicated segments, exclude the involvement of other chromosomes and determine the orientation of the duplication. Patient 1 presents with a mild phenotype and carries a 22.5-Mb 1q41q43 duplication. Patient 2 presents with a pure 1q42.13qter inverted duplication of 21.5 Mb, one of the smallest distal 1q duplications ever described and one of the few cases characterized by array CGH, thus contributing to a better characterization of distal 1q duplication syndrome. PMID:27022331

  17. Supersymmetric q-deformed quantum mechanics

    Energy Technology Data Exchange (ETDEWEB)

    Traikia, M. H.; Mebarki, N. [Laboratoire de Physique Mathematique et Subatomique, Mentouri University, Constantine (Algeria)

    2012-06-27

    A supersymmetric q-deformed quantum mechanics is studied in the weak deformation approximation of the Weyl-Heisenberg algebra. The corresponding supersymmetric q-deformed hamiltonians and charges are constructed explicitly.

  18. Pisot-Fibonacci q-coherent states

    Energy Technology Data Exchange (ETDEWEB)

    Gazeau, Jean Pierre [Laboratoire APC, Universite Paris Diderot Paris 7, 10 rue A. Domon et L. Duquet, 75205 Paris Cedex 13 (France); Olmo, Mariano A del, E-mail: gazeau@apc.univ-paris7.fr, E-mail: olmo@fta.uva.es [Departamento de Fisica Teorica, Universidad de Valladolid, E-47005, Valladolid (Spain)

    2011-03-01

    A family of q-coherent states is constructed allowing us to obtain a new quantized version of the harmonic oscillator. These q-states are normalized and form an overcomplete set resolving the unity with respect to the appropriate Jackson measure if 0 < q < 1. We only consider here those values of q such that q{sup -1} is a Pisot number. In this case the q-deformed integers ([n]{sub q}) form Fibonacci-like sequences of integers. We study the main physical characteristics of the corresponding quantum oscillator: localization in the configuration and in the phase spaces, probability distributions and related statistical features and semi-classical phase space trajectories whose periodicity is related with the fact that q is an algebraic number.

  19. QTL Information Table: 30 [Q-TARO

    Lifescience Database Archive (English)

    Full Text Available qUVR-10 Resistance or Tolerance Other stress resistance ultraviolet-B (UVB) resista... and Yano, M. (2004). Delimitation of the chromosomal region for a quantitative trait locus, qUVR- 10, conferring resistance to ultra

  20. Minimum Data Set Q1a Report

    Data.gov (United States)

    U.S. Department of Health & Human Services — The MDS Q1a report summarizes, by state and county, percentages of residents that answered Yes to Q1a - Residents expresses or indicates preference to return to the...

  1. 75 FR 61840 - Proposed Collection; Comment Request for Form 5300 and Schedule Q (Form 5300)

    Science.gov (United States)

    2010-10-06

    ..., Application for Determination for Employee Benefit Plan, and Schedule Q (Form 5300), Elective Determination...: Application for Determination for Employee Benefit Plan (Form 5300), and Elective Determination Requests...: Internal Revenue Code sections 401(a) and 501(a) set out requirements for qualification of employee...

  2. Speech coding code- excited linear prediction

    CERN Document Server

    Bäckström, Tom

    2017-01-01

    This book provides scientific understanding of the most central techniques used in speech coding both for advanced students as well as professionals with a background in speech audio and or digital signal processing. It provides a clear connection between the whys hows and whats thus enabling a clear view of the necessity purpose and solutions provided by various tools as well as their strengths and weaknesses in each respect Equivalently this book sheds light on the following perspectives for each technology presented Objective What do we want to achieve and especially why is this goal important Resource Information What information is available and how can it be useful and Resource Platform What kind of platforms are we working with and what are their capabilities restrictions This includes computational memory and acoustic properties and the transmission capacity of devices used. The book goes on to address Solutions Which solutions have been proposed and how can they be used to reach the stated goals and ...

  3. Functional differential equations for the q-Fourier transform of q-Gaussians

    Energy Technology Data Exchange (ETDEWEB)

    Umarov, S [Department of Mathematics, Tufts University, Medford, MA (United States); Queiros, S M Duarte, E-mail: sdqueiro@gmail.co [Unilever R and D Port Sunlight, Quarry Road East, Wirral, CH63 3JW (United Kingdom)

    2010-02-05

    In this paper the question 'is the q-Fourier transform of a q-Gaussian a q'-Gaussian (with some q') up to a constant factor?' is studied for the whole range of q in (- infty, 3). This question is connected with applicability of the q-Fourier transform in the study of limit processes in nonextensive statistical mechanics. Using the functional differential equation approach we prove that the answer is affirmative if and only if 1 <= q < 3, excluding two particular cases of q < 1, namely q=1/2 and q=2/3. Complementarily, we discuss some applications of the q-Fourier transform to nonlinear partial differential equations such as the porous medium equation.

  4. q-deformed harmonic and Clifford analysis and the q-Hermite and Laguerre polynomials

    Science.gov (United States)

    Coulembier, K.; Sommen, F.

    2010-03-01

    We define a q-deformation of the Dirac operator, inspired by the one-dimensional q-derivative. This implies a q-deformation of the partial derivatives. By taking the square of this Dirac operator we find a q-deformation of the Laplace operator. This allows us to construct q-deformed Schrödinger equations in higher dimensions. The equivalence of these Schrödinger equations with those defined on q-Euclidean space in quantum variables is shown. We also define the m-dimensional q-Clifford-Hermite polynomials and show their connection with the q-Laguerre polynomials. These polynomials are orthogonal with respect to an m-dimensional q-integration, which is related to integration on q-Euclidean space. The q-Laguerre polynomials are the eigenvectors of an suq(1|1)-representation.

  5. Phase-coded pulse aperiodic transmitter coding

    Directory of Open Access Journals (Sweden)

    I. I. Virtanen

    2009-07-01

    Full Text Available Both ionospheric and weather radar communities have already adopted the method of transmitting radar pulses in an aperiodic manner when measuring moderately overspread targets. Among the users of the ionospheric radars, this method is called Aperiodic Transmitter Coding (ATC, whereas the weather radar users have adopted the term Simultaneous Multiple Pulse-Repetition Frequency (SMPRF. When probing the ionosphere at the carrier frequencies of the EISCAT Incoherent Scatter Radar facilities, the range extent of the detectable target is typically of the order of one thousand kilometers – about seven milliseconds – whereas the characteristic correlation time of the scattered signal varies from a few milliseconds in the D-region to only tens of microseconds in the F-region. If one is interested in estimating the scattering autocorrelation function (ACF at time lags shorter than the F-region correlation time, the D-region must be considered as a moderately overspread target, whereas the F-region is a severely overspread one. Given the technical restrictions of the radar hardware, a combination of ATC and phase-coded long pulses is advantageous for this kind of target. We evaluate such an experiment under infinitely low signal-to-noise ratio (SNR conditions using lag profile inversion. In addition, a qualitative evaluation under high-SNR conditions is performed by analysing simulated data. The results show that an acceptable estimation accuracy and a very good lag resolution in the D-region can be achieved with a pulse length long enough for simultaneous E- and F-region measurements with a reasonable lag extent. The new experiment design is tested with the EISCAT Tromsø VHF (224 MHz radar. An example of a full D/E/F-region ACF from the test run is shown at the end of the paper.

  6. q-Integration on Quantum Spaces

    OpenAIRE

    Wachter, Hartmut

    2002-01-01

    In this article we present formulae for q-integration on quantum spaces which could be of particular importance in physics, i.e. q-deformed Minkowski space and q-deformed Euclidean space in 3 or 4 dimensions. Furthermore, our formulae can be regarded as a generalization of Jackson's q-integral to 3 and 4 dimensions and provide a new possibility for an integration over the whole space being invariant under translations and rotations.

  7. q-Integration on quantum spaces

    Energy Technology Data Exchange (ETDEWEB)

    Wachter, H. [Sektion Physik, Ludwig-Maximilians-Universitaet, Theresienstr. 37, 80333, Muenchen (Germany)

    2004-01-01

    In this article we present explicit formulae for q-integration on quantum spaces which could be of particular importance in physics, i.e., q-deformed Minkowski space and q-deformed Euclidean space in three or four dimensions. Furthermore, our formulae can be regarded as a generalization of Jackson's q-integral to three or four dimensions and provide a new possibility for an integration over the whole space being invariant under translations and rotations. (orig.)

  8. Nested Quantum Error Correction Codes

    CERN Document Server

    Wang, Zhuo; Fan, Hen; Vedral, Vlatko

    2009-01-01

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  9. MHD Generation Code

    CERN Document Server

    Frutos-Alfaro, Francisco

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  10. Autocatalysis, information and coding.

    Science.gov (United States)

    Wills, P R

    2001-01-01

    Autocatalytic self-construction in macromolecular systems requires the existence of a reflexive relationship between structural components and the functional operations they perform to synthesise themselves. The possibility of reflexivity depends on formal, semiotic features of the catalytic structure-function relationship, that is, the embedding of catalytic functions in the space of polymeric structures. Reflexivity is a semiotic property of some genetic sequences. Such sequences may serve as the basis for the evolution of coding as a result of autocatalytic self-organisation in a population of assignment catalysts. Autocatalytic selection is a mechanism whereby matter becomes differentiated in primitive biochemical systems. In the case of coding self-organisation, it corresponds to the creation of symbolic information. Prions are present-day entities whose replication through autocatalysis reflects aspects of biological semiotics less obvious than genetic coding.

  11. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  12. Adjoint code generator

    Institute of Scientific and Technical Information of China (English)

    CHENG Qiang; CAO JianWen; WANG Bin; ZHANG HaiBin

    2009-01-01

    The adjoint code generator (ADG) is developed to produce the adjoint codes, which are used to analytically calculate gradients and the Hessian-vector products with the costs independent of the number of the independent variables. Different from other automatic differentiation tools, the implementation of ADG has advantages of using the least program behavior decomposition method and several static dependence analysis techniques. In this paper we first address the concerned concepts and fundamentals, and then introduce the functionality and the features of ADG. In particular, we also discuss the design architecture of ADG and implementation details including the recomputation and storing strategy and several techniques for code optimization. Some experimental results in several applications are presented at the end.

  13. Code query by example

    Science.gov (United States)

    Vaucouleur, Sebastien

    2011-02-01

    We introduce code query by example for customisation of evolvable software products in general and of enterprise resource planning systems (ERPs) in particular. The concept is based on an initial empirical study on practices around ERP systems. We motivate our design choices based on those empirical results, and we show how the proposed solution helps with respect to the infamous upgrade problem: the conflict between the need for customisation and the need for upgrade of ERP systems. We further show how code query by example can be used as a form of lightweight static analysis, to detect automatically potential defects in large software products. Code query by example as a form of lightweight static analysis is particularly interesting in the context of ERP systems: it is often the case that programmers working in this field are not computer science specialists but more of domain experts. Hence, they require a simple language to express custom rules.

  14. Spread codes and spread decoding in network coding

    OpenAIRE

    Manganiello, F; Gorla, E.; Rosenthal, J.

    2008-01-01

    In this paper we introduce the class of spread codes for the use in random network coding. Spread codes are based on the construction of spreads in finite projective geometry. The major contribution of the paper is an efficient decoding algorithm of spread codes up to half the minimum distance.

  15. Graph Codes with Reed-Solomon Component Codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Justesen, Jørn

    2006-01-01

    We treat a specific case of codes based on bipartite expander graphs coming from finite geometries. The code symbols are associated with the branches and the symbols connected to a given node are restricted to be codewords in a Reed-Solomon code. We give results on the parameters of the codes...

  16. Calculation of k(Q(clin),Q(msr) ) (f(clin),f(msr) ) for several small detectors and for two linear accelerators using Monte Carlo simulations.

    Science.gov (United States)

    Francescon, P; Cora, S; Satariano, N

    2011-12-01

    The scope of this study was to determine a complete set of correction factors for several detectors in static small photon fields for two linear accelerators (linacs) and for several detectors. Measurements for Monte Carlo (MC) commissioning were performed for two linacs, Siemens Primus and Elekta Synergy. After having determined the source parameters that best fit the measurements of field specific output factors, profiles, and tissue-phantom ratio, the generalized version of the classical beam quality correction factor for static small fields, k(Q(clin),Q(msr) ) (f(clin),f(msr) ), were determined for several types of detectors by using the egs_chamber Monte Carlo user code which can accurately reproduce the geometry and the material composition of the detector. The influence of many parameters (energy and radial FWHM of the electron beam source, field dimensions, type of accelerator) on the value of k(Q(clin),Q(msr) ) (f(clin),f(msr) ) was evaluated. Moreover, a MC analysis of the parameters that influence the change of k(Q(clin),Q(msr) ) (f(clin),f(msr) ) as a function of field dimension was performed. A detailed analysis of uncertainties related to the measurements of the field specific output factor and to the Monte Carlo calculation of k(Q(clin),Q(msr) ) (f(clin),f(msr) ) was done. The simulations demonstrated that the correction factor k(Q(clin),Q(msr) ) (f(clin),f(msr) ) can be considered independent from the quality beam factor Q in the range 0.68  ±  0.01 for all the detectors analyzed. The k(Q(clin),Q(msr) ) (f(clin),f(msr) ) of PTW 60012 and EDGE diodes can be assumed dependent only on the field size, for fields down to 0.5 × 0.5 cm². The microLion, and the microchambers, instead, must be used with some caution because they exhibit a slight dependence on the radial FWHM of the electron source, and therefore, a correction factor only dependent on field size can be used for fields ≥ 0.75 × 0.75 and ≥ 1.0 × 1.0 cm², respectively. The

  17. The immune response in Q fever

    NARCIS (Netherlands)

    Schoffelen, T.

    2015-01-01

    Q fever is an infection caused by the bacterium Coxiella burnetii. A large outbreak of Q fever occurred in the Netherlands between 2007 and 2010, in which infected goats and sheep were the source of human infections. In some people, so-called ‘chronic Q fever’ develops, which mainly manifests as end

  18. Heavy-quark symmetry implies stable heavy tetraquark mesons $Q_iQ_j \\bar q_k \\bar q_l$

    Energy Technology Data Exchange (ETDEWEB)

    Eichten, Estia J.; Quigg, Chris

    2017-07-29

    For very heavy quarks $Q$, relations derived from heavy-quark symmetry predict the existence of novel narrow doubly heavy tetraquark states of the form $Q_iQ_j \\bar q_k \\bar q_l$ (subscripts label flavors), where $q$ designates a light quark. By evaluating finite-mass corrections, we predict that double-beauty states composed of $bb\\bar u \\bar d$, $bb\\bar u \\bar s$, and $bb\\bar d \\bar s$ will be stable against strong decays, whereas the double-charm states $cc \\bar q_k \\bar q_l$, mixed beauty+charm states $bc \\bar q_k \\bar q_l$, and heavier $bb \\bar q_k \\bar q_l$ states will dissociate into pairs of heavy-light mesons. Observation of a new double-beauty state through its weak decays would establish the existence of tetraquarks and illuminate the role of heavy color-antitriplet diquarks as hadron constituents.

  19. q-exchangeability via quasi-invariance

    NARCIS (Netherlands)

    Gnedin, A.V.; Olshanski, G.

    2010-01-01

    For positive q is not 1, the q-exchangeability of an infinite random word is introduced as quasi-invariance under permutations of letters, with a special cocycle which accounts for inversions in the word. This framework allows us to extend the q-analog of de Finetti’s theorem for binary sequences—se

  20. Speeding Up Q(lambda)-learning

    NARCIS (Netherlands)

    Wiering, M.A.; Schmidhuber, J.

    1998-01-01

    Q(lambda)-learning uses TD(lambda)-methods to accelerate Q learning. The worst case complexity for a single update step of previous online Q(lambda)implementations based on lookup tables is bounded by the size of the state action space. Our faster algorithm's worst case complexity is bounded by the

  1. The immune response in Q fever

    NARCIS (Netherlands)

    Schoffelen, T.

    2015-01-01

    Q fever is an infection caused by the bacterium Coxiella burnetii. A large outbreak of Q fever occurred in the Netherlands between 2007 and 2010, in which infected goats and sheep were the source of human infections. In some people, so-called ‘chronic Q fever’ develops, which mainly manifests as

  2. QTL Information Table: 772 [Q-TARO

    Lifescience Database Archive (English)

    Full Text Available qGT-6 Physiological trait Eating quality Gelatinization temperature SSR C)Interval DHL Wuyuji...ng 2 Zhenshan 97B A RM276 RM121 pha Tian, R., Jiang, G.-H., Shen, L.-H., Wang, L.-Q., and He, Y.-Q

  3. QTL Information Table: 774 [Q-TARO

    Lifescience Database Archive (English)

    Full Text Available qCRE-6 Physiological trait Eating quality cooked rice elongation SSR C)Interval DHL Wuyuji...ng 2 Zhenshan 97B A RM170 RM190 pha Tian, R., Jiang, G.-H., Shen, L.-H., Wang, L.-Q., and He, Y.-Q. (

  4. QTL Information Table: 321 [Q-TARO

    Lifescience Database Archive (English)

    Full Text Available qCR-3 Physiological trait Source activity chlorophyll a/b ratio RFLP C)Interval RIL... Kinmaze DV85 B C25 R518 rgn Hu, M.L., Wang, C.M., Yang, Q.H., Zhai, H.Q., and Wan, J.M. (2004). QTL analysis for trait

  5. QTL Information Table: 322 [Q-TARO

    Lifescience Database Archive (English)

    Full Text Available qCC-1 Physiological trait Source activity chlorophyll content of leaf RFLP C)Interv...al RIL Kinmaze DV85 B C122 R1012 rgn Hu, M.L., Wang, C.M., Yang, Q.H., Zhai, H.Q., and Wan, J.M. (2004). QTL analysis for trait

  6. Q Methodology, Communication, and the Behavioral Text.

    Science.gov (United States)

    McKeown, Bruce

    1990-01-01

    Discusses Q methodology in light of modern philosophy of science and hermeneutics. Outlines and discusses the basic steps of conducting Q-method research. Suggests that Q methodology allows researchers to understand and interpret the subjective text of respondents without confounding them with external categories of theoretical reflection. (RS)

  7. DanQ: a hybrid convolutional and recurrent deep neural network for quantifying the function of DNA sequences.

    Science.gov (United States)

    Quang, Daniel; Xie, Xiaohui

    2016-06-20

    Modeling the properties and functions of DNA sequences is an important, but challenging task in the broad field of genomics. This task is particularly difficult for non-coding DNA, the vast majority of which is still poorly understood in terms of function. A powerful predictive model for the function of non-coding DNA can have enormous benefit for both basic science and translational research because over 98% of the human genome is non-coding and 93% of disease-associated variants lie in these regions. To address this need, we propose DanQ, a novel hybrid convolutional and bi-directional long short-term memory recurrent neural network framework for predicting non-coding function de novo from sequence. In the DanQ model, the convolution layer captures regulatory motifs, while the recurrent layer captures long-term dependencies between the motifs in order to learn a regulatory 'grammar' to improve predictions. DanQ improves considerably upon other models across several metrics. For some regulatory markers, DanQ can achieve over a 50% relative improvement in the area under the precision-recall curve metric compared to related models. We have made the source code available at the github repository http://github.com/uci-cbcl/DanQ.

  8. Flexible digital modulation and coding synthesis for satellite communications

    Science.gov (United States)

    Vanderaar, Mark; Budinger, James; Hoerig, Craig; Tague, John

    1991-01-01

    An architecture and a hardware prototype of a flexible trellis modem/codec (FTMC) transmitter are presented. The theory of operation is built upon a pragmatic approach to trellis-coded modulation that emphasizes power and spectral efficiency. The system incorporates programmable modulation formats, variations of trellis-coding, digital baseband pulse-shaping, and digital channel precompensation. The modulation formats examined include (uncoded and coded) binary phase shift keying (BPSK), quatenary phase shift keying (QPSK), octal phase shift keying (8PSK), 16-ary quadrature amplitude modulation (16-QAM), and quadrature quadrature phase shift keying (Q squared PSK) at programmable rates up to 20 megabits per second (Mbps). The FTMC is part of the developing test bed to quantify modulation and coding concepts.

  9. Principles of speech coding

    CERN Document Server

    Ogunfunmi, Tokunbo

    2010-01-01

    It is becoming increasingly apparent that all forms of communication-including voice-will be transmitted through packet-switched networks based on the Internet Protocol (IP). Therefore, the design of modern devices that rely on speech interfaces, such as cell phones and PDAs, requires a complete and up-to-date understanding of the basics of speech coding. Outlines key signal processing algorithms used to mitigate impairments to speech quality in VoIP networksOffering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the

  10. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called &apos

  11. Genetic and functional characterisation of the P/Q calcium channel in episodic ataxia with epilepsy.

    Science.gov (United States)

    Rajakulendran, Sanjeev; Graves, Tracey D; Labrum, Robyn W; Kotzadimitriou, Dimitrios; Eunson, Louise; Davis, Mary B; Davies, Rosalyn; Wood, Nicholas W; Kullmann, Dimitri M; Hanna, Michael G; Schorge, Stephanie

    2010-06-01

    Mutations in CACNA1A, which encodes the principal subunit of the P/Q calcium channel, underlie episodic ataxia type 2 (EA2). In addition, some patients with episodic ataxia complicated by epilepsy have been shown to harbour CACNA1A mutations, raising the possibility that P/Q channel dysfunction may be linked to human epilepsy. We undertook a review of all published CACNA1A EA2 cases and this showed that 7% have epilepsy--representing a sevenfold increased epilepsy risk compared to the background population risk (Pepisodic ataxia accompanied by epilepsy and/or clearly epileptiform electroencephalograms (EEGs). We screened the entire coding region of CACNA1A for point mutations and rearrangements to determine if genetic variation in the gene is associated with the epilepsy phenotype, and measured the functional impact of all missense variations on heterologously expressed P/Q channels. We identified two large scale deletions and two new missense mutations in CACNA1A. When expressed, L621R had little detectable effect on P/Q channel function, while the other missense change, G540R, caused an approximately 30% reduction in current density. In nine patients we also identified the previously reported non-synonymous coding variants (E921D and E993V) which also resulted in impairment of P/Q channel function. Taken together, 12 of the 17 patients have genetic changes which decrease P/Q channel function. We conclude that variants in the coding region of CACNA1A that confer a loss of P/Q-type channel function are associated with episodic ataxia and epilepsy. Our data suggest that functional stratification of all variants, including common polymorphisms, rare variants and novel mutations, may provide new insights into the mechanisms of channelopathies.

  12. Colorectal cancer linkage on chromosomes 4q21, 8q13, 12q24, and 15q22.

    Directory of Open Access Journals (Sweden)

    Mine S Cicek

    Full Text Available A substantial proportion of familial colorectal cancer (CRC is not a consequence of known susceptibility loci, such as mismatch repair (MMR genes, supporting the existence of additional loci. To identify novel CRC loci, we conducted a genome-wide linkage scan in 356 white families with no evidence of defective MMR (i.e., no loss of tumor expression of MMR proteins, no microsatellite instability (MSI-high tumors, or no evidence of linkage to MMR genes. Families were ascertained via the Colon Cancer Family Registry multi-site NCI-supported consortium (Colon CFR, the City of Hope Comprehensive Cancer Center, and Memorial University of Newfoundland. A total of 1,612 individuals (average 5.0 per family including 2.2 affected were genotyped using genome-wide single nucleotide polymorphism linkage arrays; parametric and non-parametric linkage analysis used MERLIN in a priori-defined family groups. Five lod scores greater than 3.0 were observed assuming heterogeneity. The greatest were among families with mean age of diagnosis less than 50 years at 4q21.1 (dominant HLOD = 4.51, α = 0.84, 145.40 cM, rs10518142 and among all families at 12q24.32 (dominant HLOD = 3.60, α = 0.48, 285.15 cM, rs952093. Among families with four or more affected individuals and among clinic-based families, a common peak was observed at 15q22.31 (101.40 cM, rs1477798; dominant HLOD = 3.07, α = 0.29; dominant HLOD = 3.03, α = 0.32, respectively. Analysis of families with only two affected individuals yielded a peak at 8q13.2 (recessive HLOD = 3.02, α = 0.51, 132.52 cM, rs1319036. These previously unreported linkage peaks demonstrate the continued utility of family-based data in complex traits and suggest that new CRC risk alleles remain to be elucidated.

  13. PREDUAL SPACES FOR Q SPACES

    Institute of Scientific and Technical Information of China (English)

    Peng Lizhong; Yang Qixiang

    2009-01-01

    To find the predual spaces PαRn) of QαRn) is an important motivation in the study of Q spaces. In this article, wavelet methods are used to solve this problem in a constructive way. First, an wavelet tent atomic characterization of PαRn) is given, then its usual atomic characterization and Poisson extension characterization are given. Finally, the continuity on Pαof Calderón-Zygmund operators is studied, and the result can be also applied to give the Morrey characterization of PαRn).

  14. New code match strategy for wideband code division multiple access code tree management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Orthogonal variable spreading factor channelization codes are widely used to provide variable data rates for supporting different bandwidth requirements in wideband code division multiple access (WCDMA) systems. A new code match scheme for WCDMA code tree management was proposed. The code match scheme is similar to the existing crowed-first scheme. When choosing a code for a user, the code match scheme only compares the one up layer of the allocated codes, unlike the crowed-first scheme which perhaps compares all up layers. So the operation of code match scheme is simple, and the average time delay is decreased by 5.1%. The simulation results also show that the code match strategy can decrease the average code blocking probability by 8.4%.

  15. Reed-Solomon convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Schmale, W

    2005-01-01

    In this paper we will introduce a specific class of cyclic convolutional codes. The construction is based on Reed-Solomon block codes. The algebraic parameters as well as the distance of these codes are determined. This shows that some of these codes are optimal or near optimal.

  16. Bogoliubov q-transformation and Clebsch-Gordan coefficients for a q-oscillator

    Science.gov (United States)

    Zhedanov, A. S.

    1992-05-01

    The q-analog of the Bogoliubov transformation is found, yielding the third q-Bose operator from the two independent ones. In contrast to the ordinary case, this transformation is non-linear. Considered as a co-multiplication for the q-oscillator algebra, this transformation generates the Clebsch-Gordan series with coefficients expressed via the Kravchuk q-polynomials.

  17. A characterization of the desarguesian planes of order q2 by SL(2,q

    Directory of Open Access Journals (Sweden)

    D. A. Foulser

    1983-01-01

    Full Text Available The main result is that if the translation complement of a translation plane of order q2 contains a group isomorphic to SL(2,q and if the subgroups of order q are elations (shears, then the plane is Desarguesian. This generalizes earlier work of Walker, who assumed that the kernel of the plane contained GF(q.

  18. A computer code for calculations in the algebraic collective model of the atomic nucleus

    CERN Document Server

    Welsh, T A

    2016-01-01

    A Maple code is presented for algebraic collective model (ACM) calculations. The ACM is an algebraic version of the Bohr model of the atomic nucleus, in which all required matrix elements are derived by exploiting the model's SU(1,1) x SO(5) dynamical group. This, in particular, obviates the use of coefficients of fractional parentage. This paper reviews the mathematical formulation of the ACM, and serves as a manual for the code. The code makes use of expressions for matrix elements derived elsewhere and newly derived matrix elements of the operators [pi x q x pi]_0 and [pi x pi]_{LM}, where q_M are the model's quadrupole moments, and pi_N are corresponding conjugate momenta (-2>=M,N<=2). The code also provides ready access to SO(3)-reduced SO(5) Clebsch-Gordan coefficients through data files provided with the code.

  19. Analysis of the radiative decays $\\Sigma_Q \\to \\Lambda_Q \\gamma$ and $\\Xi^\\prime_Q \\to \\Xi_Q \\gamma$ in light cone sum rules

    CERN Document Server

    Aliev, T M; Savcı, M

    2016-01-01

    The light cone sum rules method is used in studying the radiative decays $\\Sigma_Q \\to \\Lambda_Q \\gamma$ and $\\Xi^\\prime_Q \\to \\Xi_Q \\gamma$. Firstly, the sum rules for the form factor $F_2(Q^2=0)$ responsible for these transitions is constructed. Using this result the decay widths of the above--mentioned decays are calculated and analyzed. A comparison of our predictions on the decay widths of considered transitions with the predictions of the other approaches is presented.

  20. Partial trisomy 4q: a case report

    Institute of Scientific and Technical Information of China (English)

    CUI Ying-xia; WANG Yun-hua; HAO Li-jun; HOU Lin; LI Wei; HUANG Yun-feng

    2006-01-01

    @@ The clinical findings frequently presented in trisomy 4q syndrome including mental retardation, developmental delay and multiple abnormalities such as microcephaly, acrocephaly, as well as malformed ears, high/broad/depressed nasal bridge, teeth and thumb anomalies. It has been proposed that trisomy 4q is caused by a familial balanced translocation or a de novo imbalance. We reported a new case of trisomy 4q with a karyotype of 46, XY, der(5)t(4;5)(q27;q35) and this karyotye was reported for the first time.

  1. New code of conduct

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    During his talk to the staff at the beginning of the year, the Director-General mentioned that a new code of conduct was being drawn up. What exactly is it and what is its purpose? Anne-Sylvie Catherin, Head of the Human Resources (HR) Department, talked to us about the whys and wherefores of the project.   Drawing by Georges Boixader from the cartoon strip “The World of Particles” by Brian Southworth. A code of conduct is a general framework laying down the behaviour expected of all members of an organisation's personnel. “CERN is one of the very few international organisations that don’t yet have one", explains Anne-Sylvie Catherin. “We have been thinking about introducing a code of conduct for a long time but lacked the necessary resources until now”. The call for a code of conduct has come from different sources within the Laboratory. “The Equal Opportunities Advisory Panel (read also the "Equal opportuni...

  2. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  3. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and compositi

  4. Polar Code Validation

    Science.gov (United States)

    1989-09-30

    SUMMARY OF POLAR ACHIEVEMENTS ..... .......... 3 3. POLAR CODE PHYSICAL MODELS ..... ............. 5 3.1 PL- ASMA Su ^"ru5 I1LS SH A...of this problem. 1.1. The Charge-2 Rocket The Charge-2 payload was launched on a Black Brant VB from White Sands Mis- sile Range in New Mexico in

  5. Corporate governance through codes

    NARCIS (Netherlands)

    Haxhi, I.; Aguilera, R.V.; Vodosek, M.; den Hartog, D.; McNett, J.M.

    2014-01-01

    The UK's 1992 Cadbury Report defines corporate governance (CG) as the system by which businesses are directed and controlled. CG codes are a set of best practices designed to address deficiencies in the formal contracts and institutions by suggesting prescriptions on the preferred role and

  6. (Almost) practical tree codes

    KAUST Repository

    Khina, Anatoly

    2016-08-15

    We consider the problem of stabilizing an unstable plant driven by bounded noise over a digital noisy communication link, a scenario at the heart of networked control. To stabilize such a plant, one needs real-time encoding and decoding with an error probability profile that decays exponentially with the decoding delay. The works of Schulman and Sahai over the past two decades have developed the notions of tree codes and anytime capacity, and provided the theoretical framework for studying such problems. Nonetheless, there has been little practical progress in this area due to the absence of explicit constructions of tree codes with efficient encoding and decoding algorithms. Recently, linear time-invariant tree codes were proposed to achieve the desired result under maximum-likelihood decoding. In this work, we take one more step towards practicality, by showing that these codes can be efficiently decoded using sequential decoding algorithms, up to some loss in performance (and with some practical complexity caveats). We supplement our theoretical results with numerical simulations that demonstrate the effectiveness of the decoder in a control system setting.

  7. Corner neutronic code

    Directory of Open Access Journals (Sweden)

    V.P. Bereznev

    2015-10-01

    An iterative solution process is used, including external iterations for the fission source and internal iterations for the scattering source. The paper presents the results of a cross-verification against the Monte Carlo MMK code [3] and on a model of the BN-800 reactor core.

  8. Ready, steady… Code!

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    This summer, CERN took part in the Google Summer of Code programme for the third year in succession. Open to students from all over the world, this programme leads to very successful collaborations for open source software projects.   Image: GSoC 2013. Google Summer of Code (GSoC) is a global programme that offers student developers grants to write code for open-source software projects. Since its creation in 2005, the programme has brought together some 6,000 students from over 100 countries worldwide. The students selected by Google are paired with a mentor from one of the participating projects, which can be led by institutes, organisations, companies, etc. This year, CERN PH Department’s SFT (Software Development for Experiments) Group took part in the GSoC programme for the third time, submitting 15 open-source projects. “Once published on the Google Summer for Code website (in April), the projects are open to applications,” says Jakob Blomer, one of the o...

  9. Focusing Automatic Code Inspections

    NARCIS (Netherlands)

    Boogerd, C.J.

    2010-01-01

    Automatic Code Inspection tools help developers in early detection of defects in software. A well-known drawback of many automatic inspection approaches is that they yield too many warnings and require a clearer focus. In this thesis, we provide such focus by proposing two methods to prioritize

  10. On q-Difference Riccati Equations and Second-Order Linear q-Difference Equations

    Directory of Open Access Journals (Sweden)

    Zhi-Bo Huang

    2013-01-01

    Full Text Available We consider q-difference Riccati equations and second-order linear q-difference equations in the complex plane. We present some basic properties, such as the transformations between these two equations, the representations and the value distribution of meromorphic solutions of q-difference Riccati equations, and the q-Casorati determinant of meromorphic solutions of second-order linear q-difference equations. In particular, we find that the meromorphic solutions of these two equations are concerned with the q-Gamma function when q∈ℂ such that 0<|q|<1. Some examples are also listed to illustrate our results.

  11. The Q-angle and sport

    DEFF Research Database (Denmark)

    Hahn, Thomas; Foldspang, Anders

    1997-01-01

    Quadriceps muscle contraction tends to straighten the Q angle. We expected that sports comprising a high amount of quadriceps training could be associated with low Q angles. The aim of the present study was to estimate the Q angle in athletes and to investigate its potential associations with par......Quadriceps muscle contraction tends to straighten the Q angle. We expected that sports comprising a high amount of quadriceps training could be associated with low Q angles. The aim of the present study was to estimate the Q angle in athletes and to investigate its potential associations...... with participation in sport. Three hundred and thirty-nine athletes had their Q angle measured. The mean of right-side Q angles was higher than left side, and the mean Q angle was higher in women than in men. The Q angle was positively associated with years of jogging, and negatively with years of soccer, swimming...... and sports participation at all. It is concluded that the use of Q angle measurements is questionable....

  12. RECENT ADVANCES IN THE 5Q- SYNDROME

    Directory of Open Access Journals (Sweden)

    Andrea Pellagatti

    2015-05-01

    Full Text Available The 5q- syndrome is the most distinct of the myelodysplastic syndromes (MDS and patients with this disorder have a deletion of chromosome 5q [del(5q] as the sole karyotypic abnormality. Several genes mapping to the commonly deleted region of the 5q- syndrome have been implicated in disease pathogenesis in recent years. Haploinsufficiency of the ribosomal gene RPS14 has been shown to cause the erythroid defect in the 5q- syndrome. Loss of the microRNA genes miR-145 and miR-146a has been associated with the thrombocytosis observed in 5q- syndrome patients. Haploinsufficiency of CSNK1A1 leads to hematopoietic stem cell expansion in mice and may play a role in the initial clonal expansion in patients with 5q- syndrome. Moreover, a subset of patients harbor mutation of the remaining CSNK1A1 allele. Mouse models of the 5q- syndrome, which recapitulate the key features of the human disease, indicate that a p53-dependent mechanism underlies the pathophysiology of this disorder. Importantly, activation of p53 has been demonstrated in the human 5q- syndrome. Recurrent TP53 mutations have been associated with an increased risk of disease evolution and with decreased response to the drug lenalidomide in del(5q MDS patients. Potential new therapeutic agents for del(5q MDS include the translation enhancer L-leucine.

  13. On q-n-gonal Klein Surfaces

    Institute of Scientific and Technical Information of China (English)

    B. ESTRADA; R. A. HIDALGO; E.MARTINEZ

    2007-01-01

    We consider proper Klein surfaces X of algebraic genus p≥2, having an automorphismφ of prime order n with quotient space X/〈φ〉 of algebraic genus q. These Klein surfaces axe calledq-n-gonal surfaces and they axe n-sheeted covers of surfaces of algebraic genus q. In this paper weextend the results of the already studied cases n ≤3 to this more general situation. Given p≥2, weobtain, for each prime n, the (admissible) values q for which there exists a q-n-gonal surface of algebraicgenus p. Furthermore, for each p and for each admissible q, it is possible to check all topological typesof q-n-gonal surfaces with algebraic genus p. Several examples are given: q-pentagonal surfaces andq-n-gonal bordered surfaces with topological genus g = 0,1.

  14. New results on q-positivity

    CERN Document Server

    Ramos, Y García; Simons, S

    2011-01-01

    In this paper we discuss symmetrically self-dual spaces, which are simply real vector spaces with a symmetric bilinear form. Certain subsets of the space will be called q-positive, where q is the quadratic form induced by the original bilinear form. The notion of q-positivity generalizes the classical notion of the monotonicity of a subset of a product of a Banach space and its dual. Maximal q-positivity then generalizes maximal monotonicity. We discuss concepts generalizing the representations of monotone sets by convex functions, as well as the number of maximally q-positive extensions of a q-positive set. We also discuss symmetrically self-dual Banach spaces, in which we add a Banach space structure, giving new characterizations of maximal q-positivity. The paper finishes with two new examples.

  15. Q3-D3-LSA

    OpenAIRE

    Borke, Lukas; Härdle, Wolfgang

    2016-01-01

    QuantNet 1 is an integrated web-based environment consisting of different types of statistics-related documents and program codes. Its goal is creating reproducibility and offering a platform for sharing validated knowledge native to the social web. To increase the information retrieval (IR) efficiency there is a need for incorporating semantic information. Three text mining models will be examined: vector space model (VSM), generalized VSM (GVSM) and latent semantic analysis (LSA). The LSA h...

  16. Fundamentals of coding and reimbursement.

    Science.gov (United States)

    Price, Paula

    2002-01-01

    After completing this introduction to radiology coding and reimbursement, readers will: Understand how health care reimbursement evolved over the past 50 years. Know the importance of documenting the patient's history. Have an overall picture of the standardized numerical coding system. Understand how accurate coding affects reimbursement. Understand coding functions as they pertain to regulatory compliance in the radiology department. Be familiar with the U.S. Justice Department's use of coding in tracking health care fraud.

  17. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  18. Maternal uniparental disomy of chromosome 14 in a boy with t(14q14q) associated with a paternal t(13q14q)

    Energy Technology Data Exchange (ETDEWEB)

    Tomkins, D.J.; Waye, J.S.; Whelan, D.T. [McMaster Univ., Ontario (Canada)] [and others

    1994-09-01

    An 11-year-old boy was referred for chromosomal analysis because of precocious development and behavioral problems suggestive of the fragile X syndrome. The cytogenetic fragile X studies were normal, but a routine GTG-banded karyotype revealed an abnormal male karyotype with a Robertsonian translocation between the two chromosome 14`s: 46,XY,t(14q14q). Paternal karyotyping revealed another abnormal karyotype: 46,XY,t(13q14q). A brother had the same karyotype as the father; the mother was deceased. In order to determine if the apparently balanced t(14q14q) in the proband might be the cause of the clinical findings, molecular analysis of the origin of the chromosome 14`s was initiated. Southern blotting and hybridization with D4S13 showed that the proband had two copies of one maternal allele which was shared by his brother. The brother`s second allele corresponded to one of the paternal alleles; the proband had no alleles from the father. Analysis of four other VNTRs demonstrated the probability of paternity to be greater than 99%. Thus, the t(14q14q) was most likely composed of two maternal chromosome 14`s. Further characterization of the t(14q14q) by dinucleotide repeat polymorphic markers is in progress to determine whether it has arisen from maternal isodisomy or heterodisomy. Several cases of uniparental disomy for chromosome 14 have been reported recently. Paternal disomy appears to be associated with more severe congenital anomalies and mental retardation, whereas maternal disomy may be associated with premature puberty and minimal intellectual impairment. The origin of the t(14q14q) in the present case may be related to the paternal translocation, as the segregation of the t(13q14q) in meiosis could lead to sperm that are nullisomic for chromosome 14.

  19. Sl$_{q}$(2) realizations for Kepler and oscillator potentials and q-canonical transformations

    CERN Document Server

    Dayi, O F; Dayi, O F; Duru, I H

    1994-01-01

    The realizations of the Lie algebra corresponding to the dynamical symmetry group SO(2,1) of the Kepler and oscillator potentials are q-deformed. The q-canonical transformation connecting two realizations is given and a general definition for q-canonical transformation is deduced. q-Schr\\"{o}dinger equation for a Kepler like potential is obtained from the q-oscillator Schr\\"{o}dinger equation. Energy spectrum and the ground state wave function are calculated.

  20. 基于病案数据检索的Q51和Q52编码问题的研究%Research on Q51 and Q52 Encoding Problems Based on Medical Records Data Retrieval

    Institute of Scientific and Technical Information of China (English)

    崔胜男; 周婧雅; 白雪; 庞成; 张萌; 朱瑞; 刘爱民

    2016-01-01

    By retrieving the name of diagnosis and operation in the medical records homepage information database, to investigate the problems in main diagnosis selection of coding represented by Q51 and Q52 of gynecology genitals malformation medical records, as well as the problem of missing encoding. We could find out problems of missing encoding, missing examination and mistaken selection of main diagnosis with the application of database retrieval. We could find out medical records with coding mistakes quickly by this method, improve work efficiency as well as accuracy and integrity of database retrieval, but would also missing some of medical records without coding. This paper identifies the principle of main diagnosis selection, and provides a method to check the leakage of encoding. The coders should improve the accuracy of encoding, and improve the retrieval precision and recall ratio, so as to provide comprehensive and accurate data basis for clinical research.%采用按诊断检索和手术方式检索的方法检索病案首页信息数据库,探讨具有Q51和Q52编码的妇科生殖器畸形病案的主要诊断选择问题以及漏编码问题.利用检索数据库的方式可发现漏编、漏检以及主要诊断选择错误的问题.采用这种方法可以迅速找到编码错误的病案,提高工作效率以及数据检索的完整性和准确性,但是也会遗漏部分漏编码病案.明确疾病的主要诊断选择原则,提供自查自检漏编码问题的方法,可以提高病案编码的正确性,提高病案检索的查准率和查全率,为临床研究提供更全面、准确的数据基础.

  1. Fountain Codes with Multiplicatively Repeated Non-Binary LDPC Codes

    CERN Document Server

    Kasai, Kenta

    2010-01-01

    We study fountain codes transmitted over the binary-input symmetric-output channel. For channels with small capacity, receivers needs to collects many channel outputs to recover information bits. Since a collected channel output yields a check node in the decoding Tanner graph, the channel with small capacity leads to large decoding complexity. In this paper, we introduce a novel fountain coding scheme with non-binary LDPC codes. The decoding complexity of the proposed fountain code does not depend on the channel. Numerical experiments show that the proposed codes exhibit better performance than conventional fountain codes, especially for small number of information bits.

  2. Quantum codes from linear codes over finite chain rings

    Science.gov (United States)

    Liu, Xiusheng; Liu, Hualu

    2017-10-01

    In this paper, we provide two methods of constructing quantum codes from linear codes over finite chain rings. The first one is derived from the Calderbank-Shor-Steane (CSS) construction applied to self-dual codes over finite chain rings. The second construction is derived from the CSS construction applied to Gray images of the linear codes over finite chain ring {\\mathbb {F}}_{p^{2m}}+u{\\mathbb {F}}_{p^{2m}}. The good parameters of quantum codes from cyclic codes over finite chain rings are obtained.

  3. On the Threshold of Maximum-Distance Separable Codes

    CERN Document Server

    Kindarji, Bruno; Chabanne, Hervé

    2010-01-01

    Starting from a practical use of Reed-Solomon codes in a cryptographic scheme published in Indocrypt'09, this paper deals with the threshold of linear $q$-ary error-correcting codes. The security of this scheme is based on the intractability of polynomial reconstruction when there is too much noise in the vector. Our approach switches from this paradigm to an Information Theoretical point of view: is there a class of elements that are so far away from the code that the list size is always superpolynomial? Or, dually speaking, is Maximum-Likelihood decoding almost surely impossible? We relate this issue to the decoding threshold of a code, and show that when the minimal distance of the code is high enough, the threshold effect is very sharp. In a second part, we explicit lower-bounds on the threshold of Maximum-Distance Separable codes such as Reed-Solomon codes, and compute the threshold for the toy example that motivates this study.

  4. q-Exchangeability via quasi-invariance

    CERN Document Server

    Gnedin, Alexander

    2009-01-01

    For positive q, the q-exchangeability is introduced as quasi-invariance under permutations, with a special cocycle. This allows us to extend the q-analogue of de Finetti's theorem for binary sequences (arXiv:0905.0367) to the general real-valued sequences. In contrast to the classical case with q=1, the order on the reals plays for the q-analogues a significant role. An explicit construction of ergodic q-exchangeable measures involves a random shuffling of the set N={1,2,..} by iteration of the geometric choice. For q distinct from 1, the shuffling yields a probability measure Q that is supported by the group of bijections of N, and has the property of quasi-invariance under both left and right multiplications by finite permutations. We establish connections of the q-exchangeability to certain transient Markov chains on the q-Pascal pyramids and to invariant random flags over the Galois fields.

  5. Reserved-Length Prefix Coding

    CERN Document Server

    Baer, Michael B

    2008-01-01

    Huffman coding finds an optimal prefix code for a given probability mass function. Consider situations in which one wishes to find an optimal code with the restriction that all codewords have lengths that lie in a user-specified set of lengths (or, equivalently, no codewords have lengths that lie in a complementary set). This paper introduces a polynomial-time dynamic programming algorithm that finds optimal codes for this reserved-length prefix coding problem. This has applications to quickly encoding and decoding lossless codes. In addition, one modification of the approach solves any quasiarithmetic prefix coding problem, while another finds optimal codes restricted to the set of codes with g codeword lengths for user-specified g (e.g., g=2).

  6. Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes

    CERN Document Server

    Senger, Christian; Bossert, Martin; Zyablov, Victor

    2008-01-01

    Generalized Concatenated codes are a code construction consisting of a number of outer codes whose code symbols are protected by an inner code. As outer codes, we assume the most frequently used Reed-Solomon codes; as inner code, we assume some linear block code which can be decoded up to half its minimum distance. Decoding up to half the minimum distance of Generalized Concatenated codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which iteratively decodes by first using the inner decoder to get an estimate of the outer code words and then using an outer error/erasure decoder with a varying number of erasures determined by a set of pre-calculated thresholds. In this paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed, which exploits the fact that a number of outer Reed-Solomon codes with average minimum distance d can be grouped into one single Interleaved Reed-Solomon code which can be decoded beyond d/2. This allows to skip a number of decoding iterations on the one...

  7. The NIMROD Code

    Science.gov (United States)

    Schnack, D. D.; Glasser, A. H.

    1996-11-01

    NIMROD is a new code system that is being developed for the analysis of modern fusion experiments. It is being designed from the beginning to make the maximum use of massively parallel computer architectures and computer graphics. The NIMROD physics kernel solves the three-dimensional, time-dependent two-fluid equations with neo-classical effects in toroidal geometry of arbitrary poloidal cross section. The NIMROD system also includes a pre-processor, a grid generator, and a post processor. User interaction with NIMROD is facilitated by a modern graphical user interface (GUI). The NIMROD project is using Quality Function Deployment (QFD) team management techniques to minimize re-engineering and reduce code development time. This paper gives an overview of the NIMROD project. Operation of the GUI is demonstrated, and the first results from the physics kernel are given.

  8. Epetra developers coding guidelines.

    Energy Technology Data Exchange (ETDEWEB)

    Heroux, Michael Allen; Sexton, Paul Michael

    2003-12-01

    Epetra is a package of classes for the construction and use of serial and distributed parallel linear algebra objects. It is one of the base packages in Trilinos. This document describes guidelines for Epetra coding style. The issues discussed here go beyond correct C++ syntax to address issues that make code more readable and self-consistent. The guidelines presented here are intended to aid current and future development of Epetra specifically. They reflect design decisions that were made in the early development stages of Epetra. Some of the guidelines are contrary to more commonly used conventions, but we choose to continue these practices for the purposes of self-consistency. These guidelines are intended to be complimentary to policies established in the Trilinos Developers Guide.

  9. Efficient convolutional sparse coding

    Energy Technology Data Exchange (ETDEWEB)

    Wohlberg, Brendt

    2017-06-20

    Computationally efficient algorithms may be applied for fast dictionary learning solving the convolutional sparse coding problem in the Fourier domain. More specifically, efficient convolutional sparse coding may be derived within an alternating direction method of multipliers (ADMM) framework that utilizes fast Fourier transforms (FFT) to solve the main linear system in the frequency domain. Such algorithms may enable a significant reduction in computational cost over conventional approaches by implementing a linear solver for the most critical and computationally expensive component of the conventional iterative algorithm. The theoretical computational cost of the algorithm may be reduced from O(M.sup.3N) to O(MN log N), where N is the dimensionality of the data and M is the number of elements in the dictionary. This significant improvement in efficiency may greatly increase the range of problems that can practically be addressed via convolutional sparse representations.

  10. Decoding the productivity code

    DEFF Research Database (Denmark)

    Hansen, David

    .e., to be prepared to initiate improvement. The study shows how the effectiveness of the improvement system depends on the congruent fit between the five elements as well as the bridging coherence between the improvement system and the work system. The bridging coherence depends on how improvements are activated...... approach often ends up with demanding intense employee focus to sustain improvement and engagement. Likewise, a single-minded employee development approach often ends up demanding rationalization to achieve the desired financial results. These ineffective approaches make organizations react like pendulums...... that swing between rationalization and employee development. The productivity code is the lack of alternatives to this ineffective approach. This thesis decodes the productivity code based on the results from a 3-year action research study at a medium-sized manufacturing facility. During the project period...

  11. Codes of Good Governance

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Sørensen, Ditte-Lene

    2013-01-01

    Good governance is a broad concept used by many international organizations to spell out how states or countries should be governed. Definitions vary, but there is a clear core of common public values, such as transparency, accountability, effectiveness, and the rule of law. It is quite likely......, however, that national views of good governance reflect different political cultures and institutional heritages. Fourteen national codes of conduct are analyzed. The findings suggest that public values converge and that they match model codes from the United Nations and the European Council as well...... as conceptions of good governance from other international organizations. While values converge, they are balanced and communicated differently, and seem to some extent to be translated into the national cultures. The set of global public values derived from this analysis include public interest, regime dignity...

  12. Confocal coded aperture imaging

    Energy Technology Data Exchange (ETDEWEB)

    Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

    2001-01-01

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  13. S3C: EBT Steady-State Shooting code description and user's guide

    Energy Technology Data Exchange (ETDEWEB)

    Downum, W.B.

    1983-09-01

    The Oak Ridge National Laboratory (ORNL) one-dimensional (1-D) Steady-State Shooting code (S3C) for ELMO Bumpy Torus (EBT) plasmas is described. Benchmark calculations finding the steady-state density and electron and ion temperature profiles for a known neutral density profile and known external energy sources are carried out. Good agreement is obtained with results from the ORNL Radially Resolved Time Dependent 1-D Transport code for an EBT-Q type reactor. The program logic is described, along with the physics models in each code block and the variable names used. Sample input and output files are listed, along with the main code.

  14. The Phantom SPH code

    Science.gov (United States)

    Price, Daniel; Wurster, James; Nixon, Chris

    2016-05-01

    I will present the capabilities of the Phantom SPH code for global simulations of dust and gas in protoplanetary discs. I will present our new algorithms for simulating both small and large grains in discs, as well as our progress towards simulating evolving grain populations and coupling with radiation. Finally, I will discuss our recent applications to HL Tau and the physics of dust gap opening.

  15. The Liege Oscillation Code

    CERN Document Server

    Scuflaire, R; Théado, S; Bourge, P -O; Miglio, A; Godart, M; Thoul, A; Noels, A

    2007-01-01

    The Liege Oscillation code can be used as a stand-alone program or as a library of subroutines that the user calls from a Fortran main program of his own to compute radial and non-radial adiabatic oscillations of stellar models. We describe the variables and the equations used by the program and the methods used to solve them. A brief account is given of the use and the output of the program.

  16. Status of MARS Code

    Energy Technology Data Exchange (ETDEWEB)

    N.V. Mokhov

    2003-04-09

    Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

  17. ARQ for Network Coding

    CERN Document Server

    Sundararajan, Jay Kumar; Médard, Muriel

    2008-01-01

    A new coding and queue management algorithm is proposed for communication networks that employ linear network coding. The algorithm has the feature that the encoding process is truly online, as opposed to a block-by-block approach. The setup assumes a packet erasure broadcast channel with stochastic arrivals and full feedback, but the proposed scheme is potentially applicable to more general lossy networks with link-by-link feedback. The algorithm guarantees that the physical queue size at the sender tracks the backlog in degrees of freedom (also called the virtual queue size). The new notion of a node "seeing" a packet is introduced. In terms of this idea, our algorithm may be viewed as a natural extension of ARQ schemes to coded networks. Our approach, known as the drop-when-seen algorithm, is compared with a baseline queuing approach called drop-when-decoded. It is shown that the expected queue size for our approach is $O(\\frac1{1-\\rho})$ as opposed to $\\Omega(\\frac1{(1-\\rho)^2})$ for the baseline approach...

  18. MELCOR computer code manuals

    Energy Technology Data Exchange (ETDEWEB)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  19. Degenerate Series Representations of the q-Deformed Algebra $so'_q(r,s$

    Directory of Open Access Journals (Sweden)

    Valentyna A. Groza

    2007-05-01

    Full Text Available The $q$-deformed algebra ${m so}'_q(r,s$ is a realform of the $q$-deformed algebra $U'_q({m so}(n,mathbb{C}$,$n=r+s$, which dif/fers from the quantum algebra $U_q({mso}(n,mathbb{C}$ of Drinfeld and Jimbo. We study representationsof the most degenerate series of the algebra ${m so}'_q(r,s$. Theformulas of action of operators of these representations upon thebasis corresponding to restriction of representations onto thesubalgebra ${m so}'_q(rimes {m so}'_q(s$ are given. Most ofthese representations are irreducible. Reducible representationsappear under some conditions for the parameters determining therepresentations. All irreducible constituents which appear inreducible representations of the degenerate series are found. All$*$-representations of ${m so}'_q(r,s$ are separated in the setof irreducible representations obtained in the paper.

  20. low bit rate video coding low bit rate video coding

    African Journals Online (AJOL)

    eobe

    ariable length bit rate (VLBR) broadly encompasses video coding which broadly encompasses ... for motion estimation and compensation to reduce the prediction sation to reduce the ... a special interest among the video coding community ...

  1. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Thommesen, Christian; Høholdt, Tom

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved Reed/Solomon codes, which allows close to errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes. (NK) N-K...

  2. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  3. A Modified Moist Ageostrophic Q Vector

    Institute of Scientific and Technical Information of China (English)

    YUE Caijun; SHOU Shaowen

    2008-01-01

    The quasi-geostrophic Q vector is an important diagnostic tool for studying development of surface rainfall associated with large-scale weather systems and is calculated using data at single vertical level. When ageostrophic Q vector was introduced, it required data at two vertical levels. In this study, moist ageostrophic Q vector is modified so that it can be calculated using data at a single vertical level. The comparison study between the original and modified moist ageostrophic Q vectors is conducted using the data from 5 to 6 July 1991 during the torrential rainfall event associated with the Changjiang-Huaihe mei-yu front in China. The results reveal that divergences of original and modified moist ageostrophic Q vectors have similar horizontal distributions and their centers are almost located in the precipitation centers. This indicates that modified moist ageostrophic Q vector can be used to diagnose convective development with reasonable accuracy.

  4. Convolutional coding techniques for data protection

    Science.gov (United States)

    Massey, J. L.

    1975-01-01

    Results of research on the use of convolutional codes in data communications are presented. Convolutional coding fundamentals are discussed along with modulation and coding interaction. Concatenated coding systems and data compression with convolutional codes are described.

  5. qPMS9: An Efficient Algorithm for Quorum Planted Motif Search

    Science.gov (United States)

    Nicolae, Marius; Rajasekaran, Sanguthevar

    2015-01-01

    Discovering patterns in biological sequences is a crucial problem. For example, the identification of patterns in DNA sequences has resulted in the determination of open reading frames, identification of gene promoter elements, intron/exon splicing sites, and SH RNAs, location of RNA degradation signals, identification of alternative splicing sites, etc. In protein sequences, patterns have led to domain identification, location of protease cleavage sites, identification of signal peptides, protein interactions, determination of protein degradation elements, identification of protein trafficking elements, discovery of short functional motifs, etc. In this paper we focus on the identification of an important class of patterns, namely, motifs. We study the (l, d) motif search problem or Planted Motif Search (PMS). PMS receives as input n strings and two integers l and d. It returns all sequences M of length l that occur in each input string, where each occurrence differs from M in at most d positions. Another formulation is quorum PMS (qPMS), where the motif appears in at least q% of the strings. We introduce qPMS9, a parallel exact qPMS algorithm that offers significant runtime improvements on DNA and protein datasets. qPMS9 solves the challenging DNA (l, d)-instances (28, 12) and (30, 13). The source code is available at https://code.google.com/p/qpms9/.

  6. Code Flows : Visualizing Structural Evolution of Source Code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual met

  7. Code flows : Visualizing structural evolution of source code

    NARCIS (Netherlands)

    Telea, Alexandru; Auber, David

    2008-01-01

    Understanding detailed changes done to source code is of great importance in software maintenance. We present Code Flows, a method to visualize the evolution of source code geared to the understanding of fine and mid-level scale changes across several file versions. We enhance an existing visual met

  8. Qq(-Q)(-q)'States in Chiral SU(3) Quark Model

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hai-Xia; ZHANG Min; ZHANG Zong-Ye

    2007-01-01

    We study the masses of Qq(-Q)(-q)'states with JPC = 0++, 1++, 1+- and 2++ in the chiral SU(3) quark model,where Q is the heavy quark (c or b) and q (q') is the light quark (u, d or s). According to our numerical results, it is improbable to make the interpretation of [cn(-c)(-n)]1++ and [cn(-c)(-n)]2++ (n = u, d) states as X(3872) and Y(3940),respectively. However, it is interesting to find the tetraquarks in the bq(-b)(-q)'system.

  9. The tree method for multidimensional q-Hahn and q-Racah polynomials

    CERN Document Server

    Scarabotti, Fabio

    2009-01-01

    We develop a tree method for multidimensional q-Hahn polynomials. We define them as eigenfunctions of a multidimensional q-difference operator and we use the factorization of this operator as a key tool. Then we define multidimensional q-Racah polynomials as the connection coefficients between different bases of q-Hahn polynomials. We show that our multidimensional q-Racah polynomials may be expressed as product of ordinary one-dimensional q-Racah polynomial by means of a suitable sequence of transplantations of edges of the trees.

  10. Construction of normal numbers with respect to the $Q$-Cantor series expansion for certain $Q$

    CERN Document Server

    Mance, Bill

    2009-01-01

    A. Renyi \\cite{Renyi} made a definition that gives one generalization of simple normality in the context of $Q$-Cantor series. Similarly, in this paper we give a definition which generalizes the notion of normality in the context of $Q$-Cantor series. We will prove a theorem that allows us to concatenate sequences of digits that have a special property to give us the digits of a $Q$-normal number for certain $Q$. We will then use this theorem to construct a Q and a real number $x$ that is $Q$-normal.

  11. Closure of q-Quantum Languages

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    η-quantum languages are discussed and some of their properties are derived. Furthermore the q-quantum language is defined. It is shown that L (A1 (×) A2 ) =L(A1)∩L(A2), L(A) = L(A1)∪L(A2). So over the same alphabet the intersection and union of two different q-quantum languages are also q-quantum languages.

  12. Coenzyme Q10 and Neurological Diseases

    Directory of Open Access Journals (Sweden)

    Gabriele Siciliano

    2009-12-01

    Full Text Available Coenzyme Q10 (CoQ10, or ubiquinone is a small electron carrier of the mitochondrial respiratory chain with antioxidant properties. CoQ10 supplementation has been widely used for mitochondrial disorders. The rationale for using CoQ10 is very powerful when this compound is primary decreased because of defective synthesis. Primary CoQ10 deficiency is a treatable condition, so heightened “clinical awareness” about this diagnosis is essential. CoQ10 and its analogue, idebenone, have also been widely used in the treatment of other neurodegenerative disorders. These compounds could potentially play a therapeutic role in Parkinson’s disease, Huntington’s disease, amyotrophic lateral sclerosis, Friedreich’s ataxia, and other conditions which have been linked to mitochondrial dysfunction. This article reviews the physiological roles of CoQ10, as well as the rationale and the role in clinical practice of CoQ10 supplementation in different neurological diseases, from primary CoQ10 deficiency to neurodegenerative disorders.

  13. Biochemical Assessment of Coenzyme Q10 Deficiency

    Directory of Open Access Journals (Sweden)

    Juan Carlos Rodríguez-Aguilera

    2017-03-01

    Full Text Available Coenzyme Q10 (CoQ10 deficiency syndrome includes clinically heterogeneous mitochondrial diseases that show a variety of severe and debilitating symptoms. A multiprotein complex encoded by nuclear genes carries out CoQ10 biosynthesis. Mutations in any of these genes are responsible for the primary CoQ10 deficiency, but there are also different conditions that induce secondary CoQ10 deficiency including mitochondrial DNA (mtDNA depletion and mutations in genes involved in the fatty acid β-oxidation pathway. The diagnosis of CoQ10 deficiencies is determined by the decrease of its content in skeletal muscle and/or dermal skin fibroblasts. Dietary CoQ10 supplementation is the only available treatment for these deficiencies that require a rapid and distinct diagnosis. Here we review methods for determining CoQ10 content by HPLC separation and identification using alternative approaches including electrochemical detection and mass spectrometry. Also, we review procedures to determine the CoQ10 biosynthesis rate using labeled precursors.

  14. q-Gamow States for intermediate energies

    CERN Document Server

    Plastino, A; Zamora, D J

    2016-01-01

    In a recent paper [Nuc. Phys. A {\\bf 948}, (2016) 19] we have demonstrated the possible existence of Tsallis' q-Gamow states. Now, accelerators' experimental evidence for Tsallis' distributions has been ascertained only at very high energies. Here, instead, we develop a different set of q-Gamow states for which the associated q-Breit-Wigner distribution could easily be found at intermediate energies, for which accelerators are available at many locations. In this context, it should be strongly emphasized [Physica A {\\bf 388} (2009) 601] that, empirically, one never exactly and unambiguously "detects" pure Gaussians, but rather q-Gaussians. A prediction is made via Eq.(3.30)

  15. A rare case of trisomy 11q23.3-11q25 and trisomy 22q11.1-22q11.21.

    Science.gov (United States)

    Zou, P-S; Li, H-F; Chen, L-S; Ma, M; Chen, X-H; Xue, D; Cao, D-H

    2016-05-09

    Partial duplication of the long arm of chromosome 11 and the partial trisomy of 22q are uncommon karyotypic abnormalities. Here, we report the case of a 6-year-old girl who showed partial trisomy of 11q and 22q, as a result of a maternal balanced reciprocal translocation (11;22), and exhibited dysmorphic features, severe intellectual disability, brain malformations, and speech delay related to this unique chromosomal abnormality. Array comparative genomic hybridization (array CGH) revealed a gain in copy number on the long arm of chromosome 11, spanning at least 18.22 Mb. Additionally, there was a gain in copy number on the long arm of chromosome 22, spanning at least 3.46 Mb. FISH analysis using a chromosome 11 short arm telomere probe (11p14.2), a chromosome 11 long arm telomere probe (11q24.3), and a chromosome 22 long arm telomere probe (22q13.33) confirmed the origin of the marker chromosome. It has been confirmed by the State Key Laboratory of Medical Genetics of China that this is the first reported instance of the karyotype 47,XX, +der(22)t(11;22)(q23.3;q11.1)mat in the world. Our study reports an additional case that can be used to further characterize and delineate the clinical ramifications of partial trisomy of 11q and 22q.

  16. What Froze the Genetic Code?

    National Research Council Canada - National Science Library

    Lluís Ribas de Pouplana; Adrian Gabriel Torres; albert Rafels-Ybern

    2017-01-01

    The frozen accident theory of the Genetic Code was a proposal by Francis Crick that attempted to explain the universal nature of the Genetic Code and the fact that it only contains information for twenty amino acids...

  17. Generating q-Commutator Identities and the q-BCH Formula

    Directory of Open Access Journals (Sweden)

    Andrea Bonfiglioli

    2016-01-01

    Full Text Available Motivated by the physical applications of q-calculus and of q-deformations, the aim of this paper is twofold. Firstly, we prove the q-deformed analogue of the celebrated theorem by Baker, Campbell, and Hausdorff for the product of two exponentials. We deal with the q-exponential function expq⁡(x=∑n=0∞(xn/[n]q!, where [n]q=1+q+⋯+qn-1 denotes, as usual, the nth q-integer. We prove that if x and y are any noncommuting indeterminates, then expq⁡(xexpq⁡(y=expq⁡(x+y+∑n=2∞Qn(x,y, where Qn(x,y is a sum of iterated q-commutators of x and y (on the right and on the left, possibly, where the q-commutator [y,x]q≔yx-qxy has always the innermost position. When [y,x]q=0, this expansion is consistent with the known result by Schützenberger-Cigler: expq⁡(xexpq⁡(y=expq⁡(x+y. Our result improves and clarifies some existing results in the literature. Secondly, we provide an algorithmic procedure for obtaining identities between iterated q-commutators (of any length of x and y. These results can be used to obtain simplified presentation for the summands of the q-deformed Baker-Campbell-Hausdorff Formula.

  18. Expanded polyglutamine domain possesses nuclear export activity which modulates subcellular localization and toxicity of polyQ disease protein via exportin-1.

    Science.gov (United States)

    Chan, Wing Man; Tsoi, Ho; Wu, Chi Chung; Wong, Chi Hang; Cheng, Tat Cheung; Li, Hoi Yeung; Lau, Kwok Fai; Shaw, Pang Chui; Perrimon, Norbert; Chan, Ho Yin Edwin

    2011-05-01

    Polyglutamine (polyQ) diseases are a group of late-onset, progressive neurodegenerative disorders caused by CAG trinucleotide repeat expansion in the coding region of disease genes. The cell nucleus is an important site of pathology in polyQ diseases, and transcriptional dysregulation is one of the pathologic hallmarks observed. In this study, we showed that exportin-1 (Xpo1) regulates the nucleocytoplasmic distribution of expanded polyQ protein. We found that expanded polyQ protein, but not its unexpanded form, possesses nuclear export activity and interacts with Xpo1. Genetic manipulation of Xpo1 expression levels in transgenic Drosophila models of polyQ disease confirmed the specific nuclear export role of Xpo1 on expanded polyQ protein. Upon Xpo1 knockdown, the expanded polyQ protein was retained in the nucleus. The nuclear disease protein enhanced polyQ toxicity by binding to heat shock protein (hsp) gene promoter and abolished hsp gene induction. Further, we uncovered a developmental decline of Xpo1 protein levels in vivo that contributes to the accumulation of expanded polyQ protein in the nucleus of symptomatic polyQ transgenic mice. Taken together, we first showed that Xpo1 is a nuclear export receptor for expanded polyQ domain, and our findings establish a direct link between protein nuclear export and the progressive nature of polyQ neurodegeneration.

  19. Decoding Xing-Ling codes

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Refslund

    2002-01-01

    This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed.......This paper describes an efficient decoding method for a recent construction of good linear codes as well as an extension to the construction. Furthermore, asymptotic properties and list decoding of the codes are discussed....

  20. The path of code linting

    CERN Document Server

    CERN. Geneva

    2017-01-01

    Join the path of code linting and discover how it can help you reach higher levels of programming enlightenment. Today we will cover how to embrace code linters to offload cognitive strain on preserving style standards in your code base as well as avoiding error-prone constructs. Additionally, I will show you the journey ahead for integrating several code linters in the programming tools your already use with very little effort.

  1. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  2. Code stroke in Asturias.

    Science.gov (United States)

    Benavente, L; Villanueva, M J; Vega, P; Casado, I; Vidal, J A; Castaño, B; Amorín, M; de la Vega, V; Santos, H; Trigo, A; Gómez, M B; Larrosa, D; Temprano, T; González, M; Murias, E; Calleja, S

    2016-04-01

    Intravenous thrombolysis with alteplase is an effective treatment for ischaemic stroke when applied during the first 4.5 hours, but less than 15% of patients have access to this technique. Mechanical thrombectomy is more frequently able to recanalise proximal occlusions in large vessels, but the infrastructure it requires makes it even less available. We describe the implementation of code stroke in Asturias, as well as the process of adapting various existing resources for urgent stroke care in the region. By considering these resources, and the demographic and geographic circumstances of our region, we examine ways of reorganising the code stroke protocol that would optimise treatment times and provide the most appropriate treatment for each patient. We distributed the 8 health districts in Asturias so as to permit referral of candidates for reperfusion therapies to either of the 2 hospitals with 24-hour stroke units and on-call neurologists and providing IV fibrinolysis. Hospitals were assigned according to proximity and stroke severity; the most severe cases were immediately referred to the hospital with on-call interventional neurology care. Patient triage was provided by pre-hospital emergency services according to the NIHSS score. Modifications to code stroke in Asturias have allowed us to apply reperfusion therapies with good results, while emphasising equitable care and managing the severity-time ratio to offer the best and safest treatment for each patient as soon as possible. Copyright © 2015 Sociedad Española de Neurología. Published by Elsevier España, S.L.U. All rights reserved.

  3. Study of nonleptonic $B_{q}^{\\ast}$ ${\\to}$ $D_{q}V$ and $P_{q} D^*$ weak decays

    CERN Document Server

    Chang, Qin; Sun, Junfeng; Wang, Xiaolin; Yang, Yueling

    2016-01-01

    Motivated by the powerful capability of measurement for the $b$-flavored hadron rare decays at LHC and SuperKEKB/Belle-II, the nonleptonic $\\bar{B}^{\\ast}$ ${\\to}$ $D\\bar{D}^{\\ast}$, $D{\\rho^-}$, $DK^{\\ast-}$, ${\\pi}D^{\\ast}$ and $KD^{\\ast}$ weak decays are studied in detail. With the amplitudes calculated with factorization approach and the form factors of $B^{\\ast}$ transition into pseudoscalar meson evaluated with the BSW model, branching fractions and polarization fractions are firstly presented. Numerically, the CKM-favored $\\bar{B}_{q}^{\\ast}$ ${\\to}$ $D_{q}D_{s}^{{\\ast}-}$ and $D_{q}{\\rho}^{-}$ decays have large branching fractions, $\\sim$ $10^{-8}$, which should be sought for with priority and firstly observed by LHC and Belle-II experiments. The $\\bar{B}^{\\ast}_q$ ${\\to}$ $D_qK^{\\ast}$ and $D_q{\\rho}$ decays are dominated by the longitudinal polarization states. While, the parallel polarization fractions of $\\bar{B}^{\\ast}_q$ ${\\to}$ $D_q\\bar{D}^{\\ast}$ decays are comparable with the longitudinal one...

  4. PARTIAL 3Q DUPLICATION SYNDROME AND ASSIGNMENT OF D3S5 TO 3Q25-3Q28

    NARCIS (Netherlands)

    VANESSEN, AJ; KOK, K; van den Berg, Anke; DEJONG, B; STELLINK, F; BOS, AF; SCHEFFER, H; BUYS, CHCM

    1991-01-01

    We report a girl with a de novo duplication of the distal part of the long arm of chromosome 3 and review the literature. Our patient had the facial characteristics and many other anomalies of the partial 3q duplication syndrome. As a hitherto undescribed symptom in partial 3q trisomy syndrome, she

  5. MHD Generation Code

    OpenAIRE

    Frutos-Alfaro, Francisco; Carboni-Mendez, Rodrigo

    2015-01-01

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a c...

  6. Cinder begin creative coding

    CERN Document Server

    Rijnieks, Krisjanis

    2013-01-01

    Presented in an easy to follow, tutorial-style format, this book will lead you step-by-step through the multi-faceted uses of Cinder.""Cinder: Begin Creative Coding"" is for people who already have experience in programming. It can serve as a transition from a previous background in Processing, Java in general, JavaScript, openFrameworks, C++ in general or ActionScript to the framework covered in this book, namely Cinder. If you like quick and easy to follow tutorials that will let yousee progress in less than an hour - this book is for you. If you are searching for a book that will explain al

  7. Code Optimization in FORM

    CERN Document Server

    Kuipers, J; Vermaseren, J A M

    2013-01-01

    We describe the implementation of output code optimization in the open source computer algebra system FORM. This implementation is based on recently discovered techniques of Monte Carlo tree search to find efficient multivariate Horner schemes, in combination with other optimization algorithms, such as common subexpression elimination. For systems for which no specific knowledge is provided it performs significantly better than other methods we could compare with. Because the method has a number of free parameters, we also show some methods by which to tune them to different types of problems.

  8. Topological code Autotune

    CERN Document Server

    Fowler, Austin G; McInnes, Angus L; Rabbani, Alimohammad

    2012-01-01

    Tailoring a fault-tolerant quantum error correction scheme to a specific physical architecture can be a laborious task. We describe a tool Autotune capable of analyzing and optimizing the classical processing for an arbitrary 2-D qubit architecture making use of arbitrary circuits implementing either the surface code or progressively generated slices of a 3-D topological cluster state with arbitrary stochastic error models for each quantum gate. Autotune is designed to facilitate precise study of the performance of real hardware running topological quantum error correction.

  9. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  10. Memory Code©

    OpenAIRE

    Gómez-Londoño, Ana María

    2013-01-01

    El proyecto Memory Code© pertenece al ámbito de las cosmopolíticas del arte contemporáneo porque se ocupa de una relación singular de lo humano (mujer) con lo no-humano (caballo y técnicas)5. Específicamente enmarca el estudio del Binomio Ecuestre: caballo-jinete en el marco de una relación afectiva y de adiestramiento (doma clásica). Dicha relación estuvo compuesta por los siguientes operadores : a) Elementos de con-tacto entre jinete-caballo: espuelas, estribus, fustas b) Sistemas rítmicos ...

  11. Syntenic homology of human unique DNA sequences within chromossome regions 5q31, 10q22, 13q32-33 and 19q13.1 in the great apes

    Directory of Open Access Journals (Sweden)

    Vallente-Samonte Rhea U.

    2000-01-01

    Full Text Available Homologies between chromosome banding patterns and DNA sequences in the great apes and humans suggest an apparent common origin for these two lineages. The availability of DNA probes for specific regions of human chromosomes (5q31, 10q22, 13q32-33 and 19q13.1 led us to cross-hybridize these to chimpanzee (Pan troglodytes, PTR, gorilla (Gorilla gorilla, GGO and orangutan (Pongo pygmaeus, PPY chromosomes in a search for equivalent regions in the great apes. Positive hybridization signals to the chromosome 5q31-specific DNA probe were observed at HSA 5q31, PTR 4q31, GGO 4q31 and PPY 4q31, while fluorescent signals using the chromosome 10q22-specific DNA probe were noted at HSA 10q22, PTR 8q22, GGO 8q22 and PPY 7q22. The chromosome arms showing hybridization signals to the Quint-EssentialTM 13-specific DNA probe were identified as HSA 13q32-33, PTR 14q32-33, GGO 14q32-33 and PPY 14q32-33, while those presenting hybridization signals to the chromosome 19q13.1-specific DNA probe were identified as HSA 19q13.1, PTR 20q13, GGO 20q13 and PPY 20q13. All four probes presumably hybridized to homologous chromosomal locations in the apes, which suggests a homology of certain unique DNA sequences among hominoid species.

  12. Wavefront coding with adaptive optics

    Science.gov (United States)

    Agbana, Temitope E.; Soloviev, Oleg; Bezzubik, Vitalii; Patlan, Vsevolod; Verhaegen, Michel; Vdovin, Gleb

    2015-03-01

    We have implemented an extended depth of field optical system by wavefront coding with a micromachined membrane deformable mirror. This approach provides a versatile extension to standard wavefront coding based on fixed phase mask. First experimental results validate the feasibility of the use of adaptive optics for variable depth wavefront coding in imaging optical systems.

  13. Authorship Attribution of Source Code

    Science.gov (United States)

    Tennyson, Matthew F.

    2013-01-01

    Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…

  14. Strongly-MDS convolutional codes

    NARCIS (Netherlands)

    Gluesing-Luerssen, H; Rosenthal, J; Smarandache, R

    2006-01-01

    Maximum-distance separable (MDS) convolutional codes have the property that their free distance is maximal among all codes of the same rate and the same degree. In this paper, a class of MDS convolutional codes is introduced whose column distances reach the generalized Singleton bound at the earlies

  15. Improved code-tracking loop

    Science.gov (United States)

    Laflame, D. T.

    1980-01-01

    Delay-locked loop tracks pseudonoise codes without introducing dc timing errors, because it is not sensitive to gain imbalance between signal processing arms. "Early" and "late" reference codes pass in combined form through both arms, and each arm acts on both codes. Circuit accomodates 1 dB weaker input signals with tracking ability equal to that of tau-dither loops.

  16. Coding Issues in Grounded Theory

    Science.gov (United States)

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  17. Coding Issues in Grounded Theory

    Science.gov (United States)

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  18. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...

  19. Order functions and evaluation codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pellikaan, Ruud; van Lint, Jack

    1997-01-01

    Based on the notion of an order function we construct and determine the parameters of a class of error-correcting evaluation codes. This class includes the one-point algebraic geometry codes as wella s the generalized Reed-Muller codes and the parameters are detremined without using the heavy...... machinery of algebraic geometry....

  20. ON CLASSICAL BCH CODES AND QUANTUM BCH CODES

    Institute of Scientific and Technical Information of China (English)

    Xu Yajie; Ma Zhi; Zhang Chunyuan

    2009-01-01

    It is a regular way of constructing quantum error-correcting codes via codes with self-orthogonal property, and whether a classical Bose-Chaudhuri-Hocquenghem (BCH) code is self-orthogonal can be determined by its designed distance. In this paper, we give the sufficient and necessary condition for arbitrary classical BCH codes with self-orthogonal property through algorithms. We also give a better upper bound of the designed distance of a classical narrow-sense BCH code which contains its Euclidean dual. Besides these, we also give one algorithm to compute the dimension of these codes. The complexity of all algorithms is analyzed. Then the results can be applied to construct a series of quantum BCH codes via the famous CSS constructions.

  1. New quantum codes constructed from quaternary BCH codes

    Science.gov (United States)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  2. Structured error recovery for code-word-stabilized quantum codes

    Science.gov (United States)

    Li, Yunfan; Dumer, Ilya; Grassl, Markus; Pryadko, Leonid P.

    2010-05-01

    Code-word-stabilized (CWS) codes are, in general, nonadditive quantum codes that can correct errors by an exhaustive search of different error patterns, similar to the way that we decode classical nonlinear codes. For an n-qubit quantum code correcting errors on up to t qubits, this brute-force approach consecutively tests different errors of weight t or less and employs a separate n-qubit measurement in each test. In this article, we suggest an error grouping technique that allows one to simultaneously test large groups of errors in a single measurement. This structured error recovery technique exponentially reduces the number of measurements by about 3t times. While it still leaves exponentially many measurements for a generic CWS code, the technique is equivalent to syndrome-based recovery for the special case of additive CWS codes.

  3. On (Partial) Unit Memory Codes Based on Gabidulin Codes

    CERN Document Server

    Wachter, Antonia; Bossert, Martin; Zyablov, Victor

    2011-01-01

    (Partial) Unit Memory ((P)UM) codes provide a powerful possibility to construct convolutional codes based on block codes in order to achieve a high decoding performance. In this contribution, a construction based on Gabidulin codes is considered. This construction requires a modified rank metric, the so-called sum rank metric. For the sum rank metric, the free rank distance, the extended row rank distance and its slope are defined analogous to the extended row distance in Hamming metric. Upper bounds for the free rank distance and the slope of (P)UM codes in the sum rank metric are derived and an explicit construction of (P)UM codes based on Gabidulin codes is given, achieving the upper bound for the free rank distance.

  4. Exact-Repair Minimum Bandwidth Regenerating Codes Based on Evaluation of Linearized Polynomials

    CERN Document Server

    Xie, Hongmei

    2012-01-01

    In this paper, we propose two new constructions of exact-repair minimum storage regenerating (exact-MBR) codes. Both constructions obtain the encoded symbols by first treating the message vector over GF(q) as a linearized polynomial and then evaluating it over an extension field GF(q^m). The evaluation points are chosen so that the encoded symbols at any node are conjugates of each other, while corresponding symbols of different nodes are linearly dependent with respect to GF(q). These properties ensure that data repair can be carried out over the base field GF(q), instead of matrix inversion over the extension field required by some existing exact-MBR codes. To the best of our knowledge, this approach is novel in the construction of exact-MBR codes. One of our constructions leads to exact-MBR codes with arbitrary parameters. These exact-MBR codes have higher data reconstruction complexities but lower data repair complexities than their counterparts based on the product-matrix approach; hence they may be suit...

  5. Q-bosonization of the quantum group GL$_{q}$(2) based on the Gauss decomposition

    CERN Document Server

    Damaskinsky, E V; Damaskinsky, E V; Sokolov, M A

    1995-01-01

    The new method of q-bosonization for quantum groups based on the Gauss decomposition of a transfer matrix of generators is suggested. The simplest example of the quantum group GL_q(2) is considered in some details.

  6. Triply heavy tetraquark states with the $QQ\\bar{Q}\\bar{q}$ configuration

    CERN Document Server

    Chen, Kan; Wu, Jing; Liu, Yan-Rui; Zhu, Shi-Lin

    2016-01-01

    In the framework of the color-magnetic interaction, we systematically investigate the mass splittings of the $QQ\\bar{Q}\\bar{q}$ tetraquark states and estimated their rough masses in this work. These systems include the explicitly exotic states $cc\\bar{b}\\bar{q}$ and $bb\\bar{c}\\bar{q}$ and the hidden exotic states $cc\\bar{c}\\bar{q}$, $cb\\bar{b}\\bar{q}$, $bc\\bar{c}\\bar{q}$, and $bb\\bar{b}\\bar{q}$. If a state around the estimated mass region could be observed, its nature as a genuine tetraquark is favored. The strong decay patterns shown here will be helpful to the experimental search for these exotic states.

  7. Q in Other Solar Systems

    CERN Document Server

    Socrates, Aristotle; Dong, Subo

    2012-01-01

    A significant fraction of the hot Jupiters with final circularized orbital periods of less than 5 days are thought to form through the channel of high-eccentricity migration. Tidal dissipation at successive periastron passages removes orbital energy of the planet, which has the potential for changes in semi-major axis of a factor of ten to a thousand. In the equilibrium tide approximation we show that, in order for high-eccentricity migration to take place, the relative level of tidal dissipation in Jupiter analogues must be at least 10 times higher than the upper-limit attributed to the Jupiter-Io interaction. While this is not a severe problem for high-e migration, it contradicts the results of several previous calculations. We show that these calculations of high-e migration inadvertently over-estimated the strength of tidal dissipation by three to four orders of magnitude. These discrepancies were obscured by the use of various parameters, such as lag time \\tau, tidal quality factor Q and viscous time t_V...

  8. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause/receive inter......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...

  9. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  10. Supervised Transfer Sparse Coding

    KAUST Repository

    Al-Shedivat, Maruan

    2014-07-27

    A combination of the sparse coding and transfer learn- ing techniques was shown to be accurate and robust in classification tasks where training and testing objects have a shared feature space but are sampled from differ- ent underlying distributions, i.e., belong to different do- mains. The key assumption in such case is that in spite of the domain disparity, samples from different domains share some common hidden factors. Previous methods often assumed that all the objects in the target domain are unlabeled, and thus the training set solely comprised objects from the source domain. However, in real world applications, the target domain often has some labeled objects, or one can always manually label a small num- ber of them. In this paper, we explore such possibil- ity and show how a small number of labeled data in the target domain can significantly leverage classifica- tion accuracy of the state-of-the-art transfer sparse cod- ing methods. We further propose a unified framework named supervised transfer sparse coding (STSC) which simultaneously optimizes sparse representation, domain transfer and classification. Experimental results on three applications demonstrate that a little manual labeling and then learning the model in a supervised fashion can significantly improve classification accuracy.

  11. On Kantorovich modification of ( p , q $( p,q $ -Baskakov operators

    Directory of Open Access Journals (Sweden)

    Tuncer Acar

    2016-03-01

    Full Text Available Abstract The concern of this paper is to introduce a Kantorovich modification of ( p , q $( p,q $ -Baskakov operators and investigate their approximation behaviors. We first define a new ( p , q $( p,q $ -integral and construct the operators. The rate of convergence in terms of modulus of continuities, quantitative and qualitative results in weighted spaces, and finally pointwise convergence of the operators for the functions belonging to the Lipschitz class are discussed.

  12. Best polynomial degree reduction on q-lattices with applications to q-orthogonal polynomials

    KAUST Repository

    Ait-Haddou, Rachid

    2015-06-07

    We show that a weighted least squares approximation of q-Bézier coefficients provides the best polynomial degree reduction in the q-L2-norm. We also provide a finite analogue of this result with respect to finite q-lattices and we present applications of these results to q-orthogonal polynomials. © 2015 Elsevier Inc. All rights reserved.

  13. Some approximation properties of ( p , q $(p,q$ -Bernstein operators

    Directory of Open Access Journals (Sweden)

    Shin Min Kang

    2016-06-01

    Full Text Available Abstract This paper is concerned with the ( p , q $(p,q$ -analog of Bernstein operators. It is proved that, when the function is convex, the ( p , q $(p,q$ -Bernstein operators are monotonic decreasing, as in the classical case. Also, some numerical examples based on Maple algorithms that verify these properties are considered. A global approximation theorem by means of the Ditzian-Totik modulus of smoothness and a Voronovskaja type theorem are proved.

  14. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  15. The Art of Readable Code

    CERN Document Server

    Boswell, Dustin

    2011-01-01

    As programmers, we've all seen source code that's so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they're bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it-even if that someone else is you. This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languag

  16. Three Paradigms for Mixing Coding and Games: Coding in a Game, Coding as a Game, and Coding for a Game

    OpenAIRE

    2015-01-01

    Games for teaching coding have been an educational holy grail since at least the early 1980s. Yet for decades, with games more popular than ever and with the need to teach kids coding having been well-recognized, no blockbuster coding games have arisen (see Chapter 2). Over the years, the research community has made various games for teaching computer science: a survey made by shows that most do not teach coding, and of the ones that do teach coding, most are research prototypes (not produc...

  17. Remarks on generalized toric codes

    CERN Document Server

    Little, John B

    2011-01-01

    This note presents some new information on how the minimum distance of the generalized toric code corresponding to a fixed set of integer lattice points S in R^2 varies with the base field. The main results show that in some cases, over sufficiently large fields, the minimum distance of the code corresponding to a set S will be the same as that of the code corresponding to the convex hull of S. In an example, we will also discuss a [49,12,28] generalized toric code over GF(8), better than any previously known code according to M. Grassl's online tables, as of July 2011.

  18. Rotated and Scaled Alamouti Coding

    CERN Document Server

    Willems, Frans M J

    2008-01-01

    Repetition-based retransmission is used in Alamouti-modulation [1998] for $2\\times 2$ MIMO systems. We propose to use instead of ordinary repetition so-called "scaled repetition" together with rotation. It is shown that the rotated and scaled Alamouti code has a hard-decision performance which is only slightly worse than that of the Golden code [2005], the best known $2\\times 2$ space-time code. Decoding the Golden code requires an exhaustive search over all codewords, while our rotated and scaled Alamouti code can be decoded with an acceptable complexity however.

  19. On constructing disjoint linear codes

    Institute of Scientific and Technical Information of China (English)

    ZHANG Weiguo; CAI Mian; XIAO Guozhen

    2007-01-01

    To produce a highly nonlinear resilient function,the disjoint linear codes were originally proposed by Johansson and Pasalic in IEEE Trans.Inform.Theory,2003,49(2):494-501.In this paper,an effective method for finding a set of such disjoint linear codes is presented.When n≥2k,we can find a set of[n,k] disjoint linear codes with joint linear codes exists with cardinality at least 2.We also describe a result on constructing a set of [n,k] disjoint linear codes with minimum distance at least some fixed positive integer.

  20. Chronic Q fever in The Netherlands

    NARCIS (Netherlands)

    Kampschreur, L.M.

    2013-01-01

    From 2007-2010, during the recent Q fever epidemic in the Netherlands, over 4000 cases of acute Q fever were registered, which is an underestimation of the total amount of Coxiella burnetii infections due to a high amount of asymptomatic primary infections. In the literature it is stated that 1-5% o

  1. Instability of q-expectation value

    OpenAIRE

    Abe, Sumiyoshi

    2008-01-01

    q-Expectation value of a physical quantity is widely used in nonextensive statistical mechanics. Here, it is shown that the q-expectation value is not stable under small deformations of a probability distribution function, in general, whereas the ordinary expectation value is always stable.

  2. Stability properties of Q-stars

    Energy Technology Data Exchange (ETDEWEB)

    Becerril, R. [Instituto de Fisica y Matematicas, Universidad Michoacana de San Nicolas de Hidalgo. Edificio C-3, Cd. Universitaria, C.P. 58040 Morelia, Michoacan (Mexico); Bernal, A. [Departamento de Fisica, Centro de Investigacion y de Estudios Avanzados del IPN, AP 14-740, 07000 Mexico D.F. (Mexico); Guzman, F.S. [Instituto de Fisica y Matematicas, Universidad Michoacana de San Nicolas de Hidalgo. Edificio C-3, Cd. Universitaria, C.P. 58040 Morelia, Michoacan (Mexico)], E-mail: guzman@ifm.umich.mx; Nucamendi, U. [Instituto de Fisica y Matematicas, Universidad Michoacana de San Nicolas de Hidalgo. Edificio C-3, Cd. Universitaria, C.P. 58040 Morelia, Michoacan (Mexico)

    2007-12-06

    We present the evolution of Q-star configurations using numerical methods. We solve the full Einstein-Klein-Gordon system of equations and show that: Q-stars can be stable and unstable. The unstable branch is two fold: configurations with negative binding energy that collapse and form black holes, and others with positive binding energy that explode and release the scalar field.

  3. Understanding Insight in the Context of Q

    Science.gov (United States)

    Coghlan, David

    2012-01-01

    In Revans' learning formula, L = P + Q, Q represents "questioning insight", by which Revans means that insight comes out of the process of questioning programmed knowledge (P) in the light of experience. We typically focus on the content of an insight rather than on the act of insight. Drawing primarily on the work of Bernard Lonergan this paper…

  4. QTL Information Table: 826 [Q-TARO

    Lifescience Database Archive (English)

    Full Text Available qLTG3-1, Resistance or Tolerance Other stress resistance low-temperature germinability... trait locus, qLTG3-1, controlling low-temperature germinability in rice. Proc Natl Acad Sci U S A 105, 12623-12628. ...

  5. Fraction of exhaled nitric oxide values in childhood are associated with 17q11.2-q12 and 17q12-q21 variants

    DEFF Research Database (Denmark)

    van der Valk, Ralf J P; Duijts, Liesbeth; Timpson, Nicolas J

    2014-01-01

    12, and rs8069176 near gasdermin B (GSDMB; P = 1.88 × 10(-8)) at 17q12-q21. We found a cis expression quantitative trait locus for the transcript soluble galactoside-binding lectin 9 (LGALS9) that is in linkage disequilibrium with rs944722. rs8069176 was associated with GSDMB and ORM1-like 3 (ORMDL3...

  6. Coenzyme Q10 effects in neurodegenerative disease

    Directory of Open Access Journals (Sweden)

    Meredith Spindler

    2009-11-01

    Full Text Available Meredith Spindler1, M Flint Beal1,2, Claire Henchcliffe1,21Department of Neurology, 2Department of Neuroscience, Weill Medical College of Cornell University, New York, NY, USAAbstract: Coenzyme Q10 (CoQ10 is an essential cofactor in the mitochondrial respiratory chain, and as a dietary supplement it has recently gained attention for its potential role in the treatment of neurodegenerative disease. Evidence for mitochondrial dysfunction in neurodegenerative disorders derives from animal models, studies of mitochondria from patients, identification of genetic defects in patients with neurodegenerative disease, and measurements of markers of oxidative stress. Studies of in vitro models of neuronal toxicity and animal models of neurodegenerative disorders have demonstrated potential neuroprotective effects of CoQ10. With this data in mind, several clinical trials of CoQ10 have been performed in Parkinson’s disease and atypical Parkinson’s syndromes, Huntington’s disease, Alzheimer disease, Friedreich’s ataxia, and amyotrophic lateral sclerosis, with equivocal findings. CoQ10 is widely available in multiple formulations and is very well tolerated with minimal adverse effects, making it an attractive potential therapy. Phase III trials of high-dose CoQ10 in large sample sizes are needed to further ascertain the effects of CoQ10 in neurodegenerative diseases.Keywords: coenzyme Q10, neurodegenerative disease, Parkinson’s disease, Huntington’s disease, mitochondrial dysfunction

  7. The $q$-deformed Bogoliubov transformations

    CERN Document Server

    Arraut, Ivan

    2016-01-01

    An algebraic generalization of the Bogoliubov transformation is introduced in the context of $q$-commutativity. The set of coefficients are promoted to operators where we work with a $q$-deformed action over the Bosonic algebra together with some generalized trigonometric hyperbolic identities. We make the analogous extension for the fermionic algebra.

  8. Chronic Q fever in The Netherlands

    NARCIS (Netherlands)

    Kampschreur, L.M.

    2013-01-01

    From 2007-2010, during the recent Q fever epidemic in the Netherlands, over 4000 cases of acute Q fever were registered, which is an underestimation of the total amount of Coxiella burnetii infections due to a high amount of asymptomatic primary infections. In the literature it is stated that 1-5%

  9. Stability properties of Q-stars

    Science.gov (United States)

    Becerril, R.; Bernal, A.; Guzmán, F. S.; Nucamendi, U.

    2007-12-01

    We present the evolution of Q-star configurations using numerical methods. We solve the full Einstein-Klein-Gordon system of equations and show that: Q-stars can be stable and unstable. The unstable branch is two fold: configurations with negative binding energy that collapse and form black holes, and others with positive binding energy that explode and release the scalar field.

  10. QTL Information Table: 502 [Q-TARO

    Lifescience Database Archive (English)

    Full Text Available qSBR-3 Resistance or Tolerance Sheath blight resistance Sheath blight response RFLP C)Interval DHL ZYQ8 Ji...ngxi 17 G249 G164 pha Kunihiro, Y., Qian, Q., Sato, H., Teng, S., Zeng, D.L., Fujimot

  11. QTL Information Table: 324 [Q-TARO

    Lifescience Database Archive (English)

    Full Text Available qSdn-5 Physiological trait Germination/dormancy germination percentage SSR d)Co-segregated BC1F1 N22 Nanji...ng 35 B RM480 rgn Tang, J.Y., Jiang, L., Hou, M.Y., Zhang, L.X., Zhai, H.Q., and Wan,

  12. QTL Information Table: 286 [Q-TARO

    Lifescience Database Archive (English)

    Full Text Available qCC-1 Physiological trait Source activity Chlorophyll content Mixture C)Interval DHL ZYQ8 Ji...ngxi 17 B RG541 RG101 pha Teng, S., Qian, Q., Zeng, D., Kunihiro, Y., Fujimoto, K., Huang, D., and

  13. QTL Information Table: 367 [Q-TARO

    Lifescience Database Archive (English)

    Full Text Available qGW-3 Morphological trait Seed Grain width RFLP C)Interval BIL Nipponbare Kasalath ...B G332 C80 pha Li, Z.F., Wan, J.M., Xia, J.F., and Zhai, H.Q. (2003). Mapping quantitative trait loci underl

  14. QTL Information Table: 366 [Q-TARO

    Lifescience Database Archive (English)

    Full Text Available qGL-6 Morphological trait Seed Grain length RFLP C)Interval BIL Nipponbare Kasalath... B R674 R2549 pha Li, Z.F., Wan, J.M., Xia, J.F., and Zhai, H.Q. (2003). Mapping quantitative trait loci und

  15. The chromosome 9q subtelomere deletion syndrome

    NARCIS (Netherlands)

    Stewart, D.R.; Kleefstra, T.

    2007-01-01

    The chromosome 9q subtelomere deletion syndrome (9qSTDS) is among the first and most common clinically recognizable syndromes to arise from widespread testing by fluorescent in situ hybridization (FISH) of subtelomere deletions. There are about 50 reported cases worldwide. Affected individuals invar

  16. QTL Information Table: 482 [Q-TARO

    Lifescience Database Archive (English)

    Full Text Available qRA5-1 Morphological trait Shoot/Seedling Root activity Mixture C)Interval RIL Zhenshan 97 Minghui 63 B C246 RM26 pha Cui, H., Peng, B., Xing, Z., Xu, G., Yu, B., and Zhang, Q. (2002). Molecular dissection of seedling-vigor and associated physiological traits in rice. Theor Appl Genet 105, 745-753. ...

  17. q-Besselian Frames in Banach Spaces

    Institute of Scientific and Technical Information of China (English)

    Yu Can ZHU

    2007-01-01

    In this paper, we introduce the concepts of q-Besselian frame and (p, σ)-near Riesz basis in a Banach space, where σ is a finite subset of positive integers and 1/p + 1/q=1 with p 1, q 1, and determine the relations among q-frame, p-Riesz basis, q-Besselian frame and (p, σ)-near Riesz basis in a Banach space. We also give some sufficient and necessary conditions on a q-Besselian frame for a Banach space. In particular, we prove reconstruction formulas for Banach1 spaces X and X* that if {Xn}∞n=1(∪)X is a q-Besselian frame for X, then there exists a p-Besselian frame {y*n}∞n=1(∪) X* for X* such that x = ∑∞n-1 y*n(x)xn for all x ∈ X, and x = ∑∞n-1 x*xny*n, for all x* ∈ X*. Lastly, we consider the stability of a q-Besselian frame for the Banach space X under perturbation. Some results of J. R. Holub, P. G. Casazza, O. Christensen and others in Hilbert spaces are extended to Banach spaces.

  18. Q-Technique and Graphics Research.

    Science.gov (United States)

    Kahle, Roger R.

    Because Q-technique is as appropriate for use with visual and design items as for use with words, it is not stymied by the topics one is likely to encounter in graphics research. In particular Q-technique is suitable for studying the so-called "congeniality" of typography, for various copytesting usages, and for multivariate graphics research. The…

  19. 3q27.3 microdeletional syndrome

    DEFF Research Database (Denmark)

    Thevenon, Julien; Callier, Patrick; Poquet, Hélène

    2014-01-01

    BACKGROUND: Since the advent of array-CGH, numerous new microdeletional syndromes have been delineated while others remain to be described. Although 3q29 subtelomeric deletion is a well-described syndrome, there is no report on 3q interstitial deletions. METHODS: We report for the first time seven...... (18.5report on a new microdeletional syndrome...

  20. Q-Technique and Graphics Research.

    Science.gov (United States)

    Kahle, Roger R.

    Because Q-technique is as appropriate for use with visual and design items as for use with words, it is not stymied by the topics one is likely to encounter in graphics research. In particular Q-technique is suitable for studying the so-called "congeniality" of typography, for various copytesting usages, and for multivariate graphics research. The…

  1. Genotype-phenotype correlation in 13q13.3-q21.3 deletion.

    Science.gov (United States)

    Tosca, Lucie; Brisset, Sophie; Petit, François M; Metay, Corinne; Latour, Stéphanie; Lautier, Benoît; Lebas, Axel; Druart, Luc; Picone, Olivier; Mas, Anne-Elisabeth; Prévot, Sophie; Tardieu, Marc; Goossens, Michel; Tachdjian, Gérard

    2011-01-01

    Pure interstitial deletions of the long arm of chromosome 13 are correlated with variable phenotypes according to the size and the location of the deleted region. Deletions involving the 13q13q21 region are rare. In order to establish interstitial 13q genotype-phenotype correlation, we used high resolution 244K oligonucleotide array in addition to conventional karyotype and molecular (fluorescent in situ hybridization, microsatellite markers analysis) techniques in two independent probands carrying a deletion 13q13 to 13q21. First patient was a 3-year-old girl with mental retardation and dysmorphy carrying a 13q13.3q21.31 de novo deletion diagnosed post-natally. The second one was a fetus with de novo del(13)(q14q21.2) associated with first trimester increased nuchal translucency. We showed that specific dysmorphic features (macrocephaly, high forehead, hypertelorism, large nose, large and malformed ears and retrognathia) were correlated to the common 13q14q21 chromosomal segment. Physical examination revealed overgrowth with global measurement up to the 95th percentile in both probands. This is the second description of overgrowth in patients carrying a 13q deletion. Haploinsufficiency of common candidates genes such as CKAP2, SUGT1, LECT1, DCLK1 and SMAD9, involved in cell division and bone development, is a possible mechanism that could explain overgrowth in both patients. This study underlines also that cytogenetic analysis could be performed in patients with overgrowth.

  2. Some identities of the q-Laguerre polynomials on q-Umbral calculus

    Science.gov (United States)

    Dere, Rahime

    2017-07-01

    Some interesting identities of Sheffer polynomials was given by Roman [11], [12]. In this paper, we study a q-analogue of Laguerre polynomials which are also q-Sheffer polynomials. Furthermore, we give some new properties and formulas of these q-Laguerre polynomials of higher order by using the theory of the umbral algebra and umbral calculus.

  3. Q and you: The application of Q methodology in recreation research

    Science.gov (United States)

    Whitney. Ward

    2010-01-01

    Researchers have used various qualitative and quantitative methods to deal with subjectivity in studying people's recreation experiences. Q methodology has been the most effective approach for analyzing both qualitative and quantitative aspects of experience, including attitudes or perceptions. The method is composed of two main components--Q sorting and Q factor...

  4. Orthogonal coding of object location.

    Science.gov (United States)

    Knutsen, Per Magne; Ahissar, Ehud

    2009-02-01

    It has been argued whether internal representations are encoded using a universal ('the neural code') or multiple codes. Here, we review a series of experiments that demonstrate that tactile encoding of object location via whisking employs an orthogonal, triple-code scheme. Rats, and other rodents, actively move the whiskers back and forth to localize and identify objects. Neural recordings from primary sensory afferents, along with behavioral observations, demonstrate that vertical coordinates of contacted objects are encoded by the identity of activated afferents, horizontal coordinates by the timing of activation and radial coordinates by the intensity of activation. Because these codes are mutually independent, the three-dimensional location of an object could, in principle, be encoded by individual afferents during single whisker-object contacts. One advantage of such a same-neuron-different-codes scheme over the traditionally assumed same-code-different-neurons scheme is a reduction of code ambiguity that, in turn, simplifies decoding circuits.

  5. Impact of the Revised Malaysian Code on Corporate Governance on Audit Committee Attributes and Firm Performance

    OpenAIRE

    KALLAMU, Basiru Salisu

    2016-01-01

    Abstract. Using a sample of 37 finance companies listed under the finance segment of Bursa Malaysia, we examined the impact of the revision to Malaysian code on corporate governance on audit committee attributes and firm performance. Our result suggests that audit committee attributes significantly improved after the Code was revised. In addition, the coefficient for audit committee and risk committee interlock has a significant negative relationship with Tobin’s Q in the period before the re...

  6. The geographical distribution of Q fever.

    Science.gov (United States)

    KAPLAN, M M; BERTAGNA, P

    1955-01-01

    The results of a WHO-assisted survey of the distribution of Q fever in 32 countries and an analysis of reports published to date indicate that Q fever exists in 51 countries on five continents. Q-fever infection was most often reported in man and the domestic ruminants, such as cattle, sheep, and goats.The disease was found to exist in most countries where investigations were carried out. Notable exceptions were Ireland, the Netherlands, New Zealand, Poland, and the Scandinavian countries. With the exception of Poland, where the results were inconclusive, all these countries import relatively few domestic ruminants-the most important animal reservoirs of human Q-fever infection. It seems, therefore, that the traffic of infected ruminants may be one of the most important, if not the most important, means for the geographical spread of Q fever. The importance, if any, of ticks associated with such traffic needs to be defined.

  7. Graded q-differential matrix algebra

    Science.gov (United States)

    Abramov, V.; Raknuzzaman, Md.

    2013-10-01

    We consider the algebra of square matrices of order N as graded q-differential algebra, where q is a primitive Nth root of unity. We study the differential calculus of this algebra determined by a differential d, which satisfies the graded q-Leibniz rule and dN = 0. A graded q-differential algebra can be viewed as a generalization of graded differential algebra, and we consider the higher degree elements of graded q-differential matrix algebra as analogs of differential forms. We use two matrices x,ξ, which generate the algebra of square matrices of order N in order to express these analogs of differential forms in terms of "coordinate" x and its differentials dx,d2x,...,dN-1x. We study an analog of connection and calculate its curvature.

  8. Q value analysis of microwave photonic filters

    Institute of Scientific and Technical Information of China (English)

    Lina ZHOU; Xinliang ZHANG; Enming XU

    2009-01-01

    This paper first presents the fundamental principles of the microwave photonic filters.As an example to explain how to implement a microwave photonic filter, a specific finite impulse response (FIR) filter is illustrated.Next, the Q value of the microwave photonic filters is analyzed theoretically, and methods around how to gain high Q value are discussed.Then,divided into FIR filter, first-order infinite impulse response (IIR) filter, and multi-order IIR filter, several novel microwave photonic filters with high Q value are listed and compared.The technical difficulties to get high Q value in first-order IIR filter and multi-order IIR filter are analyzed concretely.Finally, in order to gain higher Q value, a multi-order IIR microwave photonic filter that easily extends its order is presented and discussed.

  9. Q factors for antennas in dispersive media

    CERN Document Server

    Gustafsson, Mats; Cismasu, Marius

    2014-01-01

    Stored energy and Q-factors are used to quantify the performance of small antennas. Accurate and efficient evaluation of the stored energy is also essential for current optimization and the associated physical bounds. Here, it is shown that the frequency derivative of the input impedance and the stored energy can be determined from the frequency derivative of the electric field integral equation. The expressions for the differentiated input impedance and stored energies differ by the use of a transpose and Hermitian transpose in the quadratic forms. The quadratic forms also provide simple single frequency formulas for the corresponding Q-factors. The expressions are further generalized to antennas integrated in temporally dispersive media. Numerical examples that compare the different Q-factors are presented for dipole and loop antennas in conductive, Debye, Lorentz, and Drude media. The computed Q-factors are also verified with the Q-factor obtained from the stored energy in Brune synthesized circuit models.

  10. New Codes for Spectral Amplitude Coding Optical CDMA Systems

    Directory of Open Access Journals (Sweden)

    Hassan Yousif Ahmed

    2011-03-01

    Full Text Available A new code structure with zero in-phase cross correlation for spectral amplitude coding optical code division multiple access (SAC-OCDMA system is proposed, and called zero vectors combinatorial (ZVC. This code is constructed in a simple algebraic way using Euclidean vectors and combinatorial theories based on the relationship between the number of users N and the weight W. One of the important properties of this code is that the maximum cross correlation (CC is always zero, which means that multi-user interference (MUI and phase induced intensity noise (PIIN are reduced. Bit error rate (BER performance is compared with previous reported codes. Therefore, theoretically, we demonstrate the performance of ZVC code with the related equations. In addition, the structure of the encoder/decoder based on fiber Bragg gratings (FBGs and the proposed system have been analyzed theoretically by taking into consideration the effects of some noises. The results characterizing BER with respect to the total number of active users show that ZVC code offers a significantly improved performance over previous reported codes by supporting large numbers of users at BER≥ 10-9. A comprehensive simulation study has been carried out using a commercial optical system simulator “VPI™”. Moreover, it was shown that the proposed code managed to reduce the hardware complexity and eventually the cost.

  11. Making your code citable with the Astrophysics Source Code Library

    Science.gov (United States)

    Allen, Alice; DuPrie, Kimberly; Schmidt, Judy; Berriman, G. Bruce; Hanisch, Robert J.; Mink, Jessica D.; Nemiroff, Robert J.; Shamir, Lior; Shortridge, Keith; Taylor, Mark B.; Teuben, Peter J.; Wallin, John F.

    2016-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) is a free online registry of codes used in astronomy research. With nearly 1,200 codes, it is the largest indexed resource for astronomy codes in existence. Established in 1999, it offers software authors a path to citation of their research codes even without publication of a paper describing the software, and offers scientists a way to find codes used in refereed publications, thus improving the transparency of the research. It also provides a method to quantify the impact of source codes in a fashion similar to the science metrics of journal articles. Citations using ASCL IDs are accepted by major astronomy journals and if formatted properly are tracked by ADS and other indexing services. The number of citations to ASCL entries increased sharply from 110 citations in January 2014 to 456 citations in September 2015. The percentage of code entries in ASCL that were cited at least once rose from 7.5% in January 2014 to 17.4% in September 2015. The ASCL's mid-2014 infrastructure upgrade added an easy entry submission form, more flexible browsing, search capabilities, and an RSS feeder for updates. A Changes/Additions form added this past fall lets authors submit links for papers that use their codes for addition to the ASCL entry even if those papers don't formally cite the codes, thus increasing the transparency of that research and capturing the value of their software to the community.

  12. Coenzyme Q10 and male infertility.

    Science.gov (United States)

    Balercia, G; Mancini, A; Paggi, F; Tiano, L; Pontecorvi, A; Boscaro, M; Lenzi, A; Littarru, G P

    2009-07-01

    We had previously demonstrated that Coenzyme Q10 [(CoQ10) also commonly called ubiquinone] is present in well-measurable levels in human seminal fluid, where it probably exerts important metabolic and antioxidant functions; seminal CoQ10 concentrations show a direct correlation with seminal parameters (count and motility). Alterations of CoQ10 content were also shown in conditions associated with male infertility, such as asthenozoospermia and varicocele (VAR). The physiological role of this molecule was further clarified by inquiring into its variations in concentrations induced by different medical or surgical procedures used in male infertility treatment. We therefore evaluated CoQ10 concentration and distribution between seminal plasma and spermatozoa in VAR, before and after surgical treatment, and in infertile patients after recombinant human FSH therapy. The effect of CoQ10 on sperm motility and function had been addressed only through some in vitro experiments. In two distinct studies conducted by our group, 22 and 60 patients affected by idiopathic asthenozoospermia were enrolled, respectively. CoQ10 and its reduced form, ubiquinol, increased significantly both in seminal plasma and sperm cells after treatment, as well as spermatozoa motility. A weak linear dependence among the relative variations, at baseline and after treatment, of seminal plasma or intracellular CoQ10, ubiquinol levels and kinetic parameters was found in the treated group. Patients with lower baseline value of motility and CoQ10 levels had a statistically significant higher probability to be responders to the treatment. In conclusion, the exogenous administration of CoQ10 increases both ubiquinone and ubiquinol levels in semen and can be effective in improving sperm kinetic features in patients affected by idiopathic asthenozoospermia.

  13. On Bounded Weight Codes

    CERN Document Server

    Bachoc, Christine; Cohen, Gerard; Sole, Patrick; Tchamkerten, Aslan

    2010-01-01

    The maximum size of a binary code is studied as a function of its length N, minimum distance D, and minimum codeword weight W. This function B(N,D,W) is first characterized in terms of its exponential growth rate in the limit as N tends to infinity for fixed d=D/N and w=W/N. The exponential growth rate of B(N,D,W) is shown to be equal to the exponential growth rate of A(N,D) for w <= 1/2, and equal to the exponential growth rate of A(N,D,W) for 1/2< w <= 1. Second, analytic and numerical upper bounds on B(N,D,W) are derived using the semidefinite programming (SDP) method. These bounds yield a non-asymptotic improvement of the second Johnson bound and are tight for certain values of the parameters.

  14. Homomorphic encryption from codes

    CERN Document Server

    Bogdanov, Andrej

    2011-01-01

    We propose a new homomorphic encryption scheme based on the hardness of decoding under independent random noise from certain affine families of codes. Unlike in previous lattice-based homomorphic encryption schemes, where the message is hidden in the noisy part of the ciphertext, our scheme carries the message in the affine part of the transformation and applies noise only to achieve security. Our scheme can tolerate noise of arbitrary magnitude, as long as the noise vector has sufficiently small hamming weight (and its entries are independent). Our design achieves "proto-homomorphic" properties in an elementary manner: message addition and multiplication are emulated by pointwise addition and multiplication of the ciphertext vectors. Moreover, the extremely simple nature of our decryption makes the scheme easily amenable to bootstrapping. However, some complications are caused by the inherent presence of noticeable encryption error. Our main technical contribution is the development of two new techniques for...

  15. A C1q domain containing protein from Crassostrea gigas serves as pattern recognition receptor and opsonin with high binding affinity to LPS.

    Science.gov (United States)

    Jiang, Shuai; Li, Hui; Zhang, Daoxiang; Zhang, Huan; Wang, Lingling; Sun, Jinsheng; Song, Linsheng

    2015-08-01

    C1q proteins serve as pattern recognition receptors and involve in the pathogen recognition and complement pathway activation. In the present study, a novel C1q domain containing protein from Crassostrea gigas (designated CgC1qDC-1) was isolated by liposaccharide-Sepharose 6B affinity chromatography. The coding sequence of CgC1qDC-1 gene was determined by performing a homologous search of eight tryptic peptides identified by MALDI-TOF/TOF-MS against the genome of C. gigas. The coding sequence of CgC1qDC-1 was of 387 bp encoding a polypeptide of 128 amino acids containing a typical globular C1q domain. The globular C1q domain possessed eight β strands with a jelly-roll topology structure, which was similar to the structure of human gC1q domain. The mRNA transcripts of CgC1qDC-1 were dominantly expressed in mantle and hemocytes, while low expressed in hepatopancreas, gonad, gill and muscle. The expression level of CgC1qDC-1 increased drastically at 6 h after Vibrio splendidus stimulation, and then gradually fell to the normal level at about 24 h. ELISA assay quantified that CgC1qDC-1 bound to LPS with high binding affinity (Kd = 0.09 × 10(-6) M). Moreover, CgC1qDC-1 significantly enhanced the phagocytosis of oyster hemocytes towards Gram-negative bacteria Escherichia coli and V. splendidus. These results collectively indicated that CgC1qDC-1 could serve as pattern recognition receptor and opsonin in the innate immune response against invading Gram-negative bacteria.

  16. LDGM Codes for Channel Coding and Joint Source-Channel Coding of Correlated Sources

    Directory of Open Access Journals (Sweden)

    Javier Garcia-Frias

    2005-05-01

    Full Text Available We propose a coding scheme based on the use of systematic linear codes with low-density generator matrix (LDGM codes for channel coding and joint source-channel coding of multiterminal correlated binary sources. In both cases, the structures of the LDGM encoder and decoder are shown, and a concatenated scheme aimed at reducing the error floor is proposed. Several decoding possibilities are investigated, compared, and evaluated. For different types of noisy channels and correlation models, the resulting performance is very close to the theoretical limits.

  17. On the Analysis of Weighted Nonbinary Repeat Multiple-Accumulate Codes

    CERN Document Server

    Rosnes, Eirik

    2011-01-01

    In this paper, we consider weighted nonbinary repeat multiple-accumulate (WNRMA) code ensembles obtained from the serial concatenation of a nonbinary rate-1/n repeat code and the cascade of L>= 1 accumulators, where each encoder is followed by a nonbinary random weighter. The WNRMA codes are assumed to be iteratively decoded using the turbo principle with maximum a posteriori constituent decoders. We derive the exact weight enumerator of nonbinary accumulators and subsequently give the weight enumerators for WNRMA code ensembles. We formally prove that the symbol-wise minimum distance of WNRMA code ensembles asymptotically grows linearly with the block length when L >= 3 and n >= 2, and L=2 and n >= 3, for all powers of primes q >= 3 considered, where q is the field size. Thus, WNRMA code ensembles are asymptotically good for these parameters. We also give iterative decoding thresholds, computed by an extrinsic information transfer chart analysis, on the q-ary symmetric channel to show the convergence propert...

  18. De novo interstitial deletion q16.2q21 on chromosome 6

    Energy Technology Data Exchange (ETDEWEB)

    Villa, A.; Urioste, M.; Luisa, M. [Universidad Complutense, Madrid (Spain)] [and others

    1995-01-30

    A de novo interstitial deletion of 6q16.2q21 was observed in a 23-month-old boy with mental and psychomotor delay, obese appearance, minor craniofacial anomalies, and brain anomalies. We compare clinical manifestations of this patient with those observed in previously reported cases with similar 6q interstitial deletions. It is interesting to note the clinical similarities between some patients with interstitial deletions of 6q16 or q21 bands and patients with Prader-Willi syndrome (PWS) and it may help to keep in mind cytogenetic studies of patients with some PWS findings. 24 refs., 3 figs., 2 tabs.

  19. Elliptic Quantum Groups U_{q,p}(gl_N) and E_{q,p}(gl_N)

    CERN Document Server

    Konno, Hitoshi

    2016-01-01

    We reformurate a central extension of Felder's elliptic quantum group in the FRST formulation as a topological algebra E_{q,p}(gl_N) over the ring of formal power series in p. We then discuss the isomorphism between E_{q,p}(gl_N) and the elliptic algebra U_{q,p}(gl_N) of the Drinfeld realization. An evaluation H-algebra homomorphism from U_{q,p}(gl_N) to a dynamical extension of the quantum affine algebra U_q(gl_N) resolves the problem into the one discussed by Ding and Frenkel in the trigonometric case. We also provide some useful formulas for the elliptic quantum determinants.

  20. Monads on Q-Cat and their lax extensions to Q-Dist

    OpenAIRE

    Lai, Hongliang; Tholen, Walter

    2016-01-01

    For a small quantaloid $\\mathcal{Q}$, we consider 2-monads on the 2-category $\\mathcal{Q}$-$\\bf{Cat}$ and their lax extensions to the 2-category $\\mathcal{Q}$-$\\bf{Dist}$ of small $\\mathcal{Q}$-categories and their distributors, in particular those lax extensions that are flat, in the sense that they map identity distributors to identity distributors. In fact, unlike in the discrete case, a 2-monad on $\\mathcal{Q}$-$\\bf{Cat}$ may admit only one flat lax extension. Every ordinary monad on the ...

  1. Improved lossless intra coding for next generation video coding

    Science.gov (United States)

    Vanam, Rahul; He, Yuwen; Ye, Yan

    2016-09-01

    Recently, there have been efforts by the ITU-T VCEG and ISO/IEC MPEG to further improve the compression performance of the High Efficiency Video Coding (HEVC) standard for developing a potential next generation video coding standard. The exploratory codec software of this potential standard includes new coding tools for inter and intra coding. In this paper, we present a new intra prediction mode for lossless intra coding. Our new intra mode derives a prediction filter for each input pixel using its neighboring reconstructed pixels, and applies this filter to the nearest neighboring reconstructed pixels to generate a prediction pixel. The proposed intra mode is demonstrated to improve the performance of the exploratory software for lossless intra coding, yielding a maximum and average bitrate savings of 4.4% and 2.11%, respectively.

  2. A NOVEL CONSTRUCTION OF QUANTUM LDPC CODES BASED ON CYCLIC CLASSES OF LINES IN EUCLIDEAN GEOMETRIES

    Institute of Scientific and Technical Information of China (English)

    Cao Dong; Song Yaoliang; Zhao Shengmei

    2012-01-01

    The dual-containing (or self-orthogonal) formalism of Calderbank-Shor-Steane (CSS) codes provides a universal connection between a classical linear code and a Quantum Error-Correcting Code (QECC).We propose a novel class of quantum Low Density Parity Check (LDPC) codes constructed from cyclic classes of lines in Euclidean Geometry (EG).The corresponding constructed parity check matrix has quasi-cyclic structure that can be encoded flexibility,and satisfies the requirement of dual-containing quantum code.Taking the advantage of quasi-cyclic structure,we use a structured approach to construct Generalized Parity Check Matrix (GPCM).This new class of quantum codes has higher code rate,more sparse check matrix,and exactly one four-cycle in each pair of two rows.Experimental results show that the proposed quantum codes,such as EG(2,q)Ⅱ-QECC,EG(3,q)Ⅱ-QECC,have better performance than that of other methods based on EG,over the depolarizing channel and decoded with iterative decoding based on the sum-product decoding algorithm.

  3. Selection of Code and Interleaver for Turbo Coding

    DEFF Research Database (Denmark)

    Andersen, Jakob Dahl

    1998-01-01

    The selection of component codes for turbo coding has often been based on the performance at high SNR's. However, we will argue that the selection mainly should be based on the performance at low SNR's, i.e. the convergence properties. Further, we will present a way to construct interleavers...... that significantly improve the performance of the turbo coding scheme at high SNR's, i.e. lowers the error floor...

  4. Superimposed Code Theorectic Analysis of DNA Codes and DNA Computing

    Science.gov (United States)

    2010-03-01

    Bounds for DNA Codes Based on Fibonacci Ensembles of DNA Sequences ”, 2008 IEEE Proceedings of International Symposium on Information Theory, pp. 2292...5, June 2008, pp. 525-34. 32 28. A. Macula, et al., “Random Coding Bounds for DNA Codes Based on Fibonacci Ensembles of DNA Sequences ”, 2008...combinatorial method of bio-memory design and detection that encodes item or process information as numerical sequences represented in DNA. ComDMem is a

  5. A case of de novo duplication of 15q24-q26.3

    Directory of Open Access Journals (Sweden)

    Hye Ran Kim

    2011-06-01

    Full Text Available Distal duplication, or trisomy 15q, is an extremely rare chromosomal disorder characterized by prenatal and postnatal overgrowth, mental retardation, and craniofacial malformations. Additional abnormalities typically include an unusually short neck, malformations of the fingers and toes, scoliosis and skeletal malformations, genital abnormalities, particularly in affected males, and, in some cases, cardiac defects. The range and severity of symptoms and physical findings may vary from case to case, depending upon the length and location of the duplicated portion of chromosome 15q. Most reported cases of duplication of the long arm of chromosome 15 frequently have more than one segmental imbalance resulting from unbalanced translocations involving chromosome 15 and deletions in another chromosome, as well as other structural chromosomal abnormalities. We report a female newborn with a de novo duplication, 15q24- q26.3, showing intrauterine overgrowth, a narrow asymmetric face with down-slanting palpebral fissures, a large, prominent nose, and micrognathia, arachnodactyly, camptodactyly, congenital heart disease, hydronephrosis, and hydroureter. Chromosomal analysis showed a 46,XX,inv(9(p12q13,dup(15(q24q26.3. Array comparative genomic hybridization analysis revealed a gain of 42 clones on 15q24-q26.3. This case represents the only reported patient with a de novo 15q24-q26.3 duplication that did not result from an unbalanced translocation and did not have a concomitant monosomic component in Korea.

  6. First order non-homogeneous q-difference equation for Stieltjes function characterizing q-orthogonal polynomials

    CERN Document Server

    Arvesú, J

    2012-01-01

    In this paper we give a characterization of some classical q-orthogonal polynomials in terms of a difference property of the associated Stieltjes function, i.e this function solves a first order non-homogeneous q-difference equation. The solutions of the aforementioned q-difference equation (given in terms of hypergeometric series) for some canonical cases, namely, q-Charlier, q-Kravchuk, q-Meixner and q-Hahn are worked out.

  7. Bit-Interleaved Coded Multiple Beamforming with Perfect Coding

    CERN Document Server

    Li, Boyu

    2010-01-01

    When the channel state information is known by the transmitter as well as the receiver, beamforming techniques that employ Singular Value Decomposition (SVD) are commonly used in Multiple-Input Multiple-Output (MIMO) systems. Without channel coding, when a single symbol is transmitted, these systems achieve the full diversity order. Whereas, this property is lost when multiple symbols are simultaneously transmitted. Full diversity can be restored when channel coding is added, as long as the code rate Rc and the number of employed subchannels S satisfy the condition RcS =< 1. Moreover, by adding a proper constellation precoder, full diversity can be achieved for both uncoded and coded SVD systems, e.g., Fully Precoded Multiple Beamforming (FPMB) and Bit-Interleaved Coded Multiple Beamforming with Full Precoding (BICMB-FP). Perfect Space-Time Block Code (PSTBC) is a full-rate full-diversity space-time code, which achieves maximum coding gain for MIMO systems. Previously, Perfect Coded Multiple Beamforming (P...

  8. Practices in Code Discoverability: Astrophysics Source Code Library

    CERN Document Server

    Allen, Alice; Nemiroff, Robert J; Shamir, Lior

    2012-01-01

    Here we describe the Astrophysics Source Code Library (ASCL), which takes an active approach to sharing astrophysical source code. ASCL's editor seeks out both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and adds entries for the found codes to the library. This approach ensures that source codes are added without requiring authors to actively submit them, resulting in a comprehensive listing that covers a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL now has over 340 codes in it and continues to grow. In 2011, the ASCL (http://ascl.net) has on average added 19 new codes per month. An advisory committee has been established to provide input and guide the development and expansion of the new site, and a marketing plan has been developed and is being executed. All ASCL source codes have been used to generate results published in or submitted to a refereed journal and are freely available ei...

  9. Analysis of healthy cohorts for single nucleotide polymorphisms in C1q gene cluster

    Directory of Open Access Journals (Sweden)

    MARIA A. RADANOVA

    2015-12-01

    Full Text Available C1q is the first component of the classical pathway of complement activation. The coding region for C1q is localized on chromosome 1p34.1–36.3. Mutations or single nucleotide polymorphisms (SNPs in C1q gene cluster can cause developing of Systemic lupus erythematosus (SLE because of C1q deficiency or other unknown reason. We selected five SNPs located in 7.121 kbp region on chromosome 1, which were previously associated with SLE and/or low C1q level, but not causing C1q deficiency and analyzed them in terms of allele frequencies and genotype distribution in comparison with Hispanic, Asian, African and other Caucasian cohorts. These SNPs were: rs587585, rs292001, rs172378, rs294179 and rs631090. One hundred eighty five healthy Bulgarian volunteers were genotyped for the selected five C1q SNPs by quantative real-time PCR methods. International HapMap Project has been used for information about genotype distribution and allele frequencies of the five SNPs in, Hispanics, Asians, Africans and others Caucasian cohorts. Bulgarian healthy volunteers and another pooled Caucasian cohort had similar frequencies of genotypes and alleles of rs587585, rs292001, rs294179 and rs631090 SNPs. Nevertheless, genotype AA of rs172378 was significantly overrepresented in Bulgarians when compared to other healthy Caucasians from USA and UK (60% vs 31%. Genotype distribution of rs172378 in Bulgarians was similar to Greek-Cyriot Caucasians. For all Caucasians the major allele of rs172378 was A. This is the first study analyzing the allele frequencies and genotype distribution of C1q gene cluster SNPs in Bulgarian healthy population.

  10. Outage Analysis of PLNC Based Bidirectional Relay Network in the presence of I/Q Imbalance

    Directory of Open Access Journals (Sweden)

    V.N.Senthil Kumaran

    2014-08-01

    Full Text Available Bidirectional relay network consists of two sources and a relay, where each node has a single antenna and operates in half duplex mode. The PLNC based OFDM system transmits numerous high data streams through narrow band flat fading subchannels to achieve high spectral efficiency over wide band channels. However in practice, I/Q imbalance is introduced at the radio frequency sections of the nodes affects the orthogonality among the subcarriers. In this paper, the bidirectional relay network is modelled with I/Q imbalance and the outage performance of Orthogonal Frequency Division Multiplexing (OFDM based bidirectional relay network which employs physical layer network coding (PLNC is analyzed in the presence of In-phase and Quadrature (I/Q imbalance at both the time slots.

  11. Progress study on the mechanism of CAG repeats dynamic mutation in polyQ disease

    Directory of Open Access Journals (Sweden)

    WANG Chun-rong

    2012-06-01

    Full Text Available Polyglutamine (polyQ disease is a group of neurodegenerative disorders caused by abnormal expansion of CAG repeats within coding regions of certain causative genes, which are translated into a series of abnormally expanded polyQ tracts causing cytotoxicity. So far, nine diseases caused by expanded polyQ tracts have been demonstrated including Huntington's disease (HD, spinobulbar muscular atrophy (SBMA, dentatorubral-pallidoluysian atrophy (DRPLA and several spinocerebellar ataxias subtypes (SCA. In human, long CAG repeats tend to expand during transmissions from parent to offspring, named as dynamic mutation, leading to an earlier age of disease onset and more severe symptoms in subsequent generations. The review presents some novel mechanisms based on dynamic mutation.

  12. On the Fock representation of the q-commutation relations

    CERN Document Server

    Dykema, K J; Dykema, Ken; Nica, Alexandru

    1993-01-01

    The q-commutation relations in the title are those that have recently received much attention, and that for -1<q<1 provide an interpolation between Bosonic and Fermionic statistics, passing through free statistics at q=0. We look at the C*-algebra R^q generated by the representation of these relations on the twisted Fock space of Bozejko-Speicher, and we find a canonical unitary U_q from the twisted Fock space to usual full Fock space, such that U_q R^q (U_q)^* contains the Cuntz algebra R^0, and such that we have equality for |q|<0.44.

  13. q-deformed Star Products and Moyal Brackets

    CERN Document Server

    Dayi, O F

    1996-01-01

    The standard and anti-standard ordered operators acting on two-dimensional q-deformed phase space are shown to satisfy algebras which can be called W_\\infty. q-star products and q-Moyal brackets corresponding to these algebras are constructed. Some applications like defining q-classical mechanics and q-path integrals are discussed.

  14. Using Q Methodology in Quality Improvement Projects.

    Science.gov (United States)

    Tiernon, Paige; Hensel, Desiree; Roy-Ehri, Leah

    Q methodology consists of a philosophical framework and procedures to identify subjective viewpoints that may not be well understood, but its use in nursing is still quite limited. We describe how Q methodology can be used in quality improvement projects to better understand local viewpoints that act as facilitators or barriers to the implementation of evidence-based practice. We describe the use of Q methodology to identify nurses' attitudes about the provision of skin-to-skin care after cesarean birth. Copyright © 2017 AWHONN, the Association of Women's Health, Obstetric and Neonatal Nurses. Published by Elsevier Inc. All rights reserved.

  15. KFM 01A. Q-logging

    Energy Technology Data Exchange (ETDEWEB)

    Barton, Nick [Nick Barton and Associates (Norway)

    2003-03-01

    The first Forsmark potential repository site borehole KFM 01A provided core from 101.8 to 1000.7 m depth. This was independently Q-logged during a two-day period (19th-20th February, 2003), without access to BORMAP results or regional jointing frequencies or orientations. The Q-logging was intended to be an independent check for subsequent BORMAP-derived Q-parameter estimation. The Q-logging was accomplished using the manually-recorded 'histogram method' which allows the logger to enter Q-parameter ranges and depths directly into the appropriate histograms, which facilitates subsequent data processing using Excel spreadsheets. Successive pairs of core boxes, which contain an average of 11 meters of core in ten rows, were the source of ten opinions of each of the six Q-parameters, giving a total of 4920 recordings of Q-parameter values for the 164 core boxes. Data processing was divided into several parts, with successively increasing detail. The report therefore contains Q-histograms for the whole core, for four identified fracture(d) zones combined as if one unit, and then for the whole core minus these fracture(d) zones. This background rock mass quality is subsequently divided into nine depth zones or slices, and trends of variation with depth are tabulated. The four identified fracture(d) zones, which are actually of reasonable quality, are also analysed separately, and similarities and subtle differences are discerned between them. The overall quality of this first core is very good to excellent, with Q(mean) of 48.4, and a most frequent Q-value of 100. The range of quality is from 2.1 to 2130, which is the complete upper half of the six order of magnitude Q scale. Even the relatively fracture(d) zones, representing some 13% of the 900 m cored, have a combined Q(mean) of 13.9 and a range of quality of 2.1 to 150.

  16. Inflation Driven by q-de Sitter

    Science.gov (United States)

    Setare, M. R.; Momeni, D.; Kamali, V.; Myrzakulov, R.

    2016-02-01

    We propose a generalised de Sitter scale factor for the cosmology of early and late time universe, including single scalar field is called as inflaton. This form of scale factor has a free parameter q is called as nonextensivity parameter. When q = 1, the scale factor is de Sitter. This scale factor is an intermediate form between power-law and de Sitter. We study cosmology of such families. We show that both kinds of dark components, dark energy and dark matter simultaneously are described by this family of solutions. As a motivated idea, we investigate inflation in the framework of q-de Sitter. We consider three types of scenarios for inflation. In a single inflation scenario, we observe that, inflation ended without any specific ending inflation ϕ e n d , the spectral index and the associated running of the spectral index are n s - 1 ˜ -2 𝜖, α s ≡ 0. To end the inflation: we should have q={3}/{4}. We deduce that the inflation ends when the evolution of the scale factor is a( t) = e 3/4( t). With this scale factor there is no need to specify ϕ e n d . As an alternative to have inflation with ending point, We will study q-inflation model in the context of warm inflation. We propose two forms of damping term Γ. In the first case when Γ = Γ0, we show the scale invariant spectrum, (Harrison-Zeldovich spectrum, i.e. n s = 1) may be approximately presented by (q={9}/{10}, ~N=70). Also there is a range of values of R and n s which is compatible with the BICEP2 data where q={9}/{10}. In case Γ = Γ1 V( ϕ), it is observed that small values of a number of e-folds are assured for small values of q parameter. Also in this case, the scale-invariant spectrum may be represented by (q,N) = ({9}/{10},70). For q={9}/{10} a range of values of R and n s is compatible with the BICEP2 data. Consequently, the proposal of q-de Sitter is consistent with observational data. We observe that the non-extensivity parameter q plays a significant role in inflationary scenario.

  17. The q-Laguerre matrix polynomials.

    Science.gov (United States)

    Salem, Ahmed

    2016-01-01

    The Laguerre polynomials have been extended to Laguerre matrix polynomials by means of studying certain second-order matrix differential equation. In this paper, certain second-order matrix q-difference equation is investigated and solved. Its solution gives a generalized of the q-Laguerre polynomials in matrix variable. Four generating functions of this matrix polynomials are investigated. Two slightly different explicit forms are introduced. Three-term recurrence relation, Rodrigues-type formula and the q-orthogonality property are given.

  18. 奥迪Q7

    Institute of Scientific and Technical Information of China (English)

    雪凝

    2005-01-01

    近日,奥迪全面披露了奥迪Q7 SUV的技术数据。奥迪Q7 SUV是在2003年底特律车展上现身的派克峰概念车(Pikes Peak quattro)基础上开发的,Q7的问世标志着奥迪终于杀入了竞争激烈的SUV市场。

  19. Elements of algebraic coding systems

    CERN Document Server

    Cardoso da Rocha, Jr, Valdemar

    2014-01-01

    Elements of Algebraic Coding Systems is an introductory textto algebraic coding theory. In the first chapter, you'll gain insideknowledge of coding fundamentals, which is essential for a deeperunderstanding of state-of-the-art coding systems.This book is a quick reference for those who are unfamiliar withthis topic, as well as for use with specific applications such as cryptographyand communication. Linear error-correcting block codesthrough elementary principles span eleven chapters of the text.Cyclic codes, some finite field algebra, Goppa codes, algebraic decodingalgorithms, and applications in public-key cryptography andsecret-key cryptography are discussed, including problems and solutionsat the end of each chapter. Three appendices cover the Gilbertbound and some related derivations, a derivation of the Mac-Williams' identities based on the probability of undetected error,and two important tools for algebraic decoding-namely, the finitefield Fourier transform and the Euclidean algorithm for polynomials.

  20. A PYY Q62P variant linked to human obesity

    Energy Technology Data Exchange (ETDEWEB)

    Ahituv, Nadav; Kavaslar, Nihan; Schackwitz, Wendy; Ustaszewska,Anna; Collier, John Michael; Hebert, Sybil; Doelle, Heather; Dent,Robert; Pennacchio, Len A.; McPherson, Ruth

    2005-06-27

    Members of the pancreatic polypeptide family and the irreceptors have been implicated in the control of food intake in rodents and humans. To investigate whether nucleotide changes in these candidate genes result in abnormal weight in humans, we sequenced the coding exons and splice sites of seven family members (NPY, PYY, PPY, NPY1R, NPY2R, NPY4R, and NPY5R) in a large cohort of extremely obese (n=379) and lean (n=378) individuals. In total we found eleven rare non-synonymous variants, four of which exhibited familial segregation, NPY1R L53P and PPY P63L with leanness and NPY2R D42G and PYY Q62P with obesity. Functional analysis of the obese variants revealed NPY2R D42G to have reduced cell surface expression, while previous cell culture based studies indicated variant PYY Q62P to have altered receptor binding selectivity and we show that it fails to reduce food intake through mouse peptide injection experiments. These results support that rare non-synonymous variants within these genes can alter susceptibility to human body mass index extremes.

  1. Porting Ordinary Applications to Blue Gene/Q Supercomputers

    Energy Technology Data Exchange (ETDEWEB)

    Maheshwari, Ketan C.; Wozniak, Justin M.; Armstrong, Timothy; Katz, Daniel S.; Binkowski, T. Andrew; Zhong, Xiaoliang; Heinonen, Olle; Karpeyev, Dmitry; Wilde, Michael

    2015-08-31

    Efficiently porting ordinary applications to Blue Gene/Q supercomputers is a significant challenge. Codes are often originally developed without considering advanced architectures and related tool chains. Science needs frequently lead users to want to run large numbers of relatively small jobs (often called many-task computing, an ensemble, or a workflow), which can conflict with supercomputer configurations. In this paper, we discuss techniques developed to execute ordinary applications over leadership class supercomputers. We use the high-performance Swift parallel scripting framework and build two workflow execution techniques-sub-jobs and main-wrap. The sub-jobs technique, built on top of the IBM Blue Gene/Q resource manager Cobalt's sub-block jobs, lets users submit multiple, independent, repeated smaller jobs within a single larger resource block. The main-wrap technique is a scheme that enables C/C++ programs to be defined as functions that are wrapped by a high-performance Swift wrapper and that are invoked as a Swift script. We discuss the needs, benefits, technicalities, and current limitations of these techniques. We further discuss the real-world science enabled by these techniques and the results obtained.

  2. Q/V-band communications and propagation experiments using ALPHASAT

    Science.gov (United States)

    Koudelka, O.

    2011-12-01

    The lower satellite frequency bands become more and more congested; therefore it will be necessary to exploit higher frequencies for satellite communications. New broadband applications (e.g. 3D-TV, fast Internet access) will require additional spectrum in the future. The Ku-band is highly utilised nowadays and Ka-band systems, which have been extensively studied in the 1990s, are already in commercial use. The next frontier is the Q/V-band. At millimetre waves the propagation effects are significant. The traditional approach of implementing large fade margins is impractical, since this leads to high EIRP and G/ T figures for the ground stations, resulting in unacceptable costs. Fade mitigation techniques by adaptive coding and modulation (ACM) offer a cost-effective solution to this problem. ESA will launch the ALPHASAT satellite in 2012. It will carry experimental Ka- and Q/V-band propagation and communications payloads, enabling propagation measurements throughout Europe and communications experiments. Three communications spot beams will be covering Northern Italy, Southern Italy and Austria with some overlap. Joanneum Research and Graz University of Technology are preparing for communications and propagation experiments using these new payloads of ALPHASAT in close cooperation with ESA, the Italian Space Agency ASI, Politecnico di Milano and Università Tor Vergata. The main focus of the communications experiments is on ACM techniques. The paper describes the design of the planned Q/V-band ground station with the planned ACM tests and investigations as well as the architecture of the communications terminal, based on a versatile software-defined radio platform.

  3. BILINEAR FORMS AND LINEAR CODES

    Institute of Scientific and Technical Information of China (English)

    高莹

    2004-01-01

    Abraham Lempel et al[1] made a connection between linear codes and systems of bilinear forms over finite fields. In this correspondence, a new simple proof of a theorem in [1] is presented; in addition, the encoding process and the decoding procedure of RS codes are simplified via circulant matrices. Finally, the results show that the correspondence between bilinear forms and linear codes is not unique.

  4. Error correcting coding for OTN

    DEFF Research Database (Denmark)

    Justesen, Jørn; Larsen, Knud J.; Pedersen, Lars A.

    2010-01-01

    Forward error correction codes for 100 Gb/s optical transmission are currently receiving much attention from transport network operators and technology providers. We discuss the performance of hard decision decoding using product type codes that cover a single OTN frame or a small number...... of such frames. In particular we argue that a three-error correcting BCH is the best choice for the component code in such systems....

  5. High performance scalable image coding

    Institute of Scientific and Technical Information of China (English)

    Gan Tao; He Yanmin; Zhu Weile

    2007-01-01

    A high performance scalable image coding algorithm is proposed. The salient features of this algorithm are the ways to form and locate the significant clusters. Thanks to the list structure, the new coding algorithm achieves fine fractional bit-plane coding with negligible additional complexity. Experiments show that it performs comparably or better than the state-of-the-art coders. Furthermore, the flexible codec supports both quality and resolution scalability, which is very attractive in many network applications.

  6. Code Speed Measuring for VC++

    Science.gov (United States)

    2015-10-01

    UNCLASSIFIED AD-E403 688 Technical Report ARWSE-TR-14025 CODE SPEED MEASURING FOR VC++ Tom Nealis...TYPE Final 3. DATES COVERED (From – To) 4. TITLE AND SUBTITLE CODE SPEED MEASURING FOR VC++ 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...ABSTRACT It’s often important to know how fast a snippet of code executes. This information allows the coder to make important decisions

  7. ACE spectrum of LDPC codes

    Directory of Open Access Journals (Sweden)

    Vukobratović Dejan

    2006-01-01

    Full Text Available Construction of short-length LDPC codes with good, both waterfall and error-floor, behavior is still an attractive research problem. Recently proposed construction algorithms in this field are based on remarkably simple ideas, but yet, their effectiveness can still be questioned. In this paper we investigate a novel measure of goodness of a given LDPC code namely its ACE spectrum, based on a previously introduced ACE metrics associated with each cycle in LDPC code graph.

  8. QR code for medical information uses.

    Science.gov (United States)

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  9. Astrophysics Source Code Library Enhancements

    CERN Document Server

    Hanisch, Robert J; Berriman, G Bruce; DuPrie, Kimberly; Mink, Jessica; Nemiroff, Robert J; Schmidt, Judy; Shamir, Lior; Shortridge, Keith; Taylor, Mark; Teuben, Peter J; Wallin, John

    2014-01-01

    The Astrophysics Source Code Library (ASCL; ascl.net) is a free online registry of codes used in astronomy research; it currently contains over 900 codes and is indexed by ADS. The ASCL has recently moved a new infrastructure into production. The new site provides a true database for the code entries and integrates the WordPress news and information pages and the discussion forum into one site. Previous capabilities are retained and permalinks to ascl.net continue to work. This improvement offers more functionality and flexibility than the previous site, is easier to maintain, and offers new possibilities for collaboration. This presentation covers these recent changes to the ASCL.

  10. Multiple Beamforming with Perfect Coding

    CERN Document Server

    Li, Boyu

    2011-01-01

    In Singular Value Decomposition (SVD) beamforming, without channel coding, there is a trade-off between full diversity and full multiplexing. Adding channel coding, full diversity and full multiplexing can be both achieved, as long as the code rate Rc and the number of subchannels S satisfy RcS1. Recently discovered Perfect Space-Time Block Codes (PSTBCs) are full-rate full-diversity space-time codes, achieving maximum coding gain. In this paper, two novel techniques, Perfect Coded Multiple Beamforming (PCMB) and Bit-Interleaved Coded Multiple Beamforming with Perfect Coding (BICMB-PC), are proposed, employing PSTBCs. PCMB achieves full diversity, full multiplexing, and full rate simultaneously, and its performance is close to PSTBC and FPMB, while the decoding complexity is significantly less than PSTBC and much lower than FPMB of dimensions 2 and 4. On the other hand, BICMB-PC achieves both full diversity and full multiplexing, and its performance is similar to BICMB-FP, but provides much lower decoding com...

  11. Automatic code generation in practice

    DEFF Research Database (Denmark)

    Adam, Marian Sorin; Kuhrmann, Marco; Schultz, Ulrik Pagh

    2016-01-01

    -specific language to specify those requirements and to allow for generating a safety-enforcing layer of code, which is deployed to the robot. The paper at hand reports experiences in practically applying code generation to mobile robots. For two cases, we discuss how we addressed challenges, e.g., regarding weaving...... code generation into proprietary development environments and testing of manually written code. We find that a DSL based on the same conceptual model can be used across different kinds of hardware modules, but a significant adaptation effort is required in practical scenarios involving different kinds...

  12. Should you learn to code?

    CERN Document Server

    Team, The Hyperink

    2013-01-01

    On May 15, 2012 Jeff Atwood (co-founder of Stack Overflow) published a blog post titled "Please Don't Learn to Code" in response to Mayor Mike Bloomberg's resolution to learn how to code in 2012. In that post he argues against "learning to code just for the sake of learning how to code," a sentiment that sparked an active online debate. This book is a compilation of several different perspectives on that debate. Should programming be taught to every student as part of their core curriculum, similar to mathematics, reading, and writing? Should every working professional take time to learn a

  13. Grassmann codes and Schubert unions

    DEFF Research Database (Denmark)

    Hansen, Johan Peder; Johnsen, Trygve; Ranestad, Kristian

    2009-01-01

    We study subsets of Grassmann varieties over a field , such that these subsets are unions of Schubert cycles, with respect to a fixed flag. We study such sets in detail, and give applications to coding theory, in particular for Grassmann codes. For much is known about such Schubert unions...... with a maximal number of -rational points for a given spanning dimension. We study the case and give a conjecture for general . We also define Schubert union codes in general, and study the parameters and support weights of these codes....

  14. Semi-supervised sparse coding

    KAUST Repository

    Wang, Jim Jing-Yan

    2014-07-06

    Sparse coding approximates the data sample as a sparse linear combination of some basic codewords and uses the sparse codes as new presentations. In this paper, we investigate learning discriminative sparse codes by sparse coding in a semi-supervised manner, where only a few training samples are labeled. By using the manifold structure spanned by the data set of both labeled and unlabeled samples and the constraints provided by the labels of the labeled samples, we learn the variable class labels for all the samples. Furthermore, to improve the discriminative ability of the learned sparse codes, we assume that the class labels could be predicted from the sparse codes directly using a linear classifier. By solving the codebook, sparse codes, class labels and classifier parameters simultaneously in a unified objective function, we develop a semi-supervised sparse coding algorithm. Experiments on two real-world pattern recognition problems demonstrate the advantage of the proposed methods over supervised sparse coding methods on partially labeled data sets.

  15. Coding, cryptography and combinatorics

    CERN Document Server

    Niederreiter, Harald; Xing, Chaoping

    2004-01-01

    It has long been recognized that there are fascinating connections between cod­ ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi­ natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the p...

  16. Polymatroids with Network Coding

    CERN Document Server

    Han, Te Sun

    2010-01-01

    The problem of network coding for multicasting a single source to multiple sinks has first been studied by Ahlswede, Cai, Li and Yeung in 2000, in which they have established the celebrated max-flow mini-cut theorem on non-physical information flow over a network of independent channels. On the other hand, in 1980, Han has studied the case with correlated multiple sources and a single sink from the viewpoint of polymatroidal functions in which a necessary and sufficient condition has been demonstrated for reliable transmission over the network. This paper presents an attempt to unify both cases, which leads to establish a necessary and sufficient condition for reliable transmission over a noisy network for multicasting all the correlated multiple sources to all the multiple sinks. Furthermore, we address also the problem of transmitting "independent" sources over a multiple-access-type of network as well as over a broadcast-type of network, which reveals that the (co-) polymatroidal structures are intrinsical...

  17. Consensus Convolutional Sparse Coding

    KAUST Repository

    Choudhury, Biswarup

    2017-04-11

    Convolutional sparse coding (CSC) is a promising direction for unsupervised learning in computer vision. In contrast to recent supervised methods, CSC allows for convolutional image representations to be learned that are equally useful for high-level vision tasks and low-level image reconstruction and can be applied to a wide range of tasks without problem-specific retraining. Due to their extreme memory requirements, however, existing CSC solvers have so far been limited to low-dimensional problems and datasets using a handful of low-resolution example images at a time. In this paper, we propose a new approach to solving CSC as a consensus optimization problem, which lifts these limitations. By learning CSC features from large-scale image datasets for the first time, we achieve significant quality improvements in a number of imaging tasks. Moreover, the proposed method enables new applications in high dimensional feature learning that has been intractable using existing CSC methods. This is demonstrated for a variety of reconstruction problems across diverse problem domains, including 3D multispectral demosaickingand 4D light field view synthesis.

  18. Misunderstandings about Q and 'Cochran's Q test' in meta-analysis.

    Science.gov (United States)

    Hoaglin, David C

    2016-02-20

    Many meta-analyses report using 'Cochran's Q test' to assess heterogeneity of effect-size estimates from the individual studies. Some authors cite work by W. G. Cochran, without realizing that Cochran deliberately did not use Q itself to test for heterogeneity. Further, when heterogeneity is absent, the actual null distribution of Q is not the chi-squared distribution assumed for 'Cochran's Q test'. This paper reviews work by Cochran related to Q. It then discusses derivations of the asymptotic approximation for the null distribution of Q, as well as work that has derived finite-sample moments and corresponding approximations for the cases of specific measures of effect size. Those results complicate implementation and interpretation of the popular heterogeneity index I(2) . Also, it turns out that the test-based confidence intervals used with I(2) are based on a fallacious approach. Software that outputs Q and I(2) should use the appropriate reference value of Q for the particular measure of effect size and the current meta-analysis. Q is a key element of the popular DerSimonian-Laird procedure for random-effects meta-analysis, but the assumptions of that procedure and related procedures do not reflect the actual behavior of Q and may introduce bias. The DerSimonian-Laird procedure should be regarded as unreliable.

  19. Decoding of concatenated codes with interleaved outer codes

    DEFF Research Database (Denmark)

    Justesen, Jørn; Høholdt, Tom; Thommesen, Christian

    2004-01-01

    Recently Bleichenbacher et al. proposed a decoding algorithm for interleaved (N, K) Reed-Solomon codes, which allows close to N-K errors to be corrected in many cases. We discuss the application of this decoding algorithm to concatenated codes....

  20. The KIDTALK Behavior and Language Code: Manual and Coding Protocol.

    Science.gov (United States)

    Delaney, Elizabeth M.; Ezell, Sara S.; Solomon, Ned A.; Hancock, Terry B.; Kaiser, Ann P.

    Developed as part of the Milieu Language Teaching Project at the John F. Kennedy Center at Vanderbilt University in Nashville, Tennessee, this KIDTALK Behavior-Language Coding Protocol and manual measures behavior occurring during adult-child interactions. The manual is divided into 5 distinct sections: (1) the adult behavior codes describe…